Home
last modified time | relevance | path

Searched refs:IMA (Results 1 – 14 of 14) sorted by relevance

/Linux-v4.19/security/integrity/ima/
DKconfig3 config IMA config
4 bool "Integrity Measurement Architecture(IMA)"
18 Measurement Architecture(IMA) maintains a list of hash
24 If your system has a TPM chip, then IMA also maintains
29 to learn more about IMA.
33 bool "Enable carrying the IMA measurement list across a soft boot"
34 depends on IMA && TCG_TPM && HAVE_IMA_KEXEC
38 a TPM's quote after a soft boot, the IMA measurement list of the
41 Depending on the IMA policy, the measurement list can grow to
46 depends on IMA
[all …]
/Linux-v4.19/drivers/misc/sgi-gru/
Dgrukservices.c109 #define IMA IMA_CB_DELAY macro
603 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message()
629 IMA); in send_noop_message()
671 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full()
683 XTYPE_DW, IMA); in send_message_queue_full()
694 IMA); in send_message_queue_full()
702 IMA); in send_message_queue_full()
726 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
730 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
833 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), clines, IMA); in gru_send_message_gpa()
[all …]
/Linux-v4.19/Documentation/security/
DIMA-templates.rst2 IMA Template Management Mechanism
13 necessary to extend the current version of IMA by defining additional
24 management from the remaining IMA code. The core of this solution is the
35 parameter. At boot time, IMA initializes the chosen template descriptor
39 After the initialization step, IMA will call ``ima_alloc_init_template()``
Dindex.rst9 IMA-templates
/Linux-v4.19/security/integrity/
DKconfig9 Measurement Architecture (IMA), Extended Verification Module
10 (EVM), IMA-appraisal extension, digital signature verification
/Linux-v4.19/Documentation/ABI/testing/
Dima_policy6 Measurement Architecture(IMA) maintains a list of hash
15 IMA appraisal, if configured, uses these file measurements
/Linux-v4.19/Documentation/
Ddigsig.txt20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
Dintel_txt.txt64 Measurement Architecture (IMA) and Linux Integrity Module interface
/Linux-v4.19/Documentation/security/tpm/
Dxen-tpmfront.txt110 In order to use features such as IMA that require a TPM to be loaded prior to
/Linux-v4.19/Documentation/admin-guide/
Dkernel-parameters.rst105 IMA Integrity measurement architecture is enabled.
Dkernel-parameters.txt1540 ima_appraise= [IMA] appraise integrity measurements
1544 ima_appraise_tcb [IMA]
1548 ima_canonical_fmt [IMA]
1552 ima_hash= [IMA]
1560 ima_policy= [IMA]
1561 The builtin policies to load during IMA setup.
1583 ima_tcb [IMA] Deprecated. Use ima_policy= instead.
1585 Computing Base. This means IMA will measure all
1589 ima_template= [IMA]
1590 Select one of defined IMA measurements template formats.
[all …]
/Linux-v4.19/security/
DKconfig43 the TPM bios character driver and IMA, an integrity provider. It is
/Linux-v4.19/lib/
DKconfig531 which is used by IMA/EVM digital signature extension.
/Linux-v4.19/
DMAINTAINERS7301 INTEGRITY MEASUREMENT ARCHITECTURE (IMA)