Training courses

Kernel and Embedded Linux

Bootlin training courses

Embedded Linux, kernel,
Yocto Project, Buildroot, real-time,
graphics, boot time, debugging...

Bootlin logo

Elixir Cross Referencer

# SPDX-License-Identifier: GPL-2.0-only
#
config CONFIG_INTEGRITY
	bool "Integrity subsystem"
	depends on CONFIG_SECURITY
	default y
	help
	  This option enables the integrity subsystem, which is comprised
	  of a number of different components including the Integrity
	  Measurement Architecture (CONFIG_IMA), Extended Verification Module
	  (CONFIG_EVM), CONFIG_IMA-appraisal extension, digital signature verification
	  extension and audit measurement log support.

	  Each of these components can be enabled/disabled separately.
	  Refer to the individual components for additional details.

if CONFIG_INTEGRITY

config CONFIG_INTEGRITY_SIGNATURE
	bool "Digital signature verification using multiple keyrings"
	default n
	select CONFIG_KEYS
	select CONFIG_SIGNATURE
	help
	  This option enables digital signature verification support
	  using multiple keyrings. It defines separate keyrings for each
	  of the different use cases - evm, ima, and modules.
	  Different keyrings improves search performance, but also allow
	  to "lock" certain keyring to prevent adding new keys.
	  This is useful for evm and module keyrings, when keys are
	  usually only added from initramfs.

config CONFIG_INTEGRITY_ASYMMETRIC_KEYS
	bool "Enable asymmetric keys support"
	depends on CONFIG_INTEGRITY_SIGNATURE
	default n
        select CONFIG_ASYMMETRIC_KEY_TYPE
        select CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE
        select CONFIG_CRYPTO_RSA
        select CONFIG_X509_CERTIFICATE_PARSER
	help
	  This option enables digital signature verification using
	  asymmetric keys.

config CONFIG_INTEGRITY_TRUSTED_KEYRING
	bool "Require all keys on the integrity keyrings be signed"
	depends on CONFIG_SYSTEM_TRUSTED_KEYRING
	depends on CONFIG_INTEGRITY_ASYMMETRIC_KEYS
	default y
	help
	   This option requires that all keys added to the .ima and
	   .evm keyrings be signed by a key on the system trusted
	   keyring.

config CONFIG_INTEGRITY_PLATFORM_KEYRING
        bool "Provide keyring for platform/firmware trusted keys"
        depends on CONFIG_INTEGRITY_ASYMMETRIC_KEYS
        depends on CONFIG_SYSTEM_BLACKLIST_KEYRING
        help
         Provide a separate, distinct keyring for platform trusted keys, which
         the kernel automatically populates during initialization from values
         provided by the platform for verifying the kexec'ed kerned image
         and, possibly, the initramfs signature.

config CONFIG_LOAD_UEFI_KEYS
       depends on CONFIG_INTEGRITY_PLATFORM_KEYRING
       depends on CONFIG_EFI
       def_bool y

config CONFIG_LOAD_IPL_KEYS
       depends on CONFIG_INTEGRITY_PLATFORM_KEYRING
       depends on CONFIG_S390
       def_bool y

config CONFIG_INTEGRITY_AUDIT
	bool "Enables integrity auditing support "
	depends on CONFIG_AUDIT
	default y
	help
	  In addition to enabling integrity auditing support, this
	  option adds a kernel parameter 'integrity_audit', which
	  controls the level of integrity auditing messages.
	  0 - basic integrity auditing messages (default)
	  1 - additional integrity auditing messages

	  Additional informational integrity auditing messages would
	  be enabled by specifying 'integrity_audit=1' on the kernel
	  command line.

source "security/integrity/ima/Kconfig"
source "security/integrity/evm/Kconfig"

endif   # if CONFIG_INTEGRITY