From: Gaƫl PORTAY Date: Fri, 25 Dec 2020 08:08:05 +0000 (-0500) Subject: veritysetup: add support for hash-offset option X-Git-Tag: v254-rc1~731^2~2 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=14de7ef914167ed08af6c0fb283e91f25e68b60f;p=thirdparty%2Fsystemd.git veritysetup: add support for hash-offset option The verity parameter hash_area_offset allows to locate the superblock in the hash device. It can be used to have a single device which contains both data and hashes. This adds the option hash-offset=BYTES (sixth argument) which is the equivalent of the option --hash-offset in the veritysetup world. See `veritysetup(8)` for more details. --- diff --git a/man/systemd-veritysetup-generator.xml b/man/systemd-veritysetup-generator.xml index 37ded91a936..6098895f55f 100644 --- a/man/systemd-veritysetup-generator.xml +++ b/man/systemd-veritysetup-generator.xml @@ -85,7 +85,8 @@ systemd.verity_root_options= Takes a comma-separated list of dm-verity options. Expects the following options - , , , + , , + , , , and . See veritysetup8 for more diff --git a/man/veritytab.xml b/man/veritytab.xml index dc2f11c31e2..ec5d0f45a1a 100644 --- a/man/veritytab.xml +++ b/man/veritytab.xml @@ -60,6 +60,13 @@ This is based on crypttab(5). + + + + Offset of hash area/superblock on hash-device. (Multiples of 512 bytes.) + + + diff --git a/src/veritysetup/veritysetup.c b/src/veritysetup/veritysetup.c index ae497b02eef..e1b0e00e421 100644 --- a/src/veritysetup/veritysetup.c +++ b/src/veritysetup/veritysetup.c @@ -10,12 +10,14 @@ #include "hexdecoct.h" #include "log.h" #include "main-func.h" +#include "parse-util.h" #include "path-util.h" #include "pretty-print.h" #include "process-util.h" #include "string-util.h" #include "terminal-util.h" +static uint64_t arg_hash_offset = 0; static uint32_t arg_activate_flags = CRYPT_ACTIVATE_READONLY; static char *arg_root_hash_signature = NULL; @@ -104,7 +106,17 @@ static int parse_options(const char *options) { else if (streq(word, "panic-on-corruption")) arg_activate_flags |= CRYPT_ACTIVATE_PANIC_ON_CORRUPTION; #endif - else if ((val = startswith(word, "root-hash-signature="))) { + else if ((val = startswith(word, "hash-offset="))) { + uint64_t off; + + r = parse_size(val, 1024, &off); + if (r < 0) + return log_error_errno(r, "Failed to parse offset '%s': %m", word); + if (off % 512 != 0) + return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "hash-offset= expects a 512-byte aligned value."); + + arg_hash_offset = off; + } else if ((val = startswith(word, "root-hash-signature="))) { r = save_roothashsig_option(val, /* strict= */ true); if (r < 0) return r; @@ -138,6 +150,7 @@ static int run(int argc, char *argv[]) { if (streq(verb, "attach")) { const char *volume, *data_device, *verity_device, *root_hash, *options; _cleanup_free_ void *m = NULL; + struct crypt_params_verity p = {}; crypt_status_info status; size_t l; @@ -173,9 +186,11 @@ static int run(int argc, char *argv[]) { r = parse_options(options); if (r < 0) return log_error_errno(r, "Failed to parse options: %m"); + + p.hash_area_offset = arg_hash_offset; } - r = crypt_load(cd, CRYPT_VERITY, NULL); + r = crypt_load(cd, CRYPT_VERITY, &p); if (r < 0) return log_error_errno(r, "Failed to load verity superblock: %m");