Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp670323pxk; Wed, 16 Sep 2020 13:58:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxu/zjhftcAkUn0DVMBAzg+/LqoH26iwwEogrWmd74aHlNY3179B6qkQ1BOTN0XYKNIQejw X-Received: by 2002:a50:ccd2:: with SMTP id b18mr29535465edj.51.1600289937638; Wed, 16 Sep 2020 13:58:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600289937; cv=none; d=google.com; s=arc-20160816; b=ZIQwG1hWFgWMnDcJHb2zmKDn6YTXOXMm9eJYsx4J8AgWBL7xsBzDGBAmiP/4fsezhI 1AumZnbEVMYAIs4rDhkv712SZSBIViItUuFKUqD27CIid+vcdL2oMk5J2nl9X5HVrIyZ d+Z98aopQn4hsWCu2vEyVQOe8VLWmlQVgkAx6bUosuJY6kygP7yMCorDvBMLXUNbAgcy Mt39OxlheYQsYR3L1CXytYWLB9xqfIcSjxomYm8Hc8wR5k4HaVIzh7S0iLuSG8ND2BRd QQL5TPIcdtA9+CoKSWP1SyipGpFvmpeOc18Xr59h4/EF14odw6kI21lUtrUmVCpKfvkJ x0Jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=6UnNlOYpanNlZdupp7e84OafUkKZpzeNPRa0LsuTYtE=; b=cWR3zDDGX7VGvFE0uGtqFs3jIdSWtnxAZsK3n3LtSxkJdC5e7laaO1jVXKFJg7xVpF i8XQV9eJJCDeRD6dh3rT3TonbX8rxdaXnTes7jr4c9vHvumvY4AsLfhz3T9HFTzOUjuK pNcnvojsdwdVuDTtRkyjew/pap/nHZXst4MTe9fitPMV4emKyn/lhY5Q1+W5Ti+pR+5B mLhi6PXnw/xdpSmSiYBSs5bT1SnhRIz4217rGLnBAz7EUwOegc6s+FhyBvJOsYh8qo4W jfDo+3r9J8n9I+52D3rbODQXEfRg/c33/0RJqQ5kkBmqN8lmupC0MPFWcR7AyEEwyKQr +mTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="dL7Y/tlz"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i22si12643601edy.183.2020.09.16.13.58.33; Wed, 16 Sep 2020 13:58:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="dL7Y/tlz"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726572AbgIPQwx (ORCPT + 99 others); Wed, 16 Sep 2020 12:52:53 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:53064 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726241AbgIPQv6 (ORCPT ); Wed, 16 Sep 2020 12:51:58 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1600275067; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=6UnNlOYpanNlZdupp7e84OafUkKZpzeNPRa0LsuTYtE=; b=dL7Y/tlzRKs19O6gouqLe+ST2SbBRO3PdcNM4hiFVSffmIaMGrbkJ+EP7pm0AeYxLXNw9q j5AZEwdzT8VnkeQt/GSZGkGOGwf0GURFmqLhM6beEVUTkNx4H77J+GfApYWe+DonPQKVoz SovlKJFAjsmypsarYsaQaELzLQOskAA= Received: from mail-qv1-f72.google.com (mail-qv1-f72.google.com [209.85.219.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-321-T7ptwff0MrioRQi_xdpAww-1; Wed, 16 Sep 2020 10:32:06 -0400 X-MC-Unique: T7ptwff0MrioRQi_xdpAww-1 Received: by mail-qv1-f72.google.com with SMTP id t4so4669170qvr.21 for ; Wed, 16 Sep 2020 07:32:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6UnNlOYpanNlZdupp7e84OafUkKZpzeNPRa0LsuTYtE=; b=VnJK2DdnEbbMJr9aXk8b5qJ5El1v9K3RvvGBoutDxv7sHcs4SDktgsvcWUghncCs/h LEPO2t5Jp2VQV8PYN8WdW3hiU758ZeGAnpeazr5NXmVXrAVhOjccoe1L/vF2hB2+RWSp jG5z66x2d/CcO2kmZk4VwHsCTJepQq5XATxuxGUWjOTiQFu1Y2R9cZRXapzdhk9nRJSa 2UgCDTHUCz3kXM3YPiRn56YTBdHTlv8nUI6vdaYdz07AZbANJXTi9yEzEcHFGPrlr5qQ krkvbqYy7sSa6qrrNXRKoMRuvGXk4EIsjdoyvV0ZDh1aMbSgIczKFGVp3/hAmab1UvqO dnMQ== X-Gm-Message-State: AOAM5319LnaqEauxhuNba6gn41h2L0AJwv1f6uABEifLI7IcRgEVZdpv khm47P/3yErXhxctD0Jx22DX3thXep6nVsdabJWDnbXC5v35jysvHhADhBmMUVAQoLmg44H+6Cq LZKFZe6EGBSqJr0twxSO2T1MtDfa7n53qDd0E X-Received: by 2002:a0c:b3dd:: with SMTP id b29mr7288182qvf.59.1600266725591; Wed, 16 Sep 2020 07:32:05 -0700 (PDT) X-Received: by 2002:a0c:b3dd:: with SMTP id b29mr7288144qvf.59.1600266725103; Wed, 16 Sep 2020 07:32:05 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Kenneth Dsouza Date: Wed, 16 Sep 2020 20:01:53 +0530 Message-ID: Subject: Re: mount.nfs4 and logging To: Linux NFS Mailing List Cc: Chris Hall Content-Type: text/plain; charset="UTF-8" Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org I had come across a similar issue in the past. I had debugged the issue by checking