Received: by 2002:a17:90a:8504:0:0:0:0 with SMTP id l4csp421971pjn; Wed, 23 Oct 2019 01:43:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqzVHj5wtq4AsPBOEt5+zvXy/h4yBjuZ0XkxPrHPHnH7Ygb5p7q7iJEJQ7EDakMWy++YCJVh X-Received: by 2002:a17:906:704:: with SMTP id y4mr31456847ejb.259.1571820238772; Wed, 23 Oct 2019 01:43:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571820238; cv=none; d=google.com; s=arc-20160816; b=kGIR6lc3fsvb5ZkTesBeEa/YcE6EjOgx02LU4Ap3fdwgwFU+mtqmUJnBy7FXKIA2fF NOMGzcZyv7/DPs1dHMd+8FZmr8SU3jVIpoNr/COEs+dAlmnLX/X9uF5r0rqBo1cnWj6V 2jpzPGtoLC2s4U42p2ULkPDb/1EARHn4CzXFhkgTEFhj0Wq6ETzfD0mN0HhwbmzvRpiP zbtsMEIiTKg6tX5dR3FpNCX1TQE4vrwzAQnPGb3l2+gR9eWQobcKANb3+yN3aaR2H820 3pnMU1wHzdf1h/jdAsgDYSUVrnck0mkEJWuJ6Vh7xIulFzXd2zd5mWP4b+3eHDNtiynu dwxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Jhrz1wsiD1sBb4yidsTehoAAX30PHFNd/kwqDmQo/7Y=; b=aj4HoxCYPAW8qFdkTDBvu5xGlZQeNCbDW2n5JXxbIULCokY2ggmF0gO6M+Hr/uOroi VBtM6G72onAyz8VshTpgFesRrldukSujC9CA1XNx8W8fPb56DXCob6pZIAS54+vks8+e Kx1y1qYSezhQ8XBMS4fyxdpIDn1dzP8z3htPXaQaX6ovml7gNT54i28YPXUDZE0IWQmQ BNSZXoPq2jYMPVsdsu7mFQWwtLgaSiXCTJV2GPrnmtg3SiZHZi6BHM4db9jrUZ4GkKVb kbQTTk2TW6+RGSDI8PAYlyzKR93B/VqZ26NE71QPPfdc41OrJD02bSuMHFlIbep0zgKy k12g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j34si5304368ede.297.2019.10.23.01.43.34; Wed, 23 Oct 2019 01:43:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390410AbfJWImt (ORCPT + 99 others); Wed, 23 Oct 2019 04:42:49 -0400 Received: from szxga08-in.huawei.com ([45.249.212.255]:43742 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2390272AbfJWImt (ORCPT ); Wed, 23 Oct 2019 04:42:49 -0400 Received: from DGGEMM404-HUB.china.huawei.com (unknown [172.30.72.54]) by Forcepoint Email with ESMTP id 11C1CFFCF3A22F217689; Wed, 23 Oct 2019 16:42:45 +0800 (CST) Received: from dggeme762-chm.china.huawei.com (10.3.19.108) by DGGEMM404-HUB.china.huawei.com (10.3.20.212) with Microsoft SMTP Server (TLS) id 14.3.439.0; Wed, 23 Oct 2019 16:42:44 +0800 Received: from architecture4 (10.140.130.215) by dggeme762-chm.china.huawei.com (10.3.19.108) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Wed, 23 Oct 2019 16:42:44 +0800 Date: Wed, 23 Oct 2019 16:45:36 +0800 From: Gao Xiang To: Chao Yu CC: Chao Yu , , Gao Xiang , Subject: Re: [PATCH v4] erofs: support superblock checksum Message-ID: <20191023084536.GA16289@architecture4> References: <20191022180620.19638-1-pratikshinde320@gmail.com> <20191023040557.230886-1-gaoxiang25@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-Originating-IP: [10.140.130.215] X-ClientProxiedBy: dggeme701-chm.china.huawei.com (10.1.199.97) To dggeme762-chm.china.huawei.com (10.3.19.108) X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Chao, On Wed, Oct 23, 2019 at 04:15:29PM +0800, Chao Yu wrote: > Hi, Xiang, Pratik, > > On 2019/10/23 12:05, Gao Xiang wrote: > > } > > > > +static int erofs_superblock_csum_verify(struct super_block *sb, void *sbdata) > > +{ > > + struct erofs_super_block *dsb; > > + u32 expected_crc, nblocks, crc; > > + void *kaddr; > > + struct page *page; > > + int i; > > + > > + dsb = kmemdup(sbdata + EROFS_SUPER_OFFSET, > > + EROFS_BLKSIZ - EROFS_SUPER_OFFSET, GFP_KERNEL); > > + if (!dsb) > > + return -ENOMEM; > > + > > + expected_crc = le32_to_cpu(dsb->checksum); > > + nblocks = le32_to_cpu(dsb->chksum_blocks); > > Now, we try to use nblocks's value before checking its validation, I guess fuzz > test can easily make the value extreme larger, result in checking latter blocks > unnecessarily. > > IMO, we'd better > 1. check validation of superblock to make sure all fields in sb are valid > 2. use .nblocks to count and check payload blocks following sb That is quite a good point. :-) My first thought is to check the following payloads of sb (e.g, some per-fs metadata should be checked at mount time together. or for small images, check the whole image at the mount time) as well since if we introduce a new feature to some kernel version, forward compatibility needs to be considered. So it's better to make proper scalability, for this case, we have some choices: 1) limit `chksum_blocks' upbound at runtime (e.g. refuse >= 65536 blocks, totally 256M.) 2) just get rid of the whole `chksum_blocks' mess and checksum the first 4k at all, don't consider any latter scalability. Some perferred idea about this? I plan to release erofs-utils v1.0 tomorrow and hold up this feature for the next erofs-utils release, but I think we can get it ready for v5.5 since it is not quite complex feature... Thanks, Gao Xiang