ChangeSet 1.2231.1.17, 2005/03/28 19:20:54-08:00, [EMAIL PROTECTED]

        [PATCH] SELinux: allow mounting of filesystems with invalid root inode 
context
        
        This patch alters the SELinux handling of inodes with invalid security
        contexts so that a filesystem with a root inode that has an invalid
        security context can still be mounted for administrative recovery 
without
        disabling SELinux altogether.
        
        Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]>
        Signed-off-by: James Morris <[EMAIL PROTECTED]>
        Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
        Signed-off-by: Linus Torvalds <[EMAIL PROTECTED]>



 hooks.c |    4 +++-
 1 files changed, 3 insertions(+), 1 deletion(-)


diff -Nru a/security/selinux/hooks.c b/security/selinux/hooks.c
--- a/security/selinux/hooks.c  2005-03-28 21:10:10 -08:00
+++ b/security/selinux/hooks.c  2005-03-28 21:10:10 -08:00
@@ -829,7 +829,9 @@
                                       __FUNCTION__, context, -rc,
                                       inode->i_sb->s_id, inode->i_ino);
                                kfree(context);
-                               goto out;
+                               /* Leave with the unlabeled SID */
+                               rc = 0;
+                               break;
                        }
                }
                kfree(context);
-
To unsubscribe from this list: send the line "unsubscribe bk-commits-head" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to