On 10/14/25 23:35, Lance Hathaway via Dnsmasq-discuss wrote:
Hi all,
I have a setup with dnsmasq providing DHCP / TFTP / PXE service for
network clients booting Windows PE. These are the relevant lines from
the configuration:
enable-tftp
tftp-root=/srv/tftpboot
pxe-service=X86-64_EFI, "WinPE UEFI PXE - 2011", Boot/bootmgfw.efi
pxe-service=X86-64_EFI, "WinPE UEFI PXE - 2023", Boot/bootmgfw_EX.efi
pxe-prompt="Press ENTER to select PXE boot option.",5
Individually, both of these pxe-service lines work correctly—they both
boot the desired systems (depending on which Secure Boot certificate the
target system has installed). But that's only in an individual state
(that is, with the second pxe-service line commented out). If both lines
are uncommented, I see the pxe-prompt, and I can trigger the menu and
select an option, but then the Windows PE boot loader throws an error
message that seems to indicate the BCD (a separate file served via TFTP)
is not accessible.
I'm not looking for help troubleshooting Windows-specific boot behavior.
The thing that is weirding me out a bit is that the boot works perfectly
with both options, so long as there's only one option active (and the
other one commented out). They both use the same BCD file, loaded via
TFTP, without any complaints at all. Why would changing dnsmasq's
configuration to have both options enabled change the behavior of the
boot loader's execution?
The information in the pxe-service lines and the pxe-prompt line gets
combined and sent to the PXE client as a single data-structure. It's
possible that dnsmasq does this wrong, but it's also possible that the
PXE client extracts information from the data wrongly and end up with
the wrong (or corrupted) filenames for TFTP. A priori, either are possible.
If there's any sort of packet capture or additional information I can
provide, I'm happy to do so. Appreciate everybody's time and any
suggestions people might have!
Add log-dhcp to your dnsmasq configuration , which will give you much
more information in the syslog. The next stage after that would be
dumpfile=/tmp/dnsmasq.pcap
dumpmask=0x9000
That will dump all DHCPv4/PCE and TFTP packets sent and received into a
file you can examine with Wireshark.
Feel free to send my the packet dump file if it's not making sense.
Cheers,
Simon.
-Lance
How am I doing?
Simply click on one of the faces below
<https://web.crewhu.com/#/survey?
crewhu_id=63349f67307e475c4d37f290&users_ids=633c6f7f426da84c0202cc30&survey_type_code=typSignature&custom_code=&rating=5&>
Great!
<https://web.crewhu.com/#/survey?
crewhu_id=63349f67307e475c4d37f290&users_ids=633c6f7f426da84c0202cc30&survey_type_code=typSignature&custom_code=&rating=0&>
Meh.
<https://web.crewhu.com/#/survey?
crewhu_id=63349f67307e475c4d37f290&users_ids=633c6f7f426da84c0202cc30&survey_type_code=typSignature&custom_code=&rating=-5&>
*Sigh*
Adaptive-Logo-Email.jpg<https://beadaptive.ca>
Lance Hathaway
Senior Network Engineer
,
Adaptive Technical Inc.
P:
<tel:(604)%20637-6412>604-357-3456 <tel:604-357-3456>
|
E:
<mailto:[email protected]>[email protected] <mailto:[email protected]>
|
W:
<http://www.beadaptive.ca/>www.beadaptive.ca <https://beadaptive.ca>
A: <https://goo.gl/maps/bQyZKHy8xiA2>
258 - 4664 Lougheed Hwy
Burnaby, BC, V5C 5T5 <https://goo.gl/maps/bQyZKHy8xiA2>
Facebook.png <https://www.facebook.com/beadaptive/>
LinkedIn.png <https://www.linkedin.com/company/271640>
Twitter.png <https://twitter.com/beadaptiveca>
_______________________________________________
Dnsmasq-discuss mailing list
[email protected]
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss
_______________________________________________
Dnsmasq-discuss mailing list
[email protected]
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss