Package: nfs-utils / 1:2.6.2-4+deb12u1
Metadata
Package | Version | Patches format |
---|---|---|
nfs-utils | 1:2.6.2-4+deb12u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
01 sm notify in sbin.patch | (download) |
utils/statd/statd.c |
2 1 + 1 - 0 ! |
--- |
25 systemd daemon paths.patch | (download) |
systemd/rpc-statd-notify.service |
2 1 + 1 - 0 ! |
adjust program paths in systemd units |
multiarch kerberos paths.patch | (download) |
aclocal/kerberos5.m4 |
2 2 + 0 - 0 ! |
support multiarch kerberos paths (closes: #642797). |
blkmapd fix coredump in bl_add_disk.patch | (download) |
utils/blkmapd/device-discovery.c |
15 3 + 12 - 0 ! |
blkmapd: fix coredump in bl_add_disk |
Revert configure make modprobe.d directory configura.patch | (download) |
configure.ac |
12 0 + 12 - 0 ! |
[patch 1/4] revert "configure: make modprobe.d directory configurable" This reverts commit 7d76dd2e6f09a141eb6303b7343baa5c4f9c85ad. This is part of the full revert of adding support via modprobe.d configuration to set sysctl settings of NFS-related modules when loading the modules. The approach caused problems with sysctl from busybox and with kmod as reported in Debian (https://bugs.debian.org/1024082). Signed-off-by: Salvatore Bonaccorso <carnil@debian.org> Signed-off-by: Steve Dickson <steved@redhat.com> |
Revert modprobe protect against sysctl errors.patch | (download) |
systemd/50-nfs.conf |
10 5 + 5 - 0 ! |
[patch 2/4] revert "modprobe: protect against sysctl errors" This reverts commit 5e60e38aa4ba251ef66610514be5f45c41519e0f. This is part of the full revert of adding support via modprobe.d configuration to set sysctl settings of NFS-related modules when loading the modules. The approach caused problems with sysctl from busybox and with kmod as reported in Debian (https://bugs.debian.org/1024082). Signed-off-by: Salvatore Bonaccorso <carnil@debian.org> Signed-off-by: Steve Dickson <steved@redhat.com> |
Revert systemd Apply all sysctl settings when NFS re.patch | (download) |
systemd/50-nfs.conf |
16 0 + 16 - 0 ! |
[patch 3/4] revert "systemd: apply all sysctl settings when NFS-related modules are loaded" This reverts commit afc7132dfb212ac1f676a5ac36d29a9e06325645. The approach caused problems with sysctl from busybox and with kmod as reported in Debian (https://bugs.debian.org/1024082). Signed-off-by: Salvatore Bonaccorso <carnil@debian.org> Signed-off-by: Steve Dickson <steved@redhat.com> |
systemd Apply all sysctl settings through udev rule .patch | (download) |
systemd/60-nfs.rules |
21 21 + 0 - 0 ! |
[patch 4/4] systemd: apply all sysctl settings through udev rule when NFS-related modules are loaded sysctl settings (e.g. /etc/sysctl.conf and others) are normally loaded once at boot. If the module that implements some settings is no yet loaded, those settings don't get applied. Various NFS modules support various sysctl settings. If they are loaded after boot, they miss out. Add a new udev rule configuration to udev/rules.d/60-nfs.rules to apply the relevant settings when the modules are loaded. Placing it in the systemd directory similarly as the choice for the original commit afc7132dfb21 ("systemd: Apply all sysctl settings when NFS-related modules are loaded"). Link: https://lore.kernel.org/linux-nfs/Y1KoKwu88PulcokW@eldamar.lan/ Link: https://bugs.debian.org/1022172 Link: https://bugs.debian.org/1024082 Suggested-by: Marco d'Itri <md@linux.it> Signed-off-by: Salvatore Bonaccorso <carnil@debian.org> Signed-off-by: Steve Dickson <steved@redhat.com> |
auth rpcgss module.service Don t fail inside linux c.patch | (download) |
systemd/auth-rpcgss-module.service |
1 1 + 0 - 0 ! |
[patch] auth-rpcgss-module.service: don't fail inside linux container. Only try to load the auth_rpcgss kernel module if we are not executing inside a Linux container. Otherwise, the auth-rpcgss-module service will fail inside a Linux container as the loading of kernel modules is forbidden for the container. Thus, the "/sbin/modprobe -q auth_rpcgss" call will fail even if the auth_rpcgss kernel module is already loaded. This situation occurs when the container host has already loaded the auth_rpcgss kernel module to enable kerberized NFS service for its containers. This behavior has been tested with kmod up to version 30+20220630-3 (current in bookworm as of 2022-09-20). Bug-Debian: http://bugs.debian.org/985000 Discussion-Debian: https://salsa.debian.org/kernel-team/nfs-utils/-/merge_requests/7 Signed-off-by: Joachim Falk <joachim.falk@gmx.de> Signed-off-by: Steve Dickson <steved@redhat.com> |
systemd Don t degrade system state for nfs clients w.patch | (download) |
systemd/auth-rpcgss-module.service |
2 1 + 1 - 0 ! |
systemd: don't degrade system state for nfs-clients when krb5 keytab present but not containing the nfs/<FQDN> principal |
exports Fix referrals when enable junction no.patch | (download) |
support/export/cache.c |
7 0 + 7 - 0 ! |
exports: fix referrals when --enable-junction=no |