/linux/drivers/md/ |
H A D | dm-ima.c | 11 #include "dm-ima.h" 13 #include <linux/ima.h> 19 #define DM_MSG_PREFIX "ima" 167 * Initialize/reset the dm ima related data structure variables. 171 memset(&(md->ima), 0, sizeof(md->ima)); in dm_ima_reset_data() 172 md->ima.dm_version_str_len = strlen(DM_IMA_VERSION_STR); in dm_ima_reset_data() 229 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len); in dm_ima_measure_on_table_load() 230 l += table->md->ima.dm_version_str_len; in dm_ima_measure_on_table_load() 287 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima in dm_ima_measure_on_table_load() [all...] |
H A D | dm-core.h | 22 #include "dm-ima.h" 148 struct dm_ima_measurements ima; member
|
H A D | Makefile | 98 dm-mod-objs += dm-ima.o
|
/linux/Documentation/translations/zh_CN/security/ |
H A D | IMA-templates.rst | 17 原始的 ``ima`` 模板是固定长度的,包含文件数据的哈希值和路径名。文件数据 45 相同的机制也用于显示度量条目。函数 ``ima[_ascii]_measurements_show()`` 会为 60 - 'd-ngv2':与d-ng相同,但以"ima"或"verity"摘要类型为前缀 65 如果'security.ima'包含文件哈希; 79 - "ima":其格式是 ``d|n`` ; 80 - "ima-ng"(默认):其格式是 ``d-ng|n-ng`` ; 81 - "ima-ngv2":其格式是 ``d-ngv2|n-ng`` ; 82 - "ima-sig":其格式是 ``d-ng|n-ng|sig`` ; 83 - "ima-sigv2":其格式是 ``d-ngv2|n-ng|sig`` ; 84 - "ima [all...] |
/linux/Documentation/security/ |
H A D | IMA-templates.rst | 9 The original ``ima`` template is fixed length, containing the filedata hash 51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry, 70 - 'd-ngv2': same as d-ng, but prefixed with the "ima" or "verity" digest type 75 or the EVM portable signature, if 'security.ima' contains a file hash. 90 - "ima": its format is ``d|n``; 91 - "ima-ng" (default): its format is ``d-ng|n-ng``; 92 - "ima-ngv2": its format is ``d-ngv2|n-ng``; 93 - "ima-sig": its format is ``d-ng|n-ng|sig``; 94 - "ima-sigv2": its format is ``d-ngv2|n-ng|sig``; 95 - "ima [all...] |
/linux/security/integrity/ima/ |
H A D | Kconfig | 69 The original 'ima' measurement list template contains a 71 limited to 255 characters. The 'ima-ng' measurement list 77 bool "ima-ng (default)" 79 bool "ima-sig" 84 default "ima-ng" if IMA_NG_TEMPLATE 85 default "ima-sig" if IMA_SIG_TEMPLATE 155 <http://linux-ima.sourceforge.net> 276 bool "Load X509 certificate onto the '.ima' trusted keyring" 281 loaded on the .ima trusted keyring. These public keys are 284 loading from the kernel onto the '.ima' truste [all...] |
H A D | ima_main.c | 26 #include <linux/ima.h> 32 #include "ima.h" 51 pr_info("Warning: ima setup option only permitted in kdump"); in ima_setup() 60 pr_err("Invalid ima setup option: \"%s\" , please specify ima=on|off.", str); in ima_setup() 64 __setup("ima=", ima_setup); 385 /* read 'security.ima' */ in process_measurement() 1265 .name = "ima", 1281 DEFINE_LSM(ima) = { 1282 .name = "ima", [all...] |
/linux/arch/x86/kernel/ |
H A D | kexec-bzimage64.c | 223 struct ima_setup_data *ima; in setup_ima_state() local 229 sd->len = sizeof(*ima); in setup_ima_state() 231 ima = (void *)sd + sizeof(struct setup_data); in setup_ima_state() 232 ima->addr = image->ima_buffer_addr; in setup_ima_state() 233 ima->size = image->ima_buffer_size; in setup_ima_state()
|
/linux/drivers/misc/sgi-gru/ |
H A D | gru_instructions.h | 90 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 124 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */ 233 /* Instruction mode attributes (ima field) */ 305 unsigned long idef2, unsigned char ima) in __opdword() argument 312 (ima << GRU_CB_IMA_SHFT) | in __opdword() 616 unsigned int ima :3; member
|
/linux/Documentation/admin-guide/device-mapper/ |
H A D | dm-ima.rst | 2 dm-ima 42 /etc/ima/ima-policy 43 measure func=CRITICAL_DATA label=device-mapper template=ima-buf 49 /sys/kernel/security/integrity/ima/ascii_runtime_measurements 50 /sys/kernel/security/integrity/ima/binary_runtime_measurements 62 TEMPLATE_NAME := Template name that registered the integrity value (e.g. ima-buf). 159 10 a8c5ff755561c7a28146389d1514c318592af49a ima-buf sha256:4d73481ecce5eadba8ab084640d85bb9ca899af4d0a122989252a76efadc5b72 200 10 56c00cc062ffc24ccd9ac2d67d194af3282b934e ima-buf sha256:e7d12c03b958b4e0e53e7363a06376be88d98a1ac191fdbd3baf5e4b77f329b6 238 10 790e830a3a7a31590824ac0642b3b31c2d0e8b38 ima [all...] |
H A D | index.rst | 16 dm-ima
|
/linux/security/integrity/ |
H A D | Kconfig | 27 of the different use cases - evm, ima, and modules. 51 This option requires that all keys added to the .ima and 133 source "security/integrity/ima/Kconfig"
|
H A D | Makefile | 21 # The relative order of the 'ima' and 'evm' LSMs depends on the order below. 22 obj-$(CONFIG_IMA) += ima/
|
/linux/security/selinux/ |
H A D | Makefile | 25 selinux-$(CONFIG_IMA) += ima.o
|
/linux/tools/testing/selftests/kexec/ |
H A D | kexec_common_lib.sh | 204 local ima_policy=$SECURITYFS/ima/policy
|
H A D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1) 86 echo $line | grep -q "security.ima=0x03" 228 # Are there pe and ima signatures
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | test_ima.c | 14 #include "ima.skel.h" 74 struct ima *skel = NULL; in test_test_ima() 137 * If commit 62622dab0a28 ("ima: return IMA digest value only when in test_test_ima()
|
/linux/security/integrity/evm/ |
H A D | Kconfig | 39 security.SMACK64, security.capability, and security.ima) included
|
/linux/Documentation/ABI/testing/ |
H A D | evm | 94 core/ima-setup) have support for loading keys at boot
|
/linux/Documentation/arch/powerpc/ |
H A D | imc.rst | 49 https://github.com/open-power/ima-catalog
|
/linux/Documentation/admin-guide/LSM/ |
H A D | ipe.rst | 586 to the policy file to ``$securityfs/ima/policy``
|
/linux/ |
H A D | MAINTAINERS | 12132 F: security/integrity/ima/
|