#18455: random reboots in TP-LINK 3500
------------------------+---------------------------------------
  Reporter:  tgayoso@…  |      Owner:  developers
      Type:  defect     |     Status:  new
  Priority:  normal     |  Milestone:  Chaos Calmer (trunk)
 Component:  kernel     |    Version:  Trunk
Resolution:             |   Keywords:  unhandled paging requests
------------------------+---------------------------------------

Comment (by tgayoso@…):

 @NBD, acknowledged and will try with defaul CFLAGS. I follow your commits
 closely and rebuild regularly when you submit code to the AR71XX target.
 Thanks.

 @Bittortf, as requested:


 {{{

 root@netcat:~#
 root@netcat:~#
 root@netcat:~# date
 Mon Dec  1 16:26:30 GMT 2014
 root@netcat:~# ip address show
 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group
 default
     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
     inet 127.0.0.1/8 scope host lo
        valid_lft forever preferred_lft forever
     inet6 ::1/128 scope host
        valid_lft forever preferred_lft forever
 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel master
 br-lan state UP group default qlen 1000
     link/ether a0:f3:c1:46:25:7b brd ff:ff:ff:ff:ff:ff
 3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc htb state UP
 group default qlen 1000
     link/ether a0:f3:c1:46:25:7e brd ff:ff:ff:ff:ff:ff
     inet 24.232.217.36/24 brd 24.232.217.255 scope global eth1
        valid_lft forever preferred_lft forever
     inet6 fe80::a2f3:c1ff:fe46:257e/64 scope link
        valid_lft forever preferred_lft forever
 4: ifb0: <BROADCAST,NOARP> mtu 1500 qdisc noop state DOWN group default
 qlen 32
     link/ether 72:41:30:6d:cb:0b brd ff:ff:ff:ff:ff:ff
 5: ifb1: <BROADCAST,NOARP> mtu 1500 qdisc noop state DOWN group default
 qlen 32
     link/ether a6:37:56:b6:27:eb brd ff:ff:ff:ff:ff:ff
 6: teql0: <NOARP> mtu 1500 qdisc noop state DOWN group default qlen 100
     link/void
 9: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
 UP group default
     link/ether a0:f3:c1:46:25:7b brd ff:ff:ff:ff:ff:ff
     inet 192.168.1.1/24 brd 192.168.1.255 scope global br-lan
        valid_lft forever preferred_lft forever
     inet6 fd5a:4d01:9e97::1/60 scope global
        valid_lft forever preferred_lft forever
     inet6 fe80::a2f3:c1ff:fe46:257b/64 scope link
        valid_lft forever preferred_lft forever
 10: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-
 lan state UP group default qlen 1000
     link/ether a0:f3:c1:46:25:7d brd ff:ff:ff:ff:ff:ff
     inet6 fe80::a2f3:c1ff:fe46:257d/64 scope link
        valid_lft forever preferred_lft forever
 12: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-
 lan state UP group default qlen 1000
     link/ether a0:f3:c1:46:25:7c brd ff:ff:ff:ff:ff:ff
     inet6 fe80::a2f3:c1ff:fe46:257c/64 scope link
        valid_lft forever preferred_lft forever
 13: ifb4eth1: <BROADCAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc htb state
 UNKNOWN group default qlen 32
     link/ether fa:cd:48:58:61:bd brd ff:ff:ff:ff:ff:ff
     inet6 fe80::f8cd:48ff:fe58:61bd/64 scope link
        valid_lft forever preferred_lft forever
 root@netcat:~#
 root@netcat:~#
 root@netcat:~# for table in mangle filter nat raw; do ip6tables -t $table
 -nxvL; done
 Chain PREROUTING (policy ACCEPT 129 packets, 9778 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 MARK       tcp      vtun+  *       ::/0
 ::/0                 MARK xset 0x2/0xff
        0        0 DSCP       all      eth1   *       ::/0
 ::/0                 DSCP match !0x00 DSCP set 0x00
      129     9778 fwmark     all      *      *       ::/0
 ::/0

 Chain INPUT (policy ACCEPT 75 packets, 5890 bytes)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 mssfix     all      *      *       ::/0
 ::/0

 Chain OUTPUT (policy ACCEPT 123 packets, 12678 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
       35     6174 DSCP       udp      *      *       ::/0
 ::/0                 multiport ports 123,53 DSCP set 0x24

 Chain POSTROUTING (policy ACCEPT 177 packets, 16566 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 QOS_MARK_eth1  all      *      eth1    ::/0
 ::/0                [goto]  mark match 0x0/0xff

 Chain QOS_MARK_eth1 (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 MARK       all      *      *       ::/0
 ::/0                 MARK xset 0x2/0xff
        0        0 MARK       all      *      *       ::/0
 ::/0                 DSCP match 0x08 MARK xset 0x3/0xff
        0        0 MARK       all      *      *       ::/0
 ::/0                 DSCP match 0x30 MARK xset 0x1/0xff
        0        0 MARK       all      *      *       ::/0
 ::/0                 DSCP match 0x2e MARK xset 0x1/0xff
        0        0 MARK       all      *      *       ::/0
 ::/0                 DSCP match 0x24 MARK xset 0x1/0xff
        0        0 MARK       all      *      *       ::/0
 ::/0                 tos match0x10/0x3f MARK xset 0x1/0xff

 Chain fwmark (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain mssfix (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 TCPMSS     tcp      *      eth1    ::/0
 ::/0                 tcp flags:0x06/0x02 /* wan (mtu_fix) */ TCPMSS clamp
 to PMTU
 Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
       75     5890 delegate_input  all      *      *       ::/0
 ::/0

 Chain FORWARD (policy DROP 0 packets, 0 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 delegate_forward  all      *      *       ::/0
 ::/0

 Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
      123    12678 delegate_output  all      *      *       ::/0
 ::/0

 Chain delegate_forward (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 forwarding_rule  all      *      *       ::/0
 ::/0                 /* user chain for forwarding */
        0        0 ACCEPT     all      *      *       ::/0
 ::/0                 ctstate RELATED,ESTABLISHED
        0        0 zone_lan_forward  all      br-lan *       ::/0
 ::/0
        0        0 zone_wan_forward  all      eth1   *       ::/0
 ::/0
        0        0 reject     all      *      *       ::/0
 ::/0

 Chain delegate_input (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 ACCEPT     all      lo     *       ::/0
 ::/0
       75     5890 input_rule  all      *      *       ::/0
 ::/0                 /* user chain for input */
        0        0 ACCEPT     all      *      *       ::/0
 ::/0                 ctstate RELATED,ESTABLISHED
        0        0 syn_flood  tcp      *      *       ::/0
 ::/0                 tcp flags:0x17/0x02
       75     5890 zone_lan_input  all      br-lan *       ::/0
 ::/0
        0        0 zone_wan_input  all      eth1   *       ::/0
 ::/0

 Chain delegate_output (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 ACCEPT     all      *      lo      ::/0
 ::/0
      123    12678 output_rule  all      *      *       ::/0
 ::/0                 /* user chain for output */
       35     6174 ACCEPT     all      *      *       ::/0
 ::/0                 ctstate RELATED,ESTABLISHED
       88     6504 zone_lan_output  all      *      br-lan  ::/0
 ::/0
        0        0 zone_wan_output  all      *      eth1    ::/0
 ::/0

 Chain forwarding_lan_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain forwarding_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain forwarding_wan_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain input_lan_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain input_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain input_wan_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain output_lan_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain output_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain output_wan_rule (1 references)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain reject (3 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 REJECT     tcp      *      *       ::/0
 ::/0                 reject-with tcp-reset
        0        0 REJECT     all      *      *       ::/0
 ::/0                 reject-with icmp6-port-unreachable

 Chain syn_flood (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 RETURN     tcp      *      *       ::/0
 ::/0                 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
        0        0 DROP       all      *      *       ::/0
 ::/0

 Chain zone_lan_dest_ACCEPT (2 references)
     pkts      bytes target     prot opt in     out     source
 destination
       88     6504 ACCEPT     all      *      br-lan  ::/0
 ::/0

 Chain zone_lan_forward (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 forwarding_lan_rule  all      *      *       ::/0
 ::/0                 /* user chain for forwarding */
        0        0 zone_wan_dest_ACCEPT  all      *      *       ::/0
 ::/0                 /* forwarding lan -> wan */
        0        0 zone_lan_dest_ACCEPT  all      *      *       ::/0
 ::/0

 Chain zone_lan_input (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
       75     5890 input_lan_rule  all      *      *       ::/0
 ::/0                 /* user chain for input */
       75     5890 zone_lan_src_ACCEPT  all      *      *       ::/0
 ::/0

 Chain zone_lan_output (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
       88     6504 output_lan_rule  all      *      *       ::/0
 ::/0                 /* user chain for output */
       88     6504 zone_lan_dest_ACCEPT  all      *      *       ::/0
 ::/0

 Chain zone_lan_src_ACCEPT (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
       75     5890 ACCEPT     all      br-lan *       ::/0
 ::/0

 Chain zone_wan_dest_ACCEPT (2 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 ACCEPT     all      *      eth1    ::/0
 ::/0

 Chain zone_wan_dest_REJECT (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 reject     all      *      eth1    ::/0
 ::/0

 Chain zone_wan_forward (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 forwarding_wan_rule  all      *      *       ::/0
 ::/0                 /* user chain for forwarding */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 128 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Forward */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 129 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Forward */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 1 limit: avg 1000/sec burst 5 /* Allow-
 ICMPv6-Forward */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 2 limit: avg 1000/sec burst 5 /* Allow-
 ICMPv6-Forward */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 3 limit: avg 1000/sec burst 5 /* Allow-
 ICMPv6-Forward */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 4 code 0 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Forward */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 4 code 1 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Forward */
        0        0 zone_wan_dest_REJECT  all      *      *       ::/0
 ::/0

 Chain zone_wan_input (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 input_wan_rule  all      *      *       ::/0
 ::/0                 /* user chain for input */
        0        0 ACCEPT     udp      *      *       fe80::/10
 fe80::/10            udp spt:547 dpt:546 /* Allow-DHCPv6 */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 128 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 129 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 1 limit: avg 1000/sec burst 5 /* Allow-
 ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 2 limit: avg 1000/sec burst 5 /* Allow-
 ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 3 limit: avg 1000/sec burst 5 /* Allow-
 ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 4 code 0 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 4 code 1 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 133 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 135 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 134 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 ACCEPT     icmpv6    *      *       ::/0
 ::/0                 ipv6-icmptype 136 limit: avg 1000/sec burst 5 /*
 Allow-ICMPv6-Input */
        0        0 zone_wan_src_REJECT  all      *      *       ::/0
 ::/0

 Chain zone_wan_output (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 output_wan_rule  all      *      *       ::/0
 ::/0                 /* user chain for output */
        0        0 zone_wan_dest_ACCEPT  all      *      *       ::/0
 ::/0

 Chain zone_wan_src_REJECT (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
        0        0 reject     all      eth1   *       ::/0
 ::/0
 ip6tables v1.4.21: can't initialize ip6tables table `nat': Table does not
 exist (do you need to insmod?)
 Perhaps ip6tables or your kernel needs to be upgraded.
 Chain PREROUTING (policy ACCEPT 129 packets, 9778 bytes)
     pkts      bytes target     prot opt in     out     source
 destination
      129     9778 delegate_notrack  all      *      *       ::/0
 ::/0

 Chain OUTPUT (policy ACCEPT 123 packets, 12678 bytes)
     pkts      bytes target     prot opt in     out     source
 destination

 Chain delegate_notrack (1 references)
     pkts      bytes target     prot opt in     out     source
 destination
 root@netcat:~#



 }}}

--
Ticket URL: <https://dev.openwrt.org/ticket/18455#comment:5>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to