diff mbox

dm-verity: Add error handling modes for corrupted blocks

Message ID 20150316155559.GA32397@google.com (mailing list archive)
State Superseded, archived
Delegated to: Mike Snitzer
Headers show

Commit Message

Sami Tolvanen March 16, 2015, 3:55 p.m. UTC
Add device specific modes to dm-verity to specify how corrupted
blocks should be handled. The following modes are defined:

  - DM_VERITY_MODE_EIO is the default behavior, where reading a
    corrupted block results in -EIO.

  - DM_VERITY_MODE_LOGGING only logs corrupted blocks, but does
    not block the read.

  - DM_VERITY_MODE_RESTART calls kernel_restart when a corrupted
    block is discovered.

In addition, each mode sends a uevent to notify userspace of
corruption and to allow further recovery actions.

The driver defaults to previous behavior (DM_VERITY_MODE_EIO)
and other modes can be enabled with an additional parameter to
the verity table.

Signed-off-by: Sami Tolvanen <samitolvanen@google.com>

---
 Documentation/device-mapper/verity.txt |   15 ++++-
 drivers/md/dm-verity.c                 |   98 +++++++++++++++++++++++++++++----
 2 files changed, 103 insertions(+), 10 deletions(-)


--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel

Comments

Will Drewry March 16, 2015, 10:13 p.m. UTC | #1
Thanks for posting this!  A few first-pass comments inline:

On Mon, Mar 16, 2015 at 10:55 AM, Sami Tolvanen <samitolvanen@google.com> wrote:
> Add device specific modes to dm-verity to specify how corrupted
> blocks should be handled. The following modes are defined:
>
>   - DM_VERITY_MODE_EIO is the default behavior, where reading a
>     corrupted block results in -EIO.
>
>   - DM_VERITY_MODE_LOGGING only logs corrupted blocks, but does
>     not block the read.
>
>   - DM_VERITY_MODE_RESTART calls kernel_restart when a corrupted
>     block is discovered.
>
> In addition, each mode sends a uevent to notify userspace of
> corruption and to allow further recovery actions.
>
> The driver defaults to previous behavior (DM_VERITY_MODE_EIO)
> and other modes can be enabled with an additional parameter to
> the verity table.
>
> Signed-off-by: Sami Tolvanen <samitolvanen@google.com>
>
> ---
>  Documentation/device-mapper/verity.txt |   15 ++++-
>  drivers/md/dm-verity.c                 |   98 +++++++++++++++++++++++++++++----
>  2 files changed, 103 insertions(+), 10 deletions(-)
>
> diff --git a/Documentation/device-mapper/verity.txt b/Documentation/device-mapper/verity.txt
> index 9884681..470f14c 100644
> --- a/Documentation/device-mapper/verity.txt
> +++ b/Documentation/device-mapper/verity.txt
> @@ -10,7 +10,7 @@ Construction Parameters
>      <version> <dev> <hash_dev>
>      <data_block_size> <hash_block_size>
>      <num_data_blocks> <hash_start_block>
> -    <algorithm> <digest> <salt>
> +    <algorithm> <digest> <salt> <mode>
>
>  <version>
>      This is the type of the on-disk hash format.
> @@ -62,6 +62,19 @@ Construction Parameters
>  <salt>
>      The hexadecimal encoding of the salt value.
>
> +<mode>
> +    Optional. The mode of operation.
> +
> +    0 is the normal mode of operation where a corrupted block will result in an
> +      I/O error.
> +
> +    1 is logging mode where corrupted blocks are logged, but the read operation
> +      will still succeed normally.
> +
> +    2 is restart mode, where a corrupted block will result in the system being
> +      immediately restarted.
> +
> +
>  Theory of operation
>  ===================
>
> diff --git a/drivers/md/dm-verity.c b/drivers/md/dm-verity.c
> index 7a7bab8..ab72062 100644
> --- a/drivers/md/dm-verity.c
> +++ b/drivers/md/dm-verity.c
> @@ -18,20 +18,36 @@
>
>  #include <linux/module.h>
>  #include <linux/device-mapper.h>
> +#include <linux/reboot.h>
>  #include <crypto/hash.h>
>
>  #define DM_MSG_PREFIX                  "verity"
>
> +#define DM_VERITY_ENV_LENGTH           42
> +#define DM_VERITY_ENV_VAR_NAME         "VERITY_ERR_BLOCK_NR"
> +
>  #define DM_VERITY_IO_VEC_INLINE                16
>  #define DM_VERITY_MEMPOOL_SIZE         4
>  #define DM_VERITY_DEFAULT_PREFETCH_SIZE        262144
>
>  #define DM_VERITY_MAX_LEVELS           63
> +#define DM_VERITY_MAX_CORRUPTED_ERRS   100
>
>  static unsigned dm_verity_prefetch_cluster = DM_VERITY_DEFAULT_PREFETCH_SIZE;
>
>  module_param_named(prefetch_cluster, dm_verity_prefetch_cluster, uint, S_IRUGO | S_IWUSR);
>
> +enum verity_mode {
> +       DM_VERITY_MODE_EIO = 0,
> +       DM_VERITY_MODE_LOGGING = 1,
> +       DM_VERITY_MODE_RESTART = 2
> +};
> +
> +enum verity_block_type {
> +       DM_VERITY_BLOCK_TYPE_DATA,
> +       DM_VERITY_BLOCK_TYPE_METADATA
> +};
> +
>  struct dm_verity {
>         struct dm_dev *data_dev;
>         struct dm_dev *hash_dev;
> @@ -54,6 +70,8 @@ struct dm_verity {
>         unsigned digest_size;   /* digest size for the current hash algorithm */
>         unsigned shash_descsize;/* the size of temporary space for crypto */
>         int hash_failed;        /* set to 1 if hash of any block failed */
> +       enum verity_mode mode;  /* mode for handling verification errors */
> +       unsigned corrupted_errs;/* Number of errors for corrupted blocks */
>
>         mempool_t *vec_mempool; /* mempool of bio vector */
>
> @@ -175,6 +193,54 @@ static void verity_hash_at_level(struct dm_verity *v, sector_t block, int level,
>  }
>
>  /*
> + * Handle verification errors.
> + */
> +static int verity_handle_err(struct dm_verity *v, enum verity_block_type type,
> +                                unsigned long long block)
> +{
> +       char verity_env[DM_VERITY_ENV_LENGTH];
> +       char *envp[] = { verity_env, NULL };
> +       const char *type_str = "";
> +       struct mapped_device *md = dm_table_get_md(v->ti->table);
> +
> +       if (v->corrupted_errs >= DM_VERITY_MAX_CORRUPTED_ERRS)
> +               goto out;
> +
> +       ++v->corrupted_errs;
> +

The conditional and increment should be moved below the DMERR_LIMIT().
Otherwise, no logging
will occur in non-logging modes. This would be a change from how the
default "eio" mode behaves today.

> +       switch (type) {
> +       case DM_VERITY_BLOCK_TYPE_DATA:
> +               type_str = "data";
> +               break;
> +       case DM_VERITY_BLOCK_TYPE_METADATA:
> +               type_str = "metadata";
> +               break;
> +       default:
> +               BUG();
> +       }
> +
> +       DMERR_LIMIT("%s: %s block %llu is corrupted", v->data_dev->name,
> +               type_str, block);

Perhaps it'd make sense to consider whether to use DMERR_LIMIT or not
depending on if the mode is logging.  Otherwise you may get weird
interactions from having two different limits.

> +
> +       if (v->corrupted_errs == DM_VERITY_MAX_CORRUPTED_ERRS)
> +               DMERR("%s: reached maximum errors", v->data_dev->name);
> +
> +       snprintf(verity_env, DM_VERITY_ENV_LENGTH, "%s=%d,%llu",
> +               DM_VERITY_ENV_VAR_NAME, type, block);
> +
> +       kobject_uevent_env(&disk_to_dev(dm_disk(md))->kobj, KOBJ_CHANGE, envp);
> +
> +out:
> +       if (v->mode == DM_VERITY_MODE_LOGGING)
> +               return 0;
> +
> +       if (v->mode == DM_VERITY_MODE_RESTART)
> +               kernel_restart("dm-verity device corrupted");
> +
> +       return 1;
> +}
> +
> +/*
>   * Verify hash of a metadata block pertaining to the specified data block
>   * ("block" argument) at a specified level ("level" argument).
>   *
> @@ -251,11 +317,13 @@ static int verity_verify_level(struct dm_verity_io *io, sector_t block,
>                         goto release_ret_r;
>                 }
>                 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) {
> -                       DMERR_LIMIT("metadata block %llu is corrupted",
> -                               (unsigned long long)hash_block);
>                         v->hash_failed = 1;

Should the dm status reflect the failure even if logging mode isn't
returning EIOs? I think it makes sense still, but it might be good to
note that it is intentionally kept this way.

> -                       r = -EIO;
> -                       goto release_ret_r;
> +
> +                       if (verity_handle_err(v, DM_VERITY_BLOCK_TYPE_METADATA,
> +                                             hash_block)) {
> +                               r = -EIO;
> +                               goto release_ret_r;
> +                       }
>                 } else
>                         aux->hash_verified = 1;
>         }
> @@ -367,10 +435,11 @@ test_block_hash:
>                         return r;
>                 }
>                 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) {
> -                       DMERR_LIMIT("data block %llu is corrupted",
> -                               (unsigned long long)(io->block + b));
>                         v->hash_failed = 1;

Ditto

> -                       return -EIO;
> +
> +                       if (verity_handle_err(v, DM_VERITY_BLOCK_TYPE_DATA,
> +                                             io->block + b))
> +                               return -EIO;
>                 }
>         }
>
> @@ -668,8 +737,8 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>                 goto bad;
>         }
>
> -       if (argc != 10) {
> -               ti->error = "Invalid argument count: exactly 10 arguments required";
> +       if (argc < 10 || argc > 11) {
> +               ti->error = "Invalid argument count: 10-11 arguments required";
>                 r = -EINVAL;
>                 goto bad;
>         }
> @@ -790,6 +859,17 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>                 }
>         }
>
> +       if (argc > 10) {
> +               if (sscanf(argv[10], "%d%c", &num, &dummy) != 1 ||
> +                       num < DM_VERITY_MODE_EIO ||
> +                       num > DM_VERITY_MODE_RESTART) {
> +                       ti->error = "Invalid mode";
> +                       r = -EINVAL;
> +                       goto bad;
> +               }
> +               v->mode = num;
> +       }
> +
>         v->hash_per_block_bits =
>                 __fls((1 << v->hash_dev_block_bits) / v->digest_size);
>

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Alasdair G Kergon March 17, 2015, 12:37 a.m. UTC | #2
On Mon, Mar 16, 2015 at 03:55:59PM +0000, Sami Tolvanen wrote:
> +<mode>
> +    Optional. The mode of operation.
> +    0 is the normal mode of operation where a corrupted block will result in an

The usual dm style uses a word rather than hiding behind a numeric code that has
to be learned or looked up.

> +#define DM_VERITY_ENV_VAR_NAME		"VERITY_ERR_BLOCK_NR"

Missing DM_ prefix?

Alasdair

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Alasdair G Kergon March 17, 2015, 12:45 a.m. UTC | #3
On Mon, Mar 16, 2015 at 05:13:10PM -0500, Will Drewry wrote:
> Should the dm status reflect the failure even if logging mode isn't
> returning EIOs? I think it makes sense still, but it might be good to
 
The uevents shouldn't be relied upon: 'status' must still tell you
everything you need to know about the internal state of the device.

'table' should show the new parameter and 'status' should probably show
it too if it's needed to interpret the 'status' properly.

Alasdair

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Sami Tolvanen March 17, 2015, 10:23 a.m. UTC | #4
On Mon, Mar 16, 2015 at 05:13:10PM -0500, Will Drewry wrote:
> > +       if (v->corrupted_errs >= DM_VERITY_MAX_CORRUPTED_ERRS)
> > +               goto out;
> > +
> > +       ++v->corrupted_errs;
> > +
> 
> The conditional and increment should be moved below the DMERR_LIMIT().
> Otherwise, no logging will occur in non-logging modes.

This only limits the maximum number of logged errors, but until it's reached,
it does log them in all modes.

> This would be a change from how the default "eio" mode behaves today.

The only difference is that it will stop logging after reaching the maximum.

> > +       DMERR_LIMIT("%s: %s block %llu is corrupted", v->data_dev->name,
> > +               type_str, block);
> 
> Perhaps it'd make sense to consider whether to use DMERR_LIMIT or not
> depending on if the mode is logging.  Otherwise you may get weird
> interactions from having two different limits.

My intention was initially to use DMERR_LIMIT to handle error bursts, but you
are correct, it's not needed. I'll change this to DMERR in v2.

> >                         v->hash_failed = 1;
> 
> Should the dm status reflect the failure even if logging mode isn't
> returning EIOs? I think it makes sense still, but it might be good to
> note that it is intentionally kept this way.

Yes, I think it makes sense. We should be able to check the device status and
see if there have been corrupted blocks even in logging mode. I will move this
to the error handling function and add a note about it.

Sami

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Sami Tolvanen March 17, 2015, 10:35 a.m. UTC | #5
On Tue, Mar 17, 2015 at 12:45:55AM +0000, Alasdair G Kergon wrote:
> 'table' should show the new parameter and 'status' should probably show
> it too if it's needed to interpret the 'status' properly.

Good point, I will add it to 'table' in v2. I doubt it's necessary in 'status'
though, userspace should be able to decide how to handle errors without it.

Sami

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Sami Tolvanen March 17, 2015, 10:36 a.m. UTC | #6
On Tue, Mar 17, 2015 at 12:37:47AM +0000, Alasdair G Kergon wrote:
> The usual dm style uses a word rather than hiding behind a numeric code that has
> to be learned or looked up.

> Missing DM_ prefix?

Thanks for the comments, I will fix these in the next version.

Sami

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Vivek Goyal March 17, 2015, 3:27 p.m. UTC | #7
On Mon, Mar 16, 2015 at 03:55:59PM +0000, Sami Tolvanen wrote:
> Add device specific modes to dm-verity to specify how corrupted
> blocks should be handled. The following modes are defined:
> 
>   - DM_VERITY_MODE_EIO is the default behavior, where reading a
>     corrupted block results in -EIO.
> 
>   - DM_VERITY_MODE_LOGGING only logs corrupted blocks, but does
>     not block the read.
> 
>   - DM_VERITY_MODE_RESTART calls kernel_restart when a corrupted
>     block is discovered.

What's the idea behind kernel restart mode ? If a corrupted block is in
the path of boot, will we not get into a continuous reboot cycle.

Thanks
Vivek

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Sami Tolvanen March 17, 2015, 4:06 p.m. UTC | #8
On Tue, Mar 17, 2015 at 11:27:49AM -0400, Vivek Goyal wrote:
> What's the idea behind kernel restart mode ? If a corrupted block is in
> the path of boot, will we not get into a continuous reboot cycle.

It depends on how dm-verity is used. If we have PSTORE_CONSOLE enabled, for
example, after a restart we can check if the restart was caused by dm-verity
and then use a different mode when setting up the verity device. Most likely
for some systems this is not a reasonable recovery method, but we find it to
be useful on Android at least.

Sami

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Vivek Goyal March 17, 2015, 6:03 p.m. UTC | #9
On Tue, Mar 17, 2015 at 04:06:49PM +0000, Sami Tolvanen wrote:
> On Tue, Mar 17, 2015 at 11:27:49AM -0400, Vivek Goyal wrote:
> > What's the idea behind kernel restart mode ? If a corrupted block is in
> > the path of boot, will we not get into a continuous reboot cycle.
> 
> It depends on how dm-verity is used. If we have PSTORE_CONSOLE enabled, for
> example, after a restart we can check if the restart was caused by dm-verity
> and then use a different mode when setting up the verity device. Most likely
> for some systems this is not a reasonable recovery method, but we find it to
> be useful on Android at least.

Ok.

Without knowing too much of detail, asking kernel to restart because one
block was corrupt sounds little drastic. If you are sending user space
events, why not let user space initiate the start and manage policy in
user space.

Thanks
Vivek

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Sami Tolvanen March 18, 2015, 1:24 p.m. UTC | #10
On Tue, Mar 17, 2015 at 02:03:58PM -0400, Vivek Goyal wrote:
> Without knowing too much of detail, asking kernel to restart because one
> block was corrupt sounds little drastic.
 
I agree, it's drastic, but in our use case it's necessary, because we have
critical system data on a verified partition. Depending on which blocks are
corrupted, the system may no longer be functional at this point.

> If you are sending user space events, why not let user space initiate the
> start and manage policy in user space.

We already manage policy in user space by determining in which mode dm-verity
will start. Restarting from user space is possible, but it would rely on the
uevent being reliably processed and the daemon responsible for restarting the
device not being blocked by the lack of access to corrupted data. We find
restarting from the dm-verity driver to be more reliable.

