Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932236AbXAIQqm (ORCPT ); Tue, 9 Jan 2007 11:46:42 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932241AbXAIQqm (ORCPT ); Tue, 9 Jan 2007 11:46:42 -0500 Received: from cs.columbia.edu ([128.59.16.20]:45952 "EHLO cs.columbia.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932236AbXAIQqk (ORCPT ); Tue, 9 Jan 2007 11:46:40 -0500 Subject: Re: [PATCH 01/24] Unionfs: Documentation From: Shaya Potter To: Trond Myklebust Cc: Jan Kara , Josef Sipek , Andrew Morton , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, hch@infradead.org, viro@ftp.linux.org.uk, torvalds@osdl.org, mhalcrow@us.ibm.com, David Quigley , Erez Zadok In-Reply-To: <1168360219.6054.14.camel@lade.trondhjem.org> References: <1168229596580-git-send-email-jsipek@cs.sunysb.edu> <1168229596875-git-send-email-jsipek@cs.sunysb.edu> <20070108111852.ee156a90.akpm@osdl.org> <20070108231524.GA1269@filer.fsl.cs.sunysb.edu> <20070109121552.GA1260@atrey.karlin.mff.cuni.cz> <1168360219.6054.14.camel@lade.trondhjem.org> Content-Type: text/plain Date: Tue, 09 Jan 2007 11:41:33 -0500 Message-Id: <1168360893.5024.38.camel@localhost.localdomain> Mime-Version: 1.0 X-Mailer: Evolution 2.9.4 Content-Transfer-Encoding: 7bit X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, X-Seen-By filter2.cs.columbia.edu Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2679 Lines: 54 On Tue, 2007-01-09 at 11:30 -0500, Trond Myklebust wrote: > On Tue, 2007-01-09 at 13:15 +0100, Jan Kara wrote: > > > On Mon, Jan 08, 2007 at 11:18:52AM -0800, Andrew Morton wrote: > > > > On Sun, 7 Jan 2007 23:12:53 -0500 > > > > "Josef 'Jeff' Sipek" wrote: > > > > > > > > > > > > > Any such change can cause Unionfs to oops, or stay > > > > > silent and even RESULT IN DATA LOSS. > > > > > > > > With a rather rough user interface ;) > > > > > > That statement is meant to scare people away from modifying the lower fs :) > > > I tortured unionfs quite a bit, and it can oops but it takes some effort. > > But isn't it then potential DOS? If you happen to union two filesystems > > and an untrusted user has write access to both original filesystem and > > the union, then you say he'd be able to produce oops? That does not > > sound very secure to me... And if any secure use of unionfs requires > > limitting access to the original trees, then I think it's a good reason > > to implement it in unionfs itself. Just my 2 cents. > > You mean somebody like, say, a perfectly innocent process working on the > NFS server or some other client that is oblivious to the existence of > unionfs stacks on your particular machine? > To me, this has always sounded like a showstopper for using unionfs with > a remote filesystem. Again, what about fibre channel support? Imagine I have multiple blades connected to a SAN. For whatever reason I format the san w/ ext3 (I've actually done this when we didn't need sharing, just needed a huge disk, for instance for doing benchmarks where I needed a large data set that was bigger than the 40GB disk that the blades came with). I better not touch that disk from any of the other blades. All you are saying is unionfs should always make sure its data is sane, never make assumptions about it being correct. Put it this way, imagine I have an ext3 fs on a SAN, I can only use it frm one machine. Lets say I want to be smart and mount the FS read-only from another machine, should I have any expectation that it will work? Nope. Now, under what conditions can one expect unionfs to work? Basically, where the underlying FS isn't being modified (though possible others). Is that a reasonable condition. I believe so. If you disobey the condition, the machine shouldn't oops, but it should detect it and tell you and shut down usage of the FS. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/