Devuan bug report logs - #928
Add nfs-common and nfs-kernel-server launch options removed in debian 13

version graph

Package: nfs-common; Maintainer for nfs-common is (unknown); Source for nfs-common is src:nfs-utils.

Reported by: dan <dandudikof@gmail.com>

Date: Mon, 1 Dec 2025 19:46:01 UTC

Severity: normal

Tags: debian, moreinfo

Found in version 2.8.3-1

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#928: Add nfs-common and nfs-kernel-server launch options removed in debian 13
Reply-To: dan <dandudikof@gmail.com>, 928@bugs.devuan.org
Resent-From: dan <dandudikof@gmail.com>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: devuan-dev@lists.dyne.org
X-Loop: owner@bugs.devuan.org
Resent-Date: Mon, 01 Dec 2025 19:46:01 +0000
Resent-Message-ID: <handler.928.B.17646183123548@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: report 928
X-Devuan-PR-Package: nfs-common
X-Devuan-PR-Keywords: 
Received: via spool by submit@bugs.devuan.org id=B.17646183123548
          (code B); Mon, 01 Dec 2025 19:46:01 +0000
Received: (at submit) by bugs.devuan.org; 1 Dec 2025 19:45:12 +0000
Delivered-To: bugs@devuan.org
Received: from email.devuan.org [2a01:4f9:fff1:13::5fd9:f9e4]
	by doc.devuan.org with IMAP (fetchmail-6.4.39)
	for <debbugs@localhost> (single-drop); Mon, 01 Dec 2025 19:45:12 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id djBRMwvwLWnTAwAAmSBk0A
	(envelope-from <dandudikof@gmail.com>)
	for <bugs@devuan.org>; Mon, 01 Dec 2025 19:44:11 +0000
Authentication-Results: email.devuan.org;
	dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20230601 header.b=MX9jzi99;
	dkim-atps=neutral
Received: by email.devuan.org (Postfix, from userid 109)
	id A2C8E220; Mon, 01 Dec 2025 19:44:11 +0000 (UTC)
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=2607:f8b0:4864:20::732; helo=mail-qk1-x732.google.com; envelope-from=dandudikof@gmail.com; receiver=bugs.devuan.org 
Received: from mail-qk1-x732.google.com (mail-qk1-x732.google.com [IPv6:2607:f8b0:4864:20::732])
	by email.devuan.org (Postfix) with ESMTPS id 3C5D731
	for <submit@bugs.devuan.org>; Mon, 01 Dec 2025 19:44:09 +0000 (UTC)
Received: by mail-qk1-x732.google.com with SMTP id af79cd13be357-8b2dcdde698so532838285a.3
        for <submit@bugs.devuan.org>; Mon, 01 Dec 2025 11:44:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20230601; t=1764618248; x=1765223048; darn=bugs.devuan.org;
        h=content-transfer-encoding:in-reply-to:from:to:references
         :content-language:subject:user-agent:mime-version:date:message-id
         :from:to:cc:subject:date:message-id:reply-to;
        bh=XSo164EG90ElMItXODW6JJoLxhK8DCdFz1uFPJY8uUA=;
        b=MX9jzi994jj8IYfYENghEtI4RzdiUaUamqxrkNvsJgjfzehys/bud6L4qdRvvUrsGZ
         1I8zebWNkcFTx8eQXOMq7TpULIRo50YYuxAWKw1A7hjUztMBfuOGXXh98reUmD/2aiiM
         j8FLQI4cjM1uoLlq+rNMSvaF1GTOqa4HOUJCKLnaoXOvGUKSSFb4Hx85DOYsAg5wmZw6
         A8XFREnJk8wFGPKCjzPyFOe9z+BXpCcWERlzU1slsVsS+69l5L4CLXP6B3sjvWK/xgsd
         UGJSYwP9XGTt2tnzLVdPTqBLucOcRby4oKyPZ++0oMOW1/Pt+O2RCtZHdTEQxgZyOtHg
         DdmA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20230601; t=1764618248; x=1765223048;
        h=content-transfer-encoding:in-reply-to:from:to:references
         :content-language:subject:user-agent:mime-version:date:message-id
         :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id
         :reply-to;
        bh=XSo164EG90ElMItXODW6JJoLxhK8DCdFz1uFPJY8uUA=;
        b=Ph5cctyHh3hpcKgoQiG65bm6k+01VBL4Ck75z02pze0sstD6JV+2SvKir11OYCT/uU
         lgU9ZLmU66oQffkjielQWKeewxWWQOVi8J23ms9YPefQmxp2Ud0HGBuFUl8Zd8lxxDdr
         6hu2kkEMfH6N4Px9CaR4Z9xnJW5Khoq85mvBSVByV9HIU+d9/Zdt6blIA5gx4D2T9lbS
         HadCMKDL9EBh8krYSJbkOXVdF3WnvAq+TYaZIbOUd/PLjeo1V6GhyWbn6Hx/RhHt7zG8
         F/4+AcuoYsfvhxel79c1bcqQNsgAioDt+VR5V5DOhddJfFUdNKdu8b+t5Hh08rtHaXG0
         DoKQ==
X-Gm-Message-State: AOJu0YwQNREpTEsC6BAsN723mMw9CCl5WL1rcunOj7iiH1atXjFr4lBm
	JpVsM0SIqYdLES5YlfzeD6yvmUHvrMp5Dp1Dw5qf23Sz0pwDNxFVCcWlHSJs/w==
X-Gm-Gg: ASbGnctj+zO3qzlSM2dtOuq+hPLljpx8rPbaeMLkhL3mGSYh0qZHFI16GDlSt1ixNnb
	rmqe6f86M2lxXWGEFNI3r/23x6x4KtTQvlbCxpUm1HbQUW5tgqgpSAlKmLZNjhBQG1So3cY30O7
	IPUBBlpfx/gnefPDuAfdNjNonJQ3OjjxhaGVdvjTFTDLdEHSS2Ij3AhCb4JHwmLFPBUHRuRcDKE
	Ywag+m0bM/ZSBuD0wH8f60zJ/yakm6Pgq7VB55eRAL8eSmiZXGi0nw/OcwmrAn9jGd26A3APwY5
	OMMj02GOYdd8PqYGijTZwXlkeOKF4WfcycGUeuCjK84bZZge/d5QLS2pwCVXSSA9sQ/ND7ooL5X
	4zFrtVrB8I/cmjA3D9o47Qfk8q6lV9cNwd9v7IXLNNs+mDWnBLQ6MzY/w2ek8toDcr0KPiQGr1A
	ECKU7yxgal0YTqJn67WO0qHRU2Vuu2URVA5y80UoiGZ3laU616FDO/612fmaQCBKFq
X-Google-Smtp-Source: AGHT+IGaD002wtes5ig6xZKp8pRUjTnjsC0CeQMxZpDmsH5frg0KFrlS7YUuv91ipUFSjp3wOqBAHA==
X-Received: by 2002:a05:620a:1aa8:b0:8b2:e3c1:24c3 with SMTP id af79cd13be357-8b33d48288cmr5812356185a.64.1764618247254;
        Mon, 01 Dec 2025 11:44:07 -0800 (PST)
Received: from [192.168.10.30] (c-73-29-128-194.hsd1.nj.comcast.net. [73.29.128.194])
        by smtp.gmail.com with ESMTPSA id af79cd13be357-8b52a1b759esm916769185a.31.2025.12.01.11.44.05
        for <submit@bugs.devuan.org>
        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
        Mon, 01 Dec 2025 11:44:05 -0800 (PST)
Message-ID: <c9fb87bc-7796-40b8-bf69-8ba5abc121fe@gmail.com>
Date: Mon, 1 Dec 2025 14:44:01 -0500
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: submit@bugs.devuan.org
From: dan <dandudikof@gmail.com>
In-Reply-To: <1fc339a2-b822-437b-84a0-ec18f69a81de@gmail.com>
X-Forwarded-Message-Id: <1fc339a2-b822-437b-84a0-ec18f69a81de@gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Package: nfs-common
Version: 2.8.3-1

Package2: nfs-kernel-server
Version2: 2.8.3-1

Severity: grave

Tags: patch


as peer 
https://salsa.debian.org/kernel-team/nfs-utils/-/blob/debian/latest/debian/nfs-common.NEWS?ref_type=heads

Options related to launching nfs kernel server and support services from

/etc/default/nfs-common
/etc/default/nfs-kernel-server

in liue of /etc/nfs.conf
(by systemd service launching taking over)

now are being ignored by respective init scripts of

/etc/init.d/nfs-common
/etc/init.d/nfs-kernel-server


Propose to bring back the options from previous versions of init files
Until there is support for new /etc/nfs.conf


PS: patches were quick and dirty made on top of unpacked debs not source 
debs, by comparing what was working/needed in devuan5 and missing in 
devuan6.



--- /src/nfs-common_2.8.3-1_amd64/etc/init.d/nfs-common.orig
+++ /src/nfs-common_2.8.3-1_amd64/etc/init.d/nfs-common.new
@@ -20,6 +20,7 @@
 NEED_STATD=
 NEED_GSSD=
 PIPEFS_MOUNTPOINT=/run/rpc_pipefs
+RPCGSSDOPTS=
 if [ -f $DEFAULTFILE ]; then
     . $DEFAULTFILE
 fi
@@ -133,7 +134,7 @@
 	    fi
 	    start-stop-daemon --start --oknodo --quiet \
 		--pidfile /run/rpc.statd.pid \
-	        --exec /usr/sbin/rpc.statd
+	        --exec /sbin/rpc.statd -- $STATDOPTS
 	    RET=$?
 	    if [ $RET != 0 ]; then
 	        log_end_msg $RET
@@ -183,7 +184,7 @@
 		    fi

 		    start-stop-daemon --start --oknodo --quiet \
-			    --exec /usr/sbin/rpc.gssd
+			    --exec /usr/sbin/rpc.gssd -- $RPCGSSDOPTS
 		    RET=$?
 	            if [ $RET != 0 ]; then
         	        log_end_msg $RET





--- /src/nfs-kernel-server_2.8.3-1_amd64/etc/init.d/nfs-kernel-server.orig
+++ /src/nfs-kernel-server_2.8.3-1_amd64/etc/init.d/nfs-kernel-server.new
@@ -25,8 +25,11 @@

 # Read config
 DEFAULTFILE=/etc/default/nfs-kernel-server
+RPCNFSDCOUNT=8
 RPCNFSDPRIORITY=0
+RPCMOUNTDOPTS=
 NEED_SVCGSSD=no
+RPCSVCGSSDOPTS=
 PROCNFSD_MOUNTPOINT=/proc/fs/nfsd
 if [ -f $DEFAULTFILE ]; then
     . $DEFAULTFILE
@@ -98,7 +101,7 @@

 		start-stop-daemon --start --oknodo --quiet \
 		    --nicelevel $RPCNFSDPRIORITY \
-		    --exec $PREFIX/sbin/rpc.nfsd
+		    --exec $PREFIX/sbin/rpc.nfsd -- $RPCNFSDCOUNT
 		RET=$?
 		if [ $RET != 0 ]; then
 			log_end_msg $RET
@@ -121,7 +124,7 @@
 			do_modprobe rpcsec_gss_krb5
 			log_progress_msg "svcgssd"
 			start-stop-daemon --start --oknodo --quiet \
-			    --exec $PREFIX/sbin/rpc.svcgssd
+			    --exec $PREFIX/sbin/rpc.svcgssd -- $RPCSVCGSSDOPTS
 			RET=$?
 			if [ $RET != 0 ]; then
 				log_end_msg $RET
@@ -131,7 +134,7 @@

 		log_progress_msg "mountd"
 		start-stop-daemon --start --oknodo --quiet \
-		    --exec $PREFIX/sbin/rpc.mountd
+		    --exec $PREFIX/sbin/rpc.mountd -- $RPCMOUNTDOPTS
 		RET=$?
 		if [ $RET != 0 ]; then
 			log_end_msg $RET




thanx

dan

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Fri Dec 5 02:08:22 2025;