/kernel/linux/linux-6.6/drivers/md/ |
H A D | dm-ima.c | 11 #include "dm-ima.h" 13 #include <linux/ima.h> 19 #define DM_MSG_PREFIX "ima" 167 * Initialize/reset the dm ima related data structure variables. 171 memset(&(md->ima), 0, sizeof(md->ima)); in dm_ima_reset_data() 172 md->ima.dm_version_str_len = strlen(DM_IMA_VERSION_STR); in dm_ima_reset_data() 229 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len); in dm_ima_measure_on_table_load() 230 l += table->md->ima.dm_version_str_len; in dm_ima_measure_on_table_load() 286 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima in dm_ima_measure_on_table_load() [all...] |
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o 19 ima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o
|
H A D | ima_asymmetric_keys.c | 14 #include <linux/ima.h> 15 #include "ima.h" 50 * (such as ".builtin_trusted_keys", ".ima", etc.) to in ima_post_key_create_or_update()
|
H A D | ima_efi.c | 7 #include <linux/ima.h> 19 pr_info("ima: secureboot mode unknown, no efi\n"); in get_sb_mode() 25 pr_info("ima: secureboot mode disabled\n"); in get_sb_mode() 27 pr_info("ima: secureboot mode unknown\n"); in get_sb_mode() 29 pr_info("ima: secureboot mode enabled\n"); in get_sb_mode()
|
H A D | ima_init.c | 18 #include <linux/ima.h> 21 #include "ima.h"
|
H A D | ima_kexec.c | 14 #include <linux/ima.h> 15 #include "ima.h" 64 print_hex_dump_debug("ima dump: ", DUMP_PREFIX_NONE, 16, 1, in ima_dump_measurement_list()
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
|
H A D | ima_kexec.c | 13 #include <linux/ima.h> 14 #include "ima.h" 63 print_hex_dump(KERN_DEBUG, "ima dump: ", DUMP_PREFIX_NONE, in ima_dump_measurement_list()
|
/kernel/linux/linux-6.6/arch/x86/kernel/ |
H A D | kexec-bzimage64.c | 217 struct ima_setup_data *ima; in setup_ima_state() local 223 sd->len = sizeof(*ima); in setup_ima_state() 225 ima = (void *)sd + sizeof(struct setup_data); in setup_ima_state() 226 ima->addr = image->ima_buffer_addr; in setup_ima_state() 227 ima->size = image->ima_buffer_size; in setup_ima_state()
|
/kernel/linux/linux-5.10/arch/s390/kernel/ |
H A D | ima_arch.c | 3 #include <linux/ima.h>
|
/kernel/linux/linux-6.6/arch/s390/kernel/ |
H A D | ima_arch.c | 3 #include <linux/ima.h>
|
/kernel/linux/linux-5.10/arch/powerpc/kernel/ |
H A D | ima_arch.c | 7 #include <linux/ima.h> 46 * trusted boot. The "template=ima-modsig" option includes the appended 50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig", 51 "measure func=MODULE_CHECK template=ima-modsig",
|
/kernel/linux/linux-6.6/arch/powerpc/kernel/ |
H A D | ima_arch.c | 7 #include <linux/ima.h> 46 * trusted boot. The "template=ima-modsig" option includes the appended 50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig", 51 "measure func=MODULE_CHECK template=ima-modsig",
|
/kernel/linux/linux-5.10/drivers/misc/sgi-gru/ |
H A D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 134 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */ 243 /* Instruction mode attributes (ima field) */ 315 unsigned long idef2, unsigned char ima) in __opdword() 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member 313 __opdword(unsigned char opcode, unsigned char exopc, unsigned char xtype, unsigned char iaa0, unsigned char iaa1, unsigned long idef2, unsigned char ima) __opdword() argument
|
/kernel/linux/linux-6.6/drivers/misc/sgi-gru/ |
H A D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 134 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */ 243 /* Instruction mode attributes (ima field) */ 315 unsigned long idef2, unsigned char ima) in __opdword() 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member 313 __opdword(unsigned char opcode, unsigned char exopc, unsigned char xtype, unsigned char iaa0, unsigned char iaa1, unsigned long idef2, unsigned char ima) __opdword() argument
|
/kernel/linux/linux-5.10/arch/powerpc/kexec/ |
H A D | Makefile | 14 obj-y += ima.o
|
/kernel/linux/linux-5.10/security/integrity/ |
H A D | Makefile | 20 obj-$(CONFIG_IMA) += ima/
|
/kernel/linux/linux-6.6/security/integrity/ |
H A D | Makefile | 21 obj-$(CONFIG_IMA) += ima/
|
/kernel/linux/linux-5.10/arch/x86/kernel/ |
H A D | ima_arch.c | 7 #include <linux/ima.h> 21 pr_info("ima: secureboot mode unknown, no efi\n"); in get_sb_mode() 29 pr_info("ima: secureboot mode disabled\n"); in get_sb_mode() 34 pr_info("ima: secureboot mode unknown\n"); in get_sb_mode() 46 pr_info("ima: secureboot mode disabled\n"); in get_sb_mode() 50 pr_info("ima: secureboot mode enabled\n"); in get_sb_mode()
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | Makefile | 23 selinux-$(CONFIG_IMA) += ima.o
|
H A D | ima.c | 11 #include <linux/ima.h> 13 #include "ima.h"
|
/kernel/linux/linux-5.10/tools/testing/selftests/kexec/ |
H A D | kexec_common_lib.sh | 205 local ima_policy=$SECURITYFS/ima/policy
|
H A D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1) 86 echo $line | grep -q "security.ima=0x03" 227 # Are there pe and ima signatures
|
/kernel/linux/linux-6.6/tools/testing/selftests/kexec/ |
H A D | kexec_common_lib.sh | 204 local ima_policy=$SECURITYFS/ima/policy
|
H A D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1) 86 echo $line | grep -q "security.ima=0x03" 228 # Are there pe and ima signatures
|