Sami

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Mikulas Patocka March 18, 2015, 3:42 p.m. UTC | #11
On Wed, 18 Mar 2015, Sami Tolvanen wrote:

> On Tue, Mar 17, 2015 at 02:03:58PM -0400, Vivek Goyal wrote:
> > Without knowing too much of detail, asking kernel to restart because one
> > block was corrupt sounds little drastic.
>  
> I agree, it's drastic, but in our use case it's necessary, because we have
> critical system data on a verified partition. Depending on which blocks are
> corrupted, the system may no longer be functional at this point.

As a user, I'd rather have half-functioning device where I can at least 
try to recover some data than a non-functioning device that continuously 
reboots.

I hope that you at least turn this feature off after a few reboots and 
give the user a chance to save his data.

Mikulas

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
Sami Tolvanen March 18, 2015, 3:49 p.m. UTC | #12
On Wed, Mar 18, 2015 at 11:42:47AM -0400, Mikulas Patocka wrote:
> I hope that you at least turn this feature off after a few reboots and 
> give the user a chance to save his data.

Of course. We prompt the user after the reboot and ask them if they want
to proceed using the device without verification. We don't want to disable
verification before the user has been notified though.

Sami

--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
diff mbox

Patch

diff --git a/Documentation/device-mapper/verity.txt b/Documentation/device-mapper/verity.txt
index 9884681..470f14c 100644
--- a/Documentation/device-mapper/verity.txt
+++ b/Documentation/device-mapper/verity.txt
@@ -10,7 +10,7 @@  Construction Parameters
     <version> <dev> <hash_dev>
     <data_block_size> <hash_block_size>
     <num_data_blocks> <hash_start_block>
-    <algorithm> <digest> <salt>
+    <algorithm> <digest> <salt> <mode>
 
 <version>
     This is the type of the on-disk hash format.
@@ -62,6 +62,19 @@  Construction Parameters
 <salt>
     The hexadecimal encoding of the salt value.
 
+<mode>
+    Optional. The mode of operation.
+
+    0 is the normal mode of operation where a corrupted block will result in an
+      I/O error.
+
+    1 is logging mode where corrupted blocks are logged, but the read operation
+      will still succeed normally.
+
+    2 is restart mode, where a corrupted block will result in the system being
+      immediately restarted.
+
+
 Theory of operation
 ===================
 
diff --git a/drivers/md/dm-verity.c b/drivers/md/dm-verity.c
index 7a7bab8..ab72062 100644
--- a/drivers/md/dm-verity.c
+++ b/drivers/md/dm-verity.c
@@ -18,20 +18,36 @@ 
 
 #include <linux/module.h>
 #include <linux/device-mapper.h>
+#include <linux/reboot.h>
 #include <crypto/hash.h>
 
 #define DM_MSG_PREFIX			"verity"
 
+#define DM_VERITY_ENV_LENGTH		42
+#define DM_VERITY_ENV_VAR_NAME		"VERITY_ERR_BLOCK_NR"
+
 #define DM_VERITY_IO_VEC_INLINE		16
 #define DM_VERITY_MEMPOOL_SIZE		4
 #define DM_VERITY_DEFAULT_PREFETCH_SIZE	262144
 
 #define DM_VERITY_MAX_LEVELS		63
+#define DM_VERITY_MAX_CORRUPTED_ERRS	100
 
 static unsigned dm_verity_prefetch_cluster = DM_VERITY_DEFAULT_PREFETCH_SIZE;
 
 module_param_named(prefetch_cluster, dm_verity_prefetch_cluster, uint, S_IRUGO | S_IWUSR);
 
+enum verity_mode {
+	DM_VERITY_MODE_EIO = 0,
+	DM_VERITY_MODE_LOGGING = 1,
+	DM_VERITY_MODE_RESTART = 2
+};
+
+enum verity_block_type {
+	DM_VERITY_BLOCK_TYPE_DATA,
+	DM_VERITY_BLOCK_TYPE_METADATA
+};
+
 struct dm_verity {
 	struct dm_dev *data_dev;
 	struct dm_dev *hash_dev;
@@ -54,6 +70,8 @@  struct dm_verity {
 	unsigned digest_size;	/* digest size for the current hash algorithm */
 	unsigned shash_descsize;/* the size of temporary space for crypto */
 	int hash_failed;	/* set to 1 if hash of any block failed */
+	enum verity_mode mode;	/* mode for handling verification errors */
+	unsigned corrupted_errs;/* Number of errors for corrupted blocks */
 
 	mempool_t *vec_mempool;	/* mempool of bio vector */
 
@@ -175,6 +193,54 @@  static void verity_hash_at_level(struct dm_verity *v, sector_t block, int level,
 }
 
