right. It's not failing. It's not running at all. systemctl status rpc-statd ● rpc-statd.service - NFS status monitor for NFSv2/3 locking. Loaded: loaded (/lib/systemd/system/rpc-statd.service; disabled; vendor preset: enabled) Active: inactive (dead)
Journalctl doesn't show that nfs-utils ran. As far as I can tell, that's the only thing that would activate it. I note that there's an [Install] section in rpc-statd.service. That implies that it's intended to be enabled. It's not. If you enable it, everything works. I suspected maybe the upgrade was supposed to enable it but didn't. rpc.statd version 1.3.3 ls -l /sbin/rpc.statd -rwxr-xr-x 1 root root 89016 May 24 2021 /sbin/rpc.statd ls -lc /sbin/rpc.statd -rwxr-xr-x 1 root root 89016 Jan 10 15:09 /sbin/rpc.statd It looks like it changed in the last update. It was "apt upgrade" /etc/default/nfs-common STATDOPTS= NEED_GSSD=yes /etc/default/nfs-kernel-server RPCNFSDCOUNT=8 RPCNFSDPRIORITY=0 RPCMOUNTDOPTS="--manage-gids" NEED_SVCGSSD="yes" RPCSVCGSSDOPTS="" /etc/default/rpcbind OPTIONS="" OPTIONS="-w" /etc/systemd/system/rpc-gssd.service.d gss-krb.conf [Service] Environment=KRB5_CONFIG=/etc/krb5.conf:/etc/krb5.conf.gssd time.conf [Service] Environment=GSSDARGS=-t600 The KRB5_CONFIG is to configure [plugins] ccselect = { module = nfs:/usr/lib/ccselect_nfs.so } ccselect_nfs.so selects the user's primary principal, so that if they've done kinit as user.admin to do privileged stuff, NFS still uses their default principal. Note that this was all working before the upgrade. The upgrade was 2022-01-10 15:09:15 Looks like the system was installed July 31, 2020, and no upgrades other than unattended upgrade since then. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956787 Title: nfs v3 locking fails - rpc-statd not started after minor upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1956787/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs