tmp_suning_uos_patched/security/integrity
Prakhar Srivastava b0935123a1 IMA: Define a new hook to measure the kexec boot command line arguments
Currently during soft reboot(kexec_file_load) boot command line
arguments are not measured. Define hooks needed to measure kexec
command line arguments during soft reboot(kexec_file_load).

- A new ima hook ima_kexec_cmdline is defined to be called by the
kexec code.
- A new function process_buffer_measurement is defined to measure
the buffer hash into the IMA measurement list.
- A new func policy KEXEC_CMDLINE is defined to control the
 measurement.

Signed-off-by: Prakhar Srivastava <prsriva02@gmail.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
2019-06-24 08:29:57 -04:00
..
evm evm: check hash algorithm passed to init_desc() 2019-05-29 23:18:25 -04:00
ima IMA: Define a new hook to measure the kexec boot command line arguments 2019-06-24 08:29:57 -04:00
platform_certs s390/ipl: read IPL report at early boot 2019-04-26 12:34:05 +02:00
digsig_asymmetric.c integrity: support EC-RDSA signatures for asymmetric_verify 2019-04-18 22:15:03 +08:00
digsig.c integrity: Fix __integrity_init_keyring() section mismatch 2019-06-17 14:13:20 -04:00
iint.c get rid of legacy 'get_ds()' function 2019-03-04 10:50:14 -08:00
integrity_audit.c ima: Use audit_log_format() rather than audit_log_string() 2018-07-18 07:27:22 -04:00
integrity.h integrity: Remove references to module keyring 2018-12-17 14:09:39 -08:00
Kconfig s390/ipl: read IPL report at early boot 2019-04-26 12:34:05 +02:00
Makefile s390/ipl: read IPL report at early boot 2019-04-26 12:34:05 +02:00