WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] Re: [Xen-devel] xen 4.1.2* dhcp issue/bug when installin

To: Pasi Kärkkäinen <pasik@xxxxxx>
Subject: Re: [Xen-users] Re: [Xen-devel] xen 4.1.2* dhcp issue/bug when installing/booting HVM domU domains (CentOS 6, unbuntu 11.04 server). Debian/OpenSolaris work fine.
From: Mark Schneider <ms@xxxxxxxxxxxxxxxxxxxxxx>
Date: Tue, 16 Aug 2011 00:57:18 +0200
Cc: xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Mon, 15 Aug 2011 16:04:26 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20110815222346.GZ32373@xxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <4E498BBA.6070300@xxxxxxxxxxxxxxxxxxxxxx> <20110815214824.GY32373@xxxxxxxxxxx> <4E499680.1060409@xxxxxxxxxxxxxxxxxxxxxx> <20110815222346.GZ32373@xxxxxxxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.16) Gecko/20110307 Icedove/3.0.11
Am 16.08.2011 00:23, schrieb Pasi Kärkkäinen:
On Mon, Aug 15, 2011 at 11:58:24PM +0200, Mark Schneider wrote:

     Pings from *centos-hvm* to default gateway *no ip-traffic on peth0*


So here's your problem. Your bridge in dom0 is NOT forwarding the packets out 
to peth0..



     root@xen411dom0:/ftp/HVM# tcpdump  -i eth0 'icmp[icmptype] = icmp-echo and
     icmp[icmptype] != icmp-echoreply'
     tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
     listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
     19:54:00.770442 IP 192.168.1.180>   192.168.1.1: ICMP echo request, id 518,
     seq 23, length 64
     19:54:01.770958 IP 192.168.1.180>   192.168.1.1: ICMP echo request, id 518,
     seq 24, length 64

So where are these packets going to ? They're not getting out of dom0..

Do you have a firewall rule in dom0 that drops them?

Try these:
- In the HVM guest: run "arp -an" and check what MAC address you see for the 
gateway-IP.
- In dom0: run "brctl showmacs eth0" and verify which port has the MAC of the 
gateway.

[root@centoshvm ~]# arp -an
? (192.168.1.102) auf 00:1c:25:7e:fb:b7 [ether] auf eth0
? (192.168.1.124) auf b4:99:ba:c1:27:36 [ether] auf eth0

So the HVM guest has NOT received a MAC address for the gateway..
so ARP requests are not working from the HVM guest.

Do this:
- Shutdown the VM.
- Start the VM.
- Run tcpdump in dom0 (tcpdump -i tap<x>  -nn)
- Try pinging the gateway from the HVM guest.
- Paste the whole tcpdump output here.


root@xen411dom0:~# brctl showmacs eth0
port no mac addr                is local?       ageing timer
   6     00:16:3e:27:17:67       no                 3.22
   3     00:16:3e:27:20:67       no                40.85
   1     00:1c:25:7e:fb:b7       no                 0.00
   1     00:1d:7e:ad:35:a8       no                12.66
   1     b4:99:ba:c1:27:36       yes                0.00
   2     fe:ff:ff:ff:ff:ff       yes                0.00
root@xen411dom0:~# arp -an
? (192.168.1.102) auf 00:1c:25:7e:fb:b7 [ether] auf eth0
? (192.168.1.180) auf 00:16:3e:27:17:67 [ether] auf eth0
? (192.168.1.1) auf 00:1d:7e:ad:35:a8 [ether] auf eth0

Are you running some firewall (iptables or ebtables) in dom0 ?
No. It is plane wheezy with 3.0.1 kernel

# ---
root@xen411dom0:~# tcpdump -i tap9.0 -nn | tee /tmp/tcpdum-tap9.0.txt
tcpdump: WARNING: tap9.0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tap9.0, link-type EN10MB (Ethernet), capture size 65535 bytes
22:51:32.525644 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 1, length 64 22:51:33.526662 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 2, length 64 22:51:34.526849 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 3, length 64 22:51:35.527052 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 4, length 64 22:51:36.527114 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 5, length 64 22:51:37.527233 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 6, length 64 22:51:38.527325 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 7, length 64 22:51:39.527707 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 8, length 64 22:51:40.527521 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 9, length 64 22:51:41.527674 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 10, length 64 22:51:42.527765 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 11, length 64 22:51:43.527769 ARP, Request who-has 192.168.1.1 tell 192.168.1.180, length 28
22:51:43.527926 ARP, Reply 192.168.1.1 is-at 00:1d:7e:ad:35:a8, length 46
22:51:43.528599 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 12, length 64 22:51:44.529009 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 13, length 64 22:51:45.529137 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 14, length 64 22:51:46.529284 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 15, length 64
22:51:47.192618 IP 0.0.0.0 > 224.0.0.1: igmp query v2
22:51:47.192651 IP6 fe80::b699:baff:fec1:2736 > ff02::1: HBH ICMP6, multicast listener querymax resp delay: 1000 addr: ::, length 24 22:51:47.324329 IP6 fe80::216:3eff:fe27:1767 > ff02::1:ff27:1767: HBH ICMP6, multicast listener reportmax resp delay: 0 addr: ff02::1:ff27:1767, length 24 22:51:47.529421 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 16, length 64 22:51:47.886465 IP6 fe80::216:3eff:fe27:1767 > ff02::202: HBH ICMP6, multicast listener reportmax resp delay: 0 addr: ff02::202, length 24 22:51:48.529542 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 17, length 64 22:51:49.529741 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 18, length 64 22:51:50.529889 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 19, length 64 22:51:51.529929 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 20, length 64 22:51:52.530056 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 21, length 64 22:51:53.530170 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 22, length 64 22:51:54.530317 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 23, length 64 22:51:55.530413 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 24, length 64 22:51:56.530603 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 25, length 64 22:51:57.530723 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 26, length 64 22:51:58.530814 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 27, length 64 22:51:59.531236 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 28, length 64 22:52:00.531054 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 29, length 64 22:52:01.531158 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 30, length 64 22:52:02.531352 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 31, length 64 22:52:03.531452 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 32, length 64 22:52:04.531551 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 33, length 64 22:52:05.531748 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 34, length 64 22:52:06.531879 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 35, length 64 22:52:07.532014 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 36, length 64 22:52:08.532055 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 37, length 64 22:52:09.534235 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 38, length 64 22:52:10.534336 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 39, length 64 22:52:11.534439 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 40, length 64 22:52:12.534630 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 41, length 64 22:52:13.534748 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 42, length 64 22:52:14.534856 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 43, length 64 22:52:15.535128 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 44, length 64 22:52:16.535098 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 45, length 64 22:52:17.535198 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 46, length 64 22:52:18.535358 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 47, length 64 22:52:19.535564 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 48, length 64 22:52:20.535493 ARP, Request who-has 192.168.1.1 tell 192.168.1.180, length 28
22:52:20.535663 ARP, Reply 192.168.1.1 is-at 00:1d:7e:ad:35:a8, length 46
22:52:20.536094 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 49, length 64 22:52:21.536726 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 50, length 64 22:52:22.536845 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 51, length 64 22:52:23.536974 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 52, length 64 22:52:24.537096 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 53, length 64 22:52:25.537279 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 54, length 64 22:52:26.537372 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 55, length 64 22:52:27.537537 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 56, length 64 22:52:28.537658 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 57, length 64 22:52:29.537692 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 58, length 64 22:52:30.537889 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 59, length 64 22:52:31.538022 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 60, length 64 22:52:32.538082 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 61, length 64 22:52:33.538246 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 62, length 64 22:52:34.538365 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 63, length 64 22:52:35.538521 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 64, length 64 22:52:36.538622 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 65, length 64 22:52:37.538719 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 66, length 64 22:52:38.538942 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 67, length 64 22:52:39.538996 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 68, length 64 22:52:40.539144 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 69, length 64 22:52:41.539280 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 70, length 64 22:52:42.539463 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 71, length 64 22:52:43.539786 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 72, length 64 22:52:44.539640 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 73, length 64 22:52:45.539771 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 74, length 64 22:52:46.540000 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 75, length 64 22:52:47.540049 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 76, length 64 22:52:47.975050 IP6 fe80::216:3eff:fe27:2067 > ff02::1: ICMP6, neighbor advertisement, tgt is fe80::216:3eff:fe27:2067, length 32 22:52:48.540271 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 77, length 64 22:52:49.542286 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 78, length 64 22:52:50.542428 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 79, length 64 22:52:51.542559 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 80, length 64 22:52:52.542671 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 81, length 64 22:52:53.542796 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 82, length 64 22:52:54.504716 IP6 fe80::216:3eff:fe27:2067.546 > ff02::1:2.547: dhcp6 solicit 22:52:54.542960 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 83, length 64 22:52:55.543103 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 84, length 64 22:52:56.543129 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 85, length 64 22:52:57.543313 ARP, Request who-has 192.168.1.1 tell 192.168.1.180, length 28
22:52:57.543462 ARP, Reply 192.168.1.1 is-at 00:1d:7e:ad:35:a8, length 46
22:52:57.543808 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 86, length 64 22:52:58.544471 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 87, length 64 22:52:59.545561 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 88, length 64 22:53:00.545808 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 89, length 64 22:53:01.545789 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 90, length 64 22:53:02.546004 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 91, length 64 22:53:03.546027 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 92, length 64 22:53:04.546249 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 93, length 64 22:53:05.546429 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 94, length 64 22:53:06.546476 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 95, length 64 22:53:07.546621 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 96, length 64 22:53:08.546739 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 97, length 64 22:53:09.546897 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 98, length 64 22:53:10.546976 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 99, length 64 22:53:11.547121 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 100, length 64 22:53:12.547152 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 101, length 64 22:53:13.547338 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 102, length 64 22:53:14.547483 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 103, length 64 22:53:15.547630 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 104, length 64 22:53:16.547774 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 105, length 64 22:53:17.547884 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 106, length 64 22:53:18.548024 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 107, length 64 22:53:19.548104 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 108, length 64 22:53:20.548338 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 109, length 64 22:53:21.548446 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 110, length 64 22:53:22.548440 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 111, length 64 22:53:23.548643 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 112, length 64 22:53:24.548881 IP 192.168.1.180 > 192.168.1.1: ICMP echo request, id 56069, seq 113, length 64
22:53:52.632691 IP 0.0.0.0 > 224.0.0.1: igmp query v2
22:53:52.632726 IP6 fe80::b699:baff:fec1:2736 > ff02::1: HBH ICMP6, multicast listener querymax resp delay: 1000 addr: ::, length 24 22:53:52.834307 IP6 fe80::216:3eff:fe27:1767 > ff02::1:ff27:1767: HBH ICMP6, multicast listener reportmax resp delay: 0 addr: ff02::1:ff27:1767, length 24 22:53:53.480335 IP6 fe80::216:3eff:fe27:1767 > ff02::202^C131 packets captured
131 packets received by filter
0 packets dropped by kernel


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>