From b8fc29e86b762c0dc2707623dcbdeabf52f2008a Mon Sep 17 00:00:00 2001 From: Eric Paris Date: Mon, 9 Mar 2009 14:35:58 -0400 Subject: [PATCH] --- yaml --- r: 132643 b: refs/heads/master c: df7f54c012b92ec93d56b68547351dcdf8a163d3 h: refs/heads/master i: 132641: 5d12de33f2bdace3423be4bfe4d9a9c6c6683f70 132639: 8cd2d7add40211cd70b407717b05247d732c86fb v: v3 --- [refs] | 2 +- trunk/security/selinux/hooks.c | 12 +++++++++--- 2 files changed, 10 insertions(+), 4 deletions(-) diff --git a/[refs] b/[refs] index 7c2cc05a94f1..d1cd7038dc12 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: dd34b5d75a0405814a3de83f02a44ac297e81629 +refs/heads/master: df7f54c012b92ec93d56b68547351dcdf8a163d3 diff --git a/trunk/security/selinux/hooks.c b/trunk/security/selinux/hooks.c index cd3307a26d11..7c52ba243c64 100644 --- a/trunk/security/selinux/hooks.c +++ b/trunk/security/selinux/hooks.c @@ -1263,9 +1263,15 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent dentry = d_find_alias(inode); } if (!dentry) { - printk(KERN_WARNING "SELinux: %s: no dentry for dev=%s " - "ino=%ld\n", __func__, inode->i_sb->s_id, - inode->i_ino); + /* + * this is can be hit on boot when a file is accessed + * before the policy is loaded. When we load policy we + * may find inodes that have no dentry on the + * sbsec->isec_head list. No reason to complain as these + * will get fixed up the next time we go through + * inode_doinit with a dentry, before these inodes could + * be used again by userspace. + */ goto out_unlock; }