Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1656282imu; Thu, 13 Dec 2018 20:49:09 -0800 (PST) X-Google-Smtp-Source: AFSGD/UKbo8kr5F7Se4q64p1lySPX2L41Rey2vPrR06KF+D9wcMs6BIMxiTBVkiCbwE6w7kXFnmD X-Received: by 2002:a17:902:108a:: with SMTP id c10mr1560475pla.131.1544762949085; Thu, 13 Dec 2018 20:49:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544762949; cv=none; d=google.com; s=arc-20160816; b=cw/LB1EpYj4A8SwtmXPFJB0zko2EOwTO8WqaIEjWl58PjzNYPgoaHi/vdh8LtcVu3y Eq8qb/iJjRwdtC1k0jkCp48lBAGCocxVCWvbsnzJrE52z9Zj44wcmWk+cfE+U9PrsQ6h 77xA0nFTSwn879Yg1nZ1V8OVJRhuIAdyjQW0+Pf+jdZzVcpQ2d6RM/vPEq95da8uBjra MQ1ls+S1pdEwG4HFkAoC7foWquVRxaqHBuZ0LYHM6v/nv3gTUsBy1JKjebwN9EN21Cpn /cZuth9jchlcdxJtcwiCBnM5AjFaK5LbxpklT9ChSzJ6PRi87zakxF0eya5XvYo7U1h/ A/EA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=tV/GXCzvhCi9GcbFzBdZ+8FJYndqyhZnuoxU0b4m6U8=; b=SQ+zNSOtKt6NX8KjcZwWkoFUv6V6/gg9KhCCBkxiv0rDqasoIOU3/R1GDy9YcBaSG+ kdNn3Qf1LZh7F1j8FxMjVIet1DRjjxf2J6HKX+w5WnDgGFEdgLvD3RfIvsyRZGjGMJtt 299YVVQ6iJLorHEZJwMDo1CsLlnJWJKdHQTPJE2Qv7anQtrsB0kRWuX5ADrUDGzGjzEy fP/Vt+VTVsaLUhg3byLZDQEuhWEO/g1klm8kF7PHM9Y3onG31QKLGMtocv8DJ2T2PAaM 85ViYecLqvNPnY+iPjwGkCxRTl3dlFDBGkEYHMfL/Xa/eSXfKgFli4KfyZpMoYSjDuAh k5og== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sby4oTni; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s17si3099446pgi.513.2018.12.13.20.48.54; Thu, 13 Dec 2018 20:49:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sby4oTni; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727165AbeLNEsG (ORCPT + 99 others); Thu, 13 Dec 2018 23:48:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:52530 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726437AbeLNEsG (ORCPT ); Thu, 13 Dec 2018 23:48:06 -0500 Received: from sol.localdomain (c-24-23-142-8.hsd1.ca.comcast.net [24.23.142.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9A84A2086D; Fri, 14 Dec 2018 04:48:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544762885; bh=7jFPqsZMDioxQsHaoCOHLnWVgs8gnm/HX4rfFtpe38w=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=sby4oTnircrz2RXGrBp+nXdT4/tyq1fZeVNhb6Ph0asbFqEwoXXwRSFejwlonH+Sr WXDm0w9gQ/Ivrynbq5cR6ZIbuPR6D6wNU1Bic+BtsbzdctKw9F4IOG6VyPX0IbXkLC B3OMDlfexTx91erXgYugN4xHtK8016Yb9aBI99xI= Date: Thu, 13 Dec 2018 20:48:03 -0800 From: Eric Biggers To: Christoph Hellwig Cc: linux-fscrypt@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, "Theodore Y . Ts'o" , Jaegeuk Kim , Victor Hsieh , Chandan Rajendra , Linus Torvalds Subject: Re: [PATCH v2 01/12] fs-verity: add a documentation file Message-ID: <20181214044802.GA681@sol.localdomain> References: <20181101225230.88058-1-ebiggers@kernel.org> <20181101225230.88058-2-ebiggers@kernel.org> <20181212091406.GA31723@infradead.org> <20181212202609.GA193967@gmail.com> <20181213202249.GA3797@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181213202249.GA3797@infradead.org> User-Agent: Mutt/1.11.0 (2018-11-25) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Christoph, On Thu, Dec 13, 2018 at 12:22:49PM -0800, Christoph Hellwig wrote: > On Wed, Dec 12, 2018 at 12:26:10PM -0800, Eric Biggers wrote: > > > As this apparently got merged despite no proper reviews from VFS > > > level persons: > > > > fs-verity has been out for review since August, and Cc'ed to all relevant > > mailing lists including linux-fsdevel, linux-ext4, linux-f2fs-devel, > > linux-fscrypt, linux-integrity, and linux-kernel. There are tests, > > documentation (since v2), and a userspace tool. It's also been presented at > > multiple conferences, and has been covered by LWN multiple times. If more > > people want to review it, then they should do so; there's nothing stopping them. > > But you did not got a review from someone like Al, Linus, Andrew or me, > did you? Sure, those specific people (modulo you just now) haven't responded to the fs-verity patches yet. But again, the patches have been out for review for months. Of course, we always prefer more reviews over fewer, and we strongly encourage anyone interested to review fs-verity! (The Documentation/ file may be a good place to start.) But ultimately we cannot force reviews, and as you know kernel reviews can be very hard to come by. Yet, people still need fs-verity anyway; it isn't just some toy. And we're committed to maintaining it, similar to fscrypt. The ext4 and f2fs maintainers are also satisfied with the current approach to storing the verity metadata past EOF; in fact it was even originally Ted's idea, I think. > > > Can you elaborate on the actual problems you think the current solution has, and > > exactly what solution you'd prefer instead? Keep in mind that (1) for large > > files the Merkle tree can be gigabytes long, (2) Linux doesn't have an API for > > file streams, and (3) when fs-verity is combined with fscrypt, it's important > > that the hashes be encrypted, so as to not leak information about the plaintext. > > Given that you alread use an ioctl as the interface what is the problem > of passing this data through the ioctl? Do you mean pass the verity metadata in a buffer? That cannot work in general, because it may be too large to fit into memory. Or do you mean pass it via a second file descriptor? That could work, but it doesn't seem better than the current approach. It would force every filesystem to move the metadata around, whereas currently ext4 and f2fs can simply leave it in place. If you meant this, are there advantages you have in mind that would outweigh this? We also considered generating the Merkle tree in the kernel, in which case FS_IOC_ENABLE_VERITY would just take a small structure similar to the current fsverity_descriptor. But that would add extra complexity to the kernel, and generating a Merkle tree over a large file is the type of parallelizable, CPU intensive work that really should be done in userspace. Also, having userspace provide the Merkle tree allows for it to be pre-generated and distributed with the file, e.g. provided in a package to be installed on many systems. But please do let us know if you have any better ideas. Thanks! - Eric