[FS#1541] Invalid Kernel logspam : sit: non-ECT from <various IPs, Invalid IPs>
LEDE Bugs
lede-bugs at lists.infradead.org
Thu May 10 01:49:52 PDT 2018
A new Flyspray task has been opened. Details are below.
User who did this - plntyk (plntyk)
Attached to Project - OpenWrt/LEDE Project
Summary - Invalid Kernel logspam : sit: non-ECT from
Task Type - Bug Report
Category - Kernel
Status - Unconfirmed
Assigned To -
Operating System - All
Severity - Low
Priority - Very Low
Reported Version - Trunk
Due in Version - Undecided
Due Date - Undecided
Details - Invalid IP suggests sth. wrong ?
Logs:
dmesg |grep sit | sed 's/\[\ *[0-9]*\.[0-9]*\]//g' |sort |uniq
sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
sit: non-ECT from 0.14.42.24 with TOS=0x2
sit: non-ECT from 0.14.42.24 with TOS=0x6
sit: non-ECT from 0.14.42.24 with TOS=0xb
sit: non-ECT from 0.14.42.24 with TOS=0xe
sit: non-ECT from 0.14.42.24 with TOS=0xf
sit: non-ECT from 0.206.0.0 with TOS=0x1
sit: non-ECT from 0.206.0.0 with TOS=0x9
sit: non-ECT from 0.206.0.0 with TOS=0xa
sit: non-ECT from 1.30.2.141 with TOS=0x5
sit: non-ECT from 1.30.2.141 with TOS=0x9
sit: non-ECT from 1.30.2.141 with TOS=0xb
sit: non-ECT from 1.30.2.141 with TOS=0xf
sit: non-ECT from 1.30.2.143 with TOS=0x3
sit: non-ECT from 1.30.2.143 with TOS=0x5
sit: non-ECT from 1.30.2.143 with TOS=0x9
sit: non-ECT from 1.30.2.143 with TOS=0xe
sit: non-ECT from 20.22.0.242 with TOS=0x5
sit: non-ECT from 20.22.0.242 with TOS=0x9
sit: non-ECT from 20.22.0.242 with TOS=0xb
sit: non-ECT from 32.0.0.1 with TOS=0x6
sit: non-ECT from 32.0.0.1 with TOS=0x9
sit: non-ECT from 32.72.0.1 with TOS=0x6
sit: non-ECT from 64.1.8.27 with TOS=0x2
sit: non-ECT from 64.1.8.27 with TOS=0xb
sit: non-ECT from 64.1.8.27 with TOS=0xd
sit: non-ECT from 64.1.8.27 with TOS=0xf
sit: non-ECT from 64.14.8.11 with TOS=0xe
sit: non-ECT from 64.14.8.5 with TOS=0x5
sit: non-ECT from 64.14.8.5 with TOS=0xd
sit: non-ECT from 64.14.8.7 with TOS=0x1
sit: non-ECT from 64.14.8.7 with TOS=0x2
sit: non-ECT from 64.14.8.7 with TOS=0x3
sit: non-ECT from 64.14.8.7 with TOS=0x6
sit: non-ECT from 64.14.8.7 with TOS=0xa
sit: non-ECT from 64.14.8.7 with TOS=0xd
sit: non-ECT from 64.14.8.9 with TOS=0xd
sit: non-ECT from 72.96.0.0 with TOS=0x1
sit: non-ECT from 72.96.0.0 with TOS=0x2
sit: non-ECT from 72.96.0.0 with TOS=0x3
sit: non-ECT from 72.96.0.0 with TOS=0x5
sit: non-ECT from 72.96.0.0 with TOS=0x6
sit: non-ECT from 72.96.0.0 with TOS=0x7
sit: non-ECT from 72.96.0.0 with TOS=0x9
sit: non-ECT from 72.96.0.0 with TOS=0xa
sit: non-ECT from 72.96.0.0 with TOS=0xb
sit: non-ECT from 72.96.0.0 with TOS=0xe
sit: non-ECT from 72.96.0.0 with TOS=0xf
Supply the following if possible:
- Device problem occurs on
TP-Link WDR3600
- Software versions of OpenWrt/LEDE release, packages, etc.
root at OpenWrt:~# cat /etc/openwrt_version
r6867-ce4d2fb5cc
root at OpenWrt:~# cat /etc/openwrt_release
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='SNAPSHOT'
DISTRIB_REVISION='r6867-ce4d2fb5cc'
DISTRIB_TARGET='ar71xx/generic'
DISTRIB_ARCH='mips_24kc'
DISTRIB_DESCRIPTION='OpenWrt SNAPSHOT r6867-ce4d2fb5cc'
DISTRIB_TAINTS='no-all'
- Steps to reproduce
Updated router to recent trunk (WDR3600)
kept config
Guessing:
log spam might involve tunnelbroker tunnel or openvpn server
some issues with either comp_lzo or openvpn-mbedtls on updating
were resolved with "compress lzo" and openvpn-openssl on server side
vpn client is LEDE r5099 (OpenVPN 2.4.4 mips-openwrt-linux-gnu [SSL (mbed TLS)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
library versions: mbed TLS 2.6.0, LZO 2.10)
More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=1541
More information about the lede-bugs
mailing list