Source
3
3
depends on SECURITY && BLOCK
4
4
help
5
5
Any files read through the kernel file reading interface
6
6
(kernel modules, firmware, kexec images, security policy)
7
7
can be pinned to the first filesystem used for loading. When
8
8
enabled, any files that come from other filesystems will be
9
9
rejected. This is best used on systems without an initrd that
10
10
have a root filesystem backed by a read-only device such as
11
11
dm-verity or a CDROM.
12
12
​
13
-
config SECURITY_LOADPIN_ENABLED
13
+
config SECURITY_LOADPIN_ENFORCE
14
14
bool "Enforce LoadPin at boot"
15
15
depends on SECURITY_LOADPIN
16
16
help
17
17
If selected, LoadPin will enforce pinning at boot. If not
18
18
selected, it can be enabled at boot with the kernel parameter
19
-
"loadpin.enabled=1".
19
+
"loadpin.enforce=1".