Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
 iventoy on Qnap NAS with DDWRT router
#1
Hello,
i do have a problem, i cant boot from pxe
I have executed iventoy.sh and can get access to the site
My DHCP Server is my Router 192.168.1.1 and iventoy is running on my Qnap with IP 192.168.1.50
In the Configuration is set ExternalNet and i have added in dnsmasq in my DDWRT firmware dhcp-boot=iventoy_loader_16000,192.168.1.50, i also tried changing it to iventoy_loader_16000_uefi
what did i wrong? I tried to pxe boot from VMWare but it just dont get any connection, on VMWare network is set to Bridge so it must get an IP Adress from Router, how i can see this i dont know

I dont have any Logfile cuz there is nothing to be logged when pxeboot failed completly

PS: I think that doesnt matter but i do have too a pihole docker installed with unbound as dns recursive server

please any help?
kindly regards
Reply
#2
Even without iVentoy, the vmware should be able to get an IP address from your router.
So if the vmware can not get an IP address (you can not see on vmware screen) , there must be some problem in the network connection or configuration.
Reply
#3
I tried in NAT mode too, so in this mode it must work cuz it shares my host IP Adress but it doesnt boot from PXE
also i tried Virtual Box, same problem, Bridge Mode dont boot up and NAT Mode it gets an 10.0 IP Adress, why? shouldnt it get my host IP Adress 192.168? I know this question is not related to iventoy directly, sorry but when VM boots up it have a connection

Is my dnsmasq configuration correct? anyone have ddwrt firmware and iventoy? Iam not sure if i should use External or ExternalNet, i dont understand the difference
Reply
#4
I found a way to boot from PXE throw Virtual Box
i can see the bootmenu of iventoy with the ISOs but i cant boot any ISO, it stops by peparing for boot. please wait...
also how to setup ddwrt dnsmasq to boot from BIOS, UEFI,...file.? and should i select External or ExternalNet?
Here is the log:
Code:
2023/10/16 10:35:37.930 [PXE]  [1]  <iso/Windows11_InsiderPreview_Client_x64_de-de_25951.iso> WIM:1/1
2023/10/16 10:35:37.930 [PXE]  [1]  <01> [5444601856 - 5882286080 437684224 ] Remap
2023/10/16 10:35:37.930 [PXE]  [1]  <02> [5444601856 - 5444602064 208       ] Memory
2023/10/16 10:35:37.930 [PXE]  [1]  <03> [5882286080 - 5883473920 1187840   ] Memory
2023/10/16 10:35:37.930 [PXE]  [1]  <04> [5882480228 - 5882481252 1024      ] iVentoy Param
2023/10/16 10:35:37.930 [PXE]  [1]  <05> [5883473920 - 5889306624 5832704   ] Memory
2023/10/16 10:35:37.930 [PXE]  [1]  <06> [5884236896 - 5884236916 20        ] WIM BIN CHK
2023/10/16 10:35:37.930 [PXE]  [1]  <07> [5886731944 - 5886731964 20        ] WIM BIN CHK
2023/10/16 10:35:37.930 [PXE]  [1]  <08> [5889306624 - 5889855488 548864    ] Memory
2023/10/16 10:35:37.930 [PXE]  [1]  <09> [5889424754 - 5889424774 20        ] WIM BIN CHK
2023/10/16 10:35:37.930 [PXE]  [1]  <10> [5889306704 - 5889306724 20        ] WIM META CHK
2023/10/16 10:35:37.930 [PXE]  [1]  <11> [5889855488 - 5889875968 20480     ] Memory
2023/10/16 10:35:37.930 [PXE]  [1]  <12> [5889875968 - 5889896448 20480     ] Memory
2023/10/16 10:35:37.930 [PXE]  [1] ================ VIRT RANGE DUMP ================
2023/10/16 10:35:37.930 [PXE]  [1] Phase2 parse image <iso/Windows11_InsiderPreview_Client_x64_de-de_25951.iso> finished success
2023/10/16 10:35:37.930 [PXE]  [2] search pecmd.exe (nil)
2023/10/16 10:35:37.930 [PXE]  [3] fix tag override 224[2539536 - 2539760] 2539576 2539520 56
2023/10/16 10:35:37.930 [PXE]  [2] search winpeshl.exe 0x7f4f741c59b8
2023/10/16 10:35:37.930 [PXE]  [3] ## virt BIOS BCD file 16384 20480 20480...
2023/10/16 10:35:37.930 [PXE]  [2] find replace file at 0x7f4f741c59b8
2023/10/16 10:35:37.930 [PXE]  [3] file_entry and extend data in the same block.
2023/10/16 10:35:37.930 [PXE]  [2] search hash <b496bf6ff84f2943125b603b3b9f979859f7fcef>
2023/10/16 10:35:37.931 [PXE]  [2] find replace lookup entry_id:3895 raw_size:33280
2023/10/16 10:35:37.931 [PXE]  [3] fix tag override 224[4124688 - 4124912] 4124728 4124672 56
2023/10/16 10:35:37.931 [PXE]  [3] find target file, name_len:24, offset: 679200, upadte hash
2023/10/16 10:35:37.931 [PXE]  [2] 13308 33280 chunk_num=2
2023/10/16 10:35:37.931 [PXE]  [3] find target file, name_len:24, offset: 3308064, upadte hash
2023/10/16 10:35:37.931 [PXE]  [2] last chunk_size:142 decompresslen:512 tot:33280
2023/10/16 10:35:37.931 [PXE]  [2] jump exe </win/vtoypxe64.exe> len:194048 alignlen:194048
2023/10/16 10:35:37.932 [PXE]  [3] update replace lookup entry_id:10515
2023/10/16 10:35:37.932 [PXE]  [3] find meta lookup entry_id:1, update resource head and hash(5079096)
2023/10/16 10:35:37.932 [PXE]  [3] Virt data ISO file size: 4948989952 5616105472
2023/10/16 10:35:37.932 [PXE]  [3] ================ OVERRIDE DUMP ================
2023/10/16 10:35:37.932 [PXE]  [3]  <0> [ 9783320 - 9783324 4 ]
2023/10/16 10:35:37.932 [PXE]  [3]  <1> [ 1056768 - 2531328 1474560 ]
2023/10/16 10:35:37.932 [PXE]  [3]  <2> [ 530432 - 530944 512 ]
2023/10/16 10:35:37.932 [PXE]  [3]  <3> [ 2600960 - 2601472 512 ]
2023/10/16 10:35:37.932 [PXE]  [3]  <4> [ 2539520 - 2540032 512 ]
2023/10/16 10:35:37.932 [PXE]  [3]  <5> [ 4124672 - 4125184 512 ]
2023/10/16 10:35:37.932 [PXE]  [3] ================ OVERRIDE DUMP ================
2023/10/16 10:35:37.932 [PXE]  [3] ================ VIRT RANGE DUMP ================
2023/10/16 10:35:37.932 [PXE]  [3]  <iso/de-de_windows_10_enterprise_ltsc_2021_x64_dvd_71796d33.iso> WIM:1/1
2023/10/16 10:35:37.932 [PXE]  [3]  <01> [4948989952 - 5609086976 660097024 ] Remap
2023/10/16 10:35:37.932 [PXE]  [3]  <02> [4948989952 - 4948990160 208       ] Memory
2023/10/16 10:35:37.932 [PXE]  [3]  <03> [5609086976 - 5610250240 1163264   ] Memory
2023/10/16 10:35:37.932 [PXE]  [3]  <04> [5609281124 - 5609282148 1024      ] iVentoy Param
2023/10/16 10:35:37.932 [PXE]  [3]  <05> [5610250240 - 5615331328 5081088   ] Memory
2023/10/16 10:35:37.932 [PXE]  [3]  <06> [5610929440 - 5610929460 20        ] WIM BIN CHK
2023/10/16 10:35:37.932 [PXE]  [3]  <07> [5613558304 - 5613558324 20        ] WIM BIN CHK
2023/10/16 10:35:37.932 [PXE]  [3]  <08> [5615331328 - 5616064512 733184    ] Memory
2023/10/16 10:35:37.932 [PXE]  [3]  <09> [5615857108 - 5615857128 20        ] WIM BIN CHK
2023/10/16 10:35:37.932 [PXE]  [3]  <10> [5615331408 - 5615331428 20        ] WIM META CHK
2023/10/16 10:35:37.932 [PXE]  [3]  <11> [5616064512 - 5616084992 20480     ] Memory
2023/10/16 10:35:37.932 [PXE]  [3]  <12> [5616084992 - 5616105472 20480     ] Memory
2023/10/16 10:35:37.932 [PXE]  [3] ================ VIRT RANGE DUMP ================
2023/10/16 10:35:37.932 [PXE]  [3] Phase2 parse image <iso/de-de_windows_10_enterprise_ltsc_2021_x64_dvd_71796d33.iso> finished success
2023/10/16 10:35:37.932 [PXE]  [2] jump_exe_len:194048 bin_raw_len:1162140 bin_align_len:1163264
2023/10/16 10:35:37.932 [PXE]  [2] windows locate wim finish
2023/10/16 10:35:37.932 [PXE]  [2] Windows virt data new <Windows> ...
2023/10/16 10:35:37.932 [PXE]  [2] bootfix.bin data: 80 00 cd 13
2023/10/16 10:35:37.932 [PXE]  [2] Auto suppress BIOS cdrom prompt
2023/10/16 10:35:37.933 [PXE]  [2] Auto suppress UEFI cdrom prompt
2023/10/16 10:35:37.933 [PXE]  [2] UDF fill override data ...
2023/10/16 10:35:37.933 [PXE]  [2] PdSizeOffset=530624 tagOffset=530432
2023/10/16 10:35:37.933 [PXE]  [2] UDF tag valid OK, should match it.
2023/10/16 10:35:37.933 [PXE]  [2] UDF tag refresh OK.
2023/10/16 10:35:37.933 [PXE]  [2] ## virt wim file </sources/boot.wim> <570807207> <New:578068480> ...
2023/10/16 10:35:37.933 [PXE]  [2] file_entry and extend data in the same block.
2023/10/16 10:35:37.933 [PXE]  [2] fix tag override 224[2598928 - 2599152] 2598968 2598912 56
2023/10/16 10:35:37.933 [PXE]  [2] ## virt BIOS BCD file 16384 20480 20480...
2023/10/16 10:35:37.933 [PXE]  [2] file_entry and extend data in the same block.
2023/10/16 10:35:37.933 [PXE]  [2] fix tag override 224[2539536 - 2539760] 2539576 2539520 56
2023/10/16 10:35:37.933 [PXE]  [2] ## virt BIOS BCD file 16384 20480 20480...
2023/10/16 10:35:37.933 [PXE]  [2] file_entry and extend data in the same block.
2023/10/16 10:35:37.934 [PXE]  [2] fix tag override 224[4124688 - 4124912] 4124728 4124672 56
2023/10/16 10:35:37.934 [PXE]  [2] find target file, name_len:24, offset: 737768, upadte hash
2023/10/16 10:35:37.934 [PXE]  [2] find target file, name_len:24, offset: 3588336, upadte hash
2023/10/16 10:35:37.935 [PXE]  [2] update replace lookup entry_id:3895
2023/10/16 10:35:37.935 [PXE]  [2] find meta lookup entry_id:1, update resource head and hash(5442456)
2023/10/16 10:35:37.935 [PXE]  [2] Virt data ISO file size: 5814194176 6392303616
2023/10/16 10:35:37.935 [PXE]  [2] ================ OVERRIDE DUMP ================
2023/10/16 10:35:37.935 [PXE]  [2]  <0> [ 9816088 - 9816092 4 ]
2023/10/16 10:35:37.935 [PXE]  [2]  <1> [ 1056768 - 2531328 1474560 ]
2023/10/16 10:35:37.935 [PXE]  [2]  <2> [ 530432 - 530944 512 ]
2023/10/16 10:35:37.935 [PXE]  [2]  <3> [ 2598912 - 2599424 512 ]
2023/10/16 10:35:37.935 [PXE]  [2]  <4> [ 2539520 - 2540032 512 ]
2023/10/16 10:35:37.935 [PXE]  [2]  <5> [ 4124672 - 4125184 512 ]
2023/10/16 10:35:37.935 [PXE]  [2] ================ OVERRIDE DUMP ================
2023/10/16 10:35:37.935 [PXE]  [2] ================ VIRT RANGE DUMP ================
2023/10/16 10:35:37.935 [PXE]  [2]  <iso/19045.3393.Vibranium-X64-DE-XXL-SUPER-MULTI_WIN10_OFFICIAL.ISO> WIM:1/1
2023/10/16 10:35:37.935 [PXE]  [2]  <01> [5814194176 - 6385002496 570808320 ] Remap
2023/10/16 10:35:37.935 [PXE]  [2]  <02> [5814194176 - 5814194384 208       ] Memory
2023/10/16 10:35:37.935 [PXE]  [2]  <03> [6385002496 - 6386165760 1163264   ] Memory
2023/10/16 10:35:37.935 [PXE]  [2]  <04> [6385196644 - 6385197668 1024      ] iVentoy Param
2023/10/16 10:35:37.935 [PXE]  [2]  <05> [6386165760 - 6391609344 5443584   ] Memory
2023/10/16 10:35:37.935 [PXE]  [2]  <06> [6386903528 - 6386903548 20        ] WIM BIN CHK
2023/10/16 10:35:37.935 [PXE]  [2]  <07> [6389754096 - 6389754116 20        ] WIM BIN CHK
2023/10/16 10:35:37.935 [PXE]  [2]  <08> [6391609344 - 6392262656 653312    ] Memory
2023/10/16 10:35:37.935 [PXE]  [2]  <09> [6391804124 - 6391804144 20        ] WIM BIN CHK
2023/10/16 10:35:37.935 [PXE]  [2]  <10> [6391609424 - 6391609444 20        ] WIM META CHK
2023/10/16 10:35:37.935 [PXE]  [2]  <11> [6392262656 - 6392283136 20480     ] Memory
2023/10/16 10:35:37.935 [PXE]  [2]  <12> [6392283136 - 6392303616 20480     ] Memory
2023/10/16 10:35:37.935 [PXE]  [2] ================ VIRT RANGE DUMP ================
2023/10/16 10:35:37.935 [PXE]  [2] Phase2 parse image <iso/19045.3393.Vibranium-X64-DE-XXL-SUPER-MULTI_WIN10_OFFICIAL.ISO> finished success
2023/10/16 10:35:37.935 [PXE]  Update ipxe menu 1 ...
2023/10/16 10:35:37.935 [PXE]  ================= IMG TREE DUMP =================
2023/10/16 10:35:37.935 [PXE]  19045.3393.Vibranium-X64-DE-XXL-SUPER-MULTI_WIN10_OFFICIAL.ISO [2] <WIMS:1/1>
2023/10/16 10:35:37.935 [PXE]  Windows11_InsiderPreview_Client_x64_de-de_25951.iso [1] <WIMS:1/1>
2023/10/16 10:35:37.935 [PXE]  Windows_InsiderPreview_Server_vNext_de-de_25941.iso [4] <WIMS:1/1>
2023/10/16 10:35:37.935 [PXE]  de-de_windows_10_enterprise_ltsc_2021_x64_dvd_71796d33.iso [3] <WIMS:1/1>
2023/10/16 10:35:37.935 [PXE]  ================================================
2023/10/16 10:35:37.935 [HTTP] HTTP PXE service starting ...
2023/10/16 10:35:37.935 [TFTP] TFTP service starting ...
2023/10/16 10:35:37.935 [DHCP] DHCP service starting ...
2023/10/16 10:35:37.935 [HTTP] HTTP PXE service is running on 192.168.1.50:16000 ...
2023/10/16 10:35:37.935 [TFTP] TFTP write thread is running 83 ...
2023/10/16 10:35:37.935 [TFTP] TFTP service is running ...
2023/10/16 10:35:37.935 [UTIL] Bind Socket(192.168.1.50) to Device qvs0
2023/10/16 10:35:37.935 [NBD]  NBD service starting ...
2023/10/16 10:35:37.935 [DHCP] DHCP service is running ...
2023/10/16 10:35:37.935 [PXE]  Now save iventoy config data ...
2023/10/16 10:35:37.935 [HTTP] NBD service is running on 192.168.1.50:10809 ...
2023/10/16 10:35:37.935 [PXE]  iventoy config data (data/config.dat) save OK
2023/10/16 10:35:37.935 [PXE]  ===========================================================
2023/10/16 10:35:37.935 [PXE]         iVentoy 1.0.19 [Linux 64] is running now ...
2023/10/16 10:35:37.935 [PXE]  ===========================================================
2023/10/16 10:35:38.425 [HTTP] API request: <{"method":"query_status"}>
2023/10/16 10:35:38.476 [HTTP] API request: <{"method":"sys_ip_list"}>
2023/10/16 10:35:38.495 [HTTP] API request: <{"method":"get_dhcp_mode"}>
2023/10/16 10:36:02.095 [DHCP] Snooping 08-00-27-e7-44-cf MSG:<DISCOVER> ARCH:<EFI BC> (nil)
2023/10/16 10:36:02.095 [DHCP] snopping add client 08-00-27-e7-44-cf
2023/10/16 10:36:05.610 [DHCP] Snooping 08-00-27-e7-44-cf MSG:<REQUEST> ARCH:<EFI BC> 0x7f4f6c024180
2023/10/16 10:36:05.629 [TFTP] Parse tftp option(tsize,0)
2023/10/16 10:36:05.629 [TFTP] Parse tftp option(blksize,1468)
2023/10/16 10:36:05.629 [TFTP] Unsupported tftp option windowsize 4
2023/10/16 10:36:05.629 [TFTP] TFTP RRQ client 192.168.1.7:1204 download <iventoy_loader_16000_uefi> start ...
2023/10/16 10:36:05.629 [DHCP] snooping record found 192.168.1.7
2023/10/16 10:36:05.629 [TFTP] DHCP External client 192.168.1.7 should use loader ipxe.x64.snponly.efi.0
2023/10/16 10:36:05.629 [TFTP] Start send file iventoy_loader_16000_uefi to 192.168.1.7:1204 with blksize 1468, has oack 1
2023/10/16 10:36:05.632 [TFTP] Recv an ERROR opcode pkt from client 192.168.1.7:1204.
2023/10/16 10:36:05.632 [TFTP] Parse tftp option(blksize,1468)
2023/10/16 10:36:05.632 [TFTP] Unsupported tftp option windowsize 4
2023/10/16 10:36:05.632 [TFTP] TFTP RRQ client 192.168.1.7:1205 download <iventoy_loader_16000_uefi> start ...
2023/10/16 10:36:05.632 [DHCP] snooping record found 192.168.1.7
2023/10/16 10:36:05.632 [TFTP] DHCP External client 192.168.1.7 should use loader ipxe.x64.snponly.efi.0
2023/10/16 10:36:05.632 [TFTP] Start send file iventoy_loader_16000_uefi to 192.168.1.7:1205 with blksize 1468, has oack 1
2023/10/16 10:36:06.086 [TFTP] Finished send file to 192.168.1.7:1205 with blksize 1468 blks 206
2023/10/16 10:36:11.132 [DHCP] Snooping 08-00-27-e7-44-cf MSG:<DISCOVER> ARCH:<EFI BC> 0x7f4f6c024180
2023/10/16 10:36:12.131 [DHCP] Snooping 08-00-27-e7-44-cf MSG:<DISCOVER> ARCH:<EFI BC> 0x7f4f6c024180
2023/10/16 10:36:14.130 [DHCP] Snooping 08-00-27-e7-44-cf MSG:<REQUEST> ARCH:<EFI BC> 0x7f4f6c024180
2023/10/16 10:36:26.916 [HTTP] DHCP external  mode notify discovery client 192.168.1.7 ipxe/01-08-00-27-e7-44-cf/uefi/mask:255.255.255.0/gw:192.168.1.1/dns:192.168.1.3
2023/10/16 10:36:26.916 [PXE]  Client 08-00-27-e7-44-cf start PXE install in UEFI X64 mode.
2023/10/16 10:36:32.680 [HTTP] 200 HEAD /viso/id/2/mac:08:00:27:e7:44:cf/bus:PCI:01:80:86:10:04 size 6392303616
2023/10/16 10:37:26.959 [HTTP] Client 192.168.1.7:15207 (101) read timeout (close), state=0
Reply
#5
(10-14-2023, 08:32 AM)kriz84 Wrote: I tried in NAT mode too, so in this mode it must work cuz it shares my host IP Adress but it doesnt boot from PXE
also i tried Virtual Box, same problem, Bridge Mode dont boot up and NAT Mode it gets an 10.0 IP Adress, why? shouldnt it get my host IP Adress 192.168? I know this question is not related to iventoy directly, sorry but when VM boots up it have a connection

Is my dnsmasq configuration correct? anyone have ddwrt firmware and iventoy? Iam not sure if i should use External or ExternalNet, i dont understand the difference

I tested iVentoy on my QNAP running it in a Windows VM as well as in a LXC container using a DHCP server on the same subnet and it works (although I found it doesn't like to find some kind of .ima files in the ISO directory and it hangs while scanning the ISO images).
I still haven't tried to run iVentoy under QTS, anyway, in your environment you must use the "EXTERNAL" mode, not the "ExternalNet" mode, considering your DHCP server is on the same subnet as your iVentoy.

Read about third-party DHCP here:
https://www.iventoy.com/en/doc_ext_dhcp.html
"The usage scenario of External mode is that iVentoy and the third-party DHCP Server are located in the same LAN/VLAN".
"The usage scenario of ExternalNet mode is that iVentoy and the third-party DHCP Server are located in different LANs/VLANs."
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)