Home
last modified time | relevance | path

Searched refs:image (Results 1 – 6 of 6) sorted by relevance

/security/integrity/ima/
A Dima_kexec.c138 struct kexec_buf kbuf = { .image = image, .buf_align = PAGE_SIZE, in ima_add_kexec_buffer()
149 if (image->type == KEXEC_TYPE_CRASH) in ima_add_kexec_buffer()
182 image->is_ima_segment_index_set = false; in ima_add_kexec_buffer()
190 image->ima_buffer_addr = kbuf.mem; in ima_add_kexec_buffer()
191 image->ima_buffer_size = kexec_segment_size; in ima_add_kexec_buffer()
192 image->ima_buffer = kexec_buffer; in ima_add_kexec_buffer()
193 image->ima_segment_index = image->nr_segments - 1; in ima_add_kexec_buffer()
194 image->is_ima_segment_index_set = true; in ima_add_kexec_buffer()
250 if (!image->ima_buffer_addr) in ima_kexec_post_load()
254 image->ima_buffer_addr, in ima_kexec_post_load()
[all …]
A DKconfig178 modules, firmware, the kexec kernel image, and/or the IMA policy
193 bool "Appraise kexec kernel image signatures"
201 Kernel image signatures can not be verified by the original
/security/selinux/
A DKconfig21 kernel image to be distributed with SELinux built in, but not
/security/integrity/
A DKconfig62 provided by the platform for verifying the kexec'ed kerned image
/security/apparmor/
A DKconfig103 except for embedded systems where the image is read only,
/security/
A DKconfig.hardening207 image. This has a less than 1% performance impact on most

Completed in 694 milliseconds