From owner-freebsd-current@FreeBSD.ORG Sat Oct 25 15:58:37 2014 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0182725D for ; Sat, 25 Oct 2014 15:58:36 +0000 (UTC) Received: from quine.pinyon.org (quine.pinyon.org [65.101.5.249]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C962E84D for ; Sat, 25 Oct 2014 15:58:36 +0000 (UTC) Received: by quine.pinyon.org (Postfix, from userid 122) id E15271602D3; Sat, 25 Oct 2014 08:50:18 -0700 (MST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on quine.pinyon.org X-Spam-Level: X-Spam-Status: No, score=-1.8 required=5.0 tests=ALL_TRUSTED, BAYES_00, URI_HEX autolearn=no autolearn_force=no version=3.4.0 Received: from feyerabend.n1.pinyon.org (feyerabend.n1.pinyon.org [10.0.10.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by quine.pinyon.org (Postfix) with ESMTPSA id 3807B1601D8 for ; Sat, 25 Oct 2014 08:50:16 -0700 (MST) Message-ID: <544BC6B7.90608@pinyon.org> Date: Sat, 25 Oct 2014 08:50:15 -0700 From: "Russell L. Carter" User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0 MIME-Version: 1.0 To: freebsd-current@freebsd.org Subject: Re: Some NFS server V4 questions References: <1414231671692-5959433.post@n5.nabble.com> In-Reply-To: <1414231671692-5959433.post@n5.nabble.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 25 Oct 2014 15:58:37 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/25/14 03:07, Beeblebrox wrote: > * I can't get the NFS server to run V4 only. I have: sysctl > vfs.nfsd.server_min_nfsvers=4 > [...] > PXE client's /etc/fstab is: 92.168.2.1:/data/amd64 / nfs > ro 0 0 192.168.2.1:/usr/local /usr/local nfs ro 0 > 0 192.168.2.1:/home /home nfs rw,hard,intr 0 0 > Possibly need to arrange for mount_nfs to see -o nfsv4 (I use mount_nfs -o nfsv4,minorversion=1) Then nfsstat shows eg: terp:/library on /mnt/terp/library nfsv4,minorversion=1,tcp,resvport,hard,cto,sec=sys,acdirmin=3,acdirmax=60,acregmin=5,acregmax=60,nametimeo=60,negnametimeo=60,rsize=65536,wsize=65536,readdirsize=65536,readahead=1,wcommitsize=2798255,timeout=120,retrans=2147483647 HTH, Russell > * Considering V2/V3 for NFS is getting dropped from code base, PXE > clients used to need max V3 as root and could not mount_root with > V4. Has this changed? If so, what services do the clients need to > get V4 on root working (RO, no RW)? > * There was a simple command to show from server-side what version > of NFS the exports were running, but I seem to have lost that. Any > clues? > > * Have any of these services become capable of running from inside > a jail environment? {rpcbind mountd nfsd nfsuserd} - it does not > seem so, but just checking. > > Thanks and Regards. > > > > ----- FreeBSD-11-current_amd64_root-on-zfs_RadeonKMS -- View this > message in context: > http://freebsd.1045724.n5.nabble.com/Some-NFS-server-V4-questions-tp5959433.html > > Sent from the freebsd-current mailing list archive at Nabble.com. > _______________________________________________ > freebsd-current@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-current To > unsubscribe, send any mail to > "freebsd-current-unsubscribe@freebsd.org" > -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBAgAGBQJUS8a3AAoJEFnLrGVSDFaEvWEP/iIKgw1kTmGQqgYAzVY++8uq X3XMSnUFNGkyZSO/cz9gCO8S+oXkWVD8z3UbTKtyPCdTHhp48klTRW+ceSGvfhq2 oyWfcM5bXbOBLQZaoz66IL77mZHlWOTOLoGyNQZp7x/7KXETN7nK+qxQ1WDD7WM9 BW8fC+krQ4F5Tvqc70fylu93QKKUiqi26cOMWuRLTwgLXJY+NtPLMjH+SadDonNC FvszjFpTsoP7cKPWA0vPA2iLb3Q43DT1+k23r6iY33JzTX2LW+zpzk+i4wEneNE8 JAgGqsFB08sH8krBrKo3n5+zcd5R0mZu3uX9a0CQJYiNHg6Phh4QgyETTYJT0ig/ mF1Q7V5z4FHLKdZigqO2WjNN2l2zfzDlUWfDTyc/b8CZIaPJemdqADsBVl76UdX8 2HspYZdAxR2zPc9EmpNPQJAksBFyUpwZy6cpHW+7wrkeeYoTWZLYV5sm4IscOzEE tdof9VRIT+DGPrxLPFxO8tQiOV0eQWh3Om7Tlp92b3no9A3aUObQGIltvEEYQDKt CobSmiLRSx0FK/pGYrYZilJlWStJLHySvnpbEkVDJGVL9Ua42Jn/VMXfBksRz01P 53wFmW7RAj8yyzDKA8P7rTjoJdypBRJZXphk+svceGOKv8Bxrcx3xgyF82Cl8YPk Kl2YChCpbLewc+zxmRCz =ShKh -----END PGP SIGNATURE-----