Searched refs:ima (Results 1 - 25 of 27) sorted by relevance

12

/linux-master/security/integrity/ima/
H A DMakefile7 obj-$(CONFIG_IMA) += ima.o ima_iint.o
9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o
15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o
16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
19 ima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o
H A Dima_asymmetric_keys.c14 #include <linux/ima.h>
15 #include "ima.h"
50 * (such as ".builtin_trusted_keys", ".ima", etc.) to
H A Dima_efi.c7 #include <linux/ima.h>
19 pr_info("ima: secureboot mode unknown, no efi\n");
25 pr_info("ima: secureboot mode disabled\n");
27 pr_info("ima: secureboot mode unknown\n");
29 pr_info("ima: secureboot mode enabled\n");
H A Dima_init.c18 #include <linux/ima.h>
21 #include "ima.h"
H A Dima_kexec.c14 #include <linux/ima.h>
15 #include "ima.h"
64 print_hex_dump_debug("ima dump: ", DUMP_PREFIX_NONE, 16, 1,
H A Dima_main.c26 #include <linux/ima.h>
30 #include "ima.h"
339 /* read 'security.ima' */
1178 .name = "ima",
1194 DEFINE_LSM(ima) = { variable
1195 .name = "ima",
H A Dima_appraise.c14 #include <linux/ima.h>
20 #include "ima.h"
402 *cause = "unknown-ima-data";
473 * Call evm_verifyxattr() to verify the integrity of 'security.ima'.
601 * ima_update_xattr - update 'security.ima' hash value
657 * ima_protect_xattr - protect 'security.ima'
659 * Ensure that not just anyone can modify or remove 'security.ima'.
717 /* success if the algorithm is allowed in the ima policy */
/linux-master/arch/s390/kernel/
H A Dima_arch.c3 #include <linux/ima.h>
/linux-master/drivers/md/
H A Ddm-ima.c11 #include "dm-ima.h"
13 #include <linux/ima.h>
19 #define DM_MSG_PREFIX "ima"
167 * Initialize/reset the dm ima related data structure variables.
171 memset(&(md->ima), 0, sizeof(md->ima));
172 md->ima.dm_version_str_len = strlen(DM_IMA_VERSION_STR);
229 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len);
230 l += table->md->ima.dm_version_str_len;
286 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima
[all...]
H A Ddm-core.h22 #include "dm-ima.h"
147 struct dm_ima_measurements ima; member in struct:mapped_device
H A DMakefile96 dm-mod-objs += dm-ima.o
/linux-master/arch/powerpc/kernel/
H A Dima_arch.c7 #include <linux/ima.h>
46 * trusted boot. The "template=ima-modsig" option includes the appended
50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig",
51 "measure func=MODULE_CHECK template=ima-modsig",
/linux-master/security/integrity/
H A DMakefile21 # The relative order of the 'ima' and 'evm' LSMs depends on the order below.
22 obj-$(CONFIG_IMA) += ima/
/linux-master/security/selinux/
H A DMakefile25 selinux-$(CONFIG_IMA) += ima.o
H A Dima.c11 #include <linux/ima.h>
13 #include "ima.h"
/linux-master/tools/testing/selftests/kexec/
H A Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
86 echo $line | grep -q "security.ima=0x03"
228 # Are there pe and ima signatures
H A Dkexec_common_lib.sh204 local ima_policy=$SECURITYFS/ima/policy
/linux-master/arch/x86/kernel/
H A Dkexec-bzimage64.c217 struct ima_setup_data *ima; local
223 sd->len = sizeof(*ima);
225 ima = (void *)sd + sizeof(struct setup_data);
226 ima->addr = image->ima_buffer_addr;
227 ima->size = image->ima_buffer_size;
H A Dsetup.c13 #include <linux/ima.h>
/linux-master/security/integrity/platform_certs/
H A Dload_uefi.c10 #include <linux/ima.h>
/linux-master/drivers/misc/sgi-gru/
H A Dgru_instructions.h90 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member in struct:gru_instruction_bits
124 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */
233 /* Instruction mode attributes (ima field) */
305 unsigned long idef2, unsigned char ima)
312 (ima << GRU_CB_IMA_SHFT) |
616 unsigned int ima :3; member in struct:gru_control_block_status
303 __opdword(unsigned char opcode, unsigned char exopc, unsigned char xtype, unsigned char iaa0, unsigned char iaa1, unsigned long idef2, unsigned char ima) argument
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dtest_ima.c14 #include "ima.skel.h"
74 struct ima *skel = NULL;
137 * If commit 62622dab0a28 ("ima: return IMA digest value only when
/linux-master/drivers/of/
H A Dkexec.c12 #include <linux/ima.h>
135 prop = of_get_property(of_chosen, "linux,ima-kexec-buffer", &len);
143 /* Do some sanity on the returned size for the ima-kexec buffer */
175 prop = of_find_property(of_chosen, "linux,ima-kexec-buffer", NULL);
211 prop = fdt_getprop(fdt, chosen_node, "linux,ima-kexec-buffer", &len);
216 fdt_delprop(fdt, chosen_node, "linux,ima-kexec-buffer");
243 "linux,ima-kexec-buffer",
/linux-master/kernel/bpf/
H A Dbpf_lsm.c18 #include <linux/ima.h>
/linux-master/kernel/
H A Dkexec_file.c21 #include <linux/ima.h>

Completed in 233 milliseconds

12