Searched hist:"973 b71c6" (Results 1 – 4 of 4) sorted by relevance
/openbmc/linux/tools/testing/selftests/kexec/ |
H A D | test_kexec_file_load.sh | 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test
The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies.
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org> 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies. Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org>
|
H A D | Makefile | 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test
The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies.
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org> 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies. Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org>
|
H A D | kexec_common_lib.sh | 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test
The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies.
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org> 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies. Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org>
|
H A D | test_kexec_load.sh | 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test
The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies.
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org> 973b71c6 Thu Jan 24 17:22:06 CST 2019 Mimi Zohar <zohar@linux.ibm.com> selftests/kexec: kexec_file_load syscall test The kernel can be configured to verify PE signed kernel images, IMA kernel image signatures, both types of signatures, or none. This test verifies only properly signed kernel images are loaded into memory, based on the kernel configuration and runtime policies. Signed-off-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Petr Vorel <pvorel@suse.cz> Signed-off-by: Shuah Khan <skhan@linuxfoundation.org>
|