From: Eric Biggers <[email protected]>

Add most of fs-verity support to ext4.  fs-verity is a filesystem
feature that enables transparent integrity protection and authentication
of read-only files.  It uses a dm-verity like mechanism at the file
level: a Merkle tree is used to verify any block in the file in
log(filesize) time.  It is implemented mainly by helper functions in
fs/verity/.  See Documentation/filesystems/fsverity.rst for the full
documentation.

This commit adds all of ext4 fs-verity support except for the actual
data verification, including:

- Adding a filesystem feature flag and an inode flag for fs-verity.

- Implementing the fsverity_operations to support enabling verity on an
  inode and reading/writing the verity metadata.

- Updating ->write_begin(), ->write_end(), and ->writepages() to support
  writing verity metadata pages.

- Calling the fs-verity hooks for ->open(), ->setattr(), and ->ioctl().

ext4 stores the verity metadata (Merkle tree and fsverity_descriptor)
past the end of the file, starting at the first page fully beyond
i_size.  This approach works because (a) verity files are readonly, and
(b) pages fully beyond i_size aren't visible to userspace but can be
read/written internally by ext4 with only some relatively small changes
to ext4.  This approach avoids having to depend on the EA_INODE feature
and on rearchitecturing ext4's xattr support to support paging
multi-gigabyte xattrs into memory, and to support encrypting xattrs.
Note that the verity metadata *must* be encrypted when the file is,
since it contains hashes of the plaintext data.

This patch incorporates work by Theodore Ts'o and Chandan Rajendra.

Signed-off-by: Eric Biggers <[email protected]>
---
 fs/ext4/Makefile |   1 +
 fs/ext4/ext4.h   |  19 +++-
 fs/ext4/file.c   |   4 +
 fs/ext4/inode.c  |  48 ++++++---
 fs/ext4/ioctl.c  |  12 +++
 fs/ext4/super.c  |   9 ++
 fs/ext4/sysfs.c  |   6 ++
 fs/ext4/verity.c | 272 +++++++++++++++++++++++++++++++++++++++++++++++
 fs/ext4/xattr.h  |   2 +
 9 files changed, 359 insertions(+), 14 deletions(-)
 create mode 100644 fs/ext4/verity.c

diff --git a/fs/ext4/Makefile b/fs/ext4/Makefile
index 8fdfcd3c3e043..b17ddc229ac5f 100644
--- a/fs/ext4/Makefile
+++ b/fs/ext4/Makefile
@@ -13,3 +13,4 @@ ext4-y        := balloc.o bitmap.o block_validity.o dir.o 
ext4_jbd2.o extents.o \
 
 ext4-$(CONFIG_EXT4_FS_POSIX_ACL)       += acl.o
 ext4-$(CONFIG_EXT4_FS_SECURITY)                += xattr_security.o
+ext4-$(CONFIG_FS_VERITY)               += verity.o
diff --git a/fs/ext4/ext4.h b/fs/ext4/ext4.h
index 1cb67859e0518..20719259d3d73 100644
--- a/fs/ext4/ext4.h
+++ b/fs/ext4/ext4.h
@@ -41,6 +41,7 @@
 #endif
 
