ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: "Coly Li" <colyli@fnnas.com>
To: "Paul Moore" <paul@paul-moore.com>
Cc: "Randy Dunlap" <rdunlap@infradead.org>,
	 "Steven Rostedt" <rostedt@goodmis.org>,
	"Jan Kara" <jack@suse.cz>,  <ksummit@lists.linux.dev>
Subject: Re: [MAINTAINERS SUMMIT] re-think of richACLs in AI/LLM era
Date: Wed, 10 Sep 2025 21:32:11 +0800	[thread overview]
Message-ID: <yiqw4rfqbry7s34af72eoemon2qbylc6prouafg7xx3aeo2uwa@tdgyedc43hhp> (raw)
In-Reply-To: <CAHC9VhRyRuBtzwn2LbwxqLvj21LwrwrAZx4N3f7At1HHyNFPCQ@mail.gmail.com>

On Mon, Sep 08, 2025 at 09:03:24PM +0800, Paul Moore wrote:
> On Mon, Sep 8, 2025 at 7:23 PM Randy Dunlap <rdunlap@infradead.org> wrote:
> > On 9/8/25 8:42 AM, Coly Li wrote:
> > >> 2025年9月8日 23:39,Steven Rostedt <rostedt@goodmis.org> 写道:
> > >>
> > >>>
> > >>> I'm not really on program committee for either a Maintainers summit or LPC
> > >>> so take this just as a friendly advice from a bystander :)
> > >>>
> > >>
> > >> As Jan has stated, this is a technical topic. But you can send it to this
> > >> list too. From Ted's original email:
> > >>
> > >>    Related to the Maintainer's Summit, the Kernel Summit is organized as
> > >>    a track which is run in parallel with the other tracks at the Linux
> > >>    Plumbers Conference (LPC), and is open to all registered attendees of
> > >>    LPC.  The goal of the Kernel Summit track will be to provide a forum
> > >>    to discuss specific technical issues that would be easier to resolve
> > >>    in person than over e-mail.  The program committee will also consider
> > >>    "information sharing" topics if they are clearly of interest to the
> > >>    wider development community (i.e., advanced training in topics that
> > >>    would be useful to kernel developers).
> > >>
> > >>    To suggest a topic for the Kernel Summit, please do two things. by
> > >>    September 10th, 2025. First, please send e-mail with a subject prefix of
> > >>    [TECH TOPIC] to ksummit@lists.linux.dev.  As before, please use a separate
> > >>    e-mail for each topic.
> > >>
> > >>    Secondly, please create a topic at the Linux Plumbers Conference
> > >>    proposal submission site and target it to the Kernel Summit track:
> > >>
> > >>        https://lpc.events/event/19/abstracts
> > >>
> > >>    Please do both steps.  I'll try to notice if someone forgets one or
> > >>    the other, but your chances of making sure your proposal gets the
> > >>    necessary attention and consideration are maximized by submitting both
> > >>    to the mailing list and the web site.
> > >>
> > >>
> > >> The CfP is closing this Wednesday, so please submit it soon.
> > >
> > > Yes, I already submitted the CfP on https://lpc.events/event/19/abstracts and got the confirmation email.
> > >
> > > Also I resend another proposal email subjected with  [TECH TOPIC]  and almost identical message body.
> > >
> > > Thanks for the hint!
> >

Hi Paul and Randy,

Thank you for suggesting LSM as another choice. 

> > Hi,
> > I don't object to such a topic, but I thought that LSMs were the wave
> > of the future for extended attributes or special capability handling.  ?
> 
> I can't say I'm familiar with the RichACL concept, but generally
> speaking yes, the LSM framework exists as a way to implement access
> control mechanisms beyond the traditional Linux access controls (other
> things too, but those aren't really relevant here).

Is it convenient for normal users or non-root processes (including the policy agent) to
setup the LSM rules? We need to allow normal users to set their own access control policy
for the data they owned.

Also there is a special case, e.g. a file’s parent directory doesn’t allow write
permission, but the file needs to grant delete permission.
4614 int do_unlinkat(int dfd, struct filename *name)
4615 {
[snipped]
4645                 inode = dentry->d_inode;
4646                 ihold(inode);
4647                 error = security_path_unlink(&path, dentry);
4648                 if (error)
4649                         goto exit3;
4650                 error = vfs_unlink(mnt_idmap(path.mnt), path.dentry->d_inode,
4651                                    dentry, &delegated_inode);
[snipped]
4563 int vfs_unlink(struct mnt_idmap *idmap, struct inode *dir,
4564                struct dentry *dentry, struct inode **delegated_inode)
4565 {
4566         struct inode *target = dentry->d_inode;
4567         int error = may_delete(idmap, dir, dentry, 0);
4568
4569         if (error)
4570                 return error;
[snipped]

It seems in do_unlinkat() the security check security_path_unlink() is called before
calling may_delete() inside vfs_unlink(). So even security rule permits to delete
this file but the parent directory doesn't grant write permission, such access control
still cannot be archieved.

We are open to any possible method to serve the complicated access controls in current
AI/LLM driven workloads. And the executive team decide to invest a few engineers and time
to work with other community deveopers on the promissing technial choice, and help to make
the effort to go into upstream kernel. Therefore we do want to hear all your voices and
advices, to make sure the effort will be on the correct tack.

Thanks again for your replies.

Coly Li

  reply	other threads:[~2025-09-10 13:47 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-08  8:33 Coly Li
2025-09-08 10:52 ` Jan Kara
2025-09-08 13:47   ` Coly Li
2025-09-08 15:39   ` Steven Rostedt
2025-09-08 15:42     ` Coly Li
2025-09-08 23:22       ` Randy Dunlap
2025-09-09  1:03         ` Paul Moore
2025-09-10 13:32           ` Coly Li [this message]
2025-09-10 19:11             ` Paul Moore
2025-09-16 17:12               ` Coly Li
2025-09-16 18:07                 ` Randy Dunlap
2025-09-17  7:59                 ` Jan Kara

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=yiqw4rfqbry7s34af72eoemon2qbylc6prouafg7xx3aeo2uwa@tdgyedc43hhp \
    --to=colyli@fnnas.com \
    --cc=jack@suse.cz \
    --cc=ksummit@lists.linux.dev \
    --cc=paul@paul-moore.com \
    --cc=rdunlap@infradead.org \
    --cc=rostedt@goodmis.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox