Lines Matching +full:kernel +full:- +full:policy

1 # SPDX-License-Identifier: GPL-2.0-only
41 running kernel must be saved and restored on boot.
43 Depending on the IMA policy, the measurement list can grow to
60 Disabling this option will disregard LSM based policy rules.
70 limited to 255 characters. The 'ima-ng' measurement list
76 bool "ima-ng (default)"
78 bool "ima-sig"
83 default "ima-ng" if IMA_NG_TEMPLATE
84 default "ima-sig" if IMA_SIG_TEMPLATE
92 hash algorithm can be overwritten using the kernel command
125 bool "Enable multiple writes to the IMA policy"
128 IMA policy can now be updated multiple times. The new rules get
129 appended to the original policy. Have in mind that the rules are
135 bool "Enable reading back the current IMA policy"
139 It is often useful to be able to read back the IMA policy. It is
141 This option allows the root user to see the current policy rules.
154 <http://linux-ima.sourceforge.net>
158 bool "Enable loading an IMA architecture specific policy"
163 This option enables loading an IMA architecture specific policy
167 bool "IMA build time configured policy rules"
171 This option defines an IMA appraisal policy at build time, which
173 policy name on the boot command line. The build time appraisal
174 policy rules persist after loading a custom policy.
176 Depending on the rules configured, this policy may require kernel
177 modules, firmware, the kexec kernel image, and/or the IMA policy
186 This option defines a policy requiring all firmware to be signed,
192 bool "Appraise kexec kernel image signatures"
196 Enabling this rule will require all kexec'ed kernel images to
200 Kernel image signatures can not be verified by the original
205 bool "Appraise kernel modules signatures"
209 Enabling this rule will require all kernel modules to be signed
212 Kernel module signatures can only be verified by IMA-appraisal,
217 bool "Appraise IMA policy signature"
221 Enabling this rule will require the IMA policy to be signed and
233 bool "Support module-style signatures for appraisal"
241 appended signature is the same used for signed kernel modules.
242 The modsig keyword can be used in the IMA policy to allow a hook
246 bool "Permit keys validly signed by a built-in, machine (if configured) or secondary"
254 key is validly signed by a CA cert in the system built-in,
258 Intermediate keys between those the kernel has compiled in and the
261 built-in, machine (if configured) or secondary trusted keyrings.
283 loading from the kernel onto the '.ima' trusted keyring.
293 bool "Require signed user-space initialization"
297 This option requires user-space init to be signed.