Lines Matching refs:IMA
4 config IMA config
5 bool "Integrity Measurement Architecture(IMA)"
18 Measurement Architecture(IMA) maintains a list of hash
24 If your system has a TPM chip, then IMA also maintains
29 to learn more about IMA.
33 bool "Enable carrying the IMA measurement list across a soft boot"
34 depends on IMA && TCG_TPM && HAVE_IMA_KEXEC
38 a TPM's quote after a soft boot, the IMA measurement list of the
41 Depending on the IMA policy, the measurement list can grow to
46 depends on IMA
51 that IMA uses to maintain the integrity aggregate of the
56 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK || SECURITY_APPARMOR)
64 depends on IMA
66 Select the default IMA measurement template.
83 depends on IMA
90 depends on IMA
120 depends on IMA
128 bool "Enable multiple writes to the IMA policy"
129 depends on IMA
132 IMA policy can now be updated multiple times. The new rules get
139 bool "Enable reading back the current IMA policy"
140 depends on IMA
144 It is often useful to be able to read back the IMA policy. It is
150 depends on IMA
164 bool "Enable loading an IMA architecture specific policy"
165 depends on (KEXEC_SIG && IMA) || IMA_APPRAISE \
169 This option enables loading an IMA architecture specific policy
173 bool "IMA build time configured policy rules"
177 This option defines an IMA appraisal policy at build time, which
183 modules, firmware, the kexec kernel image, and/or the IMA policy
203 be signed and verified by a public key on the trusted IMA
216 and verified by a public key on the trusted IMA keyring.
218 Kernel module signatures can only be verified by IMA-appraisal,
223 bool "Appraise IMA policy signature"
227 Enabling this rule will require the IMA policy to be signed and
228 and verified by a key on the trusted IMA keyring.
248 The modsig keyword can be used in the IMA policy to allow a hook
271 Keys may be added to the IMA or IMA blacklist keyrings, if the
276 IMA keys to be added may be added to the system secondary keyring,
281 bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)"
286 This option creates an IMA blacklist keyring, which contains all
287 revoked IMA keys. It is consulted before any other keyring. If
303 string "IMA X509 certificate path"
307 This option defines IMA X509 certificate path.
318 depends on IMA
333 trusted boot based on IMA runtime policies.
337 depends on IMA