Home
last modified time | relevance | path

Searched refs:ima_appraise (Results 1 – 10 of 10) sorted by relevance

/openbmc/linux/tools/testing/selftests/kexec/
H A Dtest_kexec_file_load.sh142 if [ $pe_sig_required -eq 0 ] && [ $ima_appraise -eq 1 ] \
148 if [ $pe_sig_required -eq 0 ] && [ $ima_appraise -eq 0 ]; then
150 elif [ $pe_sig_required -eq 0 ] && [ $ima_appraise -eq 1 ] \
178 if [ $pe_sig_required -eq 0 ] && [ $ima_appraise -eq 1 ] \
201 ima_appraise=$?
H A Dtest_kexec_load.sh22 ima_appraise=$?
37 elif [ $ima_appraise -eq 0 -o $arch_policy -eq 0 ]; then
/openbmc/linux/security/integrity/ima/
H A Dima_main.c33 int ima_appraise = IMA_APPRAISE_ENFORCE; variable
35 int ima_appraise; variable
409 if (rc && (ima_appraise & IMA_APPRAISE_ENFORCE)) in process_measurement()
815 if (ima_appraise & IMA_APPRAISE_ENFORCE) in ima_post_read_file()
843 (ima_appraise & IMA_APPRAISE_ENFORCE) == IMA_APPRAISE_ENFORCE; in ima_load_data()
853 if (ima_enforce && (ima_appraise & IMA_APPRAISE_KEXEC)) { in ima_load_data()
859 if (ima_enforce && (ima_appraise & IMA_APPRAISE_FIRMWARE) && !contents) { in ima_load_data()
868 && (ima_appraise & IMA_APPRAISE_MODULES))) { in ima_load_data()
897 if ((ima_appraise & IMA_APPRAISE_FIRMWARE) && in ima_post_load_data()
898 (ima_appraise & IMA_APPRAISE_ENFORCE)) { in ima_post_load_data()
H A Dima_appraise.c24 core_param(ima_appraise, ima_appraise_cmdline_default, charp, 0);
30 int appraisal_state = ima_appraise; in ima_appraise_parse_cmdline()
53 ima_appraise = appraisal_state; in ima_appraise_parse_cmdline()
65 return ima_appraise & IMA_APPRAISE_ENFORCE; in is_ima_appraise_enabled()
78 if (!ima_appraise) in ima_must_appraise()
577 if ((ima_appraise & IMA_APPRAISE_FIX) && !try_modsig && in ima_appraise_measurement()
H A DMakefile11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
H A DKconfig225 bool "ima_appraise boot parameter"
229 This option enables the different "ima_appraise=" modes
H A Dima_fs.c340 } else if (ima_appraise & IMA_APPRAISE_POLICY) { in ima_write_policy()
/openbmc/openbmc/meta-security/meta-integrity/recipes-core/images/
H A Dintegrity-image-minimal.bb19 QB_KERNEL_CMDLINE_APPEND:append = " ima_policy=tcb ima_appraise=fix"
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md227 Then boot with "ima_appraise=log ima_appraise_tcb integrity_audit=1".
230 QB_KERNEL_CMDLINE_APPEND:remove:pn-integrity-image-minimal = "ima_policy=tcb ima_appraise=fix"
231 …QB_KERNEL_CMDLINE_APPEND:append:pn-integrity-image-minimal = " ima_appraise=log ima_appraise_tcb i…
/openbmc/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt1991 ima_appraise= [IMA] appraise integrity measurements