diff options
author | Jeff Layton <jlayton@kernel.org> | 2020-07-28 16:34:20 +0200 |
---|---|---|
committer | Ilya Dryomov <idryomov@gmail.com> | 2020-08-04 19:41:11 +0200 |
commit | b748fc7a8763a5b3f8149f12c45711cd73ef8176 (patch) | |
tree | 2923d5afdd94cb337e8daa9b16df4f09afb702d0 | |
parent | ceph: remove redundant initialization of variable mds (diff) | |
download | linux-b748fc7a8763a5b3f8149f12c45711cd73ef8176.tar.xz linux-b748fc7a8763a5b3f8149f12c45711cd73ef8176.zip |
ceph: set sec_context xattr on symlink creation
Symlink inodes should have the security context set in their xattrs on
creation. We already set the context on creation, but we don't attach
the pagelist. The effect is that symlink inodes don't get an SELinux
context set on them at creation, so they end up unlabeled instead of
inheriting the proper context. Make it do so.
Cc: stable@vger.kernel.org
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Ilya Dryomov <idryomov@gmail.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
-rw-r--r-- | fs/ceph/dir.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/fs/ceph/dir.c b/fs/ceph/dir.c index 39f5311404b0..060bdcc5ce32 100644 --- a/fs/ceph/dir.c +++ b/fs/ceph/dir.c @@ -930,6 +930,10 @@ static int ceph_symlink(struct inode *dir, struct dentry *dentry, req->r_num_caps = 2; req->r_dentry_drop = CEPH_CAP_FILE_SHARED | CEPH_CAP_AUTH_EXCL; req->r_dentry_unless = CEPH_CAP_FILE_EXCL; + if (as_ctx.pagelist) { + req->r_pagelist = as_ctx.pagelist; + as_ctx.pagelist = NULL; + } err = ceph_mdsc_do_request(mdsc, dir, req); if (!err && !req->r_reply_info.head->is_dentry) err = ceph_handle_notrace_create(dir, dentry); |