From: "Darrick J. Wong" <djwong@kernel.org>
To: Amir Goldstein <amir73il@gmail.com>
Cc: Theodore Tso <tytso@mit.edu>, Jan Kara <jack@suse.cz>,
Christian Brauner <brauner@kernel.org>,
Al Viro <viro@zeniv.linux.org.uk>,
linux-fsdevel@vger.kernel.org, Christoph Hellwig <hch@lst.de>,
Matthew Wilcox <willy@infradead.org>
Subject: Re: [PATCH] docs: add guidelines for submitting new filesystems
Date: Wed, 22 Apr 2026 08:50:44 -0700 [thread overview]
Message-ID: <20260422155044.GS7727@frogsfrogsfrogs> (raw)
In-Reply-To: <CAOQ4uxgaKsFqZYemhS_iKzOAK2ZKJ623FUm5ysFiTvK3idnG6Q@mail.gmail.com>
On Wed, Apr 22, 2026 at 04:35:15PM +0200, Amir Goldstein wrote:
> On Wed, Apr 22, 2026 at 4:10 PM Theodore Tso <tytso@mit.edu> wrote:
> >
> > > > > - Handle security issues and regression promptly. Both those reported
> > > > > by ordinary users and those reported by test bots and fuzzing tools.
> > > > > The filesystem must handle corrupted input gracefully without hanging
> > > > > or crashing the kernel.
> > > >
> > > > How about
> > > > "...without corrupting memory, hanging, or crashing the kernel."
> >
> > I will note that security@kernel.org does not consider maliciously
> > fuzzed file systems as a security issue. And a long-standing position
> > by both ext4 and xfs has been that distributions configuring
> > automounters to blindly mount USB sticks dropped in the parking lot by
> > the KGB, MSS, or NSA is a Bad Idea.
> >
> > I'm a bit nervous about stating this as an expectation, especially
> > given denial of service attacks on maintainer time with a large number
> > of random academics which fork syzkaller, and send security reports
> > that mostly duplicate upstream syzkaller reports and don't support the
> > web site allowing developers to test syzkaller exports which don't
> > reproduce locally.
> >
> > It's certainly an ideal, but I'm not sure it's one we can expect or
> > guarantee. It's also certainly not the case on most file systems
> > in-tree today, to a varying degrees, but outside of the most highly
> > maintained file systems, if we were to state this, (a) I'd be
> > concerned that we would be setting expectations that will disappoint
> > Linux users, or worse, class-action lawyers (well, they would be
> > rubbing their hands with glee), and (b) if we actually enforced it,
> > would probably result in 90% of the current in-tree file systems
> > getting removed.
Is that such a bad thing? Reducing the kernel attack surface by that
much would be a blessing, because any missteps in the kernel means it's
game over for the entire running system.
It's also a blessing for anyone trying to do core code changes ala
willy's folio conversion project.
> This is a sentence that I removed and Darrick asked me to
> add it back, because "Not screwing over a running system is
> important, The guidelines ought to make that explicit."
>
> "The filesystem must handle corrupted input gracefully
> without corrupting memory, hanging or crashing the kernel."
>
> Please suggest a variant which you are comfortable with and
> captures the sentiment that Darrick wished to express.
I'm willing to relax on the "not hanging" part since it /is/ difficult
to detect inter-fsblock loops, and the solution that I thought I had
found (attach xfs_bufs to empty xfs transaction, look for obvious
clues in xfs_buf) is apparently no longer viewed favorably by dchinner.
https://lore.kernel.org/linux-xfs/Zw8ulrPaeXw8bUnd@dread.disaster.area/
Implementing a full-on cycle detector in xfs_btree *would* be a fun
project for someone who really wants to dig in to btrees, however.
--D
next prev parent reply other threads:[~2026-04-22 15:50 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-17 14:25 [PATCH] docs: add guidelines for submitting new filesystems Amir Goldstein
2026-04-17 15:36 ` Matthew Wilcox
2026-04-17 16:44 ` Amir Goldstein
2026-04-17 17:20 ` Jaegeuk Kim
2026-04-18 17:24 ` Amir Goldstein
2026-04-18 22:18 ` Jaegeuk Kim
2026-04-19 11:06 ` Amir Goldstein
2026-04-18 21:32 ` Matthew Wilcox
2026-04-19 11:03 ` Amir Goldstein
2026-04-20 8:15 ` Jan Kara
2026-04-20 8:32 ` Jan Kara
2026-04-20 18:14 ` Amir Goldstein
2026-04-20 18:34 ` Darrick J. Wong
2026-04-21 10:16 ` Jan Kara
2026-04-21 11:17 ` Amir Goldstein
2026-04-21 12:08 ` Jan Kara
2026-04-21 18:10 ` Darrick J. Wong
2026-04-21 19:42 ` Amir Goldstein
2026-04-21 20:15 ` Darrick J. Wong
2026-04-21 20:22 ` Amir Goldstein
2026-04-22 14:09 ` Theodore Tso
2026-04-22 14:35 ` Amir Goldstein
2026-04-22 15:50 ` Darrick J. Wong [this message]
2026-04-21 11:27 ` Christian Brauner
2026-04-21 11:45 ` Amir Goldstein
2026-04-22 8:50 ` Askar Safin
2026-04-22 9:02 ` Amir Goldstein
2026-04-22 12:35 ` Christian Brauner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260422155044.GS7727@frogsfrogsfrogs \
--to=djwong@kernel.org \
--cc=amir73il@gmail.com \
--cc=brauner@kernel.org \
--cc=hch@lst.de \
--cc=jack@suse.cz \
--cc=linux-fsdevel@vger.kernel.org \
--cc=tytso@mit.edu \
--cc=viro@zeniv.linux.org.uk \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox