linux/Documentation/security
Prakhar Srivastava 86b4da8c0e IMA: Define a new template field buf
A buffer(kexec boot command line arguments) measured into IMA
measuremnt list cannot be appraised, without already being
aware of the buffer contents. Since hashes are non-reversible,
raw buffer is needed for validation or regenerating hash for
appraisal/attestation.

Add support to store/read the buffer contents in HEX.
The kexec cmdline hash is stored in the "d-ng" field of the
template data.  It can be verified using
sudo cat /sys/kernel/security/integrity/ima/ascii_runtime_measurements |
  grep  kexec-cmdline | cut -d' ' -f 6 | xxd -r -p | sha256sum

- Add two new fields to ima_event_data to hold the buf and
buf_len
- Add a new template field 'buf' to be used to store/read
the buffer data.
- Updated process_buffer_meaurement to add the buffer to
ima_event_data. process_buffer_measurement added in
"Define a new IMA hook to measure the boot command line
 arguments"
- Add a new template policy name ima-buf to represent
'd-ng|n-ng|buf'

Signed-off-by: Prakhar Srivastava <prsriva02@gmail.com>
Reviewed-by: Roberto Sassu <roberto.sassu@huawei.com>
Reviewed-by: James Morris <jamorris@linux.microsoft.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
2019-06-30 17:53:45 -04:00
..
keys Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security 2019-01-02 09:43:14 -08:00
tpm tpm: move documentation under Documentation/security 2016-11-07 18:56:42 -07:00
credentials.rst Documentation: Use "while" instead of "whilst" 2018-11-20 09:30:43 -07:00
IMA-templates.rst IMA: Define a new template field buf 2019-06-30 17:53:45 -04:00
index.rst doc: sctp: Merge and clean up rst files 2019-02-22 08:51:40 -07:00
LSM.rst doc: security: Add kern-doc for lsm_hooks.h 2019-02-22 08:54:09 -07:00
SCTP.rst doc: sctp: Merge and clean up rst files 2019-02-22 08:51:40 -07:00
self-protection.rst doc: self-protection: Add information about STACKLEAK feature 2018-09-04 10:35:48 -07:00