original_kernel/security/selinux
Eric Paris 5a55261716 SELinux: don't BUG if fs reuses a superblock
I (wrongly) assumed that nfs_xdev_get_sb() would not ever share a superblock
and so cloning mount options would always be correct.  Turns out that isn't
the case and we could fall over a BUG_ON() that wasn't a BUG at all.  Since
there is little we can do to reconcile different mount options this patch
just leaves the sb alone and the first set of options wins.

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Trond Myklebust <trond.myklebust@fys.uio.no>
Signed-off-by: James Morris <jmorris@namei.org>
2008-04-10 08:51:01 +10:00
..
include SELinux: more GFP_NOFS fixups to prevent selinux from re-entering the fs code 2008-04-08 08:30:14 +10:00
ss SELinux: more GFP_NOFS fixups to prevent selinux from re-entering the fs code 2008-04-08 08:30:14 +10:00
Kconfig
Makefile
avc.c
exports.c
hooks.c SELinux: don't BUG if fs reuses a superblock 2008-04-10 08:51:01 +10:00
netif.c
netlabel.c
netlink.c
netnode.c
nlmsgtab.c
selinuxfs.c
xfrm.c