1
0
forked from brl/citadel
citadel/meta-citadel/recipes-citadel/citadel-documentation/files/pages/resource-image.page

362 lines
10 KiB
XML

<?xml version="1.0" encoding="utf-8"?>
<page xmlns="http://projectmallard.org/1.0/" type="topic" id="resource-image">
<info>
<link type="guide" xref="index#internals"/>
</info>
<title>Citadel Resource Images</title>
<p>Resource images are disk image files that are mounted read-only to create
the citadel filesystem. The first block (4096 bytes) of the image file
contains a header and immediately following the header is the raw disk
image contents.</p>
<p>The header contains information about the image including parameters for
configuring dm-verity to enforce the immutability of the image. The header
also contains a public key signature over the image information so that
the authenticity of the header information can be verified.</p>
<p>The root filesystem of citadel is also distributed as a resource image, and
this image will be installed to a disk partition for normal operation.</p>
<p>Resource images other than the root filesystem are mounted by creating loop
devices on the image file. Prior to mounting the image dm-verity is configured
on the loop device or the rootfs partition.</p>
<section>
<title>Resource Image Types</title>
<p>Currently the following image types are defined for use in Citadel:</p>
<section>
<title>1) Base Root Filesystem ("rootfs")</title>
<p>The base rootfs image is the only image type which is installed to a
partition. It is mounted as the root of the Citadel filesystem. When an
image is installed on a partition the 4906 byte header block is stored in
the last block (8 sectors) of the partition.</p>
<p>Citadel uses two partitions (A &amp; B) for the root filesystem. This allows
updating one partition while the other one is being used. Then the system
can be rebooted into the updated rootfs partition. If the system fails to
boot after updating it will be reverted to use the working partition.</p>
</section>
<section>
<title>2) Kernel Image ("kernel")</title>
<p>The kernel modules for the running kernel are stored in a resource image
so that the root filesystem is independent from the running kernel.</p>
<p>During boot, this image is mounted and the kernel modules and a bind mount
is created over /usr/lib/modules on the Citadel root filesystem.</p>
</section>
<section>
<title>3) Extra Resource Image ("extra")</title>
<p>This image type contains additional directories of files which are mounted
during boot on the Citadel root filesystem. It contains files such as
firmware files and desktop icons which occupy substantial space but do not
need to be updated frequently.</p>
<p>By placing these files into a separate image the size of the root filesystem
image is reduced. This makes the more frequently updated rootfs image
smaller.</p>
</section>
<section>
<title>4) Realm Filesystem Image ("realmfs")</title>
<p>This type of image contains the entire root filesystem for running a realm
container or VM. Unlike the other types of resource images, these images can
be modified and then signed with keys controlled by the user. This allows
updates and installation of software while still preserving the read-only
property.</p>
</section>
<section>
<title>Image Layout</title>
<p>Each resource image file reserves an initial 4096 byte block where a header is
stored. This is the maximum length of the header, which is generally much
smaller than this size.</p>
<p>Following the header is a raw disk filesystem image which may optionally be
compressed with xz compression algorithm. The disk image filesystem is ext4,
but this is an implementation detail which may change in the future. A header
flag (FLAG_DATA_COMPRESSED) indicates if an image is compressed and if so the
image must be decompressed before being used. Image updates are distributed in
compressed form and are decompressed once during installation.</p>
<p>When dm-verity is used a hash tree must be generated for the image. When an
image is installed it is first decompressed and then the dm-verity hash data
is generated. This hash data is stored in the image file immediately following
the image data and the flag FLAG_HASH_TREE is set to indicate this data is
present.</p>
<p>Image file:</p>
<code> [ Header ][ Ext4 Disk Image ][ dm-verity hash data ]</code>
<p>Partition:</p>
<code> [ Ext4 Disk Image ][ dm-verity hash data ][ unused space ][ Header ]</code>
</section>
</section>
<section>
<title>Image Header</title>
<p>The image header contains the following fields.</p>
<table>
<tr>
<th>
<p>Field</p>
</th>
<th>
<p>Size</p>
</th>
<th>
<p>Content</p>
</th>
</tr>
<tr>
<td>
<p>MAGIC</p>
</td>
<td>
<p>4 bytes</p>
</td>
<td>
<p>('S', 'G', 'O', 'S')</p>
</td>
</tr>
<tr>
<td>
<p>status</p>
</td>
<td>
<p>1 byte</p>
</td>
<td>
<p>Used by images installed to partition</p>
</td>
</tr>
<tr>
<td>
<p>flags</p>
</td>
<td>
<p>1 byte</p>
</td>
<td>
<p>Various flag values</p>
</td>
</tr>
<tr>
<td>
<p>metainfo-len</p>
</td>
<td>
<p>2 bytes</p>
</td>
<td>
<p>16 bit big-endian length</p>
</td>
</tr>
<tr>
<td>
<p>metainfo</p>
</td>
<td>
<p>(metainfo-len) bytes</p>
</td>
<td>
<p>TOML document containing key-value pairs</p>
</td>
</tr>
<tr>
<td>
<p>signature</p>
</td>
<td>
<p>64 bytes</p>
</td>
<td>
<p>ed25519 signature over metainfo field</p>
</td>
</tr>
</table>
<section>
<title>Header Fields</title>
<section>
<title>MAGIC</title>
<p>The initial 4 bytes are always set to the ascii bytes 'SGOS' so that a
valid image file can easily be identified.</p>
</section>
<section>
<title>status</title>
<p>The `status` field is used only on base rootfs image installed on a partition.
