Hi- We've found an unexpected behavior with mount security negotiation in the current Linux NFS client. Given two real shares on an NFS server: one is a sys-only share, and the other is a krb5-only share. When we try to mount the sys-only share without specifying a sec= option, it fails. Specifying sec=sys is successful. What is seen on the wire: 1. The client attempts to access the pseudofs, and negotiates krb5 2. The client walks down the pseudofs namespace to the sys-only share 3. The client attempts to access the sys-only share with krb5 and gets WRONGSEC 4. The client negotiates sys, and continues setting up the mount 5. nfs_fs_mount_common() invokes nfs_get_root(), but it uses the pseudofs superblock, so it does a GETATTR on the share's root directory with krb5, and that fails At this point the client gives up, and the mount attempt fails. We could alter the server to allow a GETATTR with the same flavor as the underlying directory. But seems like the problem is on the client: it should use the negotiated flavor that is appropriate to the share, not the flavor appropriate for the pseudofs. Any thoughts? -- Chuck Lever -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html