http://bugzilla.suse.com/show_bug.cgi?id=1091762
http://bugzilla.suse.com/show_bug.cgi?id=1091762#c4
--- Comment #4 from Martin Wilck ---
Created attachment 768924
--> http://bugzilla.suse.com/attachment.cgi?id=768924&action=edit
packet capture on server
This capture was made on eth4 (52:54:00:b4:54:12) on the server VM.
All packets that didn't originate on this interface are malformed,
even though that were sent by server VM on the other interface.
12 34.850934 SuseLinu_92:11:ac → FCoE-group_01:00:04 FIP 64 Probe
Request[Malformed Packet]
0000 01 10 18 01 00 04 0c fd 37 92 11 ac 81 00 00 c8 ........7.......
0010 89 14 10 00 00 05 00 01 00 0a 00 00 02 02 0c fd ................
0020 37 92 11 ac 04 03 00 00 10 00 0c fd 37 92 11 ac 7...........7...
0030 0b 05 0e fd 00 00 11 ac 00 00 11 ac 20 00 0c fd ............ ...
Here's how the same packet looks on the client (sending) side:
6 10.706276 SuseLinu_92:11:ac → FCoE-group_01:00:04 FIP 68 Probe Request
0000 01 10 18 01 00 04 0c fd 37 92 11 ac 81 00 00 c8 ........7.......
0010 89 14 10 00 00 05 00 01 00 0a 00 00 02 02 0c fd ................
0020 37 92 11 ac 04 03 00 00 10 00 0c fd 37 92 11 ac 7...........7...
0030 0b 05 0e fd 00 00 11 ac 00 00 11 ac 20 00 0c fd ............ ...
0040 37 92 11 ac 7...
The last 4 bytes, which are part of the FIP VN_Port info "port name" field, are
missing. (my description in comment 0 was wrong in this respect too, sorry).
--
You are receiving this mail because:
You are on the CC list for the bug.