From: Duncan <1i5t5.duncan@cox.net>
To: linux-btrfs@vger.kernel.org
Subject: Re: Subvolume UUID, data corruption?
Date: Sat, 5 Dec 2015 13:19:16 +0000 (UTC) [thread overview]
Message-ID: <pan$7e229$ce87d3b$b8d75c44$337e15c7@cox.net> (raw)
In-Reply-To: 1449286104.18841.14.camel@scientia.net
Christoph Anton Mitterer posted on Sat, 05 Dec 2015 04:28:24 +0100 as
excerpted:
> On Fri, 2015-12-04 at 13:07 +0000, Hugo Mills wrote:
>> I don't think it'll cause problems.
> Is there any guaranteed behaviour when btrfs encounters two filesystems
> (i.e. not talking about the subvols now) with the same UUID?
>
> Given that it's long standing behaviour that people could clone
> filesystems (dd, etc.) and this just worked™, btrfs should at least
> handle such case gracefully.
> For example, when already more than one block device with a btrfs of the
> same UUID are known, then it should refuse to mount any of them.
>
> And if one is already known and another device pops up it should refuse
> to mount that and continue to normally use the already mounted one.
The problem with btrfs is that because (unlike traditional filesystems)
it's multi-device, it needs some way to identify what devices belong to a
particular filesystem.
And UUID is, by definition and expansion, Universally Unique ID. Btrfs
simply depends on it being what it says on the the tin, universally
unique, to ID the components of the filesystem and assemble them
correctly.
Besides dd, etc, LVM snapshots are another case where this goes screwy.
If the UUID isn't UUID, do a btrfs device scan (which udev normally does
by default these days) so the duplicate UUID is detected, and btrfs
*WILL* eventually start trying to write to all the "newly added" devices
that scan found, identified by their Universally Unique IDs, aka UUIDs.
It's not a matter of if, but when.
And the UUID is embedded so deeply within the filesystem and its
operations, as an inextricable part of the metadata (thus avoiding the
problem reiserfs had where a reiserfs stored in a loopback file on a
reiserfs, would screw up reiserfsck, on btrfs, the loopback file would
have a different UUID and thus couldn't be mixed up), that changing the
UUID is not the simple operation of changing a few bytes in the superblock
that it is on other filesystems, which is why there's now a tool to go
thru all those metadata entries and change it.
So an aware btrfs admin simply takes pains to avoid triggering a btrfs
device scan at the wrong time, and to immediately hide their LVM
snapshots, immediately unplug their directly dd-ed devices, etc, and thus
doesn't have to deal with the filesystem corruption that'd be a when not
if, if they didn't take such precautions with their dupped UUIDs that
actually aren't as UUID as the name suggests...
And as your followup suggests in a security context, they consider
masking out their UUIDs before posting them, as well, tho most kernel
hackers generally consider unsupervised physical access to be game-over,
security-wise. (After all, in that case there's often little or nothing
preventing a reboot to that USB stick, if desired, or simply yanking the
devices and duping them or plugging them in elsewhere, if the BIOS is
password protected, with the only thing standing in the way at that point
being possible device encryption.)
The UUID *as* a UUID, _unique_ at least on that system (if not actually
universally) as it says on the tin, is so deeply embedded in btrfs that
at this point it's not going to be removed. The only real alternative if
you don't like it is using a different filesystem.
--
Duncan - List replies preferred. No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master." Richard Stallman
next prev parent reply other threads:[~2015-12-05 13:19 UTC|newest]
Thread overview: 51+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-12-04 12:05 Subvolume UUID, data corruption? S.J
2015-12-04 13:07 ` Hugo Mills
2015-12-05 3:28 ` Christoph Anton Mitterer
2015-12-05 5:52 ` attacking btrfs filesystems via UUID collisions? (was: Subvolume UUID, data corruption?) Christoph Anton Mitterer
2015-12-05 12:01 ` Subvolume UUID, data corruption? Hugo Mills
2015-12-06 1:51 ` attacking btrfs filesystems via UUID collisions? (was: Subvolume UUID, data corruption?) Christoph Anton Mitterer
2015-12-11 12:33 ` Subvolume UUID, data corruption? Austin S. Hemmelgarn
2015-12-05 13:19 ` Duncan [this message]
2015-12-06 1:51 ` attacking btrfs filesystems via UUID collisions? (was: Subvolume UUID, data corruption?) Christoph Anton Mitterer
2015-12-06 4:06 ` Duncan
2015-12-09 5:07 ` Christoph Anton Mitterer
2015-12-09 11:54 ` Duncan
2015-12-06 14:34 ` attacking btrfs filesystems via UUID collisions? Qu Wenruo
2015-12-06 20:55 ` Chris Murphy
2015-12-09 5:39 ` Christoph Anton Mitterer
2015-12-09 21:48 ` S.J.
2015-12-10 12:08 ` Austin S Hemmelgarn
2015-12-10 12:41 ` Hugo Mills
2015-12-10 12:57 ` S.J.
2015-12-10 19:42 ` Chris Murphy
2015-12-11 22:21 ` Christoph Anton Mitterer
2015-12-11 22:32 ` Christoph Anton Mitterer
2015-12-11 23:06 ` Chris Murphy
2015-12-12 1:34 ` S.J.
2015-12-14 0:28 ` Christoph Anton Mitterer
2015-12-14 0:27 ` Christoph Anton Mitterer
2015-12-14 13:23 ` Austin S. Hemmelgarn
2015-12-14 21:26 ` Chris Murphy
2015-12-15 0:35 ` Christoph Anton Mitterer
2015-12-15 13:54 ` Austin S. Hemmelgarn
2015-12-15 14:18 ` Hugo Mills
2015-12-15 14:27 ` Austin S. Hemmelgarn
2015-12-15 14:42 ` Hugo Mills
2015-12-15 16:03 ` Austin S. Hemmelgarn
2015-12-16 12:14 ` Christoph Anton Mitterer
2015-12-16 12:10 ` Christoph Anton Mitterer
2015-12-16 12:03 ` Christoph Anton Mitterer
2015-12-16 14:41 ` Chris Mason
2015-12-16 15:04 ` Christoph Anton Mitterer
2015-12-17 3:25 ` Duncan
2015-12-18 0:56 ` Christoph Anton Mitterer
2015-12-22 2:13 ` Kai Krakow
2015-12-16 12:03 ` Christoph Anton Mitterer
2015-12-17 2:43 ` Duncan
2015-12-15 0:08 ` Christoph Anton Mitterer
2015-12-15 14:19 ` Austin S. Hemmelgarn
2015-12-16 12:56 ` Christoph Anton Mitterer
2015-12-14 20:55 ` Chris Murphy
2015-12-15 0:22 ` Christoph Anton Mitterer
2015-12-11 23:14 ` Eric Sandeen
2015-12-11 22:06 ` Christoph Anton Mitterer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='pan$7e229$ce87d3b$b8d75c44$337e15c7@cox.net' \
--to=1i5t5.duncan@cox.net \
--cc=linux-btrfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.