 #include <linux/fscrypt.h>
+#include <linux/fsverity.h>
 
 #include <linux/compiler.h>
 
@@ -395,6 +396,7 @@ struct flex_groups {
 #define EXT4_TOPDIR_FL                 0x00020000 /* Top of directory 
hierarchies*/
 #define EXT4_HUGE_FILE_FL               0x00040000 /* Set to each huge file */
 #define EXT4_EXTENTS_FL                        0x00080000 /* Inode uses 
extents */
+#define EXT4_VERITY_FL                 0x00100000 /* Verity protected inode */
 #define EXT4_EA_INODE_FL               0x00200000 /* Inode used for large EA */
 #define EXT4_EOFBLOCKS_FL              0x00400000 /* Blocks allocated beyond 
EOF */
 #define EXT4_INLINE_DATA_FL            0x10000000 /* Inode has inline data. */
@@ -466,6 +468,7 @@ enum {
        EXT4_INODE_TOPDIR       = 17,   /* Top of directory hierarchies*/
        EXT4_INODE_HUGE_FILE    = 18,   /* Set to each huge file */
        EXT4_INODE_EXTENTS      = 19,   /* Inode uses extents */
+       EXT4_INODE_VERITY       = 20,   /* Verity protected inode */
        EXT4_INODE_EA_INODE     = 21,   /* Inode used for large EA */
        EXT4_INODE_EOFBLOCKS    = 22,   /* Blocks allocated beyond EOF */
        EXT4_INODE_INLINE_DATA  = 28,   /* Data in inode. */
@@ -511,6 +514,7 @@ static inline void ext4_check_flag_values(void)
        CHECK_FLAG_VALUE(TOPDIR);
        CHECK_FLAG_VALUE(HUGE_FILE);
        CHECK_FLAG_VALUE(EXTENTS);
+       CHECK_FLAG_VALUE(VERITY);
        CHECK_FLAG_VALUE(EA_INODE);
        CHECK_FLAG_VALUE(EOFBLOCKS);
        CHECK_FLAG_VALUE(INLINE_DATA);
@@ -1559,6 +1563,7 @@ enum {
        EXT4_STATE_MAY_INLINE_DATA,     /* may have in-inode data */
        EXT4_STATE_EXT_PRECACHED,       /* extents have been precached */
        EXT4_STATE_LUSTRE_EA_INODE,     /* Lustre-style ea_inode */
+       EXT4_STATE_VERITY_IN_PROGRESS,  /* building fs-verity Merkle tree */
 };
 
 #define EXT4_INODE_BIT_FNS(name, field, offset)                                
\
@@ -1609,6 +1614,12 @@ static inline void ext4_clear_state_flags(struct 
ext4_inode_info *ei)
 #define EXT4_SB(sb)    (sb)
 #endif
 
+static inline bool ext4_verity_in_progress(struct inode *inode)
+{
+       return IS_ENABLED(CONFIG_FS_VERITY) &&
+              ext4_test_inode_state(inode, EXT4_STATE_VERITY_IN_PROGRESS);
+}
+
 #define NEXT_ORPHAN(inode) EXT4_I(inode)->i_dtime
 
 /*
@@ -1661,6 +1672,7 @@ static inline void ext4_clear_state_flags(struct 
ext4_inode_info *ei)
 #define EXT4_FEATURE_RO_COMPAT_METADATA_CSUM   0x0400
 #define EXT4_FEATURE_RO_COMPAT_READONLY                0x1000
 #define EXT4_FEATURE_RO_COMPAT_PROJECT         0x2000
+#define EXT4_FEATURE_RO_COMPAT_VERITY          0x8000
 
 #define EXT4_FEATURE_INCOMPAT_COMPRESSION      0x0001
 #define EXT4_FEATURE_INCOMPAT_FILETYPE         0x0002
@@ -1755,6 +1767,7 @@ EXT4_FEATURE_RO_COMPAT_FUNCS(bigalloc,            
BIGALLOC)
 EXT4_FEATURE_RO_COMPAT_FUNCS(metadata_csum,    METADATA_CSUM)
 EXT4_FEATURE_RO_COMPAT_FUNCS(readonly,         READONLY)
 EXT4_FEATURE_RO_COMPAT_FUNCS(project,          PROJECT)
+EXT4_FEATURE_RO_COMPAT_FUNCS(verity,           VERITY)
 
 EXT4_FEATURE_INCOMPAT_FUNCS(compression,       COMPRESSION)
 EXT4_FEATURE_INCOMPAT_FUNCS(filetype,          FILETYPE)
@@ -1812,7 +1825,8 @@ EXT4_FEATURE_INCOMPAT_FUNCS(casefold,             
CASEFOLD)
                                         EXT4_FEATURE_RO_COMPAT_BIGALLOC |\
                                         EXT4_FEATURE_RO_COMPAT_METADATA_CSUM|\
                                         EXT4_FEATURE_RO_COMPAT_QUOTA |\
-                                        EXT4_FEATURE_RO_COMPAT_PROJECT)
+                                        EXT4_FEATURE_RO_COMPAT_PROJECT |\
+                                        EXT4_FEATURE_RO_COMPAT_VERITY)
 
 #define EXTN_FEATURE_FUNCS(ver) \
 static inline bool ext4_has_unknown_ext##ver##_compat_features(struct 
super_block *sb) \
@@ -3250,6 +3264,9 @@ extern int ext4_bio_write_page(struct ext4_io_submit *io,
 /* mmp.c */
 extern int ext4_multi_mount_protect(struct super_block *, ext4_fsblk_t);
 
+/* verity.c */
+extern const struct fsverity_operations ext4_verityops;
+
 /*
  * Add new method to test whether block and inode bitmaps are properly
  * initialized. With uninit_bg reading the block from disk is not enough
diff --git a/fs/ext4/file.c b/fs/ext4/file.c
index 2c5baa5e82911..ed59fb8f268e0 100644
--- a/fs/ext4/file.c
+++ b/fs/ext4/file.c
@@ -451,6 +451,10 @@ static int ext4_file_open(struct inode * inode, struct 
file * filp)
        if (ret)
                return ret;
 
+       ret = fsverity_file_open(inode, filp);
+       if (ret)
+               return ret;
+
        /*
         * Set up the jbd2_inode if we are opening the inode for
         * writing and the journal is present
diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c
index 82298c63ea6d6..6cb91315989fc 100644
--- a/fs/ext4/inode.c
+++ b/fs/ext4/inode.c
@@ -1390,6 +1390,7 @@ static int ext4_write_end(struct file *file,
        int ret = 0, ret2;
        int i_size_changed = 0;
        int inline_data = ext4_has_inline_data(inode);
+       bool verity = ext4_verity_in_progress(inode);
 
        trace_ext4_write_end(inode, pos, len, copied);
        if (inline_data) {
@@ -1407,12 +1408,16 @@ static int ext4_write_end(struct file *file,
        /*
         * it's important to update i_size while still holding page lock:
         * page writeout could otherwise come in and zero beyond i_size.
+        *
+        * If FS_IOC_ENABLE_VERITY is running on this inode, then Merkle tree
+        * blocks are being written past EOF, so skip the i_size update.
         */
-       i_size_changed = ext4_update_inode_size(inode, pos + copied);
+       if (!verity)
+               i_size_changed = ext4_update_inode_size(inode, pos + copied);
        unlock_page(page);
        put_page(page);
 
-       if (old_size < pos)
+       if (old_size < pos && !verity)
                pagecache_isize_extended(inode, old_size, pos);
        /*
         * Don't mark the inode dirty under page lock. First, it unnecessarily
@@ -1423,7 +1428,7 @@ static int ext4_write_end(struct file *file,
        if (i_size_changed || inline_data)
                ext4_mark_inode_dirty(handle, inode);
 
-       if (pos + len > inode->i_size && ext4_can_truncate(inode))
+       if (pos + len > inode->i_size && !verity && ext4_can_truncate(inode))
                /* if we have allocated more blocks and copied
                 * less. We will have blocks allocated outside
                 * inode->i_size. So truncate them
@@ -1434,7 +1439,7 @@ static int ext4_write_end(struct file *file,
        if (!ret)
                ret = ret2;
 
-       if (pos + len > inode->i_size) {
+       if (pos + len > inode->i_size && !verity) {
                ext4_truncate_failed_write(inode);
                /*
                 * If truncate failed early the inode might still be
@@ -1495,6 +1500,7 @@ static int ext4_journalled_write_end(struct file *file,
        unsigned from, to;
        int size_changed = 0;
        int inline_data = ext4_has_inline_data(inode);
+       bool verity = ext4_verity_in_progress(inode);
 
        trace_ext4_journalled_write_end(inode, pos, len, copied);
        from = pos & (PAGE_SIZE - 1);
@@ -1524,13 +1530,14 @@ static int ext4_journalled_write_end(struct file *file,
                if (!partial)
                        SetPageUptodate(page);
        }
-       size_changed = ext4_update_inode_size(inode, pos + copied);
+       if (!verity)
+               size_changed = ext4_update_inode_size(inode, pos + copied);
        ext4_set_inode_state(inode, EXT4_STATE_JDATA);
        EXT4_I(inode)->i_datasync_tid = handle->h_transaction->t_tid;
        unlock_page(page);
        put_page(page);
 
