Message ID | 20230404145319.2057051-21-aalbersh@redhat.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | fs-verity support for XFS | expand |
On Tue, Apr 04, 2023 at 04:53:16PM +0200, Andrey Albershteyn wrote: > Add integration with fs-verity. The XFS store fs-verity metadata in > the extended attributes. The metadata consist of verity descriptor > and Merkle tree blocks. > > The descriptor is stored under "verity_descriptor" extended > attribute. The Merkle tree blocks are stored under binary indexes. > > When fs-verity is enabled on an inode, the XFS_IVERITY_CONSTRUCTION > flag is set meaning that the Merkle tree is being build. The > initialization ends with storing of verity descriptor and setting > inode on-disk flag (XFS_DIFLAG2_VERITY). > > The verification on read is done in iomap. Based on the inode verity > flag the IOMAP_F_READ_VERITY is set in xfs_read_iomap_begin() to let > iomap know that verification is needed. > > Signed-off-by: Andrey Albershteyn <aalbersh@redhat.com> > --- > fs/xfs/Makefile | 1 + > fs/xfs/libxfs/xfs_attr.c | 13 +++ > fs/xfs/xfs_inode.h | 3 +- > fs/xfs/xfs_iomap.c | 3 + > fs/xfs/xfs_ondisk.h | 4 + > fs/xfs/xfs_super.c | 8 ++ > fs/xfs/xfs_verity.c | 214 +++++++++++++++++++++++++++++++++++++++ > fs/xfs/xfs_verity.h | 19 ++++ > 8 files changed, 264 insertions(+), 1 deletion(-) > create mode 100644 fs/xfs/xfs_verity.c > create mode 100644 fs/xfs/xfs_verity.h > > diff --git a/fs/xfs/Makefile b/fs/xfs/Makefile > index 92d88dc3c9f7..76174770d91a 100644 > --- a/fs/xfs/Makefile > +++ b/fs/xfs/Makefile > @@ -130,6 +130,7 @@ xfs-$(CONFIG_XFS_POSIX_ACL) += xfs_acl.o > xfs-$(CONFIG_SYSCTL) += xfs_sysctl.o > xfs-$(CONFIG_COMPAT) += xfs_ioctl32.o > xfs-$(CONFIG_EXPORTFS_BLOCK_OPS) += xfs_pnfs.o > +xfs-$(CONFIG_FS_VERITY) += xfs_verity.o > > # notify failure > ifeq ($(CONFIG_MEMORY_FAILURE),y) > diff --git a/fs/xfs/libxfs/xfs_attr.c b/fs/xfs/libxfs/xfs_attr.c > index 298b74245267..39d9038fbeee 100644 > --- a/fs/xfs/libxfs/xfs_attr.c > +++ b/fs/xfs/libxfs/xfs_attr.c > @@ -26,6 +26,7 @@ > #include "xfs_trace.h" > #include "xfs_attr_item.h" > #include "xfs_xattr.h" > +#include "xfs_verity.h" > > struct kmem_cache *xfs_attr_intent_cache; > > @@ -1635,6 +1636,18 @@ xfs_attr_namecheck( > return xfs_verify_pptr(mp, (struct xfs_parent_name_rec *)name); > } > > + if (flags & XFS_ATTR_VERITY) { > + /* Merkle tree pages are stored under u64 indexes */ > + if (length == sizeof(__be64)) This ondisk structure should be actual structs that we can grep and ctags on, not open-coded __be64 scattered around the xattr code. > + return true; > + > + /* Verity descriptor blocks are held in a named attribute. */ > + if (length == XFS_VERITY_DESCRIPTOR_NAME_LEN) > + return true; > + > + return false; > + } > + > return xfs_str_attr_namecheck(name, length); > } > > diff --git a/fs/xfs/xfs_inode.h b/fs/xfs/xfs_inode.h > index 69d21e42c10a..a95f28cb049f 100644 > --- a/fs/xfs/xfs_inode.h > +++ b/fs/xfs/xfs_inode.h > @@ -324,7 +324,8 @@ static inline bool xfs_inode_has_large_extent_counts(struct xfs_inode *ip) > * inactivation completes, both flags will be cleared and the inode is a > * plain old IRECLAIMABLE inode. > */ > -#define XFS_INACTIVATING (1 << 13) > +#define XFS_INACTIVATING (1 << 13) > +#define XFS_IVERITY_CONSTRUCTION (1 << 14) /* merkle tree construction */ > > /* All inode state flags related to inode reclaim. */ > #define XFS_ALL_IRECLAIM_FLAGS (XFS_IRECLAIMABLE | \ > diff --git a/fs/xfs/xfs_iomap.c b/fs/xfs/xfs_iomap.c > index e0f3c5d709f6..0adde39f02a5 100644 > --- a/fs/xfs/xfs_iomap.c > +++ b/fs/xfs/xfs_iomap.c > @@ -143,6 +143,9 @@ xfs_bmbt_to_iomap( > (ip->i_itemp->ili_fsync_fields & ~XFS_ILOG_TIMESTAMP)) > iomap->flags |= IOMAP_F_DIRTY; > > + if (fsverity_active(VFS_I(ip))) > + iomap->flags |= IOMAP_F_READ_VERITY; > + > iomap->validity_cookie = sequence_cookie; > iomap->folio_ops = &xfs_iomap_folio_ops; > return 0; > diff --git a/fs/xfs/xfs_ondisk.h b/fs/xfs/xfs_ondisk.h > index 9737b5a9f405..7fe88ccda519 100644 > --- a/fs/xfs/xfs_ondisk.h > +++ b/fs/xfs/xfs_ondisk.h > @@ -189,6 +189,10 @@ xfs_check_ondisk_structs(void) > XFS_CHECK_VALUE(XFS_DQ_BIGTIME_EXPIRY_MIN << XFS_DQ_BIGTIME_SHIFT, 4); > XFS_CHECK_VALUE(XFS_DQ_BIGTIME_EXPIRY_MAX << XFS_DQ_BIGTIME_SHIFT, > 16299260424LL); > + > + /* fs-verity descriptor xattr name */ > + XFS_CHECK_VALUE(strlen(XFS_VERITY_DESCRIPTOR_NAME), Are you encoding the trailing null in the xattr name too? The attr name length is stored explicitly, so the null isn't strictly necessary. > + XFS_VERITY_DESCRIPTOR_NAME_LEN); > } > > #endif /* __XFS_ONDISK_H */ > diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c > index d40de32362b1..b6e99ed3b187 100644 > --- a/fs/xfs/xfs_super.c > +++ b/fs/xfs/xfs_super.c > @@ -30,6 +30,7 @@ > #include "xfs_filestream.h" > #include "xfs_quota.h" > #include "xfs_sysfs.h" > +#include "xfs_verity.h" > #include "xfs_ondisk.h" > #include "xfs_rmap_item.h" > #include "xfs_refcount_item.h" > @@ -1489,6 +1490,9 @@ xfs_fs_fill_super( > sb->s_quota_types = QTYPE_MASK_USR | QTYPE_MASK_GRP | QTYPE_MASK_PRJ; > #endif > sb->s_op = &xfs_super_operations; > +#ifdef CONFIG_FS_VERITY > + sb->s_vop = &xfs_verity_ops; > +#endif > > /* > * Delay mount work if the debug hook is set. This is debug > @@ -1685,6 +1689,10 @@ xfs_fs_fill_super( > xfs_warn(mp, > "EXPERIMENTAL Large extent counts feature in use. Use at your own risk!"); > > + if (xfs_has_verity(mp)) > + xfs_alert(mp, > + "EXPERIMENTAL fs-verity