lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Line.LNX.4.64.0703281306560.4569@d.namei>
Date:	Wed, 28 Mar 2007 13:11:07 -0400 (EDT)
From:	James Morris <jmorris@...ei.org>
To:	Eric Paris <eparis@...hat.com>
cc:	Joy Latten <latten@...tin.ibm.com>,
	David Miller <davem@...emloft.net>, netdev@...r.kernel.org,
	Herbert Xu <herbert@...dor.apana.org.au>,
	Paul Moore <paul.moore@...com>,
	Venkat Yekkirala <vyekkirala@...stedcs.com>,
	Steve G <linux_4ever@...oo.com>,
	Stephen Smalley <sds@...ho.nsa.gov>, selinux@...ho.nsa.gov
Subject: Re: LSPP kernels (was Re: [PATCH]: SAD sometimes has double SAs).

On Wed, 28 Mar 2007, Eric Paris wrote:

> It is definitely NOT a shortcut into RHEL.

Ok, that was a poor choice of words on my part.

> I don't want to give the impression that upstream is not coming first.
> All the work is being done upstream either on netdev or linux-audit and
> then I pull it back into this LSPP kernel she talked about so that
> people interested primarily in the testing necessary to meet that
> particular government standard have a neat tidy little prebuild rpm to
> work with.  Eventually all of these will show up in RHEL, but not until
> all of the patches i'm dealing with are upstream.

It seems my understanding wasn't clear on the overall workflow.  If the 
consensus is to stay with this scheme, then please disregard my previous 
post.


-- 
James Morris
<jmorris@...ei.org>
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