Research Menu

.
Skip Search Box

SELinux Mailing List

Re: kernel warning

From: Brian May <bam_at_snoopy.apana.org.au>
Date: Wed, 30 Oct 2002 10:07:48 +1100


On Mon, Oct 28, 2002 at 07:57:06AM -0500, Stephen Smalley wrote:
> SELinux has always included a separate SELinux-specific kernel patch to be
> applied on top of the LSM patch, although the precise purpose of the patch
> has varied over time. In the current release, the patch is available in
> the SELinux archive in selinux/module/selinux-2.4.patch or directly from
> http://www.nsa.gov/selinux/patches/selinux-2.4-2002102211.patch.gz. In
> the latest release, the dependence of the SELinux module on this patch has
> increased due to the elimination of precondition functions. Some of the
> changes in this patch may find their way back into the mainstream LSM
> patch in a more general form in the future (they have all been discussed
> on the LSM mailing list), but some changes are likely to remain
> SELinux-specific.

It appears that with this patch, it is no longer possible to compile the patched kernel without SE-LINUX support.

Maybe the call to selinux_init() in main.c needs to be wrapped with #ifdef CONFIG_SECURITY_SELINUX?

-- 
Brian May <bam@snoopy.apana.org.au>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Tue 29 Oct 2002 - 18:24:31 EST
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service