Add request-key.d/id_resolver.conf to shut up logspam #297
+24
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
NFS clients of a kernel before 5.15.89.mx64.445 try to use the
id_resolver for sec=mariux mounts when uid or gid file attributes are
transmitted to the server (e.g. when chown or chgrp is done).
The kernel nfs clients makes a user space upcall via /sbin/request-key
for a key of a type id_resolver and a key description like "user:130" or
"group:125".
As keys of the type id_resolver are not configured in
/etc/request-key.conf, this will fail but /sbin/request-key logs
"request-key: Cannot find command to construct key..." to its stdout
which ends up in the syslog.
The nfs clients continues by sending the uid/gid value numerically to
the nfs server, which is what we want.
Configure a (negative) request-key response for keys of the type
id_resolver to avoid logfile spam.
Kernels since 5.15.89.mx64.445 don't need that, because the userspace
upcall is avoided for sec=mariux just the same as it is for sec=sys.