Closed binge8 closed 3 years ago
关闭sfe后已经正常运行一周了。
我把docker相关都删除了 开启sfe 正常运行一周了。
同样,把luci-app-sfe换成luci-app-flowoffload之后,终于再次可以稳定运行6天以上不重启。之前5天之内就重启了
可能并不是sfe或者是flowoffload. 之前我用的flowoffload 6天内必死,关闭转发也不行。 最后使用dirclean重新编译SFE后问题解决。 CPU: J1900
I36100U也会出现此问题
关掉sfe确实管用,4天没有重启了,j1900的cpu
几个月前发现同样问题J900 x86_64编译后运行2~5天内会无规律重启, 关闭SFE后该问题消失.
我用luci-app-flowoffload没重启过
唉我用5.4.86内核的openwrt也一直频繁死机,
是1037u的软路由
唉我用5.4.86内核的openwrt也一直频繁死机,
牛逼 x86 还开hwnat 不懂的设置请保持默认
唉我用5.4.86内核的openwrt也一直频繁死机,
牛逼 x86 还开hwnat 不懂的设置请保持默认
那选项关了看看他会不会死机了
唉我用5.4.86内核的openwrt也一直频繁死机,
牛逼 x86 还开hwnat 不懂的设置请保持默认
依旧死机了
23:42开始开机到1:38左右死机了1:40自动重启了从1:31开始到1:40没系统日志不知道日志里有没有啥重要东西 Tue Jan 26 23:42:22 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:22 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:22 2021 daemon.info dnsmasq[2728]: Connected to system UBus Tue Jan 26 23:42:22 2021 daemon.info acpid: starting up with netlink and the input layer Tue Jan 26 23:42:22 2021 daemon.info acpid: 1 rule loaded Tue Jan 26 23:42:22 2021 daemon.info acpid: waiting for events: event logging is off Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: 8021ad Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: 8021q Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: macvlan Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: veth Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: bridge Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: Network device Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: tunnel Tue Jan 26 23:42:22 2021 daemon.notice wpa_supplicant[2847]: Successfully initialized wpa_supplicant Tue Jan 26 23:42:23 2021 cron.err crond[3004]: crond (busybox 1.31.1) started, log level 8 Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.434970] eth0: 0xffffc90000051000, 1c:fd:08:70:a1:95, IRQ 28 Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.533088] br-lan: port 1(eth0) entered blocking state Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.538442] br-lan: port 1(eth0) entered disabled state Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.543875] device eth0 entered promiscuous mode Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'lan' is enabled Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'lan' is setting up now Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'lan' is now up Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' is enabled Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' is setting up now Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' is now up Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.551870] eth1: 0xffffc90000059000, 24:1c:04:70:0a:e9, IRQ 29 Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'wan' is enabled Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'wan6' is enabled Tue Jan 26 23:42:23 2021 daemon.notice netifd: Network device 'lo' link is up Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' has link connectivity Tue Jan 26 23:42:23 2021 user.notice mwan3[3049]: Using firewall mask 0x3F00 Tue Jan 26 23:42:23 2021 user.notice mwan3[3049]: Max interface count is 60 Tue Jan 26 23:42:23 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: net.ipv4.tcp_congestion_control = bbr Tue Jan 26 23:42:23 2021 user.notice firewall: Reloading firewall due to ifup of lan (br-lan) Tue Jan 26 23:42:23 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:23 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:23 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: DNSMASQ change Tue Jan 26 23:42:23 2021 daemon.info dnsmasq[3435]: Connected to system UBus Tue Jan 26 23:42:24 2021 user.notice upnp daemon: external interface not found, not starting Tue Jan 26 23:42:24 2021 authpriv.info dropbear[3552]: Not backgrounding Tue Jan 26 23:42:24 2021 daemon.warn odhcpd[2974]: A default route is present but there is no public prefix on lan thus we don't announce a default route! Tue Jan 26 23:42:24 2021 daemon.err odhcpd[2974]: Failed to send to ff02::1%lan@br-lan (Permission denied) Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534). Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Successfully dropped root privileges. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: avahi-daemon 0.8 starting up. Tue Jan 26 23:42:24 2021 daemon.warn avahi-daemon[3762]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: No service file found in /etc/avahi/services. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface br-lan.IPv4 with address 192.168.1.1. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: New relevant interface br-lan.IPv4 for mDNS. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface lo.IPv6 with address ::1. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: New relevant interface lo.IPv6 for mDNS. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: New relevant interface lo.IPv4 for mDNS. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Network interface enumeration completed. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering new address record for 192.168.1.1 on br-lan.IPv4. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering new address record for ::1 on lo.. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering new address record for 127.0.0.1 on lo.IPv4. Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering HINFO record with values 'X86_64'/'LINUX'. Tue Jan 26 23:42:24 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: workdir is a f2fs filesystem Tue Jan 26 23:42:24 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: AdGuardHome service enabled Tue Jan 26 23:42:24 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: luci enable switch=1 Tue Jan 26 23:42:24 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:24 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:24 2021 daemon.info dnsmasq[4104]: Connected to system UBus Tue Jan 26 23:42:25 2021 daemon.info procd: Not starting instance acpid::data, command not set Tue Jan 26 23:42:25 2021 kern.info kernel: [ 15.679877] r8168: eth1: link up Tue Jan 26 23:42:25 2021 kern.info kernel: [ 15.684071] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Tue Jan 26 23:42:25 2021 daemon.notice netifd: Network device 'eth1' link is up Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan' has link connectivity Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan' is setting up now Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan6' has link connectivity Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan6' is setting up now Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - slhc Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - ppp_generic Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - pppox Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - pppoe Tue Jan 26 23:42:25 2021 daemon.err odhcp6c[4343]: Failed to send RS (Address not available) Tue Jan 26 23:42:25 2021 daemon.info avahi-daemon[3762]: Server startup complete. Host name is OpenWrt.local. Local service cookie is 659041328. Tue Jan 26 23:42:25 2021 daemon.notice procd: /etc/rc.d/S99dnsfilter: 2021-01-26 23:42:25 [DNSFilter is disabled] Tue Jan 26 23:42:25 2021 daemon.notice procd: /etc/rc.d/S99haproxy: /etc/rc.common: /etc/rc.d/S99haproxy: line 21: extra_command: not found Tue Jan 26 23:42:25 2021 daemon.notice procd: /etc/init.d/haproxy: /etc/rc.common: /etc/init.d/haproxy: line 21: extra_command: not found Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: Plugin rp-pppoe.so loaded. Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8 Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: pppd 2.4.8 started by root, uid 0 Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: PPP session is 32593 Tue Jan 26 23:42:25 2021 daemon.warn pppd[4350]: Connected to cc:1a:fa:ee:7c:a0 via interface eth1 Tue Jan 26 23:42:25 2021 kern.info kernel: [ 16.011055] pppoe-wan: renamed from ppp0 Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: Renamed interface ppp0 to pppoe-wan Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: Using interface pppoe-wan Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: Connect: pppoe-wan <--> eth1 Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: syncppp not active Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: CHAP authentication succeeded: Authentication Successful,Welcome! Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: CHAP authentication succeeded Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: peer from calling number CC:1A:FA:EE:7C:x authorized Tue Jan 26 23:42:25 2021 user.info : SIGNAL: Not enabling reaper Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: local IP address 122.x.80.x Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: remote IP address 122.x.80.x Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: primary DNS address 58.x.57.33 Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: secondary DNS address 221.x.4.66 Tue Jan 26 23:42:26 2021 daemon.notice pppd[4350]: local LL address fe80::261c:04f0:fe70:x Tue Jan 26 23:42:26 2021 daemon.notice pppd[4350]: remote LL address fe80::ce1a:faff:feee:x Tue Jan 26 23:42:26 2021 daemon.notice netifd: Network device 'pppoe-wan' link is up Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan' is now up Tue Jan 26 23:42:26 2021 daemon.notice netifd: Network alias 'pppoe-wan' link is up Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' is enabled Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' has link connectivity Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' is setting up now Tue Jan 26 23:42:26 2021 daemon.err odhcp6c[4343]: Failed to send DHCPV6 message to ff02::1:2 (Address not available) Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.607886] r8168: eth0: link up Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.612284] br-lan: port 1(eth0) entered blocking state Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.617614] br-lan: port 1(eth0) entered forwarding state Tue Jan 26 23:42:26 2021 daemon.notice netifd: Network device 'eth0' link is up Tue Jan 26 23:42:26 2021 daemon.notice netifd: bridge 'br-lan' link is up Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'lan' has link connectivity Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.626781] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' is now up Tue Jan 26 23:42:26 2021 daemon.notice procd: /etc/rc.d/S99serverchan: serverchan is starting now ... Tue Jan 26 23:42:26 2021 user.info mwan3rtmon[3346]: Detect rtchange event. Tue Jan 26 23:42:27 2021 user.notice mwan3[4532]: Execute ifup event on interface wan (pppoe-wan) Tue Jan 26 23:42:27 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::261c:4ff:fe70:ae9. Tue Jan 26 23:42:27 2021 daemon.info avahi-daemon[3762]: New relevant interface eth1.IPv6 for mDNS. Tue Jan 26 23:42:27 2021 daemon.info avahi-daemon[3762]: Registering new address record for fe80::261c:4ff:fe70:ae9 on eth1.. Tue Jan 26 23:42:27 2021 daemon.warn odhcpd[2974]: A default route is present but there is no public prefix on lan thus we don't announce a default route! Tue Jan 26 23:42:27 2021 daemon.err odhcpd[2974]: Failed to send to ff02::1%lan@br-lan (Address not available) Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: ttyd 1.6.0-13d699e (libwebsockets 3.2.0) Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: tty configuration: Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: start command: /usr/libexec/login.sh Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: close signal: SIGHUP (1) Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: terminal type: xterm-256color Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: Using foreign event loop... Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: Listening on port: 7681 Tue Jan 26 23:42:27 2021 daemon.err nmbd[4173]: [2021/01/26 23:42:27.665826, 0] ../../lib/util/become_daemon.c:136(daemon_ready) Tue Jan 26 23:42:27 2021 daemon.err nmbd[4173]: daemon_ready: daemon 'nmbd' finished starting up and ready to serve connections Tue Jan 26 23:42:27 2021 daemon.info procd: - init complete - Tue Jan 26 23:42:27 2021 user.info wsdd2[5305]: starting. Tue Jan 26 23:42:28 2021 daemon.err smbd[4172]: [2021/01/26 23:42:28.070233, 0] ../../lib/util/become_daemon.c:136(daemon_ready) Tue Jan 26 23:42:28 2021 daemon.err smbd[4172]: daemon_ready: daemon 'smbd' finished starting up and ready to serve connections Tue Jan 26 23:42:28 2021 cron.err crond[5502]: crond (busybox 1.31.1) started, log level 8 Tue Jan 26 23:42:28 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface br-lan.IPv6 with address fe80::1efd:8ff:fe70:a195. Tue Jan 26 23:42:28 2021 daemon.info avahi-daemon[3762]: New relevant interface br-lan.IPv6 for mDNS. Tue Jan 26 23:42:28 2021 daemon.info avahi-daemon[3762]: Registering new address record for fe80::1efd:8ff:fe70:a195 on br-lan.. Tue Jan 26 23:42:28 2021 user.notice mwan3[4532]: Starting tracker on interface wan (pppoe-wan) Tue Jan 26 23:42:30 2021 daemon.info dnsmasq[6376]: Connected to system UBus Tue Jan 26 23:42:30 2021 user.info mwan3rtmon[3346]: Detect rtchange event. Tue Jan 26 23:42:30 2021 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan) Tue Jan 26 23:42:31 2021 user.notice firewall: Reloading firewall due to ifupdate of wan (pppoe-wan) Tue Jan 26 23:42:31 2021 user.notice ddns-scripts[6715]: ipv4: PID '6715' started at 2021-01-26 23:42 Tue Jan 26 23:42:31 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Tue Jan 26 23:42:31 2021 user.info mwan3track[6225]: Check (ping) failed for target "114.114.114.114" on interface wan (pppoe-wan) Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: could not open lease file: /var/upnp.leases Tue Jan 26 23:42:31 2021 daemon.notice miniupnpd[7081]: HTTP listening on port 5000 Tue Jan 26 23:42:31 2021 daemon.notice miniupnpd[7081]: Listening for NAT-PMP/PCP traffic on port 5351 Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted Tue Jan 26 23:42:31 2021 user.info mwan3rtmon[3346]: Detect rtchange event. Tue Jan 26 23:42:31 2021 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan) Tue Jan 26 23:42:33 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:33 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:33 2021 daemon.info dnsmasq[8407]: Connected to system UBus Tue Jan 26 23:42:33 2021 cron.err crond[8476]: crond (busybox 1.31.1) started, log level 8 Tue Jan 26 23:42:38 2021 user.info mwan3track[6225]: Lost 2 ping(s) on interface wan (pppoe-wan) Tue Jan 26 23:42:39 2021 daemon.notice netifd: Interface 'wan_6' has lost the connection Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Leaving mDNS multicast group on interface br-lan.IPv6 with address fe80::1efd:8ff:fe70:a195. Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface br-lan.IPv6 with address 2408:823d:5614:7f8::1. Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Registering new address record for 2408:823d:5614:7f8::1 on br-lan.. Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Withdrawing address record for fe80::1efd:8ff:fe70:a195 on br-lan. Tue Jan 26 23:42:39 2021 daemon.notice netifd: Interface 'wan_6' is now up Tue Jan 26 23:42:39 2021 user.info mwan3rtmon[3346]: Detect rtchange event. Tue Jan 26 23:42:39 2021 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan) Tue Jan 26 23:42:40 2021 cron.err crond[10142]: crond (busybox 1.31.1) started, log level 8 Tue Jan 26 23:42:40 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:40 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:40 2021 daemon.info dnsmasq[10252]: Connected to system UBus Tue Jan 26 23:42:42 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:42 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:42 2021 daemon.info dnsmasq[11295]: Connected to system UBus Tue Jan 26 23:42:42 2021 cron.err crond[11364]: crond (busybox 1.31.1) started, log level 8 Tue Jan 26 23:42:43 2021 cron.err crond[11543]: crond (busybox 1.31.1) started, log level 8 Tue Jan 26 23:42:43 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:43 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:43 2021 daemon.info dnsmasq[11629]: Connected to system UBus Tue Jan 26 23:42:45 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Tue Jan 26 23:42:45 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Tue Jan 26 23:42:45 2021 daemon.info dnsmasq[12618]: Connected to system UBus Tue Jan 26 23:42:45 2021 cron.err crond[12687]: crond (busybox 1.31.1) started, log level 8 Tue Jan 26 23:42:47 2021 daemon.info procd: Instance vmtoolsd::instance1 s in a crash loop 6 crashes, 0 seconds since last crash Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: [2021/01/26 23:42:50.705777, 0] ../../source3/nmbd/nmbd_become_lmb.c:397(become_local_master_stage2) Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: Samba name server OPENWRT is now a local master browser for workgroup WORKGROUP on subnet 192.168.1.1 Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: Tue Jan 26 23:45:21 2021 authpriv.info dropbear[16335]: Child connection from 192.168.1.242:40686 Tue Jan 26 23:50:22 2021 authpriv.info dropbear[16335]: Exit before auth from <192.168.1.242:40686>: Timeout before auth Wed Jan 27 00:12:01 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 00:12:01 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 00:12:01 2021 daemon.info dnsmasq[9287]: Connected to system UBus Wed Jan 27 00:12:02 2021 cron.err crond[9476]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 00:12:02 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 00:12:02 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 00:12:02 2021 daemon.info dnsmasq[9585]: Connected to system UBus Wed Jan 27 00:12:04 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 00:12:04 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 00:12:04 2021 daemon.info dnsmasq[10554]: Connected to system UBus Wed Jan 27 00:12:04 2021 cron.err crond[10623]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 00:12:34 2021 cron.err crond[11693]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 00:12:34 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 00:12:34 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 00:12:34 2021 daemon.info dnsmasq[11779]: Connected to system UBus Wed Jan 27 00:12:36 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 00:12:36 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 00:12:36 2021 daemon.info dnsmasq[12731]: Connected to system UBus Wed Jan 27 00:12:36 2021 cron.err crond[12800]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 00:18:07 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 00:35:01 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 00:42:34 2021 cron.err crond[30341]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 00:42:34 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 00:42:34 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 00:42:34 2021 daemon.info dnsmasq[30427]: Connected to system UBus Wed Jan 27 00:42:36 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 00:42:36 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 00:42:36 2021 daemon.info dnsmasq[31415]: Connected to system UBus Wed Jan 27 00:42:36 2021 cron.err crond[31484]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:01:00 2021 cron.err crond[31484]: USER root pid 10288 cmd /usr/share/jd-dailybonus/newapp.sh -u Wed Jan 27 01:05:00 2021 cron.err crond[31484]: USER root pid 12884 cmd sleep 4s; /usr/share/jd-dailybonus/newapp.sh -w Wed Jan 27 01:12:33 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 01:12:33 2021 user.info mwan3track[6225]: Check (ping) failed for target "114.114.114.114" on interface wan (pppoe-wan) Wed Jan 27 01:12:34 2021 cron.err crond[16945]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:12:34 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:12:34 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:12:34 2021 daemon.info dnsmasq[17031]: Connected to system UBus Wed Jan 27 01:12:36 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:12:36 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:12:36 2021 daemon.info dnsmasq[17987]: Connected to system UBus Wed Jan 27 01:12:36 2021 cron.err crond[18056]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:12:41 2021 user.info mwan3track[6225]: Lost 2 ping(s) on interface wan (pppoe-wan) Wed Jan 27 01:28:36 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 01:29:24 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 01:30:32 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 01:31:05 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 01:31:58 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan) Wed Jan 27 01:40:19 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:40:19 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:40:19 2021 daemon.info dnsmasq[2727]: Connected to system UBus Wed Jan 27 01:40:19 2021 daemon.info acpid: starting up with netlink and the input layer Wed Jan 27 01:40:19 2021 daemon.info acpid: 1 rule loaded Wed Jan 27 01:40:19 2021 daemon.info acpid: waiting for events: event logging is off Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: 8021ad Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: 8021q Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: macvlan Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: veth Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: bridge Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: Network device Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: tunnel Wed Jan 27 01:40:19 2021 daemon.notice wpa_supplicant[2846]: Successfully initialized wpa_supplicant Wed Jan 27 01:40:20 2021 cron.err crond[3003]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.854166] eth0: 0xffffc90000051000, 1c:fd:08:70:a1:95, IRQ 28 Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.932633] br-lan: port 1(eth0) entered blocking state Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.938015] br-lan: port 1(eth0) entered disabled state Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.943438] device eth0 entered promiscuous mode Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'lan' is enabled Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'lan' is setting up now Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'lan' is now up Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' is enabled Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' is setting up now Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' is now up Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.953123] eth1: 0xffffc90000059000, 24:1c:04:70:0a:e9, IRQ 29 Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'wan' is enabled Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'wan6' is enabled Wed Jan 27 01:40:20 2021 daemon.notice netifd: Network device 'lo' link is up Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' has link connectivity Wed Jan 27 01:40:20 2021 user.notice mwan3[3058]: Using firewall mask 0x3F00 Wed Jan 27 01:40:20 2021 user.notice mwan3[3058]: Max interface count is 60 Wed Jan 27 01:40:20 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: net.ipv4.tcp_congestion_control = bbr Wed Jan 27 01:40:20 2021 user.notice firewall: Reloading firewall due to ifup of lan (br-lan) Wed Jan 27 01:40:20 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:40:20 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:40:20 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: DNSMASQ change Wed Jan 27 01:40:20 2021 daemon.info dnsmasq[3434]: Connected to system UBus Wed Jan 27 01:40:21 2021 user.notice upnp daemon: external interface not found, not starting Wed Jan 27 01:40:21 2021 authpriv.info dropbear[3552]: Not backgrounding Wed Jan 27 01:40:21 2021 daemon.warn odhcpd[2973]: A default route is present but there is no public prefix on lan thus we don't announce a default route! Wed Jan 27 01:40:21 2021 daemon.err odhcpd[2973]: Failed to send to ff02::1%lan@br-lan (Permission denied) Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534). Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Successfully dropped root privileges. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: avahi-daemon 0.8 starting up. Wed Jan 27 01:40:21 2021 daemon.warn avahi-daemon[3678]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: No service file found in /etc/avahi/services. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface br-lan.IPv4 with address 192.168.1.1. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: New relevant interface br-lan.IPv4 for mDNS. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface lo.IPv6 with address ::1. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: New relevant interface lo.IPv6 for mDNS. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: New relevant interface lo.IPv4 for mDNS. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Network interface enumeration completed. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering new address record for 192.168.1.1 on br-lan.IPv4. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering new address record for ::1 on lo.. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering new address record for 127.0.0.1 on lo.IPv4. Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering HINFO record with values 'X86_64'/'LINUX'. Wed Jan 27 01:40:21 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: workdir is a f2fs filesystem Wed Jan 27 01:40:21 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: AdGuardHome service enabled Wed Jan 27 01:40:21 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: luci enable switch=1 Wed Jan 27 01:40:21 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:40:21 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:40:21 2021 daemon.info dnsmasq[4104]: Connected to system UBus Wed Jan 27 01:40:22 2021 daemon.info procd: Not starting instance acpid::data, command not set Wed Jan 27 01:40:22 2021 kern.info kernel: [ 16.095786] r8168: eth1: link up Wed Jan 27 01:40:22 2021 kern.info kernel: [ 16.099118] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Wed Jan 27 01:40:22 2021 daemon.notice netifd: Network device 'eth1' link is up Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan' has link connectivity Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan' is setting up now Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan6' has link connectivity Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan6' is setting up now Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - slhc Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - ppp_generic Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - pppox Wed Jan 27 01:40:22 2021 daemon.err odhcp6c[4256]: Failed to send RS (Address not available) Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - pppoe Wed Jan 27 01:40:22 2021 daemon.info avahi-daemon[3678]: Server startup complete. Host name is OpenWrt.local. Local service cookie is 13493876. Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: Plugin rp-pppoe.so loaded. Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8 Wed Jan 27 01:40:22 2021 daemon.notice pppd[4298]: pppd 2.4.8 started by root, uid 0 Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: PPP session is 7104 Wed Jan 27 01:40:22 2021 daemon.warn pppd[4298]: Connected to cc:1a:fa:ee:7c:a0 via interface eth1 Wed Jan 27 01:40:22 2021 kern.info kernel: [ 16.397175] pppoe-wan: renamed from ppp0 Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: Renamed interface ppp0 to pppoe-wan Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: Using interface pppoe-wan Wed Jan 27 01:40:22 2021 daemon.notice pppd[4298]: Connect: pppoe-wan <--> eth1 Wed Jan 27 01:40:22 2021 daemon.notice procd: /etc/rc.d/S99dnsfilter: 2021-01-27 01:40:22 [DNSFilter is disabled] Wed Jan 27 01:40:22 2021 daemon.notice procd: /etc/rc.d/S99haproxy: /etc/rc.common: /etc/rc.d/S99haproxy: line 21: extra_command: not found Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: syncppp not active Wed Jan 27 01:40:22 2021 daemon.notice procd: /etc/init.d/haproxy: /etc/rc.common: /etc/init.d/haproxy: line 21: extra_command: not found Wed Jan 27 01:40:23 2021 daemon.info pppd[4298]: CHAP authentication succeeded: Authentication Successful,Welcome! Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: CHAP authentication succeeded Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: peer from calling number CC:1A:FA:EE:7C:A0 authorized Wed Jan 27 01:40:23 2021 daemon.err odhcp6c[4256]: Failed to send DHCPV6 message to ff02::1:2 (Address not available) Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: local IP address 122.193.x.x Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: remote IP address 122.193.x.x Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: primary DNS address 58.240.x.33 Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: secondary DNS address 221.6.x.66 Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: local LL address fe80::261c:044d:d670:0ae9 Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: remote LL address fe80::ce1a:faff:feee:7ca0 Wed Jan 27 01:40:23 2021 daemon.notice netifd: Network device 'pppoe-wan' link is up Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan' is now up Wed Jan 27 01:40:23 2021 daemon.notice netifd: Network alias 'pppoe-wan' link is up Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan_6' is enabled Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan_6' has link connectivity Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan_6' is setting up now Wed Jan 27 01:40:23 2021 daemon.err nmbd[4174]: [2021/01/27 01:40:23.595280, 0] ../../lib/util/become_daemon.c:136(daemon_ready) Wed Jan 27 01:40:23 2021 daemon.err nmbd[4174]: daemon_ready: daemon 'nmbd' finished starting up and ready to serve connections Wed Jan 27 01:40:23 2021 user.info : SIGNAL: Not enabling reaper Wed Jan 27 01:40:23 2021 user.info mwan3rtmon[3351]: Detect rtchange event. Wed Jan 27 01:40:23 2021 daemon.err smbd[4173]: [2021/01/27 01:40:23.967236, 0] ../../lib/util/become_daemon.c:136(daemon_ready) Wed Jan 27 01:40:23 2021 daemon.err smbd[4173]: daemon_ready: daemon 'smbd' finished starting up and ready to serve connections Wed Jan 27 01:40:24 2021 user.notice mwan3[4457]: Execute ifup event on interface wan (pppoe-wan) Wed Jan 27 01:40:24 2021 daemon.err odhcp6c[4256]: Failed to send DHCPV6 message to ff02::1:2 (Address not available) Wed Jan 27 01:40:24 2021 daemon.warn odhcpd[2973]: A default route is present but there is no public prefix on lan thus we don't announce a default route! Wed Jan 27 01:40:24 2021 daemon.err odhcpd[2973]: Failed to send to ff02::1%lan@br-lan (Permission denied) Wed Jan 27 01:40:24 2021 daemon.notice procd: /etc/rc.d/S99serverchan: serverchan is starting now ... Wed Jan 27 01:40:24 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::261c:4ff:fe70:ae9. Wed Jan 27 01:40:24 2021 daemon.info avahi-daemon[3678]: New relevant interface eth1.IPv6 for mDNS. Wed Jan 27 01:40:24 2021 daemon.info avahi-daemon[3678]: Registering new address record for fe80::261c:4ff:fe70:ae9 on eth1.. Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: ttyd 1.6.0-13d699e (libwebsockets 3.2.0) Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: tty configuration: Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: start command: /usr/libexec/login.sh Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: close signal: SIGHUP (1) Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: terminal type: xterm-256color Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: Using foreign event loop... Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: Listening on port: 7681 Wed Jan 27 01:40:24 2021 daemon.info procd: - init complete - Wed Jan 27 01:40:24 2021 user.info wsdd2[5180]: starting. Wed Jan 27 01:40:25 2021 cron.err crond[5248]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.071790] r8168: eth0: link up Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.075918] br-lan: port 1(eth0) entered blocking state Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.081257] br-lan: port 1(eth0) entered forwarding state Wed Jan 27 01:40:25 2021 daemon.notice netifd: Network device 'eth0' link is up Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.088161] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready Wed Jan 27 01:40:25 2021 daemon.notice netifd: bridge 'br-lan' link is up Wed Jan 27 01:40:25 2021 daemon.notice netifd: Interface 'lan' has link connectivity Wed Jan 27 01:40:25 2021 user.notice mwan3[4457]: Starting tracker on interface wan (pppoe-wan) Wed Jan 27 01:40:26 2021 daemon.warn odhcpd[2973]: A default route is present but there is no public prefix on lan thus we don't announce a default route! Wed Jan 27 01:40:26 2021 daemon.err odhcpd[2973]: Failed to send to ff02::1%lan@br-lan (Address not available) Wed Jan 27 01:40:27 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface br-lan.IPv6 with address 2408:823d:5614:1f7c::1. Wed Jan 27 01:40:27 2021 daemon.info avahi-daemon[3678]: New relevant interface br-lan.IPv6 for mDNS. Wed Jan 27 01:40:27 2021 daemon.info avahi-daemon[3678]: Registering new address record for 2408:823d:5614:x::1 on br-lan.*. Wed Jan 27 01:40:27 2021 daemon.notice netifd: Interface 'wan_6' is now up Wed Jan 27 01:40:27 2021 authpriv.info dropbear[3552]: Early exit: Terminated by signal Wed Jan 27 01:40:27 2021 authpriv.warn dropbear[6679]: Failed listening on '22': Error listening: Address not available Wed Jan 27 01:40:27 2021 authpriv.info dropbear[6679]: Not backgrounding Wed Jan 27 01:40:27 2021 user.info mwan3rtmon[3351]: Detect rtchange event. Wed Jan 27 01:40:27 2021 cron.err crond[6863]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:40:27 2021 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan) Wed Jan 27 01:40:27 2021 daemon.err miniupnpd[7072]: could not open lease file: /var/upnp.leases Wed Jan 27 01:40:27 2021 daemon.notice miniupnpd[7072]: HTTP listening on port 5000 Wed Jan 27 01:40:27 2021 daemon.notice miniupnpd[7072]: Listening for NAT-PMP/PCP traffic on port 5351 Wed Jan 27 01:40:27 2021 cron.err crond[7116]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:40:28 2021 user.notice firewall: Reloading firewall due to ifupdate of wan (pppoe-wan) Wed Jan 27 01:40:28 2021 user.notice ddns-scripts[7180]: ipv4: PID '7180' started at 2021-01-27 01:40 Wed Jan 27 01:40:28 2021 user.info mwan3rtmon[3351]: Detect rtchange event. Wed Jan 27 01:40:28 2021 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan) Wed Jan 27 01:40:29 2021 daemon.info dnsmasq[9364]: Connected to system UBus Wed Jan 27 01:40:30 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:40:30 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:40:30 2021 daemon.info dnsmasq[10897]: Connected to system UBus Wed Jan 27 01:40:30 2021 cron.err crond[10966]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:40:31 2021 cron.err crond[11144]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:40:31 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:40:31 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:40:31 2021 daemon.info dnsmasq[11230]: Connected to system UBus Wed Jan 27 01:40:32 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Wed Jan 27 01:40:33 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Wed Jan 27 01:40:33 2021 daemon.info dnsmasq[12186]: Connected to system UBus Wed Jan 27 01:40:33 2021 cron.err crond[12258]: crond (busybox 1.31.1) started, log level 8 Wed Jan 27 01:40:44 2021 daemon.info procd: Instance vmtoolsd::instance1 s in a crash loop 6 crashes, 0 seconds since last crash Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: [2021/01/27 01:40:46.624177, 0] ../../source3/nmbd/nmbd_become_lmb.c:397(become_local_master_stage2) Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: Samba name server OPENWRT is now a local master browser for workgroup WORKGROUP on subnet 192.168.1.1 Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]:
J1900 5.4.92 每天重启一次 Turbo ACC里面写SFE和Qos可能有冲突 现在关闭Qos正在测试 不知道还有没有人有同样问题 如何解决的
J1900 5.4.92 每天重启一次 Turbo ACC里面写SFE和Qos可能有冲突 现在关闭Qos正在测试 不知道还有没有人有同样问题 如何解决的
同追问题解决,现在关闭sfe
用百度网盘快速刷图片时发现路由器重启,不过我用的是flowoffload
基本上可以确认是这个问题了 我已经没重启了
基本上可以确认是这个问题了 我已经没重启了
同关闭SFE后 已正常运行四天
反馈bug/问题模板,提建议请删除
1.关于你要提交的问题
Q:是否搜索了issue (使用 "x" 选择)
2. 详细叙述
(1) 具体问题
A:X64,每天无规律重启1次以上,也许有规律,但我没抓到。另外怎么可以让日志重启保留,好分析原因。刷回R20.7.1之前的版本没问题。
(2) 路由器型号和固件版本
A:X64
(3) 详细日志
A:无,重启丢失