/linux-6.3-rc2/drivers/md/ |
A D | dm-ima.c | 171 memset(&(md->ima), 0, sizeof(md->ima)); in dm_ima_reset_data() 339 if (table->md->ima.active_table.hash != table->md->ima.inactive_table.hash) in dm_ima_measure_on_table_load() 391 if (md->ima.active_table.hash != md->ima.inactive_table.hash) in dm_ima_measure_on_device_resume() 406 md->ima.active_table.hash = md->ima.inactive_table.hash; in dm_ima_measure_on_device_resume() 407 md->ima.active_table.hash_len = md->ima.inactive_table.hash_len; in dm_ima_measure_on_device_resume() 417 md->ima.active_table.num_targets = md->ima.inactive_table.num_targets; in dm_ima_measure_on_device_resume() 593 if (md->ima.active_table.hash != md->ima.inactive_table.hash) in dm_ima_measure_on_device_remove() 664 md->ima.inactive_table.hash != md->ima.active_table.hash) in dm_ima_measure_on_table_clear() 671 md->ima.inactive_table.device_metadata != md->ima.active_table.device_metadata) in dm_ima_measure_on_table_clear() 679 md->ima.inactive_table.hash = md->ima.active_table.hash; in dm_ima_measure_on_table_clear() [all …]
|
A D | dm-core.h | 145 struct dm_ima_measurements ima; member
|
A D | Makefile | 101 dm-mod-objs += dm-ima.o
|
/linux-6.3-rc2/security/integrity/ima/ |
A D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o 19 ima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o
|
A D | Kconfig | 68 The original 'ima' measurement list template contains a 70 limited to 255 characters. The 'ima-ng' measurement list 76 bool "ima-ng (default)" 78 bool "ima-sig" 84 default "ima-ng" if IMA_NG_TEMPLATE 85 default "ima-sig" if IMA_SIG_TEMPLATE 160 <http://linux-ima.sourceforge.net> 258 This option requires that all keys added to the .ima 292 bool "Load X509 certificate onto the '.ima' trusted keyring" 297 loaded on the .ima trusted keyring. These public keys are [all …]
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | ima_policy | 1 What: /sys/kernel/security/*/ima/policy 10 Policies are loaded into the securityfs file ima/policy 13 the file ima/policy is closed. 57 stored in security.ima xattr. Requires 67 (eg, .builtin_trusted_keys|.ima). Only valid 70 (eg, ima-ng). Only valid when action is "measure". 77 files where the security.ima xattr was hashed with one 155 keys added to .builtin_trusted_keys or .ima keyring: 161 security.ima xattr of a file: 169 template=ima-ngv2 [all …]
|
A D | evm | 94 core/ima-setup) have support for loading keys at boot
|
/linux-6.3-rc2/Documentation/security/ |
A D | IMA-templates.rst | 9 The original ``ima`` template is fixed length, containing the filedata hash 51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry, 75 or the EVM portable signature, if 'security.ima' contains a file hash. 90 - "ima": its format is ``d|n``; 91 - "ima-ng" (default): its format is ``d-ng|n-ng``; 92 - "ima-ngv2": its format is ``d-ngv2|n-ng``; 93 - "ima-sig": its format is ``d-ng|n-ng|sig``; 94 - "ima-sigv2": its format is ``d-ngv2|n-ng|sig``; 95 - "ima-buf": its format is ``d-ng|n-ng|buf``; 96 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``; [all …]
|
/linux-6.3-rc2/arch/x86/kernel/ |
A D | kexec-bzimage64.c | 217 struct ima_setup_data *ima; in setup_ima_state() local 223 sd->len = sizeof(*ima); in setup_ima_state() 225 ima = (void *)sd + sizeof(struct setup_data); in setup_ima_state() 226 ima->addr = image->ima_buffer_addr; in setup_ima_state() 227 ima->size = image->ima_buffer_size; in setup_ima_state()
|
/linux-6.3-rc2/security/integrity/ |
A D | Kconfig | 27 of the different use cases - evm, ima, and modules. 51 This option requires that all keys added to the .ima and 112 source "security/integrity/ima/Kconfig"
|
A D | Makefile | 21 obj-$(CONFIG_IMA) += ima/
|
/linux-6.3-rc2/Documentation/admin-guide/device-mapper/ |
A D | dm-ima.rst | 2 dm-ima 42 /etc/ima/ima-policy 43 measure func=CRITICAL_DATA label=device-mapper template=ima-buf 49 /sys/kernel/security/integrity/ima/ascii_runtime_measurements 50 /sys/kernel/security/integrity/ima/binary_runtime_measurements 62 TEMPLATE_NAME := Template name that registered the integrity value (e.g. ima-buf). 159 …10 a8c5ff755561c7a28146389d1514c318592af49a ima-buf sha256:4d73481ecce5eadba8ab084640d85bb9ca899af… 200 …10 56c00cc062ffc24ccd9ac2d67d194af3282b934e ima-buf sha256:e7d12c03b958b4e0e53e7363a06376be88d98a1… 238 …10 790e830a3a7a31590824ac0642b3b31c2d0e8b38 ima-buf sha256:ab9f3c959367a8f5d4403d6ce9c3627dadfa8f9… 272 …10 77d347408f557f68f0041acb0072946bb2367fe5 ima-buf sha256:42f9ca22163fdfa548e6229dece2959bc5ce295… [all …]
|
A D | index.rst | 16 dm-ima
|
/linux-6.3-rc2/drivers/misc/sgi-gru/ |
A D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 315 unsigned long idef2, unsigned char ima) in __opdword() argument 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member
|
/linux-6.3-rc2/security/selinux/ |
A D | Makefile | 19 selinux-$(CONFIG_IMA) += ima.o
|
/linux-6.3-rc2/tools/testing/selftests/kexec/ |
A D | kexec_common_lib.sh | 204 local ima_policy=$SECURITYFS/ima/policy
|
A D | test_kexec_file_load.sh | 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
|
/linux-6.3-rc2/security/integrity/evm/ |
A D | Kconfig | 38 security.SMACK64, security.capability, and security.ima) included
|
/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/ |
A D | test_ima.c | 74 struct ima *skel = NULL; in test_test_ima()
|
/linux-6.3-rc2/Documentation/powerpc/ |
A D | imc.rst | 49 https://github.com/open-power/ima-catalog
|
/linux-6.3-rc2/Documentation/admin-guide/ |
A D | kernel-parameters.txt | 1963 Formats: { "ima" | "ima-ng" | "ima-ngv2" | "ima-sig" | 1964 "ima-sigv2" } 1965 Default: "ima-ng" 1971 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage 1980 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
|
/linux-6.3-rc2/Documentation/filesystems/ |
A D | fsverity.rst | 88 stored as security.ima xattrs, based on policy.
|
/linux-6.3-rc2/ |
A D | MAINTAINERS | 10163 F: security/integrity/ima/
|