feature in use. Use at your own risk!"); > + > error = xfs_mountfs(mp); > if (error) > goto out_filestream_unmount; > diff --git a/fs/xfs/xfs_verity.c b/fs/xfs/xfs_verity.c > new file mode 100644 > index 000000000000..a9874ff4efcd > --- /dev/null > +++ b/fs/xfs/xfs_verity.c > @@ -0,0 +1,214 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright (C) 2022 Red Hat, Inc. > + */ > +#include "xfs.h" > +#include "xfs_shared.h" > +#include "xfs_format.h" > +#include "xfs_da_format.h" > +#include "xfs_da_btree.h" > +#include "xfs_trans_resv.h" > +#include "xfs_mount.h" > +#include "xfs_inode.h" > +#include "xfs_attr.h" > +#include "xfs_verity.h" > +#include "xfs_bmap_util.h" > +#include "xfs_log_format.h" > +#include "xfs_trans.h" > + > +static int > +xfs_get_verity_descriptor( > + struct inode *inode, > + void *buf, This is secretly a pointer to a struct fsverity_descriptor, right? > + size_t buf_size) > +{ > + struct xfs_inode *ip = XFS_I(inode); > + int error = 0; > + struct xfs_da_args args = { > + .dp = ip, > + .attr_filter = XFS_ATTR_VERITY, > + .name = (const uint8_t *)XFS_VERITY_DESCRIPTOR_NAME, > + .namelen = XFS_VERITY_DESCRIPTOR_NAME_LEN, > + .value = buf, > + .valuelen = buf_size, > + }; > + > + /* > + * The fact that (returned attribute size) == (provided buf_size) is > + * checked by xfs_attr_copy_value() (returns -ERANGE) > + */ > + error = xfs_attr_get(&args); > + if (error) > + return error; > + > + return args.valuelen; > +} > + > +static int > +xfs_begin_enable_verity( > + struct file *filp) > +{ > + struct inode *inode = file_inode(filp); > + struct xfs_inode *ip = XFS_I(inode); > + int error = 0; > + > + ASSERT(xfs_isilocked(ip, XFS_IOLOCK_EXCL)); Do we need to take MMAPLOCK_EXCL to lock out page faults too? > + > + if (IS_DAX(inode)) > + return -EINVAL; > + > + if (xfs_iflags_test(ip, XFS_IVERITY_CONSTRUCTION)) > + return -EBUSY; > + xfs_iflags_set(ip, XFS_IVERITY_CONSTRUCTION); xfs_iflags_test_and_set? > + > + return error; > +} > + > +static int > +xfs_end_enable_verity( > + struct file *filp, > + const void *desc, > + size_t desc_size, > + u64 merkle_tree_size) > +{ > + struct inode *inode = file_inode(filp); > + struct xfs_inode *ip = XFS_I(inode); > + struct xfs_mount *mp = ip->i_mount; > + struct xfs_trans *tp; > + struct xfs_da_args args = { > + .dp = ip, > + .whichfork = XFS_ATTR_FORK, > + .attr_filter = XFS_ATTR_VERITY, > + .attr_flags = XATTR_CREATE, > + .name = (const uint8_t *)XFS_VERITY_DESCRIPTOR_NAME, > + .namelen = XFS_VERITY_DESCRIPTOR_NAME_LEN, > + .value = (void *)desc, > + .valuelen = desc_size, > + }; /me wonders if the common da args initialization could be a separate helper, but for three callsites that might not be worth the effort. > + int error = 0; > + > + ASSERT(xfs_isilocked(ip, XFS_IOLOCK_EXCL)); > + > + /* fs-verity failed, just cleanup */ > + if (desc == NULL) > + goto out; > + > + error = xfs_attr_set(&args); > + if (error) > + goto out; > + > + /* Set fsverity inode flag */ > + error = xfs_trans_alloc_inode(ip, &M_RES(mp)->tr_ichange, > + 0, 0, false, &tp); > + if (error) > + goto out; > + > + /* > + * Ensure that we've persisted the verity information before we enable > + * it on the inode and tell the caller we have sealed the inode. > + */ > + ip->i_diflags2 |= XFS_DIFLAG2_VERITY; > + > + xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE); > + xfs_trans_set_sync(tp); > + > + error = xfs_trans_commit(tp); > + xfs_iunlock(ip, XFS_ILOCK_EXCL); > + > + if (!error) > + inode->i_flags |= S_VERITY; > + > +out: > + xfs_iflags_clear(ip, XFS_IVERITY_CONSTRUCTION); If the construction fails, should we erase all the XFS_ATTR_VERITY attributes? > + return error; > +} > + > +static struct page * > +xfs_read_merkle_tree_page( > + struct inode *inode, > + pgoff_t index, > + unsigned long num_ra_pages, > + u8 log_blocksize) > +{ > + struct xfs_inode *ip = XFS_I(inode); > + struct page *page = NULL; > + __be64 name = cpu_to_be64(index << PAGE_SHIFT); > + uint32_t bs = 1 << log_blocksize; > + struct xfs_da_args args = { > + .dp = ip, > + .attr_filter = XFS_ATTR_VERITY, > + .op_flags = XFS_DA_OP_BUFFER, If we're going to pass the xfs_buf out of the attr_get code, why not increment the refcount on the buffer and pass its page to the caller? That would save allocating the value buffer, the xfs_buf, and a page. Do we not trust fsverity not to scribble on the page? (Can we mark the buffer page readonly and pass it out?) Or, is the problem here that we can only pass fsverity a full page, even if the merkle tree blocksize is (say) 1K? Or 64K? (I noticed we're back to passing around pages and not folios.) > + .name = (const uint8_t *)&name, > + .namelen = sizeof(__be64), > + .valuelen = bs, > + }; > + int error = 0; > + > + page = alloc_page(GFP_KERNEL); > + if (!page) > + return ERR_PTR(-ENOMEM); > + > + error = xfs_attr_get(&args); > + if (error) { > + kmem_free(args.value); > + xfs_buf_rele(args.bp); > + put_page(page); > + return ERR_PTR(-EFAULT); > + } > + > + if (args.bp->b_flags & XBF_VERITY_CHECKED) > + SetPageChecked(page); > + > + page->private = (unsigned long)args.bp; > + memcpy(page_address(page), args.value, args.valuelen); > + > + kmem_free(args.value); > + return page; > +} > + > +static int > +xfs_write_merkle_tree_block( > + struct inode *inode, > + const void *buf, > + u64 pos, > + unsigned int size) > +{ > + struct xfs_inode *ip = XFS_I(inode); > + __be64 name = cpu_to_be64(pos); > + struct xfs_da_args args = { > + .dp = ip, > + .whichfork = XFS_ATTR_FORK, > + .attr_filter = XFS_ATTR_VERITY, > + .attr_flags = XATTR_CREATE, > + .name = (const uint8_t *)&name, > + .namelen = sizeof(__be64), > + .value = (void *)buf, > + .valuelen = size, > + }; > + > + return xfs_attr_set(&args); > +} > + > +static void > +xfs_drop_page( > + struct page *page) > +{ > + struct xfs_buf *buf = (struct xfs_buf *)page->private; Indenting nit ^ here > + > + ASSERT(buf != NULL); > + > + if (PageChecked(page)) > + buf->b_flags |= XBF_VERITY_CHECKED; > + > + xfs_buf_rele(buf); > + put_page(page); > +} > + > +const struct fsverity_operations xfs_verity_ops = { > + .begin_enable_verity = &xfs_begin_enable_verity, > + .end_enable_verity = &xfs_end_enable_verity, > + .get_verity_descriptor = &xfs_get_verity_descriptor, > + .read_merkle_tree_page = &xfs_read_merkle_tree_page, > + .write_merkle_tree_block = &xfs_write_merkle_tree_block, > + .drop_page = &xfs_drop_page, Here too ^ (line up the equals operators, please). --D > +}; > diff --git a/fs/xfs/xfs_verity.h b/fs/xfs/xfs_verity.h > new file mode 100644 > index 000000000000..ae5d87ca32a8 > --- /dev/null > +++ b/fs/xfs/xfs_verity.h > @@ -0,0 +1,19 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright (C) 2022 Red Hat, Inc. > + */ > +#ifndef __XFS_VERITY_H__ > +#define __XFS_VERITY_H__ > + > +#include <linux/fsverity.h> > + > +#define XFS_VERITY_DESCRIPTOR_NAME "verity_descriptor" > +#define XFS_VERITY_DESCRIPTOR_NAME_LEN 17 > + > +#ifdef CONFIG_FS_VERITY > +extern const struct fsverity_operations xfs_verity_ops; > +#else > +#define xfs_verity_ops NULL > +#endif /* CONFIG_FS_VERITY */ > + > +#endif /* __XFS_VERITY_H__ */ > -- > 2.38.4 >
Hi Andrey,
kernel test robot noticed the following build errors:
[auto build test ERROR on xfs-linux/for-next]
[also build test ERROR on kdave/for-next tytso-ext4/dev jaegeuk-f2fs/dev-test jaegeuk-f2fs/dev linus/master v6.3-rc5]
[cannot apply to next-20230404]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]
url: https://github.com/intel-lab-lkp/linux/commits/Andrey-Albershteyn/xfs-Add-new-name-to-attri-d/20230404-230224
base: https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git for-next
patch link: https://lore.kernel.org/r/20230404145319.2057051-21-aalbersh%40redhat.com
patch subject: [PATCH v2 20/23] xfs: add fs-verity support
config: sh-allmodconfig (https://download.01.org/0day-ci/archive/20230405/202304050102.zJkNrHah-lkp@intel.com/config)
compiler: sh4-linux-gcc (GCC) 12.1.0
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# https://github.com/intel-lab-lkp/linux/commit/1324353702eaba7da1643d589631adcaedf9a046
git remote add linux-review https://github.com/intel-lab-lkp/linux
git fetch --no-tags linux-review Andrey-Albershteyn/xfs-Add-new-name-to-attri-d/20230404-230224
git checkout 1324353702eaba7da1643d589631adcaedf9a046
# save the config file
mkdir build_dir && cp config build_dir/.config
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 O=build_dir ARCH=sh olddefconfig
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 O=build_dir ARCH=sh SHELL=/bin/bash fs/xfs/
If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@intel.com>
| Link: https://lore.kernel.org/oe-kbuild-all/202304050102.zJkNrHah-lkp@intel.com/
All errors (new ones prefixed by >>):
In file included from <command-line>:
In function 'xfs_check_ondisk_structs',
inlined from 'init_xfs_fs' at fs/xfs/xfs_super.c:2307:2:
>> include/linux/compiler_types.h:397:45: error: call to '__compiletime_assert_1674' declared with attribute error: XFS: value of strlen(XFS_VERITY_DESCRIPTOR_NAME) is wrong, expected XFS_VERITY_DESCRIPTOR_NAME_LEN
397 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
| ^
include/linux/compiler_types.h:378:25: note: in definition of macro '__compiletime_assert'
378 | prefix ## suffix(); \
| ^~~~~~
include/linux/compiler_types.h:397:9: note: in expansion of macro '_compiletime_assert'
397 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
| ^~~~~~~~~~~~~~~~~~~
include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
39 | #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
| ^~~~~~~~~~~~~~~~~~
fs/xfs/xfs_ondisk.h:19:9: note: in expansion of macro 'BUILD_BUG_ON_MSG'
19 | BUILD_BUG_ON_MSG((value) != (expected), \
| ^~~~~~~~~~~~~~~~
fs/xfs/xfs_ondisk.h:194:9: note: in expansion of macro 'XFS_CHECK_VALUE'
194 | XFS_CHECK_VALUE(strlen(XFS_VERITY_DESCRIPTOR_NAME),
| ^~~~~~~~~~~~~~~
vim +/__compiletime_assert_1674 +397 include/linux/compiler_types.h
eb5c2d4b45e3d2 Will Deacon 2020-07-21 383
eb5c2d4b45e3d2 Will Deacon 2020-07-21 384 #define _compiletime_assert(condition, msg, prefix, suffix) \
eb5c2d4b45e3d2 Will Deacon 2020-07-21 385 __compiletime_assert(condition, msg, prefix, suffix)
eb5c2d4b45e3d2 Will Deacon 2020-07-21 386
eb5c2d4b45e3d2 Will Deacon 2020-07-21 387 /**
eb5c2d4b45e3d2 Will Deacon 2020-07-21 388 * compiletime_assert - break build and emit msg if condition is false
eb5c2d4b45e3d2 Will Deacon 2020-07-21 389 * @condition: a compile-time constant condition to check
eb5c2d4b45e3d2 Will Deacon 2020-07-21 390 * @msg: a message to emit if condition is false
eb5c2d4b45e3d2 Will Deacon 2020-07-21 391 *
eb5c2d4b45e3d2 Will Deacon 2020-07-21 392 * In tradition of POSIX assert, this macro will break the build if the
eb5c2d4b45e3d2 Will Deacon 2020-07-21 393 * supplied condition is *false*, emitting the supplied error message if the
eb5c2d4b45e3d2 Will Deacon 2020-07-21 394 * compiler has support to do so.
eb5c2d4b45e3d2 Will Deacon 2020-07-21 395 */
eb5c2d4b45e3d2 Will Deacon 2020-07-21 396 #define compiletime_assert(condition, msg) \
eb5c2d4b45e3d2 Will Deacon 2020-07-21 @397 _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
eb5c2d4b45e3d2 Will Deacon 2020-07-21 398
Hi Andrey, kernel test robot noticed the following build errors: [auto build test ERROR on xfs-linux/for-next] [also build test ERROR on kdave/for-next jaegeuk-f2fs/dev-test jaegeuk-f2fs/dev linus/master v6.3-rc5] [cannot apply to next-20230404] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Andrey-Albershteyn/xfs-Add-new-name-to-attri-d/20230404-230224 base: https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git for-next patch link: https://lore.kernel.org/r/20230404145319.2057051-21-aalbersh%40redhat.com patch subject: [PATCH v2 20/23] xfs: add fs-verity support config: i386-randconfig-r036-20230403 (https://download.01.org/0day-ci/archive/20230405/202304050317.r2pJY8DK-lkp@intel.com/config) compiler: clang version 14.0.6 (https://github.com/llvm/llvm-project f28c006a5895fc0e329fe15fead81e37457cb1d1) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://github.com/intel-lab-lkp/linux/commit/1324353702eaba7da1643d589631adcaedf9a046 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Andrey-Albershteyn/xfs-Add-new-name-to-attri-d/20230404-230224 git checkout 1324353702eaba7da1643d589631adcaedf9a046 # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=i386 olddefconfig COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=i386 SHELL=/bin/bash fs/ If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot <lkp@intel.com> | Link: https://lore.kernel.org/oe-kbuild-all/202304050317.r2pJY8DK-lkp@intel.com/ All errors (new ones prefixed by >>): In file included from fs/xfs/xfs_super.c:34: >> fs/xfs/xfs_ondisk.h:194:2: error: call to __compiletime_assert_3998 declared with 'error' attribute: XFS: value of strlen(XFS_VERITY_DESCRIPTOR_NAME) is wrong, expected XFS_VERITY_DESCRIPTOR_NAME_LEN XFS_CHECK_VALUE(strlen(XFS_VERITY_DESCRIPTOR_NAME), ^ fs/xfs/xfs_ondisk.h:19:2: note: expanded from macro 'XFS_CHECK_VALUE' BUILD_BUG_ON_MSG((value) != (expected), \ ^ include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG' #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg) ^ include/linux/compiler_types.h:397:2: note: expanded from macro 'compiletime_assert' _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__) ^ include/linux/compiler_types.h:385:2: note: expanded from macro '_compiletime_assert' __compiletime_assert(condition, msg, prefix, suffix) ^ include/linux/compiler_types.h:378:4: note: expanded from macro '__compiletime_assert' prefix ## suffix(); \ ^ <scratch space>:77:1: note: expanded from here __compiletime_assert_3998 ^ 1 error generated. vim +/error +194 fs/xfs/xfs_ondisk.h 8 9 #define XFS_CHECK_STRUCT_SIZE(structname, size) \ 10 BUILD_BUG_ON_MSG(sizeof(structname) != (size), "XFS: sizeof(" \ 11 #structname ") is wrong, expected " #size) 12 13 #define XFS_CHECK_OFFSET(structname, member, off) \ 14 BUILD_BUG_ON_MSG(offsetof(structname, member) != (off), \ 15 "XFS: offsetof(" #structname ", " #member ") is wrong, " \ 16 "expected " #off) 17 18 #define XFS_CHECK_VALUE(value, expected) \ 19 BUILD_BUG_ON_MSG((value) != (expected), \ 20 "XFS: value of " #value " is wrong, expected " #expected) 21 22 static inline void __init 23 xfs_check_ondisk_structs(void) 24 { 25 /* ag/file structures */ 26 XFS_CHECK_STRUCT_SIZE(struct xfs_acl, 4); 27 XFS_CHECK_STRUCT_SIZE(struct xfs_acl_entry, 12); 28 XFS_CHECK_STRUCT_SIZE(struct xfs_agf, 224); 29 XFS_CHECK_STRUCT_SIZE(struct xfs_agfl, 36); 30 XFS_CHECK_STRUCT_SIZE(struct xfs_agi, 344); 31 XFS_CHECK_STRUCT_SIZE(struct xfs_bmbt_key, 8); 32 XFS_CHECK_STRUCT_SIZE(struct xfs_bmbt_rec, 16); 33 XFS_CHECK_STRUCT_SIZE(struct xfs_bmdr_block, 4); 34 XFS_CHECK_STRUCT_SIZE(struct xfs_btree_block_shdr, 48); 35 XFS_CHECK_STRUCT_SIZE(struct xfs_btree_block_lhdr, 64); 36 XFS_CHECK_STRUCT_SIZE(struct xfs_btree_block, 72); 37 XFS_CHECK_STRUCT_SIZE(struct xfs_dinode, 176); 38 XFS_CHECK_STRUCT_SIZE(struct xfs_disk_dquot, 104); 39 XFS_CHECK_STRUCT_SIZE(struct xfs_dqblk, 136); 40 XFS_CHECK_STRUCT_SIZE(struct xfs_dsb, 264); 41 XFS_CHECK_STRUCT_SIZE(struct xfs_dsymlink_hdr, 56); 42 XFS_CHECK_STRUCT_SIZE(struct xfs_inobt_key, 4); 43 XFS_CHECK_STRUCT_SIZE(struct xfs_inobt_rec, 16); 44 XFS_CHECK_STRUCT_SIZE(struct xfs_refcount_key, 4); 45 XFS_CHECK_STRUCT_SIZE(struct xfs_refcount_rec, 12); 46 XFS_CHECK_STRUCT_SIZE(struct xfs_rmap_key, 20); 47 XFS_CHECK_STRUCT_SIZE(struct xfs_rmap_rec, 24); 48 XFS_CHECK_STRUCT_SIZE(xfs_timestamp_t, 8); 49 XFS_CHECK_STRUCT_SIZE(struct xfs_legacy_timestamp, 