I have a cryptmounted partition on my system. When mounted it has a
couple of weird directory entries
d????????? ? ? ? ? ? appimagelauncherfs
d????????? ? ? ? ? ? gvfs
What are these all about. They sometimes get left behind when the
partition is unmounted and are unerraseable, even by root
Similarly lsattr on that directory also gives "Permission denied" when
it is run by root.
What are these directories and why is the directory entry so screwed up?
On Sat, 01 May 2021 03:26:35 -0400, William Unruh <unruh@invalid.ca> wrote:
I have a cryptmounted partition on my system. When mounted it has a
couple of weird directory entries
d????????? ? ? ? ? ? appimagelauncherfs
d????????? ? ? ? ? ? gvfs
What are these all about. They sometimes get left behind when the
partition is unmounted and are unerraseable, even by root
Similarly lsattr on that directory also gives "Permission denied" when
it is run by root.
What are these directories and why is the directory entry so screwed up?
Those directories used as mountpoints for file systems the root user does not have read access to.
$ grep id=$UID /proc/mounts
tmpfs /run/user/500 tmpfs rw,nosuid,nodev,relatime,size=1640724k,mode=700,uid=500,gid=500,inode64 0 0
gvfsd-fuse /run/user/500/gvfs fuse.gvfsd-fuse rw,nosuid,nodev,relatime,user_id=500,group_id=500 0 0
/dev/fuse /run/user/500/doc fuse rw,nosuid,nodev,relatime,user_id=500,group_id=500 0 0
See "man gvfs" for more info.
Similarly the appimagelauncherfs is used with appimages.
Regards, Dave Hodgins
On 2021-05-01, David W. Hodgins <dwhodgins@nomail.afraid.org> wrote:
Those directories used as mountpoints for file systems the root user does not
have read access to.
What? root is supposed to have access to anything. How can there be filesystems that root does not have read access to it? How can you have directory entries that root does not have access to? A directory is
simply a file in linux.
$ grep id=$UID /proc/mounts
tmpfs /run/user/500 tmpfs rw,nosuid,nodev,relatime,size=1640724k,mode=700,uid=500,gid=500,inode64 0 0
gvfsd-fuse /run/user/500/gvfs fuse.gvfsd-fuse rw,nosuid,nodev,relatime,user_id=500,group_id=500 0 0
/dev/fuse /run/user/500/doc fuse rw,nosuid,nodev,relatime,user_id=500,group_id=500 0 0
See "man gvfs" for more info.
I find that man page particularly impenetrable.
root is supposed to have access to anything.
On 01.05.2021 at 16:38, William Unruh scribbled:
root is supposed to have access to anything.
Write access, yes. Not necessarily read access. So you'd need to
enable read access for root on the parent directory.
On Sat, 01 May 2021 16:20:55 -0400, Aragorn <thorongil@telenet.be> wrote:
On 01.05.2021 at 16:38, William Unruh scribbled:
root is supposed to have access to anything.
Write access, yes. Not necessarily read access. So you'd need to
enable read access for root on the parent directory.
That won't work for mounted fuse file systems such as sshfs or gvfs unless the allow_other option was included when it was mounted. Root can not read or write to those mount points without it, no matter what the local file system permissions are for the directory used as the mount point.
Regards, Dave Hodgins
In my case it was a filesystem mounted using cryptmount--ie an encrypted
file used as a partition. I suppose it would be sensible that an
encrypted partition not be readable by root, but it is a local
filesystem, not some remote thing.
Somehow the system also became totally confused, and I was unable to
mount the encrypted file system, mount claiming the mountpoint was in use (It was not in any way I could see).
I finally rebooted and then things went back to normal. A bit tense in
the meantime as all my students marks, essays, final exams were on that encrypted partition.
On Sat, 01 May 2021 19:23:04 -0400, William Unruh <unruh@invalid.ca> wrote:
In my case it was a filesystem mounted using cryptmount--ie an encrypted
file used as a partition. I suppose it would be sensible that an
encrypted partition not be readable by root, but it is a local
filesystem, not some remote thing.
Somehow the system also became totally confused, and I was unable to
mount the encrypted file system, mount claiming the mountpoint was in use (It was not in any way I could see).
I finally rebooted and then things went back to normal. A bit tense in
the meantime as all my students marks, essays, final exams were on that
encrypted partition.
Make sure you have a backup, preferably an encrypted one, just in case the drive
it's stored on fails.
Regards, Dave Hodgins
The problem with backing up an encrypted partition is that the slightest change means that the whole file has to be backed up again. Ie, no incrimental backups.
On 01.05.2021 at 16:38, William Unruh scribbled:
root is supposed to have access to anything.
Write access, yes. Not necessarily read access. So you'd need to
enable read access for root on the parent directory.
Aragorn wrote on 2/5/21 6:20 am:
On 01.05.2021 at 16:38, William Unruh scribbled:Sorry, Aragorn, but are you suggesting that if root didn't have
=20
root is supposed to have access to anything. =20=20
Write access, yes. Not necessarily read access. So you'd need to
enable read access for root on the parent directory.
=20
access enabled on the parent directory, it could Write a file called,
for example, 'TesteR' to the parent directory even though there was
already a file called 'TesteR' in that parent directory??
On 15.05.2021 at 19:52, Daniel65 scribbled:
Aragorn wrote on 2/5/21 6:20 am:
On 01.05.2021 at 16:38, William Unruh scribbled:Sorry, Aragorn, but are you suggesting that if root didn't have
root is supposed to have access to anything.
Write access, yes. Not necessarily read access. So you'd need to
enable read access for root on the parent directory.
access enabled on the parent directory, it could Write a file called,
for example, 'TesteR' to the parent directory even though there was
already a file called 'TesteR' in that parent directory??
Yes. The root account always as write access on everything, but not necessarily read access — this depends on the permissions.
There is of course a way to limit the root user's write access, i.e. by
using an ACL, but root being root, they can of course modify that ACL
again.
Likewise, a read-only filesystem is read-only even to the root account,
but in the same vein, root does have the power to remount the filesystem
as read/write — at least, provided that the filesystem wasn't
(re-)mounted read-only by the kernel because of filesystem damage.
Aragorn wrote on 15/5/21 8:43 pm:
On 15.05.2021 at 19:52, Daniel65 scribbled:=20
=20
Aragorn wrote on 2/5/21 6:20 am: =20=20
On 01.05.2021 at 16:38, William Unruh scribbled:Sorry, Aragorn, but are you suggesting that if root didn't have
=20
root is supposed to have access to anything. =20
Write access, yes. Not necessarily read access. So you'd need to
enable read access for root on the parent directory.
=20
access enabled on the parent directory, it could Write a file
called, for example, 'TesteR' to the parent directory even though
there was already a file called 'TesteR' in that parent
directory?? =20
Yes. The root account always as write access on everything, but not necessarily read access =E2=80=94 this depends on the permissions. =20
WOW!! What dummie allowed that to apply!! ;-P
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 371 |
Nodes: | 16 (2 / 14) |
Uptime: | 175:44:56 |
Calls: | 7,915 |
Files: | 12,983 |
Messages: | 5,797,774 |