Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756309AbcCOUOk (ORCPT ); Tue, 15 Mar 2016 16:14:40 -0400 Received: from ipmail06.adl6.internode.on.net ([150.101.137.145]:43620 "EHLO ipmail06.adl6.internode.on.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751338AbcCOUOg (ORCPT ); Tue, 15 Mar 2016 16:14:36 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A2DpCwATbOhWPFEqLHleDhoBAoMbgUKGZp92AQEBAQEBBowChVaEC4YHBAICgTxNAQEBAQEBBwEBAQFBQEESAYNuAQEEOhwzCAMYCSUPBSUDBxoBEh6ICL5jDB4ZhTmFCoh1BZdPjXePD45/hAxPKC6CQYgiAQEB Date: Wed, 16 Mar 2016 07:14:31 +1100 From: Dave Chinner To: "Theodore Ts'o" , Ric Wheeler , Linus Torvalds , Andy Lutomirski , One Thousand Gnomes , Gregory Farnum , "Martin K. Petersen" , Christoph Hellwig , "Darrick J. Wong" , Jens Axboe , Andrew Morton , Linux API , Linux Kernel Mailing List , shane.seymour@hpe.com, Bruce Fields , linux-fsdevel , Jeff Layton , Eric Sandeen Subject: Re: [PATCH 2/2] block: create ioctl to discard-or-zeroout a range of blocks Message-ID: <20160315201431.GG30721@dastard> References: <20160311135952.57a44931@lxorguk.ukuu.org.uk> <20160311223047.GZ30721@dastard> <20160312003556.GF32214@thunk.org> <20160313233049.GA30721@dastard> <56E69398.7030508@redhat.com> <20160314144603.GO29218@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160314144603.GO29218@thunk.org> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1577 Lines: 34 On Mon, Mar 14, 2016 at 10:46:03AM -0400, Theodore Ts'o wrote: > On Mon, Mar 14, 2016 at 06:34:00AM -0400, Ric Wheeler wrote: > > I think that once we enter this mode, the local file system has effectively > > ceded its role to prevent stale data exposure to the upper layer. In effect, > > this ceases to become a normal file system for any enabled process if we > > control this through fallocate() or for all processes if we do the brute > > force mount option that would be file system wide. > > Or we do this via group id, such that we are ceding responsibility for > proventing stale data exposure to the processes running under that > group id. That process has the responsibility for making sure that it > doesn't return any data from that file unless it has been written, and > also to make sure the permissions of that file are not readable by > processes that aren't in that group. (For example, owned by user > ceph, group ceph, with premissions 640). Root can still change the group id of a file that has exposed stale data and hence make it visible outside of the group based containment wall. i.e. external actors can still unintentionally expose stale data, even though the application might be correctly contained and safe. What we are missing is actual numbers that show that exposing stale data is a /significant/ win for these applications that are demanding it. And then we need evidence proving that the problem is actually systemic and not just a hack around a bad implementation of a feature... Cheers, Dave. -- Dave Chinner david@fromorbit.com