8); 50 XFS_CHECK_STRUCT_SIZE(xfs_alloc_key_t, 8); 51 XFS_CHECK_STRUCT_SIZE(xfs_alloc_ptr_t, 4); 52 XFS_CHECK_STRUCT_SIZE(xfs_alloc_rec_t, 8); 53 XFS_CHECK_STRUCT_SIZE(xfs_inobt_ptr_t, 4); 54 XFS_CHECK_STRUCT_SIZE(xfs_refcount_ptr_t, 4); 55 XFS_CHECK_STRUCT_SIZE(xfs_rmap_ptr_t, 4); 56 57 /* dir/attr trees */ 58 XFS_CHECK_STRUCT_SIZE(struct xfs_attr3_leaf_hdr, 80); 59 XFS_CHECK_STRUCT_SIZE(struct xfs_attr3_leafblock, 88); 60 XFS_CHECK_STRUCT_SIZE(struct xfs_attr3_rmt_hdr, 56); 61 XFS_CHECK_STRUCT_SIZE(struct xfs_da3_blkinfo, 56); 62 XFS_CHECK_STRUCT_SIZE(struct xfs_da3_intnode, 64); 63 XFS_CHECK_STRUCT_SIZE(struct xfs_da3_node_hdr, 64); 64 XFS_CHECK_STRUCT_SIZE(struct xfs_dir3_blk_hdr, 48); 65 XFS_CHECK_STRUCT_SIZE(struct xfs_dir3_data_hdr, 64); 66 XFS_CHECK_STRUCT_SIZE(struct xfs_dir3_free, 64); 67 XFS_CHECK_STRUCT_SIZE(struct xfs_dir3_free_hdr, 64); 68 XFS_CHECK_STRUCT_SIZE(struct xfs_dir3_leaf, 64); 69 XFS_CHECK_STRUCT_SIZE(struct xfs_dir3_leaf_hdr, 64); 70 XFS_CHECK_STRUCT_SIZE(xfs_attr_leaf_entry_t, 8); 71 XFS_CHECK_STRUCT_SIZE(xfs_attr_leaf_hdr_t, 32); 72 XFS_CHECK_STRUCT_SIZE(xfs_attr_leaf_map_t, 4); 73 XFS_CHECK_STRUCT_SIZE(xfs_attr_leaf_name_local_t, 4); 74 75 /* 76 * m68k has problems with xfs_attr_leaf_name_remote_t, but we pad it to 77 * 4 bytes anyway so it's not obviously a problem. Hence for the moment 78 * we don't check this structure. This can be re-instated when the attr 79 * definitions are updated to use c99 VLA definitions. 80 * 81 XFS_CHECK_STRUCT_SIZE(xfs_attr_leaf_name_remote_t, 12); 82 */ 83 84 XFS_CHECK_OFFSET(xfs_attr_leaf_name_local_t, valuelen, 0); 85 XFS_CHECK_OFFSET(xfs_attr_leaf_name_local_t, namelen, 2); 86 XFS_CHECK_OFFSET(xfs_attr_leaf_name_local_t, nameval, 3); 87 XFS_CHECK_OFFSET(xfs_attr_leaf_name_remote_t, valueblk, 0); 88 XFS_CHECK_OFFSET(xfs_attr_leaf_name_remote_t, valuelen, 4); 89 XFS_CHECK_OFFSET(xfs_attr_leaf_name_remote_t, namelen, 8); 90 XFS_CHECK_OFFSET(xfs_attr_leaf_name_remote_t, name, 9); 91 XFS_CHECK_STRUCT_SIZE(xfs_attr_leafblock_t, 40); 92 XFS_CHECK_OFFSET(struct xfs_attr_shortform, hdr.totsize, 0); 93 XFS_CHECK_OFFSET(struct xfs_attr_shortform, hdr.count, 2); 94 XFS_CHECK_OFFSET(struct xfs_attr_shortform, list[0].namelen, 4); 95 XFS_CHECK_OFFSET(struct xfs_attr_shortform, list[0].valuelen, 5); 96 XFS_CHECK_OFFSET(struct xfs_attr_shortform, list[0].flags, 6); 97 XFS_CHECK_OFFSET(struct xfs_attr_shortform, list[0].nameval, 7); 98 XFS_CHECK_STRUCT_SIZE(xfs_da_blkinfo_t, 12); 99 XFS_CHECK_STRUCT_SIZE(xfs_da_intnode_t, 16); 100 XFS_CHECK_STRUCT_SIZE(xfs_da_node_entry_t, 8); 101 XFS_CHECK_STRUCT_SIZE(xfs_da_node_hdr_t, 16); 102 XFS_CHECK_STRUCT_SIZE(xfs_dir2_data_free_t, 4); 103 XFS_CHECK_STRUCT_SIZE(xfs_dir2_data_hdr_t, 16); 104 XFS_CHECK_OFFSET(xfs_dir2_data_unused_t, freetag, 0); 105 XFS_CHECK_OFFSET(xfs_dir2_data_unused_t, length, 2); 106 XFS_CHECK_STRUCT_SIZE(xfs_dir2_free_hdr_t, 16); 107 XFS_CHECK_STRUCT_SIZE(xfs_dir2_free_t, 16); 108 XFS_CHECK_STRUCT_SIZE(xfs_dir2_leaf_entry_t, 8); 109 XFS_CHECK_STRUCT_SIZE(xfs_dir2_leaf_hdr_t, 16); 110 XFS_CHECK_STRUCT_SIZE(xfs_dir2_leaf_t, 16); 111 XFS_CHECK_STRUCT_SIZE(xfs_dir2_leaf_tail_t, 4); 112 XFS_CHECK_STRUCT_SIZE(xfs_dir2_sf_entry_t, 3); 113 XFS_CHECK_OFFSET(xfs_dir2_sf_entry_t, namelen, 0); 114 XFS_CHECK_OFFSET(xfs_dir2_sf_entry_t, offset, 1); 115 XFS_CHECK_OFFSET(xfs_dir2_sf_entry_t, name, 3); 116 XFS_CHECK_STRUCT_SIZE(xfs_dir2_sf_hdr_t, 10); 117 118 /* log structures */ 119 XFS_CHECK_STRUCT_SIZE(struct xfs_buf_log_format, 88); 120 XFS_CHECK_STRUCT_SIZE(struct xfs_dq_logformat, 24); 121 XFS_CHECK_STRUCT_SIZE(struct xfs_efd_log_format_32, 16); 122 XFS_CHECK_STRUCT_SIZE(struct xfs_efd_log_format_64, 16); 123 XFS_CHECK_STRUCT_SIZE(struct xfs_efi_log_format_32, 16); 124 XFS_CHECK_STRUCT_SIZE(struct xfs_efi_log_format_64, 16); 125 XFS_CHECK_STRUCT_SIZE(struct xfs_extent_32, 12); 126 XFS_CHECK_STRUCT_SIZE(struct xfs_extent_64, 16); 127 XFS_CHECK_STRUCT_SIZE(struct xfs_log_dinode, 176); 128 XFS_CHECK_STRUCT_SIZE(struct xfs_icreate_log, 28); 129 XFS_CHECK_STRUCT_SIZE(xfs_log_timestamp_t, 8); 130 XFS_CHECK_STRUCT_SIZE(struct xfs_log_legacy_timestamp, 8); 131 XFS_CHECK_STRUCT_SIZE(struct xfs_inode_log_format_32, 52); 132 XFS_CHECK_STRUCT_SIZE(struct xfs_inode_log_format, 56); 133 XFS_CHECK_STRUCT_SIZE(struct xfs_qoff_logformat, 20); 134 XFS_CHECK_STRUCT_SIZE(struct xfs_trans_header, 16); 135 XFS_CHECK_STRUCT_SIZE(struct xfs_attri_log_format, 40); 136 XFS_CHECK_STRUCT_SIZE(struct xfs_attrd_log_format, 16); 137 XFS_CHECK_STRUCT_SIZE(struct xfs_bui_log_format, 16); 138 XFS_CHECK_STRUCT_SIZE(struct xfs_bud_log_format, 16); 139 XFS_CHECK_STRUCT_SIZE(struct xfs_cui_log_format, 16); 140 