-       if (old_size < pos)
+       if (old_size < pos && !verity)
                pagecache_isize_extended(inode, old_size, pos);
 
        if (size_changed || inline_data) {
@@ -1539,7 +1546,7 @@ static int ext4_journalled_write_end(struct file *file,
                        ret = ret2;
        }
 
-       if (pos + len > inode->i_size && ext4_can_truncate(inode))
+       if (pos + len > inode->i_size && !verity && ext4_can_truncate(inode))
                /* if we have allocated more blocks and copied
                 * less. We will have blocks allocated outside
                 * inode->i_size. So truncate them
@@ -1550,7 +1557,7 @@ static int ext4_journalled_write_end(struct file *file,
        ret2 = ext4_journal_stop(handle);
        if (!ret)
                ret = ret2;
-       if (pos + len > inode->i_size) {
+       if (pos + len > inode->i_size && !verity) {
                ext4_truncate_failed_write(inode);
                /*
                 * If truncate failed early the inode might still be
@@ -2146,7 +2153,8 @@ static int ext4_writepage(struct page *page,
 
        trace_ext4_writepage(page);
        size = i_size_read(inode);
-       if (page->index == size >> PAGE_SHIFT)
+       if (page->index == size >> PAGE_SHIFT &&
+           !ext4_verity_in_progress(inode))
                len = size & ~PAGE_MASK;
        else
                len = PAGE_SIZE;
@@ -2230,7 +2238,8 @@ static int mpage_submit_page(struct mpage_da_data *mpd, 
struct page *page)
         * after page tables are updated.
         */
        size = i_size_read(mpd->inode);
-       if (page->index == size >> PAGE_SHIFT)
+       if (page->index == size >> PAGE_SHIFT &&
+           !ext4_verity_in_progress(mpd->inode))
                len = size & ~PAGE_MASK;
        else
                len = PAGE_SIZE;
@@ -2329,6 +2338,9 @@ static int mpage_process_page_bufs(struct mpage_da_data 
*mpd,
        ext4_lblk_t blocks = (i_size_read(inode) + i_blocksize(inode) - 1)
                                                        >> inode->i_blkbits;
 
+       if (ext4_verity_in_progress(inode))
+               blocks = EXT_MAX_BLOCKS;
+
        do {
                BUG_ON(buffer_locked(bh));
 
@@ -3045,8 +3057,8 @@ static int ext4_da_write_begin(struct file *file, struct 
address_space *mapping,
 
        index = pos >> PAGE_SHIFT;
 
-       if (ext4_nonda_switch(inode->i_sb) ||
-           S_ISLNK(inode->i_mode)) {
+       if (ext4_nonda_switch(inode->i_sb) || S_ISLNK(inode->i_mode) ||
+           ext4_verity_in_progress(inode)) {
                *fsdata = (void *)FALL_BACK_TO_NONDELALLOC;
                return ext4_write_begin(file, mapping, pos,
                                        len, flags, pagep, fsdata);
@@ -3881,6 +3893,8 @@ static ssize_t ext4_direct_IO(struct kiocb *iocb, struct 
iov_iter *iter)
        if (IS_ENCRYPTED(inode) && S_ISREG(inode->i_mode))
                return 0;
 #endif
+       if (IS_ENABLED(CONFIG_FS_VERITY) && IS_VERITY(inode))
+               return 0;
 
        /*
         * If we are doing data journalling we don't support O_DIRECT
@@ -4720,6 +4734,8 @@ static bool ext4_should_use_dax(struct inode *inode)
                return false;
        if (ext4_test_inode_flag(inode, EXT4_INODE_ENCRYPT))
                return false;
+       if (ext4_test_inode_flag(inode, EXT4_INODE_VERITY))
+               return false;
        return true;
 }
 
