| /linux/security/integrity/ima/ |
| A D | Kconfig | 4 config IMA config 46 depends on IMA 64 depends on IMA 84 depends on IMA 92 depends on IMA 122 depends on IMA 131 depends on IMA 142 depends on IMA 152 depends on IMA 320 depends on IMA [all …]
|
| /linux/Documentation/admin-guide/device-mapper/ |
| A D | dm-ima.rst | 26 IMA kernel subsystem provides the necessary functionality for 34 Setting the IMA Policy: 36 For IMA to measure the data on a given system, the IMA policy on the 52 Then IMA ASCII measurement log has the following format: 61 TEMPLATE_DATA_DIGEST := Template data digest of the IMA record. 84 | To support recording duplicate IMA events in the IMA log, the Kernel needs to be configured with 89 Following device state changes will trigger IMA measurements: 197 then IMA ASCII measurement log will have an entry with: 269 then IMA ASCII measurement log will have an entry with: 302 then IMA ASCII measurement log will have an entry with: [all …]
|
| /linux/drivers/misc/sgi-gru/ |
| A D | grukservices.c | 97 #define IMA IMA_CB_DELAY macro 591 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message() 617 IMA); in send_noop_message() 671 XTYPE_DW, IMA); in send_message_queue_full() 682 IMA); in send_message_queue_full() 690 IMA); in send_message_queue_full() 714 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 718 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 821 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), clines, IMA); in gru_send_message_gpa() 915 gru_vload_phys(cb, gpa, gru_get_tri(dsr), iaa, IMA); in gru_read_gpa() [all …]
|
| /linux/Documentation/security/ |
| A D | IMA-templates.rst | 2 IMA Template Management Mechanism 13 necessary to extend the current version of IMA by defining additional 24 management from the remaining IMA code. The core of this solution is the 35 parameter. At boot time, IMA initializes the chosen template descriptor 39 After the initialization step, IMA will call ``ima_alloc_init_template()``
|
| A D | index.rst | 9 IMA-templates
|
| A D | digsig.rst | 20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
|
| /linux/Documentation/ABI/testing/ |
| A D | ima_policy | 6 Measurement Architecture(IMA) maintains a list of hash 15 IMA appraisal, if configured, uses these file measurements 57 template:= name of a defined IMA template type
|
| /linux/security/integrity/ |
| A D | Kconfig | 10 Measurement Architecture (IMA), Extended Verification Module 11 (EVM), IMA-appraisal extension, digital signature verification
|
| /linux/fs/verity/ |
| A D | Kconfig | 55 an alternative to IMA appraisal. Userspace programs still
|
| /linux/Documentation/filesystems/ |
| A D | fsverity.rst | 78 in IMA (Integrity Measurement Architecture) policies is also planned. 457 the signature verification in userspace or using IMA-appraisal. 648 :Q: Why isn't fs-verity part of IMA? 649 :A: fs-verity and IMA (Integrity Measurement Architecture) have 651 hashing individual files using a Merkle tree. In contrast, IMA 656 IMA is planned to support the fs-verity hashing mechanism as an 660 through IMA. As a standalone filesystem feature, fs-verity
|
| A D | ubifs-authentication.rst | 431 to the way the IMA/EVM subsystem deals with such situations. The HMAC key
|
| /linux/Documentation/security/tpm/ |
| A D | xen-tpmfront.rst | 121 In order to use features such as IMA that require a TPM to be loaded prior to
|
| /linux/Documentation/admin-guide/ |
| A D | kernel-parameters.rst | 118 IMA Integrity measurement architecture is enabled.
|
| A D | kernel-parameters.txt | 1817 ima_appraise= [IMA] appraise integrity measurements 1825 ima_canonical_fmt [IMA] 1829 ima_hash= [IMA] 1837 ima_policy= [IMA] 1838 The builtin policies to load during IMA setup. 1862 ima_tcb [IMA] Deprecated. Use ima_policy= instead. 1864 Computing Base. This means IMA will measure all 1868 ima_template= [IMA] 1874 [IMA] Define a custom template format. 1886 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size [all …]
|
| /linux/security/ |
| A D | Kconfig | 44 various security modules (AppArmor, IMA, SafeSetID, TOMOYO, TPM).
|
| /linux/Documentation/x86/ |
| A D | intel_txt.rst | 64 Measurement Architecture (IMA) and Linux Integrity Module interface
|
| /linux/lib/ |
| A D | Kconfig | 581 which is used by IMA/EVM digital signature extension.
|
| /linux/fs/proc/ |
| A D | .cmdline.o.cmd | 28 $(wildcard include/config/IMA) \
|
| A D | .util.o.cmd | 474 $(wildcard include/config/IMA) \
|
| A D | .version.o.cmd | 28 $(wildcard include/config/IMA) \
|
| /linux/fs/ |
| A D | .fs_struct.o.cmd | 750 $(wildcard include/config/IMA) \
|
| A D | .fs_types.o.cmd | 28 $(wildcard include/config/IMA) \
|
| A D | .stack.o.cmd | 70 $(wildcard include/config/IMA) \
|
| A D | .bad_inode.o.cmd | 28 $(wildcard include/config/IMA) \
|
| A D | .pnode.o.cmd | 444 $(wildcard include/config/IMA) \
|