Your message dated Tue, 10 Oct 2006 02:48:19 +0200
with message-id <[EMAIL PROTECTED]>
and subject line rpc-statd do not exit with error when not possible to bind
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: nfs-common
Version: 1.0.10-1
Severity: |grave| 

When launching rpc.statd with dedicated port in file /etc/default/nfs-common
for STATDOPTS="--port 126 --outgoing-port 124" for exemple, and IF
the port are not available, then rpc-statd exit without error and no log
so it is very hard to understand pb on timeout nfs protocol.....due 
to the fact that statd daemon don't runs.

-> uname -a
Linux solo 2.6.17 #1 SMP PREEMPT Sun Jul 2 08:56:01 CEST 2006 i686 GNU/Linux
-> lsmod |grep nfs
nfsd                  209924  17 
exportfs                5504  1 nfsd
nfs                   210796  3 
lockd                  55688  3 nfsd,nfs
nfs_acl                 3584  2 nfsd,nfs
sunrpc                126396  13 nfsd,nfs,lockd,nfs_acl

-> ps auxwww |grep rpc.statd
lacroix   1605  0.0  0.2   3332   672 pts/1    R+   10:04   0:00 grep rpc.statd

->  sudo /sbin/rpc.statd --port 126 --outgoing-port 124

->  echo $?
0

-> ps auxwww |grep rpc.statd
lacroix   1666  0.0  0.2   3332   676 pts/1    S+   10:04   0:00 grep rpc.statd

-> sudo  /sbin/rpc.statd --port 126 --outgoing-port 124 -F -d
10/08/2006 10:05:46 rpc.statd[1883]: Version 1.0.10 Starting
10/08/2006 10:05:46 rpc.statd[1883]: Flags: No-Daemon Log-STDERR 
10/08/2006 10:05:46 rpc.statd[1883]: New state: 67
: Could not bind name to socket: Permission denied
 
now ....
sudo  strace /sbin/rpc.statd --port 126 --outgoing-port 124 -F -d 2>&1|tee 
/tmp/trace.rpc.statd.txt

Please look at attached file......

Please add port number on error on STDERR before existing, because it seems 
there are
many binding socket connection ( in trace )

best regards


-- 
--------------------------------------
 -- Jean-Marc LACROIX                 --
  -- mailto : [EMAIL PROTECTED] --
    ---------------------------------------

execve("/sbin/rpc.statd", ["/sbin/rpc.statd", "--port", "126", 
"--outgoing-port", "124", "-F", "-d"], [/* 13 vars */]) = 0
uname({sys="Linux", node="solo", ...})  = 0
brk(0)                                  = 0x8052000
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7efe000
access("/etc/ld.so.preload", R_OK)      = -1 ENOENT (No such file or directory)
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7efd000
open("/etc/ld.so.cache", O_RDONLY)      = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=45718, ...}) = 0
mmap2(NULL, 45718, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7ef1000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/tls/libnsl.so.1", O_RDONLY)  = 3
read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0p5\0\000"..., 512) = 512
fstat64(3, {st_mode=S_IFREG|0644, st_size=76548, ...}) = 0
mmap2(NULL, 87808, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 
0xb7edb000
mmap2(0xb7eed000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x11) = 0xb7eed000
mmap2(0xb7eef000, 5888, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7eef000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/tls/libc.so.6", O_RDONLY)    = 3
read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\240O\1"..., 512) = 512
fstat64(3, {st_mode=S_IFREG|0755, st_size=1245676, ...}) = 0
mmap2(NULL, 1251484, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 
0xb7da9000
mmap2(0xb7ed1000, 28672, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x128) = 0xb7ed1000
mmap2(0xb7ed8000, 10396, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7ed8000
close(3)                                = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7da8000
mprotect(0xb7ed1000, 20480, PROT_READ)  = 0
set_thread_area({entry_number:-1 -> 6, base_addr:0xb7da86c0, limit:1048575, 
seg_32bit:1, contents:0, read_exec_only:0, limit_in_pages:1, seg_not_present:0, 
useable:1}) = 0
munmap(0xb7ef1000, 45718)               = 0
getrlimit(RLIMIT_NOFILE, {rlim_cur=1024, rlim_max=1024}) = 0
getpid()                                = 2141
time([1160294828])                      = 1160294828
brk(0)                                  = 0x8052000
brk(0x8073000)                          = 0x8073000
open("/etc/localtime", O_RDONLY)        = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=1082, ...}) = 0
fstat64(3, {st_mode=S_IFREG|0644, st_size=1082, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7efc000
read(3, "TZif\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\f\0\0\0\f\0"..., 4096) = 
1082
close(3)                                = 0
munmap(0xb7efc000, 4096)                = 0
write(2, "10/08/2006 10:07:08 rpc.statd[21"..., 6110/08/2006 10:07:08 
rpc.statd[2141]: Version 1.0.10 Starting
) = 61
time([1160294828])                      = 1160294828
write(2, "10/08/2006 10:07:08 rpc.statd[21"..., 6610/08/2006 10:07:08 
rpc.statd[2141]: Flags: No-Daemon Log-STDERR 
) = 66
rt_sigaction(SIGHUP, {0x804b1f0, [HUP], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGINT, {0x804b1f0, [INT], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGTERM, {0x804b1f0, [TERM], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGUSR1, {0x804b23d, [USR1], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGCHLD, {SIG_IGN}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGPIPE, {SIG_IGN}, {SIG_DFL}, 8) = 0
socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP) = 3
bind(3, {sa_family=AF_INET, sin_port=htons(124), 
sin_addr=inet_addr("0.0.0.0")}, 16) = 0
unlink("/var/run/rpc.statd.pid")        = 0
open("/var/run/rpc.statd.pid", O_WRONLY|O_CREAT|O_TRUNC|O_LARGEFILE, 0666) = 4
fstat64(4, {st_mode=S_IFREG|0644, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7efc000
dup(4)                                  = 5
write(4, "2141\n", 5)                   = 5
close(4)                                = 0
munmap(0xb7efc000, 4096)                = 0
stat64("/var/lib/nfs/sm", {st_mode=S_IFDIR|0755, st_size=1024, ...}) = 0
fchown32(5, 105, 0)                     = 0
setgroups32(0, [])                      = 0
setgid32(0)                             = 0
setuid32(105)                           = 0
socket(PF_NETLINK, SOCK_RAW, 0)         = 4
bind(4, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 0
getsockname(4, {sa_family=AF_NETLINK, pid=2141, groups=00000000}, [12]) = 0
time(NULL)                              = 1160294828
sendto(4, "\24\0\0\0\22\0\1\3\254\261(E\0\0\0\0\0\220\4\10", 20, 0, 
{sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"\364\0\0\0\20\0\2\0\254\261(E]\10\0\0\0\0\4\3\1\0\0\0I"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 984
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"\24\0\0\0\3\0\2\0\254\261(E]\10\0\0\0\0\0\0\1\0\0\0I\0"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 20
sendto(4, "\24\0\0\0\26\0\1\3\255\261(E\0\0\0\0\0\220\4\10", 20, 0, 
{sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"<\0\0\0\24\0\2\0\255\261(E]\10\0\0\2\10\200\376\1\0\0\0"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 196
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"@\0\0\0\24\0\2\0\255\261(E]\10\0\0\n\200\200\376\1\0\0"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 128
