#19438: Cause kernel panic by executing `/etc/init.d/network restart` in 
net.bridge
.bridge-nf-call-iptables=1 enviroment
--------------------+-----------------------------------
 Reporter:  pizz@…  |      Owner:  developers
     Type:  defect  |     Status:  new
 Priority:  normal  |  Milestone:  Barrier Breaker 14.07
Component:  kernel  |    Version:  Barrier Breaker 14.07
 Keywords:          |
--------------------+-----------------------------------
 In net.bridge.bridge-nf-call-iptables(or ip6tables)=1 system,
 execute `/etc/init.d/network restart` to always causes kernel panic.

 when wrote "net.bridge.bridge-nf-call-iptables=1" to /etc/sysctl.conf,
 reboot loop happened.

 and all ethernet cables is unplugged,those problems not occurred.

 {{{
   _______                     ________        __
  |       |.-----.-----.-----.|  |  |  |.----.|  |_
  |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
  |_______||   __|_____|__|__||________||__|  |____|
           |__| W I R E L E S S   F R E E D O M
  -----------------------------------------------------
  BARRIER BREAKER (14.07, r42625)
  -----------------------------------------------------
   * 1/2 oz Galliano         Pour all ingredients into
   * 4 oz cold Coffee        an irish coffee mug filled
   * 1 1/2 oz Dark Rum       with crushed ice. Stir.
   * 2 tsp. Creme de Cacao
  -----------------------------------------------------
 root@OpenWrt:~# cat /tmp/sysinfo/*
 ap135-020
 Atheros AP135-020 reference board
 root@OpenWrt:~#
 }}}

 {{{
 root@OpenWrt:~# echo 1 > /proc/sys/net/bridge/bridge-nf-call-iptables
 root@OpenWrt:~# ls /proc/sys/net/bridge/bridge-nf-*tables > /dev/kmsg
 root@OpenWrt:~# cat /proc/sys/net/bridge/bridge-nf-*tables > /dev/kmsg
 root@OpenWrt:~# /etc/init.d/network restart
 Write failed: Connection reset by peer
 }}}
 {{{
 root@OpenWrt:~# cat /sys/kernel/debug/crashlog
 Time: 1428500945.600099
 Modules:        ath9k@832e0000+15931    ath9k_common@83178000+2cad
 pppoe@831b6000+1e40     ppp_async@83264000+1800 iptable_nat@8314e000+7b0
 ath9k_hw@83280000+4ce3f ath@83138000+4d05       pppox@83127000+53a
 ppp_generic@83148000+4cb2       nf_nat_ipv4@830f6000+a5e
 nf_conntrack_ipv4@83256000+1444mac80211@83200000+54851
 ipt_MASQUERADE@83143000+470
 ebtable_nat@830f1000+390ebtable_filter@8312f000+390
 ebtable_broute@83144000+2f0     cfg80211@83180000+30447
 xt_time@830f7000+680    xt_tcpudp@830f5000+690  xt_state@830ea000+2b0
 xt_quota@830ef000+2e0    xt_pkttype@830ec000+260 xt_physdev@830e4000+530
 xt_owner@830e8000+2b0   xt_nat@830e6000+430     xt_multiport@830e3000+4a0
 xt_mark@830e1000+2a0    xt_mac@830d9000+260     xt_limit@830de000+3e0
 xt_id@830da000+1e0      xt_conntrack@830d3000+870
 xt_comment@830cf000+1e0 xt_addrtype@830d6000+850
 xt_TCPMSS@830cb000+a70  xt_REDIRECT@830ca000+420
 xt_LOG@830d0000+2510    xt_CT@830c2000+8e0      slhc@830c8000+10cb
 nf_nat_irc@830c7000+3d0 nf_nat_ftp@83072000+4b0 nf_nat@830c4000+2960
 nf_defrag_ipv4@83028000+316     nf_conntrack_irc@8307f000+ae0
 nf_conntrack_ftp@83064000+1400  iptable_raw@8307e000+280
 iptable_mangle@8307d000+3c0     iptable_filter@83063000+2d0
 ipt_REJECT@83078000+710 ip_tables@83024000+23ed ebtables@83020000+37e5
 ebt_vlan@83071000+380    ebt_stp@83066000+710    ebt_redirect@83062000+340
 ebt_pkttype@83033000+210 ebt_mark_m@83037000+250 ebt_mark@83031000+290
 ebt_limit@83032000+390  ebt_among@8303a000+830  ebt_802_3@83030000+2b0
 crc_ccitt@83b8b000+3fb  compat@83068000+7c4     ip6t_REJECT@8303c000+7f0
 ip6table_raw@830bd000+240       ip6table_mangle@8304b000+420
 ip6table_filter@83046000+290   ip6_tables@8306c000+2391
 x_tables@83048000+2af5
 nf_conntrack_ipv6@8305c000+15b0nf_conntrack@83050000+b3be
 nf_defrag_ipv6@83bac000+2207    ipv6@83080000+3cc6c     arc4@83ba3000+520
 crypto_blkcipher@83b94000+2887  usb_storage@83b60000+8d98
 ehci_platform@83b18000+750      ehci_hcd@83af8000+783c
 sd_mod@83b58000+5ff0    scsi_mod@83b40000+12c42
 gpio_button_hotplug@83af4000+1160      usbcore@83b20000+1acd5
 nls_base@83ade000+136e  usb_common@83ad9000+488

 !!!!!!!!!!!!!!!!!snipped!!!!!!!!!!!!!!!!!

 <12>[  693.950000] /proc/sys/net/bridge/bridge-nf-call-arptables
 <12>[  693.950000] /proc/sys/net/bridge/bridge-nf-call-ip6tables
 <12>[  693.950000] /proc/sys/net/bridge/bridge-nf-call-iptables
 <12>[  701.330000] 0
 <12>[  701.330000] 0
 <12>[  701.330000] 1
 <6>[  710.410000] br-lan: port 2(eth1) entered disabled state
 <6>[  710.410000] br-lan: port 1(eth0) entered disabled state
 <6>[  710.420000] device eth0 left promiscuous mode
 <6>[  710.420000] br-lan: port 1(eth0) entered disabled state
 <6>[  710.430000] eth0: link down
 <6>[  710.430000] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
 <6>[  710.450000] device eth1 left promiscuous mode
 <6>[  710.450000] br-lan: port 2(eth1) entered disabled state
 <6>[  710.460000] eth1: link down
 <6>[  710.460000] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
 <6>[  713.470000] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
 <6>[  713.470000] device eth0 entered promiscuous mode
 <6>[  713.480000] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
 <6>[  713.510000] eth1: link up (1000Mbps/Full duplex)
 <6>[  713.510000] device eth1 entered promiscuous mode
 <1>[  713.850000] CPU 0 Unable to handle kernel paging request at virtual
 address 00000004, epc == 800a9a54, ra == 802405dc
 <4>[  713.850000] Oops[#1]:
 <4>[  713.850000] CPU: 0 PID: 1571 Comm: fw3 Not tainted 3.10.49 #3
 <4>[  713.850000] task: 839154f0 ti: 82cb0000 task.ti: 82cb0000
 <4>[  713.850000] $ 0   : 00000000 7f9368c0 831239c0 00000001
 <4>[  713.850000] $ 4   : 00000000 833a5444 00000000 00020000
 <4>[  713.850000] $ 8   : 00000020 800648f0 00000000 00000001
 <4>[  713.850000] $12   : 00000000 833abf14 00000000 00000000
 <4>[  713.850000] $16   : 833a5400 00001000 7fffffff 00000000
 <4>[  713.850000] $20   : 82cb1ca0 833a5444 833a5444 82cb1ca4
 <4>[  713.850000] $24   : 00000000 77ce7690
 <4>[  713.850000] $28   : 82cb0000 82cb1c38 7fffffff 802405dc
 <4>[  713.850000] Hi    : 00000000
 <4>[  713.850000] Lo    : 000116b3
 <4>[  713.850000] epc   : 800a9a54 __skb_recv_datagram+0x154/0x2f8
 <4>[  713.850000]     Not tainted
 <4>[  713.850000] ra    : 802405dc skb_recv_datagram+0x28/0x34
 <4>[  713.850000] Status: 1100fc02      KERNEL EXL
 <4>[  713.850000] Cause : 0080000c
 <4>[  713.850000] BadVA : 00000004
 <4>[  713.850000] PrId  : 00019750 (MIPS 74Kc)
 <4>[  713.850000] Modules linked in: ath9k ath9k_common pppoe ppp_async
 iptable_nat ath9k_hw ath pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv4
 mac80211 ipt_MASQUERADE ebtable_nat ebtable_filter ebtable_broute cfg80211
 xt_time xt_tcpudp xt_state xt_quota xt_pkttype xt_physdev xt_owner xt_nat
 xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment
 xt_addrtype xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_nat_irc nf_nat_ftp
 nf_nat nf_defrag_ipv4 nf_conntrack_irc nf_conntrack_ftp iptable_raw
 iptable_mangle iptable_filter ipt_REJECT ip_tables ebtables ebt_vlan
 ebt_stp ebt_redirect ebt_pkttype ebt_mark_m ebt_mark ebt_limit ebt_among
 ebt_802_3 crc_ccitt compat ip6t_REJECT ip6table_raw ip6table_mangle
 ip6table_filter ip6_tables x_tables nf_conntrack_ipv6 nf_conntrack
 nf_defrag_ipv6 ipv6 arc4 crypto_blkcipher usb_storage ehci_platform
 ehci_hcd sd_mod scsi_mod gpio_button_hotplug usbcore nls_base usb_common
 <4>[  713.850000] Process fw3 (pid: 1571, threadinfo=82cb0000,
 task=839154f0, tls=77e02880)
 <4>[  713.850000] Stack : 00000c98 00000000 83ae8280 833a5400 831239c0
 800a0d90 00000000 00000000
 <4>[  713.850000]         00000000 00000000 833a5400 00001000 82cb1ef8
 00000000 82cb1d90 00000000
 <4>[  713.850000]         834fbc60 00001000 7f936878 802405dc 8021c054
 00000000 00000000 00000000
 <4>[  713.850000]         82cb1ce8 80344e78 00000000 00000000 fffffffc
 801c662c 00000001 801c6468
 <4>[  713.850000]         80344e78 802a5000 831239c0 802405fc 82cb1cc8
 82cb1cc8 83846400 831239c0
 <4>[  713.850000]         ...
 <4>[  713.850000] Call Trace:
 <4>[  713.850000] [<800a9a54>] __skb_recv_datagram+0x154/0x2f8
 <4>[  713.850000] [<802405dc>] skb_recv_datagram+0x28/0x34
 <4>[  713.850000] [<801c662c>] netlink_recvmsg+0x5c/0x330
 <4>[  713.850000] [<802448dc>] sock_recvmsg+0x88/0xb4
 <4>[  713.850000] [<800812d0>] ___sys_recvmsg.part.31+0xe8/0x188
 <4>[  713.850000] [<800ab898>] __sys_recvmsg+0x58/0x8c
 <4>[  713.850000] [<800625b0>] stack_done+0x20/0x44
 <4>[  713.850000]
 <4>[  713.850000]
 <4>[  713.850000] Code: 8c450004  ac400000  ac400004 <acc50004> aca60000
 10600002  41606000  41606020  000000c0
 <4>[  714.130000] ---[ end trace 15498a27fe934ce1 ]---

 ===================================
 Time: 1428500946.244478

 }}}

--
Ticket URL: <https://dev.openwrt.org/ticket/19438>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to