From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on sa.local.altlinux.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.1 From: Anton Midyukov To: devel-kernel@lists.altlinux.org Date: Tue, 3 Mar 2026 17:39:05 +0300 Message-ID: <20260303143905.80318-1-antohami@altlinux.org> X-Mailer: git-send-email 2.50.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [d-kernel] [PATCH] [6.12] config: add selinux to CONFIG_LSM X-BeenThere: devel-kernel@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux kernel packages development List-Id: ALT Linux kernel packages development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 03 Mar 2026 14:39:23 -0000 Archived-At: List-Archive: List-Post: This is necessary to use Selinux. Alternatively, can enable it in the kernel cmdline: lsm=selinux,lockdown,capability,landlock,yama,safesetid,bpf,kiosk,ima,evm But this clutters the kernel cmdline. Signed-off-by: Anton Midyukov --- config | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/config b/config index 76dcac8f970d..ba51640d2b4f 100644 --- a/config +++ b/config @@ -10125,7 +10125,7 @@ CONFIG_EVM_EXTRA_SMACK_XATTRS=y # CONFIG_DEFAULT_SECURITY_SMACK is not set # CONFIG_DEFAULT_SECURITY_APPARMOR is not set CONFIG_DEFAULT_SECURITY_DAC=y -CONFIG_LSM="landlock,lockdown,yama,loadpin,safesetid,integrity,bpf,altha,kiosk" +CONFIG_LSM="selinux,landlock,lockdown,yama,loadpin,safesetid,integrity,bpf,altha,kiosk" # # Kernel hardening options -- 2.50.1