ChangeSet 1.2231.1.17, 2005/03/28 19:20:54-08:00, [EMAIL PROTECTED] [PATCH] SELinux: allow mounting of filesystems with invalid root inode context This patch alters the SELinux handling of inodes with invalid security contexts so that a filesystem with a root inode that has an invalid security context can still be mounted for administrative recovery without disabling SELinux altogether. Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]> Signed-off-by: James Morris <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> Signed-off-by: Linus Torvalds <[EMAIL PROTECTED]>
hooks.c | 4 +++- 1 files changed, 3 insertions(+), 1 deletion(-) diff -Nru a/security/selinux/hooks.c b/security/selinux/hooks.c --- a/security/selinux/hooks.c 2005-03-28 21:10:10 -08:00 +++ b/security/selinux/hooks.c 2005-03-28 21:10:10 -08:00 @@ -829,7 +829,9 @@ __FUNCTION__, context, -rc, inode->i_sb->s_id, inode->i_ino); kfree(context); - goto out; + /* Leave with the unlabeled SID */ + rc = 0; + break; } } kfree(context); - To unsubscribe from this list: send the line "unsubscribe bk-commits-head" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html