Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp57101pxu; Wed, 2 Dec 2020 14:58:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJzxAMSbmYHxbqJBgNKup4lY93IPA6Y9jHtnkDvcosDV7AB7NMlMmAuH4jtbtyUXS/BGL1wh X-Received: by 2002:a17:906:26cc:: with SMTP id u12mr38324ejc.295.1606949932493; Wed, 02 Dec 2020 14:58:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606949932; cv=none; d=google.com; s=arc-20160816; b=PiLz7vHVNM+oF75DKPU5aTh0ZAITAFxnwuo0FSZsD3UIEL6FadpoYw2DffQ0Qyea/3 qwSqK33pfM/O7TGQMREPWHiSFIZdQ3fPRn0XOx02hjqKDe268mn6dKOqTPFV+TO1T7nu Kve/fBnWhaFw5kbSMOVVBAKKPwqbuJlbtcOG/0q7hTmupj8RpHNQ7VNVNj7s/VynviwV VyA2DS6Kua+pJNvup+/53sLIiCoDRqSCdn2Efp8xTVuL5w4Kae8JD8ta0VVRGese9Lzr Z+PsG/iRZlRjMpEdpIwxCf3kl3xsiR/lQzU+S8bjsIN+qZrdzlziZnW0o70+wzYTZqn0 t23A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature:dkim-filter; bh=4NzDPZA4mXxMik1ooI5NvPahkHk1d62zw4FBvIR/aTk=; b=u4lU/ePaXWcdhtbT1KNFlikTn7qb0sG6RJ92dxa7d4oxz6xWS4Bv0KM8xjWLIEziRY DuSornEhEH9JK9Uw+s9Bw8+GwQtgfJiJDcVi97pMqpuf9BCSy1Xq1UyeGWpgCTMWKquB sI1Ae4nKUuNOxTQ5njpDhzwP+/tlFMwvsxKKinudCuMl2ExZMnXGMffnSxnMfFHa0vF8 BiJVxX2UggfGcKnn6u5JMETMeS6ILurl1vUqNifz0Lx3Qrt46s3BnBxFLb4Vlbfm+L/c twTEuhe14/j17M3pXrjtfDxvrpv3EZuwlu5nI9LyrPu9UbaZDlEm42o9wLWjir5qcFMK tIYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fieldses.org header.s=default header.b="X/5j/iw5"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rn21si38952ejb.130.2020.12.02.14.58.29; Wed, 02 Dec 2020 14:58:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@fieldses.org header.s=default header.b="X/5j/iw5"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726254AbgLBW52 (ORCPT + 99 others); Wed, 2 Dec 2020 17:57:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37108 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725985AbgLBW51 (ORCPT ); Wed, 2 Dec 2020 17:57:27 -0500 Received: from fieldses.org (fieldses.org [IPv6:2600:3c00:e000:2f7::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6E16CC0617A6 for ; Wed, 2 Dec 2020 14:56:47 -0800 (PST) Received: by fieldses.org (Postfix, from userid 2815) id 3A92FBC8; Wed, 2 Dec 2020 17:56:46 -0500 (EST) DKIM-Filter: OpenDKIM Filter v2.11.0 fieldses.org 3A92FBC8 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fieldses.org; s=default; t=1606949806; bh=4NzDPZA4mXxMik1ooI5NvPahkHk1d62zw4FBvIR/aTk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X/5j/iw5TQnkfcTvYGHNSy2td8yNVDnOzaPvqX3SXoJDgso41SeeZexTzOhgs9qPL zeXzZBu/+xUGgDgg+pGJsc5V8E+pboklWs7HSvUee0OrUlyO/V8UL6aHs3GHgXp1YV dwLeFexDnj42DCZ0H12uMBWrcwr7y4jpVirLEPlM= From: "J. Bruce Fields" To: Steve Dickson Cc: linux-nfs@vger.kernel.org, "J. Bruce Fields" Subject: [PATCH 2/2] mountd: always root squash on the pseudofs Date: Wed, 2 Dec 2020 17:56:44 -0500 Message-Id: <1606949804-31417-2-git-send-email-bfields@fieldses.org> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1606949804-31417-1-git-send-email-bfields@fieldses.org> References: <1606949804-31417-1-git-send-email-bfields@fieldses.org> Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org From: "J. Bruce Fields" As with security flavors and "secure" ports, we tried to code this so that pseudofs directories would inherit root squashing from their children, but it doesn't really work as coded and I'm not sure it's useful. Just root squash always. If it turns out somebody's exporting directories that are only readable by root, I guess we can try to do something else here, but frankly that sounds like a pretty weird configuration. Signed-off-by: J. Bruce Fields --- utils/mountd/v4root.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/utils/mountd/v4root.c b/utils/mountd/v4root.c index 2ac4e87898c0..36543401f296 100644 --- a/utils/mountd/v4root.c +++ b/utils/mountd/v4root.c @@ -60,8 +60,6 @@ set_pseudofs_security(struct exportent *pseudo, int flags) struct flav_info *flav; int i; - if ((flags & NFSEXP_ROOTSQUASH) == 0) - pseudo->e_flags &= ~NFSEXP_ROOTSQUASH; for (flav = flav_map; flav < flav_map + flav_map_size; flav++) { struct sec_entry *new; -- 2.28.0