Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: kernel warning
From: Kerry Thompson <kerry_at_crypt.gen.nz>
Date: Thu, 31 Oct 2002 08:43:54 +1300 (NZDT)
Kerry Stephen Smalley said: > > SELinux has always included a separate SELinux-specific kernel patch to > be applied on top of the LSM patch, although the precise purpose of the > patch has varied over time. In the current release, the patch is > available in the SELinux archive in selinux/module/selinux-2.4.patch or > directly from > http://www.nsa.gov/selinux/patches/selinux-2.4-2002102211.patch.gz. In > the latest release, the dependence of the SELinux module on this patch > has increased due to the elimination of precondition functions. Some of > the changes in this patch may find their way back into the mainstream > LSM patch in a more general form in the future (they have all been > discussed on the LSM mailing list), but some changes are likely to > remain > SELinux-specific. -- Kerry Thompson, CCNA CISSP Information Systems Security Consultant http://www.crypt.gen.nz kerry@crypt.gen.nz -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Wed 30 Oct 2002 - 14:54:44 EST |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |