Bug 606263 - (NFS client): Disable NFSv4 over UDP
Summary: (NFS client): Disable NFSv4 over UDP
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel   
(Show other bugs)
Version: 6.0
Hardware: All
OS: Linux
Target Milestone: rc
: ---
Assignee: nfs-maint
QA Contact: Red Hat Kernel QE team
Depends On: 606260 609113 1431683
Blocks: 767187 846704
TreeView+ depends on / blocked
Reported: 2010-06-21 09:31 UTC by Sachin Prabhu
Modified: 2017-03-13 15:27 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: 606260
Last Closed: 2015-11-23 15:18:50 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Sachin Prabhu 2010-06-21 09:31:39 UTC
This bugzilla has been raised for the NFS Client part.

+++ This bug was initially created as a clone of Bug #606260 +++

At the moment on RHEL 6 beta, we support NFSv4 over UDP. 

RFC3530 states

   Where an NFS version 4 implementation supports operation over the IP
   network protocol, the supported transports between NFS and IP MUST be
   among the IETF-approved congestion control transport protocols, which
   include TCP and SCTP

UDP doesn't perform congestion control. This combination is thus not standards compliant.

I came across this thread upstream.

Comment 1 RHEL Product and Program Management 2010-06-21 09:43:14 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux major release.  Product Management has requested further
review of this request by Red Hat Engineering, for potential inclusion in a Red
Hat Enterprise Linux Major release.  This request is not yet committed for

Comment 2 RHEL Product and Program Management 2010-07-15 14:20:49 UTC
This issue has been proposed when we are only considering blocker
issues in the current Red Hat Enterprise Linux release. It has
been denied for the current Red Hat Enterprise Linux release.

** If you would still like this issue considered for the current
release, ask your support representative to file as a blocker on
your behalf. Otherwise ask that it be considered for the next
Red Hat Enterprise Linux release. **

Note You need to log in before you can comment on or make changes to this bug.