From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933474AbdGKUbS (ORCPT ); Tue, 11 Jul 2017 16:31:18 -0400 Received: from shards.monkeyblade.net ([184.105.139.130]:41528 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932577AbdGKUbQ (ORCPT ); Tue, 11 Jul 2017 16:31:16 -0400 Date: Tue, 11 Jul 2017 13:31:14 -0700 (PDT) Message-Id: <20170711.133114.2003805526568564614.davem@davemloft.net> To: herbert@gondor.apana.org.au Cc: sowmini.varadhan@oracle.com, torvalds@linux-foundation.org, akpm@linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, mitr@redhat.com Subject: Re: [GIT] Networking From: David Miller In-Reply-To: <20170710140048.GA15408@gondor.apana.org.au> References: <20170710100531.GA14940@gondor.apana.org.au> <20170710121002.GB21587@oracle.com> <20170710140048.GA15408@gondor.apana.org.au> X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Tue, 11 Jul 2017 13:31:15 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Herbert Xu Date: Mon, 10 Jul 2017 22:00:48 +0800 > crypto: af_alg - Avoid sock_graft call warning > > The newly added sock_graft warning triggers in af_alg_accept. > It's harmless as we're essentially doing sock->sk = sock->sk. > > The sock_graft call is actually redundant because all the work > it does is subsumed by sock_init_data. However, it was added > to placate SELinux as it uses it to initialise its internal state. > > This patch avoisd the warning by making the SELinux call directly. > > Reported-by: Linus Torvalds > Signed-off-by: Herbert Xu Acked-by: David S. Miller Looks good, is this going via my tree or your's?