 b53fab9d48
			
		
	
	
	b53fab9d48
	
	
	
		
			
			IMA_LSM_RULES requires AUDIT. This is automatic if SECURITY_SELINUX=y but not when SECURITY_SMACK=y (and SECURITY_SELINUX=n), so make the dependency explicit. This fixes the following build error: security/integrity/ima/ima_policy.c:111:error: implicit declaration of function 'security_audit_rule_match' security/integrity/ima/ima_policy.c:230:error: implicit declaration of function 'security_audit_rule_init' Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com> Acked-by: Mimi Zohar <zohar@us.ibm.com> Signed-off-by: James Morris <jmorris@namei.org>
		
			
				
	
	
		
			55 lines
		
	
	
	
		
			1.6 KiB
			
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			55 lines
		
	
	
	
		
			1.6 KiB
			
		
	
	
	
		
			Text
		
	
	
	
	
	
| # IBM Integrity Measurement Architecture
 | |
| #
 | |
| config IMA
 | |
| 	bool "Integrity Measurement Architecture(IMA)"
 | |
| 	depends on ACPI
 | |
| 	select SECURITYFS
 | |
| 	select CRYPTO
 | |
| 	select CRYPTO_HMAC
 | |
| 	select CRYPTO_MD5
 | |
| 	select CRYPTO_SHA1
 | |
| 	select TCG_TPM
 | |
| 	select TCG_TIS
 | |
| 	help
 | |
| 	  The Trusted Computing Group(TCG) runtime Integrity
 | |
| 	  Measurement Architecture(IMA) maintains a list of hash
 | |
| 	  values of executables and other sensitive system files,
 | |
| 	  as they are read or executed. If an attacker manages
 | |
| 	  to change the contents of an important system file
 | |
| 	  being measured, we can tell.
 | |
| 
 | |
| 	  If your system has a TPM chip, then IMA also maintains
 | |
| 	  an aggregate integrity value over this list inside the
 | |
| 	  TPM hardware, so that the TPM can prove to a third party
 | |
| 	  whether or not critical system files have been modified.
 | |
| 	  Read <http://www.usenix.org/events/sec04/tech/sailer.html>
 | |
| 	  to learn more about IMA.
 | |
| 	  If unsure, say N.
 | |
| 
 | |
| config IMA_MEASURE_PCR_IDX
 | |
| 	int
 | |
| 	depends on IMA
 | |
| 	range 8 14
 | |
| 	default 10
 | |
| 	help
 | |
| 	  IMA_MEASURE_PCR_IDX determines the TPM PCR register index
 | |
| 	  that IMA uses to maintain the integrity aggregate of the
 | |
| 	  measurement list.  If unsure, use the default 10.
 | |
| 
 | |
| config IMA_AUDIT
 | |
| 	bool
 | |
| 	depends on IMA
 | |
| 	default y
 | |
| 	help
 | |
| 	  This option adds a kernel parameter 'ima_audit', which
 | |
| 	  allows informational auditing messages to be enabled
 | |
| 	  at boot.  If this option is selected, informational integrity
 | |
| 	  auditing messages can be enabled with 'ima_audit=1' on
 | |
| 	  the kernel command line.
 | |
| 
 | |
| config IMA_LSM_RULES
 | |
| 	bool
 | |
| 	depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK)
 | |
| 	default y
 | |
| 	help
 | |
| 	  Disabling this option will disregard LSM based policy rules.
 |