abclinuxu.cz AbcLinuxu.cz itbiz.cz ITBiz.cz HDmag.cz HDmag.cz abcprace.cz AbcPráce.cz
AbcLinuxu hledá autory!
Inzerujte na AbcPráce.cz od 950 Kč
Rozšířené hledání
×
eParkomat, startup z ČR, postoupil mezi finalisty evropského akcelerátoru ChallengeUp!
Robot na pivo mu otevřel dveře k opravdovému byznysu
Internet věcí: Propojený svět? Už se to blíží...
dnes 17:02 | Pozvánky

Přijďte si popovídat o open source obecně a openSUSE konkrétně s dalšími uživateli a vývojáři. Oslava nového vydání openSUSE Leap se uskuteční 16. prosince od 17:00 v nových prostorách firmy SUSE v Praze. K dispozici bude nějaké občerstvení a DVD pro ty, kdo je sbírají nebo ještě mají mechaniku. Po párty v kanceláři se bude pokračovat v některé z hospod v okolí.

Miška | Komentářů: 7
dnes 14:55 | Zajímavý software

Byla vydána verze Alpha 1.0 otevřeného operačního systému pro chytré hodinky AsteroidOS. Podporovány jsou hodinky LG G Watch, LG G Watch Urbane, Asus ZenWatch 2 a Sony Smartwatch 3. Ukázka ovládání hodinek na YouTube. Jaroslav Řezník přednášel o AsteroidOS na chytrých hodinkách (videozáznam) na letošní konferenci OpenAlt.

Ladislav Hagara | Komentářů: 0
dnes 13:30 | Zajímavý software

Byly uvolněny zdrojové kódy známé rogue-like hry DoomRL. Počátky hry jsou v roce 2002. Je napsána ve FreePascalu a zdrojový kód je nyní k dispozici na GitHubu pod licencí GNU GPL 2.0. Autor pracuje na nové hře Jupiter Hell, která je moderním nástupcem DoomRL a na jejíž vývoj shání peníze prostřednictvím Kickstarteru.

Blaazen | Komentářů: 0
dnes 13:15 | Pozvánky

Přijďte s námi oslavit vydání Fedory 25. Na programu budou přednášky o novinkách, diskuse, neřízený networking atd. Release Party se bude konat 16. prosince v prostorách společnosti Etnetera. Na party budou volně k dispozici také propagační materiály, nová DVD s Fedorou 25 a samozřejmě občerstvení. Přednášky budou probíhat v češtině. Pro více informací se můžete podívat na web MojeFedora.cz. Jen připomínám, že tentokrát jsme zavedli

… více »
frantisekz | Komentářů: 0
včera 16:38 | Komunita

Byly zveřejněny videozáznamy přednášek a workshopů z letošní konference OpenAlt konané 5. a 6. listopadu v Brně. K videozáznamům lze přistupovat ze stránky na SuperLectures nebo přes program konference, detaily o vybrané přednášce nebo workshopu a dále kliknutím na ikonku filmového pásu. Celkově bylo zpracováno 65 hodin z 89 přednášek a workshopů.

Ladislav Hagara | Komentářů: 0
včera 11:30 | Komunita

Bylo oznámeno, že bude proveden bezpečnostní audit zdrojových kódů open source softwaru pro implementaci virtuálních privátních sítí OpenVPN. Audit provede Matthew D. Green (blog), uznávaný kryptolog a profesor na Univerzitě Johnse Hopkinse. Auditována bude verze 2.4 (aktuálně RC 1, stabilní verze je 2.3.14). Audit bude financován společností Private Internet Access [reddit].

Ladislav Hagara | Komentářů: 4
včera 06:00 | Komunita

Na YouTube byl publikován Blender Institute Reel 2016, ani ne dvouminutový sestřih z filmů, které vznikly za posledních 10 let díky Blender Institutu. V institutu aktuálně pracují na novém filmu Agent 327. Dění kolem filmu lze sledovat na Blender Cloudu. Videoukázka Agenta 327 z června letošního roku na YouTube.

Ladislav Hagara | Komentářů: 0
včera 01:02 | Zajímavý článek

Minulý týden byly vydány verze 1.2.3 a 1.1.7 webového poštovního klienta Roundcube. V oznámení o vydání bylo zmíněno řešení bezpečnostního problému nalezeného společností RIPS a souvisejícího s voláním funkce mail() v PHP. Tento týden byly zveřejněny podrobnosti. Útočník mohl pomocí speciálně připraveného emailu spustit na serveru libovolný příkaz. Stejně, jak je popsáno v článku Exploit PHP’s mail() to get remote code execution z roku 2014.

Ladislav Hagara | Komentářů: 1
8.12. 16:00 | Nová verze

Byla vydána verze 0.98 svobodného nelineárního video editoru Pitivi. Z novinek lze zmínit například přizpůsobitelné klávesové zkratky. Videoukázka práce s nejnovější verzí Pitivi na YouTube.

Ladislav Hagara | Komentářů: 1
8.12. 15:00 | Zajímavý software

Stop motion je technika animace, při níž je reálný objekt mezi jednotlivými snímky ručně upravován a posouván o malé úseky, tak aby po spojení vyvolala animace dojem spojitosti. Jaký software lze pro stop motion použít na Linuxu? Článek na OMG! Ubuntu! představuje Heron Animation. Ten bohužel podporuje pouze webové kamery. Podpora digitálních zrcadlovek je začleněna například v programu qStopMotion.

Ladislav Hagara | Komentářů: 5
Kolik máte dat ve svém domovském adresáři na svém primárním osobním počítači?
 (32%)
 (23%)
 (29%)
 (7%)
 (5%)
 (3%)
Celkem 809 hlasů
 Komentářů: 50, poslední 29.11. 15:50
Rozcestník
Reklama

Dotaz: RaspberryPi: Timeout při mountovani NFS

19.1.2015 09:47 Hrabosh | skóre: 26 | blog: HBlog | Brno
RaspberryPi: Timeout při mountovani NFS
Přečteno: 299×
Zdravím,

bylo nebylo, měl jsem server s Debianem, na kterým běží NFS. K němu se připojují klienti (muj pracovní desktop) a RaspberryPi, který dělá automatické zálohy. Všechno beželo v síti 192.168.1.x ...

... pak jsme se přestěhovali. Po zapnutí server nabootoval a všechno se zdálo OK. Po zapnutí Raspberry se ale už nepřipojily NFS sdílení ze serveru. Ale z desktopu všechno fungovalo, jako dřív. Pak nám zapojili Internet přes WiFi a tímpádem mám na střeše něco jako Microtik, co funguje jako router a vnitřní sít má nastavenou na 192.168.1.x ...

.. díky tomu jsem změnil nastavení své sítě na 192.168.8.x, abych neměl bordel ve směrování. Změnil jsem IP adresy serveru (pro vnitřní síť), a přenastavil DHCP server, aby přiděloval klientům adresy z 192.168.8.x. Změnil jsem adresy v exportu a v hosts.allow ...

.. z desktopu si teď NFS sdílení normálně připojím, ale z Raspberry ne. Skončí to timeoutem. Zkoušel jsem se dívat do logů na server, ale nevidím tam žádnou chybu ani snahu Raspberry o připojení. Připojování (úspěšné) desktopu v logu vidím.

... napadá někoho, co zkontrolovat a jak pátrat dál?

díky, Zb.
To jsem psal já ... to není bordel, to je modulární!

Řešení dotazu:


Odpovědi

19.1.2015 11:03 mhepp
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
A /etc/fstab jsi zmenil? ;-)

Zkus rekurzivni grep stareho rozsahu adres v /etc. Treba jsi na neco zapomnel. Pokud ne, tak napis, co rika tcpdump...
19.1.2015 18:42 Hrabosh | skóre: 26 | blog: HBlog | Brno
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
FSTAB jsem měnil :-) Dokonce jsem je porovnával na Raspberry vs. desktop a jsou stejný.

Tímhle příkazem jsem se snažil o připojení:
root@Raspberry:~# mount -v 192.168.8.254:/mnt/storage
mount.nfs: timeout set for Mon Jan 19 17:40:28 2015
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: trying 192.168.8.254 prog 100003 vers 3 prot TCP port 2049
mount.nfs: prog 100005, trying vers=3, prot=17
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100005, trying vers=3, prot=6
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query retrying: RPC: Timed out
mount.nfs: prog 100003, trying vers=3, prot=17
mount.nfs: portmap query failed: RPC: Timed out
mount.nfs: Connection timed out
A tohle je tcpdump na serveru:
DebServer:~# tcpdump -i eth0 -n "src host 192.168.8.15 or dst host 192.168.8.15"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
18:38:31.576481 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [S], seq 2753227116, win 14600, options [mss 1460,sackOK,TS val 4879814 ecr 0,nop,wscale 5], length 0
18:38:31.576908 ARP, Request who-has 192.168.8.15 tell 192.168.8.254, length 28
18:38:31.577453 ARP, Reply 192.168.8.15 is-at b8:27:eb:c7:9e:03, length 46
18:38:31.577505 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [S.], seq 1699708128, ack 2753227117, win 14480, options [mss 1460,sackOK,TS val 38336853 ecr 4879814,nop,wscale 6], length 0
18:38:31.578198 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4879814 ecr 38336853], length 0
18:38:31.580351 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4879814 ecr 38336853], length 60
18:38:31.580555 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [.], ack 61, win 227, options [nop,nop,TS val 38336854 ecr 4879814], length 0
18:38:36.583103 ARP, Request who-has 192.168.8.254 tell 192.168.8.15, length 46
18:38:36.583181 ARP, Reply 192.168.8.254 is-at 00:50:fc:32:aa:54, length 28
18:38:36.607803 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [P.], seq 1:33, ack 61, win 227, options [nop,nop,TS val 38338111 ecr 4879814], length 32
18:38:36.608597 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 33, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0
18:38:36.608965 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [F.], seq 61, ack 33, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0
18:38:36.609294 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [F.], seq 33, ack 62, win 227, options [nop,nop,TS val 38338111 ecr 4880317], length 0
18:38:36.610098 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 34, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0
18:38:36.612227 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [S], seq 108985776, win 14600, options [mss 1460,sackOK,TS val 4880317 ecr 0,nop,wscale 5], length 0
18:38:36.612495 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [S.], seq 3189092813, ack 108985777, win 14480, options [mss 1460,sackOK,TS val 38338112 ecr 4880317,nop,wscale 6], length 0
18:38:36.613213 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 1, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0
18:38:36.614121 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 44: NFS request xid 3915526125 40 null
18:38:36.614299 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [.], ack 45, win 227, options [nop,nop,TS val 38338112 ecr 4880318], length 0
18:38:36.614544 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38338112 ecr 4880318], length 28: NFS reply xid 3915526125 reply ok 24 null
18:38:36.615222 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 29, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0
18:38:36.615471 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [F.], seq 45, ack 29, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0
18:38:36.615685 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [F.], seq 29, ack 46, win 227, options [nop,nop,TS val 38338113 ecr 4880318], length 0
18:38:36.616479 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 30, win 457, options [nop,nop,TS val 4880318 ecr 38338113], length 0
18:38:36.623339 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56
18:38:37.624634 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56
18:38:38.626110 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56
18:38:39.636368 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [S], seq 3224079441, win 14600, options [mss 1460,sackOK,TS val 4880620 ecr 0,nop,wscale 5], length 0
18:38:39.636664 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [S.], seq 1179209341, ack 3224079442, win 14480, options [mss 1460,sackOK,TS val 38338868 ecr 4880620,nop,wscale 6], length 0
18:38:39.637345 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4880620 ecr 38338868], length 0
18:38:39.638108 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4880620 ecr 38338868], length 60
18:38:39.638271 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [.], ack 61, win 227, options [nop,nop,TS val 38338868 ecr 4880620], length 0
18:38:41.644090 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28
18:38:41.644873 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64
18:38:46.656309 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28
18:38:46.657121 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64
18:38:49.646623 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4881621 ecr 38338868], length 0
18:38:49.666498 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [S], seq 2646766983, win 14600, options [mss 1460,sackOK,TS val 4881623 ecr 0,nop,wscale 5], length 0
18:38:49.666790 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [S.], seq 3180317476, ack 2646766984, win 14480, options [mss 1460,sackOK,TS val 38341375 ecr 4881623,nop,wscale 6], length 0
18:38:49.667612 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4881623 ecr 38341375], length 0
18:38:49.668255 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4881623 ecr 38341375], length 60
18:38:49.668417 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [.], ack 61, win 227, options [nop,nop,TS val 38341376 ecr 4881623], length 0
18:38:49.683797 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [.], ack 62, win 227, options [nop,nop,TS val 38341380 ecr 4881621], length 0
18:38:51.676646 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28
18:38:51.677502 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64
18:38:56.692942 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38343132 ecr 4881621], length 32
18:38:56.693773 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [R], seq 3224079503, win 0, length 0
18:38:59.677871 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4882624 ecr 38341376], length 0
18:38:59.683407 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56
18:38:59.716373 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [.], ack 62, win 227, options [nop,nop,TS val 38343888 ecr 4882624], length 0
18:39:00.683761 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56
18:39:01.685006 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56
18:39:01.709202 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38344386 ecr 4882624], length 32
18:39:01.709887 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [R], seq 2646767045, win 0, length 0
18:39:02.707022 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [S], seq 3184613553, win 14600, options [mss 1460,sackOK,TS val 4882927 ecr 0,nop,wscale 5], length 0
18:39:02.707301 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [S.], seq 1491964470, ack 3184613554, win 14480, options [mss 1460,sackOK,TS val 38344635 ecr 4882927,nop,wscale 6], length 0
18:39:02.708129 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4882927 ecr 38344635], length 0
18:39:02.708790 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4882927 ecr 38344635], length 60
18:39:02.708949 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [.], ack 61, win 227, options [nop,nop,TS val 38344636 ecr 4882927], length 0
18:39:06.729882 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28
18:39:06.730658 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64
18:39:11.749830 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28
18:39:11.750548 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64
18:39:12.717268 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4883928 ecr 38344636], length 0
18:39:12.722661 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56
18:39:12.757108 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [.], ack 62, win 227, options [nop,nop,TS val 38347148 ecr 4883928], length 0
18:39:13.724045 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56
18:39:14.725291 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56
18:39:15.746921 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [S], seq 2636641934, win 14600, options [mss 1460,sackOK,TS val 4884231 ecr 0,nop,wscale 5], length 0
18:39:15.747195 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [S.], seq 16293083, ack 2636641935, win 14480, options [mss 1460,sackOK,TS val 38347895 ecr 4884231,nop,wscale 6], length 0
18:39:15.747910 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4884231 ecr 38347895], length 0
18:39:15.748675 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4884231 ecr 38347895], length 60
18:39:15.748833 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [.], ack 61, win 227, options [nop,nop,TS val 38347895 ecr 4884231], length 0
18:39:16.766039 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28
18:39:16.766790 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64
18:39:21.790383 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38349406 ecr 4883928], length 32
18:39:21.791195 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [R], seq 3184613615, win 0, length 0
18:39:25.757180 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4885232 ecr 38347895], length 0
18:39:25.762683 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56
18:39:25.793870 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [.], ack 62, win 227, options [nop,nop,TS val 38350407 ecr 4885232], length 0
18:39:26.763924 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56
18:39:26.810722 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28
18:39:26.811452 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64
18:39:27.765318 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56
18:39:28.787315 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [S], seq 3390959618, win 14600, options [mss 1460,sackOK,TS val 4885535 ecr 0,nop,wscale 5], length 0
18:39:28.787627 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [S.], seq 2156693596, ack 3390959619, win 14480, options [mss 1460,sackOK,TS val 38351155 ecr 4885535,nop,wscale 6], length 0
18:39:28.788423 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4885535 ecr 38351155], length 0
18:39:28.789086 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4885535 ecr 38351155], length 60
18:39:28.789243 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [.], ack 61, win 227, options [nop,nop,TS val 38351155 ecr 4885535], length 0
18:39:31.838905 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28
18:39:31.839705 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64
18:39:36.863265 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38353174 ecr 4885232], length 32
18:39:36.864097 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [R], seq 2636641996, win 0, length 0
18:39:38.797570 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4886536 ecr 38351155], length 0
18:39:38.802966 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56
18:39:38.834611 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [.], ack 62, win 227, options [nop,nop,TS val 38353667 ecr 4886536], length 0
18:39:39.804460 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56
18:39:40.805707 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56
18:39:41.827194 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [S], seq 1319031536, win 14600, options [mss 1460,sackOK,TS val 4886839 ecr 0,nop,wscale 5], length 0
18:39:41.827464 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [S.], seq 1594023728, ack 1319031537, win 14480, options [mss 1460,sackOK,TS val 38354415 ecr 4886839,nop,wscale 6], length 0
18:39:41.828198 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4886839 ecr 38354415], length 0
18:39:41.828847 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4886839 ecr 38354415], length 60
18:39:41.829008 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [.], ack 61, win 227, options [nop,nop,TS val 38354415 ecr 4886839], length 0
18:39:41.879510 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28
18:39:41.880223 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64
18:39:46.895757 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28
18:39:46.896601 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64
18:39:51.837476 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4887840 ecr 38354415], length 0
18:39:51.842987 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56
18:39:51.875375 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [.], ack 62, win 227, options [nop,nop,TS val 38356927 ecr 4887840], length 0
18:39:51.916091 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38356937 ecr 4886536], length 32
18:39:51.916735 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [R], seq 3390959680, win 0, length 0
18:39:52.844243 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56
18:39:53.845597 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56
18:39:54.867339 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [S], seq 2240372835, win 14600, options [mss 1460,sackOK,TS val 4888143 ecr 0,nop,wscale 5], length 0
18:39:54.867669 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [S.], seq 3791063078, ack 2240372836, win 14480, options [mss 1460,sackOK,TS val 38357675 ecr 4888143,nop,wscale 6], length 0
18:39:54.868466 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4888143 ecr 38357675], length 0
18:39:54.869129 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4888143 ecr 38357675], length 60
18:39:54.869288 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [.], ack 61, win 227, options [nop,nop,TS val 38357675 ecr 4888143], length 0
18:39:56.936406 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28
18:39:56.937130 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64
18:40:01.952637 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38359446 ecr 4887840], length 32
18:40:01.953494 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [R], seq 1319031598, win 0, length 0
18:40:04.877619 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4889144 ecr 38357675], length 0
18:40:04.882999 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56
18:40:04.916114 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [.], ack 62, win 227, options [nop,nop,TS val 38360187 ecr 4889144], length 0
18:40:05.033639 IP 192.168.8.15.42414 > 74.125.136.188.5228: Flags [P.], seq 2403489553:2403489582, ack 1359725540, win 10100, options [nop,nop,TS val 3514673 ecr 2823099368], length 29
18:40:05.094240 IP 74.125.136.188.5228 > 192.168.8.15.42414: Flags [P.], seq 1:30, ack 29, win 358, options [nop,nop,TS val 2823999490 ecr 3514673], length 29
18:40:05.110013 IP 192.168.8.15.42414 > 74.125.136.188.5228: Flags [.], ack 30, win 10100, options [nop,nop,TS val 3514679 ecr 2823999490], length 0
18:40:05.884248 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56
18:40:06.885520 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56
18:40:06.976983 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28
18:40:06.977647 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64
18:40:07.907357 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [S], seq 2680357298, win 14600, options [mss 1460,sackOK,TS val 4889447 ecr 0,nop,wscale 5], length 0
18:40:07.907627 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [S.], seq 3083730774, ack 2680357299, win 14480, options [mss 1460,sackOK,TS val 38360934 ecr 4889447,nop,wscale 6], length 0
18:40:07.908360 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4889447 ecr 38360934], length 0
18:40:07.909134 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4889447 ecr 38360934], length 60
18:40:07.909296 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [.], ack 61, win 227, options [nop,nop,TS val 38360935 ecr 4889447], length 0
18:40:11.997317 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28
18:40:11.998163 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64
18:40:17.021488 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38363213 ecr 4889144], length 32
18:40:17.022280 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [R], seq 2240372897, win 0, length 0
18:40:17.917632 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4890448 ecr 38360935], length 0
18:40:17.923007 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56
18:40:17.956855 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [.], ack 62, win 227, options [nop,nop,TS val 38363447 ecr 4890448], length 0
18:40:18.924395 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56
18:40:19.925643 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56
18:40:20.947375 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [S], seq 4156425691, win 14600, options [mss 1460,sackOK,TS val 4890751 ecr 0,nop,wscale 5], length 0
18:40:20.947646 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [S.], seq 2423865039, ack 4156425692, win 14480, options [mss 1460,sackOK,TS val 38364194 ecr 4890751,nop,wscale 6], length 0
18:40:20.948397 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4890751 ecr 38364194], length 0
18:40:20.949022 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4890751 ecr 38364194], length 60
18:40:20.949183 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [.], ack 61, win 227, options [nop,nop,TS val 38364195 ecr 4890751], length 0
18:40:22.041863 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28
18:40:22.042551 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64
18:40:27.062172 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28
18:40:27.062927 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64
18:40:30.958528 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4891752 ecr 38364195], length 0
18:40:30.964028 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56
18:40:30.997614 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [.], ack 62, win 227, options [nop,nop,TS val 38366707 ecr 4891752], length 0
18:40:31.965414 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56
18:40:32.082343 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38366978 ecr 4890448], length 32
18:40:32.083172 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [R], seq 2680357360, win 0, length 0
18:40:32.966681 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56
18:40:37.098734 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28
18:40:37.099517 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64
18:40:42.119085 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38369487 ecr 4891752], length 32
18:40:42.119819 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [R], seq 4156425753, win 0, length 0
18:40:47.135230 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28
18:40:47.136082 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64
18:40:50.036130 IP 192.168.8.15.68 > 192.168.8.254.67: BOOTP/DHCP, Request from b8:27:eb:c7:9e:03, length 300
18:40:50.037200 IP 192.168.8.254.67 > 192.168.8.15.68: BOOTP/DHCP, Reply, length 300
18:40:52.151695 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28
18:40:52.152608 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64
18:40:57.171909 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28
18:40:57.172729 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64
18:41:02.188121 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28
18:41:02.188979 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64
18:41:07.208488 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28
18:41:07.209256 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64
18:41:12.229213 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28
18:41:12.229992 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64
18:41:17.245487 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28
18:41:17.246261 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64
18:41:22.265326 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28
18:41:22.266160 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64
18:41:27.266016 ARP, Request who-has 192.168.8.254 tell 192.168.8.15, length 46
18:41:27.266086 ARP, Reply 192.168.8.254 is-at 00:50:fc:32:aa:54, length 28
18:41:27.285685 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28
18:41:27.286522 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64
18:41:32.305873 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28
18:41:32.306674 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64
18:41:37.322326 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28
18:41:37.323051 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64
^C
193 packets captured
193 packets received by filter
0 packets dropped by kernel
To jsem psal já ... to není bordel, to je modulární!
19.1.2015 18:50 Hrabosh | skóre: 26 | blog: HBlog | Brno
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
Mimochodem tohle je příkaz z desktopu:
GentooOnPhenomII hrabosh # mount -v 192.168.8.254:/mnt/storage
mount.nfs: timeout set for Mon Jan 19 18:47:35 2015
mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: trying 192.168.8.254 prog 100003 vers 3 prot TCP port 2049
mount.nfs: prog 100005, trying vers=3, prot=17
mount.nfs: trying 192.168.8.254 prog 100005 vers 3 prot UDP port 42976
A tcpdump:
DebServer:~# tcpdump -i eth0 -n "src host 192.168.8.1 or dst host 192.168.8.1"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
18:45:38.185148 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [S], seq 171002076, win 14600, options [mss 1460,sackOK,TS val 6666885 ecr 0,nop,wscale 7], length 0
18:45:38.185457 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [S.], seq 1840938392, ack 171002077, win 14480, options [mss 1460,sackOK,TS val 38443499 ecr 6666885,nop,wscale 6], length 0
18:45:38.185576 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666886 ecr 38443499], length 0
18:45:38.185811 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 115, options [nop,nop,TS val 6666886 ecr 38443499], length 60
18:45:38.185973 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [.], ack 61, win 227, options [nop,nop,TS val 38443499 ecr 6666886], length 0
18:45:38.188570 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [P.], seq 1:33, ack 61, win 227, options [nop,nop,TS val 38443500 ecr 6666886], length 32
18:45:38.188711 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 33, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0
18:45:38.188842 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [F.], seq 61, ack 33, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0
18:45:38.188944 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [S], seq 1728122381, win 14600, options [mss 1460,sackOK,TS val 6666889 ecr 0,nop,wscale 7], length 0
18:45:38.189165 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [S.], seq 334187119, ack 1728122382, win 14480, options [mss 1460,sackOK,TS val 38443500 ecr 6666889,nop,wscale 6], length 0
18:45:38.189294 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0
18:45:38.189495 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 44: NFS request xid 1055388326 40 null
18:45:38.189639 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [.], ack 45, win 227, options [nop,nop,TS val 38443500 ecr 6666889], length 0
18:45:38.189997 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38443500 ecr 6666889], length 28: NFS reply xid 1055388326 reply ok 24 null
18:45:38.190088 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 29, win 115, options [nop,nop,TS val 6666890 ecr 38443500], length 0
18:45:38.190209 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [F.], seq 45, ack 29, win 115, options [nop,nop,TS val 6666890 ecr 38443500], length 0
18:45:38.190321 IP 192.168.8.1.45961 > 192.168.8.254.111: UDP, length 56
18:45:38.190640 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [F.], seq 29, ack 46, win 227, options [nop,nop,TS val 38443500 ecr 6666890], length 0
18:45:38.190732 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 30, win 115, options [nop,nop,TS val 6666891 ecr 38443500], length 0
18:45:38.192848 IP 192.168.8.254.111 > 192.168.8.1.45961: UDP, length 28
18:45:38.193036 IP 192.168.8.1.36934 > 192.168.8.254.42976: UDP, length 40
18:45:38.193555 IP 192.168.8.254.42976 > 192.168.8.1.36934: UDP, length 24
18:45:38.193859 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [F.], seq 33, ack 62, win 227, options [nop,nop,TS val 38443501 ecr 6666889], length 0
18:45:38.193968 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 34, win 115, options [nop,nop,TS val 6666894 ecr 38443501], length 0
18:45:38.194266 IP 192.168.8.1.693 > 192.168.8.254.42976: UDP, length 40
18:45:38.194717 IP 192.168.8.254.42976 > 192.168.8.1.693: UDP, length 24
18:45:38.194860 IP 192.168.8.1.693 > 192.168.8.254.42976: UDP, length 132
18:45:38.201342 IP 192.168.8.254.42976 > 192.168.8.1.693: UDP, length 60
18:45:38.201562 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [S], seq 4070763372, win 14600, options [mss 1460,sackOK,TS val 6666902 ecr 0,nop,wscale 7], length 0
18:45:38.201867 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [S.], seq 229387312, ack 4070763373, win 14480, options [mss 1460,sackOK,TS val 38443503 ecr 6666902,nop,wscale 6], length 0
18:45:38.201944 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666902 ecr 38443503], length 0
18:45:38.202159 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [P.], seq 1:97, ack 1, win 115, options [nop,nop,TS val 6666902 ecr 38443503], length 96
18:45:38.202317 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [.], ack 97, win 227, options [nop,nop,TS val 38443503 ecr 6666902], length 0
18:45:38.204815 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [P.], seq 1:33, ack 97, win 227, options [nop,nop,TS val 38443504 ecr 6666902], length 32
18:45:38.204956 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 33, win 115, options [nop,nop,TS val 6666905 ecr 38443504], length 0
18:45:38.205091 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [F.], seq 97, ack 33, win 115, options [nop,nop,TS val 6666905 ecr 38443504], length 0
18:45:38.205192 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [S], seq 2670145583, win 14600, options [mss 1460,sackOK,TS val 6666905 ecr 0,nop,wscale 7], length 0
18:45:38.205412 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [S.], seq 499348534, ack 2670145584, win 14480, options [mss 1460,sackOK,TS val 38443504 ecr 6666905,nop,wscale 6], length 0
18:45:38.205524 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 0
18:45:38.205721 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 44: NFS request xid 2064517340 40 null
18:45:38.205864 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [.], ack 45, win 227, options [nop,nop,TS val 38443504 ecr 6666906], length 0
18:45:38.206230 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38443504 ecr 6666906], length 28: NFS reply xid 2064517340 reply ok 24 null
18:45:38.206336 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 29, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 0
18:45:38.206803 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [F.], seq 33, ack 98, win 227, options [nop,nop,TS val 38443504 ecr 6666905], length 0
18:45:38.206875 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 45:89, ack 29, win 115, options [nop,nop,TS val 6666907 ecr 38443504], length 44: NFS request xid 2081294556 40 null
18:45:38.206990 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 34, win 115, options [nop,nop,TS val 6666907 ecr 38443504], length 0
18:45:38.207319 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 29:57, ack 89, win 227, options [nop,nop,TS val 38443505 ecr 6666907], length 28: NFS reply xid 2081294556 reply ok 24 null
18:45:38.207472 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 89:233, ack 57, win 115, options [nop,nop,TS val 6666907 ecr 38443505], length 144: NFS request xid 2098071772 140 fsinfo fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD548F2F730C
18:45:38.208875 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 57:141, ack 233, win 243, options [nop,nop,TS val 38443505 ecr 6666907], length 84: NFS reply xid 2098071772 reply ok 80 fsinfo rtmax 65536 rtpref 65536 wtmax 65536 wtpref 65536 dtpref 4096
18:45:38.209241 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 233:377, ack 141, win 115, options [nop,nop,TS val 6666909 ecr 38443505], length 144: NFS request xid 2114848988 140 pathconf fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39ED8000000C242BD545BC27E0C
18:45:38.209633 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 141:201, ack 377, win 260, options [nop,nop,TS val 38443505 ecr 6666909], length 60: NFS reply xid 2114848988 reply ok 56 pathconf linkmax 32000 namemax 255  chownres  keepcase
18:45:38.209952 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 377:521, ack 201, win 115, options [nop,nop,TS val 6666910 ecr 38443505], length 144: NFS request xid 2131626204 140 getattr fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39E10010000C242BD54D5AE880C
18:45:38.210284 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 201:317, ack 521, win 277, options [nop,nop,TS val 38443505 ecr 6666910], length 116: NFS reply xid 2131626204 reply ok 112 getattr DIR 40777 ids 1000/6 sz 4096
18:45:38.210665 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 521:665, ack 317, win 115, options [nop,nop,TS val 6666911 ecr 38443505], length 144: NFS request xid 2148403420 140 fsinfo fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD544FAE930C
18:45:38.211005 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 317:401, ack 665, win 294, options [nop,nop,TS val 38443505 ecr 6666911], length 84: NFS reply xid 2148403420 reply ok 80 fsinfo rtmax 65536 rtpref 65536 wtmax 65536 wtpref 65536 dtpref 4096
18:45:38.211354 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 665:809, ack 401, win 115, options [nop,nop,TS val 6666911 ecr 38443505], length 144: NFS request xid 2165180636 140 getattr fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39E10010000C242BD54A8DFA70C
18:45:38.212328 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 401:517, ack 809, win 310, options [nop,nop,TS val 38443506 ecr 6666911], length 116: NFS reply xid 2165180636 reply ok 112 getattr DIR 40777 ids 1000/6 sz 4096
18:45:38.216102 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 809:977, ack 517, win 115, options [nop,nop,TS val 6666916 ecr 38443506], length 168: NFS request xid 2181957852 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD5482AFF70C
18:45:38.217558 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 517:605, ack 977, win 327, options [nop,nop,TS val 38443507 ecr 6666916], length 88: NFS reply xid 2181957852 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632
18:45:38.221446 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 977:1145, ack 605, win 115, options [nop,nop,TS val 6666921 ecr 38443507], length 168: NFS request xid 2198735068 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD54A9CC380D
18:45:38.221826 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 605:693, ack 1145, win 344, options [nop,nop,TS val 38443508 ecr 6666921], length 88: NFS reply xid 2198735068 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632
18:45:38.222384 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 1145:1313, ack 693, win 115, options [nop,nop,TS val 6666922 ecr 38443508], length 168: NFS request xid 2215512284 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD54EDA2460D
18:45:38.222733 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 693:781, ack 1313, win 361, options [nop,nop,TS val 38443508 ecr 6666922], length 88: NFS reply xid 2215512284 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632
18:45:38.262545 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 781, win 115, options [nop,nop,TS val 6666963 ecr 38443508], length 0
18:45:42.212461 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 2064324282:2064325232, ack 246402904, win 331, options [nop,nop,TS val 6670912 ecr 1553629620], length 950
18:45:42.212617 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 950:1002, ack 1, win 331, options [nop,nop,TS val 6670912 ecr 1553629620], length 52
18:45:42.212786 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 1002:1231, ack 1, win 331, options [nop,nop,TS val 6670913 ecr 1553629620], length 229
18:45:42.230519 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 950, win 698, options [nop,nop,TS val 1553689645 ecr 6670912], length 0
18:45:42.231740 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 1002, win 698, options [nop,nop,TS val 1553689646 ecr 6670912], length 0
18:45:42.231881 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 1231, win 705, options [nop,nop,TS val 1553689647 ecr 6670913], length 0
18:45:42.308686 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [P.], seq 1:657, ack 1231, win 705, options [nop,nop,TS val 1553689723 ecr 6670913], length 656
18:45:42.308834 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [P.], seq 657:706, ack 1231, win 705, options [nop,nop,TS val 1553689723 ecr 6670913], length 49
18:45:42.308989 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [.], ack 657, win 331, options [nop,nop,TS val 6671009 ecr 1553689723], length 0
18:45:42.309143 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [.], ack 706, win 331, options [nop,nop,TS val 6671009 ecr 1553689723], length 0
^C
74 packets captured
74 packets received by filter
0 packets dropped by kernel
To jsem psal já ... to není bordel, to je modulární!
19.1.2015 19:10 Zdenek 'Mst. Spider' Sedlak | skóre: 37 | blog: xMstSpider
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
rpcinfo -p <nfs_server>, showmount -e <nfs_server> - rpi vs desktop? Je tam rozdil?
19.1.2015 20:24 Hrabosh | skóre: 26 | blog: HBlog | Brno
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
DebServer:~# rpcinfo -p
   program vers proto   port  service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
    100024    1   udp  46375  status
    100024    1   tcp  57985  status
    100003    2   tcp   2049  nfs
    100003    3   tcp   2049  nfs
    100003    4   tcp   2049  nfs
    100227    2   tcp   2049
    100227    3   tcp   2049
    100003    2   udp   2049  nfs
    100003    3   udp   2049  nfs
    100003    4   udp   2049  nfs
    100227    2   udp   2049
    100227    3   udp   2049
    100021    1   udp  44137  nlockmgr
    100021    3   udp  44137  nlockmgr
    100021    4   udp  44137  nlockmgr
    100021    1   tcp  37419  nlockmgr
    100021    3   tcp  37419  nlockmgr
    100021    4   tcp  37419  nlockmgr
    100005    1   udp  34853  mountd
    100005    1   tcp  33688  mountd
    100005    2   udp  32876  mountd
    100005    2   tcp  58310  mountd
    100005    3   udp  42976  mountd
    100005    3   tcp  38721  mountd
Raspberry:
root@Raspberry:~# showmount -e 192.168.8.254
Export list for 192.168.8.254:
/mnt/nfs     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
/var/www     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
/mnt/suplik  192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
/mnt/storage 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1

Desktop:
GentooOnPhenomII hrabosh # showmount -e 192.168.8.254
Export list for 192.168.8.254:
/mnt/nfs     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
/var/www     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
/mnt/suplik  192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
/mnt/storage 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
Vypadá to stejně, akorát na desktopu to bylo vygenerovaný okamžitě, na Raspberry to trvalo tak 4s. 192.168.8.1 je Desktop, 192.168.8.15 je Raspberry.
To jsem psal já ... to není bordel, to je modulární!
19.1.2015 20:32 Hrabosh | skóre: 26 | blog: HBlog | Brno
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
rpcinfo raspberry:
root@Raspberry:~# rpcinfo -p 192.168.8.254
   program vers proto   port  service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
    100024    1   udp  46375  status
    100024    1   tcp  57985  status
    100003    2   tcp   2049  nfs
    100003    3   tcp   2049  nfs
    100003    4   tcp   2049  nfs
    100227    2   tcp   2049
    100227    3   tcp   2049
    100003    2   udp   2049  nfs
    100003    3   udp   2049  nfs
    100003    4   udp   2049  nfs
    100227    2   udp   2049
    100227    3   udp   2049
    100021    1   udp  44137  nlockmgr
    100021    3   udp  44137  nlockmgr
    100021    4   udp  44137  nlockmgr
    100021    1   tcp  37419  nlockmgr
    100021    3   tcp  37419  nlockmgr
    100021    4   tcp  37419  nlockmgr
    100005    1   udp  34853  mountd
    100005    1   tcp  33688  mountd
    100005    2   udp  32876  mountd
    100005    2   tcp  58310  mountd
    100005    3   udp  42976  mountd
    100005    3   tcp  38721  mountd
rpcnfo desktop:
GentooOnPhenomII hrabosh # rpcinfo -p 192.168.8.254
   program vers proto   port  service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
    100024    1   udp  46375  status
    100024    1   tcp  57985  status
    100003    2   tcp   2049  nfs
    100003    3   tcp   2049  nfs
    100003    4   tcp   2049  nfs
    100227    2   tcp   2049  nfs_acl
    100227    3   tcp   2049  nfs_acl
    100003    2   udp   2049  nfs
    100003    3   udp   2049  nfs
    100003    4   udp   2049  nfs
    100227    2   udp   2049  nfs_acl
    100227    3   udp   2049  nfs_acl
    100021    1   udp  44137  nlockmgr
    100021    3   udp  44137  nlockmgr
    100021    4   udp  44137  nlockmgr
    100021    1   tcp  37419  nlockmgr
    100021    3   tcp  37419  nlockmgr
    100021    4   tcp  37419  nlockmgr
    100005    1   udp  34853  mountd
    100005    1   tcp  33688  mountd
    100005    2   udp  32876  mountd
    100005    2   tcp  58310  mountd
    100005    3   udp  42976  mountd
    100005    3   tcp  38721  mountd
... tam je rozdíl.
To jsem psal já ... to není bordel, to je modulární!
20.1.2015 13:48 Hrabosh | skóre: 26 | blog: HBlog | Brno
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
Problém je někde v síti! Když jsem Raspberrymu staticky přidělil adresu 192.168.8.1 jako mívá desktop, tak všechny ty showmounty a rpcinfa vypsaly informace okmažitě a připojení NFS funguje.
To jsem psal já ... to není bordel, to je modulární!
20.1.2015 20:30 Hrabosh | skóre: 26 | blog: HBlog | Brno
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS

Funguje! Stačilo udělat pro Raspberry záznam v /etc/hosts. Přitom všude používám IP adresu...

To jsem psal já ... to není bordel, to je modulární!
19.1.2015 22:02 camenic
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
modularni bordel
20.1.2015 14:18 mhepp | skóre: 22
Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
Hele, neštvi. Až budeš umět dobře položit dotaz, tak můžeš kritizovat.

Založit nové vláknoNahoru

Tiskni Sdílej: Linkuj Jaggni to Vybrali.sme.sk Google Del.icio.us Facebook

ISSN 1214-1267   www.czech-server.cz
© 1999-2015 Nitemedia s. r. o. Všechna práva vyhrazena.