Skip to content

Commit cb84fb8

Browse files
committed
Merge tag 'integrity-v6.6-fix' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity
Pull integrity fixes from Mimi Zohar: "Two additional patches to fix the removal of the deprecated IMA_TRUSTED_KEYRING Kconfig" * tag 'integrity-v6.6-fix' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity: ima: rework CONFIG_IMA dependency block ima: Finish deprecation of IMA_TRUSTED_KEYRING Kconfig
2 parents e90822d + 91e3265 commit cb84fb8

File tree

1 file changed

+8
-14
lines changed

1 file changed

+8
-14
lines changed

security/integrity/ima/Kconfig

Lines changed: 8 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,11 @@ config IMA
2929
to learn more about IMA.
3030
If unsure, say N.
3131

32+
if IMA
33+
3234
config IMA_KEXEC
3335
bool "Enable carrying the IMA measurement list across a soft boot"
34-
depends on IMA && TCG_TPM && HAVE_IMA_KEXEC
36+
depends on TCG_TPM && HAVE_IMA_KEXEC
3537
default n
3638
help
3739
TPM PCRs are only reset on a hard reboot. In order to validate
@@ -43,7 +45,6 @@ config IMA_KEXEC
4345

4446
config IMA_MEASURE_PCR_IDX
4547
int
46-
depends on IMA
4748
range 8 14
4849
default 10
4950
help
@@ -53,15 +54,14 @@ config IMA_MEASURE_PCR_IDX
5354

5455
config IMA_LSM_RULES
5556
bool
56-
depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK || SECURITY_APPARMOR)
57+
depends on AUDIT && (SECURITY_SELINUX || SECURITY_SMACK || SECURITY_APPARMOR)
5758
default y
5859
help
5960
Disabling this option will disregard LSM based policy rules.
6061

6162
choice
6263
prompt "Default template"
6364
default IMA_NG_TEMPLATE
64-
depends on IMA
6565
help
6666
Select the default IMA measurement template.
6767

@@ -80,14 +80,12 @@ endchoice
8080

8181
config IMA_DEFAULT_TEMPLATE
8282
string
83-
depends on IMA
8483
default "ima-ng" if IMA_NG_TEMPLATE
8584
default "ima-sig" if IMA_SIG_TEMPLATE
8685

8786
choice
8887
prompt "Default integrity hash algorithm"
8988
default IMA_DEFAULT_HASH_SHA1
90-
depends on IMA
9189
help
9290
Select the default hash algorithm used for the measurement
9391
list, integrity appraisal and audit log. The compiled default
@@ -117,7 +115,6 @@ endchoice
117115

118116
config IMA_DEFAULT_HASH
119117
string
120-
depends on IMA
121118
default "sha1" if IMA_DEFAULT_HASH_SHA1
122119
default "sha256" if IMA_DEFAULT_HASH_SHA256
123120
default "sha512" if IMA_DEFAULT_HASH_SHA512
@@ -126,7 +123,6 @@ config IMA_DEFAULT_HASH
126123

127124
config IMA_WRITE_POLICY
128125
bool "Enable multiple writes to the IMA policy"
129-
depends on IMA
130126
default n
131127
help
132128
IMA policy can now be updated multiple times. The new rules get
@@ -137,7 +133,6 @@ config IMA_WRITE_POLICY
137133

138134
config IMA_READ_POLICY
139135
bool "Enable reading back the current IMA policy"
140-
depends on IMA
141136
default y if IMA_WRITE_POLICY
142137
default n if !IMA_WRITE_POLICY
143138
help
@@ -147,7 +142,6 @@ config IMA_READ_POLICY
147142

148143
config IMA_APPRAISE
149144
bool "Appraise integrity measurements"
150-
depends on IMA
151145
default n
152146
help
153147
This option enables local measurement integrity appraisal.
@@ -269,7 +263,7 @@ config IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
269263
config IMA_BLACKLIST_KEYRING
270264
bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)"
271265
depends on SYSTEM_TRUSTED_KEYRING
272-
depends on IMA_TRUSTED_KEYRING
266+
depends on INTEGRITY_TRUSTED_KEYRING
273267
default n
274268
help
275269
This option creates an IMA blacklist keyring, which contains all
@@ -279,7 +273,7 @@ config IMA_BLACKLIST_KEYRING
279273

280274
config IMA_LOAD_X509
281275
bool "Load X509 certificate onto the '.ima' trusted keyring"
282-
depends on IMA_TRUSTED_KEYRING
276+
depends on INTEGRITY_TRUSTED_KEYRING
283277
default n
284278
help
285279
File signature verification is based on the public keys
@@ -304,7 +298,6 @@ config IMA_APPRAISE_SIGNED_INIT
304298

305299
config IMA_MEASURE_ASYMMETRIC_KEYS
306300
bool
307-
depends on IMA
308301
depends on ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y
309302
default y
310303

@@ -323,7 +316,8 @@ config IMA_SECURE_AND_OR_TRUSTED_BOOT
323316

324317
config IMA_DISABLE_HTABLE
325318
bool "Disable htable to allow measurement of duplicate records"
326-
depends on IMA
327319
default n
328320
help
329321
This option disables htable to allow measurement of duplicate records.
322+
323+
endif

0 commit comments

Comments
 (0)