Lines Matching refs:IMA
4 config IMA config
5 bool "Integrity Measurement Architecture(IMA)"
19 Measurement Architecture(IMA) maintains a list of hash
25 If your system has a TPM chip, then IMA also maintains
30 to learn more about IMA.
34 bool "Enable carrying the IMA measurement list across a soft boot"
35 depends on IMA && TCG_TPM && HAVE_IMA_KEXEC
39 a TPM's quote after a soft boot, the IMA measurement list of the
42 Depending on the IMA policy, the measurement list can grow to
47 depends on IMA
52 that IMA uses to maintain the integrity aggregate of the
57 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK || SECURITY_APPARMOR)
65 depends on IMA
67 Select the default IMA measurement template.
85 depends on IMA
93 depends on IMA
123 depends on IMA
131 bool "Enable multiple writes to the IMA policy"
132 depends on IMA
135 IMA policy can now be updated multiple times. The new rules get
142 bool "Enable reading back the current IMA policy"
143 depends on IMA
147 It is often useful to be able to read back the IMA policy. It is
153 depends on IMA
167 bool "Enable loading an IMA architecture specific policy"
168 depends on (KEXEC_SIG && IMA) || IMA_APPRAISE \
172 This option enables loading an IMA architecture specific policy
176 bool "IMA build time configured policy rules"
180 This option defines an IMA appraisal policy at build time, which
186 modules, firmware, the kexec kernel image, and/or the IMA policy
206 be signed and verified by a public key on the trusted IMA
219 and verified by a public key on the trusted IMA keyring.
221 Kernel module signatures can only be verified by IMA-appraisal,
226 bool "Appraise IMA policy signature"
230 Enabling this rule will require the IMA policy to be signed and
231 and verified by a key on the trusted IMA keyring.
251 The modsig keyword can be used in the IMA policy to allow a hook
274 Keys may be added to the IMA or IMA blacklist keyrings, if the
279 IMA keys to be added may be added to the system secondary keyring,
284 bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)"
289 This option creates an IMA blacklist keyring, which contains all
290 revoked IMA keys. It is consulted before any other keyring. If
306 string "IMA X509 certificate path"
310 This option defines IMA X509 certificate path.
321 depends on IMA
336 trusted boot based on IMA runtime policies.