It must be set to 0 for all other images. The field is used to make decisions
about which parition to attempt to boot.</p>
<p>The status value is stored in the low nibble (4 bits) of this field and the
high nibble is reserved for counting boot attempts in `STATUS_TRY_BOOT` state.</p>
<p>The defined status values are:</p>
<table>
<tr>
<th>
<p>status</p>
</th>
<th>
<p>value</p>
</th>
<th>
<p>description</p>
</th>
</tr>
<tr>
<td>
<p>STATUS_INVALID</p>
</td>
<td>
<p>0</p>
</td>
<td>
<p>Partition does not contain a valid image</p>
</td>
</tr>
<tr>
<td>
<p>STATUS_NEW</p>
</td>
<td>
<p>1</p>
</td>
<td>
<p>Newly written partition which has not yet been booted</p>
</td>
</tr>
<tr>
<td>
<p>STATUS_TRY_BOOT</p>
</td>
<td>
<p>2</p>
</td>
<td>
<p>Set when booting a partition for the first time</p>
</td>
</tr>
<tr>
<td>
<p>STATUS_GOOD</p>
</td>
<td>
<p>3</p>
</td>
<td>
<p>Partition has been successfully booted at least once</p>
</td>
</tr>
<tr>
<td>
<p>STATUS_FAILED</p>
</td>
<td>
<p>4</p>
</td>
<td>
<p>Partition has failed to boot</p>
</td>
</tr>
<tr>
<td>
<p>STATUS_BAD_SIG</p>
</td>
<td>
<p>5</p>
</td>
<td>
<p>Signature verification on metainfo failed</p>
</td>
</tr>
<tr>
<td>
<p>STATUS_BAD_META</p>
</td>
<td>
<p>6</p>
</td>
<td>
<p>Parsing metainfo field failed</p>
</td>
</tr>
</table>
</section>
<section>
<title>flags</title>
<table>
<tr>
<th>
<p>flag</p>
</th>
<th>
<p>value</p>
</th>
<th>
<p>description</p>
</th>
</tr>
<tr>
<td>
<p>FLAG_PREFERRED_BOOT</p>
</td>
<td>
<p>0x01</p>
</td>
<td>
<p>Override boot choice to boot from this partition</p>
</td>
</tr>
<tr>
<td>
<p>FLAG_HASH_TREE</p>
</td>
<td>
<p>0x02</p>
</td>
<td>
<p>Image contains an appended dm-verity hash tree</p>
</td>
</tr>
<tr>
<td>
<p>FLAG_DATA_COMPRESSED</p>
</td>
<td>
<p>0x04</p>
</td>
<td>
<p>Image is compressed with xz</p>
</td>
</tr>
</table>
</section>
<section>
<title>metainfo-len</title>
<p>Length in bytes of the `metainfo` field.</p>
<p>Since header page has a fixed size of one block (4096 bytes), and all other
header fields have fixed sizes the maximum length of the `metainfo` field is
4096 - (4 + 2 + 2 + 64) = 4024 bytes</p>
</section>
<section>
<title>metainfo</title>
</section>
<section>
<title>signature</title>
<p>When the rootfs partition is chosen to mount, an attempt will be made to verify
the signature before configuring dm-verity. If this signature verification
fails, the partition status will be changed to `STATUS_BAD_SIG`</p>
</section>
</section>
<section>
<title>Booting</title>
<p>During boot of Citadel, the initramfs sets up the Citadel root filesystem. The
filesystem is built by locating and mounting three components:</p>
<list>
<item>
<p>Base root filesystem</p>
</item>
<item>
<p>Kernel modules</p>
</item>
<item>
<p>Extra resources</p>
</item>
</list>
<p>The base root filesystem is stored on a partition unless running in certain
special modes such as installer and live disk. During installation the same
base root filesystem image is mounted from a loop mounted image file. This same
file will eventually be written to a partition during installation.</p>
<p>Kernel modules and extra resources are stored in file images which are
loop mounted during boot.</p>
<p>An additional type of resource image called a sealed application image exists
for the creation of immutable application image filesystems.</p>
<p>Resource images can optionally have dm-verity enabled when mounted.</p>
</section>
</section>
</page>