Modify

Opened 3 years ago

Closed 2 years ago

Last modified 21 months ago

#19438 closed defect (worksforme)

Cause kernel panic by executing `/etc/init.d/network restart` in net.bridge.bridge-nf-call-iptables=1 enviroment

Reported by: pizz@… Owned by: developers
Priority: normal Milestone: Barrier Breaker 14.07
Component: kernel Version: Barrier Breaker 14.07
Keywords: Cc:

Description

In net.bridge.bridge-nf-call-iptables(or ip6tables)=1 system,
execute /etc/init.d/network restart to always causes kernel panic.

when wrote "net.bridge.bridge-nf-call-iptables=1" to /etc/sysctl.conf,
reboot loop happened.

and all ethernet cables is unplugged,those problems not occurred.

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 BARRIER BREAKER (14.07, r42625)
 -----------------------------------------------------
  * 1/2 oz Galliano         Pour all ingredients into
  * 4 oz cold Coffee        an irish coffee mug filled
  * 1 1/2 oz Dark Rum       with crushed ice. Stir.
  * 2 tsp. Creme de Cacao
 -----------------------------------------------------
root@OpenWrt:~# cat /tmp/sysinfo/*
ap135-020
Atheros AP135-020 reference board
root@OpenWrt:~#
root@OpenWrt:~# echo 1 > /proc/sys/net/bridge/bridge-nf-call-iptables
root@OpenWrt:~# ls /proc/sys/net/bridge/bridge-nf-*tables > /dev/kmsg
root@OpenWrt:~# cat /proc/sys/net/bridge/bridge-nf-*tables > /dev/kmsg
root@OpenWrt:~# /etc/init.d/network restart
Write failed: Connection reset by peer
root@OpenWrt:~# cat /sys/kernel/debug/crashlog
Time: 1428500945.600099
Modules:        ath9k@832e0000+15931    ath9k_common@83178000+2cad      pppoe@831b6000+1e40     ppp_async@83264000+1800 iptable_nat@8314e000+7b0        ath9k_hw@83280000+4ce3f ath@83138000+4d05       pppox@83127000+53a      ppp_generic@83148000+4cb2       nf_nat_ipv4@830f6000+a5e        nf_conntrack_ipv4@83256000+1444mac80211@83200000+54851  ipt_MASQUERADE@83143000+470     ebtable_nat@830f1000+390ebtable_filter@8312f000+390     ebtable_broute@83144000+2f0     cfg80211@83180000+30447 xt_time@830f7000+680    xt_tcpudp@830f5000+690  xt_state@830ea000+2b0  xt_quota@830ef000+2e0    xt_pkttype@830ec000+260 xt_physdev@830e4000+530 xt_owner@830e8000+2b0   xt_nat@830e6000+430     xt_multiport@830e3000+4a0       xt_mark@830e1000+2a0    xt_mac@830d9000+260     xt_limit@830de000+3e0   xt_id@830da000+1e0      xt_conntrack@830d3000+870       xt_comment@830cf000+1e0 xt_addrtype@830d6000+850        xt_TCPMSS@830cb000+a70  xt_REDIRECT@830ca000+420        xt_LOG@830d0000+2510    xt_CT@830c2000+8e0      slhc@830c8000+10cb      nf_nat_irc@830c7000+3d0 nf_nat_ftp@83072000+4b0 nf_nat@830c4000+2960    nf_defrag_ipv4@83028000+316     nf_conntrack_irc@8307f000+ae0   nf_conntrack_ftp@83064000+1400  iptable_raw@8307e000+280        iptable_mangle@8307d000+3c0     iptable_filter@83063000+2d0     ipt_REJECT@83078000+710 ip_tables@83024000+23ed ebtables@83020000+37e5 ebt_vlan@83071000+380    ebt_stp@83066000+710    ebt_redirect@83062000+340      ebt_pkttype@83033000+210 ebt_mark_m@83037000+250 ebt_mark@83031000+290   ebt_limit@83032000+390  ebt_among@8303a000+830  ebt_802_3@83030000+2b0  crc_ccitt@83b8b000+3fb  compat@83068000+7c4     ip6t_REJECT@8303c000+7f0        ip6table_raw@830bd000+240       ip6table_mangle@8304b000+420    ip6table_filter@83046000+290   ip6_tables@8306c000+2391 x_tables@83048000+2af5  nf_conntrack_ipv6@8305c000+15b0nf_conntrack@83050000+b3be       nf_defrag_ipv6@83bac000+2207    ipv6@83080000+3cc6c     arc4@83ba3000+520       crypto_blkcipher@83b94000+2887  usb_storage@83b60000+8d98       ehci_platform@83b18000+750      ehci_hcd@83af8000+783c  sd_mod@83b58000+5ff0    scsi_mod@83b40000+12c42 gpio_button_hotplug@83af4000+1160      usbcore@83b20000+1acd5   nls_base@83ade000+136e  usb_common@83ad9000+488