what mount options were passed by doing the below: # LIBMOUNT_DEBUG=0xffff mount -t nfs nfs-server:/example /mnt -o vers=4.0 | less : 19709: libmount: CXT: [0x556249623030]: fixed options [rc=0]: vfs: 'rw' fs: 'vers=4.0,mountvers=4' user: '(null)', optstr: 'rw,vers=4.0,mountvers=4' <---- 19709: libmount: CXT: [0x556249623030]: preparing source path 19709: libmount: CXT: [0x556249623030]: preparing target path 19709: libmount: CXT: [0x556249623030]: final target '/mnt' 19709: libmount: CXT: [0x556249623030]: FS type: nfs [rc=0] mount.nfs: Protocol not supported <---- The mountvers option is only applicable for nfsv3 and is not supported for nfsv4. Whenever mount command is called explicitly with mount.nfs4 or vers=4.0,4.1 or 4.2 it will fail. I finally removed the setting from /etc/nfsmount.conf to fix the issue. I had a patch to add debugging to make the end user aware of what was going wrong. [PATCH] mount.nfs: Do not retry if Mountd related options are passed for nfs4 When Mountd related options are passed with mount.nfs4 or -t nfs vers=4 we fallback and retry with below version. As these options are not supported we should fail at first try and error out. This patch also adds mountport to the unsupported list for NFSv4. Signed-off-by: Kenneth D'souza --- utils/mount/stropts.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/utils/mount/stropts.c b/utils/mount/stropts.c index 901f995a..cad64bd8 100644 --- a/utils/mount/stropts.c +++ b/utils/mount/stropts.c @@ -86,6 +86,7 @@ extern int nfs_mount_data_version; extern char *progname; extern int verbose; extern int sloppy; +int failure =0; struct nfsmount_info { const char *spec, /* server:/path */ @@ -756,13 +757,19 @@ static int nfs_do_mount_v4(struct nfsmount_info *mi, if (po_contains(options, "mounthost") || po_contains(options, "mountaddr") || po_contains(options, "mountvers") || + po_contains(options, "mountport") || po_contains(options, "mountproto")) { /* * Since these mountd options are set assume version 3 * is wanted so error out with EPROTONOSUPPORT so the * protocol negation starts with v3. */ + if (verbose) { + printf(_("%s: Unsupported nfs4 mount option passed '%s'\n"), + progname, *mi->extra_opts); + } errno = EPROTONOSUPPORT; + failure = 1; goto out_fail; } @@ -892,6 +899,8 @@ static int nfs_autonegotiate(struct nfsmount_info *mi) int result, olderrno; result = nfs_try_mount_v4(mi); + if (failure == 1 && errno == EPROTONOSUPPORT) + goto fall_back; check_result: if (result) return result; -- On Wed, Sep 16, 2020 at 6:09 AM Chris Hall wrote: > > On 14/09/2020 19:30, Steve Dickson wrote: > > Hello, > > > > On 9/11/20 7:45 AM, Chris Hall wrote: > > >> I have a client and server configured for nfs4 only. > > > Would you mind sharing this configuration? Privately if > > that works better... > > The client /etc/nfsmount.conf has: > > [ NFSMount_Global_Options ] > Defaultvers=4 > Nfsvers=4 > Defaultproto=tcp > Proto=tcp > > and (now, see below) nothing else. > > FWIW, I guess setting the 'Defaultvers' and 'Defaultproto' is > redundant... but does not appear to stop anything from working. > > Also FWIW, I gather that this is configuration for the client-side > 'mount' of nfs exports, *only*. I suppose it should be obvious that > this has absolutely nothing to do with configuring (server-side) > 'mountd'. Speaking as a fully paid up moron-in-a-hurry, it has taken me > a while to work that out :-( [I suggest that the comments in the .conf > files and the man-page could say that nfs.conf is server-side and > nfsmount.conf is client-side -- just a few words, for the avoidance of > doubt.] > > The server /etc/nfs.conf has only: > > [nfsd] > debug=0 > threads=8 > host=cerberus2 > port=1001 > # grace-time=90 > # lease-time=90 > udp=n > tcp=y > vers2=n > vers3=n > vers4=y > vers4.0=y > vers4.1=y > vers4.2=y > > I wish I knew whether the 'vers4.X' settings make the slightest > difference. This server is my firewall, hence the funky port number. > > > I'm thinking that is a good direction to go towards > > so maybe we make this configuration the default?? > > I don't use nfs very much, but every time I have tangled with it I have > come way limping :-( > > Given that NFSv4 is going on 20 years old now, I do wonder why the > earlier versions are not treated a "legacy". When trying to discover > how to configure and use nfs I find I am still wading through stuff > which does not apply to NFSv4. Much of what the "wisdom of the > Internet" has to offer seems firmly routed in the past, and often NFSv4 > is describe in terms of its difference from NFSv3 and v2. > > For example: I run nfs on my firewall machine so that I can configure it > from elsewhere on the network. Naturally, the firewall machine is > firmly wrapped so that it may only be accessed by particular machines > inside the network. I also try to ensure that the absolute minimum > number of daemons are running and the absolute minumum number of ports > are open. In that context, (a) is there a way to persuade 'systemctl > start nfs-service' to be "nfs4 only", and to *not* start 'rpcbind' (and > *not* open port 111), and (b) are rpc.idmapd, rpc.mountd and rpc.statd > required for nfs4 ? (ie, is nfsdcld sufficient ?) > > >> The configuration used to work. > >> > >> I have just upgraded from Fedora 31 to 32 on the client. I now get: > >> > >> # mount /foo > >> mount.nfs4: Protocol not supported > > > I've been trying to keep the versions the same... hopefully > > nothing has broken in f31... ;-( > > Rest easy: my problem was entirely self inflicted -- it had nothing > directly to do with the upgrade from Fedora 31 to 32. > > Since the client 'mount' and 'mount.nfs4' were not even attempting to > speak to the server, I downloaded the source and the debug symbols and > had a go at it with strace and gdb... > > ...and discovered that I had caused the problem by setting: > > mountproto=tcp > mountvers=4 > > in /etc/nfsmount.conf at the client end. [Full disclosure: I am > building a replacement for the server and was reviewing all > configuration at both ends, updating Fedora all round and generally > tidying up.] > > It turns out that mount.nfs4 takes a dim view of the existence of these > settings and declines to do the mount(2) call; instead it sets > errno=EPROTONOSUPPORT and returns as if the mount(2) had failed. [See > nfs_do_mount_v4() in stropts.c of utils/mount/. I note in passing that > it worries about "mounthost", "mountaddr", "mountvers" and "mountproto", > where "mountaddr" is not mentioned in the man-page for nfs. But it does > not worry about "mountport", which is mentioned in the man-page.] > > Having checked carefully, I now know that mountport, mountproto, > mounthost and mountvers are all "Options for NFS versions 2 and 3 only". > But I don't know if their presence with 'nfsvers=4' would cause > mount(2) to fail. > > In any case, frankly, I think that mount is being singularly obtuse. > Since it knows that these options do not apply, it could IMHO simply > discard them. If that's a step too far, it could produce a rather more > informative message -- in particular *not* the standard system message > for EPROTONOSUPPORT, which a quick search of POSIX.1-2017 tells me is > returned only by socket() and socketpair() ! > > Thanks, > > Chris >