Thinking a bit more I that, I came to the conclusion that it's actually security relevant that btrfs deals gracefully with filesystems having the same UUID:
Getting to know someone else's filesystem's UUID may be more easily possible than one may think. It's usually not considered secret and for example included in debug reports (e.g. several Debian packages do this). The only thing an attacker then needs to do is somehow making another filesystem with the UUID available in his victims system. Simplest way is via a USB stick when he has local access. Thanks to some stupid desktop environments, chances aren't to bad that the system will even auto mount the stick. If btrfs doesn't handle this gracefully the attacker may damage or destroy the original filesystem, or if things get awkwardly corrupted (and data is written to the fake btrfs) even get data out of such a system (despite any screen locks or dm-crypt). Cheers Chris. -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html