Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp104909ybx; Wed, 6 Nov 2019 13:58:38 -0800 (PST) X-Google-Smtp-Source: APXvYqzGK2I+yjQUcXr1NdtDo1FIMhNyPv7DLa2LG4tScVIGR9/NcydbnC9IKWTO5eEWywicqdPd X-Received: by 2002:aa7:d299:: with SMTP id w25mr20694edq.14.1573077518443; Wed, 06 Nov 2019 13:58:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573077518; cv=none; d=google.com; s=arc-20160816; b=fKUOU57V6Wo/o2Mq3YBbFgoM4zSV0D0gqBbj376bkdY386um1u5VThrL5eZ26ehvje C29YMLAOCr6Lps2yYbKD9iWt81Py4e8uI3/uvyODG3N+KaiCgFGcnRm0q0LWklvq+WW5 sa+EsQODwSTDfZdfHjOP0/BIk4D5ZK4vhyrZyvBhkO3LKcuoWFbHAyekNLm76oxFbGi2 ItDKPlusiu6whcFHOAfTBvZbaw3BbTTYyB8/eq/swxpXbLEV18/BR8tOrdxR9oQBgj8b RWq4G1PlPXckjPLR73okMpFyCnLMyyazACP7oFDCmv021dnwMW+jVRnzI9ISwb2/cjE3 vKEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=mWqdWwOtX++HMvHsdA3efMRq5Ymgvn0gy61KF+advYs=; b=muFSenGPHZJpcqZMVuZceSD85btUm5/BTwn6PvokORV5p1Va5lI0JRyGh2OrJVq7J+ 15F0+Lv+59njtSwcFjL6aCyWSrIO+ChtCuDM+UbSNnmEGXJ48VaXFPjMIDXs6/LslHmM GKVuK1AFTJwkj2/MYTwPIar7/SnSsS+G0Qht1WG5qaIaeayOXwnrtlU58ovB0Lw68BeZ z3YHBt8okn4PMewBHEduzKLdLR1FyalnuO2ouEfJEb09nWQtdKi3+bv/wVTvbtNFg57l 1O0isquN0EVTRbIVVFcV+k+paabURjxp0CUNhHCmFRFe2CmEL1I7hO0OZStkdga0ucpj 8qiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KXQ989co; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11si84509ejx.212.2019.11.06.13.58.14; Wed, 06 Nov 2019 13:58:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KXQ989co; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726912AbfKFV5X (ORCPT + 99 others); Wed, 6 Nov 2019 16:57:23 -0500 Received: from mail.kernel.org ([198.145.29.99]:33278 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726779AbfKFV5X (ORCPT ); Wed, 6 Nov 2019 16:57:23 -0500 Received: from gmail.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1CBAD2173E; Wed, 6 Nov 2019 21:57:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573077442; bh=7sER/moXfyFUCLPKujherydIaD5s2ggVDodB0ZuwT+M=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KXQ989co5T5zuGUY3xiXOlxt1pwdFozDP5LJM6vZo2e886Y7nWRvRxGCJ5d8Gl1x8 ZfJ9edkjSHIhb0xHddY3u/Q+iOI3VKdX2WifaKh6Xu7HP+S/LGsc+YPT0G7Pxttf6X ojykarHulCqdIL31fYSHwT9zDu0I366d7+7o3FeI= Date: Wed, 6 Nov 2019 13:57:20 -0800 From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-api@vger.kernel.org, David Howells , Theodore Ts'o , Jaegeuk Kim , Victor Hsieh Subject: Re: [PATCH 0/4] statx: expose the fs-verity bit Message-ID: <20191106215719.GD139580@gmail.com> Mail-Followup-To: linux-fscrypt@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-api@vger.kernel.org, David Howells , Theodore Ts'o , Jaegeuk Kim , Victor Hsieh References: <20191029204141.145309-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191029204141.145309-1-ebiggers@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, Oct 29, 2019 at 01:41:37PM -0700, Eric Biggers wrote: > This patchset exposes the verity bit (a.k.a. FS_VERITY_FL) via statx(). > > This is useful because it allows applications to check whether a file is > a verity file without opening it. Opening a verity file can be > expensive because the fsverity_info is set up on open, which involves > parsing metadata and optionally verifying a cryptographic signature. > > This is analogous to how various other bits are exposed through both > FS_IOC_GETFLAGS and statx(), e.g. the encrypt bit. > > This patchset applies to v5.4-rc5. > > Eric Biggers (4): > statx: define STATX_ATTR_VERITY > ext4: support STATX_ATTR_VERITY > f2fs: support STATX_ATTR_VERITY > docs: fs-verity: mention statx() support > > Documentation/filesystems/fsverity.rst | 8 ++++++++ > fs/ext4/inode.c | 5 ++++- > fs/f2fs/file.c | 5 ++++- > include/linux/stat.h | 3 ++- > include/uapi/linux/stat.h | 2 +- > 5 files changed, 19 insertions(+), 4 deletions(-) > Any more comments on this? - Eric