XFS_CHECK_STRUCT_SIZE(struct xfs_cud_log_format, 16); 141 XFS_CHECK_STRUCT_SIZE(struct xfs_rui_log_format, 16); 142 XFS_CHECK_STRUCT_SIZE(struct xfs_rud_log_format, 16); 143 XFS_CHECK_STRUCT_SIZE(struct xfs_map_extent, 32); 144 XFS_CHECK_STRUCT_SIZE(struct xfs_phys_extent, 16); 145 146 XFS_CHECK_OFFSET(struct xfs_bui_log_format, bui_extents, 16); 147 XFS_CHECK_OFFSET(struct xfs_cui_log_format, cui_extents, 16); 148 XFS_CHECK_OFFSET(struct xfs_rui_log_format, rui_extents, 16); 149 XFS_CHECK_OFFSET(struct xfs_efi_log_format, efi_extents, 16); 150 XFS_CHECK_OFFSET(struct xfs_efi_log_format_32, efi_extents, 16); 151 XFS_CHECK_OFFSET(struct xfs_efi_log_format_64, efi_extents, 16); 152 153 /* 154 * The v5 superblock format extended several v4 header structures with 155 * additional data. While new fields are only accessible on v5 156 * superblocks, it's important that the v5 structures place original v4 157 * fields/headers in the correct location on-disk. For example, we must 158 * be able to find magic values at the same location in certain blocks 159 * regardless of superblock version. 160 * 161 * The following checks ensure that various v5 data structures place the 162 * subset of v4 metadata associated with the same type of block at the 163 * start of the on-disk block. If there is no data structure definition 164 * for certain types of v4 blocks, traverse down to the first field of 165 * common metadata (e.g., magic value) and make sure it is at offset 166 * zero. 167 */ 168 XFS_CHECK_OFFSET(struct xfs_dir3_leaf, hdr.info.hdr, 0); 169 XFS_CHECK_OFFSET(struct xfs_da3_intnode, hdr.info.hdr, 0); 170 XFS_CHECK_OFFSET(struct xfs_dir3_data_hdr, hdr.magic, 0); 171 XFS_CHECK_OFFSET(struct xfs_dir3_free, hdr.hdr.magic, 0); 172 XFS_CHECK_OFFSET(struct xfs_attr3_leafblock, hdr.info.hdr, 0); 173 174 XFS_CHECK_STRUCT_SIZE(struct xfs_bulkstat, 192); 175 XFS_CHECK_STRUCT_SIZE(struct xfs_inumbers, 24); 176 XFS_CHECK_STRUCT_SIZE(struct xfs_bulkstat_req, 64); 177 XFS_CHECK_STRUCT_SIZE(struct xfs_inumbers_req, 64); 178 179 /* 180 * Make sure the incore inode timestamp range corresponds to hand 181 * converted values based on the ondisk format specification. 182 */ 183 XFS_CHECK_VALUE(XFS_BIGTIME_TIME_MIN - XFS_BIGTIME_EPOCH_OFFSET, 184 XFS_LEGACY_TIME_MIN); 185 XFS_CHECK_VALUE(XFS_BIGTIME_TIME_MAX - XFS_BIGTIME_EPOCH_OFFSET, 186 16299260424LL); 187 188 /* Do the same with the incore quota expiration range. */ 189 XFS_CHECK_VALUE(XFS_DQ_BIGTIME_EXPIRY_MIN << XFS_DQ_BIGTIME_SHIFT, 4); 190 XFS_CHECK_VALUE(XFS_DQ_BIGTIME_EXPIRY_MAX << XFS_DQ_BIGTIME_SHIFT, 191 16299260424LL); 192 193 /* fs-verity descriptor xattr name */ > 194 XFS_CHECK_VALUE(strlen(XFS_VERITY_DESCRIPTOR_NAME), 195 XFS_VERITY_DESCRIPTOR_NAME_LEN); 196 } 197
On 4/4/23 11:27 AM, Darrick J. Wong wrote: > diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c > index d40de32362b1..b6e99ed3b187 100644 > --- a/fs/xfs/xfs_super.c > +++ b/fs/xfs/xfs_super.c > @@ -30,6 +30,7 @@ > #include "xfs_filestream.h" > #include "xfs_quota.h" > #include "xfs_sysfs.h" > +#include "xfs_verity.h" > #include "xfs_ondisk.h" > #include "xfs_rmap_item.h" > #include "xfs_refcount_item.h" > @@ -1489,6 +1490,9 @@ xfs_fs_fill_super( > sb->s_quota_types = QTYPE_MASK_USR | QTYPE_MASK_GRP | QTYPE_MASK_PRJ; > #endif > sb->s_op = &xfs_super_operations; > +#ifdef CONFIG_FS_VERITY > + sb->s_vop = &xfs_verity_ops; > +#endif > Hi Andrey - it might be nicer to just do: fsverity_set_ops(sb, &xfs_verity_ops); here and use the (existing) helper to avoid the #ifdef. (the #ifdef is handled by the helper) (ext4 & btrfs could use this too ...) Thanks! -Eric
diff --git a/fs/xfs/Makefile b/fs/xfs/Makefile index 92d88dc3c9f7..76174770d91a 100644 --- a/fs/xfs/Makefile +++ b/fs/xfs/Makefile @@ -130,6 +130,7 @@ xfs-$(CONFIG_XFS_POSIX_ACL) += xfs_acl.o xfs-$(CONFIG_SYSCTL) += xfs_sysctl.o xfs-$(CONFIG_COMPAT) += xfs_ioctl32.o xfs-$(CONFIG_EXPORTFS_BLOCK_OPS) += xfs_pnfs.o +xfs-$(CONFIG_FS_VERITY) += xfs_verity.o # notify failure ifeq ($(CONFIG_MEMORY_FAILURE),y) diff --git a/fs/xfs/libxfs/xfs_attr.c b/fs/xfs/libxfs/xfs_attr.c index 298b74245267..39d9038fbeee 100644 --- a/fs/xfs/libxfs/xfs_attr.c +++ b/fs/xfs/libxfs/xfs_attr.c @@ -26,6 +26,7 @@ #include "xfs_trace.h" #include "xfs_attr_item.h" #include "xfs_xattr.h" +#include "xfs_verity.h" struct kmem_cache *xfs_attr_intent_cache; @@ -1635,6 +1636,18 @@ xfs_attr_namecheck( return xfs_verify_pptr(mp, (struct xfs_parent_name_rec *)name); } + if (flags & XFS_ATTR_VERITY) { + /* Merkle tree pages are stored under u64 indexes */ + if (length == sizeof(__be64)) + return true; + + /* Verity descriptor blocks are held in a named attribute. */ + if (length == XFS_VERITY_DESCRIPTOR_NAME_LEN) + return true; + + return false; + } + return xfs_str_attr_namecheck(name, length); } diff --git a/fs/xfs/xfs_inode.h b/fs/xfs/xfs_inode.h index 69d21e42c10a..a95f28cb049f 100644 --- a/fs/xfs/xfs_inode.h +++ b/fs/xfs/xfs_inode.h @@ -324,7 +324,8 @@ static inline bool xfs_inode_has_large_extent_counts(struct xfs_inode *ip) * inactivation completes, both flags will be cleared and the inode is a * plain old IRECLAIMABLE inode. */ -#define XFS_INACTIVATING (1 << 13) +#define XFS_INACTIVATING (1 << 13) +#define XFS_IVERITY_CONSTRUCTION (1 << 14) /* merkle tree construction */ /* All inode state flags related to inode reclaim. */ #define XFS_ALL_IRECLAIM_FLAGS (XFS_IRECLAIMABLE | \ diff --git a/fs/xfs/xfs_iomap.c b/fs/xfs/xfs_iomap.c index e0f3c5d709f6..0adde39f02a5 100644 --- a/fs/xfs/xfs_iomap.c +++ b/fs/xfs/xfs_iomap.c @@ -143,6 +143,9 @@ xfs_bmbt_to_iomap( (ip->i_itemp->ili_fsync_fields & ~XFS_ILOG_TIMESTAMP)) iomap->flags |= IOMAP_F_DIRTY; + if (fsverity_active(VFS_I(ip))) + iomap->flags |= IOMAP_F_READ_VERITY; + iomap->validity_cookie = sequence_cookie; iomap->folio_ops = &xfs_iomap_folio_ops; return 0; diff --git a/fs/xfs/xfs_ondisk.h b/fs/xfs/xfs_ondisk.h index 9737b5a9f405..7fe88ccda519 100644 --- a/fs/xfs/xfs_ondisk.h +++ b/fs/xfs/xfs_ondisk.h @@ -189,6 +189,10 @@ xfs_check_ondisk_structs(void) XFS_CHECK_VALUE(XFS_DQ_BIGTIME_EXPIRY_MIN << XFS_DQ_BIGTIME_SHIFT, 4); XFS_CHECK_VALUE(XFS_DQ_BIGTIME_EXPIRY_MAX << XFS_DQ_BIGTIME_SHIFT, 16299260424LL); + + /* fs-verity descriptor xattr name */ + XFS_CHECK_VALUE(strlen(XFS_VERITY_DESCRIPTOR_NAME), + XFS_VERITY_DESCRIPTOR_NAME_LEN); } #endif /* __XFS_ONDISK_H */ diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c index d40de32362b1..b6e99ed3b187 100644 --- a/fs/xfs/xfs_super.c +++ b/fs/xfs/xfs_super.c @@ -30,6 +30,7 @@ #include "xfs_filestream.h" #include "xfs_quota.h" #include "xfs_sysfs.h" +#include "xfs_verity.h" #include "xfs_ondisk.h" #include "xfs_rmap_item.h" #include "xfs_refcount_item.h" @@ -1489,6 +1490,9 @@ xfs_fs_fill_super( sb->s_quota_types = QTYPE_MASK_USR | QTYPE_MASK_GRP | QTYPE_MASK_PRJ; #endif sb->s_op = &xfs_super_operations; +#ifdef CONFIG_FS_VERITY + sb->s_vop = &xfs_verity_ops; +#endif /* * Delay mount work if the debug hook is set. This is debug @@ -1685,6 +1689,10 @@ xfs_fs_fill_super( xfs_warn(mp, "EXPERIMENTAL Large extent counts feature in use. Use at your own risk!"); + if (xfs_has_verity(mp)) + xfs_alert(mp, + "EXPERIMENTAL fs-verity feature in use. Use at your own risk!"); + error = xfs_mountfs(mp); if (error) goto out_filestream_unmount; diff --git a/fs/xfs/xfs_verity.c b/fs/xfs/xfs_verity.c new file mode 100644 index 000000000000..a9874ff4efcd --- /dev/null +++ b/fs/xfs/xfs_verity.c @@ -0,0 +1,214 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (C) 2022 Red Hat, Inc. + */ +#include "xfs.h" +#include "xfs_shared.h" +#include "xfs_format.h" +#include "xfs_da_format.h" +#include "xfs_da_btree.h" +#include "xfs_trans_resv.h" +#include "xfs_mount.h" +#include "xfs_inode.h" +#include "xfs_attr.h" +#include "xfs_verity.h" +#include "xfs_bmap_util.h" +#include "xfs_log_format.h" +#include "xfs_trans.h" + +static int +xfs_get_verity_descriptor( + struct inode *inode, + void *buf, + size_t buf_size) +{ + struct xfs_inode *ip = XFS_I(inode); + int error = 0; + struct xfs_da_args args = { + .dp = ip, + .attr_filter = XFS_ATTR_VERITY, + .name = (const uint8_t *)XFS_VERITY_DESCRIPTOR_NAME, + .namelen = XFS_VERITY_DESCRIPTOR_NAME_LEN, + .value = buf, + .valuelen = buf_size, + }; + + /* + * The fact that (returned attribute size) == (provided buf_size) is + * checked by xfs_attr_copy_value() (returns -ERANGE) + */ + error = xfs_attr_get(&args); + if (error) + return error; + + return args.valuelen; +} + +static int +xfs_begin_enable_verity( + struct file *filp) +{ + struct inode *inode = file_inode(filp); + struct xfs_inode *ip = XFS_I(inode); + int error = 0; + + ASSERT(xfs_isilocked(ip, XFS_IOLOCK_EXCL)); + + if (IS_DAX(inode)) + return -EINVAL; + + if (xfs_iflags_test(ip, XFS_IVERITY_CONSTRUCTION)) + return -EBUSY; + xfs_iflags_set(ip, XFS_IVERITY_CONSTRUCTION); + + return error; +} + +static int +xfs_end_enable_verity( + struct file *filp, + const void *desc, + size_t desc_size, + u64 merkle_tree_size) +{ + struct inode *inode = file_inode(filp); + struct xfs_inode *ip = XFS_I(inode); + struct xfs_mount *mp = ip->i_mount; + struct xfs_trans *tp; + struct xfs_da_args args = { + .dp = ip, + .whichfork = XFS_ATTR_FORK, + .attr_filter = XFS_ATTR_VERITY, + .attr_flags = XATTR_CREATE, + .name = (const uint8_t *)XFS_VERITY_DESCRIPTOR_NAME, + .namelen = XFS_VERITY_DESCRIPTOR_NAME_LEN, + .value = (void *)desc, + .valuelen = desc_size, + }; + int error = 0; + + ASSERT(xfs_isilocked(ip, XFS_IOLOCK_EXCL)); + + /* fs-verity failed, just cleanup */ + if (desc == NULL) + goto out; + + error = xfs_attr_set(&args); + if (error) + goto out; + + /* Set fsverity inode flag */ + error = xfs_trans_alloc_inode(ip, &M_RES(mp)->tr_ichange, + 0, 0, false, &tp); + if (error) + goto out; + + /* + * Ensure that we've persisted the verity information before we enable + * it on the inode and tell the caller we have sealed the inode. + */ + ip->i_diflags2 |= XFS_DIFLAG2_VERITY; + + xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE); + xfs_trans_set_sync(tp); + + error = xfs_trans_commit(tp); + xfs_iunlock(ip, XFS_ILOCK_EXCL); + + if (!error) + inode->i_flags |= S_VERITY; + +out: + xfs_iflags_clear(ip, XFS_IVERITY_CONSTRUCTION); + return error; +} + +static struct page * +xfs_read_merkle_tree_page( + struct inode *inode, + pgoff_t index, + unsigned long num_ra_pages, + u8 log_blocksize) +{ + struct xfs_inode *ip = XFS_I(inode); + struct page *page = NULL; + __be64 name = cpu_to_be64(index << PAGE_SHIFT); + uint32_t bs = 1 << log_blocksize; + struct xfs_da_args args = { + .dp = ip, + .attr_filter = XFS_ATTR_VERITY, + .op_flags = XFS_DA_OP_BUFFER, + .name = (const uint8_t *)&name, + .namelen = sizeof(__be64), + .valuelen = bs, + }; + int error = 0; + + page = alloc_page(GFP_KERNEL); + if (!page) + return ERR_PTR(-ENOMEM); + + error = xfs_attr_get(&args); + if (error) { + kmem_free(args.value); + xfs_buf_rele(args.bp); + put_page(page); + return ERR_PTR(-EFAULT); + } + + if (args.bp->b_flags & XBF_VERITY_CHECKED) + SetPageChecked(page); + + page->private = (unsigned long)args.bp; + memcpy(page_address(page), args.value, args.valuelen); + + kmem_free(args.value); + return page; +} + +static int +xfs_write_merkle_tree_block( + struct inode *inode, + const void *buf, + u64 pos, + unsigned int size) +{ + struct xfs_inode *ip = XFS_I(inode); + __be64 name = cpu_to_be64(pos); + struct xfs_da_args args = { + .dp = ip, + .whichfork = XFS_ATTR_FORK, + .attr_filter = XFS_ATTR_VERITY, + .attr_flags = XATTR_CREATE, + .name = (const uint8_t *)&name, + .namelen = sizeof(__be64), + .value = (void *)buf, + .valuelen = size, + }; + + return xfs_attr_set(&args); +} + +static void +xfs_drop_page( + struct page *page) +{ + struct xfs_buf *buf = (struct xfs_buf *)page->private; + + ASSERT(buf != NULL); + + if (PageChecked(page)) + buf->b_flags |= XBF_VERITY_CHECKED; + + xfs_buf_rele(buf); + put_page(page); +} + +const struct fsverity_operations xfs_verity_ops = { + .begin_enable_verity = &xfs_begin_enable_verity, + .end_enable_verity = &xfs_end_enable_verity, + .get_verity_descriptor = &xfs_get_verity_descriptor, + .read_merkle_tree_page = &xfs_read_merkle_tree_page, + .write_merkle_tree_block = &xfs_write_merkle_tree_block, + .drop_page = &xfs_drop_page, +}; diff --git a/fs/xfs/xfs_verity.h b/fs/xfs/xfs_verity.h new file mode 100644 index 000000000000..ae5d87ca32a8 --- /dev/null +++ b/fs/xfs/xfs_verity.h @@ -0,0 +1,19 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (C) 2022 Red Hat, Inc. + */ +#ifndef __XFS_VERITY_H__ +#define __XFS_VERITY_H__ + +#include <linux/fsverity.h> + +#define XFS_VERITY_DESCRIPTOR_NAME "verity_descriptor" +#define XFS_VERITY_DESCRIPTOR_NAME_LEN 17 + +#ifdef CONFIG_FS_VERITY +extern const struct fsverity_operations xfs_verity_ops; +#else +#define xfs_verity_ops NULL +#endif /* CONFIG_FS_VERITY */ + +#endif /* __XFS_VERITY_H__ */
Add integration with fs-verity. The XFS store fs-verity metadata in the extended attributes. The metadata consist of verity descriptor and Merkle tree blocks. The descriptor is stored under "verity_descriptor" extended attribute. The Merkle tree blocks are stored under binary indexes. When fs-verity is enabled on an inode, the XFS_IVERITY_CONSTRUCTION flag is set meaning that the Merkle tree is being build. The initialization ends with storing of verity descriptor and setting inode on-disk flag (XFS_DIFLAG2_VERITY). The verification on read is done in iomap. Based on the inode verity flag the IOMAP_F_READ_VERITY is set in xfs_read_iomap_begin() to let iomap know that verification is needed. Signed-off-by: Andrey Albershteyn <aalbersh@redhat.com> --- fs/xfs/Makefile | 1 + fs/xfs/libxfs/xfs_attr.c | 13 +++ fs/xfs/xfs_inode.h | 3 +- fs/xfs/xfs_iomap.c | 3 + fs/xfs/xfs_ondisk.h | 4 + fs/xfs/xfs_super.c | 8 ++ fs/xfs/xfs_verity.c | 214 +++++++++++++++++++++++++++++++++++++++ fs/xfs/xfs_verity.h | 19 ++++ 8 files changed, 264 insertions(+), 1 deletion(-) create mode 100644 fs/xfs/xfs_verity.c create mode 100644 fs/xfs/xfs_verity.h