Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp7446477rwp; Tue, 18 Jul 2023 15:51:12 -0700 (PDT) X-Google-Smtp-Source: APBJJlFpDjpJ/97ldrlXvkoVfWWQLeaKw2Kp42YFgkEjdDswfOQYk+getlYldLGINln+BJjmgcgq X-Received: by 2002:a05:6808:d4b:b0:3a2:43e0:6b10 with SMTP id w11-20020a0568080d4b00b003a243e06b10mr21273197oik.40.1689720671923; Tue, 18 Jul 2023 15:51:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689720671; cv=none; d=google.com; s=arc-20160816; b=mzJGoffQCF/w95fNBHkV8WIfy3JaCsx32ekX76+12z+NSe0sIPSD7DVO7ZzHlxlL9y EqjEmZF6zJyKbrkWqe6Po48Fa5/fRkj4HqdQPVOSWr5yXEfjAZNuub+8uirhJ0eMuuyI YRziGZLqwFmYfzwIoj47u+axnCVHOxkydhAgX9E9Kxo7K1VgVQn71PVpNhzSsCMHP4AE LPSd42gA7SdfpCIPnvPK43dbx1OH/x99vUr4tEESj8CnOG1OXAh0+DsIF4fjiVJG9tZk d88yMZzgvLIzXh0NomJ+x1VApt6/bnqZ2jRY34zRCY4IeUNczGknvsJaRVXdgWC3k63I 6AoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=CN4IVdlkVfFNKX+jb4yzsRbLnWdBPE8Y8EfJwADNbVU=; fh=Pg+y9rv01Dn5L6soiKqM/8nH61E964SvXfXDEk17X/o=; b=TqRqMznLunN7vv4GO9Qs0D77iSBGDyD+fUuBPXyZMfJd92p/ugofUjZjgVmOi5mCcB yxg/IYiX8ZVDtHQgkwqdj3YRWOWLaCrmIW2U8VeHCiqvZNPLomqPgrOdxemD9euXITz4 pvE7aw7XUUHFQuHITD0E+U0+zbMM2oRIHzImYWIYgR+aM5+SJ5Ae1rBEAJ5Cwb+3XYxQ oGlVW4ZCOkYn04xMZUmzc/t5KRRjInsOZeoiWEBLJPpG6YnYJZr51n6g9jO9daG/nh5l 4TG9kPCLzHG6OFSmxkC68Jksykf1gFmNGKZBEGKgLTJVG6EDznEP90RyZMkyc1K29RL8 NRZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WC8frNZQ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s67-20020a637746000000b005634f59a0b5si398525pgc.586.2023.07.18.15.50.48; Tue, 18 Jul 2023 15:51:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WC8frNZQ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229670AbjGRWiS (ORCPT + 99 others); Tue, 18 Jul 2023 18:38:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53580 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229614AbjGRWiS (ORCPT ); Tue, 18 Jul 2023 18:38:18 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1F6BC198E; Tue, 18 Jul 2023 15:38:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A6FE26126C; Tue, 18 Jul 2023 22:38:16 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 73162C433C7; Tue, 18 Jul 2023 22:38:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689719896; bh=RXO+gAcZm+MhRenqy65hhkLUzlwKRVhTNDHhFXVPjjc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=WC8frNZQi3mlQRwzd/1B/o58REsGjVM4bTqKYDGfIE0sdXtSivhP2CyO9GHwyZmUh /fSMjJcqo48S1vnfEmmBEuLJHAJPEWExHLr/fGVg72zBItMXT5mcrGyyeTxbsSA84F 6LENyGcMmgizG0XyhLIpTWGmW5LNVmvAW2H++ihnyl/GFL1ab+KbX6AQgQGzKV14bB C7ttE95UTAd7KsoYwEkaDtSAZr6mZGfIVkXp1QrwAzNbs+XmOJRAl2Qpf1itgUpGdz 7Xh0infj6g0F2qtc/JkRPt1YQH30JhSn8B77F32PIysiR197GoqrB8XClTi6/Qu1MM 4FL5RdcE/3Bqg== Date: Tue, 18 Jul 2023 15:38:13 -0700 From: Eric Biggers To: Ard Biesheuvel Cc: linux-crypto@vger.kernel.org, Herbert Xu , Kees Cook , Haren Myneni , Nick Terrell , Minchan Kim , Sergey Senozhatsky , Jens Axboe , Giovanni Cabiddu , Richard Weinberger , David Ahern , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Steffen Klassert , linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, qat-linux@intel.com, linuxppc-dev@lists.ozlabs.org, linux-mtd@lists.infradead.org, netdev@vger.kernel.org Subject: Re: [RFC PATCH 05/21] ubifs: Pass worst-case buffer size to compression routines Message-ID: <20230718223813.GC1005@sol.localdomain> References: <20230718125847.3869700-1-ardb@kernel.org> <20230718125847.3869700-6-ardb@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230718125847.3869700-6-ardb@kernel.org> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jul 18, 2023 at 02:58:31PM +0200, Ard Biesheuvel wrote: > Currently, the ubifs code allocates a worst case buffer size to > recompress a data node, but does not pass the size of that buffer to the > compression code. This means that the compression code will never use > the additional space, and might fail spuriously due to lack of space. > > So let's multiply out_len by WORST_COMPR_FACTOR after allocating the > buffer. Doing so is guaranteed not to overflow, given that the preceding > kmalloc_array() call would have failed otherwise. > > Signed-off-by: Ard Biesheuvel > --- > fs/ubifs/journal.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/fs/ubifs/journal.c b/fs/ubifs/journal.c > index dc52ac0f4a345f30..4e5961878f336033 100644 > --- a/fs/ubifs/journal.c > +++ b/fs/ubifs/journal.c > @@ -1493,6 +1493,8 @@ static int truncate_data_node(const struct ubifs_info *c, const struct inode *in > if (!buf) > return -ENOMEM; > > + out_len *= WORST_COMPR_FACTOR; > + > dlen = le32_to_cpu(dn->ch.len) - UBIFS_DATA_NODE_SZ; > data_size = dn_size - UBIFS_DATA_NODE_SZ; > compr_type = le16_to_cpu(dn->compr_type); This looks like another case where data that would be expanded by compression should just be stored uncompressed instead. In fact, it seems that UBIFS does that already. ubifs_compress() has this: /* * If the data compressed only slightly, it is better to leave it * uncompressed to improve read speed. */ if (in_len - *out_len < UBIFS_MIN_COMPRESS_DIFF) goto no_compr; So it's unclear why the WORST_COMPR_FACTOR thing is needed at all. - Eric