@@ -4744,9 +4760,11 @@ void ext4_set_inode_flags(struct inode *inode)
                new_fl |= S_ENCRYPTED;
        if (flags & EXT4_CASEFOLD_FL)
                new_fl |= S_CASEFOLD;
+       if (flags & EXT4_VERITY_FL)
+               new_fl |= S_VERITY;
        inode_set_flags(inode, new_fl,
                        S_SYNC|S_APPEND|S_IMMUTABLE|S_NOATIME|S_DIRSYNC|S_DAX|
-                       S_ENCRYPTED|S_CASEFOLD);
+                       S_ENCRYPTED|S_CASEFOLD|S_VERITY);
 }
 
 static blkcnt_t ext4_inode_blocks(struct ext4_inode *raw_inode,
@@ -5528,6 +5546,10 @@ int ext4_setattr(struct dentry *dentry, struct iattr 
*attr)
        if (error)
                return error;
 
+       error = fsverity_prepare_setattr(dentry, attr);
+       if (error)
+               return error;
+
        if (is_quota_modification(inode, attr)) {
                error = dquot_initialize(inode);
                if (error)
diff --git a/fs/ext4/ioctl.c b/fs/ext4/ioctl.c
index e486e49b31ed7..93b63697f5dce 100644
--- a/fs/ext4/ioctl.c
+++ b/fs/ext4/ioctl.c
@@ -1092,6 +1092,16 @@ long ext4_ioctl(struct file *filp, unsigned int cmd, 
unsigned long arg)
        case EXT4_IOC_GET_ENCRYPTION_POLICY:
                return fscrypt_ioctl_get_policy(filp, (void __user *)arg);
 
+       case FS_IOC_ENABLE_VERITY:
+               if (!ext4_has_feature_verity(sb))
+                       return -EOPNOTSUPP;
+               return fsverity_ioctl_enable(filp, (const void __user *)arg);
+
+       case FS_IOC_MEASURE_VERITY:
+               if (!ext4_has_feature_verity(sb))
+                       return -EOPNOTSUPP;
+               return fsverity_ioctl_measure(filp, (void __user *)arg);
+
        case EXT4_IOC_FSGETXATTR:
        {
                struct fsxattr fa;
@@ -1210,6 +1220,8 @@ long ext4_compat_ioctl(struct file *file, unsigned int 
cmd, unsigned long arg)
        case EXT4_IOC_SET_ENCRYPTION_POLICY:
        case EXT4_IOC_GET_ENCRYPTION_PWSALT:
        case EXT4_IOC_GET_ENCRYPTION_POLICY:
+       case FS_IOC_ENABLE_VERITY:
+       case FS_IOC_MEASURE_VERITY:
        case EXT4_IOC_SHUTDOWN:
        case FS_IOC_GETFSMAP:
                break;
diff --git a/fs/ext4/super.c b/fs/ext4/super.c
index 4079605d437ae..05a9874687c36 100644
--- a/fs/ext4/super.c
+++ b/fs/ext4/super.c
@@ -1179,6 +1179,7 @@ void ext4_clear_inode(struct inode *inode)
                EXT4_I(inode)->jinode = NULL;
        }
        fscrypt_put_encryption_info(inode);
+       fsverity_cleanup_inode(inode);
 }
 
 static struct inode *ext4_nfs_get_inode(struct super_block *sb,
@@ -4272,6 +4273,9 @@ static int ext4_fill_super(struct super_block *sb, void 
*data, int silent)
 #ifdef CONFIG_FS_ENCRYPTION
        sb->s_cop = &ext4_cryptops;
 #endif
+#ifdef CONFIG_FS_VERITY
+       sb->s_vop = &ext4_verityops;
+#endif
 #ifdef CONFIG_QUOTA
        sb->dq_op = &ext4_quota_operations;
        if (ext4_has_feature_quota(sb))
@@ -4419,6 +4423,11 @@ static int ext4_fill_super(struct super_block *sb, void 
*data, int silent)
                goto failed_mount_wq;
        }
 
