[vox-tech] NFS mount "RPC: Timed out" error
Peter Jay Salzman
vox-tech@lists.lugod.org
Mon, 14 Jul 2003 15:47:35 -0700
On Mon 14 Jul 03, 3:06 PM, Ken Herron <Kherron@newsguy.com> said:
> --On Monday, July 14, 2003 13:35:20 -0700 Bill Kendrick <nbs@sonic.net>
> wrote:
>
> >>Shouldn't nfsd be in there?
> >
> >*shrug* Sure?! Why not? ;) Like I said, it worked previously, and I
> >know I didn't mess with hosts.allow between the time it /was/ working
> >and now, but I'll try it anyway...
>
> Err, isn't hosts.allow the TCP wrappers config file? NFS usually runs
> over udp in a lan environment; I don't see how TCP wrappers could be
> involved.
yep.
but portmapper should listen to both tcp and udp ports though...
> >For the host in question, I get back:
> >
> > program vers proto port
> > 100000 2 tcp 111 portmapper
> > 100000 2 udp 111 portmapper
> > 100003 2 udp 2049 nfs
> > 100003 2 tcp 2049 nfs
> > 100005 1 udp 630 mountd
> > 100005 2 udp 630 mountd
> > 100005 1 tcp 633 mountd
> > 100005 2 tcp 633 mountd
>
> Hmm, you should have entries for lockd and statd (I think) in there. The
> timeout could be from the client trying to contact lockd on the server,
> but I don't know if that happens at mount time.
>
> It'd be helpful to to know exactly what rpc program/version the client is
> trying to invoke when it times out. Could you snoop the network during a
> mount attempt? If it's trying to talk to nfsd, then the question is why
> nfsd is ignoring the client. If the client is trying to talk to lockd,
> then the question is why lockd isn't running.
i was going to suggest that myself. bill, do this:
# tcpdump -i eth0 udp port 2048
and try to mount. you should see a communication attempt. this should
narrow down the culprit a bit.
> >Before I go much further... is there any chance at all that this could
> >be a kernel issue on mountING system? (The one trying to make the NFS
> >connection to the mountED server)
>
> Shrug, anything's possible. It'd be nice to know exactly what is failing
> before leaping for the kernel, though.
if you didn't update the kernel, there's no reason to expect the kernel
is the culprit.
when was the last time you apt-got anything?
have you checked daemon.log? messages? can you run nfsd and portmap
with some kind of debug switches?
pete
--
GPG Instructions: http://www.dirac.org/linux/gpg
GPG Fingerprint: B9F1 6CF3 47C4 7CD8 D33E 70A9 A3B9 1945 67EA 951D