| /linux/Documentation/block/ |
| H A D | data-integrity.rst | 2 Data Integrity 16 protocols (SBC Data Integrity Field, SCC protection proposal) as well 18 support for appending integrity metadata to an I/O. The integrity 29 DIF and the other integrity extensions is that the protection format 31 integrity of the I/O and reject it if corruption is detected. This 35 2. The Data Integrity Extensions 40 allow the operating system to interact with the integrity metadata 45 The SCSI Data Integrity Field works by appending 8 bytes of protection 46 information to each sector. The data + integrity metadata is stored 53 encouraged them to allow separation of the data and integrity metadata [all …]
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-integrity.rst | 2 dm-integrity 5 The dm-integrity target emulates a block device that has additional 6 per-sector tags that can be used for storing integrity information. 8 A general problem with storing integrity tags with every sector is that 9 writing the sector and the integrity tag must be atomic - i.e. in case of 10 crash, either both sector and integrity tag or none of them is written. 12 To guarantee write atomicity, the dm-integrity target uses journal, it 13 writes sector data and integrity tags into a journal, commits the journal 14 and then copies the data and integrity tags to their respective location. 16 The dm-integrity target can be used with the dm-crypt target - in this [all …]
|
| H A D | dm-crypt.rst | 137 integrity:<bytes>:<type> 139 in per-bio integrity structure. This metadata must by provided 140 by underlying dm-integrity target. 146 integrity for the encrypted device. The additional space is then 150 Optionally set the integrity key size if it differs from the digest size. 169 Use an integrity key of <bytes> size instead of using an integrity key size
|
| H A D | dm-ima.rst | 15 target types like crypt, verity, integrity etc. Each of these target 49 /sys/kernel/security/integrity/ima/ascii_runtime_measurements 50 /sys/kernel/security/integrity/ima/binary_runtime_measurements 62 TEMPLATE_NAME := Template name that registered the integrity value (e.g. ima-buf). 143 target_name := Name of the target. 'linear', 'crypt', 'integrity' etc. 331 #. integrity 418 3. integrity 421 section above) has the following data format for 'integrity' target. 430 target_name := "target_name=integrity" 450 When a 'integrity' target is loaded, then IMA ASCII measurement log will have an entry [all …]
|
| /linux/security/integrity/ |
| H A D | Makefile | 3 # Makefile for caching inode integrity data (iint) 6 obj-$(CONFIG_INTEGRITY) += integrity.o 8 integrity-y := iint.o 9 integrity-$(CONFIG_INTEGRITY_AUDIT) += integrity_audit.o 10 integrity-$(CONFIG_INTEGRITY_SIGNATURE) += digsig.o 11 integrity-$(CONFIG_INTEGRITY_ASYMMETRIC_KEYS) += digsig_asymmetric.o 12 integrity-$(CONFIG_INTEGRITY_PLATFORM_KEYRING) += platform_certs/platform_keyring.o 13 integrity-$(CONFIG_INTEGRITY_MACHINE_KEYRING) += platform_certs/machine_keyring.o 14 integrity-$(CONFIG_LOAD_UEFI_KEYS) += platform_certs/efi_parser.o \ 17 integrity [all...] |
| H A D | Kconfig | 3 config INTEGRITY config 4 bool "Integrity subsystem" 8 This option enables the integrity subsystem, which is comprised 9 of a number of different components including the Integrity 17 if INTEGRITY 47 bool "Require all keys on the integrity keyrings be signed" 120 bool "Enables integrity auditing support " 124 In addition to enabling integrity auditing support, this 126 controls the level of integrity auditing messages. 127 0 - basic integrity auditing messages (default) [all …]
|
| H A D | iint.c | 9 * - initialize the integrity directory in securityfs 13 #include "integrity.h" 32 * integrity_load_keys - load integrity keys hook 50 integrity_dir = securityfs_create_dir("integrity", NULL); in integrity_fs_init() 55 pr_err("Unable to create integrity sysfs dir: %d\n", in integrity_fs_init()
|
| /linux/block/ |
| H A D | bio-integrity.c | 3 * bio-integrity.c - bio data integrity extensions 9 #include <linux/blk-integrity.h> 49 * memory to disk for non-integrity metadata where nothing else in __bio_integrity_action() 121 * bio_integrity_free - Free bio integrity payload 124 * Description: Free the integrity portion of a bio. 146 * bio_integrity_alloc - Allocate integrity payload and attach it to bio 147 * @bio: bio to attach integrity metadata to 149 * @nr_vecs: Number of integrity metadata scatter-gather elements 151 * Description: This function prepares a bio for attaching integrity 153 * integrity metadata that can be attached. [all …]
