Home
last modified time | relevance | path

Searched refs:ima (Results 1 – 25 of 31) sorted by relevance

12

/linux/drivers/md/
A Ddm-ima.c172 memset(&(md->ima), 0, sizeof(md->ima)); in dm_ima_reset_data()
343 if (table->md->ima.active_table.hash != table->md->ima.inactive_table.hash) in dm_ima_measure_on_table_load()
395 if (md->ima.active_table.hash != md->ima.inactive_table.hash) in dm_ima_measure_on_device_resume()
410 md->ima.active_table.hash = md->ima.inactive_table.hash; in dm_ima_measure_on_device_resume()
411 md->ima.active_table.hash_len = md->ima.inactive_table.hash_len; in dm_ima_measure_on_device_resume()
421 md->ima.active_table.num_targets = md->ima.inactive_table.num_targets; in dm_ima_measure_on_device_resume()
597 if (md->ima.active_table.hash != md->ima.inactive_table.hash) in dm_ima_measure_on_device_remove()
668 md->ima.inactive_table.hash != md->ima.active_table.hash) in dm_ima_measure_on_table_clear()
675 md->ima.inactive_table.device_metadata != md->ima.active_table.device_metadata) in dm_ima_measure_on_table_clear()
683 md->ima.inactive_table.hash = md->ima.active_table.hash; in dm_ima_measure_on_table_clear()
[all …]
A Ddm-core.h125 struct dm_ima_measurements ima; member
A DMakefile100 dm-mod-objs += dm-ima.o
A D.dm-builtin.o.cmd1243 drivers/md/dm-ima.h \
/linux/security/integrity/ima/
A DMakefile7 obj-$(CONFIG_IMA) += ima.o
9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o
15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o
16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
19 ima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o
A DKconfig68 The original 'ima' measurement list template contains a
70 limited to 255 characters. The 'ima-ng' measurement list
75 bool "ima"
77 bool "ima-ng (default)"
79 bool "ima-sig"
85 default "ima" if IMA_TEMPLATE
86 default "ima-ng" if IMA_NG_TEMPLATE
87 default "ima-sig" if IMA_SIG_TEMPLATE
162 <http://linux-ima.sourceforge.net>
260 This option requires that all keys added to the .ima
[all …]
/linux/Documentation/ABI/testing/
A Dima_policy1 What: /sys/kernel/security/*/ima/policy
10 Policies are loaded into the securityfs file ima/policy
13 the file ima/policy is closed.
55 (eg, .builtin_trusted_keys|.ima). Only valid
58 (eg, ima-ng). Only valid when action is "measure".
65 files where the security.ima xattr was hashed with one
143 keys added to .builtin_trusted_keys or .ima keyring:
145 measure func=KEY_CHECK keyrings=.builtin_trusted_keys|.ima
149 security.ima xattr of a file:
A Devm94 core/ima-setup) have support for loading keys at boot
/linux/Documentation/security/
A DIMA-templates.rst9 The original ``ima`` template is fixed length, containing the filedata hash
51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry,
89 - "ima": its format is ``d|n``;
90 - "ima-ng" (default): its format is ``d-ng|n-ng``;
91 - "ima-sig": its format is ``d-ng|n-ng|sig``;
92 - "ima-buf": its format is ``d-ng|n-ng|buf``;
93 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``;
104 configuration (``ima-ng`` is the default choice);
/linux/security/integrity/
A DKconfig27 of the different use cases - evm, ima, and modules.
51 This option requires that all keys added to the .ima and
99 source "security/integrity/ima/Kconfig"
A DMakefile20 obj-$(CONFIG_IMA) += ima/
/linux/Documentation/admin-guide/device-mapper/
A Ddm-ima.rst2 dm-ima
42 /etc/ima/ima-policy
43 measure func=CRITICAL_DATA label=device-mapper template=ima-buf
49 /sys/kernel/security/integrity/ima/ascii_runtime_measurements
50 /sys/kernel/security/integrity/ima/binary_runtime_measurements
62 TEMPLATE_NAME := Template name that registered the integrity value (e.g. ima-buf).
159 …10 a8c5ff755561c7a28146389d1514c318592af49a ima-buf sha256:4d73481ecce5eadba8ab084640d85bb9ca899af…
200 …10 56c00cc062ffc24ccd9ac2d67d194af3282b934e ima-buf sha256:e7d12c03b958b4e0e53e7363a06376be88d98a1…
238 …10 790e830a3a7a31590824ac0642b3b31c2d0e8b38 ima-buf sha256:ab9f3c959367a8f5d4403d6ce9c3627dadfa8f9…
272 …10 77d347408f557f68f0041acb0072946bb2367fe5 ima-buf sha256:42f9ca22163fdfa548e6229dece2959bc5ce295…
[all …]
A Dindex.rst16 dm-ima
/linux/drivers/misc/sgi-gru/
A Dgru_instructions.h100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member
315 unsigned long idef2, unsigned char ima) in __opdword() argument
322 (ima << GRU_CB_IMA_SHFT) | in __opdword()
626 unsigned int ima :3; member
/linux/tools/testing/selftests/bpf/progs/
A Dima.c22 void BPF_PROG(ima, struct linux_binprm *bprm) in BPF_PROG() argument
/linux/security/selinux/
A DMakefile19 selinux-$(CONFIG_IMA) += ima.o
/linux/tools/testing/selftests/bpf/prog_tests/
A Dtest_ima.c51 struct ima *skel = NULL; in test_test_ima()
/linux/tools/testing/selftests/kexec/
A Dtest_kexec_file_load.sh85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
A Dkexec_common_lib.sh205 local ima_policy=$SECURITYFS/ima/policy
/linux/security/integrity/evm/
A DKconfig38 security.SMACK64, security.capability, and security.ima) included
/linux/Documentation/powerpc/
A Dimc.rst49 https://github.com/open-power/ima-catalog
/linux/fs/
A D.attr.o.cmd967 include/linux/ima.h \
A D.file_table.o.cmd1053 include/linux/ima.h \
/linux/security/keys/
A D.key.o.cmd918 include/linux/ima.h \
/linux/Documentation/admin-guide/
A Dkernel-parameters.txt1870 Formats: { "ima" | "ima-ng" | "ima-sig" }
1871 Default: "ima-ng"
1877 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage
1886 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size

Completed in 51 milliseconds

12