48 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			48 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
config SECURITY_LOCKDOWN_LSM
 | 
						|
	bool "Basic module for enforcing kernel lockdown"
 | 
						|
	depends on SECURITY
 | 
						|
	select MODULE_SIG if MODULES
 | 
						|
	help
 | 
						|
	  Build support for an LSM that enforces a coarse kernel lockdown
 | 
						|
	  behaviour.
 | 
						|
 | 
						|
config SECURITY_LOCKDOWN_LSM_EARLY
 | 
						|
	bool "Enable lockdown LSM early in init"
 | 
						|
	depends on SECURITY_LOCKDOWN_LSM
 | 
						|
	help
 | 
						|
	  Enable the lockdown LSM early in boot. This is necessary in order
 | 
						|
	  to ensure that lockdown enforcement can be carried out on kernel
 | 
						|
	  boot parameters that are otherwise parsed before the security
 | 
						|
	  subsystem is fully initialised. If enabled, lockdown will
 | 
						|
	  unconditionally be called before any other LSMs.
 | 
						|
 | 
						|
choice
 | 
						|
	prompt "Kernel default lockdown mode"
 | 
						|
	default LOCK_DOWN_KERNEL_FORCE_NONE
 | 
						|
	depends on SECURITY_LOCKDOWN_LSM
 | 
						|
	help
 | 
						|
	  The kernel can be configured to default to differing levels of
 | 
						|
	  lockdown.
 | 
						|
 | 
						|
config LOCK_DOWN_KERNEL_FORCE_NONE
 | 
						|
	bool "None"
 | 
						|
	help
 | 
						|
	  No lockdown functionality is enabled by default. Lockdown may be
 | 
						|
	  enabled via the kernel commandline or /sys/kernel/security/lockdown.
 | 
						|
 | 
						|
config LOCK_DOWN_KERNEL_FORCE_INTEGRITY
 | 
						|
	bool "Integrity"
 | 
						|
	help
 | 
						|
	 The kernel runs in integrity mode by default. Features that allow
 | 
						|
	 the kernel to be modified at runtime are disabled.
 | 
						|
 | 
						|
config LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY
 | 
						|
	bool "Confidentiality"
 | 
						|
	help
 | 
						|
	 The kernel runs in confidentiality mode by default. Features that
 | 
						|
	 allow the kernel to be modified at runtime or that permit userland
 | 
						|
	 code to read confidential material held inside the kernel are
 | 
						|
	 disabled.
 | 
						|
 | 
						|
endchoice
 |