#18455: random reboots in TP-LINK 3500
------------------------+---------------------------------------
Reporter: tgayoso@… | Owner: developers
Type: defect | Status: new
Priority: normal | Milestone: Chaos Calmer (trunk)
Component: kernel | Version: Trunk
Resolution: | Keywords: unhandled paging requests
------------------------+---------------------------------------
Comment (by tgayoso@…):
@NBD, acknowledged and will try with defaul CFLAGS. I follow your commits
closely and rebuild regularly when you submit code to the AR71XX target.
Thanks.
@Bittortf, as requested:
{{{
root@netcat:~#
root@netcat:~#
root@netcat:~# date
Mon Dec 1 16:26:30 GMT 2014
root@netcat:~# ip address show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group
default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel master
br-lan state UP group default qlen 1000
link/ether a0:f3:c1:46:25:7b brd ff:ff:ff:ff:ff:ff
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc htb state UP
group default qlen 1000
link/ether a0:f3:c1:46:25:7e brd ff:ff:ff:ff:ff:ff
inet 24.232.217.36/24 brd 24.232.217.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::a2f3:c1ff:fe46:257e/64 scope link
valid_lft forever preferred_lft forever
4: ifb0: <BROADCAST,NOARP> mtu 1500 qdisc noop state DOWN group default
qlen 32
link/ether 72:41:30:6d:cb:0b brd ff:ff:ff:ff:ff:ff
5: ifb1: <BROADCAST,NOARP> mtu 1500 qdisc noop state DOWN group default
qlen 32
link/ether a6:37:56:b6:27:eb brd ff:ff:ff:ff:ff:ff
6: teql0: <NOARP> mtu 1500 qdisc noop state DOWN group default qlen 100
link/void
9: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UP group default
link/ether a0:f3:c1:46:25:7b brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global br-lan
valid_lft forever preferred_lft forever
inet6 fd5a:4d01:9e97::1/60 scope global
valid_lft forever preferred_lft forever
inet6 fe80::a2f3:c1ff:fe46:257b/64 scope link
valid_lft forever preferred_lft forever
10: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-
lan state UP group default qlen 1000
link/ether a0:f3:c1:46:25:7d brd ff:ff:ff:ff:ff:ff
inet6 fe80::a2f3:c1ff:fe46:257d/64 scope link
valid_lft forever preferred_lft forever
12: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-
lan state UP group default qlen 1000
link/ether a0:f3:c1:46:25:7c brd ff:ff:ff:ff:ff:ff
inet6 fe80::a2f3:c1ff:fe46:257c/64 scope link
valid_lft forever preferred_lft forever
13: ifb4eth1: <BROADCAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc htb state
UNKNOWN group default qlen 32
link/ether fa:cd:48:58:61:bd brd ff:ff:ff:ff:ff:ff
inet6 fe80::f8cd:48ff:fe58:61bd/64 scope link
valid_lft forever preferred_lft forever
root@netcat:~#
root@netcat:~#
root@netcat:~# for table in mangle filter nat raw; do ip6tables -t $table
-nxvL; done
Chain PREROUTING (policy ACCEPT 129 packets, 9778 bytes)
pkts bytes target prot opt in out source
destination
0 0 MARK tcp vtun+ * ::/0
::/0 MARK xset 0x2/0xff
0 0 DSCP all eth1 * ::/0
::/0 DSCP match !0x00 DSCP set 0x00
129 9778 fwmark all * * ::/0
::/0
Chain INPUT (policy ACCEPT 75 packets, 5890 bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 mssfix all * * ::/0
::/0
Chain OUTPUT (policy ACCEPT 123 packets, 12678 bytes)
pkts bytes target prot opt in out source
destination
35 6174 DSCP udp * * ::/0
::/0 multiport ports 123,53 DSCP set 0x24
Chain POSTROUTING (policy ACCEPT 177 packets, 16566 bytes)
pkts bytes target prot opt in out source
destination
0 0 QOS_MARK_eth1 all * eth1 ::/0
::/0 [goto] mark match 0x0/0xff
Chain QOS_MARK_eth1 (1 references)
pkts bytes target prot opt in out source
destination
0 0 MARK all * * ::/0
::/0 MARK xset 0x2/0xff
0 0 MARK all * * ::/0
::/0 DSCP match 0x08 MARK xset 0x3/0xff
0 0 MARK all * * ::/0
::/0 DSCP match 0x30 MARK xset 0x1/0xff
0 0 MARK all * * ::/0
::/0 DSCP match 0x2e MARK xset 0x1/0xff
0 0 MARK all * * ::/0
::/0 DSCP match 0x24 MARK xset 0x1/0xff
0 0 MARK all * * ::/0
::/0 tos match0x10/0x3f MARK xset 0x1/0xff
Chain fwmark (1 references)
pkts bytes target prot opt in out source
destination
Chain mssfix (1 references)
pkts bytes target prot opt in out source
destination
0 0 TCPMSS tcp * eth1 ::/0
::/0 tcp flags:0x06/0x02 /* wan (mtu_fix) */ TCPMSS clamp
to PMTU
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
75 5890 delegate_input all * * ::/0
::/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 delegate_forward all * * ::/0
::/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
123 12678 delegate_output all * * ::/0
::/0
Chain delegate_forward (1 references)
pkts bytes target prot opt in out source
destination
0 0 forwarding_rule all * * ::/0
::/0 /* user chain for forwarding */
0 0 ACCEPT all * * ::/0
::/0 ctstate RELATED,ESTABLISHED
0 0 zone_lan_forward all br-lan * ::/0
::/0
0 0 zone_wan_forward all eth1 * ::/0
::/0
0 0 reject all * * ::/0
::/0
Chain delegate_input (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all lo * ::/0
::/0
75 5890 input_rule all * * ::/0
::/0 /* user chain for input */
0 0 ACCEPT all * * ::/0
::/0 ctstate RELATED,ESTABLISHED
0 0 syn_flood tcp * * ::/0
::/0 tcp flags:0x17/0x02
75 5890 zone_lan_input all br-lan * ::/0
::/0
0 0 zone_wan_input all eth1 * ::/0
::/0
Chain delegate_output (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all * lo ::/0
::/0
123 12678 output_rule all * * ::/0
::/0 /* user chain for output */
35 6174 ACCEPT all * * ::/0
::/0 ctstate RELATED,ESTABLISHED
88 6504 zone_lan_output all * br-lan ::/0
::/0
0 0 zone_wan_output all * eth1 ::/0
::/0
Chain forwarding_lan_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain forwarding_wan_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain input_lan_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain input_wan_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain output_lan_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain output_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain output_wan_rule (1 references)
pkts bytes target prot opt in out source
destination
Chain reject (3 references)
pkts bytes target prot opt in out source
destination
0 0 REJECT tcp * * ::/0
::/0 reject-with tcp-reset
0 0 REJECT all * * ::/0
::/0 reject-with icmp6-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN tcp * * ::/0
::/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
0 0 DROP all * * ::/0
::/0
Chain zone_lan_dest_ACCEPT (2 references)
pkts bytes target prot opt in out source
destination
88 6504 ACCEPT all * br-lan ::/0
::/0
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source
destination
0 0 forwarding_lan_rule all * * ::/0
::/0 /* user chain for forwarding */
0 0 zone_wan_dest_ACCEPT all * * ::/0
::/0 /* forwarding lan -> wan */
0 0 zone_lan_dest_ACCEPT all * * ::/0
::/0
Chain zone_lan_input (1 references)
pkts bytes target prot opt in out source
destination
75 5890 input_lan_rule all * * ::/0
::/0 /* user chain for input */
75 5890 zone_lan_src_ACCEPT all * * ::/0
::/0
Chain zone_lan_output (1 references)
pkts bytes target prot opt in out source
destination
88 6504 output_lan_rule all * * ::/0
::/0 /* user chain for output */
88 6504 zone_lan_dest_ACCEPT all * * ::/0
::/0
Chain zone_lan_src_ACCEPT (1 references)
pkts bytes target prot opt in out source
destination
75 5890 ACCEPT all br-lan * ::/0
::/0
Chain zone_wan_dest_ACCEPT (2 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all * eth1 ::/0
::/0
Chain zone_wan_dest_REJECT (1 references)
pkts bytes target prot opt in out source
destination
0 0 reject all * eth1 ::/0
::/0
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source
destination
0 0 forwarding_wan_rule all * * ::/0
::/0 /* user chain for forwarding */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 128 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Forward */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 129 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Forward */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 1 limit: avg 1000/sec burst 5 /* Allow-
ICMPv6-Forward */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 2 limit: avg 1000/sec burst 5 /* Allow-
ICMPv6-Forward */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 3 limit: avg 1000/sec burst 5 /* Allow-
ICMPv6-Forward */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 4 code 0 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Forward */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 4 code 1 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Forward */
0 0 zone_wan_dest_REJECT all * * ::/0
::/0
Chain zone_wan_input (1 references)
pkts bytes target prot opt in out source
destination
0 0 input_wan_rule all * * ::/0
::/0 /* user chain for input */
0 0 ACCEPT udp * * fe80::/10
fe80::/10 udp spt:547 dpt:546 /* Allow-DHCPv6 */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 128 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 129 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 1 limit: avg 1000/sec burst 5 /* Allow-
ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 2 limit: avg 1000/sec burst 5 /* Allow-
ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 3 limit: avg 1000/sec burst 5 /* Allow-
ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 4 code 0 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 4 code 1 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 133 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 135 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 134 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 136 limit: avg 1000/sec burst 5 /*
Allow-ICMPv6-Input */
0 0 zone_wan_src_REJECT all * * ::/0
::/0
Chain zone_wan_output (1 references)
pkts bytes target prot opt in out source
destination
0 0 output_wan_rule all * * ::/0
::/0 /* user chain for output */
0 0 zone_wan_dest_ACCEPT all * * ::/0
::/0
Chain zone_wan_src_REJECT (1 references)
pkts bytes target prot opt in out source
destination
0 0 reject all eth1 * ::/0
::/0
ip6tables v1.4.21: can't initialize ip6tables table `nat': Table does not
exist (do you need to insmod?)
Perhaps ip6tables or your kernel needs to be upgraded.
Chain PREROUTING (policy ACCEPT 129 packets, 9778 bytes)
pkts bytes target prot opt in out source
destination
129 9778 delegate_notrack all * * ::/0
::/0
Chain OUTPUT (policy ACCEPT 123 packets, 12678 bytes)
pkts bytes target prot opt in out source
destination
Chain delegate_notrack (1 references)
pkts bytes target prot opt in out source
destination
root@netcat:~#
}}}
--
Ticket URL: <https://dev.openwrt.org/ticket/18455#comment:5>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets