Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932654AbbLGTHq (ORCPT ); Mon, 7 Dec 2015 14:07:46 -0500 Received: from mx1.redhat.com ([209.132.183.28]:54311 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932415AbbLGTHo (ORCPT ); Mon, 7 Dec 2015 14:07:44 -0500 Date: Mon, 7 Dec 2015 14:07:43 -0500 From: Mike Snitzer To: Milan Broz Cc: Sami Tolvanen , Mikulas Patocka , Mandeep Baines , Will Drewry , Alasdair Kergon , dm-devel@redhat.com, linux-kernel@vger.kernel.org, Kees Cook , Mark Salyzyn Subject: Re: [PATCH v2 0/2] dm verity: add support for error correction Message-ID: <20151207190743.GA30593@redhat.com> References: <1446688954-29589-1-git-send-email-samitolvanen@google.com> <1449152791-33586-1-git-send-email-samitolvanen@google.com> <20151203195401.GA5444@redhat.com> <20151203230538.GB5444@redhat.com> <20151204100305.GA37949@google.com> <20151204210935.GA63877@redhat.com> <20151207132149.GA7583@google.com> <20151207145814.GB29457@redhat.com> <20151207163108.GA21472@google.com> <5665CAD5.9000704@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5665CAD5.9000704@redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1543 Lines: 36 On Mon, Dec 07 2015 at 1:07pm -0500, Milan Broz wrote: > On 12/07/2015 05:31 PM, Sami Tolvanen wrote: > > On Mon, Dec 07, 2015 at 09:58:14AM -0500, Mike Snitzer wrote: > >> Great. Moving forward it'd be awesome if you could work to get your > >> verity FEC support regression tests into cryptsetup's tests. > > > > Sure. These tests would basically involve generating a valid disk > > image, corrupting it up to the theoretical maximum, and verifying that > > dm-verity can correct it. > > Does the code handle/report even the same type of data corruption > for RS blocks? Or this is just silently ignored until > data area corruption happens? > Sorry, I did not study the code here, I am just curious :) > > (IOW I mean if data are ok but recovery metadata is corrupted.) There is no preemptive accessing/checking of the RS blocks. Once a parity is needed for a given block, due to some corruption, the RS block will be accessed with: fec_decode_bufs -> fec_read_parity() -> fec_decode_rs8() -> decode_rs8() I'm not seeing any verification of the metadata in fec_read_parity() -- so it would seem that corrupt RS blocks would result in -EBADMSG being returned from decode_rs8() (by virtue of incorrect parity being passed to decode_rs8). Sami (or others) am I right? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/