mirror of https://github.com/OpenIPC/firmware.git
268 lines
7.6 KiB
Diff
268 lines
7.6 KiB
Diff
diff -drupN a/drivers/md/dm-verity-target.c b/drivers/md/dm-verity-target.c
|
|
--- a/drivers/md/dm-verity-target.c 2018-08-06 17:23:04.000000000 +0300
|
|
+++ b/drivers/md/dm-verity-target.c 2022-06-12 05:28:14.000000000 +0300
|
|
@@ -19,6 +19,7 @@
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/reboot.h>
|
|
+#include <linux/vmalloc.h>
|
|
|
|
#define DM_MSG_PREFIX "verity"
|
|
|
|
@@ -32,6 +33,7 @@
|
|
#define DM_VERITY_OPT_LOGGING "ignore_corruption"
|
|
#define DM_VERITY_OPT_RESTART "restart_on_corruption"
|
|
#define DM_VERITY_OPT_IGN_ZEROES "ignore_zero_blocks"
|
|
+#define DM_VERITY_OPT_AT_MOST_ONCE "check_at_most_once"
|
|
|
|
#define DM_VERITY_OPTS_MAX (2 + DM_VERITY_OPTS_FEC)
|
|
|
|
@@ -395,6 +397,18 @@ static int verity_bv_zero(struct dm_veri
|
|
}
|
|
|
|
/*
|
|
+ * Moves the bio iter one data block forward.
|
|
+ */
|
|
+static inline void verity_bv_skip_block(struct dm_verity *v,
|
|
+ struct dm_verity_io *io,
|
|
+ struct bvec_iter *iter)
|
|
+{
|
|
+ struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size);
|
|
+
|
|
+ bio_advance_iter(bio, iter, 1 << v->data_dev_block_bits);
|
|
+}
|
|
+
|
|
+/*
|
|
* Verify one "dm_verity_io" structure.
|
|
*/
|
|
static int verity_verify_io(struct dm_verity_io *io)
|
|
@@ -406,9 +420,16 @@ static int verity_verify_io(struct dm_ve
|
|
|
|
for (b = 0; b < io->n_blocks; b++) {
|
|
int r;
|
|
+ sector_t cur_block = io->block + b;
|
|
struct shash_desc *desc = verity_io_hash_desc(v, io);
|
|
|
|
- r = verity_hash_for_block(v, io, io->block + b,
|
|
+ if (v->validated_blocks &&
|
|
+ likely(test_bit(cur_block, v->validated_blocks))) {
|
|
+ verity_bv_skip_block(v, io, &io->iter);
|
|
+ continue;
|
|
+ }
|
|
+
|
|
+ r = verity_hash_for_block(v, io, cur_block,
|
|
verity_io_want_digest(v, io),
|
|
&is_zero);
|
|
if (unlikely(r < 0))
|
|
@@ -441,13 +462,16 @@ static int verity_verify_io(struct dm_ve
|
|
return r;
|
|
|
|
if (likely(memcmp(verity_io_real_digest(v, io),
|
|
- verity_io_want_digest(v, io), v->digest_size) == 0))
|
|
+ verity_io_want_digest(v, io), v->digest_size) == 0)) {
|
|
+ if (v->validated_blocks)
|
|
+ set_bit(cur_block, v->validated_blocks);
|
|
continue;
|
|
+ }
|
|
else if (verity_fec_decode(v, io, DM_VERITY_BLOCK_TYPE_DATA,
|
|
- io->block + b, NULL, &start) == 0)
|
|
+ cur_block, NULL, &start) == 0)
|
|
continue;
|
|
else if (verity_handle_err(v, DM_VERITY_BLOCK_TYPE_DATA,
|
|
- io->block + b))
|
|
+ cur_block))
|
|
return -EIO;
|
|
}
|
|
|
|
@@ -501,6 +525,7 @@ static void verity_prefetch_io(struct wo
|
|
container_of(work, struct dm_verity_prefetch_work, work);
|
|
struct dm_verity *v = pw->v;
|
|
int i;
|
|
+ sector_t prefetch_size;
|
|
|
|
for (i = v->levels - 2; i >= 0; i--) {
|
|
sector_t hash_block_start;
|
|
@@ -523,8 +548,14 @@ static void verity_prefetch_io(struct wo
|
|
hash_block_end = v->hash_blocks - 1;
|
|
}
|
|
no_prefetch_cluster:
|
|
+ // for emmc, it is more efficient to send bigger read
|
|
+ prefetch_size = max((sector_t)CONFIG_DM_VERITY_HASH_PREFETCH_MIN_SIZE,
|
|
+ hash_block_end - hash_block_start + 1);
|
|
+ if ((hash_block_start + prefetch_size) >= (v->hash_start + v->hash_blocks)) {
|
|
+ prefetch_size = hash_block_end - hash_block_start + 1;
|
|
+ }
|
|
dm_bufio_prefetch(v->bufio, hash_block_start,
|
|
- hash_block_end - hash_block_start + 1);
|
|
+ prefetch_size);
|
|
}
|
|
|
|
kfree(pw);
|
|
@@ -551,7 +582,7 @@ static void verity_submit_prefetch(struc
|
|
* Bio map function. It allocates dm_verity_io structure and bio vector and
|
|
* fills them. Then it issues prefetches and the I/O.
