Received: by 10.223.185.116 with SMTP id b49csp1360208wrg; Fri, 16 Feb 2018 18:24:34 -0800 (PST) X-Google-Smtp-Source: AH8x226GVrxH3x8fn9K/mJrpc6zhM7t2sEq/kgXQaNAFy76YeEgD00P+/j+znE5JYEsVTWx3cTWq X-Received: by 10.98.35.195 with SMTP id q64mr6616641pfj.161.1518834274686; Fri, 16 Feb 2018 18:24:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518834274; cv=none; d=google.com; s=arc-20160816; b=OWyJrSZwDZ4M6lvKw2jVuIkEKO5ZWXRxjASpBgaj84M72iPNGN3yh1Nr90OS1u0cFj MrzP+9Q5iFpbhCq2bntCvlQmcvZgP3VIg23CeUo3DV242pTeKjaw09SocQ7ybECZPAf/ F2azAyHyiDLiBNRLn0chVfWLjQKkoQaoYAl6nM8ttDY+C35HMdtmSUIIVH8RDOQVvCKw 5iEBE9ZLVXsZNWLF1EaLzk900f0vrSUnebqZEA18ctLCv7J87VG7lLHUjs1Ef4564Oxr acZqjR37iU8GWrLRBXBtfVMCk0f2mtPazGReaU+8z4A015vOkYrz9s7uM2J6zHJXU3XN vJYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:from:cc:to:subject :content-transfer-encoding:mime-version:references:in-reply-to :user-agent:date:arc-authentication-results; bh=O/pJAqy6xyCoTMrvQAHxRxNnt/uxcLWKxTbOGcDorPE=; b=LjhTT3J6jWupkXIXDPimBGyexu+U+7O2CZuaU1f8TpUsn5WIZ1OHX54p3jIPhZ4Iut sSYpJ2pLr85eYHCLoh7TEFIGmsDlxg3YUgDso2s5t0Ow6EAg8JoJT67mz8uAAPesy73b X7+bcsIY2UBpS38JMxB0DbnmEapGyuX5AHv3K/40AFQWPVHpm79btYHdloGHqKKPEI5q PhjhUgYNVfucvlj23yiqe97YfuAR3HeFJhBx/1kMEPjNyqQJj2eKjF0gMz2u6ZJe9gPx K0/PuSCx8341WPWJDdxnGcXrr+Ext61v7m7Wl1IubOgCkDs2A+57XUpYmwgsdgLo5ioW HOvA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t11-v6si360873plz.214.2018.02.16.18.23.45; Fri, 16 Feb 2018 18:24:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751026AbeBQCVv convert rfc822-to-8bit (ORCPT + 99 others); Fri, 16 Feb 2018 21:21:51 -0500 Received: from terminus.zytor.com ([198.137.202.136]:50253 "EHLO mail.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750942AbeBQCVs (ORCPT ); Fri, 16 Feb 2018 21:21:48 -0500 Received: from [IPv6:2607:fb90:a43e:d441:3521:9041:f7db:7074] ([172.58.33.37]) (authenticated bits=0) by mail.zytor.com (8.15.2/8.15.2) with ESMTPSA id w1H2LVeR000778 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Fri, 16 Feb 2018 18:21:33 -0800 Date: Fri, 16 Feb 2018 16:00:36 -0800 User-Agent: K-9 Mail for Android In-Reply-To: References: <1518813234-5874-1-git-send-email-takondra@cisco.com> <1518813234-5874-2-git-send-email-takondra@cisco.com> <72480de8-e6d6-5125-e647-08815eb9f6a7@landley.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT Subject: Re: [PATCH v3 01/15] Documentation: add newcx initramfs format description To: Victor Kamensky , Rob Landley CC: Taras Kondratiuk , Al Viro , Arnd Bergmann , Mimi Zohar , Jonathan Corbet , James McMechan , initramfs@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, xe-linux-external@cisco.com From: hpa@zytor.com Message-ID: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On February 16, 2018 1:47:35 PM PST, Victor Kamensky wrote: > > >On Fri, 16 Feb 2018, Rob Landley wrote: > >> >> On 02/16/2018 02:59 PM, H. Peter Anvin wrote: >>> On 02/16/18 12:33, Taras Kondratiuk wrote: >>>> Many of the Linux security/integrity features are dependent on file >>>> metadata, stored as extended attributes (xattrs), for making >decisions. >>>> These features need to be initialized during initcall and enabled >as >>>> early as possible for complete security coverage. >>>> >>>> Initramfs (tmpfs) supports xattrs, but newc CPIO archive format >does not >>>> support including them into the archive. >>>> >>>> This patch describes "extended" newc format (newcx) that is based >on >>>> newc and has following changes: >>>> - extended attributes support >>>> - increased size of filesize to support files >4GB >>>> - increased mtime field size to have 64 bits of seconds and added a >>>> field for nanoseconds >>>> - removed unused checksum field >>>> >>> >>> If you are going to implement a new, non-backwards-compatible >format, >>> you shouldn't replicate the mistakes of the current format. >Specifically: >> >> So rather than make minimal changes to the existing format and >continue to >> support the existing format (sharing as much code as possible), you >recommend >> gratuitous aesthetic changes? >> >>> 1. The use of ASCII-encoded fixed-length numbers