On Mon, May 23, 2022 at 10:56:43AM -0400, Liu Xiaodong wrote: > On Wed, May 18, 2022 at 09:18:45PM +0800, Ming Lei wrote: > > Hello Liu, > > > > On Wed, May 18, 2022 at 02:38:08AM -0400, Liu Xiaodong wrote: > > > On Tue, May 17, 2022 at 01:53:57PM +0800, Ming Lei wrote: > > > > Hello Guys, > > > > > > > > ubd driver is one kernel driver for implementing generic userspace block > > > > device/driver, which delivers io request from ubd block device(/dev/ubdbN) into > > > > ubd server[1] which is the userspace part of ubd for communicating > > > > with ubd driver and handling specific io logic by its target module. > > > > > > > > Another thing ubd driver handles is to copy data between user space buffer > > > > and request/bio's pages, or take zero copy if mm is ready for support it in > > > > future. ubd driver doesn't handle any IO logic of the specific driver, so > > > > it is small/simple, and all io logics are done by the target code in ubdserver. > > > > > > > > The above two are main jobs done by ubd driver. > > > > > > Not like UBD which is straightforward and starts from scratch, VDUSE is > > > embedded in virtio framework. So its implementation is more complicated, but > > > all virtio frontend utilities can be leveraged. > > > When considering security/permission issues, feels UBD would be easier to > > > solve them. > > > > Stefan Hajnoczi and I are discussing related security/permission > > issues, can you share more details in your case? > > Hi, Ming > Security/permission things covered by your discussion are more than I've > considered. BTW, I'd rather make a summery about the discussion: 1) Stefan suggested that ubd device may be made as one container block device, which can be isolated from others, such as, the ubd device created in one container can only be controlled and read write inside this container, and this way is useful for container use case. 2) the requirement actually needs both /dev/ubdcN and /dev/ubdbN to be allowed for unprivileged user; so it could be solved by existed process privilege & file ownership; let user of the process creating the two devices owns the two devices, and apply FS's file permission on the two devices; 3) it shouldn't be hard to allow unprivileged user to control /dev/ubdcN or /dev/ubd-control - every user can create ubd by sending ADD_DEV command to /dev/ubd-control; only user with permission to /dev/ubdcN can send other control commands to /dev/ubd-control for controlling/querying the specified device - ubd driver is simple, both in interface and implementation, so we can make it stable from the beginning - only the daemon can communicate with /dev/ubdcN, which is only allowed to be opened by one process 4) the challenge is in allowing unprivileged user to access /dev/ubdbN: - no any serious bug in io path(io hang, kernel panic), such as ubd io hang may cause sync() hang - can't affect other users or processes or system, such as, one malicious may make a extremely slow device to dirty lots of pages, or prevent device from being deleted - ... 5) as Stefan mentioned, we may start by: - not allow unprivileged ubd device to be mounted - not allow unprivileged ubd device's partition table to be read from kernel - not support buffered io for unprivileged ubd device, and only direct io is allowed - maybe more limit for minimizing security risk. ubd for container is hard, and it should be one extra feature added in future, especially after fully review/verification. Thanks, Ming