Lines Matching refs:evm

20 #include <linux/evm.h>
28 #include "evm.h"
85 __setup("evm=", evm_set_fixmode);
169 * and compare it against the stored security.evm xattr.
413 * security.evm xattr. For performance, use the xattr value and length
488 * Prevent security.evm from being modified or removed without the
492 * affect security.evm. An interesting side affect of writing posix xattr
493 * acls is their modifying of the i_mode, which is included in security.evm.
494 * For posix xattr acls only, permit security.evm, even if it currently
581 * Before allowing the 'security.evm' protected xattr to be updated,
584 * userspace from writing HMAC value. Writing 'security.evm' requires
616 * Removing 'security.evm' requires CAP_SYS_ADMIN privileges and that
668 * and 'security.evm' xattr updated, unless the existing 'security.evm' is
720 * and 'security.evm' xattr updated, unless the existing 'security.evm' is
791 * evm_inode_post_setxattr - update 'security.evm' to reflect the changes
798 * Update the HMAC stored in 'security.evm' to reflect the change.
833 * Update the 'security.evm' xattr with the EVM HMAC re-calculated after setting
843 * evm_inode_post_removexattr - update 'security.evm' after removing the xattr
847 * Update the HMAC stored in 'security.evm' to reflect removal of the xattr.
875 * Update the 'security.evm' xattr with the EVM HMAC re-calculated after
949 * evm_inode_post_setattr - update 'security.evm' after modifying metadata
954 * For now, update the HMAC stored in 'security.evm' to reflect UID/GID
1011 * evm_inode_init_security - initializes security.evm HMAC value
1027 * contiguous, there is enough space for security.evm, and that there is
1161 .name = "evm",
1176 DEFINE_LSM(evm) = {
1177 .name = "evm",