b51722b4e2
external/avb/libavb provides the new Android Verified Boot (AVB) flow. It has different verity metadata format than previous formats in fs_mgr_verity.cpp fs_mgr should support using libavb to read the metadata (a.k.a. HASHTREE descriptor in AVB) to enable dm-verity in kernel. Two important files in this commit: - fs_mgr_avb_ops.c: an implementation of struct AvbOps* for libavb to do platform dependent I/O operations, e.g., read_from_partition. - fs_mgr_avb.cpp: it reads the metadata (a.k.a. vbmeta images in AVB) from all partitions, verifies its integrity against the values of androidboot.vbmeta.{hash_alg, size, digest} passed from bootloader in kernel command line. Then enable dm-verity for partitions having the corresponding HASHTREE descriptor and with an 'avb' fstab flag. Bug: 31264231 Test: Enable dm-verity on /system partition Test: Enable dm-verity with FEC on /system partition Change-Id: I4652806984fe5a30c61be0839135b5ca78323d38 |
||
---|---|---|
.. | ||
include | ||
Android.mk | ||
fs_mgr.c | ||
fs_mgr_avb.cpp | ||
fs_mgr_avb_ops.cpp | ||
fs_mgr_avb_ops.h | ||
fs_mgr_dm_ioctl.cpp | ||
fs_mgr_format.c | ||
fs_mgr_fstab.c | ||
fs_mgr_main.c | ||
fs_mgr_priv.h | ||
fs_mgr_priv_avb.h | ||
fs_mgr_priv_dm_ioctl.h | ||
fs_mgr_priv_sha.h | ||
fs_mgr_priv_verity.h | ||
fs_mgr_slotselect.c | ||
fs_mgr_verity.cpp |