Opened 10 years ago
Closed 9 years ago
#14389 closed defect (obsolete)
NAT taking 100% (single thread) CPU
Reported by: | mightyiam | Owned by: | |
---|---|---|---|
Component: | network/NAT | Version: | VirtualBox 5.0.0 |
Keywords: | Cc: | ||
Guest type: | Linux | Host type: | Linux |
Description (last modified by )
Following up from this thread.
let's see how much of the questions there, I can answer.
Attached are the port forward rules as a screenshot.
ip r
on the host should give the routing, right?
default via 192.168.0.1 dev eth0 proto static metric 100 10.10.10.0/24 dev vboxnet1 proto kernel scope link metric 100 192.168.0.0/24 dev eth0 proto kernel scope link metric 100
and ip r
on the guest should give the routing on the guest:
default via 10.0.2.2 dev eth0 metric 100 10.0.2.0/24 dev eth0 proto kernel scope link src 10.0.2.15 10.10.10.0/24 dev eth1 proto kernel scope link src 10.10.10.10
Does this answer your questions?
Attachments (1)
Change History (12)
by , 10 years ago
Attachment: | Screenshot_2015-08-04_22-17-12.png added |
---|
comment:1 by , 10 years ago
Component: | other → network/NAT |
---|
comment:2 by , 10 years ago
Please, can you provide guest-side packet captures for both NAT and host-only interfaces, taken when the VM exhibits the problem.
comment:3 by , 9 years ago
Description: | modified (diff) |
---|
comment:4 by , 9 years ago
@vushakov, I have captured packets as you requested. But they hold sensitive information. I don't think I can provide them.
Is there any chance you'll be able to tell me what to look for, using Wireshark, or anything?
I know this isn't ideal, but this seems to be the best I can do about it.
Can you add me to cc, please?
comment:5 by , 9 years ago
You can limit the capture so that only headers are captured, but not data. 64 bytes for 14 bytes of ethernet, 20 bytes of IP header, and 20 bytes of TCP header should be enough. Since UDP header is only 8 bytes, the capture will contain some UDP data, though.
Also, instead of attaching captures here you can also provide them to me directly: valery
dot ushakov
at oracle
dot com
.
comment:6 by , 9 years ago
@vushakov, I couldn't find documentation on how to limit the size of captured packets.
Can you please refer me to something?
comment:8 by , 9 years ago
In wireshark Capture Options dialogue there's a "Limit each packet to ... bytes" checkbox and when you enable it, you can select the number in the spinbox.
comment:9 by , 9 years ago
I've worked around this by setting up my own SSH port forwards.
It seems that the issue is triggered by actually using the built in port forwards.
comment:10 by , 9 years ago
What do you mean by "built-in" port-forwarding?
Is the problem triggered when you try to use ssh port-forwarding over NAT?
Why do you need it in the first place btw (restricted to localhost), when the guest is immediately accessible via host-only?
comment:11 by , 9 years ago
Resolution: | → obsolete |
---|---|
Status: | new → closed |
NAT port forwarding