Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp763571imw; Fri, 8 Jul 2022 11:14:27 -0700 (PDT) X-Google-Smtp-Source: AGRyM1t7/t4+T7ufC5RRKvrVTqQo4hj7oPNodzsytq7sraxv2ME757/fV3OFlHlxVSmtoUl/t0EJ X-Received: by 2002:a17:907:75ef:b0:72b:2fd:1a92 with SMTP id jz15-20020a17090775ef00b0072b02fd1a92mr4726024ejc.745.1657304067073; Fri, 08 Jul 2022 11:14:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657304067; cv=none; d=google.com; s=arc-20160816; b=qRCZIfJ7cE3IzpnZZOzG0yd/ah5b7hcaeQDIUd+95JuuHItVm6FPmOpa2wVDgmwXCZ Fuc9xaAShURnunNjJIBekJsA9+O4d1C3V24WGckIkuES9yG9D0RqANQdu6C4J+RAHEGO o9xCcepDA6bwbfzgu4Ey7D7Z9v1P5kDn97rfSkqX1k+PvsPhDqtBkDn2TfHqlCcFpODP kuxjdyKeZIYc8ZDauuqjNpqFWBqcKjuTV2Fv5m0xHd1ZIiSvC7Fn3+qxVsLrPhCtwCg2 32Y+VNQy8C3uLEIWG8qFxFfWJLZYdsPjPpHaekbo2Wgi+AvtuccjRyLvI7SPw3lnjUfd IaeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=SCpgoi0bej3E/k3q1Zzvx8WQzQbsCorWnUbIjfYa/X8=; b=JvAnRNaxU/VVaXt5H75ZufiJfkYJf/A2V4A+/skCMU3zSkkv8zUWzE4dtb52yr56ro X4oWMtH3zOLBMhFSk/OxkYSnkF3R1l/DOwG6sK00dxRvkXh3lrjTaMdblZtnBp49JZTz Ty0KZFUrtI8tMe6Zfjyngtj/16z+6EjXm18i2gb5OVG/q86KnXnGwMrJ02ga1nE/2InD MSBH4ltpTpBXqZJRhmBfJwzvIw8h/Iimov2DoYslpv8mYcIP66OmvX1miqBaKvEPc0lm aRAYMry7l2H9c6TzJkL6e8EgNlzcfPv69OjkR3xSNdE8vk1gvsxJSftMY51P7iVijUMg dTnQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=ml3Kny+T; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id eo4-20020a056402530400b0043a69be48ddsi5825147edb.272.2022.07.08.11.14.01; Fri, 08 Jul 2022 11:14:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=ml3Kny+T; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238615AbiGHRsK (ORCPT + 99 others); Fri, 8 Jul 2022 13:48:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49048 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237925AbiGHRsJ (ORCPT ); Fri, 8 Jul 2022 13:48:09 -0400 Received: from mail-pg1-x52c.google.com (mail-pg1-x52c.google.com [IPv6:2607:f8b0:4864:20::52c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4944374DFD for ; Fri, 8 Jul 2022 10:48:08 -0700 (PDT) Received: by mail-pg1-x52c.google.com with SMTP id r22so16031225pgr.2 for ; Fri, 08 Jul 2022 10:48:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=SCpgoi0bej3E/k3q1Zzvx8WQzQbsCorWnUbIjfYa/X8=; b=ml3Kny+TDNHdTGvuVDpKu9tNVsI9rg6LeipWZ5ZOkteqKLFBxM5ekj3E07IlhnmCZV QEGA9z/6eokWng2H3lP1krXx7MXUvPNoY40dacqit8ht0YCevulLcYBnXMrbRvrml9OS XyUb9Idq8wvH8qCWN0cfxK4yhsSKzD1PJ0xMs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=SCpgoi0bej3E/k3q1Zzvx8WQzQbsCorWnUbIjfYa/X8=; b=yoeaiVKPCh21P0jXUvIsYFrCW/FW5TvZj96256StSFv6V3BS6yc5jNYw0Q+EKUzbxD Y4vKDU79XlJeNJVcCl9M8Gw2qpstUExSIYrlyiZORr8DQyDwOdJwA0pAs25UBfAcHWEy XEmeFzM5gw69FuMV8wXsWhkQ+XC9m7TygClyM1aU3R93C1khtLJM2wnmSHYa1v4TAT83 TCmxZ750hYmpARCXNuG1P84u8A4urDiahYKQ1QExsxU6qTLxvq1fIzgJMN0ugusiYa0R eN9uJraCJbSNTl2dIzrjIgpz5WkpOB66kKLDSSUA6mlKcuAEk67suQlDyg7+dZkv0VRn 0uvg== X-Gm-Message-State: AJIora9pv1GplDhsYX74ozI952X4G+7ElZbnFJyMwQv3kZ0rwn5C3GR7 /dTnvnILDyEDNdZLmJeSJVncfQ== X-Received: by 2002:a63:187:0:b0:411:6434:d017 with SMTP id 129-20020a630187000000b004116434d017mr4274618pgb.350.1657302487803; Fri, 08 Jul 2022 10:48:07 -0700 (PDT) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id a74-20020a621a4d000000b00528d4f647f2sm3404184pfa.91.2022.07.08.10.48.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 08 Jul 2022 10:48:07 -0700 (PDT) From: Kees Cook To: jmorris@namei.org, agk@redhat.com, snitzer@kernel.org, mka@chromium.org, serge@hallyn.com Cc: Kees Cook , linux-raid@vger.kernel.org, song@kernel.org, dianders@chromium.org, linux-security-module@vger.kernel.org, dm-devel@redhat.com, gmazyland@gmail.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v7 0/3] LoadPin: Enable loading from trusted dm-verity devices Date: Fri, 8 Jul 2022 10:47:59 -0700 Message-Id: <165730247648.3882109.12888837825450019581.b4-ty@chromium.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20220627153526.3750341-1-mka@chromium.org> References: <20220627153526.3750341-1-mka@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 27 Jun 2022 08:35:23 -0700, Matthias Kaehlcke wrote: > As of now LoadPin restricts loading of kernel files to a single pinned > filesystem, typically the rootfs. This works for many systems, however it > can result in a bloated rootfs (and OTA updates) on platforms where > multiple boards with different hardware configurations use the same rootfs > image. Especially when 'optional' files are large it may be preferable to > download/install them only when they are actually needed by a given board. > Chrome OS uses Downloadable Content (DLC) [1] to deploy certain 'packages' > at runtime. As an example a DLC package could contain firmware for a > peripheral that is not present on all boards. DLCs use dm-verity [2] to > verify the integrity of the DLC content. > > [...] Applied to for-next/hardening, thanks! [1/3] dm: Add verity helpers for LoadPin https://git.kernel.org/kees/c/b6c1c5745ccc [2/3] LoadPin: Enable loading from trusted dm-verity devices https://git.kernel.org/kees/c/3f805f8cc23b [3/3] dm: verity-loadpin: Use CONFIG_SECURITY_LOADPIN_VERITY for conditional compilation https://git.kernel.org/kees/c/231af4709018 -- Kees Cook