+       if (ext4_has_feature_verity(sb) && blocksize != PAGE_SIZE) {
+               ext4_msg(sb, KERN_ERR, "Unsupported blocksize for fs-verity");
+               goto failed_mount_wq;
+       }
+
        if (DUMMY_ENCRYPTION_ENABLED(sbi) && !sb_rdonly(sb) &&
            !ext4_has_feature_encrypt(sb)) {
                ext4_set_feature_encrypt(sb);
diff --git a/fs/ext4/sysfs.c b/fs/ext4/sysfs.c
index 04b4f53f0659e..534531747bf1a 100644
--- a/fs/ext4/sysfs.c
+++ b/fs/ext4/sysfs.c
@@ -241,6 +241,9 @@ EXT4_ATTR_FEATURE(encryption);
 #ifdef CONFIG_UNICODE
 EXT4_ATTR_FEATURE(casefold);
 #endif
+#ifdef CONFIG_FS_VERITY
+EXT4_ATTR_FEATURE(verity);
+#endif
 EXT4_ATTR_FEATURE(metadata_csum_seed);
 
 static struct attribute *ext4_feat_attrs[] = {
@@ -252,6 +255,9 @@ static struct attribute *ext4_feat_attrs[] = {
 #endif
 #ifdef CONFIG_UNICODE
        ATTR_LIST(casefold),
+#endif
+#ifdef CONFIG_FS_VERITY
+       ATTR_LIST(verity),
 #endif
        ATTR_LIST(metadata_csum_seed),
        NULL,
diff --git a/fs/ext4/verity.c b/fs/ext4/verity.c
new file mode 100644
index 0000000000000..0406d224e1017
--- /dev/null
+++ b/fs/ext4/verity.c
@@ -0,0 +1,272 @@
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * fs/ext4/verity.c: fs-verity support for ext4
+ *
+ * Copyright 2019 Google LLC
+ */
+
+/*
+ * Implementation of fsverity_operations for ext4.
+ *
+ * ext4 stores the verity metadata (Merkle tree and fsverity_descriptor) past
+ * the end of the file, starting at the first page fully beyond i_size.  This
+ * approach works because (a) verity files are readonly, and (b) pages fully
+ * beyond i_size aren't visible to userspace but can be read/written internally
+ * by ext4 with only some relatively small changes to ext4.  This approach
+ * avoids having to depend on the EA_INODE feature and on rearchitecturing
+ * ext4's xattr support to support paging multi-gigabyte xattrs into memory, 
and
+ * to support encrypting xattrs.  Note that the verity metadata *must* be
+ * encrypted when the file is, since it contains hashes of the plaintext data.
+ */
+
+#include <linux/quotaops.h>
+
+#include "ext4.h"
+#include "ext4_jbd2.h"
+#include "xattr.h"
+
+/*
+ * Read some verity metadata from the inode.  __vfs_read() can't be used 
because
+ * we need to read beyond i_size.
+ */
+static int pagecache_read(struct inode *inode, void *buf, size_t count,
+                         loff_t pos)
+{
+       const size_t orig_count = count;
+
+       while (count) {
+               size_t n = min_t(size_t, count,
+                                PAGE_SIZE - offset_in_page(pos));
+               struct page *page;
+               void *addr;
+
+               page = read_mapping_page(inode->i_mapping, pos >> PAGE_SHIFT,
+                                        NULL);
+               if (IS_ERR(page))
+                       return PTR_ERR(page);
+
+               addr = kmap_atomic(page);
+               memcpy(buf, addr + offset_in_page(pos), n);
+               kunmap_atomic(addr);
+
+               put_page(page);
+
+               buf += n;
+               pos += n;
+               count -= n;
+       }
+       return orig_count;
+}
+
+/*
+ * Write some verity metadata to the inode for FS_IOC_ENABLE_VERITY.
+ * kernel_write() can't be used because the file descriptor is readonly.
+ */
+static int pagecache_write(struct inode *inode, const void *buf, size_t count,
+                          loff_t pos)
+{
+       while (count) {
+               size_t n = min_t(size_t, count,
+                                PAGE_SIZE - offset_in_page(pos));
+               struct page *page;
+               void *fsdata;
+               void *addr;
+               int res;
+
+               res = pagecache_write_begin(NULL, inode->i_mapping, pos, n, 0,
+                                           &page, &fsdata);
+               if (res)
+                       return res;
+
+               addr = kmap_atomic(page);
+               memcpy(addr + offset_in_page(pos), buf, n);
+               kunmap_atomic(addr);
+
+               res = pagecache_write_end(NULL, inode->i_mapping, pos, n, n,
+                                         page, fsdata);
+               if (res < 0)
+                       return res;
+               if (res != n)
+                       return -EIO;
+
+               buf += n;
+               pos += n;
+               count -= n;
+       }
+       return 0;
+}
+
+/*
+ * Format of ext4 verity xattr.  This points to the location of the verity
+ * descriptor within the file data rather than containing it directly because
+ * the verity descriptor *must* be encrypted when ext4 encryption is used.  
But,
+ * ext4 encryption does not encrypt xattrs.
+ */
+struct fsverity_descriptor_location {
+       __le32 version;
+       __le32 size;
+       __le64 pos;
+};
+
+static int ext4_begin_enable_verity(struct file *filp)
+{
+       struct inode *inode = file_inode(filp);
+       int credits = 2; /* superblock and inode for ext4_orphan_add() */
+       handle_t *handle;
+       int err;
+
+       err = ext4_convert_inline_data(inode);
+       if (err)
+               return err;
+
+       err = ext4_inode_attach_jinode(inode);
+       if (err)
+               return err;
+
+       err = dquot_initialize(inode);
+       if (err)
+               return err;
+
+       handle = ext4_journal_start(inode, EXT4_HT_INODE, credits);
+       if (IS_ERR(handle))
+               return PTR_ERR(handle);
+
+       err = ext4_orphan_add(handle, inode);
+       if (err == 0)
+               ext4_set_inode_state(inode, EXT4_STATE_VERITY_IN_PROGRESS);
+
+       ext4_journal_stop(handle);
+       return err;
+}
+
+static int ext4_end_enable_verity(struct file *filp, const void *desc,
+                                 size_t desc_size, u64 merkle_tree_size)
+{
+       struct inode *inode = file_inode(filp);
+       u64 desc_pos = round_up(inode->i_size, PAGE_SIZE) + merkle_tree_size;
+       struct fsverity_descriptor_location dloc = {
+               .version = cpu_to_le32(1),
+               .size = cpu_to_le32(desc_size),
+               .pos = cpu_to_le64(desc_pos),
+       };
+       int credits = 0;
+       handle_t *handle;
+       int err1 = 0;
+       int err;
+
+       if (desc != NULL) {
+               /* Succeeded; write the verity descriptor. */
+               err1 = pagecache_write(inode, desc, desc_size, desc_pos);
+
+               /* Write all pages before clearing VERITY_IN_PROGRESS. */
+               if (!err1)
+                       err1 = filemap_write_and_wait(inode->i_mapping);
+
+               if (!err1)
+                       err1 = ext4_xattr_set_credits(inode, sizeof(dloc), true,
+                                                     &credits);
+       } else {
+               /* Failed; truncate anything we wrote past i_size. */
+               ext4_truncate(inode);
+       }
+
+       /*
+        * We must always clean up by clearing EXT4_STATE_VERITY_IN_PROGRESS and
+        * deleting the inode from the orphan list, even if something failed.
+        * If everything succeeded, we'll also set the verity bit and descriptor
+        * location xattr in the same transaction.
+        */
+
+       ext4_clear_inode_state(inode, EXT4_STATE_VERITY_IN_PROGRESS);
+
+       credits += 2; /* superblock and inode for ext4_orphan_del() */
+
+       handle = ext4_journal_start(inode, EXT4_HT_INODE, credits);
+       if (IS_ERR(handle)) {
+               ext4_orphan_del(NULL, inode);
+               return PTR_ERR(handle);
+       }
+
+       err = ext4_orphan_del(handle, inode);
+       if (err)
+               goto out_stop;
+
+       if (desc != NULL && !err1) {
+               struct ext4_iloc iloc;
+
+               err = ext4_xattr_set_handle(handle, inode,
+                                           EXT4_XATTR_INDEX_VERITY,
+                                           EXT4_XATTR_NAME_VERITY,
+                                           &dloc, sizeof(dloc), XATTR_CREATE);
+               if (err)
+                       goto out_stop;
+
+               err = ext4_reserve_inode_write(handle, inode, &iloc);
+               if (err)
+                       goto out_stop;
+               ext4_set_inode_flag(inode, EXT4_INODE_VERITY);
+               ext4_set_inode_flags(inode);
+               err = ext4_mark_iloc_dirty(handle, inode, &iloc);
+       }
+out_stop:
+       ext4_journal_stop(handle);
+       return err ?: err1;
+}
+
+static int ext4_get_verity_descriptor(struct inode *inode, void *buf,
+                                     size_t buf_size)
+{
+       struct fsverity_descriptor_location dloc;
+       int res;
+       u32 size;
+       u64 pos;
+
+       /* Get the descriptor location */
+       res = ext4_xattr_get(inode, EXT4_XATTR_INDEX_VERITY,
+                            EXT4_XATTR_NAME_VERITY, &dloc, sizeof(dloc));
+       if (res < 0 && res != -ERANGE)
+               return res;
+       if (res != sizeof(dloc) || dloc.version != cpu_to_le32(1)) {
+               ext4_warning_inode(inode, "unknown verity xattr format");
+               return -EINVAL;
+       }
+       size = le32_to_cpu(dloc.size);
+       pos = le64_to_cpu(dloc.pos);
+
+       /* Get the descriptor */
+       if (pos + size < pos || pos + size > inode->i_sb->s_maxbytes ||
+           pos < round_up(inode->i_size, PAGE_SIZE)) {
+               ext4_warning_inode(inode, "invalid verity xattr");
+               return -EFSCORRUPTED;
+       }
+       if (buf_size == 0)
+               return size;
+       if (size > buf_size)
+               return -ERANGE;
+       return pagecache_read(inode, buf, size, pos);
+}
+
+static struct page *ext4_read_merkle_tree_page(struct inode *inode,
+                                              pgoff_t index)
+{
+       index += DIV_ROUND_UP(inode->i_size, PAGE_SIZE);
+
+       return read_mapping_page(inode->i_mapping, index, NULL);
+}
+
+static int ext4_write_merkle_tree_block(struct inode *inode, const void *buf,
+                                       u64 index, int log_blocksize)
+{
+       loff_t pos = round_up(inode->i_size, PAGE_SIZE) +
+                    (index << log_blocksize);
+
+       return pagecache_write(inode, buf, 1 << log_blocksize, pos);
+}
+
+const struct fsverity_operations ext4_verityops = {
+       .begin_enable_verity    = ext4_begin_enable_verity,
+       .end_enable_verity      = ext4_end_enable_verity,
+       .get_verity_descriptor  = ext4_get_verity_descriptor,
+       .read_merkle_tree_page  = ext4_read_merkle_tree_page,
+       .write_merkle_tree_block = ext4_write_merkle_tree_block,
+};
diff --git a/fs/ext4/xattr.h b/fs/ext4/xattr.h
index f39cad2abe2a8..029d3511092dd 100644
--- a/fs/ext4/xattr.h
+++ b/fs/ext4/xattr.h
@@ -26,6 +26,7 @@
 #define EXT4_XATTR_INDEX_RICHACL               8
 #define EXT4_XATTR_INDEX_ENCRYPTION            9
 #define EXT4_XATTR_INDEX_HURD                  10 /* Reserved for Hurd */
+#define EXT4_XATTR_INDEX_VERITY                        11
 
 struct ext4_xattr_header {
        __le32  h_magic;        /* magic number for identification */
@@ -126,6 +127,7 @@ extern const struct xattr_handler 
ext4_xattr_trusted_handler;
 extern const struct xattr_handler ext4_xattr_security_handler;
 
 #define EXT4_XATTR_NAME_ENCRYPTION_CONTEXT "c"
+#define EXT4_XATTR_NAME_VERITY            "v"
 
 /*
  * The EXT4_STATE_NO_EXPAND is overloaded and used for two purposes.
-- 
2.21.0



_______________________________________________
Linux-f2fs-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel

Reply via email to