ps on working system with vlan enabled.

root@OpenWrt:/# ps
  PID USER       VSZ STAT COMMAND
    1 root      1368 S    /sbin/procd
    2 root         0 SW   [kthreadd]
    3 root         0 SW   [ksoftirqd/0]
    4 root         0 SW   [kworker/0:0]
    5 root         0 SW<  [kworker/0:0H]
    6 root         0 SW   [kworker/u2:0]
    7 root         0 SW<  [khelper]
    8 root         0 SW   [kworker/u2:1]
   63 root         0 SW<  [writeback]
   65 root         0 SW<  [bioset]
   67 root         0 SW<  [kblockd]
   90 root         0 SW   [kworker/0:1]
   96 root         0 SW   [kswapd0]
  141 root         0 SW   [fsnotify_mark]
  165 root         0 SW   [spi32766]
  205 root         0 SW<  [deferwq]
  216 root         0 SW   [khubd]
  359 root       876 S <  ubusd
  393 root         0 SW<  [rpciod]
  397 root         0 SW<  [nfsiod]
  466 root         0 SW<  [cfg80211]
  595 nobody    1024 S    /usr/sbin/portmap
  604 root      1480 S    /sbin/netifd
  657 root      1484 S    /usr/sbin/telnetd -F -l /bin/login.sh
  769 root      1156 S    /usr/sbin/uhttpd -f -h /www -r OpenWrt -x /cgi-bin -
  865 root       816 S    /usr/sbin/6relayd -l/tmp/hosts/6relayd /usr/sbin/6re
  915 nobody     956 S    /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf -k
  939 root      1648 S    hostapd -P /var/run/wifi-phy0.pid -B /var/run/hostap
  959 root      1068 S    /usr/sbin/rpc.statd -p 32778 -o 32779
  974 root         0 SW   [lockd]
  976 root         0 SW   [nfsd]
  977 root         0 SW   [nfsd]
  978 root         0 SW   [nfsd]
  979 root         0 SW   [nfsd]
  980 root         0 SW   [nfsd]
  981 root         0 SW   [nfsd]
  982 root         0 SW   [nfsd]
  983 root         0 SW   [nfsd]
  986 root      1684 S    /usr/sbin/rpc.mountd -p 32780 -F
 1084 root         0 SWN  [jffs2_gcd_mtd5]
 1115 root      1152 S    /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p
 1119 root      1492 S    /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.ope
 1132 root      1492 S    /bin/ash --login
 1141 root      1488 R    ps

root@OpenWrt:/# dmesg | grep eth
[    0.580000] eth0: done loading
[   24.840000] device eth0.1 entered promiscuous mode
[   24.860000] device eth0 entered promiscuous mode
[   24.890000] br-lan: port 1(eth0.1) entered forwarding state
[   24.900000] br-lan: port 1(eth0.1) entered forwarding state
[   24.960000] device eth0.2 entered promiscuous mode
[   25.060000] br-wan: port 1(eth0.2) entered forwarding state
[   25.060000] br-wan: port 1(eth0.2) entered forwarding state
[   26.080000] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.1: link becomes ready
[   26.160000] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.2: link becomes ready
[   26.900000] br-lan: port 1(eth0.1) entered forwarding state
[   27.060000] br-wan: port 1(eth0.2) entered forwarding state


ps of non working image.  All I did was move /files/.... out of the
tree and rebuild.

root@OpenWrt:/# ps
  PID USER       VSZ STAT COMMAND
    1 root      1372 S    /sbin/procd
    2 root         0 SW   [kthreadd]
    3 root         0 SW   [ksoftirqd/0]
    4 root         0 SW   [kworker/0:0]
    5 root         0 SW<  [kworker/0:0H]
    6 root         0 SW   [kworker/u2:0]
    7 root         0 SW<  [khelper]
    8 root         0 SW   [kworker/u2:1]
   63 root         0 SW<  [writeback]
   65 root         0 SW<  [bioset]
   67 root         0 SW<  [kblockd]
   90 root         0 SW   [kworker/0:1]
   96 root         0 SW   [kswapd0]
  141 root         0 SW   [fsnotify_mark]
  165 root         0 SW   [spi32766]
  205 root         0 SW<  [deferwq]
  216 root         0 SW   [khubd]
  243 root         0 SW   [kworker/u2:2]
  360 root       876 S <  ubusd
  361 root      1492 S    /bin/ash --login
  394 root         0 SW<  [rpciod]
  398 root         0 SW<  [nfsiod]
  469 root         0 SW<  [cfg80211]
  470 root         0 SW   [kworker/0:2]
  622 nobody    1024 S    /usr/sbin/portmap
  631 root      1468 S    /sbin/netifd
  694 root      1484 S    /usr/sbin/telnetd -F -l /bin/login.sh
  838 root      1140 S    /usr/sbin/uhttpd -f -h /www -r OpenWrt -x /cgi-bin -
  903 nobody     956 S    /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf -k
  914 root      1068 S    /usr/sbin/rpc.statd -p 32778 -o 32779
  918 root         0 SW   [lockd]
  919 root         0 SW   [nfsd]
  920 root         0 SW   [nfsd]
  921 root         0 SW   [nfsd]
  922 root         0 SW   [nfsd]
  923 root         0 SW   [nfsd]
  924 root         0 SW   [nfsd]
  925 root         0 SW   [nfsd]
  926 root         0 SW   [nfsd]
  928 root      1684 S    /usr/sbin/rpc.mountd -p 32780 -F
  938 root       816 S    /usr/sbin/6relayd -l/tmp/hosts/6relayd /usr/sbin/6re
  948 root         0 SWN  [jffs2_gcd_mtd5]
  975 root      1152 S    /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p
  983 root      1492 S    /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.ope
  990 root      1488 R    ps
root@OpenWrt:/#

root@OpenWrt:/# dmesg | grep eth
[    0.580000] eth0: done loading
[   25.480000] device eth0 entered promiscuous mode
[   25.480000] br-lan: port 1(eth0) entered forwarding state
[   25.500000] br-lan: port 1(eth0) entered forwarding state
[   27.500000] br-lan: port 1(eth0) entered forwarding statecat

I can't copy these out, no network.

root@OpenWrt:/etc# cd config
root@OpenWrt:/etc/config# ls
6relayd   dropbear  luci      ssdpd     ucitrack  wireless
dhcp      firewall  network   system    uhttpd
root@OpenWrt:/etc/config# cat network

config interface 'loopback'
option ifname 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'

config globals 'globals'
option ula_prefix 'fd27:d0d4:9e57::/48'

config switch
option name 'switch0'
option reset '1'
option enable_vlan '0'

config interface 'lan'
option ifname 'eth0'
option type 'bridge'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
option ip6assign '60'

root@OpenWrt:/etc/config# cat system
config system
option hostname OpenWrt
option timezone UTC

config timeserver ntp
list server 0.openwrt.pool.ntp.org
list server 1.openwrt.pool.ntp.org
list server 2.openwrt.pool.ntp.org
list server 3.openwrt.pool.ntp.org
option enable_server 0
root@OpenWrt:/etc/config# cat uhttpd
# Server configuration
config uhttpd main

# HTTP listen addresses, multiple allowed
list listen_http 0.0.0.0:80
# list listen_http [::]:80

# HTTPS listen addresses, multiple allowed
list listen_https 0.0.0.0:443
# list listen_https [::]:443

# Server document root
option home /www

# Reject requests from RFC1918 IP addresses
# directed to the servers public IP(s).
# This is a DNS rebinding countermeasure.
option rfc1918_filter 1

# Maximum number of concurrent requests.
# If this number is exceeded, further requests are
# queued until the number of running requests drops
# below the limit again.
option max_requests 3

# Maximum number of concurrent connections.
# If this number is exceeded, further TCP connection
# attempts are queued until the number of active
# connections drops below the limit again.
option max_connections 100