 /*
+ * Handle verification errors.
+ */
+static int verity_handle_err(struct dm_verity *v, enum verity_block_type type,
+				 unsigned long long block)
+{
+	char verity_env[DM_VERITY_ENV_LENGTH];
+	char *envp[] = { verity_env, NULL };
+	const char *type_str = "";
+	struct mapped_device *md = dm_table_get_md(v->ti->table);
+
+	if (v->corrupted_errs >= DM_VERITY_MAX_CORRUPTED_ERRS)
+		goto out;
+
+	++v->corrupted_errs;
+
+	switch (type) {
+	case DM_VERITY_BLOCK_TYPE_DATA:
+		type_str = "data";
+		break;
+	case DM_VERITY_BLOCK_TYPE_METADATA:
+		type_str = "metadata";
+		break;
+	default:
+		BUG();
+	}
+
+	DMERR_LIMIT("%s: %s block %llu is corrupted", v->data_dev->name,
+		type_str, block);
+
+	if (v->corrupted_errs == DM_VERITY_MAX_CORRUPTED_ERRS)
+		DMERR("%s: reached maximum errors", v->data_dev->name);
+
+	snprintf(verity_env, DM_VERITY_ENV_LENGTH, "%s=%d,%llu",
+		DM_VERITY_ENV_VAR_NAME, type, block);
+
+	kobject_uevent_env(&disk_to_dev(dm_disk(md))->kobj, KOBJ_CHANGE, envp);
+
+out:
+	if (v->mode == DM_VERITY_MODE_LOGGING)
+		return 0;
+
+	if (v->mode == DM_VERITY_MODE_RESTART)
+		kernel_restart("dm-verity device corrupted");
+
+	return 1;
+}
+
+/*
  * Verify hash of a metadata block pertaining to the specified data block
  * ("block" argument) at a specified level ("level" argument).
  *
@@ -251,11 +317,13 @@  static int verity_verify_level(struct dm_verity_io *io, sector_t block,
 			goto release_ret_r;
 		}
 		if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) {
-			DMERR_LIMIT("metadata block %llu is corrupted",
-				(unsigned long long)hash_block);
 			v->hash_failed = 1;
-			r = -EIO;
-			goto release_ret_r;
+
+			if (verity_handle_err(v, DM_VERITY_BLOCK_TYPE_METADATA,
+					      hash_block)) {
+				r = -EIO;
+				goto release_ret_r;
+			}
 		} else
 			aux->hash_verified = 1;
 	}
@@ -367,10 +435,11 @@  test_block_hash:
 			return r;
 		}
 		if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) {
-			DMERR_LIMIT("data block %llu is corrupted",
-				(unsigned long long)(io->block + b));
 			v->hash_failed = 1;
-			return -EIO;
+
+			if (verity_handle_err(v, DM_VERITY_BLOCK_TYPE_DATA,
+					      io->block + b))
+				return -EIO;
 		}
 	}
 
@@ -668,8 +737,8 @@  static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
 		goto bad;
 	}
 
-	if (argc != 10) {
-		ti->error = "Invalid argument count: exactly 10 arguments required";
+	if (argc < 10 || argc > 11) {
+		ti->error = "Invalid argument count: 10-11 arguments required";
 		r = -EINVAL;
 		goto bad;
 	}
@@ -790,6 +859,17 @@  static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
 		}
 	}
 
+	if (argc > 10) {
+		if (sscanf(argv[10], "%d%c", &num, &dummy) != 1 ||
+			num < DM_VERITY_MODE_EIO ||
+			num > DM_VERITY_MODE_RESTART) {
+			ti->error = "Invalid mode";
+			r = -EINVAL;
+			goto bad;
+		}
+		v->mode = num;
+	}
+
 	v->hash_per_block_bits =
 		__fls((1 << v->hash_dev_block_bits) / v->digest_size);