Your message dated Sun, 03 Dec 2023 14:42:10 +0000
with message-id <e1r9nfe-0088k8...@fasolo.debian.org>
and subject line Bug#1051132: fixed in nfs-utils 1:2.6.4-3
has caused the Debian Bug report #1051132,
regarding /usr/sbin/fsidd: bound to 
@/run/fsid.sock@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051132: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051132
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:2.6.3-3
Severity: normal
File: /usr/sbin/fsidd

Dear Maintainer,

This makes ss -l output super annoying without grep -v fsidd | column -t again.

I'm assuming it wants to bind to @/run/fsid.sock instead but someone forgor 💀

Best,
наб


-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
    100024    1   udp  41527  status
    100024    1   tcp  33501  status
    100005    1   udp  35312  mountd
    100005    1   tcp  45513  mountd
    100005    2   udp  52719  mountd
    100005    2   tcp  58465  mountd
    100005    3   udp  35138  mountd
    100005    3   tcp  46079  mountd
    100003    3   tcp   2049  nfs
    100003    4   tcp   2049  nfs
    100227    3   tcp   2049  nfs_acl
    100021    1   udp  40985  nlockmgr
    100021    3   udp  40985  nlockmgr
    100021    4   udp  40985  nlockmgr
    100021    1   tcp  37537  nlockmgr
    100021    3   tcp  37537  nlockmgr
    100021    4   tcp  37537  nlockmgr
-- /etc/default/nfs-kernel-server --
RPCNFSDPRIORITY=0
NEED_SVCGSSD=""
-- /etc/nfs.conf --
[general]
pipefs-directory=/run/rpc_pipefs
[nfsrahead]
[exports]
[exportfs]
[gssd]
[lockd]
[exportd]
[mountd]
manage-gids=y
[nfsdcld]
[nfsdcltrack]
[nfsd]
[statd]
[sm-notify]
[svcgssd]
-- /etc/nfs.conf.d/*.conf --

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386

Kernel: Linux 6.3.0-2-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages nfs-kernel-server depends on:
ii  keyutils             1.6.1-2
ii  libblkid1            2.38.1-6
ii  libc6                2.37-6
ii  libcap2              1:2.66-4
ii  libevent-core-2.1-7  2.1.12-stable-8
ii  libsqlite3-0         3.42.0-1
ii  libtirpc3            1.3.3+ds-1
ii  libuuid1             2.38.1-6
ii  libwrap0             7.6.q-32
ii  netbase              6.4
ii  nfs-common           1:2.6.3-3
ii  ucf                  3.0043+nmu1

Versions of packages nfs-kernel-server recommends:
ii  python3       3.11.4-5+b1
ii  python3-yaml  6.0-3+b2

Versions of packages nfs-kernel-server suggests:
ii  procps  2:4.0.3-1

-- no debconf information

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:2.6.4-3
Done: Salvatore Bonaccorso <car...@debian.org>

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 03 Dec 2023 14:58:30 +0100
Source: nfs-utils
Architecture: source
Version: 1:2.6.4-3
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 1051132
Changes:
 nfs-utils (1:2.6.4-3) unstable; urgency=medium
 .
   [ Salvatore Bonaccorso ]
   * fsidd: call anonymous sockets by their name only, don't fill with NULs to
     108 bytes (Closes: #1051132)
Checksums-Sha1: 
 ab89fbbc2ce5c42ecc450c5df5c05ce738151de3 2567 nfs-utils_2.6.4-3.dsc
 9341ba6196e3db07875ad53302ab845643a6fc60 48700 nfs-utils_2.6.4-3.debian.tar.xz
Checksums-Sha256: 
 9b4c0e07f1ac194c9f46832548568e1e53e7195d35d3b2b82443311323c1caeb 2567 
nfs-utils_2.6.4-3.dsc
 101fc535208578e64ef92a26cb581be8baf468abe223c8861412633d3497955c 48700 
nfs-utils_2.6.4-3.debian.tar.xz
Files: 
 ed1bae21180443a668d0f96c791fe87a 2567 net optional nfs-utils_2.6.4-3.dsc
 8c58d0c811e7c9b03caad09bc2d0ffc3 48700 net optional 
nfs-utils_2.6.4-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmVsir9fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EzD8P/18MSpyEyS8LZouUk7ZM2O9Pj1J5hw9H
HYjzK8aEnZPgaZLBiuF+evC7DeH528IvCBpkPgVuEpZEey0cNJsquFt3wqfTN6sV
fw9UtYiCyfX/ty8BuTFjyOk2SxC5whW7S5jrPBUZwbPsPMz6DLspIzdfHbNqnRmg
ucUu9FGNUheiBmL6iQU2yenJ6qJmLYXFe4i+4cGrDZTQGfdxxaZd0q3FTBhinmxs
kgz+gXv7Jj2+Ff8QQhcre8qXJm9Yjpc9ZGt4nHpZG/P+0VBn746Ftm0/jubfRJFA
Q0L/TjRkmbhw4KLfi2uxvlP4Ah60n2qnHvM2wOADTcNNh/EzyalXRqNC+n0hTdx0
kg3rdkpzyg+8RhPClxkH1sKiu6ZwcSEjsKX2VOJ3dlKuiZ+nmqbMTNSX5oX3Fmb+
2NJQLjn36XSNDwhHVfTE88hSS+ARjcHhIwL4BIYU1Emeqk3BlmDITbpgOZwpd03v
P9r8r3saGusn/wiA7f5CD+xf0vDXYVt0xSPj6ythSYy9l1COpJdvutDRLgemZcOb
68BKToWQNLkMOEd3A+Ut71jJwDPlFQFZYqBSNDW8AQyBHnPw9nahxqbQIjV8IcgK
pLiMyV13UvcVLW6CFP+mDK7zTE8tUWCq8nxZGZekMS6yIFFPIMrTzb82R0dqGWfI
GJUDSUjpmx1u
=8oZQ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to