Home
last modified time | relevance | path

Searched refs:ima (Results 1 – 22 of 22) sorted by relevance

/linux/drivers/md/
H A Ddm-ima.c11 #include "dm-ima.h"
13 #include <linux/ima.h>
19 #define DM_MSG_PREFIX "ima"
167 * Initialize/reset the dm ima related data structure variables.
171 memset(&(md->ima), 0, sizeof(md->ima)); in dm_ima_reset_data()
172 md->ima.dm_version_str_len = strlen(DM_IMA_VERSION_STR); in dm_ima_reset_data()
229 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len); in dm_ima_measure_on_table_load()
230 l += table->md->ima.dm_version_str_len; in dm_ima_measure_on_table_load()
287 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima in dm_ima_measure_on_table_load()
[all...]
H A Ddm-core.h22 #include "dm-ima.h"
148 struct dm_ima_measurements ima; member
H A DMakefile98 dm-mod-objs += dm-ima.o
/linux/Documentation/translations/zh_CN/security/
H A DIMA-templates.rst17 原始的 ``ima`` 模板是固定长度的,包含文件数据的哈希值和路径名。文件数据
45 相同的机制也用于显示度量条目。函数 ``ima[_ascii]_measurements_show()`` 会为
60 - 'd-ngv2':与d-ng相同,但以"ima"或"verity"摘要类型为前缀
65 如果'security.ima'包含文件哈希;
79 - "ima":其格式是 ``d|n`` ;
80 - "ima-ng"(默认):其格式是 ``d-ng|n-ng`` ;
81 - "ima-ngv2":其格式是 ``d-ngv2|n-ng`` ;
82 - "ima-sig":其格式是 ``d-ng|n-ng|sig`` ;
83 - "ima-sigv2":其格式是 ``d-ngv2|n-ng|sig`` ;
84 - "ima
[all...]
/linux/Documentation/security/
H A DIMA-templates.rst9 The original ``ima`` template is fixed length, containing the filedata hash
51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry,
70 - 'd-ngv2': same as d-ng, but prefixed with the "ima" or "verity" digest type
75 or the EVM portable signature, if 'security.ima' contains a file hash.
90 - "ima": its format is ``d|n``;
91 - "ima-ng" (default): its format is ``d-ng|n-ng``;
92 - "ima-ngv2": its format is ``d-ngv2|n-ng``;
93 - "ima-sig": its format is ``d-ng|n-ng|sig``;
94 - "ima-sigv2": its format is ``d-ngv2|n-ng|sig``;
95 - "ima
[all...]
/linux/security/integrity/ima/
H A DKconfig69 The original 'ima' measurement list template contains a
71 limited to 255 characters. The 'ima-ng' measurement list
77 bool "ima-ng (default)"
79 bool "ima-sig"
84 default "ima-ng" if IMA_NG_TEMPLATE
85 default "ima-sig" if IMA_SIG_TEMPLATE
155 <http://linux-ima.sourceforge.net>
276 bool "Load X509 certificate onto the '.ima' trusted keyring"
281 loaded on the .ima trusted keyring. These public keys are
284 loading from the kernel onto the '.ima' truste
[all...]
H A Dima_main.c26 #include <linux/ima.h>
32 #include "ima.h"
51 pr_info("Warning: ima setup option only permitted in kdump"); in ima_setup()
60 pr_err("Invalid ima setup option: \"%s\" , please specify ima=on|off.", str); in ima_setup()
64 __setup("ima=", ima_setup);
385 /* read 'security.ima' */ in process_measurement()
1265 .name = "ima",
1281 DEFINE_LSM(ima) = {
1282 .name = "ima",
[all...]
/linux/arch/x86/kernel/
H A Dkexec-bzimage64.c223 struct ima_setup_data *ima; in setup_ima_state() local
229 sd->len = sizeof(*ima); in setup_ima_state()
231 ima = (void *)sd + sizeof(struct setup_data); in setup_ima_state()
232 ima->addr = image->ima_buffer_addr; in setup_ima_state()
233 ima->size = image->ima_buffer_size; in setup_ima_state()
/linux/drivers/misc/sgi-gru/
H A Dgru_instructions.h90 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member
124 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */
233 /* Instruction mode attributes (ima field) */
305 unsigned long idef2, unsigned char ima) in __opdword() argument
312 (ima << GRU_CB_IMA_SHFT) | in __opdword()
616 unsigned int ima :3; member
/linux/Documentation/admin-guide/device-mapper/
H A Ddm-ima.rst2 dm-ima
42 /etc/ima/ima-policy
43 measure func=CRITICAL_DATA label=device-mapper template=ima-buf
49 /sys/kernel/security/integrity/ima/ascii_runtime_measurements
50 /sys/kernel/security/integrity/ima/binary_runtime_measurements
62 TEMPLATE_NAME := Template name that registered the integrity value (e.g. ima-buf).
159 10 a8c5ff755561c7a28146389d1514c318592af49a ima-buf sha256:4d73481ecce5eadba8ab084640d85bb9ca899af4d0a122989252a76efadc5b72
200 10 56c00cc062ffc24ccd9ac2d67d194af3282b934e ima-buf sha256:e7d12c03b958b4e0e53e7363a06376be88d98a1ac191fdbd3baf5e4b77f329b6
238 10 790e830a3a7a31590824ac0642b3b31c2d0e8b38 ima
[all...]
H A Dindex.rst16 dm-ima
/linux/security/integrity/
H A DKconfig27 of the different use cases - evm, ima, and modules.
51 This option requires that all keys added to the .ima and
133 source "security/integrity/ima/Kconfig"
H A DMakefile21 # The relative order of the 'ima' and 'evm' LSMs depends on the order below.
22 obj-$(CONFIG_IMA) += ima/
/linux/security/selinux/
H A DMakefile25 selinux-$(CONFIG_IMA) += ima.o
/linux/tools/testing/selftests/kexec/
H A Dkexec_common_lib.sh204 local ima_policy=$SECURITYFS/ima/policy
H A Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
86 echo $line | grep -q "security.ima=0x03"
228 # Are there pe and ima signatures
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dtest_ima.c14 #include "ima.skel.h"
74 struct ima *skel = NULL; in test_test_ima()
137 * If commit 62622dab0a28 ("ima: return IMA digest value only when in test_test_ima()
/linux/security/integrity/evm/
H A DKconfig39 security.SMACK64, security.capability, and security.ima) included
/linux/Documentation/ABI/testing/
H A Devm94 core/ima-setup) have support for loading keys at boot
/linux/Documentation/arch/powerpc/
H A Dimc.rst49 https://github.com/open-power/ima-catalog
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst586 to the policy file to ``$securityfs/ima/policy``
/linux/
H A DMAINTAINERS12132 F: security/integrity/ima/