blob: 91be65dec2abd55215bded0aba006cb71c931afc [file] [log] [blame]
Thomas Gleixnerec8f24b2019-05-19 13:07:45 +01001# SPDX-License-Identifier: GPL-2.0-only
Kees Cook9b091552016-04-20 15:46:28 -07002config SECURITY_LOADPIN
3 bool "Pin load of kernel files (modules, fw, etc) to one filesystem"
4 depends on SECURITY && BLOCK
5 help
6 Any files read through the kernel file reading interface
Kees Cookb9371902016-05-17 01:45:52 -07007 (kernel modules, firmware, kexec images, security policy)
8 can be pinned to the first filesystem used for loading. When
9 enabled, any files that come from other filesystems will be
10 rejected. This is best used on systems without an initrd that
11 have a root filesystem backed by a read-only device such as
12 dm-verity or a CDROM.
13
Kees Cook13523be2018-09-24 14:43:59 -070014config SECURITY_LOADPIN_ENFORCE
Kees Cookb9371902016-05-17 01:45:52 -070015 bool "Enforce LoadPin at boot"
16 depends on SECURITY_LOADPIN
17 help
18 If selected, LoadPin will enforce pinning at boot. If not
19 selected, it can be enabled at boot with the kernel parameter
Kees Cook13523be2018-09-24 14:43:59 -070020 "loadpin.enforce=1".