Mon Jan 9 23:41:16 2023 cron.err crond[6265]: crond (busybox 1.35.0) started, log level 8
Mon Jan 9 23:41:31 2023 daemon.err uhttpd[1429]: netstat: showing only processes with your user ID
Mon Jan 9 23:41:33 2023 cron.err crond[6758]: crond (busybox 1.35.0) started, log level 8
Mon Jan 9 23:41:38 2023 daemon.crit dnsmasq[8409]: illegal repeated keyword at line 36 of /tmp/etc/passwall/acl/cfg3330ec/dnsmasq.conf
Mon Jan 9 23:41:38 2023 daemon.crit dnsmasq[8409]: FAILED to start up
Mon Jan 9 23:41:43 2023 cron.err crond[9153]: crond (busybox 1.35.0) started, log level 8
Mon Jan 9 23:42:41 2023 daemon.crit dnsmasq[9310]: illegal repeated keyword at line 36 of /tmp/etc/passwall/acl/cfg3330ec/dnsmasq.conf
Mon Jan 9 23:42:41 2023 daemon.crit dnsmasq[9310]: FAILED to start up
Mon Jan 9 23:43:39 2023 daemon.crit dnsmasq[9858]: illegal repeated keyword at line 36 of /tmp/etc/passwall/acl/cfg3330ec/dnsmasq.conf
Mon Jan 9 23:43:39 2023 daemon.crit dnsmasq[9858]: FAILED to start up
描述您遇到的bug
今天更新编译了一下openwrt ,passwall也到最新了。但访问控制功能启动后在日志里显示有错误,如下:
Mon Jan 9 23:41:16 2023 cron.err crond[6265]: crond (busybox 1.35.0) started, log level 8 Mon Jan 9 23:41:31 2023 daemon.err uhttpd[1429]: netstat: showing only processes with your user ID Mon Jan 9 23:41:33 2023 cron.err crond[6758]: crond (busybox 1.35.0) started, log level 8 Mon Jan 9 23:41:38 2023 daemon.crit dnsmasq[8409]: illegal repeated keyword at line 36 of /tmp/etc/passwall/acl/cfg3330ec/dnsmasq.conf Mon Jan 9 23:41:38 2023 daemon.crit dnsmasq[8409]: FAILED to start up Mon Jan 9 23:41:43 2023 cron.err crond[9153]: crond (busybox 1.35.0) started, log level 8 Mon Jan 9 23:42:41 2023 daemon.crit dnsmasq[9310]: illegal repeated keyword at line 36 of /tmp/etc/passwall/acl/cfg3330ec/dnsmasq.conf Mon Jan 9 23:42:41 2023 daemon.crit dnsmasq[9310]: FAILED to start up Mon Jan 9 23:43:39 2023 daemon.crit dnsmasq[9858]: illegal repeated keyword at line 36 of /tmp/etc/passwall/acl/cfg3330ec/dnsmasq.conf Mon Jan 9 23:43:39 2023 daemon.crit dnsmasq[9858]: FAILED to start up
……持续循环,同时被控制的设备无法上网,关闭访问控制功能后不再。
以下为出错配置文件内容,第36行是 port=11401:
conf-file=/etc/dnsmasq.conf domain-needed filterwin2k no-negcache localise-queries read-ethers expand-hosts bind-dynamic local-service filter-AAAA cache-size=1000 dns-forward-max=1000 port=53 edns-packet-max=1232 domain=lan local=/lan/ addn-hosts=/tmp/hosts resolv-file=/tmp/resolv.conf.d/resolv.conf.auto stop-dns-rebind rebind-localhost-ok user=dnsmasq group=dnsmasq
srv-host=_vlmcs._tcp,openwrt,1688,0,100
bogus-priv conf-file=/usr/share/dnsmasq/rfc6761.conf enable-ra quiet-ra
port=11401 conf-dir=/tmp/etc/passwall/acl/cfg3330ec/dnsmasq.d
复现此Bug的步骤
开启访问控制即可复现
您想要实现的目的
解决故障
日志信息
2023-01-09 23:41:35: 清空并关闭相关程序和缓存完成。 2023-01-09 23:41:37: UDP节点没有选择或为空,不代理UDP。 2023-01-09 23:41:37: 过滤服务配置:准备接管域名解析... 2023-01-09 23:41:37: - 域名解析:dns2tcp + 使用(TCP节点)解析域名... 2023-01-09 23:41:37: * 请确认上游 DNS 支持 TCP 查询,如非直连地址,确保 TCP 代理打开,并且已经正确转发! 2023-01-09 23:41:37: - PassWall必须依赖于Dnsmasq,如果你自行配置了错误的DNS流程,将会导致域名(直连/代理域名)分流失效!!! 2023-01-09 23:41:37: 开始加载防火墙规则... 2023-01-09 23:41:38: 加入负载均衡的节点到ipset[vpsiplist]直连完成 2023-01-09 23:41:38: 加入所有节点到ipset[vpsiplist]直连完成 2023-01-09 23:41:38: 加载路由器自身 TCP 代理... 2023-01-09 23:41:38: - 启用 TPROXY 模式 2023-01-09 23:41:38: - [0]将上游 DNS 服务器 8.8.4.4:53 加入到路由器自身代理的 TCP 转发链 2023-01-09 23:41:38: - [0],屏蔽代理UDP 端口:80,443 2023-01-09 23:41:38: 访问控制: 2023-01-09 23:41:39: - 备注【cfg3430ec】,MAC【5C:96:66:8E:4A:BB】,使用TCP节点[🇸🇬 新加坡 IEPL 02 3.0x] 中国列表以外代理所有端口 2023-01-09 23:41:39: - 备注【cfg3430ec】,MAC【5C:96:66:8E:4A:BB】,使用UDP节点[🇸🇬 新加坡 IEPL 02 3.0x] 中国列表以外代理所有端口 2023-01-09 23:41:39: TCP默认代理:使用TCP节点[分流总节点] 中国列表以外代理所有端口 2023-01-09 23:41:39: 防火墙规则加载完成! 2023-01-09 23:41:42: 重启 dnsmasq 服务 2023-01-09 23:41:43: 运行完成!
截图
No response
系统相关信息
4.56-1
其他信息
No response