[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1076448: marked as done (linux: Update from 5.10.218 to 5.10.221 breaks NFS re-exports)



Your message dated Tue, 16 Jul 2024 20:49:15 +0000
with message-id <E1sTp6p-000XoK-A2@fasolo.debian.org>
and subject line Bug#1076448: fixed in nfs-utils 1:1.3.4-6+deb11u1
has caused the Debian Bug report #1076448,
regarding linux: Update from 5.10.218 to 5.10.221 breaks NFS re-exports
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1076448: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076448
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 5.10.221-1
Severity: normal
X-Debbugs-Cc: haegar@sdinet.de

Updating from Debian Bullseye 5.10.218-1 to 5.10.221-1 broke our NFS 
server.

The server mounts some NFS directories from a NAS, and re-exports them 
(and more) to other servers.

With 5.10.218-1 everything worked just fine.

But with 5.10.221-1 (most likeley because of the big NFS backports in 
5.10.220) starting the nfs-server.service breaks with

Jul 16 12:58:56 mytest-sh exportfs[2071]: exportfs: /media/nfsroot/pvsbackup does not support NFS export


We were using the normal Debian Bullseye nfs-kernel-server package:

Package: nfs-kernel-server
Version: 1:1.3.4-6

NFS Mount via /etc/fstab:
10.1.2.3:/pvsbackup /media/nfsroot/pvsbackup     nfs  rw,bg,hard,timeo=600,proto=tcp,retrans=2 0 0

NFS export in /etc/exports
/media/nfsroot/pvsbackup 10.4.5.6/32(rw,no_root_squash,no_subtree_check,fsid=61cb2589-1805-438a-9bd7-7baf0daabfd2)


In the wiki page https://wiki.linux-nfs.org/wiki/index.php/NFS_re-export 
I found the comment "You'll need nfs-utils at least 1.3.5 (specifically, 
3f520e8f6f5 "exportfs: Make sure pass all valid export flags to nfsd"). 
Otherwise, on recent kernels, attempts to re-export NFS will likely 
result in "exportfs: <path> does not support NFS export". - and the 
Debian  Bullseye nfs-utils packages based in 1.3.4 do not satisfy this.

Seems since the NFS backports 5.10.220 can be seen as "recent kernels", 
while the previous 5.10.218 not yet.

For testing I recompiled/backported the Debian Bookworm nfs-utils 
1:2.6.2-4 for Bullseye, and this totally fixes the problems.

So I think Debian Bullseye either needs these NFS kernel changes 
reverted, or its nfs-utils/nfs-kernel-server packages updated to include 
at least the missing commit.

Greetings,
Haegar


-- System Information:
Debian Release: 11.10
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), 
(500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-31-amd64 (SMP w/2 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.3.4-6+deb11u1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1076448@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 16 Jul 2024 20:37:00 +0200
Source: nfs-utils
Architecture: source
Version: 1:1.3.4-6+deb11u1
Distribution: bullseye
Urgency: medium
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1076448
Changes:
 nfs-utils (1:1.3.4-6+deb11u1) bullseye; urgency=medium
 .
   * exportfs: Make sure pass all valid export flags to nfsd (Closes: #1076448)
Checksums-Sha1: 
 f4e1ad374d4658e6a27752356106cb9875f4ede5 2480 nfs-utils_1.3.4-6+deb11u1.dsc
 9ee83344baee4b8d839277e523c4fc0d01cd616a 52848 nfs-utils_1.3.4-6+deb11u1.debian.tar.xz
Checksums-Sha256: 
 585297bcf08f085a389cfbc72ff1581361fad894f670dcb7484a6fde803f0128 2480 nfs-utils_1.3.4-6+deb11u1.dsc
 1d14ee9934dcda984e85711011f80e7387fb2f8b6c8b7cfb2a2a424e907e0ced 52848 nfs-utils_1.3.4-6+deb11u1.debian.tar.xz
Files: 
 78c54a114d2dc16f2f5e1f12227162dd 2480 net optional nfs-utils_1.3.4-6+deb11u1.dsc
 6d87aecabf61c4b2c24001d1b07aa727 52848 net optional nfs-utils_1.3.4-6+deb11u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmaWwnRfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EHJ8P/jmG5PuQTRNgDizTmqUmm+4LL0vGLLUj
tP1znLyg5rK5XGPu102HrN0zBj1F7ymrMquqNQz5kdqmXRQiuJQMYgo9L7SmKqqd
oZvq9NfHlDY/8b9uRcwEWHBUIfV6guZCZq05aAxptsssxtVfD59QnobXNlJqkaZN
/YkLBajB5pmNYdROJnieJ83EdsOqsfj9VmFvIsvoCcwljbVA7eZyJMOf+KoK4D9M
WZTAFQrNxfTSwZYM/pO77S3qlcUrX1TQP3UktenBQ+XkehRE4CyVJg60gwjPP1UE
fx58PJ0uLQIu6YrW3gYU+u2IJH5AeAoNnzSdtVT9NDYrdfJvBvfkf/HzzS1z0PAs
la+Ui97qOT1+OIVkywxs6Tes1X8edGPrI6qv6YgmIecO0VUmZKx2bVzB5lQMC3/Z
0mmCyh6jXi6JvoaZ9lvl9MGTF45/MA1ZbRPUQBzs4EgE99ocy2fne64jePoCWssD
aIPrsjvRuxiHiQhkswzWI7A4I0jRI14WW170U9iB74yscZADdWs2E63u3vETLY93
pRYoeb1MWjuLXpmGlq4UBZ15gHRjvUKDfJWK8SITZL5dEzqGdLj9lbBMzX5rG95k
R3KYlpCoGriv/XVHlAE85TCdWnji86DtxLmGg0x2121R40lF7yuvB+pHvSYfgkGS
10aERzlwkbY5
=1Oov
-----END PGP SIGNATURE-----

Attachment: pgpicA6QAKC9n.pgp
Description: PGP signature


--- End Message ---

Reply to: