Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2693415pxj; Mon, 17 May 2021 07:40:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyZT9Qummyioxo3Pfr5pyD35XPj03hXuu1uI47UyFdwDNu3HENKxh4b8ghbb6ltnvrq/YAC X-Received: by 2002:aa7:cd46:: with SMTP id v6mr448057edw.16.1621262430407; Mon, 17 May 2021 07:40:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621262430; cv=none; d=google.com; s=arc-20160816; b=Ryx62Jd8NyZt+CHHh8Tvfx3bKUrF8A5asl80BhZPawfcpcfvciSiLXoQPozcmlUZzZ 60PuwBxzpPbQBWhoxi1nK3IwnSSNNEkUVAftFvo9CS17XBeu6lJhvwIQa8PTyZrR3nBb BkQKUivBRKZ1546G2SdqBdoBk/1QbOJHHCoNR7EQI18E9Z5hJ7TiMW1l+wOPp5bxBJOn HMkz4ntCq063iIIEIWoEYwsCgRdSqNPU5pFxqwQXArZdFbOh5D5oM5qWtLo3eJnweZht dyL0TZUAbyiXu5rpkk4kutpmbgWacXc87vWYKpx//JjmYtJLD/5KqypFQTlM1ntJsV6l l6Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date; bh=CFGSANzWm9pImVDUmLjK+4mw36UJGLCyNDtOwu7g59c=; b=FkAVNUnj94ZC3gf+VRay8VkJPGl4GcBZp4EbJ39Jt/P3tzycY4ZuowND6SYZMUJEnj max3vQmVzrxT8Aw4EjugE8+HtaeSwiKefZVJZuaugtDvko3GaTxduYu77Kx35Z+AZNJE Si5Hw1XDDb+zBn3D3h/NsILzkcd4ungIt5KTrCJRdNp+OXf3YAmzsX1tXYLkHZCrMj7Q wZKdJ66it5XLc2IiOkZT9vc8zgkCjILnZZQC/8wpdUd89xmgTJkNPTYQ16Frc2s9lva9 9J7oxKBNyqixHnhD1CSMBobXt8SvKUaY5lAqzyrMEF+mKKg21sNg3kdGTZP2T0kDizrG JSfw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o18si2772751edt.176.2021.05.17.07.40.01; Mon, 17 May 2021 07:40:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237660AbhEQOaN (ORCPT + 99 others); Mon, 17 May 2021 10:30:13 -0400 Received: from mx2.suse.de ([195.135.220.15]:58872 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239420AbhEQO2c (ORCPT ); Mon, 17 May 2021 10:28:32 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 393F1AC86; Mon, 17 May 2021 14:27:14 +0000 (UTC) Date: Mon, 17 May 2021 16:27:12 +0200 From: Petr Vorel To: NeilBrown Cc: "J . Bruce Fields" , linux-nfs@vger.kernel.org, Steve Dickson , Chuck Lever , Alexey Kodanev , debian-kernel@lists.debian.org Subject: Re: Re: Re: [PATCH/RFC nfs-utils] Fix NFSv4 export of tmpfs filesystems. Message-ID: Reply-To: Petr Vorel References: <20210422191803.31511-1-pvorel@suse.cz> <20210422202334.GB25415@fieldses.org> <162035212343.24322.12361160756597283121@noble.neil.brown.name> <162087884172.5576.348023037121213464@noble.neil.brown.name> <162122092561.6103.8867715057681755093@noble.neil.brown.name> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <162122092561.6103.8867715057681755093@noble.neil.brown.name> Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi Neil, > On Fri, 14 May 2021, Petr Vorel wrote: > > The failure has really something to do with rpcbind ("mount.nfs: portmap query > > failed:"): > > rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 > > write(2, "mount.nfs: trying 10.0.0.2 prog "..., 66) = 66 > > socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) = 5 > > fcntl(5, F_GETFL) = 0x2 (flags O_RDWR) > > fcntl(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 > > connect(5, {sa_family=AF_INET, sin_port=htons(37873), sin_addr=inet_addr("10.0.0.2")}, 16) = -1 EINPROGRESS (Operation now in progress) > > select(6, NULL, [5], NULL, {tv_sec=10, tv_usec=0}) = 1 (out [5], left {tv_sec=9, tv_usec=999998}) > > getsockopt(5, SOL_SOCKET, SO_ERROR, [111], [4]) = 0 > > fcntl(5, F_SETFL, O_RDWR) = 0 > > close(5) = 0 > > write(2, "mount.nfs: portmap query failed:"..., 79) = 79 > The "111" from getsockopt...SO_ERROR is ECONNREFUSED. That suggests > that rpcbind wasn't even running. > This is different to the first strace you reported where mount.nfs > successfully connected to rpcbind, sent and request and got a response, > and then fail the mount. That would happen if, for example, rpc.mountd > wasn't running. > So I think these failures are caused by some problem with restarting the > services and aren't actually testing the code at all. > Could you try again and make sure rpcbind and rpc.mountd are running on > the server before attempting the mount? I'm sorry, you're right, indeed rpc.mountd was not running and previously probably by rpcbind not running. Not sure what exactly was wrong I'll test your v2 probably only on openSUSE. BTW apart from checking whether rpcbind is running I'd check only rpc.nfsd. Or should be anything else tested? IMHO rpc.mountd, rpc.idmapd and rpc.statd are nfs-server.service dependencies (the service, which starts also rpc.nfsd). Kind regards, Petr > Thanks, > NeilBrown