+
+Parameter |
+Value |
+Function |
+
+
+ima_appraise |
+enforce-evm |
+Enable IMA appraisal enforce mode (EVM enabled). |
+
+
+log-evm |
+Enable IMA appraisal log mode (EVM enabled). |
+
+
+enforce |
+Enable IMA appraisal enforce mode. |
+
+
+log |
+Enable IMA appraisal log mode. |
+
+
+off |
+Disable IMA appraisal. |
+
+
+ima_appraise_digest_list |
+digest |
+Enable IMA+EVM appraisal based on digest lists (comparing file content and extended attributes). |
+
+
+digest-nometadata |
+Enable IMA appraisal based on digest lists (comparing file content only). |
+
+
+evm |
+x509 |
+Enable portable signature-based EVM directly (regardless of EVM certificate loading) |
+
+
+complete |
+Prevent modification of EVM mode via securityfs after boot. |
+
+
+allow_metadata_writes |
+Allow file metadata modifications without EVM interception. |
+
+
+ima_hash |
+sha256/sha1/... |
+Specify the IMA measurement hash algorithm. |
+
+
+ima_template |
+ima |
+Specify the IMA measurement template (d or n ). |
+
+
+ima-ng |
+Specify the IMA measurement template (d-ng or n-ng ), default template. |
+
+
+ima-sig |
+Specify the IMA measurement template (d-ng , n-ng , or sig ). |
+
+
+ima_policy |
+exec_tcb |
+Measure all files accessed via execution or mapping, including loaded kernel modules, firmware, and kernel files. |
+
+
+tcb |
+Extend exec_tcb policy to measure files accessed with uid=0 or euid=0 . |
+
+
+secure_boot |
+Appraise all loaded kernel modules, firmware, and kernel files, using IMA signature mode. |
+
+
+appraise_exec_tcb |
+Extend secure_boot policy to appraise all files accessed via execution or mapping. |
+
+
+appraise_tcb |
+Appraise all files owned by uid=0 . |
+
+
+appraise_exec_immutable |
+Used with the appraise_exec_tcb policy, making executable file extended attributes immutable. |
+
+
+ima_digest_list_pcr |
+10 |
+Extend IMA measurement results based on digest list in PCR 10, disable native IMA measurement. |
+
+
+11 |
+Extend IMA measurement results based on digest list in PCR 11, disable native IMA measurement. |
+
+
++11 |
+Extend IMA measurement results based on digest list in PCR 11, extend native IMA measurement results in PCR 10. |
+
+
+ima_digest_db_size |
+nn[M] |
+Set kernel digest list size limit (0 to 64 MB), defaulting to 16 MB if not configured. ("Not configured" means to omit the parameter, not leaving the value cannot blank like ima_digest_db_size= .) |
+
+
+ima_capacity |
+-1 to 2147483647 |
+Set the kernel measurement log entry limit, defaulting to 100,000. -1 means no limit. |
+
+
+initramtmpfs |
+None |
+Support tmpfs in initrd to carry file extended attributes. |
+
+
+
+Based on user scenarios, the following parameter combinations are recommended:
+
+**(1) Native IMA measurement**
+
+```ini
+# Native IMA measurement + custom policy
+# No configuration required. This is enabled by default.
+# Native IMA measurement + TCB default policy
+ima_policy="tcb"
+```
+
+**(2) IMA measurement based on digest list**
+
+```ini
+# Digest list IMA measurement + custom policy
+ima_digest_list_pcr=11 ima_template=ima-ng initramtmpfs
+# Digest list IMA measurement + default policy
+ima_digest_list_pcr=11 ima_template=ima-ng ima_policy="exec_tcb" initramtmpfs
+```
+
+**(3) IMA appraisal based on digest list, protecting file content only**
+
+```ini
+# IMA appraisal + log mode
+ima_appraise=log ima_appraise_digest_list=digest-nometadata ima_policy="appraise_exec_tcb" initramtmpfs
+# IMA appraisal + enforce mode
+ima_appraise=enforce ima_appraise_digest_list=digest-nometadata ima_policy="appraise_exec_tcb" initramtmpfs
+```
+
+**(4) IMA appraisal based on digest list, protecting file content and extended attributes**
+
+```ini
+# IMA appraisal + log mode
+ima_appraise=log-evm ima_appraise_digest_list=digest ima_policy="appraise_exec_tcb|appraise_exec_immutable" initramtmpfs evm=x509 evm=complete
+# IMA appraisal + enforce mode
+ima_appraise=enforce-evm ima_appraise_digest_list=digest ima_policy="appraise_exec_tcb|appraise_exec_immutable" initramtmpfs evm=x509 evm=complete
+```
+
+>  **Note:**
+>
+> All four parameter sets above can be used individually, but only digest list-based measurement and appraisal modes can be combined, such as (2) with (3) or (2) with (4).
+
+### securityfs Interface Description
+
+The securityfs interfaces provided by openEuler IMA are located in the **/sys/kernel/security** directory. Below are the interface names and their descriptions.
+
+| Path | Permissions | Description |
+| :----------------------------- | :---------- | :---------------------------------------------------------------------- |
+| ima/policy | 600 | Display or import IMA policies. |
+| ima/ascii_runtime_measurement | 440 | Display IMA measurement logs in ASCII format. |
+| ima/binary_runtime_measurement | 440 | Display IMA measurement logs in binary format. |
+| ima/runtime_measurement_count | 440 | Display the count of IMA measurement log entries. |
+| ima/violations | 440 | Display the number of abnormal IMA measurement logs. |
+| ima/digests_count | 440 | Display the total number of digests in the system hash table (IMA+EVM). |
+| ima/digest_list_data | 200 | Add digest lists. |
+| ima/digest_list_data_del | 200 | Delete digest lists. |
+| evm | 660 | Query or set EVM mode. |
+
+The **/sys/kernel/security/evm** interface supports the following values:
+
+- `0`: EVM is not initialized.
+- `1`: Use HMAC (symmetric encryption) to verify extended attribute integrity.
+- `2`: Use public key signature verification (asymmetric encryption) to verify extended attribute integrity.
+- `6`: Disable extended attribute integrity verification.
+
+### Digest List Management Tool Description
+
+The digest-list-tools package includes tools for generating and managing IMA digest list files. The primary CLI tools are as follows.
+
+#### gen_digest_lists
+
+The `gen_digest_lists` tool allows users to generate digest lists. The command options are defined below.
+
+