Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sun, 1 Dec 2002 13:57:39 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sun, 1 Dec 2002 13:57:39 -0500 Received: from 12-231-249-244.client.attbi.com ([12.231.249.244]:30469 "HELO kroah.com") by vger.kernel.org with SMTP id ; Sun, 1 Dec 2002 13:57:39 -0500 Date: Sun, 1 Dec 2002 12:05:35 -0800 From: Greg KH To: Olaf Dietsche Cc: James Morris , linux-security-module@wirex.com, linux-kernel@vger.kernel.org Subject: Re: [RFC] LSM fix for stupid "empty" functions Message-ID: <20021201200535.GA9448@kroah.com> References: <873cph37dh.fsf@goat.bogus.local> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <873cph37dh.fsf@goat.bogus.local> User-Agent: Mutt/1.4i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 643 Lines: 17 On Sun, Dec 01, 2002 at 07:46:02PM +0100, Olaf Dietsche wrote: > > If you want to check, wether a module has been recompiled, you should > add a length/sizeof(struct security_operations) parameter. No, I don't want to go down that path. All security modules need to be compiled against the exact kernel version they are going to be used for, like any other kernel module type. thanks, greg k-h - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/