Bug 170313
| Summary: | rpc.statd timing out, nsm_mon_unmon: rpc failed | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 3 | Reporter: | Johan van den Dorpe <johan.vandendorpe> |
| Component: | nfs-utils | Assignee: | Steve Dickson <steved> |
| Status: | CLOSED WONTFIX | QA Contact: | Ben Levenson <benl> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 3.0 | CC: | shillman |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | i386 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2007-10-19 18:53:24 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Johan van den Dorpe
2005-10-10 17:47:39 UTC
You said you're only having the problems today; is this after the update to nfs-utils, or entirely unrelated to the timing of that? We were running the vanilla nfs-utils 1.0.6 from kernel.org but after experiencing the problem we updated the nfs-utils-1.0.6-42EL. We've experienced the problem once after updating nfs-utils (the logs above are from this instance). Does there seem to be a difference in frequency of this happening when comparing before and after you updated the package? I note that the bug you linked to noted that the update didn't completely make it go away, but only reduced the frequency by quite a lot. We experienced the problem about 5 times in a morning before updating nfs-utils. In the 48 hours since then we've only had the one instance, about 5 hours after the update. So yes there is a difference in frequency but we're not talking about long time samples like the other bug. This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |