Your message dated Tue, 16 Jul 2024 20:49:15 +0000 with message-id <E1sTp6p-000XoK-A2@fasolo.debian.org> and subject line Bug#1076448: fixed in nfs-utils 1:1.3.4-6+deb11u1 has caused the Debian Bug report #1076448, regarding linux: Update from 5.10.218 to 5.10.221 breaks NFS re-exports to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1076448: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076448 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux: Update from 5.10.218 to 5.10.221 breaks NFS re-exports
- From: Sven-Haegar Koch <haegar@sdinet.de>
- Date: Tue, 16 Jul 2024 15:56:04 +0200 (CEST)
- Message-id: <[🔎] e1267e49-36b7-7709-c9b3-36cb4c7f2a6b@sdinet.de>
Source: linux Version: 5.10.221-1 Severity: normal X-Debbugs-Cc: haegar@sdinet.de Updating from Debian Bullseye 5.10.218-1 to 5.10.221-1 broke our NFS server. The server mounts some NFS directories from a NAS, and re-exports them (and more) to other servers. With 5.10.218-1 everything worked just fine. But with 5.10.221-1 (most likeley because of the big NFS backports in 5.10.220) starting the nfs-server.service breaks with Jul 16 12:58:56 mytest-sh exportfs[2071]: exportfs: /media/nfsroot/pvsbackup does not support NFS export We were using the normal Debian Bullseye nfs-kernel-server package: Package: nfs-kernel-server Version: 1:1.3.4-6 NFS Mount via /etc/fstab: 10.1.2.3:/pvsbackup /media/nfsroot/pvsbackup nfs rw,bg,hard,timeo=600,proto=tcp,retrans=2 0 0 NFS export in /etc/exports /media/nfsroot/pvsbackup 10.4.5.6/32(rw,no_root_squash,no_subtree_check,fsid=61cb2589-1805-438a-9bd7-7baf0daabfd2) In the wiki page https://wiki.linux-nfs.org/wiki/index.php/NFS_re-export I found the comment "You'll need nfs-utils at least 1.3.5 (specifically, 3f520e8f6f5 "exportfs: Make sure pass all valid export flags to nfsd"). Otherwise, on recent kernels, attempts to re-export NFS will likely result in "exportfs: <path> does not support NFS export". - and the Debian Bullseye nfs-utils packages based in 1.3.4 do not satisfy this. Seems since the NFS backports 5.10.220 can be seen as "recent kernels", while the previous 5.10.218 not yet. For testing I recompiled/backported the Debian Bookworm nfs-utils 1:2.6.2-4 for Bullseye, and this totally fixes the problems. So I think Debian Bullseye either needs these NFS kernel changes reverted, or its nfs-utils/nfs-kernel-server packages updated to include at least the missing commit. Greetings, Haegar -- System Information: Debian Release: 11.10 APT prefers oldstable-updates APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500, 'oldstable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-31-amd64 (SMP w/2 CPU threads) Locale: LANG=en_US.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en Shell: /bin/sh linked to /usr/bin/bash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
- To: 1076448-close@bugs.debian.org
- Subject: Bug#1076448: fixed in nfs-utils 1:1.3.4-6+deb11u1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 16 Jul 2024 20:49:15 +0000
- Message-id: <E1sTp6p-000XoK-A2@fasolo.debian.org>
- Reply-to: Salvatore Bonaccorso <carnil@debian.org>
Source: nfs-utils Source-Version: 1:1.3.4-6+deb11u1 Done: Salvatore Bonaccorso <carnil@debian.org> We believe that the bug you reported is fixed in the latest version of nfs-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1076448@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <carnil@debian.org> (supplier of updated nfs-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 16 Jul 2024 20:37:00 +0200 Source: nfs-utils Architecture: source Version: 1:1.3.4-6+deb11u1 Distribution: bullseye Urgency: medium Maintainer: Debian kernel team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 1076448 Changes: nfs-utils (1:1.3.4-6+deb11u1) bullseye; urgency=medium . * exportfs: Make sure pass all valid export flags to nfsd (Closes: #1076448) Checksums-Sha1: f4e1ad374d4658e6a27752356106cb9875f4ede5 2480 nfs-utils_1.3.4-6+deb11u1.dsc 9ee83344baee4b8d839277e523c4fc0d01cd616a 52848 nfs-utils_1.3.4-6+deb11u1.debian.tar.xz Checksums-Sha256: 585297bcf08f085a389cfbc72ff1581361fad894f670dcb7484a6fde803f0128 2480 nfs-utils_1.3.4-6+deb11u1.dsc 1d14ee9934dcda984e85711011f80e7387fb2f8b6c8b7cfb2a2a424e907e0ced 52848 nfs-utils_1.3.4-6+deb11u1.debian.tar.xz Files: 78c54a114d2dc16f2f5e1f12227162dd 2480 net optional nfs-utils_1.3.4-6+deb11u1.dsc 6d87aecabf61c4b2c24001d1b07aa727 52848 net optional nfs-utils_1.3.4-6+deb11u1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmaWwnRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EHJ8P/jmG5PuQTRNgDizTmqUmm+4LL0vGLLUj tP1znLyg5rK5XGPu102HrN0zBj1F7ymrMquqNQz5kdqmXRQiuJQMYgo9L7SmKqqd oZvq9NfHlDY/8b9uRcwEWHBUIfV6guZCZq05aAxptsssxtVfD59QnobXNlJqkaZN /YkLBajB5pmNYdROJnieJ83EdsOqsfj9VmFvIsvoCcwljbVA7eZyJMOf+KoK4D9M WZTAFQrNxfTSwZYM/pO77S3qlcUrX1TQP3UktenBQ+XkehRE4CyVJg60gwjPP1UE fx58PJ0uLQIu6YrW3gYU+u2IJH5AeAoNnzSdtVT9NDYrdfJvBvfkf/HzzS1z0PAs la+Ui97qOT1+OIVkywxs6Tes1X8edGPrI6qv6YgmIecO0VUmZKx2bVzB5lQMC3/Z 0mmCyh6jXi6JvoaZ9lvl9MGTF45/MA1ZbRPUQBzs4EgE99ocy2fne64jePoCWssD aIPrsjvRuxiHiQhkswzWI7A4I0jRI14WW170U9iB74yscZADdWs2E63u3vETLY93 pRYoeb1MWjuLXpmGlq4UBZ15gHRjvUKDfJWK8SITZL5dEzqGdLj9lbBMzX5rG95k R3KYlpCoGriv/XVHlAE85TCdWnji86DtxLmGg0x2121R40lF7yuvB+pHvSYfgkGS 10aERzlwkbY5 =1Oov -----END PGP SIGNATURE-----Attachment: pgpicA6QAKC9n.pgp
Description: PGP signature
--- End Message ---