| # IBM Integrity Measurement Architecture | 
 | # | 
 | config IMA | 
 | 	bool "Integrity Measurement Architecture(IMA)" | 
 | 	depends on SECURITY | 
 | 	select SECURITYFS | 
 | 	select CRYPTO | 
 | 	select CRYPTO_HMAC | 
 | 	select CRYPTO_MD5 | 
 | 	select CRYPTO_SHA1 | 
 | 	select TCG_TPM if !S390 | 
 | 	select TCG_TIS if TCG_TPM | 
 | 	help | 
 | 	  The Trusted Computing Group(TCG) runtime Integrity | 
 | 	  Measurement Architecture(IMA) maintains a list of hash | 
 | 	  values of executables and other sensitive system files, | 
 | 	  as they are read or executed. If an attacker manages | 
 | 	  to change the contents of an important system file | 
 | 	  being measured, we can tell. | 
 |  | 
 | 	  If your system has a TPM chip, then IMA also maintains | 
 | 	  an aggregate integrity value over this list inside the | 
 | 	  TPM hardware, so that the TPM can prove to a third party | 
 | 	  whether or not critical system files have been modified. | 
 | 	  Read <http://www.usenix.org/events/sec04/tech/sailer.html> | 
 | 	  to learn more about IMA. | 
 | 	  If unsure, say N. | 
 |  | 
 | config IMA_MEASURE_PCR_IDX | 
 | 	int | 
 | 	depends on IMA | 
 | 	range 8 14 | 
 | 	default 10 | 
 | 	help | 
 | 	  IMA_MEASURE_PCR_IDX determines the TPM PCR register index | 
 | 	  that IMA uses to maintain the integrity aggregate of the | 
 | 	  measurement list.  If unsure, use the default 10. | 
 |  | 
 | config IMA_AUDIT | 
 | 	bool | 
 | 	depends on IMA | 
 | 	default y | 
 | 	help | 
 | 	  This option adds a kernel parameter 'ima_audit', which | 
 | 	  allows informational auditing messages to be enabled | 
 | 	  at boot.  If this option is selected, informational integrity | 
 | 	  auditing messages can be enabled with 'ima_audit=1' on | 
 | 	  the kernel command line. | 
 |  | 
 | config IMA_LSM_RULES | 
 | 	bool | 
 | 	depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK) | 
 | 	default y | 
 | 	help | 
 | 	  Disabling this option will disregard LSM based policy rules. |