Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp1537815ybg; Wed, 29 Jul 2020 17:32:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyseDGWwqaZdScIol3J10Gou/+yDGRHRcYxCYR5OTZdN61bsJJjWGnMUnh8EjATZyojYcv4 X-Received: by 2002:a17:906:6d4d:: with SMTP id a13mr194404ejt.146.1596069129427; Wed, 29 Jul 2020 17:32:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596069129; cv=none; d=google.com; s=arc-20160816; b=Be7EAulO5HvDYppzNog3pMq0NWKkEbNWwbUpWnaOx1cE7TNe0bCZ6FM1k4DkN5Dn5k FzwZ6bLMmplBpdxQQYRIobW1cGXZoiT642hgVCgZisbfKXHesmv88JCInsqLRVHb2KmX bzrn4hxq0/bWh/ASlfZEBSB/ezMAQnP/1afcS1+Ww/Lj/982fbT/A7CWKD2wt+IEIaEs ddhA9lT5ifkKG3byedVEKex3SYbOoFJ1kexmAk0YsHoiQqzUSq17DTTU+r/mWkQRqjhi SJhlzKNpkflBEGYL6kqh4tzOO6YKbFeVam49KcA3K3doCTOPk8dlBa0/wgmL+e2txpBm UWjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=1DIB71tr0JsOBSiaDkwHhnK28zyctORRWnwH630pHq4=; b=WHiK1duqAREhOpVXdugwSRSorw0aXHvPORoU8GidbWyORBzLsxhZY7P/u4A2gcttAu dcWGkWIvAPRditYO7OV+uLDdYmwzfad9gKlVy36EFpuavIQnUQ/lG4UqzHghdqikHz9f sxhOWJKbF5ig+zD2tk1EpFqBndTgTQnfCylkEeFgJejmeel7UBmqIHgmV9RKGAtF+WY7 shHV/AH8bKabNpcEdibGD7SSRv++J+YQA+oDq3Xbvt9tbwQsgfuypz7ypy5t7HCcSJJF q+37I4U36Q1t61b6QQ+Zrqk9vP0AbbQ8VPdR/LtLaPCQ+AS3vM3uIKYB7G1Xszoy6SN2 KVyQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b="UJMK/ui7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yj16si2054131ejb.626.2020.07.29.17.31.42; Wed, 29 Jul 2020 17:32:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b="UJMK/ui7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728195AbgG3Ab3 (ORCPT + 99 others); Wed, 29 Jul 2020 20:31:29 -0400 Received: from linux.microsoft.com ([13.77.154.182]:54208 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728299AbgG3AbX (ORCPT ); Wed, 29 Jul 2020 20:31:23 -0400 Received: from dede-linux-virt.corp.microsoft.com (unknown [131.107.160.54]) by linux.microsoft.com (Postfix) with ESMTPSA id DA95420B4913; Wed, 29 Jul 2020 17:31:20 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com DA95420B4913 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1596069081; bh=1DIB71tr0JsOBSiaDkwHhnK28zyctORRWnwH630pHq4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UJMK/ui7ZCvxuGD/xiVgTPEU0Glqf1bCl3Z72BCDHl0tNHN4QgM8o0698yJKHVLgr hieKmi3JTo7JCqZqUjlFtr/BLJMrC3aFFZiPd1H7ki+TheRIuWCCIMcPU1R++oCAXT aCzNqWKLwo3ypR48j8q6mKgcnRoCgR8KhjL22T/E= From: Deven Bowers To: agk@redhat.com, axboe@kernel.dk, snitzer@redhat.com, jmorris@namei.org, serge@hallyn.com, zohar@linux.ibm.com, viro@zeniv.linux.org.uk, paul@paul-moore.com, eparis@redhat.com, jannh@google.com, dm-devel@redhat.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-block@vger.kernel.org, linux-audit@redhat.com Cc: tyhicks@linux.microsoft.com, linux-kernel@vger.kernel.org, corbet@lwn.net, sashal@kernel.org, jaskarankhurana@linux.microsoft.com, mdsakib@microsoft.com, nramas@linux.microsoft.com, pasha.tatashin@soleen.com Subject: [RFC PATCH v6 08/11] dm-verity: add bdev_setsecurity hook for root-hash Date: Wed, 29 Jul 2020 17:31:10 -0700 Message-Id: <20200730003113.2561644-9-deven.desai@linux.microsoft.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200730003113.2561644-1-deven.desai@linux.microsoft.com> References: <20200730003113.2561644-1-deven.desai@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add a security hook call to set a security property of a block_device in dm-verity with the root-hash that was passed to device-mapper. Signed-off-by: Deven Bowers --- drivers/md/dm-verity-target.c | 8 ++++++++ include/linux/device-mapper.h | 1 + 2 files changed, 9 insertions(+) diff --git a/drivers/md/dm-verity-target.c b/drivers/md/dm-verity-target.c index 9970488e67ed..44914668398d 100644 --- a/drivers/md/dm-verity-target.c +++ b/drivers/md/dm-verity-target.c @@ -16,8 +16,10 @@ #include "dm-verity.h" #include "dm-verity-fec.h" #include "dm-verity-verify-sig.h" +#include "dm-core.h" #include #include +#include #define DM_MSG_PREFIX "verity" @@ -1207,6 +1209,12 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv) ti->per_io_data_size = roundup(ti->per_io_data_size, __alignof__(struct dm_verity_io)); + r = security_bdev_setsecurity(dm_table_get_md(v->ti->table)->bdev, + DM_VERITY_ROOTHASH_SEC_NAME, + v->root_digest, v->digest_size); + if (r) + goto bad; + verity_verify_sig_opts_cleanup(&verify_args); return 0; diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h index ab6b8eb0a150..e8ef887e4bae 100644 --- a/include/linux/device-mapper.h +++ b/include/linux/device-mapper.h @@ -626,5 +626,6 @@ static inline unsigned long to_bytes(sector_t n) } #define DM_VERITY_SIGNATURE_SEC_NAME DM_NAME ".verity-sig" +#define DM_VERITY_ROOTHASH_SEC_NAME DM_NAME ".verity-rh" #endif /* _LINUX_DEVICE_MAPPER_H */ -- 2.27.0