config [31mCONFIG_SECURITY_LOADPIN[0m bool "Pin load of kernel files (modules, fw, etc) to one filesystem" depends on [31mCONFIG_SECURITY[0m && [31mCONFIG_BLOCK[0m help Any files read through the kernel file reading interface (kernel modules, firmware, kexec images, security policy) can be pinned to the first filesystem used for loading. When enabled, any files that come from other filesystems will be rejected. This is best used on systems without an initrd that have a root filesystem backed by a read-only device such as dm-verity or a [31mCONFIG_CDROM[0m. config [31mCONFIG_SECURITY_LOADPIN_ENABLED[0m bool "Enforce LoadPin at boot" depends on [31mCONFIG_SECURITY_LOADPIN[0m help If selected, LoadPin will enforce pinning at boot. If not selected, it can be enabled at boot with the kernel parameter "loadpin.enabled=1". |