https://bugzilla.novell.com/show_bug.cgi?id=649584 https://bugzilla.novell.com/show_bug.cgi?id=649584#c0 Summary: bridge drops nfs udp packet -- breaks/blocks NFS server via udp !! Classification: openSUSE Product: openSUSE 11.3 Version: Final Platform: x86-64 OS/Version: Other Status: NEW Severity: Major Priority: P5 - None Component: Network AssignedTo: bnc-team-screening@forge.provo.novell.com ReportedBy: koenig@linux.de QAContact: qa@suse.de Found By: --- Blocker: --- Created an attachment (id=397321) --> (http://bugzilla.novell.com/attachment.cgi?id=397321) tcpdump log from nfs server nfs server over udp does not work anymore with recent 11.3 update kernels when using a bridged network device! this first showed up on my 64bit XEN dom0 server running kernel 2.6.34.7-0.4-xen being accessed as nfs server from a solaris 10 nfs client with udp protocoll (nfs via tcp works fine). tcpdump shows that nfs v3 udp "null reply" packet (packet #4 in attached file nfs-server.udp.tcpdump) does not make it onto the ethernet wire, it does not show up on the nfs client side (nfs-client.udp.snoop -- use wireshark!) -- tested between two opensuse 11.3 boxes with loopback cable! a few tests showed: - using eth0 instead of br0 "solves" the problem (nfs mount over udp works again) - using real kernel instead of xen dom0 doesn't seem to make a difference: real 2.6.34.7-0.4-desktop kernel breaks with udp nfs server too (so not likely a xen-only problem!) - on a xen domU running suse 11.3 with distro kernel 2.6.34-12-xen 64bit the nfs server works fine with udp over bridge br0 in domU. so maybe that bug got intoduced somewhere between 2.6.34-12 and 2.6.34.7-0.4 - update from 2.6.34.7-0.4-desktop to kernel-desktop-2.6.34.7-0.5.1.x86_64 did not help on my notebook as udp nfs server over br0 (works over eth0 and/or with tcp). test with: breaks: mount -o udp server:/dir /mnt works: mount -o tcp server:/dir /mnt -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.