mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-25 12:40:53 +07:00
24 lines
1.2 KiB
Plaintext
24 lines
1.2 KiB
Plaintext
|
What: security/evm
|
||
|
Date: March 2011
|
||
|
Contact: Mimi Zohar <zohar@us.ibm.com>
|
||
|
Description:
|
||
|
EVM protects a file's security extended attributes(xattrs)
|
||
|
against integrity attacks. The initial method maintains an
|
||
|
HMAC-sha1 value across the extended attributes, storing the
|
||
|
value as the extended attribute 'security.evm'.
|
||
|
|
||
|
EVM depends on the Kernel Key Retention System to provide it
|
||
|
with a trusted/encrypted key for the HMAC-sha1 operation.
|
||
|
The key is loaded onto the root's keyring using keyctl. Until
|
||
|
EVM receives notification that the key has been successfully
|
||
|
loaded onto the keyring (echo 1 > <securityfs>/evm), EVM
|
||
|
can not create or validate the 'security.evm' xattr, but
|
||
|
returns INTEGRITY_UNKNOWN. Loading the key and signaling EVM
|
||
|
should be done as early as possible. Normally this is done
|
||
|
in the initramfs, which has already been measured as part
|
||
|
of the trusted boot. For more information on creating and
|
||
|
loading existing trusted/encrypted keys, refer to:
|
||
|
Documentation/keys-trusted-encrypted.txt. (A sample dracut
|
||
|
patch, which loads the trusted/encrypted key and enables
|
||
|
EVM, is available from http://linux-ima.sourceforge.net/#EVM.)
|