All of lore.kernel.org
 help / color / mirror / Atom feed
From: Daniel Golle <daniel@makrotopia.org>
To: Tom Rini <trini@konsulko.com>, Simon Glass <sjg@chromium.org>,
	Quentin Schulz <quentin.schulz@cherry.de>,
	Kory Maincent <kory.maincent@bootlin.com>,
	Mattijs Korpershoek <mkorpershoek@kernel.org>,
	Peng Fan <peng.fan@nxp.com>,
	Heinrich Schuchardt <xypron.glpk@gmx.de>,
	Martin Schwan <m.schwan@phytec.de>,
	Daniel Golle <daniel@makrotopia.org>,
	Anshul Dalal <anshuld@ti.com>,
	Ilias Apalodimas <ilias.apalodimas@linaro.org>,
	Sughosh Ganu <sughosh.ganu@arm.com>,
	Aristo Chen <jj251510319013@gmail.com>,
	Ludwig Nussel <ludwig.nussel@siemens.com>,
	Benjamin ROBIN <dev@benjarobin.fr>,
	Marek Vasut <marek.vasut+renesas@mailbox.org>,
	James Hilliard <james.hilliard1@gmail.com>,
	Wolfgang Wallner <wolfgang.wallner@at.abb.com>,
	Kunihiko Hayashi <hayashi.kunihiko@socionext.com>,
	David Lechner <dlechner@baylibre.com>,
	Neil Armstrong <neil.armstrong@linaro.org>,
	Mayuresh Chitale <mchitale@ventanamicro.com>,
	Jonas Karlman <jonas@kwiboo.se>,
	Shiji Yang <yangshiji66@outlook.com>,
	Rasmus Villemoes <ravi@prevas.dk>,
	Francois Berder <fberder@outlook.fr>,
	u-boot@lists.denx.de
Subject: [PATCH v2 0/7] fit: dm-verity support
Date: Thu, 16 Apr 2026 02:46:15 +0100	[thread overview]
Message-ID: <cover.1776302805.git.daniel@makrotopia.org> (raw)

This series adds dm-verity support to U-Boot's FIT image infrastructure.
It is the first logical subset of the larger OpenWrt boot method series
posted as an RFC in February 2026 [1], extracted here for independent
review and merging.

OpenWrt's firmware model embeds a read-only squashfs or erofs root
filesystem directly inside a uImage.FIT container as a FILESYSTEM-type
loadable FIT image. At boot the kernel maps this sub-image directly from
the underlying block device via the fitblk driver (/dev/fit0, /dev/fit1,
...), the goal is that the bootloader never even copies it to RAM.

dm-verity enables the kernel to verify the integrity of those mapped
filesystems at read time, with a Merkle hash tree stored contiguously in
the same sub-image just after the data. Two kernel command-line
parameters are required:

  dm-mod.create=   -- the device-mapper target table for the verity device
  dm-mod.waitfor=  -- a comma-separated list of block devices to wait for
                      before dm-init sets up the targets (needed when fitblk
                      probes late, e.g. because it depends on NVMEM
                      calibration data)

The FIT dm-verity node schema was upstreamed into the flat-image-tree
specification [2], which this implementation tries to follow exactly.

The runtime feature is guarded behind CONFIG_FIT_VERITY. If not
enabled the resulting binary size remains unchanged. If enabled the
binary size increases by about 3kB.

[1] RFC/v2: https://www.mail-archive.com/u-boot@lists.denx.de/msg565945.html
[2] flat-image-tree dm-verity node spec:
    https://github.com/open-source-firmware/flat-image-tree/commit/795fd5fd7f0121d0cb03efb1900aafc61c704771

v2: address comments by Simon Glass
 * use is_power_of_2() for pre-boot sanity check
 * let fit_verity_build_cmdline() return 0 on success
 * add comment explaining why bootm_start() calls fit_verity_free()
 * use existing hex2bin() (and adapt it to be usable for host-tools)
 * fix stale comment still including superblock despite veritysetup
   being called with --no-superblock
 * add power-of-two check for data-block-size and hash-block-size to
   mkimage
 * don't ignore return value of fdt_delprop()
 * various documentation fixes, minimal example
 * add pytest for mkimage part
 * add run-time unit test for cmdline generation part

Daniel Golle (7):
  image: fit: add dm-verity property name constants
  boot: fit: support generating DM verity cmdline parameters
  include: hexdump: make hex2bin() usable from host tools
  tools: mkimage: add dm-verity Merkle-tree generation
  doc: fit: add dm-verity boot parameter documentation
  test: boot: add runtime unit test for fit_verity_build_cmdline()
  test: py: add mkimage dm-verity round-trip test

 boot/Kconfig                     |  20 ++
 boot/bootm.c                     |  13 ++
 boot/image-board.c               |   5 +
 boot/image-fit.c                 | 337 +++++++++++++++++++++++++++++
 doc/usage/fit/dm-verity.rst      | 282 +++++++++++++++++++++++++
 doc/usage/fit/index.rst          |   1 +
 include/hexdump.h                |   8 +-
 include/image.h                  |  97 ++++++++-
 test/boot/Makefile               |   1 +
 test/boot/fit_verity.c           | 298 ++++++++++++++++++++++++++
 test/cmd_ut.c                    |   2 +
 test/py/tests/test_fit_verity.py | 153 ++++++++++++++
 tools/fit_image.c                | 116 +++++++++-
 tools/image-host.c               | 349 ++++++++++++++++++++++++++++++-
 14 files changed, 1669 insertions(+), 13 deletions(-)
 create mode 100644 doc/usage/fit/dm-verity.rst
 create mode 100644 test/boot/fit_verity.c
 create mode 100644 test/py/tests/test_fit_verity.py

-- 
2.53.0

             reply	other threads:[~2026-04-16  1:46 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-16  1:46 Daniel Golle [this message]
2026-04-16  1:46 ` [PATCH v2 1/7] image: fit: add dm-verity property name constants Daniel Golle
2026-04-21 15:03   ` Tom Rini
2026-04-16  1:46 ` [PATCH v2 2/7] boot: fit: support generating DM verity cmdline parameters Daniel Golle
2026-04-16 19:37   ` Simon Glass
2026-04-16  1:46 ` [PATCH v2 3/7] include: hexdump: make hex2bin() usable from host tools Daniel Golle
2026-04-16 11:00   ` Heinrich Schuchardt
2026-04-24 17:31     ` Daniel Golle
2026-04-16 19:37   ` Simon Glass
2026-04-16  1:46 ` [PATCH v2 4/7] tools: mkimage: add dm-verity Merkle-tree generation Daniel Golle
2026-04-16 19:36   ` Simon Glass
2026-04-16  1:46 ` [PATCH v2 5/7] doc: fit: add dm-verity boot parameter documentation Daniel Golle
2026-04-16 19:38   ` Simon Glass
2026-04-16  1:47 ` [PATCH v2 6/7] test: boot: add runtime unit test for fit_verity_build_cmdline() Daniel Golle
2026-04-16 19:36   ` Simon Glass
2026-04-16 23:25     ` Daniel Golle
2026-04-16 23:59       ` Simon Glass
2026-04-16  1:47 ` [PATCH v2 7/7] test: py: add mkimage dm-verity round-trip test Daniel Golle
2026-04-16 19:36   ` Simon Glass
2026-04-16 22:58     ` Daniel Golle
2026-04-16 23:59       ` Simon Glass
     [not found] ` <87wlxxltnc.fsf@prevas.dk>
2026-04-23 13:20   ` [PATCH v2 0/7] fit: dm-verity support Daniel Golle
2026-04-26 16:20     ` Marek Vasut
2026-04-26 16:32       ` Daniel Golle
2026-05-07 15:38         ` Simon Glass

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cover.1776302805.git.daniel@makrotopia.org \
    --to=daniel@makrotopia.org \
    --cc=anshuld@ti.com \
    --cc=dev@benjarobin.fr \
    --cc=dlechner@baylibre.com \
    --cc=fberder@outlook.fr \
    --cc=hayashi.kunihiko@socionext.com \
    --cc=ilias.apalodimas@linaro.org \
    --cc=james.hilliard1@gmail.com \
    --cc=jj251510319013@gmail.com \
    --cc=jonas@kwiboo.se \
    --cc=kory.maincent@bootlin.com \
    --cc=ludwig.nussel@siemens.com \
    --cc=m.schwan@phytec.de \
    --cc=marek.vasut+renesas@mailbox.org \
    --cc=mchitale@ventanamicro.com \
    --cc=mkorpershoek@kernel.org \
    --cc=neil.armstrong@linaro.org \
    --cc=peng.fan@nxp.com \
    --cc=quentin.schulz@cherry.de \
    --cc=ravi@prevas.dk \
    --cc=sjg@chromium.org \
    --cc=sughosh.ganu@arm.com \
    --cc=trini@konsulko.com \
    --cc=u-boot@lists.denx.de \
    --cc=wolfgang.wallner@at.abb.com \
    --cc=xypron.glpk@gmx.de \
    --cc=yangshiji66@outlook.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.