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"\24\0\0\0\3\0\2\0\255\261(E]\10\0\0\0\0\0\0\1\0\0\0\24"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 20
close(4)                                = 0
gettimeofday({1160294828, 511001}, NULL) = 0
socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP) = 4
bind(4, {sa_family=AF_INET, sin_port=htons(621), 
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
ioctl(4, FIONBIO, [1])                  = 0
setsockopt(4, SOL_IP, IP_RECVERR, [1], 4) = 0
sendto(4, "\23`Cv\0\0\0\0\0\0\0\2\0\1\206\240\0\0\0\2\0\0\0\2\0\0"..., 56, 0, 
{sa_family=AF_INET, sin_port=htons(111), sin_addr=inet_addr("127.0.0.1")}, 16) 
= 56
poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, 5000) = 1
recvfrom(4, "\23`Cv\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., 400, 
0, {sa_family=AF_INET, sin_port=htons(111), sin_addr=inet_addr("127.0.0.1")}, 
[16]) = 28
close(4)                                = 0
open("/var/lib/nfs/state", O_RDWR|O_CREAT|O_LARGEFILE, 0600) = 4
read(4, "I\0\0\0", 4)                   = 4
time([1160294828])                      = 1160294828
write(2, "10/08/2006 10:07:08 rpc.statd[21"..., 5110/08/2006 10:07:08 
rpc.statd[2141]: New state: 75
) = 51
_llseek(4, 0, [0], SEEK_SET)            = 0
write(4, "K\0\0\0", 4)                  = 4
fsync(4)                                = 0
close(4)                                = 0
uname({sys="Linux", node="solo", ...})  = 0
gettimeofday({1160294828, 533088}, NULL) = 0
open("/etc/resolv.conf", O_RDONLY)      = 4
fstat64(4, {st_mode=S_IFREG|0644, st_size=63, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7efc000
read(4, "search belinda\nnameserver 192.16"..., 4096) = 63
read(4, "", 4096)                       = 0
close(4)                                = 0
munmap(0xb7efc000, 4096)                = 0
socket(PF_FILE, SOCK_STREAM, 0)         = 4
fcntl64(4, F_GETFL)                     = 0x2 (flags O_RDWR)
fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK)  = 0
connect(4, {sa_family=AF_FILE, path="/var/run/nscd/socket"}, 110) = -1 ENOENT 
(No such file or directory)
close(4)                                = 0
socket(PF_FILE, SOCK_STREAM, 0)         = 4
fcntl64(4, F_GETFL)                     = 0x2 (flags O_RDWR)
fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK)  = 0
connect(4, {sa_family=AF_FILE, path="/var/run/nscd/socket"}, 110) = -1 ENOENT 
(No such file or directory)
close(4)                                = 0
open("/etc/nsswitch.conf", O_RDONLY)    = 4
fstat64(4, {st_mode=S_IFREG|0644, st_size=2675, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7efc000
read(4, "# /etc/nsswitch.conf\n#\n# Example"..., 4096) = 2675
read(4, "", 4096)                       = 0
close(4)                                = 0
munmap(0xb7efc000, 4096)                = 0
open("/etc/ld.so.cache", O_RDONLY)      = 4
fstat64(4, {st_mode=S_IFREG|0644, st_size=45718, ...}) = 0
mmap2(NULL, 45718, PROT_READ, MAP_PRIVATE, 4, 0) = 0xb7ef1000
close(4)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/tls/libnss_nis.so.2", O_RDONLY) = 4
read(4, "[EMAIL PROTECTED]"..., 512) = 512
fstat64(4, {st_mode=S_IFREG|0644, st_size=34320, ...}) = 0
mmap2(NULL, 37420, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 4, 0) = 
0xb7d9e000
mmap2(0xb7da6000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 4, 0x7) = 0xb7da6000
close(4)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/tls/libnss_files.so.2", O_RDONLY) = 4
read(4, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\200\33"..., 512) = 512
fstat64(4, {st_mode=S_IFREG|0644, st_size=38372, ...}) = 0
mmap2(NULL, 41620, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 4, 0) = 
0xb7d93000
mmap2(0xb7d9c000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 4, 0x8) = 0xb7d9c000
close(4)                                = 0
munmap(0xb7ef1000, 45718)               = 0
open("/etc/host.conf", O_RDONLY)        = 4
fstat64(4, {st_mode=S_IFREG|0644, st_size=9, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7efc000
read(4, "multi on\n", 4096)             = 9
read(4, "", 4096)                       = 0
close(4)                                = 0
munmap(0xb7efc000, 4096)                = 0
uname({sys="Linux", node="solo", ...})  = 0
open("/var/yp/binding/belinda.2", O_RDONLY) = 4
pread64(4, "\1\0\0\0\300\250\1\v\0v\0\0", 12, 2) = 12
socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP) = 6
bind(6, {sa_family=AF_INET, sin_port=htons(622), 
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
ioctl(6, FIONBIO, [1])                  = 0
setsockopt(6, SOL_IP, IP_RECVERR, [1], 4) = 0
fcntl64(6, F_SETFD, FD_CLOEXEC)         = 0
close(4)                                = 0
sendto(6, "2\236\232_\0\0\0\0\0\0\0\2\0\1\206\244\0\0\0\2\0\0\0\3"..., 76, 0, 
{sa_family=AF_INET, sin_port=htons(118), sin_addr=inet_addr("192.168.1.11")}, 
16) = 76
poll([{fd=6, events=POLLIN, revents=POLLIN}], 1, 5000) = 1
recvfrom(6, "2\236\232_\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., 8800, 
0, {sa_family=AF_INET, sin_port=htons(118), 
sin_addr=inet_addr("192.168.1.11")}, [16]) = 68
close(6)                                = 0
stat64("/var/lib/nfs/sm", {st_mode=S_IFDIR|0755, st_size=1024, ...}) = 0
stat64("/var/lib/nfs/sm.bak", {st_mode=S_IFDIR|0755, st_size=1024, ...}) = 0
open("/var/lib/nfs/sm", O_RDONLY|O_NONBLOCK|O_LARGEFILE|O_DIRECTORY) = 4
fstat64(4, {st_mode=S_IFDIR|0755, st_size=1024, ...}) = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
getdents64(4, /* 2 entries */, 4096)    = 48
getdents64(4, /* 0 entries */, 4096)    = 0
close(4)                                = 0
open("/var/lib/nfs/sm.bak", O_RDONLY|O_NONBLOCK|O_LARGEFILE|O_DIRECTORY) = 4
fstat64(4, {st_mode=S_IFDIR|0755, st_size=1024, ...}) = 0
fcntl64(4, F_SETFD, FD_CLOEXEC)         = 0
getdents64(4, /* 2 entries */, 4096)    = 48
getdents64(4, /* 0 entries */, 4096)    = 0
close(4)                                = 0
getsockname(0, 0xbfbfc040, [16])        = -1 ENOTSOCK (Socket operation on 
non-socket)
socket(PF_NETLINK, SOCK_RAW, 0)         = 4
bind(4, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 0
getsockname(4, {sa_family=AF_NETLINK, pid=2141, groups=00000000}, [12]) = 0
time(NULL)                              = 1160294828
sendto(4, "\24\0\0\0\22\0\1\3\254\261(E\0\0\0\0\0\220\4\10", 20, 0, 
{sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"\364\0\0\0\20\0\2\0\254\261(E]\10\0\0\0\0\4\3\1\0\0\0I"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 984
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"\24\0\0\0\3\0\2\0\254\261(E]\10\0\0\0\0\0\0\1\0\0\0I\0"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 20
sendto(4, "\24\0\0\0\26\0\1\3\255\261(E\0\0\0\0\0\220\4\10", 20, 0, 
{sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"<\0\0\0\24\0\2\0\255\261(E]\10\0\0\2\10\200\376\1\0\0\0"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 196
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"@\0\0\0\24\0\2\0\255\261(E]\10\0\0\n\200\200\376\1\0\0"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 128
recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, 
msg_iov(1)=[{"\24\0\0\0\3\0\2\0\255\261(E]\10\0\0\0\0\0\0\1\0\0\0\24"..., 
4096}], msg_controllen=0, msg_flags=0}, 0) = 20
close(4)                                = 0
socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP) = 4
bind(4, {sa_family=AF_INET, sin_port=htons(623), 
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
ioctl(4, FIONBIO, [1])                  = 0
setsockopt(4, SOL_IP, IP_RECVERR, [1], 4) = 0
sendto(4, "u\310\"\207\0\0\0\0\0\0\0\2\0\1\206\240\0\0\0\2\0\0\0\2"..., 56, 0, 
{sa_family=AF_INET, sin_port=htons(111), sin_addr=inet_addr("127.0.0.1")}, 16) 
= 56
poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, 5000) = 1
recvfrom(4, "u\310\"\207\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., 400, 
0, {sa_family=AF_INET, sin_port=htons(111), sin_addr=inet_addr("127.0.0.1")}, 
[16]) = 28
close(4)                                = 0
socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP) = 4
setsockopt(4, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
bind(4, {sa_family=AF_INET, sin_port=htons(126), 
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
time([1160294828])                      = 1160294828
stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=1082, ...}) = 0
stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=1082, ...}) = 0
stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=1082, ...}) = 0
socket(PF_FILE, SOCK_DGRAM, 0)          = 6
fcntl64(6, F_SETFD, FD_CLOEXEC)         = 0
connect(6, {sa_family=AF_FILE, path="/dev/log"}, 16) = -1 ECONNREFUSED 
(Connection refused)
close(6)                                = 0
write(2, ": Could not bind name to socket:"..., 51: Could not bind name to 
socket: Permission denied
) = 51
ftruncate64(5, 0)                       = 0
exit_group(1)                           = ?
Process 2141 detached

--- End Message ---
--- Begin Message ---
On Sun, Oct 08, 2006 at 08:18:25AM +0200, Jean Marc Lacroix wrote:
> Package: nfs-common
> Version: 1.0.10-1
> Severity: |grave| 

This is completely and way overblown. You are reporting a bug that a daemon
does not set the right return code in a non-standard configuration if and
only if that configuration is somehow broken... And this is supposed to be
"grave"? (Fortunately, your severity is a syntax error, so it's reset to
"normal" automatically.)

> When launching rpc.statd with dedicated port in file /etc/default/nfs-common
> for STATDOPTS="--port 126 --outgoing-port 124" for exemple, and IF
> the port are not available, then rpc-statd exit without error and no log
> so it is very hard to understand pb on timeout nfs protocol.....due 
> to the fact that statd daemon don't runs.

This is not a bug; if you want errors on stderr, use -F. If not, the errors
will go to syslog.

> ->  sudo /sbin/rpc.statd --port 126 --outgoing-port 124

If you want your statd to use a privileged port, you must run it as root; do
a chown root /var/lib/nfs/sm and this will work.

/* Steinar */
-- 
Homepage: http://www.sesse.net/

--- End Message ---

Reply via email to