> It is probably worth checking that rpc.lockd and rpc.statd are
> running on your machine. If this doesn't help, you could try
> using rpc.lockd's "-d" option to find out what's going on.
> tcpdumping the relivant network traffic would probably be helpful
> too.
This is the output from rpc.lockd:
Feb 27 16:31:19 wandsworth rpc.lockd: process ID: 74157
Feb 27 16:31:19 wandsworth rpc.lockd: fh_len 24, fh \01\00\00\02\00\03\00\03\01\80\00\00\a5\00\54\00\95\31\1d\07\33\02\54\00
Feb 27 16:31:19 wandsworth rpc.lockd: start 0; len 0; pid 0; type 3; whence 0
Feb 27 16:31:19 wandsworth rpc.lockd: wait was not set
Feb 27 16:31:19 wandsworth rpc.lockd: lock request: V4: write to 172.16.68.3
Feb 27 16:31:19 wandsworth rpc.lockd: Found CLIENT* in cache
(keeps repeating the above until ^C is hit)
This is tcpdump output ('wandsworth' is the client and 'brent' is the
server):
16:33:40.661288 wandsworth.2041802486 > brent.nfs: 100 lookup fh Unknown/1 "locked"
16:33:40.661669 brent.nfs > wandsworth.2041802486: reply ok 232 lookup fh Unknown/1 (DF)
16:33:40.661771 wandsworth.2041802487 > brent.nfs: 96 access fh Unknown/1 003f
16:33:40.661945 brent.nfs > wandsworth.2041802487: reply ok 120 access c 000d (DF)
16:33:40.662007 wandsworth.2041802488 > brent.nfs: 128 setattr fh Unknown/1
16:33:40.662285 brent.nfs > wandsworth.2041802488: reply ok 144 setattr [|nfs] (DF)
16:33:40.662815 wandsworth.51375 > brent.1029: udp 220
16:33:40.663022 brent.1029 > wandsworth.51375: udp 28 (DF)
Here's another tcpdump snapshot:
16:35:27.550228 wandsworth.2041802728 > brent.nfs: 92 access fh Unknown/1 003f
16:35:27.550573 brent.nfs > wandsworth.2041802728: reply ok 120 access c 001f (DF)
16:35:27.550661 wandsworth.2041802729 > brent.nfs: 96 access fh Unknown/1 003f
16:35:27.550837 brent.nfs > wandsworth.2041802729: reply ok 120 access c 000d (DF)
16:35:27.550889 wandsworth.2041802730 > brent.nfs: 100 lookup fh Unknown/1 "locked"
16:35:27.551078 brent.nfs > wandsworth.2041802730: reply ok 232 lookup fh Unknown/1 (DF)
16:35:27.551159 wandsworth.2041802731 > brent.nfs: 128 setattr fh Unknown/1
16:35:27.551441 brent.nfs > wandsworth.2041802731: reply ok 144 setattr [|nfs] (DF)
16:35:27.552132 wandsworth.51388 > brent.1029: udp 220
16:35:27.552334 brent.1029 > wandsworth.51388: udp 28 (DF)
Here are the two packets sent across the wire when the rpc.lockd
repeats its attempt to get the lock:
16:37:37.753236 wandsworth.51407 > brent.1029: udp 220
16:37:37.753562 brent.1029 > wandsworth.51407: udp 28 (DF)
(Not sure how to get tcpdump to actually interpret the contents of those
packets properly ...)
Rich.
--
http://www.annexia.org/