/Linux-v5.15/drivers/md/ |
D | dm-ima.c | 171 memset(&(md->ima), 0, sizeof(md->ima)); in dm_ima_reset_data() 172 md->ima.dm_version_str_len = strlen(DM_IMA_VERSION_STR); in dm_ima_reset_data() 229 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len); in dm_ima_measure_on_table_load() 230 l += table->md->ima.dm_version_str_len; in dm_ima_measure_on_table_load() 289 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len); in dm_ima_measure_on_table_load() 290 l += table->md->ima.dm_version_str_len; in dm_ima_measure_on_table_load() 342 if (table->md->ima.active_table.hash != table->md->ima.inactive_table.hash) in dm_ima_measure_on_table_load() 343 kfree(table->md->ima.inactive_table.hash); in dm_ima_measure_on_table_load() 345 table->md->ima.inactive_table.hash = digest_buf; in dm_ima_measure_on_table_load() 346 table->md->ima.inactive_table.hash_len = strlen(digest_buf); in dm_ima_measure_on_table_load() [all …]
|
D | dm-core.h | 125 struct dm_ima_measurements ima; member
|
D | Makefile | 100 dm-mod-objs += dm-ima.o
|
/Linux-v5.15/security/integrity/ima/ |
D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o 19 ima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o
|
D | Kconfig | 68 The original 'ima' measurement list template contains a 70 limited to 255 characters. The 'ima-ng' measurement list 75 bool "ima" 77 bool "ima-ng (default)" 79 bool "ima-sig" 85 default "ima" if IMA_TEMPLATE 86 default "ima-ng" if IMA_NG_TEMPLATE 87 default "ima-sig" if IMA_SIG_TEMPLATE 162 <http://linux-ima.sourceforge.net> 254 bool "Require all keys on the .ima keyring be signed (deprecated)" [all …]
|
/Linux-v5.15/Documentation/ABI/testing/ |
D | ima_policy | 1 What: security/ima/policy 10 Policies are loaded into the securityfs file ima/policy 13 the file ima/policy is closed. 51 (eg, .builtin_trusted_keys|.ima). Only valid 54 (eg, ima-ng). Only valid when action is "measure". 61 files where the security.ima xattr was hashed with one 139 keys added to .builtin_trusted_keys or .ima keyring: 141 measure func=KEY_CHECK keyrings=.builtin_trusted_keys|.ima 145 security.ima xattr of a file:
|
D | evm | 93 core/ima-setup) have support for loading keys at boot
|
/Linux-v5.15/Documentation/security/ |
D | IMA-templates.rst | 9 The original ``ima`` template is fixed length, containing the filedata hash 51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry, 89 - "ima": its format is ``d|n``; 90 - "ima-ng" (default): its format is ``d-ng|n-ng``; 91 - "ima-sig": its format is ``d-ng|n-ng|sig``; 92 - "ima-buf": its format is ``d-ng|n-ng|buf``; 93 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``; 104 configuration (``ima-ng`` is the default choice);
|
/Linux-v5.15/security/integrity/ |
D | Kconfig | 27 of the different use cases - evm, ima, and modules. 51 This option requires that all keys added to the .ima and 99 source "security/integrity/ima/Kconfig"
|
D | Makefile | 20 obj-$(CONFIG_IMA) += ima/
|
/Linux-v5.15/Documentation/admin-guide/device-mapper/ |
D | dm-ima.rst | 2 dm-ima 42 /etc/ima/ima-policy 43 measure func=CRITICAL_DATA label=device-mapper template=ima-buf 49 /sys/kernel/security/integrity/ima/ascii_runtime_measurements 50 /sys/kernel/security/integrity/ima/binary_runtime_measurements 62 TEMPLATE_NAME := Template name that registered the integrity value (e.g. ima-buf). 159 …10 a8c5ff755561c7a28146389d1514c318592af49a ima-buf sha256:4d73481ecce5eadba8ab084640d85bb9ca899af… 200 …10 56c00cc062ffc24ccd9ac2d67d194af3282b934e ima-buf sha256:e7d12c03b958b4e0e53e7363a06376be88d98a1… 238 …10 790e830a3a7a31590824ac0642b3b31c2d0e8b38 ima-buf sha256:ab9f3c959367a8f5d4403d6ce9c3627dadfa8f9… 272 …10 77d347408f557f68f0041acb0072946bb2367fe5 ima-buf sha256:42f9ca22163fdfa548e6229dece2959bc5ce295… [all …]
|
D | index.rst | 16 dm-ima
|
/Linux-v5.15/tools/testing/selftests/bpf/progs/ |
D | ima.c | 22 void BPF_PROG(ima, struct linux_binprm *bprm) in BPF_PROG() argument
|
/Linux-v5.15/drivers/misc/sgi-gru/ |
D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 315 unsigned long idef2, unsigned char ima) in __opdword() argument 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member
|
/Linux-v5.15/security/selinux/ |
D | Makefile | 19 selinux-$(CONFIG_IMA) += ima.o
|
/Linux-v5.15/tools/testing/selftests/bpf/prog_tests/ |
D | test_ima.c | 51 struct ima *skel = NULL; in test_test_ima()
|
/Linux-v5.15/tools/testing/selftests/kexec/ |
D | test_kexec_file_load.sh | 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
|
D | kexec_common_lib.sh | 205 local ima_policy=$SECURITYFS/ima/policy
|
/Linux-v5.15/security/integrity/evm/ |
D | Kconfig | 38 security.SMACK64, security.capability, and security.ima) included
|
/Linux-v5.15/Documentation/powerpc/ |
D | imc.rst | 49 https://github.com/open-power/ima-catalog
|
/Linux-v5.15/Documentation/admin-guide/ |
D | kernel-parameters.txt | 1869 Formats: { "ima" | "ima-ng" | "ima-sig" } 1870 Default: "ima-ng" 1876 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage 1885 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
|
/Linux-v5.15/ |
D | MAINTAINERS | 9293 F: security/integrity/ima/
|