Skip to content
Snippets Groups Projects
  1. Jan 20, 2023
  2. Dec 14, 2022
  3. Sep 08, 2022
  4. Aug 16, 2022
  5. Jul 08, 2022
    • Matthias Kaehlcke's avatar
      LoadPin: Enable loading from trusted dm-verity devices · 3f805f8c
      Matthias Kaehlcke authored
      Extend LoadPin to allow loading of kernel files from trusted dm-verity [1]
      devices.
      
      This change adds the concept of trusted verity devices to LoadPin. LoadPin
      maintains a list of root digests of verity devices it considers trusted.
      Userspace can populate this list through an ioctl on the new LoadPin
      securityfs entry 'dm-verity'. The ioctl receives a file descriptor of
      a file with verity digests as parameter. Verity reads the digests from
      this file after confirming that the file is located on the pinned root.
      The digest file must contain one digest per line. The list of trusted
      digests can only be set up once, which is typically done at boot time.
      
      When a kernel file is read LoadPin first checks (as usual) whether the file
      is located on the pinned root, if so the file can be loaded. Otherwise, if
      the verity extension is enabled, LoadPin determines whether the file is
      located on a verity backed device and whether the root digest of that
      device is in the list of trusted digests. The file can be loaded if the
      verity device has a trusted root digest.
      
      Background:
      
      As of now LoadPin restricts loading of kernel files to a single pinned
      filesystem, typically the rootfs. This works for many systems, however it
      can result in a bloated rootfs (and OTA updates) on platforms where
      multiple boards with different hardware configurations use the same rootfs
      image. Especially when 'optional' files are large it may be preferable to
      download/install them only when they are actually needed by a given board.
      Chrome OS uses Downloadable Content (DLC) [2] to deploy certain 'packages'
      at runtime. As an example a DLC package could contain firmware for a
      peripheral that is not present on all boards. DLCs use dm-verity to verify
      the integrity of the DLC content.
      
      [1] https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/verity.html
      [2] https://chromium.googlesource.com/chromiumos/platform2/+/HEAD/dlcservice/docs/developer.md
      
      
      
      Signed-off-by: default avatarMatthias Kaehlcke <mka@chromium.org>
      Acked-by: default avatarMike Snitzer <snitzer@kernel.org>
      Link: https://lore.kernel.org/lkml/20220627083512.v7.2.I01c67af41d2f6525c6d023101671d7339a9bc8b5@changeid
      
      
      Signed-off-by: default avatarKees Cook <keescook@chromium.org>
      3f805f8c
  6. May 17, 2022
  7. Oct 05, 2020
  8. Jun 24, 2020
  9. Jul 19, 2019
  10. Jun 05, 2019
  11. May 31, 2019
  12. May 21, 2019
  13. Jan 08, 2019
  14. Oct 19, 2018
  15. Jul 16, 2018
  16. Feb 22, 2018
  17. Mar 06, 2017
  18. Jan 19, 2017
  19. May 17, 2016
  20. Apr 21, 2016
Loading