is an idiotic >legacy >>> from an era before there were any portable way of dealing with >numbers >>> with prespecified endianness. >> >> It lets encoders and decoders easily share code with the existing >cpio format, >> which we still intend to be able to read and write. >> >>> If you are going to use ASCII, make them >>> delimited so that they don't have fixed limits, or just use binary. >> >> When it's gzipped this accomplishes what? (Other than being >gratuitously >> different from the previous iteration?) >> >>> The cpio header isn't fixed size, so that argument goes away, in >fact >>> the only way to determine the end of the header is to scan forward. >>> >>> 2. Alignment sensitivity! Because there is no header length >>> information, the above scan tells you where the header ends, but >there >>> is padding before the data, and the size of that padding is only >defined >>> by alignment. >> >> Again, these are minimal changes to the existing cpio format. You're >complaining >> about _cpio_, and that the new stuff isn't _different_ enough from >it. >> >>> 3. Inband encoding of EOF: if you actually have a filename >"TRAILER!!!" >>> you have problems. >> >> Been there, done that: >> >> http://lkml.iu.edu/hypermail/linux/kernel/1801.3/01791.html >> >>> But first, before you define a whole new format for which no tools >exist >>> (you will have to work with the maintainers of the GNU tools to add >>> support) >> >> No, he's been working with the maintainer of toybox to add support >(for about a >> year now), which gets him the Android command line. And the kernel >has its own >> built-in tool to generate cpio images anyway. >> >> Why would anyone care what the GNU project thinks? > >In our internal use of this patch series we do use gnu cpio >to create initramfs.cpio. > >And reference to gnu cpio patch that supports newcx format is >posted in description for this serieis: > >https://raw.githubusercontent.com/victorkamensky/initramfs-xattrs-poky/rocko/meta/recipes-extended/cpio/cpio-2.12/cpio-xattrs.patch > >Whether GNU cpio maintainers will accept it is different matter. >We will try, but we need to start somewhere and agree on >new format first. > >Thanks, >Victor > >>> you should see how complex it would be to support the POSIX >>> tar/pax format, >> >> That argument was had (at length) when initramfs went in over a >decade ago. >> There are links in >Documentation/filesystems/ramfs-rootfs-initramfs.txt to the >> mailing list entries about it. >> >>> which already has all the features you are seeking, and >>> by now is well-supported. >> >> So... tar wasn't well-supported 15 years ago? (Hasn't the kernel >source always >> been distributed via tarball back since 0.0.1?) >> >> You're suggesting having a whole second codepath that shares no code >with the >> existing cpio extractor. Are you suggesting abandoning support for >the existing >> initramfs.cpio.gz file format? >> >> Rob >> Introducing new, incompatible data formats is an inherently *very* costly operation; unfortunately many engineers don't seem to have a good grip of just *how* expensive it is (see "silly embedded nonsense hacks", "too little, too soon".) Cpio itself is a great horror show of just how bad this gets: a bunch of minor tweaks without finding underlying design bugs resulting in a ton of mutually incompatible formats. "They are almost the same" doesn't help: they are still incompatible. Introducing a new incompatible data format without strong justification is engineering malpractice. Doing it under the non-justification of expedience ("oh, we can share most of the code") is aggravated engineering malpractice. It is entirely possible that the modern posix tar/pax format is too complex to be practical in this case – that would be justifying a new format. But then you are taking the fundamental cost of breakage, and then the new format definitely should not be replicating known defects of another format and without at least some thought about how to avoid it in the future. -- Sent from my Android device with K-9 Mail. Please excuse my brevity.