|
|
*/
|
|
-static int verity_map(struct dm_target *ti, struct bio *bio)
|
|
+int verity_map(struct dm_target *ti, struct bio *bio)
|
|
{
|
|
struct dm_verity *v = ti->private;
|
|
struct dm_verity_io *io;
|
|
@@ -592,11 +623,12 @@ static int verity_map(struct dm_target *
|
|
|
|
return DM_MAPIO_SUBMITTED;
|
|
}
|
|
+EXPORT_SYMBOL_GPL(verity_map);
|
|
|
|
/*
|
|
* Status: V (valid) or C (corruption found)
|
|
*/
|
|
-static void verity_status(struct dm_target *ti, status_type_t type,
|
|
+void verity_status(struct dm_target *ti, status_type_t type,
|
|
unsigned status_flags, char *result, unsigned maxlen)
|
|
{
|
|
struct dm_verity *v = ti->private;
|
|
@@ -633,6 +665,8 @@ static void verity_status(struct dm_targ
|
|
args += DM_VERITY_OPTS_FEC;
|
|
if (v->zero_digest)
|
|
args++;
|
|
+ if (v->validated_blocks)
|
|
+ args++;
|
|
if (!args)
|
|
return;
|
|
DMEMIT(" %u", args);
|
|
@@ -651,12 +685,15 @@ static void verity_status(struct dm_targ
|
|
}
|
|
if (v->zero_digest)
|
|
DMEMIT(" " DM_VERITY_OPT_IGN_ZEROES);
|
|
+ if (v->validated_blocks)
|
|
+ DMEMIT(" " DM_VERITY_OPT_AT_MOST_ONCE);
|
|
sz = verity_fec_status_table(v, sz, result, maxlen);
|
|
break;
|
|
}
|
|
}
|
|
+EXPORT_SYMBOL_GPL(verity_status);
|
|
|
|
-static int verity_prepare_ioctl(struct dm_target *ti,
|
|
+int verity_prepare_ioctl(struct dm_target *ti,
|
|
struct block_device **bdev, fmode_t *mode)
|
|
{
|
|
struct dm_verity *v = ti->private;
|
|
@@ -668,16 +705,18 @@ static int verity_prepare_ioctl(struct d
|
|
return 1;
|
|
return 0;
|
|
}
|
|
+EXPORT_SYMBOL_GPL(verity_prepare_ioctl);
|
|
|
|
-static int verity_iterate_devices(struct dm_target *ti,
|
|
+int verity_iterate_devices(struct dm_target *ti,
|
|
iterate_devices_callout_fn fn, void *data)
|
|
{
|
|
struct dm_verity *v = ti->private;
|
|
|
|
return fn(ti, v->data_dev, v->data_start, ti->len, data);
|
|
}
|
|
+EXPORT_SYMBOL_GPL(verity_iterate_devices);
|
|
|
|
-static void verity_io_hints(struct dm_target *ti, struct queue_limits *limits)
|
|
+void verity_io_hints(struct dm_target *ti, struct queue_limits *limits)
|
|
{
|
|
struct dm_verity *v = ti->private;
|
|
|
|
@@ -689,8 +728,9 @@ static void verity_io_hints(struct dm_ta
|
|
|
|
blk_limits_io_min(limits, limits->logical_block_size);
|
|
}
|
|
+EXPORT_SYMBOL_GPL(verity_io_hints);
|
|
|
|
-static void verity_dtr(struct dm_target *ti)
|
|
+void verity_dtr(struct dm_target *ti)
|