!!!!!!!!!!!!!!!!!snipped!!!!!!!!!!!!!!!!!

<12>[  693.950000] /proc/sys/net/bridge/bridge-nf-call-arptables
<12>[  693.950000] /proc/sys/net/bridge/bridge-nf-call-ip6tables
<12>[  693.950000] /proc/sys/net/bridge/bridge-nf-call-iptables
<12>[  701.330000] 0
<12>[  701.330000] 0
<12>[  701.330000] 1
<6>[  710.410000] br-lan: port 2(eth1) entered disabled state
<6>[  710.410000] br-lan: port 1(eth0) entered disabled state
<6>[  710.420000] device eth0 left promiscuous mode
<6>[  710.420000] br-lan: port 1(eth0) entered disabled state
<6>[  710.430000] eth0: link down
<6>[  710.430000] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
<6>[  710.450000] device eth1 left promiscuous mode
<6>[  710.450000] br-lan: port 2(eth1) entered disabled state
<6>[  710.460000] eth1: link down
<6>[  710.460000] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
<6>[  713.470000] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
<6>[  713.470000] device eth0 entered promiscuous mode
<6>[  713.480000] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
<6>[  713.510000] eth1: link up (1000Mbps/Full duplex)
<6>[  713.510000] device eth1 entered promiscuous mode
<1>[  713.850000] CPU 0 Unable to handle kernel paging request at virtual address 00000004, epc == 800a9a54, ra == 802405dc
<4>[  713.850000] Oops[#1]:
<4>[  713.850000] CPU: 0 PID: 1571 Comm: fw3 Not tainted 3.10.49 #3
<4>[  713.850000] task: 839154f0 ti: 82cb0000 task.ti: 82cb0000
<4>[  713.850000] $ 0   : 00000000 7f9368c0 831239c0 00000001
<4>[  713.850000] $ 4   : 00000000 833a5444 00000000 00020000
<4>[  713.850000] $ 8   : 00000020 800648f0 00000000 00000001
<4>[  713.850000] $12   : 00000000 833abf14 00000000 00000000
<4>[  713.850000] $16   : 833a5400 00001000 7fffffff 00000000
<4>[  713.850000] $20   : 82cb1ca0 833a5444 833a5444 82cb1ca4
<4>[  713.850000] $24   : 00000000 77ce7690
<4>[  713.850000] $28   : 82cb0000 82cb1c38 7fffffff 802405dc
<4>[  713.850000] Hi    : 00000000
<4>[  713.850000] Lo    : 000116b3
<4>[  713.850000] epc   : 800a9a54 __skb_recv_datagram+0x154/0x2f8
<4>[  713.850000]     Not tainted
<4>[  713.850000] ra    : 802405dc skb_recv_datagram+0x28/0x34
<4>[  713.850000] Status: 1100fc02      KERNEL EXL
<4>[  713.850000] Cause : 0080000c
<4>[  713.850000] BadVA : 00000004
<4>[  713.850000] PrId  : 00019750 (MIPS 74Kc)
<4>[  713.850000] Modules linked in: ath9k ath9k_common pppoe ppp_async iptable_nat ath9k_hw ath pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv4 mac80211 ipt_MASQUERADE ebtable_nat ebtable_filter ebtable_broute cfg80211 xt_time xt_tcpudp xt_state xt_quota xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_addrtype xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_nat_irc nf_nat_ftp nf_nat nf_defrag_ipv4 nf_conntrack_irc nf_conntrack_ftp iptable_raw iptable_mangle iptable_filter ipt_REJECT ip_tables ebtables ebt_vlan ebt_stp ebt_redirect ebt_pkttype ebt_mark_m ebt_mark ebt_limit ebt_among ebt_802_3 crc_ccitt compat ip6t_REJECT ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables nf_conntrack_ipv6 nf_conntrack nf_defrag_ipv6 ipv6 arc4 crypto_blkcipher usb_storage ehci_platform ehci_hcd sd_mod scsi_mod gpio_button_hotplug usbcore nls_base usb_common
<4>[  713.850000] Process fw3 (pid: 1571, threadinfo=82cb0000, task=839154f0, tls=77e02880)
<4>[  713.850000] Stack : 00000c98 00000000 83ae8280 833a5400 831239c0 800a0d90 00000000 00000000
<4>[  713.850000]         00000000 00000000 833a5400 00001000 82cb1ef8 00000000 82cb1d90 00000000
<4>[  713.850000]         834fbc60 00001000 7f936878 802405dc 8021c054 00000000 00000000 00000000
<4>[  713.850000]         82cb1ce8 80344e78 00000000 00000000 fffffffc 801c662c 00000001 801c6468
<4>[  713.850000]         80344e78 802a5000 831239c0 802405fc 82cb1cc8 82cb1cc8 83846400 831239c0
<4>[  713.850000]         ...
<4>[  713.850000] Call Trace:
<4>[  713.850000] [<800a9a54>] __skb_recv_datagram+0x154/0x2f8
<4>[  713.850000] [<802405dc>] skb_recv_datagram+0x28/0x34
<4>[  713.850000] [<801c662c>] netlink_recvmsg+0x5c/0x330
<4>[  713.850000] [<802448dc>] sock_recvmsg+0x88/0xb4
<4>[  713.850000] [<800812d0>] ___sys_recvmsg.part.31+0xe8/0x188
<4>[  713.850000] [<800ab898>] __sys_recvmsg+0x58/0x8c
<4>[  713.850000] [<800625b0>] stack_done+0x20/0x44
<4>[  713.850000]
<4>[  713.850000]
<4>[  713.850000] Code: 8c450004  ac400000  ac400004 <acc50004> aca60000  10600002  41606000  41606020  000000c0
<4>[  714.130000] ---[ end trace 15498a27fe934ce1 ]---

===================================
Time: 1428500946.244478

Attachments (0)

Change History (9)

comment:1 Changed 3 years ago by nbd

does this still happen in current trunk?

comment:2 Changed 3 years ago by nbd

  • Resolution set to no_response
  • Status changed from new to closed

comment:3 Changed 2 years ago by hawkbee

Revert kernel patch 120-bridge_allow_receiption_on_disabled_port.patch solve this problem.

comment:4 Changed 2 years ago by voided_lim@…

  • Resolution no_response deleted
  • Status changed from closed to reopened

Facing same issue. Using OpenWrt Barrier Breaker 14.07 / LuCI Trunk (0.12+svn-r10530) on Buffalo WZR-HP-AG300H

comment:5 Changed 2 years ago by nbd

  • Resolution set to worksforme
  • Status changed from reopened to closed

Barrier Breaker 14.07 is obsolete, please try something newer.

comment:6 Changed 2 years ago by bolvan

Confirmed in DESIGNATED DRIVER (Bleeding Edge, r47238)
kernel 4.1.10

Kernel panic happens after
"sysctl -w net.bridge.bridge-nf-call-iptables=1"
and then
"sysctl -w net.bridge.bridge-nf-call-iptables=0"

also after /etc/init.d/network restart when net.bridge.bridge-nf-call-iptables=1

net.bridge.bridge-nf-call-iptables looks broken
not sure if it is only openwrrt problem. likely linux kernel related

comment:7 Changed 2 years ago by cvmiller

Verified this is _not_ a problem with Chaos Calmer (kernel 3.18.20).

comment:8 Changed 2 years ago by anonymous

Can be hardware dependent

comment:9 Changed 21 months ago by anonymous

See #22265 for the new ticket which talks about problems with the same patch (but in current trunk and CC)

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.