[FS#1541] Invalid Kernel logspam : sit: non-ECT from <various IPs, Invalid IPs>

LEDE Bugs lede-bugs at lists.infradead.org
Thu May 10 01:49:52 PDT 2018


A new Flyspray task has been opened.  Details are below. 

User who did this - plntyk (plntyk) 

Attached to Project - OpenWrt/LEDE Project
Summary - Invalid Kernel logspam : sit: non-ECT from 
Task Type - Bug Report
Category - Kernel
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Low
Priority - Very Low
Reported Version - Trunk
Due in Version - Undecided
Due Date - Undecided
Details - Invalid IP suggests sth. wrong ?

Logs:

 dmesg |grep sit | sed 's/\[\ *[0-9]*\.[0-9]*\]//g' |sort |uniq

 sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
 sit: non-ECT from 0.14.42.24 with TOS=0x2
 sit: non-ECT from 0.14.42.24 with TOS=0x6
 sit: non-ECT from 0.14.42.24 with TOS=0xb
 sit: non-ECT from 0.14.42.24 with TOS=0xe
 sit: non-ECT from 0.14.42.24 with TOS=0xf
 sit: non-ECT from 0.206.0.0 with TOS=0x1
 sit: non-ECT from 0.206.0.0 with TOS=0x9
 sit: non-ECT from 0.206.0.0 with TOS=0xa
 sit: non-ECT from 1.30.2.141 with TOS=0x5
 sit: non-ECT from 1.30.2.141 with TOS=0x9
 sit: non-ECT from 1.30.2.141 with TOS=0xb
 sit: non-ECT from 1.30.2.141 with TOS=0xf
 sit: non-ECT from 1.30.2.143 with TOS=0x3
 sit: non-ECT from 1.30.2.143 with TOS=0x5
 sit: non-ECT from 1.30.2.143 with TOS=0x9
 sit: non-ECT from 1.30.2.143 with TOS=0xe
 sit: non-ECT from 20.22.0.242 with TOS=0x5
 sit: non-ECT from 20.22.0.242 with TOS=0x9
 sit: non-ECT from 20.22.0.242 with TOS=0xb
 sit: non-ECT from 32.0.0.1 with TOS=0x6
 sit: non-ECT from 32.0.0.1 with TOS=0x9
 sit: non-ECT from 32.72.0.1 with TOS=0x6
 sit: non-ECT from 64.1.8.27 with TOS=0x2
 sit: non-ECT from 64.1.8.27 with TOS=0xb
 sit: non-ECT from 64.1.8.27 with TOS=0xd
 sit: non-ECT from 64.1.8.27 with TOS=0xf
 sit: non-ECT from 64.14.8.11 with TOS=0xe
 sit: non-ECT from 64.14.8.5 with TOS=0x5
 sit: non-ECT from 64.14.8.5 with TOS=0xd
 sit: non-ECT from 64.14.8.7 with TOS=0x1
 sit: non-ECT from 64.14.8.7 with TOS=0x2
 sit: non-ECT from 64.14.8.7 with TOS=0x3
 sit: non-ECT from 64.14.8.7 with TOS=0x6
 sit: non-ECT from 64.14.8.7 with TOS=0xa
 sit: non-ECT from 64.14.8.7 with TOS=0xd
 sit: non-ECT from 64.14.8.9 with TOS=0xd
 sit: non-ECT from 72.96.0.0 with TOS=0x1
 sit: non-ECT from 72.96.0.0 with TOS=0x2
 sit: non-ECT from 72.96.0.0 with TOS=0x3
 sit: non-ECT from 72.96.0.0 with TOS=0x5
 sit: non-ECT from 72.96.0.0 with TOS=0x6
 sit: non-ECT from 72.96.0.0 with TOS=0x7
 sit: non-ECT from 72.96.0.0 with TOS=0x9
 sit: non-ECT from 72.96.0.0 with TOS=0xa
 sit: non-ECT from 72.96.0.0 with TOS=0xb
 sit: non-ECT from 72.96.0.0 with TOS=0xe
 sit: non-ECT from 72.96.0.0 with TOS=0xf

Supply the following if possible:
 - Device problem occurs on

TP-Link WDR3600

 - Software versions of OpenWrt/LEDE release, packages, etc.

root at OpenWrt:~# cat /etc/openwrt_version 
r6867-ce4d2fb5cc
root at OpenWrt:~# cat /etc/openwrt_release 
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='SNAPSHOT'
DISTRIB_REVISION='r6867-ce4d2fb5cc'
DISTRIB_TARGET='ar71xx/generic'
DISTRIB_ARCH='mips_24kc'
DISTRIB_DESCRIPTION='OpenWrt SNAPSHOT r6867-ce4d2fb5cc'
DISTRIB_TAINTS='no-all'

 - Steps to reproduce

Updated router to recent trunk (WDR3600)
kept config 


Guessing:
log spam might involve tunnelbroker tunnel or openvpn server


some issues with either comp_lzo or openvpn-mbedtls on updating 
were resolved with "compress lzo" and openvpn-openssl on server side

vpn client is LEDE r5099 (OpenVPN 2.4.4 mips-openwrt-linux-gnu [SSL (mbed TLS)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
library versions: mbed TLS 2.6.0, LZO 2.10)




More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=1541



More information about the lede-bugs mailing list