Message ID | 20190129185424.251139-1-mortonm@chromium.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | LSM: SafeSetID: 'depend' on CONFIG_SECURITY | expand |
On Tue, 29 Jan 2019, mortonm@chromium.org wrote: > From: Micah Morton <mortonm@chromium.org> > > This patch changes the Kconfig file for the SafeSetID LSM to depend on > CONFIG_SECURITY as well as select CONFIG_SECURITYFS, since the policies > for the LSM are configured through writing to securityfs. > > Signed-off-by: Micah Morton <mortonm@chromium.org> Applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-general
diff --git a/security/safesetid/Kconfig b/security/safesetid/Kconfig index bf89a47ffcc8..4f415c4e3f93 100644 --- a/security/safesetid/Kconfig +++ b/security/safesetid/Kconfig @@ -1,5 +1,7 @@ config SECURITY_SAFESETID bool "Gate setid transitions to limit CAP_SET{U/G}ID capabilities" + depends on SECURITY + select SECURITYFS default n help SafeSetID is an LSM module that gates the setid family of syscalls to