Kconfig (b746a1a2860f4a918f32d10dc569115d282aaf2f) | Kconfig (520b7aa00d8cd8e411ecc09f63a2acd90feb6d29) |
---|---|
1# SPDX-License-Identifier: GPL-2.0-only 2# 3# Security configuration 4# 5 6menu "Security options" 7 8source "security/keys/Kconfig" --- 263 unchanged lines hidden (view full) --- 272 273 config DEFAULT_SECURITY_DAC 274 bool "Unix Discretionary Access Controls" 275 276endchoice 277 278config LSM 279 string "Ordered list of enabled LSMs" | 1# SPDX-License-Identifier: GPL-2.0-only 2# 3# Security configuration 4# 5 6menu "Security options" 7 8source "security/keys/Kconfig" --- 263 unchanged lines hidden (view full) --- 272 273 config DEFAULT_SECURITY_DAC 274 bool "Unix Discretionary Access Controls" 275 276endchoice 277 278config LSM 279 string "Ordered list of enabled LSMs" |
280 default "lockdown,yama,loadpin,safesetid,integrity,smack,selinux,tomoyo,apparmor" if DEFAULT_SECURITY_SMACK 281 default "lockdown,yama,loadpin,safesetid,integrity,apparmor,selinux,smack,tomoyo" if DEFAULT_SECURITY_APPARMOR 282 default "lockdown,yama,loadpin,safesetid,integrity,tomoyo" if DEFAULT_SECURITY_TOMOYO 283 default "lockdown,yama,loadpin,safesetid,integrity" if DEFAULT_SECURITY_DAC 284 default "lockdown,yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor" | 280 default "lockdown,yama,loadpin,safesetid,integrity,smack,selinux,tomoyo,apparmor,bpf" if DEFAULT_SECURITY_SMACK 281 default "lockdown,yama,loadpin,safesetid,integrity,apparmor,selinux,smack,tomoyo,bpf" if DEFAULT_SECURITY_APPARMOR 282 default "lockdown,yama,loadpin,safesetid,integrity,tomoyo,bpf" if DEFAULT_SECURITY_TOMOYO 283 default "lockdown,yama,loadpin,safesetid,integrity,bpf" if DEFAULT_SECURITY_DAC 284 default "lockdown,yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor,bpf" |
285 help 286 A comma-separated list of LSMs, in initialization order. 287 Any LSMs left off this list will be ignored. This can be 288 controlled at boot with the "lsm=" parameter. 289 290 If unsure, leave this as the default. 291 292source "security/Kconfig.hardening" 293 294endmenu 295 | 285 help 286 A comma-separated list of LSMs, in initialization order. 287 Any LSMs left off this list will be ignored. This can be 288 controlled at boot with the "lsm=" parameter. 289 290 If unsure, leave this as the default. 291 292source "security/Kconfig.hardening" 293 294endmenu 295 |