[PATCH v3 1/3] dm: Add verity helpers for LoadPin
Matthias Kaehlcke
mka at chromium.org
Thu May 12 18:14:39 UTC 2022
Hi Mike,
On Thu, May 12, 2022 at 01:19:12PM -0400, Mike Snitzer wrote:
> On Wed, May 11 2022 at 4:54P -0400,
> Matthias Kaehlcke <mka at chromium.org> wrote:
>
> > Alasdar/Mike, I'd be interested in your take on adding these functions
> > to verity/DM, to get an idea whether this series has a path forward to
> > landing upstream.
>
> I'll be reviewing your patchset now. Comments inlined below.
Thanks for the review!
> > On Wed, May 04, 2022 at 12:54:17PM -0700, Matthias Kaehlcke wrote:
> > > LoadPin limits loading of kernel modules, firmware and certain
> > > other files to a 'pinned' file system (typically a read-only
> > > rootfs). To provide more flexibility LoadPin is being extended
> > > to also allow loading these files from trusted dm-verity
> > > devices. For that purpose LoadPin can be provided with a list
> > > of verity root digests that it should consider as trusted.
> > >
> > > Add a bunch of helpers to allow LoadPin to check whether a DM
> > > device is a trusted verity device. The new functions broadly
> > > fall in two categories: those that need access to verity
> > > internals (like the root digest), and the 'glue' between
> > > LoadPin and verity. The new file dm-verity-loadpin.c contains
> > > the glue functions.
> > >
> > > Signed-off-by: Matthias Kaehlcke <mka at chromium.org>
> > > ---
> > >
> > > Changes in v3:
> > > - none
> > >
> > > Changes in v2:
> > > - none
> > >
> > > drivers/md/Makefile | 6 +++
> > > drivers/md/dm-verity-loadpin.c | 80 +++++++++++++++++++++++++++++++
> > > drivers/md/dm-verity-target.c | 33 +++++++++++++
> > > drivers/md/dm-verity.h | 4 ++
> > > include/linux/dm-verity-loadpin.h | 27 +++++++++++
> > > 5 files changed, 150 insertions(+)
> > > create mode 100644 drivers/md/dm-verity-loadpin.c
> > > create mode 100644 include/linux/dm-verity-loadpin.h
> > >
> > > diff --git a/drivers/md/Makefile b/drivers/md/Makefile
> > > index 0454b0885b01..e12cd004d375 100644
> > > --- a/drivers/md/Makefile
> > > +++ b/drivers/md/Makefile
> > > @@ -100,6 +100,12 @@ ifeq ($(CONFIG_IMA),y)
> > > dm-mod-objs += dm-ima.o
> > > endif
> > >
> > > +ifeq ($(CONFIG_DM_VERITY),y)
> > > +ifeq ($(CONFIG_SECURITY_LOADPIN),y)
> > > +dm-mod-objs += dm-verity-loadpin.o
> > > +endif
> > > +endif
> > > +
>
> Why are you extending dm-mod-objs? Why not dm-verity-objs?
>
> > > ifeq ($(CONFIG_DM_VERITY_FEC),y)
> > > dm-verity-objs += dm-verity-fec.o
> > > endif
> > > diff --git a/drivers/md/dm-verity-loadpin.c b/drivers/md/dm-verity-loadpin.c
> > > new file mode 100644
> > > index 000000000000..972ca93a2231
> > > --- /dev/null
> > > +++ b/drivers/md/dm-verity-loadpin.c
> > > @@ -0,0 +1,80 @@
> > > +// SPDX-License-Identifier: GPL-2.0-only
> > > +
> > > +#include <linux/list.h>
> > > +#include <linux/kernel.h>
> > > +#include <linux/dm-verity-loadpin.h>
> > > +
> > > +#include "dm.h"
> > > +#include "dm-verity.h"
> > > +
> > > +static struct list_head *trusted_root_digests;
> > > +
> > > +/*
> > > + * Sets the root digests of verity devices which LoadPin considers as trusted.
> > > + *
> > > + * This function must only be called once.
> > > + */
> > > +void dm_verity_loadpin_set_trusted_root_digests(struct list_head *digests)
> > > +{
> > > + if (!trusted_root_digests)
> > > + trusted_root_digests = digests;
> > > + else
> > > + pr_warn("verity root digests trusted by LoadPin are already set!!!\n");
> > > +}
>
> Would prefer you set a DM_MSG_PREFIX and use DMWARN() instead.
Sure, I'll change it to DMWARN().
> You never explicitly initialize trusted_root_digests to NULL.
That's what I had initially, however checkpatch didn't like it:
ERROR: do not initialise statics to NULL
#70: FILE: drivers/md/dm-verity-loadpin.c:10:
+static struct list_head *trusted_root_digests = NULL;
So I removed it.
> Also, I'll have to look at the caller(s), but without locking this
> branching is racey.
The list of trusted root digests can only be set once and is never
cleared. So if it is not set there is nothing to do, and if it is
set the list is immutable. We are trusting the caller to adhere to
that 'contract' and partially enforce it in dm_verity_loadpin_set_trusted_root_digests()
With that do you still think locking is needed?
> > > +
> > > +static bool is_trusted_verity_target(struct dm_target *ti)
> > > +{
> > > + u8 *root_digest;
> > > + unsigned int digest_size;
> > > + struct trusted_root_digest *trd;
> > > + bool trusted = false;
> > > +
> > > + if (!dm_is_verity_target(ti))
> > > + return false;
> > > +
> > > + if (dm_verity_get_root_digest(ti, &root_digest, &digest_size))
> > > + return false;
> > > +
> > > + list_for_each_entry(trd, trusted_root_digests, node) {
> > > + if ((trd->len == digest_size) &&
> > > + !memcmp(trd->data, root_digest, digest_size)) {
> > > + trusted = true;
> > > + break;
> > > + }
> > > + }
> > > +
> > > + kfree(root_digest);
> > > +
> > > + return trusted;
> > > +}
> > > +
> > > +/*
> > > + * Determines whether a mapped device is a verity device that is trusted
> > > + * by LoadPin.
> > > + */
> > > +bool dm_verity_loadpin_is_md_trusted(struct mapped_device *md)
> > > +{
> > > + int srcu_idx;
> > > + struct dm_table *table;
> > > + unsigned int num_targets;
> > > + bool trusted = false;
> > > + int i;
> > > +
> > > + if (!trusted_root_digests || list_empty(trusted_root_digests))
> > > + return false;
>
> Again, where is the locking to protect trusted_root_digests?
See above
More information about the Linux-security-module-archive
mailing list