Message ID | 20190606155205.2872-5-ebiggers@kernel.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | fs-verity: read-only file-based authenticity protection | expand |
On Thu, Jun 06, 2019 at 08:51:53AM -0700, Eric Biggers wrote: > From: Eric Biggers <ebiggers@google.com> > > Add FS_VERITY_FL to the flags for FS_IOC_GETFLAGS, so that applications > can easily determine whether a file is a verity file at the same time as > they're checking other file flags. This flag will be gettable only; > FS_IOC_SETFLAGS won't allow setting it, since an ioctl must be used > instead to provide more parameters. > > This flag matches the on-disk bit that was already allocated for ext4. > > Signed-off-by: Eric Biggers <ebiggers@google.com> Looks good; you can add: Reviewed-off-by: Theodore Ts'o <tytso@mit.edu> - Ted
diff --git a/include/uapi/linux/fs.h b/include/uapi/linux/fs.h index 59c71fa8c553..df261b7e0587 100644 --- a/include/uapi/linux/fs.h +++ b/include/uapi/linux/fs.h @@ -306,6 +306,7 @@ struct fscrypt_key { #define FS_TOPDIR_FL 0x00020000 /* Top of directory hierarchies*/ #define FS_HUGE_FILE_FL 0x00040000 /* Reserved for ext4 */ #define FS_EXTENT_FL 0x00080000 /* Extents */ +#define FS_VERITY_FL 0x00100000 /* Verity protected inode */ #define FS_EA_INODE_FL 0x00200000 /* Inode used for large EA */ #define FS_EOFBLOCKS_FL 0x00400000 /* Reserved for ext4 */ #define FS_NOCOW_FL 0x00800000 /* Do not cow file */