# Certificate and private key for HTTPS.
# If no listen_https addresses are given,
# the key options are ignored.
option cert /etc/uhttpd.crt
option key /etc/uhttpd.key

# CGI url prefix, will be searched in docroot.
# Default is /cgi-bin
option cgi_prefix /cgi-bin

# List of extension->interpreter mappings.
# Files with an associated interpreter can
# be called outside of the CGI prefix and do
# not need to be executable.
# list interpreter ".php=/usr/bin/php-cgi"
# list interpreter ".cgi=/usr/bin/perl"

# Lua url prefix and handler script.
# Lua support is disabled if no prefix given.
# option lua_prefix /luci
# option lua_handler /usr/lib/lua/luci/sgi/uhttpd.lua

# Specify the ubus-rpc prefix and socket path.
# option ubus_prefix /ubus
# option ubus_socket /var/run/ubus.sock

# CGI/Lua timeout, if the called script does not
# write data within the given amount of seconds,
# the server will terminate the request with
# 504 Gateway Timeout response.
option script_timeout 60

# Network timeout, if the current connection is
# blocked for the specified amount of seconds,
# the server will terminate the associated
# request process.
option network_timeout 30

# HTTP Keep-Alive, specifies the timeout for persistent
# HTTP/1.1 connections. Setting this to 0 will disable
# persistent HTTP connections.
option http_keepalive 20

# TCP Keep-Alive, send periodic keep-alive probes
# over established connections to detect dead peers.
# The value is given in seconds to specify the
# interval between subsequent probes.
# Setting this to 0 will disable TCP keep-alive.
option tcp_keepalive 1

# Basic auth realm, defaults to local hostname
# option realm OpenWrt

# Configuration file in busybox httpd format
# option config /etc/httpd.conf

# Do not follow symlinks that point outside of the
# home directory.
# option no_symlinks 0

# Do not produce directory listings but send 403
# instead if a client requests an url pointing to
# a directory without any index file.
# option no_dirlists 0

# Do not authenticate any ubus-rpc requests against
# the ubus session/access procedure.
# This is dangerous and should be always left off
# except for development and debug purposes!
# option no_ubusauth 0


# Certificate defaults for px5g key generator
config cert px5g

# Validity time
option days 730

# RSA key size
option bits 1024

# Location
option country DE
option state Berlin
option location Berlin

# Common name
option commonname OpenWrt
root@OpenWrt:/etc/config# ls
6relayd   dropbear  luci      ssdpd     ucitrack  wireless
dhcp      firewall  network   system    uhttpd
root@OpenWrt:/etc/config# cat wireless
config wifi-device  radio0
option type     mac80211
option channel  11
option hwmode 11ng
option path '10180000.wmac'
option htmode HT20
list ht_capab GF
list ht_capab SHORT-GI-20
list ht_capab SHORT-GI-40
list ht_capab RX-STBC1
# REMOVE THIS LINE TO ENABLE WIFI:
option disabled 1

config wifi-iface
option device   radio0
option network  lan
option mode     ap
option ssid     OpenWrt
option encryption none

root@OpenWrt:/etc/config# cat firewall

config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'

config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'

config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'

config forwarding
option src 'lan'
option dest 'wan'

config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'

config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'

config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fe80::/10'
option src_port '547'
option dest_ip 'fe80::/10'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'

config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'

config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'

config include
option path '/etc/firewall.user'

config include 'minissdpd'
option type 'script'
option path '/usr/share/minissdpd/firewall.include'
option family 'IPv4'
option reload '1'

root@OpenWrt:/etc/config#


On Fri, Sep 20, 2013 at 7:24 PM, Diego Lopez Recas <suelt...@gmail.com> wrote:
> I don't think that makes any sense. TCP doesn't care about anything in the
> ethernet header and its implementation is platform independent. The problem
> must be elsewhere. Can you post the contents of all your config files and
> the output of 'ps' command?
>
> BTW, I'm not positive about this, but you might be able to run tcpdump in
> your openwrt and even see ethernet headers and vlan tags of frames
> sent/received.
>
> El 20/09/2013 16:26, "jonsm...@gmail.com" <jonsm...@gmail.com> escribió:
>
>> On Fri, Sep 20, 2013 at 9:36 AM, Diego Lopez Recas <suelt...@gmail.com>
>> wrote:
>> > I don't see how the problem is with the switch if you can ping to the
>> > device. To my understanding, the switch is unaware of the protocol above
>> > link layer and arp.
>>
>> The RT5350 can send packets fine when it is messed up, it just can't
>> receive them. My suspicion is that tags are somehow getting added to
>> the received packets even though vlan=0.  Those tags don't bother ARP
>> but they cause TCP not to function. When I use wireshark the TCP
>> connections don't get past the SYN phase.   Turn on the VLAN and
>> everything works.
>>
>> >
>> >
>> > On Fri, Sep 20, 2013 at 2:48 PM, jonsm...@gmail.com <jonsm...@gmail.com>
>> > wrote:
>> >>
>> >> Seems to me like the vlan=0 case is broken on the RT5350.
>> >>
>> >> So for testing...
>> >>
>> >> First I removed everything from file/etc... and rebuild
>> >> This configuration got generated, I edited it to change the IP.
>> >>
>> >> config interface 'loopback'
>> >> option ifname 'lo'
>> >> option proto 'static'
>> >> option ipaddr '127.0.0.1'
>> >> option netmask '255.0.0.0'
>> >>
>> >> config globals 'globals'
>> >> option ula_prefix 'fd5e:5ebe:13ed::/48'
>> >>
>> >> config switch
>> >> option name 'switch0'
>> >> option reset '1'
>> >> option enable_vlan '0'
>> >>
>> >> config interface 'lan'
>> >> option ifname 'eth0'
>> >> option type 'bridge'
>> >> option proto 'static'
>> >> option ipaddr '192.168.1.85'
>> >> option netmask '255.255.255.0'
>> >> option ip6assign '60'
>> >>
>> >> This configuration does not work for http but I can ping to it.
>> >>
>> >> root@OpenWrt:/etc/config# swconfig dev switch0 show
>> >> Global attributes:
>> >> enable_vlan: 0
>> >> alternate_vlan_disable: 0
>> >> bc_storm_protect: 0
>> >> led_frequency: 0
>> >> Port 0:
>> >> disable: 0
>> >> doubletag: 1
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 0
>> >> link: port:0 link:down
>> >> Port 1:
>> >> disable: 0
>> >> doubletag: 1
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 693
>> >> tr_bad: 0
>> >> tr_good: 60
>> >> disable: 0
>> >> doubletag: 1
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 0
>> >> link: port:2 link:down
>> >> Port 3:
>> >> disable: 0
>> >> doubletag: 1
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 0
>> >> link: port:3 link:down
>> >> Port 4:
>> >> disable: 0
>> >> doubletag: 1
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 0
>> >> link: port:4 link:down
>> >> Port 5:
>> >> disable: 1
>> >> doubletag: 1
>> >> untag: 1
>> >> led: ???
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 0
>> >> link: port:5 link:down
>> >> Port 6:
>> >> disable: 0
>> >> doubletag: 1
>> >> untag: 1
>> >> led: ???
>> >> lan: ???
>> >> recv_bad: ???
>> >> recv_good: ???
>> >> tr_bad: ???
>> >> tr_good: ???
>> >> pvid: 0
>> >> link: port:6 link:up speed:1000baseT full-duplex
>> >> VLAN 0:
>> >> ports: 0 1 2 3 4 5 6
>> >> root@OpenWrt:/etc/config#
>> >>
>> >> Next I restored files/etc/.... which will enable the VLAN
>> >> and everything works as expected
>> >>
>> >> root@OpenWrt:/etc/config# cat network
>> >> config interface 'loopback'
>> >> option ifname 'lo'
>> >> option proto 'static'
>> >> option ipaddr '127.0.0.1'
>> >> option netmask '255.0.0.0'
>> >>
>> >> config globals 'globals'
>> >> option ula_prefix 'fd59:3f8d:cb3a::/48'
>> >>
>> >> config interface 'lan'
>> >> option ifname 'eth0.1 wlan'
>> >> option type 'bridge'
>> >> option proto 'static'
>> >> option ipaddr '192.168.1.85'
>> >> option netmask '255.255.255.0'
>> >> option ip6assign '60'
>> >>
>> >> config interface 'wan'
>> >> option ifname 'eth0.2'
>> >> option type 'bridge'
>> >> option proto 'static'
>> >> option ipaddr '192.168.1.86'
>> >> option netmask '255.255.255.0'
>> >>
>> >> config interface 'wan6'
>> >> option ifname '@eth0.2'
>> >> option proto 'dhcpv6'
>> >>
>> >> config switch
>> >> option name 'rt305x'
>> >> option reset '1'
>> >> option enable_vlan '1'
>> >>
>> >> config switch_vlan
>> >> option device 'rt305x'
>> >> option vlan '1'
>> >> option ports '1 2 3 4 6t'
>> >>
>> >> config switch_vlan
>> >> option device 'rt305x'
>> >> option vlan '2'
>> >> option ports '0  6t'
>> >>
>> >> root@OpenWrt:/etc/config# swconfig dev switch0 show
>> >> Global attributes:
>> >> enable_vlan: 1
>> >> alternate_vlan_disable: 0
>> >> bc_storm_protect: 0
>> >> led_frequency: 0
>> >> Port 0:
>> >> disable: 0
>> >> doubletag: 0
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 2
>> >> link: port:0 link:down
>> >> Port 1:
>> >> disable: 0
>> >> doubletag: 0
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 463
>> >> tr_bad: 0
>> >> tr_good: 162
>> >> pvid: 1
>> >> link: port:1 link:up speed:100baseT full-duplex
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 1
>> >> link: port:2 link:down
>> >> Port 3:
>> >> disable: 0
>> >> doubletag: 0
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 1
>> >> link: port:3 link:down
>> >> Port 4:
>> >> disable: 0
>> >> doubletag: 0
>> >> untag: 1
>> >> led: 5
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 1
>> >> link: port:4 link:down
>> >> Port 5:
>> >> disable: 1
>> >> doubletag: 0
>> >> untag: 0
>> >> led: ???
>> >> lan: 1
>> >> recv_bad: 0
>> >> recv_good: 0
>> >> tr_bad: 0
>> >> tr_good: 0
>> >> pvid: 0
>> >> link: port:5 link:down
>> >> Port 6:
>> >> disable: 0
>> >> doubletag: 0
>> >> untag: 0
>> >> led: ???
>> >> lan: ???
>> >> recv_bad: ???
>> >> recv_good: ???
>> >> tr_bad: ???
>> >> tr_good: ???
>> >> pvid: 0
>> >> link: port:6 link:up speed:1000baseT full-duplex
>> >> VLAN 1:
>> >> ports: 1 2 3 4 6t
>> >> VLAN 2:
>> >> ports: 0 6t
>> >>
>> >>
>> >>
>> >> --
>> >> Jon Smirl
>> >> jonsm...@gmail.com
>> >> _______________________________________________
>> >> openwrt-devel mailing list
>> >> openwrt-devel@lists.openwrt.org
>> >> https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
>> >
>> >
>> >
>> > _______________________________________________
>> > openwrt-devel mailing list
>> > openwrt-devel@lists.openwrt.org
>> > https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
>> >
>>
>>
>>
>> --
>> Jon Smirl
>> jonsm...@gmail.com
>> _______________________________________________
>> openwrt-devel mailing list
>> openwrt-devel@lists.openwrt.org
>> https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
>
>
> _______________________________________________
> openwrt-devel mailing list
> openwrt-devel@lists.openwrt.org
> https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
>



-- 
Jon Smirl
jonsm...@gmail.com

Attachment: file-work.tgz
Description: GNU Zip compressed data

_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

Reply via email to