> On Tue, 2007-01-09 at 11:30 -0500, Trond Myklebust wrote: > > On Tue, 2007-01-09 at 13:15 +0100, Jan Kara wrote: > > > > On Mon, Jan 08, 2007 at 11:18:52AM -0800, Andrew Morton wrote: > > > > > On Sun, 7 Jan 2007 23:12:53 -0500 > > > > > "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx> wrote: > > > > > > > > <snip> > > > > > > > > > Any such change can cause Unionfs to oops, or stay > > > > > > silent and even RESULT IN DATA LOSS. > > > > > > > > > > With a rather rough user interface ;) > > > > > > > > That statement is meant to scare people away from modifying the lower fs :) > > > > I tortured unionfs quite a bit, and it can oops but it takes some effort. > > > But isn't it then potential DOS? If you happen to union two filesystems > > > and an untrusted user has write access to both original filesystem and > > > the union, then you say he'd be able to produce oops? That does not > > > sound very secure to me... And if any secure use of unionfs requires > > > limitting access to the original trees, then I think it's a good reason > > > to implement it in unionfs itself. Just my 2 cents. > > > > You mean somebody like, say, a perfectly innocent process working on the > > NFS server or some other client that is oblivious to the existence of > > unionfs stacks on your particular machine? > > To me, this has always sounded like a showstopper for using unionfs with > > a remote filesystem. > > Again, what about fibre channel support? Imagine I have multiple blades > connected to a SAN. For whatever reason I format the san w/ ext3 (I've > actually done this when we didn't need sharing, just needed a huge disk, > for instance for doing benchmarks where I needed a large data set that > was bigger than the 40GB disk that the blades came with). I better not > touch that disk from any of the other blades. > > All you are saying is unionfs should always make sure its data is sane, > never make assumptions about it being correct. Nope. I just say that unionfs should do some reasonable precautions so that it's not easy to screw it (especially not in a DOS way). If I have a device, then it is usually accessible only to admin and so user cannot usually do anything bad to e.g. ext3. On the other hand part of namespace (that unionfs takes instead of a device) is often accessible to user and so I'd expect it wouldn't be uncommon for a user to be able to screw unionfs. Of course, you can say: In a reasonable setup, unioned trees should not be accessible to ordinary user (e.g. their topmost directory should have 000 permissions). I'm just not sure whether an average admin will setup his union trees in this way... Honza -- Jan Kara <jack@xxxxxxx> SuSE CR Labs - To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html