On Tue, Mar 10, 2020 at 11:53 AM Stephen Smalley <stephen.smalley.work@xxxxxxxxx> wrote: > On Tue, Mar 3, 2020 at 5:59 PM Scott Mayhew <smayhew@xxxxxxxxxx> wrote: > > > > When using NFSv4.2, the security label for the root inode should be set > > via a call to nfs_setsecurity() during the mount process, otherwise the > > inode will appear as unlabeled for up to acdirmin seconds. Currently > > the label for the root inode is allocated, retrieved, and freed entirely > > witin nfs4_proc_get_root(). > > > > Add a field for the label to the nfs_fattr struct, and allocate & free > > the label in nfs_get_root(), where we also add a call to > > nfs_setsecurity(). Note that for the call to nfs_setsecurity() to > > succeed, it's necessary to also move the logic calling > > security_sb_{set,clone}_security() from nfs_get_tree_common() down into > > nfs_get_root()... otherwise the SBLABEL_MNT flag will not be set in the > > super_block's security flags and nfs_setsecurity() will silently fail. > > > > Reported-by: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx> > > Signed-off-by: Scott Mayhew <smayhew@xxxxxxxxxx> > > Acked-by: Stephen Smalley <sds@xxxxxxxxxxxxx> > Tested-by: Stephen Smalley <sds@xxxxxxxxxxxxx> This all looks reasonable to me so I've merged it into selinux/next (with some minor line width fixes); I was hoping some of the NFS guys would lend an ACK but it has been well over a week with no objections so I figure it is fair game. Thanks for the patch, testing, and review everyone! -- paul moore www.paul-moore.com