Kconfig (c7c8bb237fdbff932b5e431aebee5ce862ea07d1) Kconfig (4286587dccd43d4f81fa227e413ed7e909895342)
1# IBM Integrity Measurement Architecture
2#
3config IMA
4 bool "Integrity Measurement Architecture(IMA)"
5 depends on SECURITY
6 select INTEGRITY
7 select SECURITYFS
8 select CRYPTO

--- 32 unchanged lines hidden (view full) ---

41
42config IMA_LSM_RULES
43 bool
44 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK)
45 default y
46 help
47 Disabling this option will disregard LSM based policy rules.
48
1# IBM Integrity Measurement Architecture
2#
3config IMA
4 bool "Integrity Measurement Architecture(IMA)"
5 depends on SECURITY
6 select INTEGRITY
7 select SECURITYFS
8 select CRYPTO

--- 32 unchanged lines hidden (view full) ---

41
42config IMA_LSM_RULES
43 bool
44 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK)
45 default y
46 help
47 Disabling this option will disregard LSM based policy rules.
48
49choice
50 prompt "Default template"
51 default IMA_NG_TEMPLATE
52 depends on IMA
53 help
54 Select the default IMA measurement template.
55
56 The original 'ima' measurement list template contains a
57 hash, defined as 20 bytes, and a null terminated pathname,
58 limited to 255 characters. The 'ima-ng' measurement list
59 template permits both larger hash digests and longer
60 pathnames.
61
62 config IMA_TEMPLATE
63 bool "ima"
64 config IMA_NG_TEMPLATE
65 bool "ima-ng (default)"
66endchoice
67
68config IMA_DEFAULT_TEMPLATE
69 string
70 depends on IMA
71 default "ima" if IMA_TEMPLATE
72 default "ima-ng" if IMA_NG_TEMPLATE
73
49config IMA_APPRAISE
50 bool "Appraise integrity measurements"
51 depends on IMA
52 default n
53 help
54 This option enables local measurement integrity appraisal.
55 It requires the system to be labeled with a security extended
56 attribute containing the file hash measurement. To protect
57 the security extended attributes from offline attack, enable
58 and configure EVM.
59
60 For more information on integrity appraisal refer to:
61 <http://linux-ima.sourceforge.net>
62 If unsure, say N.
74config IMA_APPRAISE
75 bool "Appraise integrity measurements"
76 depends on IMA
77 default n
78 help
79 This option enables local measurement integrity appraisal.
80 It requires the system to be labeled with a security extended
81 attribute containing the file hash measurement. To protect
82 the security extended attributes from offline attack, enable
83 and configure EVM.
84
85 For more information on integrity appraisal refer to:
86 <http://linux-ima.sourceforge.net>
87 If unsure, say N.