|
| H A D | bio-integrity-auto.c | 6 * Automatically generate and verify integrity data on PI capable devices if the 8 * data integrity even if the file system (or other user of the block device) is 11 #include <linux/blk-integrity.h> 54 * __bio_integrity_endio - Integrity I/O completion function 58 * integrity is a time-consuming task which must be run in process context. 80 * bio_integrity_prep - Prepare bio for integrity I/O 84 * Allocate the integrity payload. For writes, generate the integrity metadata 87 * This is used for bios that do not have user integrity payloads attached. 101 /* Auto-generate integrity metadata if this is a write */ in bio_integrity_prep() 121 panic("bio: can't create integrity pool\n"); in blk_integrity_auto_init()
|
| H A D | blk-integrity.c | 3 * blk-integrity.c - Block layer data integrity extensions 9 #include <linux/blk-integrity.h> 21 * blk_rq_count_integrity_sg - Count number of integrity scatterlist elements 23 * @bio: bio with integrity metadata attached 26 * scatterlist corresponding to the integrity metadata in a bio. 200 return &dev_to_disk(dev)->queue->limits.integrity; in dev_to_bi() 241 lim.integrity.flags &= ~flag; in flag_store() 243 lim.integrity.flags |= flag; in flag_store() 340 .name = "integrity",
|
| /linux/Documentation/ABI/stable/ |
| H A D | sysfs-class-tpm | 4 Contact: linux-integrity@vger.kernel.org 12 Contact: linux-integrity@vger.kernel.org 24 Contact: linux-integrity@vger.kernel.org 32 Contact: linux-integrity@vger.kernel.org 49 Contact: linux-integrity@vger.kernel.org 72 Contact: linux-integrity@vger.kernel.org 81 Contact: linux-integrity@vger.kernel.org 89 Contact: linux-integrity@vger.kernel.org 112 Contact: linux-integrity@vger.kernel.org 164 Contact: linux-integrity@vger.kernel.org [all …]
|
| /linux/security/integrity/ima/ |
| H A D | Kconfig | 2 # IBM Integrity Measurement Architecture 5 bool "Integrity Measurement Architecture(IMA)" 18 The Trusted Computing Group(TCG) runtime Integrity 26 an aggregate integrity value over this list inside the 53 that IMA uses to maintain the integrity aggregate of the 88 prompt "Default integrity hash algorithm" 92 list, integrity appraisal and audit log. The compiled default 145 bool "Appraise integrity measurements" 148 This option enables local measurement integrity appraisal. 154 For more information on integrity appraisa [all...] |
| H A D | ima_main.c | 3 * Integrity Measurement Architecture 500 * On success return 0. On integrity appraisal error, assuming the file in ima_file_mmap() 538 * this point. Eliminate this integrity gap by denying the mprotect in ima_file_mprotect() 599 * On success return 0. On integrity appraisal error, assuming the file 630 * On success return 0. On integrity appraisal error, assuming the file 647 * and appraise the integrity of a file to be executed by script interpreters. 648 * Unlike any of the other LSM hooks where the kernel enforces file integrity, 649 * enforcing file integrity is left up to the discretion of the script 652 * On success return 0. On integrity appraisal error, assuming the file 677 * On success return 0. On integrity appraisa in __ima_inode_hash() [all...] |
| /linux/Documentation/staging/ |
| H A D | xz.rst | 13 for executable code. CRC32 is supported for integrity checking. 53 Since the XZ Embedded supports only streams with CRC32 or no integrity 54 check, make sure that you don't use some other integrity check type 62 which will verify the integrity of the uncompressed data anyway. 63 Double checking the integrity would probably be waste of CPU cycles. 65 by the decoder; you can only change the integrity check type (or
|
| /linux/Documentation/translations/zh_CN/block/ |
| H A D | data-integrity.rst | 4 :Original: Documentation/block/data-integrity.rst 117 块设备可以在 queue_limits 结构中的 integrity 子结构中设置完整性信息。 135 /sys/block/<bdev>/integrity/write_generate 139 /sys/block/<bdev>/integrity/read_verify 170 integrity bio_vec list 中存储多少页保护数据(类似 bio_alloc)。
|
| /linux/drivers/md/ |
| H A D | dm-io-rewind.c | 8 #include <linux/blk-integrity.h> 48 * dm_bio_integrity_rewind - Rewind integrity vector 49 * @bio: bio whose integrity vector to update 52 * Description: This function calculates how many integrity bytes the 54 * integrity vector accordingly.
|
| /linux/security/integrity/evm/ |
| H A D | Kconfig | 13 integrity attacks. 57 /sys/kernel/security/integrity/evm/evm_xattrs. 68 verify EVM integrity starting from the 'init' process. The
|
| /linux/drivers/scsi/ |
| H A D | sd_dif.c | 3 * sd_dif.c - SCSI Data Integrity Field 9 #include <linux/blk-integrity.h> 31 struct blk_integrity *bi = &lim->integrity; in sd_dif_config_host()
|
| /linux/tools/testing/selftests/net/ |
| H A D | tcp_mmap.c | 89 static int integrity; /* -i option: sender and receiver compute sha256 over the data.*/ variable 205 if (integrity) { in child_thread() 233 if (integrity) in child_thread() 249 if (integrity) in child_thread() 268 if (integrity) in child_thread() 280 if (integrity) { in child_thread() 504 integrity = 1; in main() 581 if (integrity) { in main() 601 if (integrity) in main() 605 if (integrity && total == FILE_SZ) { in main()
|
| /linux/Documentation/security/ |
| H A D | snp-tdx-threat-model.rst | 26 security technologies that aim to protect the confidentiality and integrity 46 integrity for the VM's guest memory and execution state (vCPU registers), 51 …w.amd.com/system/files/techdocs/sev-snp-strengthening-vm-isolation-with-integrity-protection-and-m… 163 integrity protection. This threat model assumes that those features are 168 1. Preserve the confidentiality and integrity of CoCo guest's private 201 data should also be considered untrusted until its integrity and 226 This allows the host to break the integrity of the code running 233 integrity or freshness of such data.
|
| /linux/tools/testing/selftests/ublk/ |
| H A D | file_backed.c | 84 /* Use second backing file for integrity data */ in loop_queue_tgt_rw_io() 90 /* tgt_data = 1 indicates integrity I/O */ in loop_queue_tgt_rw_io() 247 /* Expect a second file for integrity data */ 257 /* Ensure both data and integrity data fit in backing files */ 262 * to disable bio-integrity-auto checks
|
| H A D | test_integrity_02.sh | 26 _create_backfile 1 32M # 256M * (64 integrity bytes / 512 data bytes) 33 # 1M * (64 integrity bytes / 512 data bytes) = 128K 130 _prep_test "loop" "end-to-end integrity"
|
| /linux/security/lockdown/ |
| H A D | Kconfig | 34 bool "Integrity" 36 The kernel runs in integrity mode by default. Features that allow
|
| /linux/security/ |
| H A D | Makefile | 30 # Object integrity file lists 31 obj-$(CONFIG_INTEGRITY) += integrity/
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 33 secrets and integrity as far as we are able in this environment and to 41 Measurement (PCR) Integrity 132 used to check the integrity of requests and responses and decrypt and 151 protect the integrity. Additionally, we use parameter encryption to 209 that TPM integrity and privacy was preserved across the entire boot
|