Bug 113138
Summary: | Can't export file systems nfs mount on solarisI | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Need Real Name <rutt> |
Component: | nfs-utils | Assignee: | Steve Dickson <steved> |
Status: | CLOSED WONTFIX | QA Contact: | Ben Levenson <benl> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | CC: | shillman |
Target Milestone: | --- | Keywords: | Reopened |
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-10-19 19:31:33 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Need Real Name
2004-01-08 20:46:16 UTC
Turns out there was a bogus reverse map (ip->name) in dns for the client. Adding the correct mapping in the server's host file made things work. But mountd shouldn't die in this circumstance. All it means when it fails to stop mountd is that it was not started; not that the start failed. It may simply not have ever managed to start. Closing, since you tracked down the problem. There really still is a problem. After a client with a bogus reverse IP map tries to mount a filesystem from the server, the server get wedged and won't export to any client, even one with a valid map/reverse map. service nfs restart unwedges until the next such request. 1. NFS server should be able to survive even if it doesn't grant the remove mount request. 2. There should be a way to tell it to go ahead and grant such requests. REOPENED status has been deprecated. ASSIGNED with keyword of Reopened is preferred. This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |