logo

oasis-root

Compiled tree of Oasis Linux based on own branch at <https://hacktivis.me/git/oasis/> git clone https://anongit.hacktivis.me/git/oasis-root.git

fsverity.h (3185B)


  1. /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
  2. /*
  3. * fs-verity user API
  4. *
  5. * These ioctls can be used on filesystems that support fs-verity. See the
  6. * "User API" section of Documentation/filesystems/fsverity.rst.
  7. *
  8. * Copyright 2019 Google LLC
  9. */
  10. #ifndef _LINUX_FSVERITY_H
  11. #define _LINUX_FSVERITY_H
  12. #include <linux/ioctl.h>
  13. #include <linux/types.h>
  14. #define FS_VERITY_HASH_ALG_SHA256 1
  15. #define FS_VERITY_HASH_ALG_SHA512 2
  16. struct fsverity_enable_arg {
  17. __u32 version;
  18. __u32 hash_algorithm;
  19. __u32 block_size;
  20. __u32 salt_size;
  21. __u64 salt_ptr;
  22. __u32 sig_size;
  23. __u32 __reserved1;
  24. __u64 sig_ptr;
  25. __u64 __reserved2[11];
  26. };
  27. struct fsverity_digest {
  28. __u16 digest_algorithm;
  29. __u16 digest_size; /* input/output */
  30. __u8 digest[];
  31. };
  32. /*
  33. * Struct containing a file's Merkle tree properties. The fs-verity file digest
  34. * is the hash of this struct. A userspace program needs this struct only if it
  35. * needs to compute fs-verity file digests itself, e.g. in order to sign files.
  36. * It isn't needed just to enable fs-verity on a file.
  37. *
  38. * Note: when computing the file digest, 'sig_size' and 'signature' must be left
  39. * zero and empty, respectively. These fields are present only because some
  40. * filesystems reuse this struct as part of their on-disk format.
  41. */
  42. struct fsverity_descriptor {
  43. __u8 version; /* must be 1 */
  44. __u8 hash_algorithm; /* Merkle tree hash algorithm */
  45. __u8 log_blocksize; /* log2 of size of data and tree blocks */
  46. __u8 salt_size; /* size of salt in bytes; 0 if none */
  47. __le32 __reserved_0x04; /* must be 0 */
  48. __le64 data_size; /* size of file the Merkle tree is built over */
  49. __u8 root_hash[64]; /* Merkle tree root hash */
  50. __u8 salt[32]; /* salt prepended to each hashed block */
  51. __u8 __reserved[144]; /* must be 0's */
  52. };
  53. /*
  54. * Format in which fs-verity file digests are signed in built-in signatures.
  55. * This is the same as 'struct fsverity_digest', except here some magic bytes
  56. * are prepended to provide some context about what is being signed in case the
  57. * same key is used for non-fsverity purposes, and here the fields have fixed
  58. * endianness.
  59. *
  60. * This struct is specific to the built-in signature verification support, which
  61. * is optional. fs-verity users may also verify signatures in userspace, in
  62. * which case userspace is responsible for deciding on what bytes are signed.
  63. * This struct may still be used, but it doesn't have to be. For example,
  64. * userspace could instead use a string like "sha256:$digest_as_hex_string".
  65. */
  66. struct fsverity_formatted_digest {
  67. char magic[8]; /* must be "FSVerity" */
  68. __le16 digest_algorithm;
  69. __le16 digest_size;
  70. __u8 digest[];
  71. };
  72. #define FS_VERITY_METADATA_TYPE_MERKLE_TREE 1
  73. #define FS_VERITY_METADATA_TYPE_DESCRIPTOR 2
  74. #define FS_VERITY_METADATA_TYPE_SIGNATURE 3
  75. struct fsverity_read_metadata_arg {
  76. __u64 metadata_type;
  77. __u64 offset;
  78. __u64 length;
  79. __u64 buf_ptr;
  80. __u64 __reserved;
  81. };
  82. #define FS_IOC_ENABLE_VERITY _IOW('f', 133, struct fsverity_enable_arg)
  83. #define FS_IOC_MEASURE_VERITY _IOWR('f', 134, struct fsverity_digest)
  84. #define FS_IOC_READ_VERITY_METADATA \
  85. _IOWR('f', 135, struct fsverity_read_metadata_arg)
  86. #endif /* _LINUX_FSVERITY_H */