mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-19 18:24:14 +08:00
88cd3e6cfa
The verification is to support cases where the root hash is not secured by Trusted Boot, UEFI Secureboot or similar technologies. One of the use cases for this is for dm-verity volumes mounted after boot, the root hash provided during the creation of the dm-verity volume has to be secure and thus in-kernel validation implemented here will be used before we trust the root hash and allow the block device to be created. The signature being provided for verification must verify the root hash and must be trusted by the builtin keyring for verification to succeed. The hash is added as a key of type "user" and the description is passed to the kernel so it can look it up and use it for verification. Adds CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG which can be turned on if root hash verification is needed. Kernel commandline dm_verity module parameter 'require_signatures' will indicate whether to force root hash signature verification (for all dm verity volumes). Signed-off-by: Jaskaran Khurana <jaskarankhurana@linux.microsoft.com> Tested-and-Reviewed-by: Milan Broz <gmazyland@gmail.com> Signed-off-by: Mike Snitzer <snitzer@redhat.com>
61 lines
1.6 KiB
C
61 lines
1.6 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Copyright (C) 2019 Microsoft Corporation.
|
|
*
|
|
* Author: Jaskaran Singh Khurana <jaskarankhurana@linux.microsoft.com>
|
|
*
|
|
*/
|
|
#ifndef DM_VERITY_SIG_VERIFICATION_H
|
|
#define DM_VERITY_SIG_VERIFICATION_H
|
|
|
|
#define DM_VERITY_ROOT_HASH_VERIFICATION "DM Verity Sig Verification"
|
|
#define DM_VERITY_ROOT_HASH_VERIFICATION_OPT_SIG_KEY "root_hash_sig_key_desc"
|
|
|
|
struct dm_verity_sig_opts {
|
|
unsigned int sig_size;
|
|
u8 *sig;
|
|
};
|
|
|
|
#ifdef CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG
|
|
|
|
#define DM_VERITY_ROOT_HASH_VERIFICATION_OPTS 2
|
|
|
|
int verity_verify_root_hash(const void *data, size_t data_len,
|
|
const void *sig_data, size_t sig_len);
|
|
bool verity_verify_is_sig_opt_arg(const char *arg_name);
|
|
|
|
int verity_verify_sig_parse_opt_args(struct dm_arg_set *as, struct dm_verity *v,
|
|
struct dm_verity_sig_opts *sig_opts,
|
|
unsigned int *argc, const char *arg_name);
|
|
|
|
void verity_verify_sig_opts_cleanup(struct dm_verity_sig_opts *sig_opts);
|
|
|
|
#else
|
|
|
|
#define DM_VERITY_ROOT_HASH_VERIFICATION_OPTS 0
|
|
|
|
int verity_verify_root_hash(const void *data, size_t data_len,
|
|
const void *sig_data, size_t sig_len)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
bool verity_verify_is_sig_opt_arg(const char *arg_name)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
int verity_verify_sig_parse_opt_args(struct dm_arg_set *as, struct dm_verity *v,
|
|
struct dm_verity_sig_opts *sig_opts,
|
|
unsigned int *argc, const char *arg_name)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
void verity_verify_sig_opts_cleanup(struct dm_verity_sig_opts *sig_opts)
|
|
{
|
|
}
|
|
|
|
#endif /* CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG */
|
|
#endif /* DM_VERITY_SIG_VERIFICATION_H */
|