]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - security/lockdown/Kconfig
UBUNTU: Ubuntu-5.15.0-39.42
[mirror_ubuntu-jammy-kernel.git] / security / lockdown / Kconfig
CommitLineData
000d388e
MG
1config SECURITY_LOCKDOWN_LSM
2 bool "Basic module for enforcing kernel lockdown"
3 depends on SECURITY
49fcf732 4 select MODULE_SIG if MODULES
000d388e
MG
5 help
6 Build support for an LSM that enforces a coarse kernel lockdown
7 behaviour.
8
9config SECURITY_LOCKDOWN_LSM_EARLY
10 bool "Enable lockdown LSM early in init"
11 depends on SECURITY_LOCKDOWN_LSM
12 help
13 Enable the lockdown LSM early in boot. This is necessary in order
14 to ensure that lockdown enforcement can be carried out on kernel
15 boot parameters that are otherwise parsed before the security
16 subsystem is fully initialised. If enabled, lockdown will
17 unconditionally be called before any other LSMs.
18
01f96e4a
SF
19config LOCK_DOWN_IN_SECURE_BOOT
20 bool "Lock down the kernel in Secure Boot mode"
438296a5 21 default n
59a69f24 22 depends on (EFI || S390 || PPC) && SECURITY_LOCKDOWN_LSM_EARLY
438296a5 23 help
01f96e4a
SF
24 Secure Boot provides a mechanism for ensuring that the firmware will
25 only load signed bootloaders and kernels. Secure boot mode
26 determination is platform-specific; examples include EFI secure boot
27 and SIPL on s390.
438296a5
DH
28
29 Enabling this option results in kernel lockdown being triggered if
01f96e4a 30 booted under secure boot.
438296a5 31
000d388e
MG
32choice
33 prompt "Kernel default lockdown mode"
34 default LOCK_DOWN_KERNEL_FORCE_NONE
35 depends on SECURITY_LOCKDOWN_LSM
36 help
37 The kernel can be configured to default to differing levels of
38 lockdown.
39
40config LOCK_DOWN_KERNEL_FORCE_NONE
41 bool "None"
42 help
43 No lockdown functionality is enabled by default. Lockdown may be
44 enabled via the kernel commandline or /sys/kernel/security/lockdown.
45
46config LOCK_DOWN_KERNEL_FORCE_INTEGRITY
47 bool "Integrity"
48 help
49 The kernel runs in integrity mode by default. Features that allow
50 the kernel to be modified at runtime are disabled.
51
52config LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY
53 bool "Confidentiality"
54 help
55 The kernel runs in confidentiality mode by default. Features that
56 allow the kernel to be modified at runtime or that permit userland
57 code to read confidential material held inside the kernel are
58 disabled.
59
60endchoice