Your message dated Fri, 18 Dec 2009 00:32:27 +0000
with message-id <e1nlqlf-0003rh...@ries.debian.org>
and subject line Bug#550153: fixed in nfs-utils 1:1.2.0-4.1
has caused the Debian Bug report #550153,
regarding nfs-kernel-server: init script incompatible with kernel 2.6.32
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
550153: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550153
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.0-4
Severity: important

/etc/init.d/nfs-kernel-server currently includes the following test:
   if [ -f /proc/kallsyms ] && ! grep -qE 'init_nf(sd|    )' /proc/kallsyms; 
then
        log_warning_msg "Not starting $DESC: no support in current kernel."
        exit 0
   fi

But with that test it fails to start with kernel 2.6.32-rc6, even though
nfs (both v3 and v4) support is available:
Starting NFS common utilities: idmapd.
Not starting NFS kernel daemon: no support in current kernel. ... (warning).

If I just comment out the test, nfs-kernel-server starts without any
problems and clients can connect.

A grep on /proc/kallsyms shows that apparently the init_nfsd symbols
have been dropped.

Not sure what other symbol is most suitable to replace the current test.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: armel (armv5tel)

Kernel: Linux 2.6.32-rc6
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-kernel-server depends on:
ii  libblkid1                2.16.1-4        block device id library
ii  libc6                    2.10.1-3        GNU C Library: Shared libraries
ii  libcomerr2               1.41.9-1        common error description library
ii  libgssapi-krb5-2         1.7dfsg~beta3-1 MIT Kerberos runtime libraries - k
ii  libgssglue1              0.1-4           mechanism-switch gssapi library
ii  libk5crypto3             1.7dfsg~beta3-1 MIT Kerberos runtime libraries - C
ii  libkrb5-3                1.7dfsg~beta3-1 MIT Kerberos runtime libraries
ii  libnfsidmap2             0.22-2          An nfs idmapping library
ii  librpcsecgss3            0.19-2          allows secure rpc communication us
ii  libwrap0                 7.6.q-18        Wietse Venema's TCP wrappers libra
ii  lsb-base                 3.2-23          Linux Standard Base 3.2 init scrip
ii  nfs-common               1:1.2.0-4       NFS support files common to client
ii  ucf                      3.0024          Update Configuration File: preserv

nfs-kernel-server recommends no packages.

nfs-kernel-server suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.2.0-4.1

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:

nfs-common_1.2.0-4.1_i386.deb
  to main/n/nfs-utils/nfs-common_1.2.0-4.1_i386.deb
nfs-kernel-server_1.2.0-4.1_i386.deb
  to main/n/nfs-utils/nfs-kernel-server_1.2.0-4.1_i386.deb
nfs-utils_1.2.0-4.1.diff.gz
  to main/n/nfs-utils/nfs-utils_1.2.0-4.1.diff.gz
nfs-utils_1.2.0-4.1.dsc
  to main/n/nfs-utils/nfs-utils_1.2.0-4.1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 550...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Hutchings <b...@decadent.org.uk> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 16 Dec 2009 22:14:01 +0000
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source i386
Version: 1:1.2.0-4.1
Distribution: unstable
Urgency: low
Maintainer: Anibal Monsalve Salazar <ani...@debian.org>
Changed-By: Ben Hutchings <b...@decadent.org.uk>
Description: 
 nfs-common - NFS support files common to client and server
 nfs-kernel-server - support for NFS kernel server
Closes: 550153
Changes: 
 nfs-utils (1:1.2.0-4.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Fix test for NFS kernel server support in init script; closes: #550153
Checksums-Sha1: 
 eae23256c49ee4a13e79a4ce441d5ee5c9023098 1847 nfs-utils_1.2.0-4.1.dsc
 afb2621a408cb4d6fc32dfb22dd9b9a61a35338e 37136 nfs-utils_1.2.0-4.1.diff.gz
 4f0f3686da6a2ca655b677179f655e2ea885b113 153248 
nfs-kernel-server_1.2.0-4.1_i386.deb
 46bbe35feb659aa4daca3c806f96923fce5e1f4a 208106 nfs-common_1.2.0-4.1_i386.deb
Checksums-Sha256: 
 0c1790761a21dfe2dd84b96f3830b709c98eb799930a3581a671716382566db5 1847 
nfs-utils_1.2.0-4.1.dsc
 dd65ff4f3b3093f5874b4c8b435616965b2b5574c09733a00740fef30abb3821 37136 
nfs-utils_1.2.0-4.1.diff.gz
 a9f7bcf9b483d42f899975de75777be7341800d29bfbd5b75aa7fe9c7d695c97 153248 
nfs-kernel-server_1.2.0-4.1_i386.deb
 2bc7bcad7260ff7169aae4a6f49b4340349a3efae705660d1cbb694df1cd226b 208106 
nfs-common_1.2.0-4.1_i386.deb
Files: 
 59f1d72239b60385405d11036acc4223 1847 net standard nfs-utils_1.2.0-4.1.dsc
 8d3a6c948211977d5186cf1fc012512d 37136 net standard nfs-utils_1.2.0-4.1.diff.gz
 c92f01f9f2ed72008e0671f3c17fb7dd 153248 net optional 
nfs-kernel-server_1.2.0-4.1_i386.deb
 e0b0c3ed972c72decc857951f5ae406b 208106 net standard 
nfs-common_1.2.0-4.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=cLTL
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to