This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:

apport-collect 1680315

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1680315

Title:
  Disable CONFIG_SECURITY_SELINUX_DISABLE

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  In the v4.12 kernel, CONFIG_SECURITY_SELINUX_DISABLE (which allows
  disabling selinux after boot) will conflict with read-only LSM
  structures. Since Ubuntu is primarily using AppArmor for its LSM, and
  SELinux is disabled by default, it makes sense to drop this feature in
  favor of the protections offered by __ro_after_init markings on the
  LSM structures.

  https://patchwork.kernel.org/patch/9571911/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680315/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to