summary |
shortlog |
log |
commit | commitdiff |
tree
raw |
patch |
inline | side by side (from parent 1:
302de78)
Commit
91bb95f2689e84856ecdf6fac365489d36709cf9
4set_root: force "fsid=0" for all exports of '/'
set NFSEXP_FSID for the export of "/" if nothing else had any fsid set,
however it didn't also set the flag for all security flavours. So the
kernel complains that the flags on the security flavours don't match and
it rejects the export.
So call fix_pseudoflavor_flags() in write_secinfo() to make sure that
any fiddling that has been done to e_flags gets copied to e_secinfo.
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Steve Dickson <steved@redhat.com>
};
struct export_features *get_export_features(void);
};
struct export_features *get_export_features(void);
+void fix_pseudoflavor_flags(struct exportent *ep);
/* Record export error. */
extern int export_errno;
/* Record export error. */
extern int export_errno;
* ensure that the export flags agree with the flags on each
* pseudoflavor:
*/
* ensure that the export flags agree with the flags on each
* pseudoflavor:
*/
-static void fix_pseudoflavor_flags(struct exportent *ep)
+void fix_pseudoflavor_flags(struct exportent *ep)
{
struct export_features *ef;
struct sec_entry *p;
{
struct export_features *ef;
struct sec_entry *p;
/* There was no sec= option */
return;
}
/* There was no sec= option */
return;
}
+ fix_pseudoflavor_flags(ep);
qword_print(f, "secinfo");
qword_printint(f, p - ep->e_secinfo);
for (p = ep->e_secinfo; p->flav; p++) {
qword_print(f, "secinfo");
qword_printint(f, p - ep->e_secinfo);
for (p = ep->e_secinfo; p->flav; p++) {