VirtualBox

Opened 9 years ago

Closed 8 years ago

#14389 closed defect (obsolete)

NAT taking 100% (single thread) CPU

Reported by: mightyiam Owned by:
Component: network/NAT Version: VirtualBox 5.0.0
Keywords: Cc:
Guest type: Linux Host type: Linux

Description (last modified by Valery Ushakov)

Following up from this thread.

let's see how much of the questions there, I can answer.

Attached are the port forward rules as a screenshot.

ip r on the host should give the routing, right?

default via 192.168.0.1 dev eth0  proto static  metric 100 
10.10.10.0/24 dev vboxnet1  proto kernel  scope link  metric 100 
192.168.0.0/24 dev eth0  proto kernel  scope link  metric 100

and ip r on the guest should give the routing on the guest:

default via 10.0.2.2 dev eth0  metric 100 
10.0.2.0/24 dev eth0  proto kernel  scope link  src 10.0.2.15 
10.10.10.0/24 dev eth1  proto kernel  scope link  src 10.10.10.10

Does this answer your questions?

Attachments (1)

Screenshot_2015-08-04_22-17-12.png (14.0 KB ) - added by mightyiam 9 years ago.
NAT port forwarding

Download all attachments as: .zip

Change History (12)

by mightyiam, 9 years ago

NAT port forwarding

comment:1 by Valery Ushakov, 9 years ago

Component: othernetwork/NAT

comment:2 by Valery Ushakov, 9 years ago

Please, can you provide guest-side packet captures for both NAT and host-only interfaces, taken when the VM exhibits the problem.

comment:3 by Valery Ushakov, 9 years ago

Description: modified (diff)

comment:4 by mightyiam, 9 years ago

@vushakov, I have captured packets as you requested. But they hold sensitive information. I don't think I can provide them.

Is there any chance you'll be able to tell me what to look for, using Wireshark, or anything?

I know this isn't ideal, but this seems to be the best I can do about it.

Can you add me to cc, please?

comment:5 by Valery Ushakov, 9 years ago

You can limit the capture so that only headers are captured, but not data. 64 bytes for 14 bytes of ethernet, 20 bytes of IP header, and 20 bytes of TCP header should be enough. Since UDP header is only 8 bytes, the capture will contain some UDP data, though.

Also, instead of attaching captures here you can also provide them to me directly: valery dot ushakov at oracle dot com.

comment:6 by mightyiam, 9 years ago

@vushakov, I couldn't find documentation on how to limit the size of captured packets.

Can you please refer me to something?

comment:7 by mightyiam, 9 years ago

Confirming this on 4.3.30-101610~Ubuntu~raring, as well.

comment:8 by Valery Ushakov, 9 years ago

In wireshark Capture Options dialogue there's a "Limit each packet to ... bytes" checkbox and when you enable it, you can select the number in the spinbox.

comment:9 by mightyiam, 9 years ago

I've worked around this by setting up my own SSH port forwards.

It seems that the issue is triggered by actually using the built in port forwards.

comment:10 by Valery Ushakov, 9 years ago

What do you mean by "built-in" port-forwarding?

Is the problem triggered when you try to use ssh port-forwarding over NAT?

Why do you need it in the first place btw (restricted to localhost), when the guest is immediately accessible via host-only?

comment:11 by Frank Mehnert, 8 years ago

Resolution: obsolete
Status: newclosed
Note: See TracTickets for help on using tickets.

© 2023 Oracle
ContactPrivacy policyTerms of Use