Home
Sort by
last modified time
|
relevance
|
path
Repository(s)
applications
arkcompiler
base
build
commonlibrary
developtools
device
docs
domains
drivers
foundation
ide
interface
kernel
napi_generator
productdefine
test
third_party
vendor
select all
invert selection
clear
Full Search
Search through all text tokens(words,strings,identifiers,numbers) in index.
Definition
Only finds symbol definitions(where e.g a variable(function,...) is defined).
Symbol
Only finds symbol(e.g. methods classes,function,variables).
File Path
Path of the source file(use "/").If you want just exact path,enclose it in "".Source files end with: .jar/.bz2/.a/.h/.java...
History
History log comments.
Type
Any
Bzip(2)
C
Clojure
C#
C++
ELF
Erlang
Image file
Fortran
Golang
GZIP
Haskell
Jar
Java
Java class
JavaScript
Lisp
Lua
Pascal
Perl
PHP
Plain Text
PL/SQL
Python
Rust
Scala
Shell script
SQL
Tar
Tcl
Troff
UUEncoded
Visual Basic
XML
Zip
Type of analyzer used to filter file types include with selected(e.g. just C sources).
Help
Searched
refs:ima_appraise
(Results
1 - 14
of
14
) sorted by relevance
/kernel/linux/linux-5.10/tools/testing/selftests/kexec/
H
A
D
test_kexec_file_load.sh
141
if [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 1 ] \
147
if [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 0 ]; then
149
elif [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 1 ] \
177
if [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 1 ] \
200
ima_appraise
=$?
/kernel/linux/linux-6.6/tools/testing/selftests/kexec/
H
A
D
test_kexec_file_load.sh
142
if [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 1 ] \
148
if [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 0 ]; then
150
elif [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 1 ] \
178
if [ $pe_sig_required -eq 0 ] && [ $
ima_appraise
-eq 1 ] \
201
ima_appraise
=$?
/kernel/linux/linux-5.10/security/integrity/ima/
H
A
D
ima_main.c
34
int
ima_appraise
= IMA_APPRAISE_ENFORCE;
variable
36
int
ima_appraise
;
variable
384
if (rc && (
ima_appraise
& IMA_APPRAISE_ENFORCE))
in process_measurement()
706
if (
ima_appraise
& IMA_APPRAISE_ENFORCE)
in ima_post_read_file()
734
(
ima_appraise
& IMA_APPRAISE_ENFORCE) == IMA_APPRAISE_ENFORCE;
in ima_load_data()
744
if (ima_enforce && (
ima_appraise
& IMA_APPRAISE_KEXEC)) {
in ima_load_data()
750
if (ima_enforce && (
ima_appraise
& IMA_APPRAISE_FIRMWARE) && !contents) {
in ima_load_data()
759
&& (
ima_appraise
& IMA_APPRAISE_MODULES))) {
in ima_load_data()
788
if ((
ima_appraise
& IMA_APPRAISE_FIRMWARE) &&
in ima_post_load_data()
789
(
ima_appraise
in ima_post_load_data()
[all...]
H
A
D
ima_appraise.c
23
int appraisal_state =
ima_appraise
;
in default_appraise_setup()
40
pr_info("Secure boot enabled: ignoring
ima_appraise
=%s option",
in default_appraise_setup()
43
ima_appraise
= appraisal_state;
in default_appraise_setup()
49
__setup("
ima_appraise
=", default_appraise_setup);
54
* Only return enabled, if not in
ima_appraise
="fix" or "log" modes.
58
return
ima_appraise
& IMA_APPRAISE_ENFORCE;
in is_ima_appraise_enabled()
70
if (!
ima_appraise
)
in ima_must_appraise()
450
if ((
ima_appraise
& IMA_APPRAISE_FIX) && !try_modsig &&
in ima_appraise_measurement()
H
A
D
Makefile
11
ima-$(CONFIG_IMA_APPRAISE) +=
ima_appraise
.o
H
A
D
ima.h
58
extern int
ima_appraise
;
H
A
D
ima_fs.c
340
} else if (
ima_appraise
& IMA_APPRAISE_POLICY) {
in ima_write_policy()
H
A
D
ima_policy.c
710
ima_appraise
|= (build_ima_appraise | temp_ima_appraise);
in ima_update_policy_flag()
711
if (!
ima_appraise
)
in ima_update_policy_flag()
1830
if (id == READING_KEXEC_IMAGE && !(
ima_appraise
& IMA_APPRAISE_ENFORCE)
in ima_appraise_signature()
/kernel/linux/linux-6.6/security/integrity/ima/
H
A
D
ima_main.c
33
int
ima_appraise
= IMA_APPRAISE_ENFORCE;
variable
35
int
ima_appraise
;
variable
409
if (rc && (
ima_appraise
& IMA_APPRAISE_ENFORCE))
in process_measurement()
815
if (
ima_appraise
& IMA_APPRAISE_ENFORCE)
in ima_post_read_file()
843
(
ima_appraise
& IMA_APPRAISE_ENFORCE) == IMA_APPRAISE_ENFORCE;
in ima_load_data()
853
if (ima_enforce && (
ima_appraise
& IMA_APPRAISE_KEXEC)) {
in ima_load_data()
859
if (ima_enforce && (
ima_appraise
& IMA_APPRAISE_FIRMWARE) && !contents) {
in ima_load_data()
868
&& (
ima_appraise
& IMA_APPRAISE_MODULES))) {
in ima_load_data()
897
if ((
ima_appraise
& IMA_APPRAISE_FIRMWARE) &&
in ima_post_load_data()
898
(
ima_appraise
in ima_post_load_data()
[all...]
H
A
D
ima_appraise.c
24
core_param(
ima_appraise
, ima_appraise_cmdline_default, charp, 0);
30
int appraisal_state =
ima_appraise
;
in ima_appraise_parse_cmdline()
50
pr_info("Secure boot enabled: ignoring
ima_appraise
=%s option",
in ima_appraise_parse_cmdline()
53
ima_appraise
= appraisal_state;
in ima_appraise_parse_cmdline()
61
* Only return enabled, if not in
ima_appraise
="fix" or "log" modes.
65
return
ima_appraise
& IMA_APPRAISE_ENFORCE;
in is_ima_appraise_enabled()
78
if (!
ima_appraise
)
in ima_must_appraise()
577
if ((
ima_appraise
& IMA_APPRAISE_FIX) && !try_modsig &&
in ima_appraise_measurement()
H
A
D
Makefile
11
ima-$(CONFIG_IMA_APPRAISE) +=
ima_appraise
.o
H
A
D
ima.h
57
extern int
ima_appraise
;
H
A
D
ima_fs.c
340
} else if (
ima_appraise
& IMA_APPRAISE_POLICY) {
in ima_write_policy()
H
A
D
ima_policy.c
842
ima_appraise
|= (build_ima_appraise | temp_ima_appraise);
in ima_update_policy_flags()
843
if (!
ima_appraise
)
in ima_update_policy_flags()
2294
if (id == READING_KEXEC_IMAGE && !(
ima_appraise
& IMA_APPRAISE_ENFORCE)
in ima_appraise_signature()
Completed in 13 milliseconds