dangowrt / owrt-ubi-installer

OpenWrt firmware installer for the Linksys E8450 aka. Belkin RT3200
GNU General Public License v2.0
393 stars 50 forks source link

Network device 'wan' link is down #82

Closed freew01f closed 2 years ago

freew01f commented 2 years ago

I try to install openwrt to my e8450 but the internet is not stable always. I often can not open the website but after refresh it may be ok when I checked the log of openwrt I get these how can I solve it

Fri Mar 25 01:12:35 2022 daemon.notice netifd: Network device 'wan' link is down
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan' has link connectivity loss
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Mar 25 01:12:35 2022 kern.info kernel: [33067.261743] mt7530 mdio-bus:00 wan: Link is Down
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan6 (2165): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wan6" } (Permission denied)
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: received SIGTERM
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: unicasting a release of 192.168.1.2 to 192.168.1.1
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: sending release
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: entering released state
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wan" } (Permission denied)
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan' is now down
Fri Mar 25 01:12:35 2022 daemon.warn dnsmasq[1]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan6' is now down
Fri Mar 25 01:17:21 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 52:d7:8b:9d:34:48
Fri Mar 25 01:17:21 2022 daemon.info hostapd: wlan1: STA 52:d7:8b:9d:34:48 IEEE 802.11: disassociated
Fri Mar 25 01:17:22 2022 daemon.info hostapd: wlan1: STA 52:d7:8b:9d:34:48 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 01:25:42 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 01:25:50 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 01:26:00 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 01:32:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 1c:91:80:eb:69:53
Fri Mar 25 01:32:31 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: disassociated due to inactivity
Fri Mar 25 01:32:32 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 02:13:54 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: authenticated
Fri Mar 25 02:13:54 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: authenticated
Fri Mar 25 02:13:54 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: associated (aid 1)
Fri Mar 25 02:13:56 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:13:56 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f WPA: pairwise key handshake completed (RSN)
Fri Mar 25 02:13:56 2022 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED 42:19:07:a8:5f:7f
Fri Mar 25 02:13:56 2022 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 42:19:07:a8:5f:7f
Fri Mar 25 02:13:56 2022 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.138 42:19:07:a8:5f:7f
Fri Mar 25 02:13:57 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.138 42:19:07:a8:5f:7f
Fri Mar 25 02:13:57 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.138 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: authenticated
Fri Mar 25 02:14:01 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: associated (aid 1)
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan0: Prune association for 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f WPA: pairwise key handshake completed (RSN)
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan1: EAPOL-4WAY-HS-COMPLETED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:31 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:31 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 02:14:37 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:44 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:50 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:50 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:50 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: disassociated
Fri Mar 25 02:14:51 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 13:08:38 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: authenticated
Fri Mar 25 13:08:38 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: associated (aid 1)
Fri Mar 25 13:08:38 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 1c:91:80:eb:69:53
Fri Mar 25 13:08:38 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 WPA: pairwise key handshake completed (RSN)
Fri Mar 25 13:08:38 2022 daemon.notice hostapd: wlan1: EAPOL-4WAY-HS-COMPLETED 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:08:43 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:08:43 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.204 1c:91:80:eb:69:53 freewolfsM1Air
Fri Mar 25 13:10:23 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:10:23 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.204 1c:91:80:eb:69:53 freewolfsM1Air
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Network device 'wan' link is up
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan' is setting up now
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Mar 25 13:12:15 2022 kern.info kernel: [76247.250648] mt7530 mdio-bus:00 wan: Link is Up - 1Gbps/Full - flow control off
Fri Mar 25 13:12:15 2022 daemon.notice netifd: wan (11026): udhcpc: started, v1.35.0
Fri Mar 25 13:12:15 2022 daemon.notice netifd: wan (11026): udhcpc: broadcasting discover
Fri Mar 25 13:12:18 2022 daemon.notice netifd: wan (11026): udhcpc: broadcasting discover
Fri Mar 25 13:12:19 2022 daemon.notice netifd: Interface 'wan6' is now up
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using nameserver fe80::1%wan#53
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Fri Mar 25 13:12:19 2022 user.notice firewall: Reloading firewall due to ifup of wan6 (wan)
Fri Mar 25 13:12:20 2022 daemon.notice netifd: wan (11026): udhcpc: broadcasting select for 192.168.1.2, server 192.168.1.1
Fri Mar 25 13:12:20 2022 daemon.notice netifd: wan (11026): udhcpc: lease of 192.168.1.2 obtained from 192.168.1.1, lease time 86400
Fri Mar 25 13:12:20 2022 daemon.notice netifd: Interface 'wan' is now up
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Mar 25 13:12:20 2022 daemon.warn dnsmasq[1]: ignoring nameserver 192.168.1.1 - local interface
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using nameserver fe80::1%wan#53
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Fri Mar 25 13:12:20 2022 user.notice firewall: Reloading firewall due to ifup of wan (wan)
Fri Mar 25 13:13:56 2022 user.info : luci: accepted login on / for root from 192.168.1.204
Fri Mar 25 13:14:42 2022 authpriv.info dropbear[11331]: Child connection from 192.168.1.204:49499
Fri Mar 25 13:14:45 2022 authpriv.warn dropbear[11331]: Bad password attempt for 'root' from 192.168.1.204:49499
Fri Mar 25 13:14:52 2022 authpriv.notice dropbear[11331]: Password auth succeeded for 'root' from 192.168.1.204:49499
Fri Mar 25 13:33:34 2022 authpriv.info dropbear[11331]: Exit (root) from <192.168.1.204:49499>: Disconnect received
Fri Mar 25 13:42:09 2022 authpriv.info dropbear[11469]: Child connection from 192.168.1.204:59669
Fri Mar 25 13:42:13 2022 authpriv.notice dropbear[11469]: Password auth succeeded for 'root' from 192.168.1.204:59669
mrkiko commented 2 years ago

Hi!

This problem does not seem relevant to this project, and I guess you posted to OpenWRt forum as well. So if it is ok for you I may close this issue. That said, I would suggest to try to assign a different ip to the E8450, making the LAN and WAN IP ranges different.

freew01f commented 2 years ago

thx