Home
last modified time | relevance | path

Searched refs:ima (Results 1 - 25 of 56) sorted by relevance

123

/kernel/linux/linux-6.6/drivers/md/
H A Ddm-ima.c11 #include "dm-ima.h"
13 #include <linux/ima.h>
19 #define DM_MSG_PREFIX "ima"
167 * Initialize/reset the dm ima related data structure variables.
171 memset(&(md->ima), 0, sizeof(md->ima)); in dm_ima_reset_data()
172 md->ima.dm_version_str_len = strlen(DM_IMA_VERSION_STR); in dm_ima_reset_data()
229 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len); in dm_ima_measure_on_table_load()
230 l += table->md->ima.dm_version_str_len; in dm_ima_measure_on_table_load()
286 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima in dm_ima_measure_on_table_load()
[all...]
/kernel/linux/linux-6.6/security/integrity/ima/
H A DMakefile7 obj-$(CONFIG_IMA) += ima.o
9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o
15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o
16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
19 ima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o
H A Dima_asymmetric_keys.c14 #include <linux/ima.h>
15 #include "ima.h"
50 * (such as ".builtin_trusted_keys", ".ima", etc.) to in ima_post_key_create_or_update()
H A Dima_efi.c7 #include <linux/ima.h>
19 pr_info("ima: secureboot mode unknown, no efi\n"); in get_sb_mode()
25 pr_info("ima: secureboot mode disabled\n"); in get_sb_mode()
27 pr_info("ima: secureboot mode unknown\n"); in get_sb_mode()
29 pr_info("ima: secureboot mode enabled\n"); in get_sb_mode()
H A Dima_init.c18 #include <linux/ima.h>
21 #include "ima.h"
H A Dima_kexec.c14 #include <linux/ima.h>
15 #include "ima.h"
64 print_hex_dump_debug("ima dump: ", DUMP_PREFIX_NONE, 16, 1, in ima_dump_measurement_list()
/kernel/linux/linux-5.10/security/integrity/ima/
H A DMakefile7 obj-$(CONFIG_IMA) += ima.o
9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o
15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o
16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
H A Dima_kexec.c13 #include <linux/ima.h>
14 #include "ima.h"
63 print_hex_dump(KERN_DEBUG, "ima dump: ", DUMP_PREFIX_NONE, in ima_dump_measurement_list()
/kernel/linux/linux-6.6/arch/x86/kernel/
H A Dkexec-bzimage64.c217 struct ima_setup_data *ima; in setup_ima_state() local
223 sd->len = sizeof(*ima); in setup_ima_state()
225 ima = (void *)sd + sizeof(struct setup_data); in setup_ima_state()
226 ima->addr = image->ima_buffer_addr; in setup_ima_state()
227 ima->size = image->ima_buffer_size; in setup_ima_state()
/kernel/linux/linux-5.10/arch/s390/kernel/
H A Dima_arch.c3 #include <linux/ima.h>
/kernel/linux/linux-6.6/arch/s390/kernel/
H A Dima_arch.c3 #include <linux/ima.h>
/kernel/linux/linux-5.10/arch/powerpc/kernel/
H A Dima_arch.c7 #include <linux/ima.h>
46 * trusted boot. The "template=ima-modsig" option includes the appended
50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig",
51 "measure func=MODULE_CHECK template=ima-modsig",
/kernel/linux/linux-6.6/arch/powerpc/kernel/
H A Dima_arch.c7 #include <linux/ima.h>
46 * trusted boot. The "template=ima-modsig" option includes the appended
50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig",
51 "measure func=MODULE_CHECK template=ima-modsig",
/kernel/linux/linux-5.10/drivers/misc/sgi-gru/
H A Dgru_instructions.h100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member
134 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */
243 /* Instruction mode attributes (ima field) */
315 unsigned long idef2, unsigned char ima) in __opdword()
322 (ima << GRU_CB_IMA_SHFT) | in __opdword()
626 unsigned int ima :3; member
313 __opdword(unsigned char opcode, unsigned char exopc, unsigned char xtype, unsigned char iaa0, unsigned char iaa1, unsigned long idef2, unsigned char ima) __opdword() argument
/kernel/linux/linux-6.6/drivers/misc/sgi-gru/
H A Dgru_instructions.h100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member
134 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */
243 /* Instruction mode attributes (ima field) */
315 unsigned long idef2, unsigned char ima) in __opdword()
322 (ima << GRU_CB_IMA_SHFT) | in __opdword()
626 unsigned int ima :3; member
313 __opdword(unsigned char opcode, unsigned char exopc, unsigned char xtype, unsigned char iaa0, unsigned char iaa1, unsigned long idef2, unsigned char ima) __opdword() argument
/kernel/linux/linux-5.10/arch/powerpc/kexec/
H A DMakefile14 obj-y += ima.o
/kernel/linux/linux-5.10/security/integrity/
H A DMakefile20 obj-$(CONFIG_IMA) += ima/
/kernel/linux/linux-6.6/security/integrity/
H A DMakefile21 obj-$(CONFIG_IMA) += ima/
/kernel/linux/linux-5.10/arch/x86/kernel/
H A Dima_arch.c7 #include <linux/ima.h>
21 pr_info("ima: secureboot mode unknown, no efi\n"); in get_sb_mode()
29 pr_info("ima: secureboot mode disabled\n"); in get_sb_mode()
34 pr_info("ima: secureboot mode unknown\n"); in get_sb_mode()
46 pr_info("ima: secureboot mode disabled\n"); in get_sb_mode()
50 pr_info("ima: secureboot mode enabled\n"); in get_sb_mode()
/kernel/linux/linux-6.6/security/selinux/
H A DMakefile23 selinux-$(CONFIG_IMA) += ima.o
H A Dima.c11 #include <linux/ima.h>
13 #include "ima.h"
/kernel/linux/linux-5.10/tools/testing/selftests/kexec/
H A Dkexec_common_lib.sh205 local ima_policy=$SECURITYFS/ima/policy
H A Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
86 echo $line | grep -q "security.ima=0x03"
227 # Are there pe and ima signatures
/kernel/linux/linux-6.6/tools/testing/selftests/kexec/
H A Dkexec_common_lib.sh204 local ima_policy=$SECURITYFS/ima/policy
H A Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
86 echo $line | grep -q "security.ima=0x03"
228 # Are there pe and ima signatures

Completed in 9 milliseconds

123