hc
2024-01-03 2f7c68cb55ecb7331f2381deb497c27155f32faf
kernel/security/integrity/ima/Kconfig
....@@ -8,7 +8,7 @@
88 select CRYPTO_HMAC
99 select CRYPTO_SHA1
1010 select CRYPTO_HASH_INFO
11
- select TCG_TPM if HAS_IOMEM && !UML
11
+ select TCG_TPM if HAS_IOMEM
1212 select TCG_TIS if TCG_TPM && X86
1313 select TCG_CRB if TCG_TPM && ACPI
1414 select TCG_IBMVTPM if TCG_TPM && PPC_PSERIES
....@@ -29,9 +29,11 @@
2929 to learn more about IMA.
3030 If unsure, say N.
3131
32
+if IMA
33
+
3234 config IMA_KEXEC
3335 bool "Enable carrying the IMA measurement list across a soft boot"
34
- depends on IMA && TCG_TPM && HAVE_IMA_KEXEC
36
+ depends on TCG_TPM && HAVE_IMA_KEXEC
3537 default n
3638 help
3739 TPM PCRs are only reset on a hard reboot. In order to validate
....@@ -43,7 +45,6 @@
4345
4446 config IMA_MEASURE_PCR_IDX
4547 int
46
- depends on IMA
4748 range 8 14
4849 default 10
4950 help
....@@ -53,7 +54,7 @@
5354
5455 config IMA_LSM_RULES
5556 bool
56
- depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK || SECURITY_APPARMOR)
57
+ depends on AUDIT && (SECURITY_SELINUX || SECURITY_SMACK || SECURITY_APPARMOR)
5758 default y
5859 help
5960 Disabling this option will disregard LSM based policy rules.
....@@ -61,7 +62,6 @@
6162 choice
6263 prompt "Default template"
6364 default IMA_NG_TEMPLATE
64
- depends on IMA
6565 help
6666 Select the default IMA measurement template.
6767
....@@ -80,14 +80,12 @@
8080
8181 config IMA_DEFAULT_TEMPLATE
8282 string
83
- depends on IMA
8483 default "ima-ng" if IMA_NG_TEMPLATE
8584 default "ima-sig" if IMA_SIG_TEMPLATE
8685
8786 choice
8887 prompt "Default integrity hash algorithm"
8988 default IMA_DEFAULT_HASH_SHA1
90
- depends on IMA
9189 help
9290 Select the default hash algorithm used for the measurement
9391 list, integrity appraisal and audit log. The compiled default
....@@ -117,7 +115,6 @@
117115
118116 config IMA_DEFAULT_HASH
119117 string
120
- depends on IMA
121118 default "sha1" if IMA_DEFAULT_HASH_SHA1
122119 default "sha256" if IMA_DEFAULT_HASH_SHA256
123120 default "sha512" if IMA_DEFAULT_HASH_SHA512
....@@ -126,7 +123,6 @@
126123
127124 config IMA_WRITE_POLICY
128125 bool "Enable multiple writes to the IMA policy"
129
- depends on IMA
130126 default n
131127 help
132128 IMA policy can now be updated multiple times. The new rules get
....@@ -137,7 +133,6 @@
137133
138134 config IMA_READ_POLICY
139135 bool "Enable reading back the current IMA policy"
140
- depends on IMA
141136 default y if IMA_WRITE_POLICY
142137 default n if !IMA_WRITE_POLICY
143138 help
....@@ -147,7 +142,6 @@
147142
148143 config IMA_APPRAISE
149144 bool "Appraise integrity measurements"
150
- depends on IMA
151145 default n
152146 help
153147 This option enables local measurement integrity appraisal.
....@@ -248,18 +242,6 @@
248242 The modsig keyword can be used in the IMA policy to allow a hook
249243 to accept such signatures.
250244
251
-config IMA_TRUSTED_KEYRING
252
- bool "Require all keys on the .ima keyring be signed (deprecated)"
253
- depends on IMA_APPRAISE && SYSTEM_TRUSTED_KEYRING
254
- depends on INTEGRITY_ASYMMETRIC_KEYS
255
- select INTEGRITY_TRUSTED_KEYRING
256
- default y
257
- help
258
- This option requires that all keys added to the .ima
259
- keyring be signed by a key on the system trusted keyring.
260
-
261
- This option is deprecated in favor of INTEGRITY_TRUSTED_KEYRING
262
-
263245 config IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
264246 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
265247 depends on SYSTEM_TRUSTED_KEYRING
....@@ -280,7 +262,7 @@
280262 config IMA_BLACKLIST_KEYRING
281263 bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)"
282264 depends on SYSTEM_TRUSTED_KEYRING
283
- depends on IMA_TRUSTED_KEYRING
265
+ depends on INTEGRITY_TRUSTED_KEYRING
284266 default n
285267 help
286268 This option creates an IMA blacklist keyring, which contains all
....@@ -290,7 +272,7 @@
290272
291273 config IMA_LOAD_X509
292274 bool "Load X509 certificate onto the '.ima' trusted keyring"
293
- depends on IMA_TRUSTED_KEYRING
275
+ depends on INTEGRITY_TRUSTED_KEYRING
294276 default n
295277 help
296278 File signature verification is based on the public keys
....@@ -315,7 +297,6 @@
315297
316298 config IMA_MEASURE_ASYMMETRIC_KEYS
317299 bool
318
- depends on IMA
319300 depends on ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y
320301 default y
321302
....@@ -331,3 +312,5 @@
331312 help
332313 This option is selected by architectures to enable secure and/or
333314 trusted boot based on IMA runtime policies.
315
+
316
+endif