|
{
|
|
struct dm_verity *v = ti->private;
|
|
|
|
@@ -700,6 +740,7 @@ static void verity_dtr(struct dm_target
|
|
if (v->bufio)
|
|
dm_bufio_client_destroy(v->bufio);
|
|
|
|
+ vfree(v->validated_blocks);
|
|
kfree(v->salt);
|
|
kfree(v->root_digest);
|
|
kfree(v->zero_digest);
|
|
@@ -719,6 +760,27 @@ static void verity_dtr(struct dm_target
|
|
|
|
kfree(v);
|
|
}
|
|
+EXPORT_SYMBOL_GPL(verity_dtr);
|
|
+
|
|
+static int verity_alloc_most_once(struct dm_verity *v)
|
|
+{
|
|
+ struct dm_target *ti = v->ti;
|
|
+
|
|
+ /* the bitset can only handle INT_MAX blocks */
|
|
+ if (v->data_blocks > INT_MAX) {
|
|
+ ti->error = "device too large to use check_at_most_once";
|
|
+ return -E2BIG;
|
|
+ }
|
|
+
|
|
+ v->validated_blocks = vzalloc(BITS_TO_LONGS(v->data_blocks) *
|
|
+ sizeof(unsigned long));
|
|
+ if (!v->validated_blocks) {
|
|
+ ti->error = "failed to allocate bitset for check_at_most_once";
|
|
+ return -ENOMEM;
|
|
+ }
|
|
+
|
|
+ return 0;
|
|
+}
|
|
|
|
static int verity_alloc_zero_digest(struct dm_verity *v)
|
|
{
|
|
@@ -789,6 +851,12 @@ static int verity_parse_opt_args(struct
|
|
}
|
|
continue;
|
|
|
|
+ } else if (!strcasecmp(arg_name, DM_VERITY_OPT_AT_MOST_ONCE)) {
|
|
+ r = verity_alloc_most_once(v);
|
|
+ if (r)
|
|
+ return r;
|
|
+ continue;
|
|
+
|
|
} else if (verity_is_fec_opt_arg(arg_name)) {
|
|
r = verity_fec_parse_opt_args(as, v, &argc, arg_name);
|
|
if (r)
|
|
@@ -817,7 +885,7 @@ static int verity_parse_opt_args(struct
|
|
* <digest>
|
|
* <salt> Hex string or "-" if no salt.
|
|
*/
|
|
-static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
|
|
+int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
|
|
{
|
|
struct dm_verity *v;
|
|
struct dm_arg_set as;
|
|
@@ -981,6 +1049,14 @@ static int verity_ctr(struct dm_target *
|
|
goto bad;
|
|
}
|
|
|
|
+#ifdef CONFIG_DM_ANDROID_VERITY_AT_MOST_ONCE_DEFAULT_ENABLED
|
|
+ if (!v->validated_blocks) {
|
|
+ r = verity_alloc_most_once(v);
|
|
+ if (r)
|
|
+ goto bad;
|
|
+ }
|
|
+#endif
|
|
+
|
|
v->hash_per_block_bits =
|
|
__fls((1 << v->hash_dev_block_bits) / v->digest_size);
|
|
|
|
@@ -1053,10 +1129,11 @@ bad:
|
|
|
|
return r;
|
|
}
|
|
+EXPORT_SYMBOL_GPL(verity_ctr);
|
|
|
|
static struct target_type verity_target = {
|
|
.name = "verity",
|
|
- .version = {1, 3, 0},
|
|
+ .version = {1, 4, 0},
|
|
.module = THIS_MODULE,
|
|
.ctr = verity_ctr,
|
|
.dtr = verity_dtr,
|