mirror of
https://github.com/SELinuxProject/selinux
synced 2025-01-30 01:12:51 +00:00
Resend: This patch causes the mount points created in load_policy to have a proper name
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 04/06/2011 05:10 PM, Daniel J Walsh wrote: > "proc" and "selinuxfs" > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAk2c14AACgkQrlYvE4MpobMC7gCglauBYIKMfBRUcQPaMGKTzYZV udUAn3X/rgUgJ55401IVwyCHC051bGQA =47TI -----END PGP SIGNATURE----- Signed-off-by: Steve Lawrence <slawrence@tresys.com>
This commit is contained in:
parent
f89d4aca9c
commit
5c6729b4d2
@ -329,7 +329,7 @@ int selinux_init_load_policy(int *enforce)
|
||||
selinux_getenforcemode(&seconfig);
|
||||
|
||||
/* Check for an override of the mode via the kernel command line. */
|
||||
rc = mount("none", "/proc", "proc", 0, 0);
|
||||
rc = mount("proc", "/proc", "proc", 0, 0);
|
||||
cfg = fopen("/proc/cmdline", "r");
|
||||
if (cfg) {
|
||||
char *tmp;
|
||||
@ -369,7 +369,7 @@ int selinux_init_load_policy(int *enforce)
|
||||
* Check for the existence of SELinux via selinuxfs, and
|
||||
* mount it if present for use in the calls below.
|
||||
*/
|
||||
if (mount("none", SELINUXMNT, "selinuxfs", 0, 0) < 0 && errno != EBUSY) {
|
||||
if (mount("selinuxfs", SELINUXMNT, "selinuxfs", 0, 0) < 0 && errno != EBUSY) {
|
||||
if (errno == ENODEV) {
|
||||
/*
|
||||
* SELinux was disabled in the kernel, either
|
||||
|
Loading…
Reference in New Issue
Block a user