[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] mount DomU root fs via. NFS


  • To: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
  • From: Jeenu Viswambharan <Jeenu.Viswambharan@xxxxxxx>
  • Date: Mon, 4 Aug 2014 10:12:57 +0100
  • Accept-language: en-US, en-GB
  • Acceptlanguage: en-US, en-GB
  • Cc: xen-users <xen-users@xxxxxxxxxxxxx>
  • Delivery-date: Mon, 04 Aug 2014 09:13:46 +0000
  • List-id: Xen user discussion <xen-users.lists.xen.org>
  • Thread-index: Ac+snd5AXIERr+I6TIGdEm6YmYJsegAwa9sAAAx+ynA=
  • Thread-topic: [Xen-users] mount DomU root fs via. NFS

On Fri, Aug 01, 2014 at 09:45:45, Jeenu Viswambharan wrote:
> On Thu, Jul 31, 2014 at 09:53:32, xen-users-bounces@xxxxxxxxxxxxx wrote:
> > On Wed, 2014-07-30 at 18:03 +0100, Jeenu Viswambharan wrote:
> > >  I therefore instead chose to go with NAT instead.
> > >
> > > From [1], all that's to be done in Dom0 is to
> > >
> > >   echo 1 > /proc/sys/net/ipv4/ip_forward
> >
> > [1] also says you need to do
> >         iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
> > to enable NAT, otherwise you are just in regular routing mode.
> >
> > If you don't do that then you would have to arrange a subnet for
> > your VMs and appropriate routing tables in your external
> > infrastructure etc.
>
> Uh, my init script was doing that too; I missed to mention it earlier.
>
> The behaviour is reproducible - guest waits for the NFS mount and
> crashes. All I see in Dom0 dmesg pertaining to virtual interfaces is:
>
>   [  262.676269] IPv6: ADDRCONF(NETDEV_UP): vif1.0: link is not ready
>   [  272.153571] IPv6: ADDRCONF(NETDEV_CHANGE): vif1.0: link becomes ready
>
> I also have a virtual interface in Dom0 while the guest is alive:
>
>   vif1.0  Link encap:Ethernet  HWaddr fe:ff:ff:ff:ff:ff
>           inet addr:192.168.1.128  Bcast:0.0.0.0  Mask:255.255.255.255
>           inet6 addr: fe80::fcff:ffff:feff:ffff/64 Scope:Link
>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>           RX packets:0 errors:0 dropped:0 overruns:0 frame:0
>           TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
>           collisions:0 txqueuelen:32
>           RX bytes:0 (0.0 B)  TX bytes:468 (468.0 B)
>
> If I'm reading this right, there were 6 packets received from the
> guest.  How do we know what happened to these?
>
> FWIW, `iptables -t nat -L` is:
>
>   Chain PREROUTING (policy ACCEPT)
>   target     prot opt source               destination
>
>   Chain INPUT (policy ACCEPT)
>   target     prot opt source               destination
>
>   Chain OUTPUT (policy ACCEPT)
>   target     prot opt source               destination
>
>   Chain POSTROUTING (policy ACCEPT)
>   target     prot opt source               destination
>   MASQUERADE  all  --  anywhere             anywhere
>
> Anything suspicious here?

I tried routing as well, and the behaviour is same. The only
modifications was to change script=vif-route in the guest configuration
file; and additionally write 1 to
/proc/sys/net/ipv4/conf/eth0/proxy_arp.

--
Jeenu

-- IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium.  Thank you.

ARM Limited, Registered office 110 Fulbourn Road, Cambridge CB1 9NJ, Registered 
in England & Wales, Company No:  2557590
ARM Holdings plc, Registered office 110 Fulbourn Road, Cambridge CB1 9NJ, 
Registered in England & Wales, Company No:  2548782


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxx
http://lists.xen.org/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.