ps on working system with vlan enabled. root@OpenWrt:/# ps PID USER VSZ STAT COMMAND 1 root 1368 S /sbin/procd 2 root 0 SW [kthreadd] 3 root 0 SW [ksoftirqd/0] 4 root 0 SW [kworker/0:0] 5 root 0 SW< [kworker/0:0H] 6 root 0 SW [kworker/u2:0] 7 root 0 SW< [khelper] 8 root 0 SW [kworker/u2:1] 63 root 0 SW< [writeback] 65 root 0 SW< [bioset] 67 root 0 SW< [kblockd] 90 root 0 SW [kworker/0:1] 96 root 0 SW [kswapd0] 141 root 0 SW [fsnotify_mark] 165 root 0 SW [spi32766] 205 root 0 SW< [deferwq] 216 root 0 SW [khubd] 359 root 876 S < ubusd 393 root 0 SW< [rpciod] 397 root 0 SW< [nfsiod] 466 root 0 SW< [cfg80211] 595 nobody 1024 S /usr/sbin/portmap 604 root 1480 S /sbin/netifd 657 root 1484 S /usr/sbin/telnetd -F -l /bin/login.sh 769 root 1156 S /usr/sbin/uhttpd -f -h /www -r OpenWrt -x /cgi-bin - 865 root 816 S /usr/sbin/6relayd -l/tmp/hosts/6relayd /usr/sbin/6re 915 nobody 956 S /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf -k 939 root 1648 S hostapd -P /var/run/wifi-phy0.pid -B /var/run/hostap 959 root 1068 S /usr/sbin/rpc.statd -p 32778 -o 32779 974 root 0 SW [lockd] 976 root 0 SW [nfsd] 977 root 0 SW [nfsd] 978 root 0 SW [nfsd] 979 root 0 SW [nfsd] 980 root 0 SW [nfsd] 981 root 0 SW [nfsd] 982 root 0 SW [nfsd] 983 root 0 SW [nfsd] 986 root 1684 S /usr/sbin/rpc.mountd -p 32780 -F 1084 root 0 SWN [jffs2_gcd_mtd5] 1115 root 1152 S /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p 1119 root 1492 S /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.ope 1132 root 1492 S /bin/ash --login 1141 root 1488 R ps
root@OpenWrt:/# dmesg | grep eth [ 0.580000] eth0: done loading [ 24.840000] device eth0.1 entered promiscuous mode [ 24.860000] device eth0 entered promiscuous mode [ 24.890000] br-lan: port 1(eth0.1) entered forwarding state [ 24.900000] br-lan: port 1(eth0.1) entered forwarding state [ 24.960000] device eth0.2 entered promiscuous mode [ 25.060000] br-wan: port 1(eth0.2) entered forwarding state [ 25.060000] br-wan: port 1(eth0.2) entered forwarding state [ 26.080000] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.1: link becomes ready [ 26.160000] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.2: link becomes ready [ 26.900000] br-lan: port 1(eth0.1) entered forwarding state [ 27.060000] br-wan: port 1(eth0.2) entered forwarding state ps of non working image. All I did was move /files/.... out of the tree and rebuild. root@OpenWrt:/# ps PID USER VSZ STAT COMMAND 1 root 1372 S /sbin/procd 2 root 0 SW [kthreadd] 3 root 0 SW [ksoftirqd/0] 4 root 0 SW [kworker/0:0] 5 root 0 SW< [kworker/0:0H] 6 root 0 SW [kworker/u2:0] 7 root 0 SW< [khelper] 8 root 0 SW [kworker/u2:1] 63 root 0 SW< [writeback] 65 root 0 SW< [bioset] 67 root 0 SW< [kblockd] 90 root 0 SW [kworker/0:1] 96 root 0 SW [kswapd0] 141 root 0 SW [fsnotify_mark] 165 root 0 SW [spi32766] 205 root 0 SW< [deferwq] 216 root 0 SW [khubd] 243 root 0 SW [kworker/u2:2] 360 root 876 S < ubusd 361 root 1492 S /bin/ash --login 394 root 0 SW< [rpciod] 398 root 0 SW< [nfsiod] 469 root 0 SW< [cfg80211] 470 root 0 SW [kworker/0:2] 622 nobody 1024 S /usr/sbin/portmap 631 root 1468 S /sbin/netifd 694 root 1484 S /usr/sbin/telnetd -F -l /bin/login.sh 838 root 1140 S /usr/sbin/uhttpd -f -h /www -r OpenWrt -x /cgi-bin - 903 nobody 956 S /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf -k 914 root 1068 S /usr/sbin/rpc.statd -p 32778 -o 32779 918 root 0 SW [lockd] 919 root 0 SW [nfsd] 920 root 0 SW [nfsd] 921 root 0 SW [nfsd] 922 root 0 SW [nfsd] 923 root 0 SW [nfsd] 924 root 0 SW [nfsd] 925 root 0 SW [nfsd] 926 root 0 SW [nfsd] 928 root 1684 S /usr/sbin/rpc.mountd -p 32780 -F 938 root 816 S /usr/sbin/6relayd -l/tmp/hosts/6relayd /usr/sbin/6re 948 root 0 SWN [jffs2_gcd_mtd5] 975 root 1152 S /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p 983 root 1492 S /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.ope 990 root 1488 R ps root@OpenWrt:/# root@OpenWrt:/# dmesg | grep eth [ 0.580000] eth0: done loading [ 25.480000] device eth0 entered promiscuous mode [ 25.480000] br-lan: port 1(eth0) entered forwarding state [ 25.500000] br-lan: port 1(eth0) entered forwarding state [ 27.500000] br-lan: port 1(eth0) entered forwarding statecat I can't copy these out, no network. root@OpenWrt:/etc# cd config root@OpenWrt:/etc/config# ls 6relayd dropbear luci ssdpd ucitrack wireless dhcp firewall network system uhttpd root@OpenWrt:/etc/config# cat network config interface 'loopback' option ifname 'lo' option proto 'static' option ipaddr '127.0.0.1' option netmask '255.0.0.0' config globals 'globals' option ula_prefix 'fd27:d0d4:9e57::/48' config switch option name 'switch0' option reset '1' option enable_vlan '0' config interface 'lan' option ifname 'eth0' option type 'bridge' option proto 'static' option ipaddr '192.168.1.1' option netmask '255.255.255.0' option ip6assign '60' root@OpenWrt:/etc/config# cat system config system option hostname OpenWrt option timezone UTC config timeserver ntp list server 0.openwrt.pool.ntp.org list server 1.openwrt.pool.ntp.org list server 2.openwrt.pool.ntp.org list server 3.openwrt.pool.ntp.org option enable_server 0 root@OpenWrt:/etc/config# cat uhttpd # Server configuration config uhttpd main # HTTP listen addresses, multiple allowed list listen_http 0.0.0.0:80 # list listen_http [::]:80 # HTTPS listen addresses, multiple allowed list listen_https 0.0.0.0:443 # list listen_https [::]:443 # Server document root option home /www # Reject requests from RFC1918 IP addresses # directed to the servers public IP(s). # This is a DNS rebinding countermeasure. option rfc1918_filter 1 # Maximum number of concurrent requests. # If this number is exceeded, further requests are # queued until the number of running requests drops # below the limit again. option max_requests 3 # Maximum number of concurrent connections. # If this number is exceeded, further TCP connection # attempts are queued until the number of active # connections drops below the limit again. option max_connections 100 # Certificate and private key for HTTPS. # If no listen_https addresses are given, # the key options are ignored. option cert /etc/uhttpd.crt option key /etc/uhttpd.key # CGI url prefix, will be searched in docroot. # Default is /cgi-bin option cgi_prefix /cgi-bin # List of extension->interpreter mappings. # Files with an associated interpreter can # be called outside of the CGI prefix and do # not need to be executable. # list interpreter ".php=/usr/bin/php-cgi" # list interpreter ".cgi=/usr/bin/perl" # Lua url prefix and handler script. # Lua support is disabled if no prefix given. # option lua_prefix /luci # option lua_handler /usr/lib/lua/luci/sgi/uhttpd.lua # Specify the ubus-rpc prefix and socket path. # option ubus_prefix /ubus # option ubus_socket /var/run/ubus.sock # CGI/Lua timeout, if the called script does not # write data within the given amount of seconds, # the server will terminate the request with # 504 Gateway Timeout response. option script_timeout 60 # Network timeout, if the current connection is # blocked for the specified amount of seconds, # the server will terminate the associated # request process. option network_timeout 30 # HTTP Keep-Alive, specifies the timeout for persistent # HTTP/1.1 connections. Setting this to 0 will disable # persistent HTTP connections. option http_keepalive 20 # TCP Keep-Alive, send periodic keep-alive probes # over established connections to detect dead peers. # The value is given in seconds to specify the # interval between subsequent probes. # Setting this to 0 will disable TCP keep-alive. option tcp_keepalive 1 # Basic auth realm, defaults to local hostname # option realm OpenWrt # Configuration file in busybox httpd format # option config /etc/httpd.conf # Do not follow symlinks that point outside of the # home directory. # option no_symlinks 0 # Do not produce directory listings but send 403 # instead if a client requests an url pointing to # a directory without any index file. # option no_dirlists 0 # Do not authenticate any ubus-rpc requests against # the ubus session/access procedure. # This is dangerous and should be always left off # except for development and debug purposes! # option no_ubusauth 0 # Certificate defaults for px5g key generator config cert px5g # Validity time option days 730 # RSA key size option bits 1024 # Location option country DE option state Berlin option location Berlin # Common name option commonname OpenWrt root@OpenWrt:/etc/config# ls 6relayd dropbear luci ssdpd ucitrack wireless dhcp firewall network system uhttpd root@OpenWrt:/etc/config# cat wireless config wifi-device radio0 option type mac80211 option channel 11 option hwmode 11ng option path '10180000.wmac' option htmode HT20 list ht_capab GF list ht_capab SHORT-GI-20 list ht_capab SHORT-GI-40 list ht_capab RX-STBC1 # REMOVE THIS LINE TO ENABLE WIFI: option disabled 1 config wifi-iface option device radio0 option network lan option mode ap option ssid OpenWrt option encryption none root@OpenWrt:/etc/config# cat firewall config defaults option syn_flood '1' option input 'ACCEPT' option output 'ACCEPT' option forward 'REJECT' config zone option name 'lan' list network 'lan' option input 'ACCEPT' option output 'ACCEPT' option forward 'ACCEPT' config zone option name 'wan' list network 'wan' list network 'wan6' option input 'REJECT' option output 'ACCEPT' option forward 'REJECT' option masq '1' option mtu_fix '1' config forwarding option src 'lan' option dest 'wan' config rule option name 'Allow-DHCP-Renew' option src 'wan' option proto 'udp' option dest_port '68' option target 'ACCEPT' option family 'ipv4' config rule option name 'Allow-Ping' option src 'wan' option proto 'icmp' option icmp_type 'echo-request' option family 'ipv4' option target 'ACCEPT' config rule option name 'Allow-DHCPv6' option src 'wan' option proto 'udp' option src_ip 'fe80::/10' option src_port '547' option dest_ip 'fe80::/10' option dest_port '546' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-ICMPv6-Input' option src 'wan' option proto 'icmp' list icmp_type 'echo-request' list icmp_type 'echo-reply' list icmp_type 'destination-unreachable' list icmp_type 'packet-too-big' list icmp_type 'time-exceeded' list icmp_type 'bad-header' list icmp_type 'unknown-header-type' list icmp_type 'router-solicitation' list icmp_type 'neighbour-solicitation' list icmp_type 'router-advertisement' list icmp_type 'neighbour-advertisement' option limit '1000/sec' option family 'ipv6' option target 'ACCEPT' config rule option name 'Allow-ICMPv6-Forward' option src 'wan' option dest '*' option proto 'icmp' list icmp_type 'echo-request' list icmp_type 'echo-reply' list icmp_type 'destination-unreachable' list icmp_type 'packet-too-big' list icmp_type 'time-exceeded' list icmp_type 'bad-header' list icmp_type 'unknown-header-type' option limit '1000/sec' option family 'ipv6' option target 'ACCEPT' config include option path '/etc/firewall.user' config include 'minissdpd' option type 'script' option path '/usr/share/minissdpd/firewall.include' option family 'IPv4' option reload '1' root@OpenWrt:/etc/config# On Fri, Sep 20, 2013 at 7:24 PM, Diego Lopez Recas <suelt...