generated from archlinux/template
FS#71270: Don't enable "bpf" LSM by default
It provides all possible hooks, which makes it harder to properly use major LSMs. Using security= to enable a major LSM puts it at the end of the list. Some functions (like security_getprocattr) only use the first matching hook, thus prefer bpf.
This commit is contained in:
4
config
4
config
@@ -1,6 +1,6 @@
|
||||
#
|
||||
# Automatically generated file; DO NOT EDIT.
|
||||
# Linux/x86 5.12.8-arch1 Kernel Configuration
|
||||
# Linux/x86 5.12.10-arch1 Kernel Configuration
|
||||
#
|
||||
CONFIG_CC_VERSION_TEXT="gcc (GCC) 11.1.0"
|
||||
CONFIG_CC_IS_GCC=y
|
||||
@@ -9689,7 +9689,7 @@ CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE=y
|
||||
# CONFIG_DEFAULT_SECURITY_TOMOYO is not set
|
||||
# CONFIG_DEFAULT_SECURITY_APPARMOR is not set
|
||||
CONFIG_DEFAULT_SECURITY_DAC=y
|
||||
CONFIG_LSM="lockdown,yama,bpf"
|
||||
CONFIG_LSM="lockdown,yama"
|
||||
|
||||
#
|
||||
# Kernel hardening options
|
||||
|
||||
Reference in New Issue
Block a user