Let’s check for a permissions issue:Same result. Should I try uninstalling FlexQOS and reinstalling
ls -laR /jffs/addons/flexqos/ /jffs/scripts
Let’s check for a permissions issue:Same result. Should I try uninstalling FlexQOS and reinstalling
ls -laR /jffs/addons/flexqos/ /jffs/scripts
Let’s check for a permissions issue:
ls -laR /jffs/addons/flexqos/ /jffs/scripts
I’m mostly out of (good) ideas. Try these commands to see if they give errors:jadmin@RT-AC86U-07F8:/tmp/home/root# ls -laR /jffs/addons/flexqos/ /jffs/scripts
/jffs/addons/flexqos/:
drwxr-x--- 2 jadmin root 0 Jul 21 07:23 .
drwxr-xr-x 9 jadmin root 0 Jul 21 07:23 ..
-rw-rw-rw- 1 jadmin root 85561 Jul 21 07:23 flexqos.asp
-rwxr-xr-x 1 jadmin root 59931 Jul 21 07:23 flexqos.sh
/jffs/scripts:
drwxr-xr-x 2 jadmin root 0 Jul 21 07:23 .
drwxr-xr-x 15 jadmin root 0 Dec 31 1969 ..
-rwxr-xr-x 1 jadmin root 5060 Mar 4 17:27 CameraBlock.sh
-rwxr-xr-x 1 jadmin root 38991 Jun 8 21:27 connmon
-rwxr-xr-x 1 jadmin root 6321 Feb 12 15:46 echotest.sh
-rwxr-xr-x 1 jadmin root 221519 Jul 21 07:22 firewall
-rwxr-xr-x 1 jadmin root 150 Jul 21 07:23 firewall-start
-rwxr-xr-x 1 jadmin root 70 Feb 9 15:59 init-start
-rwxr-xr-x 1 jadmin root 11 Jun 29 21:16 nat-start
-rwxr-xr-x 1 jadmin root 247 May 22 22:25 post-mount
-rwxr-xr-x 1 jadmin root 224 Jan 27 10:45 post-mount.div
-rwxr-xr-x 1 jadmin root 57 May 17 01:31 pre-mount
-rwxr-xr-x 1 jadmin root 48746 Jun 22 20:50 scribe
-rwxr-xr-x 1 jadmin root 311 May 22 22:34 service-event
-rwxr-xr-x 1 jadmin root 259 Jul 21 07:23 service-event-end
-rwxr-xr-x 1 jadmin root 228 Jul 21 07:23 services-start
-rwxr-xr-x 1 jadmin root 118 Jun 29 21:16 services-stop
-rwxr-xr-x 1 jadmin root 63428 Jun 8 21:27 spdmerlin
-rwxr-xr-x 1 jadmin root 15268 May 17 01:36 uiScribe
-rwxr-xr-x 1 jadmin root 159 May 22 22:25 unmount
touch /jffs/addons/flexqos/touchtest
touch /jffs/scripts/touchtest
rm /jffs/addons/flexqos/touchtest
rm /jffs/scripts/touchtest
mount | grep jffs
date
df
I’m mostly out of (good) ideas. Try these commands to see if they give errors:
Bash:touch /jffs/addons/flexqos/touchtest touch /jffs/scripts/touchtest rm /jffs/addons/flexqos/touchtest rm /jffs/scripts/touchtest mount | grep jffs date df
I don’t understand why this is happening. Do other scripts still update and function properly?jadmin@RT-AC86U-07F8:/tmp/home/root# touch /jffs/addons/flexqos/touchtest touch: /jffs/addons/flexqos/touchtest: No space left on device jadmin@RT-AC86U-07F8:/tmp/home/root# touch /jffs/scripts/touchtest touch: /jffs/scripts/touchtest: No space left on device
totally agree.. just think the list could lessen or eliminate the need for peopel to request the same info over and over again form the comunity because we all know.. not all are friendly about that sort of thing.The only remaining hard-coded rules in the script is half of the original VPN fix, and the rule to establish the Game Downloads tc filter. Everything else has been moved to the user-customizable config. I think most of the default rules are safe for new users. Advanced users who don’t want them can delete them. Despite the evolution of the QoS scripts, it is still a challenge to customize your own iptables rules, and potentially beyond some users’ skill or desire.
I do wish that the forum had the ability to have a wiki post (like I’ve seen on forums.macrumors.com), because I’m not that interested in curating a list of user rules. That’s where all the gamers and others with the experience come in. I intend to provide the framework. What everyone does within that framework (beyond the defaults) is best to come from community collaboration, like it has been since FreshJR disappeared.
Was it a significant IP change (all 4 octets) or a minor change to the last octet that could be handled by a CIDR block? Chasing DNS names is a losing proposition and relatively incongruent with iptables. If it’s multiple IPs within a /24 or even a /16 CIDR, it may be worth going that route.
Watching a different thread, it seems that the following command achieves what I needThat's one option to kill the WiFi based devices, but not ethernet connected. There's another thread about disabling internet access via the firewall which has my interest https://www.snbforums.com/threads/disable-internet-access-via-command-line.64861/#post-603102. I might see if I can fudge together a forced disconnect for 30 seconds every time FlexQoS restarts on my router.
conntrack -D
Jul 27 19:21:03 FlexQoS: TC Modification delayed for 10 seconds
Jul 27 19:21:06 FlexQoS: Applying AppDB static rules
Jul 27 19:21:06 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:06 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:06 FlexQoS: Adaptive QoS not fully done setting up prior to modification script
Jul 27 19:21:06 FlexQoS: (Skipping class modification, delay trigger time period needs increase)
Jul 27 19:21:06 FlexQoS: Applying custom AppDB rules and custom rates
Jul 27 19:21:07 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:07 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:07 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:07 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:07 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:07 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:09 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:09 FlexQoS: We have an error talking to the kernel
Jul 27 19:21:09 FlexQoS: RTNETLINK answers: Invalid argument
Jul 27 19:21:09 FlexQoS: We have an error talking to the kernel
Jul 27 19:31:00 FlexQoS: /jffs/addons/flexqos/flexqos.sh (pid=19434) called with 1 args: -check
Jul 27 19:31:00 FlexQoS: No TC modifications necessary
FlexQoS v0.9.5 released 2020-07-24
Debug:
Log date: 2020-07-27 19:26:32+0200
Router Model: RT-AX58U
Firmware Ver: 384.18_0
tc WAN iface: eth4
Undf Prio: 2
Undf FlowID: 1:13
Classes Present: 8
Down Band: 71680
Up Band : 32768
***********
Net Control = 1:10
Work-From-Home = 1:11
Gaming = 1:12
Others = 1:13
Web Surfing = 1:14
Streaming = 1:15
Downloads = 1:16
Defaults = 1:17
***********
Downrates -- 3584, 14336, 10752, 7168, 7168, 21504, 3584, 3584
Downceils -- 71680, 71680, 71680, 71680, 71680, 71680, 71680, 71680
Downbursts -- 3198b, 17593b, 7996b, 3197b, 3197b, 3196b, 3198b, 3198b
DownCbursts -- 89600b, 89600b, 89600b, 89600b, 89600b, 89600b, 89600b, 89600b
DownQuantums -- default, default, default, default, default, 268800, default, default
***********
Uprates -- 1638, 6553, 4915, 9830, 3276, 3276, 1638, 1638
Upceils -- 32768, 32768, 32768, 32768, 32768, 32768, 32768, 32768
Upbursts -- 3198b, 7997b, 3197b, 3197b, 3198b, 3198b, 3198b, 3199b
UpCbursts -- 39985b, 39985b, 39985b, 39985b, 39985b, 39985b, 39985b, 39985b
UpQuantums -- default, default, default, default, default, default, default, default
iptables settings: <>>udp>>500,4500>>3<>>udp>16384:16415>>>3<>>tcp>>119,563>>5<>>tcp>>80,443>08****>7
iptables -D POSTROUTING -t mangle -o br0 -p udp -m multiport --sports 500,4500 -j MARK --set-mark 0x80060001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o br0 -p udp -m multiport --sports 500,4500 -j MARK --set-mark 0x80060001
iptables -D POSTROUTING -t mangle -o eth4 -p udp -m multiport --dports 500,4500 -j MARK --set-mark 0x40060001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o eth4 -p udp -m multiport --dports 500,4500 -j MARK --set-mark 0x40060001
iptables -D POSTROUTING -t mangle -o br0 -p udp --dport 16384:16415 -j MARK --set-mark 0x80060001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o br0 -p udp --dport 16384:16415 -j MARK --set-mark 0x80060001
iptables -D POSTROUTING -t mangle -o eth4 -p udp --sport 16384:16415 -j MARK --set-mark 0x40060001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o eth4 -p udp --sport 16384:16415 -j MARK --set-mark 0x40060001
iptables -D POSTROUTING -t mangle -o br0 -p tcp -m multiport --sports 119,563 -j MARK --set-mark 0x80030001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o br0 -p tcp -m multiport --sports 119,563 -j MARK --set-mark 0x80030001
iptables -D POSTROUTING -t mangle -o eth4 -p tcp -m multiport --dports 119,563 -j MARK --set-mark 0x40030001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o eth4 -p tcp -m multiport --dports 119,563 -j MARK --set-mark 0x40030001
iptables -D POSTROUTING -t mangle -o br0 -p tcp -m multiport --sports 80,443 -m mark --mark 0x80080000/0xc03f0000 -j MARK --set-mark 0x803f0001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o br0 -p tcp -m multiport --sports 80,443 -m mark --mark 0x80080000/0xc03f0000 -j MARK --set-mark 0x803f0001
iptables -D POSTROUTING -t mangle -o eth4 -p tcp -m multiport --dports 80,443 -m mark --mark 0x40080000/0xc03f0000 -j MARK --set-mark 0x403f0001 >/dev/null 2>&1
iptables -A POSTROUTING -t mangle -o eth4 -p tcp -m multiport --dports 80,443 -m mark --mark 0x40080000/0xc03f0000 -j MARK --set-mark 0x403f0001
appdb rules: <000000>6<00006B>6<0D0007>5<0D0086>5<0D00A0>5<12003F>4<13****>4<14****>4<1A****>5
realtc filter change dev br0 prio 2 protocol all handle 827::800 u32 flowid 1:13
realtc filter change dev eth4 prio 2 protocol all handle 827::800 u32 flowid 1:13
realtc filter add dev br0 protocol all prio 2 u32 match mark 0x8000006B 0xc03fffff flowid 1:13
realtc filter add dev eth4 protocol all prio 2 u32 match mark 0x4000006B 0xc03fffff flowid 1:13
realtc filter add dev br0 protocol all prio 15 u32 match mark 0x800D0007 0xc03fffff flowid 1:16
realtc filter add dev eth4 protocol all prio 15 u32 match mark 0x400D0007 0xc03fffff flowid 1:16
realtc filter add dev br0 protocol all prio 15 u32 match mark 0x800D0086 0xc03fffff flowid 1:16
realtc filter add dev eth4 protocol all prio 15 u32 match mark 0x400D0086 0xc03fffff flowid 1:16
realtc filter add dev br0 protocol all prio 15 u32 match mark 0x800D00A0 0xc03fffff flowid 1:16
realtc filter add dev eth4 protocol all prio 15 u32 match mark 0x400D00A0 0xc03fffff flowid 1:16
realtc filter add dev br0 protocol all prio 20 u32 match mark 0x8012003F 0xc03fffff flowid 1:14
realtc filter add dev eth4 protocol all prio 20 u32 match mark 0x4012003F 0xc03fffff flowid 1:14
realtc filter change dev br0 prio 22 protocol all handle 802::800 u32 flowid 1:14
realtc filter change dev eth4 prio 22 protocol all handle 802::800 u32 flowid 1:14
realtc filter change dev br0 prio 23 protocol all handle 804::800 u32 flowid 1:14
realtc filter change dev eth4 prio 23 protocol all handle 804::800 u32 flowid 1:14
realtc filter change dev br0 prio 2 protocol all handle 827::802 u32 flowid 1:16
realtc filter change dev eth4 prio 2 protocol all handle 827::802 u32 flowid 1:16
realtc class change dev br0 parent 1:1 classid 1:10 htb overhead 19 linklayer ethernet prio 0 rate 3584Kbit ceil 71680Kbit burst 3198b cburst 89600b
realtc class change dev br0 parent 1:1 classid 1:11 htb overhead 19 linklayer ethernet prio 1 rate 14336Kbit ceil 71680Kbit burst 17593b cburst 89600b
realtc class change dev br0 parent 1:1 classid 1:12 htb overhead 19 linklayer ethernet prio 2 rate 10752Kbit ceil 71680Kbit burst 7996b cburst 89600b
realtc class change dev br0 parent 1:1 classid 1:13 htb overhead 19 linklayer ethernet prio 3 rate 7168Kbit ceil 71680Kbit burst 3197b cburst 89600b
realtc class change dev br0 parent 1:1 classid 1:14 htb overhead 19 linklayer ethernet prio 4 rate 7168Kbit ceil 71680Kbit burst 3197b cburst 89600b
realtc class change dev br0 parent 1:1 classid 1:15 htb overhead 19 linklayer ethernet prio 5 rate 21504Kbit ceil 71680Kbit burst 3196b cburst 89600b quantum 268800
realtc class change dev br0 parent 1:1 classid 1:16 htb overhead 19 linklayer ethernet prio 6 rate 3584Kbit ceil 71680Kbit burst 3198b cburst 89600b
realtc class change dev br0 parent 1:1 classid 1:17 htb overhead 19 linklayer ethernet prio 7 rate 3584Kbit ceil 71680Kbit burst 3198b cburst 89600b
realtc class change dev eth4 parent 1:1 classid 1:10 htb overhead 19 linklayer ethernet prio 0 rate 1638Kbit ceil 32768Kbit burst 3198b cburst 39985b
realtc class change dev eth4 parent 1:1 classid 1:11 htb overhead 19 linklayer ethernet prio 1 rate 6553Kbit ceil 32768Kbit burst 7997b cburst 39985b
realtc class change dev eth4 parent 1:1 classid 1:12 htb overhead 19 linklayer ethernet prio 2 rate 4915Kbit ceil 32768Kbit burst 3197b cburst 39985b
realtc class change dev eth4 parent 1:1 classid 1:13 htb overhead 19 linklayer ethernet prio 3 rate 9830Kbit ceil 32768Kbit burst 3197b cburst 39985b
realtc class change dev eth4 parent 1:1 classid 1:14 htb overhead 19 linklayer ethernet prio 4 rate 3276Kbit ceil 32768Kbit burst 3198b cburst 39985b
realtc class change dev eth4 parent 1:1 classid 1:15 htb overhead 19 linklayer ethernet prio 5 rate 3276Kbit ceil 32768Kbit burst 3198b cburst 39985b
realtc class change dev eth4 parent 1:1 classid 1:16 htb overhead 19 linklayer ethernet prio 6 rate 1638Kbit ceil 32768Kbit burst 3198b cburst 39985b
realtc class change dev eth4 parent 1:1 classid 1:17 htb overhead 19 linklayer ethernet prio 7 rate 1638Kbit ceil 32768Kbit burst 3199b cburst 39985b
What do you see if you run:Im currently seeing some Error's inside my Log:
Code:Jul 27 19:21:03 FlexQoS: TC Modification delayed for 10 seconds Jul 27 19:21:06 FlexQoS: Applying AppDB static rules Jul 27 19:21:06 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:06 FlexQoS: We have an error talking to the kernel Jul 27 19:21:06 FlexQoS: Adaptive QoS not fully done setting up prior to modification script Jul 27 19:21:06 FlexQoS: (Skipping class modification, delay trigger time period needs increase) Jul 27 19:21:06 FlexQoS: Applying custom AppDB rules and custom rates Jul 27 19:21:07 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:07 FlexQoS: We have an error talking to the kernel Jul 27 19:21:07 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:07 FlexQoS: We have an error talking to the kernel Jul 27 19:21:07 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:07 FlexQoS: We have an error talking to the kernel Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel Jul 27 19:21:08 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:08 FlexQoS: We have an error talking to the kernel Jul 27 19:21:09 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:09 FlexQoS: We have an error talking to the kernel Jul 27 19:21:09 FlexQoS: RTNETLINK answers: Invalid argument Jul 27 19:21:09 FlexQoS: We have an error talking to the kernel Jul 27 19:31:00 FlexQoS: /jffs/addons/flexqos/flexqos.sh (pid=19434) called with 1 args: -check Jul 27 19:31:00 FlexQoS: No TC modifications necessary
tc qdisc ls | grep "htb.*root"
tc -d class show dev eth4 | grep "parent 1:1 "
realtc class change dev eth4 parent 1:1 classid 1:17 htb overhead 19 linklayer ethernet prio 7 rate 1638Kbit ceil 32768Kbit burst 3199b cburst 39985b
Add a screenshot of your rules. Also...why not put a static IP on the device and make that IP go under the gaming category?Hi, I just installed today, thanks @dave14305 for the hard work.
I am trying to put stadia into gaming traffic rather than others, I add the remote port range 44700:44899 (TCP/UDP) to the iptables rules under remote port but it stays in others after I apply and I’m not sure what I am doing wrong?
Add a screenshot of your rules. Also...why not put a static IP on the device and make that IP go under the gaming category?
What do the Stadia connections look like in the connection list? Could you just take any unmarked (000000) traffic from the Chromecast IP and call that Gaming?Hi, I just installed today, thanks @dave14305 for the hard work.
I am trying to put stadia into gaming traffic rather than others, I add the remote port range 44700:44899 (TCP/UDP) to the iptables rules under remote port but it stays in others after I apply and I’m not sure what I am doing wrong?
What do the Stadia connections look like in the connection list? Could you just take any unmarked (000000) traffic from the Chromecast IP and call that Gaming?
Try runningHi, if I add the untracked 000000 from the Chromecast it still shows in others.
conntrack -F
to clear the existing connections table. It may let iptables properly mark the traffic that was already established beforehand. If there is nothing else active in Others in the connection list, something else is wrong.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!