Home
last modified time | relevance | path

Searched refs:IMA (Results 1 – 17 of 17) sorted by relevance

/Linux-v5.4/security/integrity/ima/
DKconfig4 config IMA config
5 bool "Integrity Measurement Architecture(IMA)"
19 Measurement Architecture(IMA) maintains a list of hash
25 If your system has a TPM chip, then IMA also maintains
30 to learn more about IMA.
34 bool "Enable carrying the IMA measurement list across a soft boot"
35 depends on IMA && TCG_TPM && HAVE_IMA_KEXEC
39 a TPM's quote after a soft boot, the IMA measurement list of the
42 Depending on the IMA policy, the measurement list can grow to
47 depends on IMA
[all …]
/Linux-v5.4/drivers/misc/sgi-gru/
Dgrukservices.c96 #define IMA IMA_CB_DELAY macro
590 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message()
616 IMA); in send_noop_message()
658 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full()
670 XTYPE_DW, IMA); in send_message_queue_full()
681 IMA); in send_message_queue_full()
689 IMA); in send_message_queue_full()
713 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
717 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
820 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), clines, IMA); in gru_send_message_gpa()
[all …]
/Linux-v5.4/Documentation/security/
DIMA-templates.rst2 IMA Template Management Mechanism
13 necessary to extend the current version of IMA by defining additional
24 management from the remaining IMA code. The core of this solution is the
35 parameter. At boot time, IMA initializes the chosen template descriptor
39 After the initialization step, IMA will call ``ima_alloc_init_template()``
Dindex.rst9 IMA-templates
/Linux-v5.4/Documentation/ABI/testing/
Dima_policy6 Measurement Architecture(IMA) maintains a list of hash
15 IMA appraisal, if configured, uses these file measurements
41 template:= name of a defined IMA template type
/Linux-v5.4/security/integrity/
DKconfig10 Measurement Architecture (IMA), Extended Verification Module
11 (EVM), IMA-appraisal extension, digital signature verification
/Linux-v5.4/fs/verity/
DKconfig51 an alternative to IMA appraisal. Userspace programs still
/Linux-v5.4/Documentation/
Ddigsig.txt20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
/Linux-v5.4/Documentation/filesystems/
Dfsverity.rst78 in IMA (Integrity Measurement Architecture) policies is also planned.
377 the signature verification in userspace or using IMA-appraisal.
568 :Q: Why isn't fs-verity part of IMA?
569 :A: fs-verity and IMA (Integrity Measurement Architecture) have
571 hashing individual files using a Merkle tree. In contrast, IMA
576 IMA is planned to support the fs-verity hashing mechanism as an
580 through IMA. As a standalone filesystem feature, fs-verity
Dubifs-authentication.rst427 to the way the IMA/EVM subsystem deals with such situations. The HMAC key
/Linux-v5.4/Documentation/security/tpm/
Dxen-tpmfront.rst121 In order to use features such as IMA that require a TPM to be loaded prior to
/Linux-v5.4/Documentation/admin-guide/
Dkernel-parameters.rst106 IMA Integrity measurement architecture is enabled.
Dkernel-parameters.txt1592 ima_appraise= [IMA] appraise integrity measurements
1596 ima_appraise_tcb [IMA] Deprecated. Use ima_policy= instead.
1600 ima_canonical_fmt [IMA]
1604 ima_hash= [IMA]
1612 ima_policy= [IMA]
1613 The builtin policies to load during IMA setup.
1634 ima_tcb [IMA] Deprecated. Use ima_policy= instead.
1636 Computing Base. This means IMA will measure all
1640 ima_template= [IMA]
1641 Select one of defined IMA measurements template formats.
[all …]
/Linux-v5.4/security/
DKconfig44 various security modules (AppArmor, IMA, SafeSetID, TOMOYO, TPM).
/Linux-v5.4/Documentation/x86/
Dintel_txt.rst64 Measurement Architecture (IMA) and Linux Integrity Module interface
/Linux-v5.4/lib/
DKconfig544 which is used by IMA/EVM digital signature extension.
/Linux-v5.4/
DMAINTAINERS8153 INTEGRITY MEASUREMENT ARCHITECTURE (IMA)