@gmail.com> wrote: > I don't think that makes any sense. TCP doesn't care about anything in the > ethernet header and its implementation is platform independent. The problem > must be elsewhere. Can you post the contents of all your config files and > the output of 'ps' command? > > BTW, I'm not positive about this, but you might be able to run tcpdump in > your openwrt and even see ethernet headers and vlan tags of frames > sent/received. > > El 20/09/2013 16:26, "jonsm...@gmail.com" <jonsm...@gmail.com> escribió: > >> On Fri, Sep 20, 2013 at 9:36 AM, Diego Lopez Recas <suelt...@gmail.com> >> wrote: >> > I don't see how the problem is with the switch if you can ping to the >> > device. To my understanding, the switch is unaware of the protocol above >> > link layer and arp. >> >> The RT5350 can send packets fine when it is messed up, it just can't >> receive them. My suspicion is that tags are somehow getting added to >> the received packets even though vlan=0. Those tags don't bother ARP >> but they cause TCP not to function. When I use wireshark the TCP >> connections don't get past the SYN phase. Turn on the VLAN and >> everything works. >> >> > >> > >> > On Fri, Sep 20, 2013 at 2:48 PM, jonsm...@gmail.com <jonsm...@gmail.com> >> > wrote: >> >> >> >> Seems to me like the vlan=0 case is broken on the RT5350. >> >> >> >> So for testing... >> >> >> >> First I removed everything from file/etc... and rebuild >> >> This configuration got generated, I edited it to change the IP. >> >> >> >> config interface 'loopback' >> >> option ifname 'lo' >> >> option proto 'static' >> >> option ipaddr '127.0.0.1' >> >> option netmask '255.0.0.0' >> >> >> >> config globals 'globals' >> >> option ula_prefix 'fd5e:5ebe:13ed::/48' >> >> >> >> config switch >> >> option name 'switch0' >> >> option reset '1' >> >> option enable_vlan '0' >> >> >> >> config interface 'lan' >> >> option ifname 'eth0' >> >> option type 'bridge' >> >> option proto 'static' >> >> option ipaddr '192.168.1.85' >> >> option netmask '255.255.255.0' >> >> option ip6assign '60' >> >> >> >> This configuration does not work for http but I can ping to it. >> >> >> >> root@OpenWrt:/etc/config# swconfig dev switch0 show >> >> Global attributes: >> >> enable_vlan: 0 >> >> alternate_vlan_disable: 0 >> >> bc_storm_protect: 0 >> >> led_frequency: 0 >> >> Port 0: >> >> disable: 0 >> >> doubletag: 1 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 0 >> >> link: port:0 link:down >> >> Port 1: >> >> disable: 0 >> >> doubletag: 1 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 693 >> >> tr_bad: 0 >> >> tr_good: 60 >> >> disable: 0 >> >> doubletag: 1 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 0 >> >> link: port:2 link:down >> >> Port 3: >> >> disable: 0 >> >> doubletag: 1 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 0 >> >> link: port:3 link:down >> >> Port 4: >> >> disable: 0 >> >> doubletag: 1 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 0 >> >> link: port:4 link:down >> >> Port 5: >> >> disable: 1 >> >> doubletag: 1 >> >> untag: 1 >> >> led: ??? >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 0 >> >> link: port:5 link:down >> >> Port 6: >> >> disable: 0 >> >> doubletag: 1 >> >> untag: 1 >> >> led: ??? >> >> lan: ??? >> >> recv_bad: ??? >> >> recv_good: ??? >> >> tr_bad: ??? >> >> tr_good: ??? >> >> pvid: 0 >> >> link: port:6 link:up speed:1000baseT full-duplex >> >> VLAN 0: >> >> ports: 0 1 2 3 4 5 6 >> >> root@OpenWrt:/etc/config# >> >> >> >> Next I restored files/etc/.... which will enable the VLAN >> >> and everything works as expected >> >> >> >> root@OpenWrt:/etc/config# cat network >> >> config interface 'loopback' >> >> option ifname 'lo' >> >> option proto 'static' >> >> option ipaddr '127.0.0.1' >> >> option netmask '255.0.0.0' >> >> >> >> config globals 'globals' >> >> option ula_prefix 'fd59:3f8d:cb3a::/48' >> >> >> >> config interface 'lan' >> >> option ifname 'eth0.1 wlan' >> >> option type 'bridge' >> >> option proto 'static' >> >> option ipaddr '192.168.1.85' >> >> option netmask '255.255.255.0' >> >> option ip6assign '60' >> >> >> >> config interface 'wan' >> >> option ifname 'eth0.2' >> >> option type 'bridge' >> >> option proto 'static' >> >> option ipaddr '192.168.1.86' >> >> option netmask '255.255.255.0' >> >> >> >> config interface 'wan6' >> >> option ifname '@eth0.2' >> >> option proto 'dhcpv6' >> >> >> >> config switch >> >> option name 'rt305x' >> >> option reset '1' >> >> option enable_vlan '1' >> >> >> >> config switch_vlan >> >> option device 'rt305x' >> >> option vlan '1' >> >> option ports '1 2 3 4 6t' >> >> >> >> config switch_vlan >> >> option device 'rt305x' >> >> option vlan '2' >> >> option ports '0 6t' >> >> >> >> root@OpenWrt:/etc/config# swconfig dev switch0 show >> >> Global attributes: >> >> enable_vlan: 1 >> >> alternate_vlan_disable: 0 >> >> bc_storm_protect: 0 >> >> led_frequency: 0 >> >> Port 0: >> >> disable: 0 >> >> doubletag: 0 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 2 >> >> link: port:0 link:down >> >> Port 1: >> >> disable: 0 >> >> doubletag: 0 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 463 >> >> tr_bad: 0 >> >> tr_good: 162 >> >> pvid: 1 >> >> link: port:1 link:up speed:100baseT full-duplex >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 1 >> >> link: port:2 link:down >> >> Port 3: >> >> disable: 0 >> >> doubletag: 0 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 1 >> >> link: port:3 link:down >> >> Port 4: >> >> disable: 0 >> >> doubletag: 0 >> >> untag: 1 >> >> led: 5 >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 1 >> >> link: port:4 link:down >> >> Port 5: >> >> disable: 1 >> >> doubletag: 0 >> >> untag: 0 >> >> led: ??? >> >> lan: 1 >> >> recv_bad: 0 >> >> recv_good: 0 >> >> tr_bad: 0 >> >> tr_good: 0 >> >> pvid: 0 >> >> link: port:5 link:down >> >> Port 6: >> >> disable: 0 >> >> doubletag: 0 >> >> untag: 0 >> >> led: ??? >> >> lan: ??? >> >> recv_bad: ??? >> >> recv_good: ??? >> >> tr_bad: ??? >> >> tr_good: ??? >> >> pvid: 0 >> >> link: port:6 link:up speed:1000baseT full-duplex >> >> VLAN 1: >> >> ports: 1 2 3 4 6t >> >> VLAN 2: >> >> ports: 0 6t >> >> >> >> >> >> >> >> -- >> >> Jon Smirl >> >> jonsm...@gmail.com >> >> _______________________________________________ >> >> openwrt-devel mailing list >> >> openwrt-devel@lists.openwrt.org >> >> https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel >> > >> > >> > >> > _______________________________________________ >> > openwrt-devel mailing list >> > openwrt-devel@lists.openwrt.org >> > https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel >> > >> >> >> >> -- >> Jon Smirl >> jonsm...@gmail.com >> _______________________________________________ >> openwrt-devel mailing list >> openwrt-devel@lists.openwrt.org >> https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel > > > _______________________________________________ > openwrt-devel mailing list > openwrt-devel@lists.openwrt.org > https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel > -- Jon Smirl jonsm...@gmail.com
file-work.tgz
Description: GNU Zip compressed data
_______________________________________________ openwrt-devel mailing list openwrt-devel@lists.openwrt.org https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel