Bug 241341 - Secure NFS cause RPC warnings
Secure NFS cause RPC warnings
Status: CLOSED DUPLICATE of bug 238687
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel (Show other bugs)
5.0
All Linux
medium Severity medium
: ---
: ---
Assigned To: Steve Dickson
Martin Jenner
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-05-25 06:28 EDT by Steve Dickson
Modified: 2007-11-30 17:07 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-05-25 07:50:21 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)
Upstream Patch (4.16 KB, patch)
2007-05-25 06:28 EDT, Steve Dickson
no flags Details | Diff

  None (edit)
Description Steve Dickson 2007-05-25 06:28:50 EDT
Description of problem:
Mounting with either krb5i or krb5p security flavors
cause the follwoing RPC warnings to be logged:
     
    RPC request reserved 172 but used 216


Version-Release number of selected component (if applicable):


How reproducible:
Always

Steps to Reproduce:
1. mount -o sec=krb5p server:/export /mnt 
2.
3.
  
Actual results:


Expected results:


Additional info:
Comment 1 Steve Dickson 2007-05-25 06:28:50 EDT
Created attachment 155441 [details]
Upstream Patch
Comment 2 RHEL Product and Program Management 2007-05-25 07:03:54 EDT
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.
Comment 3 Jeff Layton 2007-05-25 07:50:21 EDT

*** This bug has been marked as a duplicate of 238687 ***
Comment 4 Steve Dickson 2007-05-25 08:07:32 EDT

*** This bug has been marked as a duplicate of 238687 ***

Note You need to log in before you can comment on or make changes to this bug.