Skip to content

Commit bcbccaf

Browse files
committed
afs: Fix SELinux setting security label on /afs
Make the AFS dynamic root superblock R/W so that SELinux can set the security label on it. Without this, upgrades to, say, the Fedora filesystem-afs RPM fail if afs is mounted on it because the SELinux label can't be (re-)applied. It might be better to make it possible to bypass the R/O check for LSM label application through setxattr. Fixes: 4d673da ("afs: Support the AFS dynamic root") Signed-off-by: David Howells <[email protected]> Reviewed-by: Marc Dionne <[email protected]> cc: [email protected] cc: [email protected]
1 parent 9bd0160 commit bcbccaf

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

fs/afs/super.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -448,7 +448,6 @@ static int afs_fill_super(struct super_block *sb, struct afs_fs_context *ctx)
448448
/* allocate the root inode and dentry */
449449
if (as->dyn_root) {
450450
inode = afs_iget_pseudo_dir(sb, true);
451-
sb->s_flags |= SB_RDONLY;
452451
} else {
453452
sprintf(sb->s_id, "%llu", as->volume->vid);
454453
afs_activate_volume(as->volume);

0 commit comments

Comments
 (0)