diff options
| author | Eric Paris <[email protected]> | 2013-08-28 17:32:42 +0000 |
|---|---|---|
| committer | Eric Paris <[email protected]> | 2013-08-28 18:45:21 +0000 |
| commit | 0b4bdb3573a86a88c829b9e4ad702859eb923e7e (patch) | |
| tree | 17494a87030cbb6678c1cb8c904f93ce79ce4b47 /security/selinux/hooks.c | |
| parent | selinux: consider filesystem subtype in policies (diff) | |
| download | kernel-0b4bdb3573a86a88c829b9e4ad702859eb923e7e.tar.gz kernel-0b4bdb3573a86a88c829b9e4ad702859eb923e7e.zip | |
Revert "SELinux: do not handle seclabel as a special flag"
This reverts commit 308ab70c465d97cf7e3168961dfd365535de21a6.
It breaks my FC6 test box. /dev/pts is not mounted. dmesg says
SELinux: mount invalid. Same superblock, different security settings
for (dev devpts, type devpts)
Cc: Peter Hurley <[email protected]>
Cc: Greg KH <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Eric Paris <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
| -rw-r--r-- | security/selinux/hooks.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 0d4408debb45..c156f5eb1aea 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -504,6 +504,9 @@ static int selinux_get_mnt_opts(const struct super_block *sb, opts->num_mnt_opts++; tmp >>= 1; } + /* Check if the Label support flag is set */ + if (sbsec->flags & SBLABEL_MNT) + opts->num_mnt_opts++; opts->mnt_opts = kcalloc(opts->num_mnt_opts, sizeof(char *), GFP_ATOMIC); if (!opts->mnt_opts) { |
