ChangeSet 1.2231.1.17, 2005/03/28 19:20:54-08:00, [EMAIL PROTECTED]
[PATCH] SELinux: allow mounting of filesystems with invalid root inode
context
This patch alters the SELinux handling of inodes with invalid security
contexts so that a filesystem with a root inode that has an invalid
security context can still be mounted for administrative recovery
without
disabling SELinux altogether.
Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]>
Signed-off-by: James Morris <[EMAIL PROTECTED]>
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
Signed-off-by: Linus Torvalds <[EMAIL PROTECTED]>
hooks.c | 4 +++-
1 files changed, 3 insertions(+), 1 deletion(-)
diff -Nru a/security/selinux/hooks.c b/security/selinux/hooks.c
--- a/security/selinux/hooks.c 2005-03-28 21:10:10 -08:00
+++ b/security/selinux/hooks.c 2005-03-28 21:10:10 -08:00
@@ -829,7 +829,9 @@
__FUNCTION__, context, -rc,
inode->i_sb->s_id, inode->i_ino);
kfree(context);
- goto out;
+ /* Leave with the unlabeled SID */
+ rc = 0;
+ break;
}
}
kfree(context);
-
To unsubscribe from this list: send the line "unsubscribe bk-commits-head" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html