hc
2024-12-19 9370bb92b2d16684ee45cf24e879c93c509162da
kernel/fs/nfs/getroot.c
....@@ -1,12 +1,8 @@
1
+// SPDX-License-Identifier: GPL-2.0-or-later
12 /* getroot.c: get the root dentry for an NFS mount
23 *
34 * Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
45 * Written by David Howells (dhowells@redhat.com)
5
- *
6
- * This program is free software; you can redistribute it and/or
7
- * modify it under the terms of the GNU General Public License
8
- * as published by the Free Software Foundation; either version
9
- * 2 of the License, or (at your option) any later version.
106 */
117
128 #include <linux/module.h>
....@@ -68,66 +64,102 @@
6864 /*
6965 * get an NFS2/NFS3 root dentry from the root filehandle
7066 */
71
-struct dentry *nfs_get_root(struct super_block *sb, struct nfs_fh *mntfh,
72
- const char *devname)
67
+int nfs_get_root(struct super_block *s, struct fs_context *fc)
7368 {
74
- struct nfs_server *server = NFS_SB(sb);
69
+ struct nfs_fs_context *ctx = nfs_fc2context(fc);
70
+ struct nfs_server *server = NFS_SB(s);
7571 struct nfs_fsinfo fsinfo;
76
- struct dentry *ret;
72
+ struct dentry *root;
7773 struct inode *inode;
78
- void *name = kstrdup(devname, GFP_KERNEL);
79
- int error;
74
+ char *name;
75
+ int error = -ENOMEM;
76
+ unsigned long kflags = 0, kflags_out = 0;
8077
78
+ name = kstrdup(fc->source, GFP_KERNEL);
8179 if (!name)
82
- return ERR_PTR(-ENOMEM);
80
+ goto out;
8381
8482 /* get the actual root for this mount */
8583 fsinfo.fattr = nfs_alloc_fattr();
86
- if (fsinfo.fattr == NULL) {
87
- kfree(name);
88
- return ERR_PTR(-ENOMEM);
89
- }
84
+ if (fsinfo.fattr == NULL)
85
+ goto out_name;
9086
91
- error = server->nfs_client->rpc_ops->getroot(server, mntfh, &fsinfo);
87
+ fsinfo.fattr->label = nfs4_label_alloc(server, GFP_KERNEL);
88
+ if (IS_ERR(fsinfo.fattr->label))
89
+ goto out_fattr;
90
+ error = server->nfs_client->rpc_ops->getroot(server, ctx->mntfh, &fsinfo);
9291 if (error < 0) {
9392 dprintk("nfs_get_root: getattr error = %d\n", -error);
94
- ret = ERR_PTR(error);
95
- goto out;
93
+ nfs_errorf(fc, "NFS: Couldn't getattr on root");
94
+ goto out_label;
9695 }
9796
98
- inode = nfs_fhget(sb, mntfh, fsinfo.fattr, NULL);
97
+ inode = nfs_fhget(s, ctx->mntfh, fsinfo.fattr, NULL);
9998 if (IS_ERR(inode)) {
10099 dprintk("nfs_get_root: get root inode failed\n");
101
- ret = ERR_CAST(inode);
102
- goto out;
100
+ error = PTR_ERR(inode);
101
+ nfs_errorf(fc, "NFS: Couldn't get root inode");
102
+ goto out_label;
103103 }
104104
105
- error = nfs_superblock_set_dummy_root(sb, inode);
106
- if (error != 0) {
107
- ret = ERR_PTR(error);
108
- goto out;
109
- }
105
+ error = nfs_superblock_set_dummy_root(s, inode);
106
+ if (error != 0)
107
+ goto out_label;
110108
111109 /* root dentries normally start off anonymous and get spliced in later
112110 * if the dentry tree reaches them; however if the dentry already
113111 * exists, we'll pick it up at this point and use it as the root
114112 */
115
- ret = d_obtain_root(inode);
116
- if (IS_ERR(ret)) {
113
+ root = d_obtain_root(inode);
114
+ if (IS_ERR(root)) {
117115 dprintk("nfs_get_root: get root dentry failed\n");
118
- goto out;
116
+ error = PTR_ERR(root);
117
+ nfs_errorf(fc, "NFS: Couldn't get root dentry");
118
+ goto out_label;
119119 }
120120
121
- security_d_instantiate(ret, inode);
122
- spin_lock(&ret->d_lock);
123
- if (IS_ROOT(ret) && !ret->d_fsdata &&
124
- !(ret->d_flags & DCACHE_NFSFS_RENAMED)) {
125
- ret->d_fsdata = name;
121
+ security_d_instantiate(root, inode);
122
+ spin_lock(&root->d_lock);
123
+ if (IS_ROOT(root) && !root->d_fsdata &&
124
+ !(root->d_flags & DCACHE_NFSFS_RENAMED)) {
125
+ root->d_fsdata = name;
126126 name = NULL;
127127 }
128
- spin_unlock(&ret->d_lock);
129
-out:
130
- kfree(name);
128
+ spin_unlock(&root->d_lock);
129
+ fc->root = root;
130
+ if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
131
+ kflags |= SECURITY_LSM_NATIVE_LABELS;
132
+ if (ctx->clone_data.sb) {
133
+ if (d_inode(fc->root)->i_fop != &nfs_dir_operations) {
134
+ error = -ESTALE;
135
+ goto error_splat_root;
136
+ }
137
+ /* clone lsm security options from the parent to the new sb */
138
+ error = security_sb_clone_mnt_opts(ctx->clone_data.sb,
139
+ s, kflags, &kflags_out);
140
+ } else {
141
+ error = security_sb_set_mnt_opts(s, fc->security,
142
+ kflags, &kflags_out);
143
+ }
144
+ if (error)
145
+ goto error_splat_root;
146
+ if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
147
+ !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
148
+ NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
149
+
150
+ nfs_setsecurity(inode, fsinfo.fattr, fsinfo.fattr->label);
151
+ error = 0;
152
+
153
+out_label:
154
+ nfs4_label_free(fsinfo.fattr->label);
155
+out_fattr:
131156 nfs_free_fattr(fsinfo.fattr);
132
- return ret;
157
+out_name:
158
+ kfree(name);
159
+out:
160
+ return error;
161
+error_splat_root:
162
+ dput(fc->root);
163
+ fc->root = NULL;
164
+ goto out_label;
133165 }