Modify

Opened 7 years ago

Closed 5 years ago

Last modified 4 years ago

#9771 closed defect (fixed)

Cannot bridge l2tpv3 interface (Kernel Oops!)

Reported by: warm@… Owned by: developers
Priority: normal Milestone: Barrier Breaker 14.07
Component: packages Version: Trunk
Keywords: Cc:

Description

Need to brodge l2tpeth0 with another interface and I get kernel Oops:

~]$ ssh root@192.168.1.1
root@192.168.1.1's password:

BusyBox v1.18.5 (2011-07-21 12:32:19 NOVT) built-in shell (ash)

Enter 'help' for a list of built-in commands.

_

| |.-----.-----.-----.| | | |.----.| |_

| - |_
_ | -| | | _ _|
|_||| ||

|| W I R E L E S S F R E E D O M

ATTITUDE ADJUSTMENT (bleeding edge, r27711) ----------

  • 1/4 oz Vodka Pour all ingredients into mixing
  • 1/4 oz Gin tin with ice, strain into glass.
  • 1/4 oz Amaretto
  • 1/4 oz Triple sec
  • 1/4 oz Peach schnapps
  • 1/4 oz Sour mix
  • 1 splash Cranberry juice

-----------------------------------------------------

root@OpenWrt:~# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN

link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo

2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000

link/ether 00:1a:70:4f:93:37 brd ff:ff:ff:ff:ff:ff

3: eth0.0@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP

link/ether 00:1a:70:4f:93:37 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global eth0.0

4: eth0.1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP

link/ether 00:1a:70:4f:93:37 brd ff:ff:ff:ff:ff:ff

6: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000

link/ether 00:1a:70:4f:93:39 brd ff:ff:ff:ff:ff:ff

7: mon.wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UNKNOWN qlen 1000

link/ieee802.11/radiotap 00:1a:70:4f:93:39 brd ff:ff:ff:ff:ff:ff

root@OpenWrt:~#
root@OpenWrt:~# l2tpv3tun add tunnel tunnel_id 1 peer_tunnel_id 1 udp_sport 5000 udp_dport 5000 encap udp
local 192.168.1.1 remote 192.168.1.10
root@OpenWrt:~# l2tpv3tun add session tunnel_id 1 session_id 1 peer_session_id 1
root@OpenWrt:~# ifconfig l2tpeth0 up
root@OpenWrt:~# brctl addbr ttt
root@OpenWrt:~# brctl addif ttt l2tpeth0
Segmentation fault
root@OpenWrt:~#

If I put some l2tp configuration in /etc/config/network then I lost ssh connectivity forever. Only failsafe mode helps ... I have tried wiki example "http://wiki.openwrt.org/doc/uci/network#l2tpv3.pseudowire.bridged.to.lan" and it also generates Oops.

Router is Linksys WRT54GL v1.1

logread says:
Jan 1 00:04:18 OpenWrt authpriv.notice dropbear[1085]: Password auth succeeded for 'root' from 192.168.1.10:38750
Jan 1 00:05:51 OpenWrt kern.info kernel: device l2tpeth0 entered promiscuous mode
Jan 1 00:05:51 OpenWrt kern.alert kernel: CPU 0 Unable to handle kernel paging request at virtual address 00000000, epc == 00000000, ra == 8020d1d0
Jan 1 00:05:51 OpenWrt kern.warn kernel: Oops#1:
Jan 1 00:05:51 OpenWrt kern.warn kernel: Cpu 0
Jan 1 00:05:51 OpenWrt kern.warn kernel: $ 0 : 00000000 1000b800 80275480 00000000
Jan 1 00:05:51 OpenWrt kern.warn kernel: $ 4 : 80ca6774 80235b71 00000001 00000000
Jan 1 00:05:51 OpenWrt kern.warn kernel: $ 8 : 00000007 ffd23940 de95147c 80f9c000
Jan 1 00:05:51 OpenWrt kern.warn kernel: $12 : 808f2ae4 00000001 00010000 00470000
Jan 1 00:05:51 OpenWrt kern.warn kernel: $16 : 80ca6000 000005d0 80ca6360 ffffffea
Jan 1 00:05:51 OpenWrt kern.warn kernel: $20 : 80b35a88 00000001 004584cd 00460000
Jan 1 00:05:51 OpenWrt kern.warn kernel: $24 : 00000010 00000000
Jan 1 00:05:51 OpenWrt kern.warn kernel: $28 : 80a7a000 80a7bd98 00af641c 8020d1d0
Jan 1 00:05:51 OpenWrt kern.warn kernel: Hi : 00000051
Jan 1 00:05:51 OpenWrt kern.warn kernel: Lo : e77bc800
Jan 1 00:05:51 OpenWrt kern.warn kernel: epc : 00000000 (null)
Jan 1 00:05:52 OpenWrt kern.warn kernel: Not tainted
Jan 1 00:05:52 OpenWrt kern.warn kernel: ra : 8020d1d0 0x8020d1d0
Jan 1 00:05:52 OpenWrt kern.warn kernel: Status: 1000b803 KERNEL EXL IE
Jan 1 00:05:52 OpenWrt kern.warn kernel: Cause : 00800008
Jan 1 00:05:52 OpenWrt kern.warn kernel: BadVA : 00000000
Jan 1 00:05:52 OpenWrt kern.warn kernel: PrId : 00029008 (Broadcom BMIPS3300)
Jan 1 00:05:52 OpenWrt kern.warn kernel: Modules linked in: ebt_redirect ebt_mark ebt_vlan ebt_stp ebt_pkttype ebt_mark_m ebt_limit ebt_among ebt_802_3 ebtable_nat ebtable_filter ebtable_broute ebtables nf_nat_irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp ipt_MASQUE
Jan 1 00:05:52 OpenWrt kern.warn kernel: Process brctl (pid: 1118, threadinfo=80a7a000, task=80e255d8, tls=2b17e2d0)
Jan 1 00:05:52 OpenWrt kern.warn kernel: Stack : 0000005c 80681460 00000010 802c0000 80b35a00 ffffffed 80ca6000 00000000
Jan 1 00:05:52 OpenWrt kern.warn kernel: 80ca6360 80195904 00000000 00000020 80b35a00 80b35a00 00000000 80ca6000
Jan 1 00:05:52 OpenWrt kern.warn kernel: 80e38400 8020f658 000089a2 80ca6360 00000008 8020fd98 802b8fd0 000089a2
Jan 1 00:05:52 OpenWrt kern.warn kernel: ffffffff 802b8fd0 7f9e30d4 00000000 7f9e30f4 80199bf4 80a7be54 000080d0
Jan 1 00:05:52 OpenWrt kern.warn kernel: 80273750 00008000 80b957c0 80b95870 00747474 00000000 00000000 00000000
Jan 1 00:05:52 OpenWrt kern.warn kernel: ...
Jan 1 00:05:52 OpenWrt kern.warn kernel: Call Trace:[<80195904>] 0x80195904
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8020f658>] 0x8020f658
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8020fd98>] 0x8020fd98
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<80199bf4>] 0x80199bf4
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<80185a20>] 0x80185a20
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<80185cc8>] 0x80185cc8
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<80181428>] 0x80181428
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8009d4b4>] 0x8009d4b4
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<800a0858>] 0x800a0858
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<80181ee4>] 0x80181ee4
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8008e990>] 0x8008e990
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8009d558>] 0x8009d558
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8008acb4>] 0x8008acb4
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8000dc90>] 0x8000dc90
Jan 1 00:05:52 OpenWrt kern.warn kernel: [<8011b1d0>] 0x8011b1d0
Jan 1 00:05:52 OpenWrt kern.warn kernel: Code: (Bad address in epc)
Jan 1 00:05:52 OpenWrt kern.warn kernel: Disabling lock debugging due to kernel taint

Attachments (0)

Change History (6)

comment:1 Changed 7 years ago by warm@…

this also happens on dir-615 C2

comment:2 Changed 6 years ago by warm@…

todays trunk (r27943) with kernel 3.0.1 does not do kernel oops when bridging wlan0 with l2tpeth0. So may be its an upstrem bug.

I did not check how l2tpeth0 tunnel and bridge works yet. Also I can not check this bug on new trunk on dir-615 c2 (it even does not boot due wrong CRC checksum :-()

comment:3 Changed 6 years ago by anonymous

dir-615 c2 is bootable again. The segfault is occured:

BusyBox v1.18.5 (2011-08-14 21:09:03 NOVT) built-in shell (ash)
Enter 'help' for a list of built-in commands.

_

| |.-----.-----.-----.| | | |.----.| |_

| - |_
_ | -| | | _ _|
|_||| ||

|| W I R E L E S S F R E E D O M

ATTITUDE ADJUSTMENT (bleeding edge, r27979) ----------

  • 1/4 oz Vodka Pour all ingredients into mixing
  • 1/4 oz Gin tin with ice, strain into glass.
  • 1/4 oz Amaretto
  • 1/4 oz Triple sec
  • 1/4 oz Peach schnapps
  • 1/4 oz Sour mix
  • 1 splash Cranberry juice

-----------------------------------------------------

root@OpenWrt:/#
root@OpenWrt:/# l2tpv3tun add tunnel tunnel_id 10 peer_tunnel_id 10 encap ip loc
al 192.168.1.1 remote 192.168.1.10
root@OpenWrt:/# l2tpv3tun add session tunnel_id 10 session_id 10 peer_session_id

10

root@OpenWrt:/# ifconfig l2tpeth0 up
root@OpenWrt:/# brctl addif br-lan l2tpeth0
device l2tpeth0 entered promiscuous mode
br-lan: port 2(l2tpeth0) entering forwarding state
br-lan: port 2(l2tpeth0) entering forwarding state
CPU 0 Unable to handle kernel paging request at virtual address 00000000, epc == 00000000, ra == 8023f1bc
Oops#1:
Cpu 0
$ 0 : 00000000 00000000 802b8380 00000000
$ 4 : 819fe774 8026b1b1 00000001 00000000
$ 8 : 00000020 00000000 00000001 00000000
$12 : 00000002 a4878b1a 27880e8f c0a8010a
$16 : 819fe360 000005d4 819fe000 ffffffea
$20 : 81abba88 00000000 004580ed 00460000
$24 : 00000010 801de19c
$28 : 81b28000 81b29d98 0056d41c 8023f1bc
Hi : 00000000
Lo : 00000000
epc : 00000000 (null)

Not tainted

ra : 8023f1bc 0x8023f1bc
Status: 1000f403 KERNEL EXL IE
Cause : 10800008
BadVA : 00000000
PrId : 00019374 (MIPS 24Kc)
Modules linked in: ebt_redirect ebt_mark ebt_vlan ebt_stp ebt_pkttype ebt_mark_m ebt_limit ebt_among ebt_e
Process brctl (pid: 1142, threadinfo=81b28000, task=81b3a9e0, tls=2b0ee2d0)
Stack : 8181eb40 0000005c 00000010 80300000 81abba88 ffffffed 819fe000 00000000

819fe360 801d4750 00000000 00000020 00000002 81b90400 81abba00 819fe000
81abba00 802413b0 00000001 000089a2 81b29e28 80241ac8 802f84c0 000089a2
ffffffff 802f84c0 7f7fee84 00000000 7f7feea4 801d81c4 81b29e54 000080d0
81a01400 80226e14 81a01400 8021d208 62722d6c 616e0000 00000000 00000000
...

Call Trace:[<801d4750>] 0x801d4750
[<802413b0>] 0x802413b0
[<80241ac8>] 0x80241ac8
[<801d81c4>] 0x801d81c4
[<80226e14>] 0x80226e14
[<8021d208>] 0x8021d208
[<800e8d38>] 0x800e8d38
[<800e8bf8>] 0x800e8bf8
[<80226848>] 0x80226848
[<801c3698>] 0x801c3698
[<800e3038>] 0x800e3038
[<801c40a0>] 0x801c40a0
[<800d52c4>] 0x800d52c4
[<800e30dc>] 0x800e30dc
[<800d1a34>] 0x800d1a34
[<800694a4>] 0x800694a4
[<80159a90>] 0x80159a90

Code: (Bad address in epc)

Disabling lock debugging due to kernel taint
Segmentation fault
root@OpenWrt:/#

May be with kernel 3.0.1 all will be fine ...

comment:4 Changed 6 years ago by warm@…

Seems this bug is gone in r28022.

root@OpenWrt:~# uname -a
Linux OpenWrt 2.6.39.4 #1 Wed Aug 17 09:52:33 NOVT 2011 mips GNU/Linux
root@OpenWrt:~# brctl show
bridge name bridge id STP enabled interfaces
br-wtun 8000.0024017691a5 no wlan0

l2tp-wtun

root@OpenWrt:~#

comment:5 Changed 5 years ago by nbd

  • Resolution set to fixed
  • Status changed from new to closed

comment:6 Changed 4 years ago by jow

  • Milestone changed from Attitude Adjustment 12.09 to Barrier Breaker 14.07

Milestone Attitude Adjustment 12.09 deleted

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.