From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8F020C47E49 for ; Tue, 29 Oct 2019 20:43:56 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 56D112173E for ; Tue, 29 Oct 2019 20:43:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572381836; bh=PO9FWnMviEuNb31RBWbFM6qoAGbqLACtBOE0D5G9jSY=; h=From:To:Cc:Subject:Date:List-ID:From; b=wxbfTT2a/EWpRIElr1RFkPqcc8jYfYxEo/a3PtW0ccxQu5h9DYQ8GZ06s2hbuvbhS JFHM1Npy7qVFh9OV0IATxWXfYNBuOijq70GTzbuRSJwO1PZHA3zZY3fYX9Gh2gGJ0B aMORrWu+tLk9vISyKOS+3WNsIR/sRhKoAASlQ+yI= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727408AbfJ2Unz (ORCPT ); Tue, 29 Oct 2019 16:43:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:34732 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725840AbfJ2Unz (ORCPT ); Tue, 29 Oct 2019 16:43:55 -0400 Received: from ebiggers-linuxstation.mtv.corp.google.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B1E132087F; Tue, 29 Oct 2019 20:43:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572381835; bh=PO9FWnMviEuNb31RBWbFM6qoAGbqLACtBOE0D5G9jSY=; h=From:To:Cc:Subject:Date:From; b=tXVpNGPBJfZ2HxnE4AwO/rpSHRictz/rj27j8Txw6/U7VlJMoTBH9fL5Cn/eP4RI8 vfqiLz4derg9gYJzw1E4PMXNQf9Tp3CgrcCbyjjmlqTxM9+zOp6SUzKO+QPaJYrhTd 32TVj4HxDWc0jneJIVgxG8SvQxHdfjPbW9H5Eg34= From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-api@vger.kernel.org, David Howells , Theodore Ts'o , Jaegeuk Kim , Victor Hsieh Subject: [PATCH 0/4] statx: expose the fs-verity bit Date: Tue, 29 Oct 2019 13:41:37 -0700 Message-Id: <20191029204141.145309-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.24.0.rc1.363.gb1bccd3e3d-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org This patchset exposes the verity bit (a.k.a. FS_VERITY_FL) via statx(). This is useful because it allows applications to check whether a file is a verity file without opening it. Opening a verity file can be expensive because the fsverity_info is set up on open, which involves parsing metadata and optionally verifying a cryptographic signature. This is analogous to how various other bits are exposed through both FS_IOC_GETFLAGS and statx(), e.g. the encrypt bit. This patchset applies to v5.4-rc5. Eric Biggers (4): statx: define STATX_ATTR_VERITY ext4: support STATX_ATTR_VERITY f2fs: support STATX_ATTR_VERITY docs: fs-verity: mention statx() support Documentation/filesystems/fsverity.rst | 8 ++++++++ fs/ext4/inode.c | 5 ++++- fs/f2fs/file.c | 5 ++++- include/linux/stat.h | 3 ++- include/uapi/linux/stat.h | 2 +- 5 files changed, 19 insertions(+), 4 deletions(-) -- 2.24.0.rc1.363.gb1bccd3e3d-goog