Your message dated Mon, 16 Feb 2026 05:33:45 +0000
with message-id <[email protected]>
and subject line Bug#1009106: fixed in nfs-utils 1:2.8.4-2
has caused the Debian Bug report #1009106,
regarding nfs-common: blkmapd open pipe file /run/rpc_pipefs/nfs/blocklayout 
failed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1009106: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009106
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nfs-common
Version: 1:2.6.1-1+b1
Severity: normal

Dear Maintainer,

apparently a file expected by "blkmapd" is not found because it does not exist.

#+begin_quote
# systemctl status nfs-blkmap.service
● nfs-blkmap.service - pNFS block layout mapping daemon
Loaded: loaded (/lib/systemd/system/nfs-blkmap.service; enabled; vendor preset: 
enabled)
Active: active (running) since Thu 2022-04-07 11:03:48 CEST; 10min ago
Process: 1007 ExecStart=/usr/sbin/blkmapd (code=exited, status=0/SUCCESS)
Main PID: 1010 (blkmapd)
Tasks: 1 (limit: 37594)
Memory: 388.0K
CPU: 1ms
CGroup: /system.slice/nfs-blkmap.service
└─1010 /usr/sbin/blkmapd

Apr 07 11:03:48 acht systemd[1]: Starting pNFS block layout mapping daemon...
Apr 07 11:03:48 acht blkmapd[1010]: open pipe file 
/run/rpc_pipefs/nfs/blocklayout failed: No such file or directory
Apr 07 11:03:48 acht systemd[1]: Started pNFS block layout mapping daemon.

# LANG=en ls -la /run/rpc_pipefs/nfs/
total 0
dr-xr-xr-x  2 root root 0 2022-04-07 11:03 .
dr-xr-xr-x 11 root root 0 2022-04-07 11:03 ..
#+end_quote

If it is a trivial message, I think it should no longer be reported.



-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
    100005    1   udp  48372  mountd
    100005    1   tcp  50807  mountd
    100005    2   udp  51838  mountd
    100005    2   tcp  33005  mountd
    100005    3   udp  41222  mountd
    100005    3   tcp  47085  mountd
    100024    1   udp  60298  status
    100024    1   tcp  57121  status
    100003    3   tcp   2049  nfs
    100003    4   tcp   2049  nfs
    100227    3   tcp   2049
    100021    1   udp  48057  nlockmgr
    100021    3   udp  48057  nlockmgr
    100021    4   udp  48057  nlockmgr
    100021    1   tcp  39169  nlockmgr
    100021    3   tcp  39169  nlockmgr
    100021    4   tcp  39169  nlockmgr
-- /etc/default/nfs-common --
NEED_STATD=
STATDOPTS=
NEED_IDMAPD=
NEED_GSSD=
-- /etc/idmapd.conf --
[General]
Verbosity = 0
[Mapping]
Nobody-User = nobody
Nobody-Group = nogroup
-- /etc/fstab --
192.168.1.7:/anexemplary                /entry  nfs     
rw,soft,retrans=3,timeo=10,user,noauto  0       0
-- /proc/mounts --
nfsd /proc/fs/nfsd nfsd rw,relatime 0 0

-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable'), (99, 'unstable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.16.0-6-amd64 (SMP w/12 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages nfs-common depends on:
ii  adduser              3.121
ii  init-system-helpers  1.62
ii  keyutils             1.6.1-3
ii  libc6                2.33-7
ii  libcap2              1:2.44-1
ii  libcom-err2          1.46.5-2
ii  libdevmapper1.02.1   2:1.02.175-2.1
ii  libevent-core-2.1-7  2.1.12-stable-1
ii  libgssapi-krb5-2     1.19.2-2+b1
ii  libkeyutils1         1.6.1-3
ii  libkrb5-3            1.19.2-2+b1
ii  libmount1            2.37.3-1+b1
ii  libnfsidmap1         1:2.6.1-1+b1
ii  libtirpc3            1.3.2-2
ii  libwrap0             7.6.q-31
ii  lsb-base             11.1.0
ii  python3              3.9.8-1
ii  rpcbind              1.2.6-2
ii  ucf                  3.0043

nfs-common recommends no packages.

Versions of packages nfs-common suggests:
pn  open-iscsi  <none>
pn  watchdog    <none>

Versions of packages nfs-kernel-server depends on:
ii  keyutils             1.6.1-3
ii  libblkid1            2.37.3-1+b1
ii  libc6                2.33-7
ii  libcap2              1:2.44-1
ii  libevent-core-2.1-7  2.1.12-stable-1
ii  libsqlite3-0         3.38.2-1
ii  libtirpc3            1.3.2-2
ii  libuuid1             2.37.3-1+b1
ii  libwrap0             7.6.q-31
ii  lsb-base             11.1.0
ii  netbase              6.3
ii  ucf                  3.0043

Versions of packages nfs-kernel-server recommends:
ii  python3       3.9.8-1
ii  python3-yaml  5.4.1-1+b1

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:2.8.4-2
Done: Salvatore Bonaccorso <[email protected]>

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <[email protected]> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 16 Feb 2026 05:41:27 +0100
Source: nfs-utils
Architecture: source
Version: 1:2.8.4-2
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team <[email protected]>
Changed-By: Salvatore Bonaccorso <[email protected]>
Closes: 1009106
Changes:
 nfs-utils (1:2.8.4-2) unstable; urgency=medium
 .
   * Rename CONFIG_NFSV41 to CONFIG_BLKMAPD and disable by default
   * Drop installation of blkmapd and nfs-blkmap.service systemd service
     (Closes: #1009106)
   * Stop nfs-blkmap.service on upgrades for removal of blkmapd
   * nfs-common: Add NEWS entry for removal of blkmapd and nfs-blkmap.service
   * debian/control: Remove "Priority: optional" (default)
   * Declare compliance with Debian policy 4.7.3
Checksums-Sha1: 
 e8344a9a3e2336cbcf5110df5ab9270a7eae9959 2645 nfs-utils_2.8.4-2.dsc
 67a489f00ece9171e02b9b7b8690286ea425efe7 51108 nfs-utils_2.8.4-2.debian.tar.xz
Checksums-Sha256: 
 74dcc841b47aa272f9de72ac51cd795f762b03e0e865ffec2fe607d86803040b 2645 
nfs-utils_2.8.4-2.dsc
 5b3bd2ab6f7597894e96e57486b1199d9e2daace71a26679e55d8f1b2cb01328 51108 
nfs-utils_2.8.4-2.debian.tar.xz
Files: 
 e53086c6a09b534d7b8b7f45bf630383 2645 net optional nfs-utils_2.8.4-2.dsc
 32ace2b5aeffb528a6bc3f1c4f34fdfc 51108 net optional 
nfs-utils_2.8.4-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=HN5W
-----END PGP SIGNATURE-----

Attachment: pgpUlKMndjNiG.pgp
Description: PGP signature


--- End Message ---

Reply via email to