Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

每天无规律重启1次以上 #5349

Closed
1 task
binge8 opened this issue Aug 23, 2020 · 69 comments
Closed
1 task

每天无规律重启1次以上 #5349

binge8 opened this issue Aug 23, 2020 · 69 comments

Comments

@binge8
Copy link

binge8 commented Aug 23, 2020

反馈bug/问题模板,提建议请删除

1.关于你要提交的问题

Q:是否搜索了issue (使用 "x" 选择)

  • 没有类似的issue

2. 详细叙述

(1) 具体问题

A:X64,每天无规律重启1次以上,也许有规律,但我没抓到。另外怎么可以让日志重启保留,好分析原因。刷回R20.7.1之前的版本没问题。

(2) 路由器型号和固件版本

A:X64

(3) 详细日志

A:无,重启丢失

@asushugo
Copy link
Contributor

实测D525有相同的问题,也是在sync5.4内核之后的,就是可能用个一两天就突然重启,但是没有人用的情况下,可以运行很多天,我也没有保留到日志,现在为了保证每天运行的稳定性,我都是定时每天7点重启一次

@elonj
Copy link

elonj commented Aug 23, 2020

遇到同样情况。前两周大概是5天突然重启,最近几天是一两天突然重启。找不到原因

@conscloud
Copy link

同样的情况,差不多两天左右突然重启。

@Myoko
Copy link
Contributor

Myoko commented Aug 24, 2020

同X64 没发现有这样的问题
已经连续运行4D多了

4d 5h 48m 55s

@mjyhj
Copy link
Contributor

mjyhj commented Aug 24, 2020

同,目前在用8月9号编译的R20.7.20 N2600 重启概率大概在每3-5天触发一次

@yicong100
Copy link

一样,最近两天左右就自动重启一次

@coolsnowwolf
Copy link
Owner

已更新 patch

@binge8
Copy link
Author

binge8 commented Aug 26, 2020

已更新 patch

大佬辛苦

@binge8
Copy link
Author

binge8 commented Aug 26, 2020

已更新 patch

中午重新编译的,不保留配置刷机的,五个多小时又重启了。谁能告诉我怎么设置重启保留日志,我好给大佬们看看啥原因。

@elonj
Copy link

elonj commented Aug 26, 2020

已更新 patch

中午重新编译的,不保留配置刷机的,五个多小时又重启了。谁能告诉我怎么设置重启保留日志,我好给大佬们看看啥原因。

你可以试试这个方法保存日志:OpenWRT 日志保存 有时候日志保存下来了,有时候没有。基本上没有看到重启的时间点有日志,所以也不知道为什么重启

另外, 用最近coolsnowwolf/openwrt编译的固件也有突然重启的问题

@binge8
Copy link
Author

binge8 commented Aug 26, 2020

QQ截图20200827003434
我的就是从R20.7.20开始到现在,每次编译的都有这情况,刚才用这个设置,结果重启后日志里并没有发现有用信息。在重启那个时间点前面都是正常日志,然后这个时间点后面突然一大串日志,好像是把重启后的日志都写进去了一部分

@elonj
Copy link

elonj commented Aug 26, 2020

这么说的话,问题有可能在7月20号到现在之间的coolsnowwolf/packages或者coolsnowwolf/luci之中。因为最近用coolsnowwolf/openwrt编译的固件用到了coolsnowwolf/packages和coolsnowwolf/luci。而coolsnowwolf/openwrt本身在7月20号之后只更新了“Bump v2ray-plugin to 1.3.4”,应该不是它的问题。至于coolsnowwolf/luci,从7月20号到现在,它只有两个commits,可能性也不大。很大可能是在7月20号到现在之间的coolsnowwolf/packages。 这是我的猜测。有没有可能是“update netdata to 1.23.2” 呢?

@binge8
Copy link
Author

binge8 commented Aug 26, 2020

QQ截图20200827024812
这又来一次,2:29分重启的,前面半小时没日志,应该就是没问题,后面这开始好像是重启后的一部分日志了,啥有用信息都没看出来

@winddriver
Copy link

我用的7月13号编译的 https://github.com/coolsnowwolf/openwrt 固件,一样遇到了自动重启的问题

@binge8
Copy link
Author

binge8 commented Aug 27, 2020

那这就不知道了,R20.6.18之后是R20.7.1之后是R20.7.7,我的网盘( http://256pd.top:9666 )备份了R20.6.18,刷回这个稳如狗,7.7我好像也试过,也有问题,大概率是R20.7.1前后了。

@sxx1314
Copy link

sxx1314 commented Aug 27, 2020

netdata

可以尝试关闭 netdata 这玩意本来就没什么卵用

@binge8
Copy link
Author

binge8 commented Aug 27, 2020

没有安装这个

@binge8
Copy link
Author

binge8 commented Aug 27, 2020

默认并没有

@binge8
Copy link
Author

binge8 commented Aug 28, 2020

QQ截图20200828083655
QQ截图20200828083858
按这个设置获取到的重启前后日志,昨天重启四次,崩溃。每次日志都是这样,一点有用信息都没有啊。昨天下午4点多编译的最新R20.8.27。X64固件。哎愁死了,谁能救救我啊

@winddriver
Copy link

image
netdata 貌似没法在 make menuconfig 里关闭呀

@binge8
Copy link
Author

binge8 commented Aug 28, 2020

image
netdata 貌似没法在 make menuconfig 里关闭呀

QQ截图20200828093715
兄弟,我的确实默认就没有啊,另外你没法关闭是你的方法不对。

@microdockman
Copy link

同X64 没发现有这样的问题
已经连续运行4D多了

4d 5h 48m 55s

如果可以测试下wan口流量累计到230多g左右,或者lan口1t多会不会重启
前段时间备份上传下载,就发现网口流量累计基本到这个数量就重启(出现多次),旧版本也有这种现象,不知道有没有联系

@skydevil88
Copy link

8月份开始经常重启,9月1日编译正常,4号编译又出现重启,换回一号目前正常运行两天,下载:996.23 GB,上传:26.76 GB。

@qq1316237299
Copy link

r20.8.27还是有重启的现象

@liudongjia
Copy link

确实是经常莫名其妙的重启,只好换回来老内核的版本

@binge8
Copy link
Author

binge8 commented Sep 12, 2020

确实是经常莫名其妙的重启,只好换回来老内核的版本

image
不会吧 我都稳定运行9天了

你已经说了好几遍了你的没问题,我们都知道了不用一次次重复,也不是所有机型都有此问题。那天大雕群里已经说了,已经修复了D2550、N2600等一部分机型的,另外还有一部分机型本身不存在这个问题,只是倒霉我的3215U存在这个问题而且还没有修复。

@ghost
Copy link

ghost commented Sep 13, 2020

确实是经常莫名其妙的重启,只好换回来老内核的版本

image
不会吧 我都稳定运行9天了

你已经说了好几遍了你的没问题,我们都知道了不用一次次重复,也不是所有机型都有此问题。那天大雕群里已经说了,已经修复了D2550、N2600等一部分机型的,另外还有一部分机型本身不存在这个问题,只是倒霉我的3215U存在这个问题而且还没有修复。

我的哈,下午J4105到了 不知道有没有这个问题

@qq1316237299
Copy link

希望可以修复3865u,谢谢

@elonj
Copy link

elonj commented Sep 13, 2020

3205u上最近编译的coolsnowwolf/openwrt也有重启的情况,希望可以修复,非常感谢

@binge8
Copy link
Author

binge8 commented Sep 14, 2020

喜大普奔,我的3215U貌似已经修复了,lede仓库最新源码,稳定运行2天了,可以关贴了。

@sxx1314
Copy link

sxx1314 commented Oct 13, 2020

最近一直很忙 没空压测复现问题。目前复现进度发现,打开sfe并且有异常流量或者其他契机(暂时未定位因为log里没啥东西。抓包工具里获取的信息太多一个个分析有点眼花)非常容易死机重启。关闭sfe等等加速功能之后压测发现重启几乎不见,现在运行5天(虽然依旧不能放松,最长记录应该有1周才重启)。因为此bug出现情况不定外加周期太长所以定位很麻烦。如果本周安全度过就确定为sfe等加速导致的问题。待周末看运行情况(只能代表我的环境,不代表所有环境。所以如果你的环境有其他问题,建议自己压测复现问题)。

@sxx1314
Copy link

sxx1314 commented Oct 15, 2020

压测结论(暂)

只能代表我的环境,不代表所有环境。所以如果你的环境有其他问题,建议自己压测复现问题

  • 压测版本:kernel 5.4.61 R20.9.15 (测试在kernel 4.19上一样有异常重启情况,但是暂未测试原因是否相同。因为此bug出现情况不定外加周期太长所以定位很麻烦。)
  • 压测时长:一周-更久
  • 测试软件:iperf wireshark tcpdump ngrep 等
  • 表现(暂时):打开sfe并且有异常流量或者其他契机(暂时未定位因为log里没啥东西。抓包工具里获取的信息也不多。)非常容易死机重启。关闭sfe等加速功能之后压测发现重启几乎不见,现在稳定运行一周。
  • 结论:sfe的加速功能会导致/加大 x86_64异常重启概率。如果你现已打开请关闭它。最好直接不编译,因为部分版本luci会自动生成开启flowoffload之类的选项,如果你修改其他config可能会一起生效。

接下来看什么时候有时间review一下sfe的相关代码。

Screenshot 2020-10-15 at 15 43 21
Screenshot 2020-10-15 at 16 00 12_2

@kxjhcmc
Copy link

kxjhcmc commented Oct 17, 2020

我也关闭了sfe测试了2天,没有发现重启现象

@huangjackey1111
Copy link

我也是同样的,这种重启自从1-2月之前就出现了。1-2天就会重启,我还以为是我的硬件有问题。求大佬修复。

目前什么读没设置,正常运行30天了。很奇怪。

@skydevil88
Copy link

关闭sfe后已经正常运行一周了。

@Awrtiger
Copy link

我把docker相关都删除了 开启sfe 正常运行一周了。

@elonj
Copy link

elonj commented Oct 22, 2020

同样,把luci-app-sfe换成luci-app-flowoffload之后,终于再次可以稳定运行6天以上不重启。之前5天之内就重启了

@doumeki
Copy link

doumeki commented Nov 30, 2020

可能并不是sfe或者是flowoffload.
之前我用的flowoffload 6天内必死,关闭转发也不行。
最后使用dirclean重新编译SFE后问题解决。
CPU: J1900

@dpy013
Copy link
Contributor

dpy013 commented Dec 22, 2020

I36100U也会出现此问题

@liudongjia
Copy link

关掉sfe确实管用,4天没有重启了,j1900的cpu

@jasonseye
Copy link

几个月前发现同样问题J900 x86_64编译后运行2~5天内会无规律重启, 关闭SFE后该问题消失.

@jxph1123
Copy link

我用luci-app-flowoffload没重启过

@ishangyi
Copy link

唉我用5.4.86内核的openwrt也一直频繁死机,
Screenshot_2021-01-27-00-10-47-660_com android chrome

@ishangyi
Copy link

是1037u的软路由

@sxx1314
Copy link

sxx1314 commented Jan 26, 2021

唉我用5.4.86内核的openwrt也一直频繁死机,
Screenshot_2021-01-27-00-10-47-660_com android chrome

牛逼 x86 还开hwnat 不懂的设置请保持默认

@ishangyi
Copy link

唉我用5.4.86内核的openwrt也一直频繁死机,
Screenshot_2021-01-27-00-10-47-660_com android chrome

牛逼 x86 还开hwnat 不懂的设置请保持默认

那选项关了看看他会不会死机了

@ishangyi
Copy link

唉我用5.4.86内核的openwrt也一直频繁死机,
Screenshot_2021-01-27-00-10-47-660_com android chrome

牛逼 x86 还开hwnat 不懂的设置请保持默认

依旧死机了

@ishangyi
Copy link

ishangyi commented Jan 26, 2021

23:42开始开机到1:38左右死机了1:40自动重启了从1:31开始到1:40没系统日志不知道日志里有没有啥重要东西
Tue Jan 26 23:42:22 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:22 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:22 2021 daemon.info dnsmasq[2728]: Connected to system UBus
Tue Jan 26 23:42:22 2021 daemon.info acpid: starting up with netlink and the input layer
Tue Jan 26 23:42:22 2021 daemon.info acpid: 1 rule loaded
Tue Jan 26 23:42:22 2021 daemon.info acpid: waiting for events: event logging is off
Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: 8021ad
Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: 8021q
Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: macvlan
Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: veth
Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: bridge
Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: Network device
Tue Jan 26 23:42:22 2021 user.notice : Added device handler type: tunnel
Tue Jan 26 23:42:22 2021 daemon.notice wpa_supplicant[2847]: Successfully initialized wpa_supplicant
Tue Jan 26 23:42:23 2021 cron.err crond[3004]: crond (busybox 1.31.1) started, log level 8
Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.434970] eth0: 0xffffc90000051000, 1c:fd:08:70:a1:95, IRQ 28
Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.533088] br-lan: port 1(eth0) entered blocking state
Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.538442] br-lan: port 1(eth0) entered disabled state
Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.543875] device eth0 entered promiscuous mode
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'lan' is enabled
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'lan' is setting up now
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'lan' is now up
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' is enabled
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' is setting up now
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' is now up
Tue Jan 26 23:42:23 2021 kern.info kernel: [ 13.551870] eth1: 0xffffc90000059000, 24:1c:04:70:0a:e9, IRQ 29
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'wan' is enabled
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'wan6' is enabled
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Network device 'lo' link is up
Tue Jan 26 23:42:23 2021 daemon.notice netifd: Interface 'loopback' has link connectivity
Tue Jan 26 23:42:23 2021 user.notice mwan3[3049]: Using firewall mask 0x3F00
Tue Jan 26 23:42:23 2021 user.notice mwan3[3049]: Max interface count is 60
Tue Jan 26 23:42:23 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: net.ipv4.tcp_congestion_control = bbr
Tue Jan 26 23:42:23 2021 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Tue Jan 26 23:42:23 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:23 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:23 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: DNSMASQ change
Tue Jan 26 23:42:23 2021 daemon.info dnsmasq[3435]: Connected to system UBus
Tue Jan 26 23:42:24 2021 user.notice upnp daemon: external interface not found, not starting
Tue Jan 26 23:42:24 2021 authpriv.info dropbear[3552]: Not backgrounding
Tue Jan 26 23:42:24 2021 daemon.warn odhcpd[2974]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Tue Jan 26 23:42:24 2021 daemon.err odhcpd[2974]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534).
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Successfully dropped root privileges.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: avahi-daemon 0.8 starting up.
Tue Jan 26 23:42:24 2021 daemon.warn avahi-daemon[3762]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: No service file found in /etc/avahi/services.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface br-lan.IPv4 with address 192.168.1.1.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: New relevant interface br-lan.IPv4 for mDNS.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface lo.IPv6 with address ::1.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: New relevant interface lo.IPv6 for mDNS.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: New relevant interface lo.IPv4 for mDNS.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Network interface enumeration completed.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering new address record for 192.168.1.1 on br-lan.IPv4.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering new address record for ::1 on lo..
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering new address record for 127.0.0.1 on lo.IPv4.
Tue Jan 26 23:42:24 2021 daemon.info avahi-daemon[3762]: Registering HINFO record with values 'X86_64'/'LINUX'.
Tue Jan 26 23:42:24 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: workdir is a f2fs filesystem
Tue Jan 26 23:42:24 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: AdGuardHome service enabled
Tue Jan 26 23:42:24 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: luci enable switch=1
Tue Jan 26 23:42:24 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:24 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:24 2021 daemon.info dnsmasq[4104]: Connected to system UBus
Tue Jan 26 23:42:25 2021 daemon.info procd: Not starting instance acpid::data, command not set
Tue Jan 26 23:42:25 2021 kern.info kernel: [ 15.679877] r8168: eth1: link up
Tue Jan 26 23:42:25 2021 kern.info kernel: [ 15.684071] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Tue Jan 26 23:42:25 2021 daemon.notice netifd: Network device 'eth1' link is up
Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan' has link connectivity
Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan' is setting up now
Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan6' has link connectivity
Tue Jan 26 23:42:25 2021 daemon.notice netifd: Interface 'wan6' is setting up now
Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - slhc
Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - ppp_generic
Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - pppox
Tue Jan 26 23:42:25 2021 daemon.err insmod: module is already loaded - pppoe
Tue Jan 26 23:42:25 2021 daemon.err odhcp6c[4343]: Failed to send RS (Address not available)
Tue Jan 26 23:42:25 2021 daemon.info avahi-daemon[3762]: Server startup complete. Host name is OpenWrt.local. Local service cookie is 659041328.
Tue Jan 26 23:42:25 2021 daemon.notice procd: /etc/rc.d/S99dnsfilter: 2021-01-26 23:42:25 [DNSFilter is disabled]
Tue Jan 26 23:42:25 2021 daemon.notice procd: /etc/rc.d/S99haproxy: /etc/rc.common: /etc/rc.d/S99haproxy: line 21: extra_command: not found
Tue Jan 26 23:42:25 2021 daemon.notice procd: /etc/init.d/haproxy: /etc/rc.common: /etc/init.d/haproxy: line 21: extra_command: not found
Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: Plugin rp-pppoe.so loaded.
Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: pppd 2.4.8 started by root, uid 0
Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: PPP session is 32593
Tue Jan 26 23:42:25 2021 daemon.warn pppd[4350]: Connected to cc:1a:fa:ee:7c:a0 via interface eth1
Tue Jan 26 23:42:25 2021 kern.info kernel: [ 16.011055] pppoe-wan: renamed from ppp0
Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: Renamed interface ppp0 to pppoe-wan
Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: Using interface pppoe-wan
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: Connect: pppoe-wan <--> eth1
Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: syncppp not active
Tue Jan 26 23:42:25 2021 daemon.info pppd[4350]: CHAP authentication succeeded: Authentication Successful,Welcome!
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: CHAP authentication succeeded
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: peer from calling number CC:1A:FA:EE:7C:x authorized
Tue Jan 26 23:42:25 2021 user.info : SIGNAL: Not enabling reaper
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: local IP address 122.x.80.x
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: remote IP address 122.x.80.x
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: primary DNS address 58.x.57.33
Tue Jan 26 23:42:25 2021 daemon.notice pppd[4350]: secondary DNS address 221.x.4.66
Tue Jan 26 23:42:26 2021 daemon.notice pppd[4350]: local LL address fe80::261c:04f0:fe70:x
Tue Jan 26 23:42:26 2021 daemon.notice pppd[4350]: remote LL address fe80::ce1a:faff:feee:x
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Network device 'pppoe-wan' link is up
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan' is now up
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Network alias 'pppoe-wan' link is up
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' is enabled
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' has link connectivity
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' is setting up now
Tue Jan 26 23:42:26 2021 daemon.err odhcp6c[4343]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.607886] r8168: eth0: link up
Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.612284] br-lan: port 1(eth0) entered blocking state
Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.617614] br-lan: port 1(eth0) entered forwarding state
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Network device 'eth0' link is up
Tue Jan 26 23:42:26 2021 daemon.notice netifd: bridge 'br-lan' link is up
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'lan' has link connectivity
Tue Jan 26 23:42:26 2021 kern.info kernel: [ 16.626781] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Tue Jan 26 23:42:26 2021 daemon.notice netifd: Interface 'wan_6' is now up
Tue Jan 26 23:42:26 2021 daemon.notice procd: /etc/rc.d/S99serverchan: serverchan is starting now ...
Tue Jan 26 23:42:26 2021 user.info mwan3rtmon[3346]: Detect rtchange event.
Tue Jan 26 23:42:27 2021 user.notice mwan3[4532]: Execute ifup event on interface wan (pppoe-wan)
Tue Jan 26 23:42:27 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::261c:4ff:fe70:ae9.
Tue Jan 26 23:42:27 2021 daemon.info avahi-daemon[3762]: New relevant interface eth1.IPv6 for mDNS.
Tue Jan 26 23:42:27 2021 daemon.info avahi-daemon[3762]: Registering new address record for fe80::261c:4ff:fe70:ae9 on eth1.
.
Tue Jan 26 23:42:27 2021 daemon.warn odhcpd[2974]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Tue Jan 26 23:42:27 2021 daemon.err odhcpd[2974]: Failed to send to ff02::1%lan@br-lan (Address not available)
Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: ttyd 1.6.0-13d699e (libwebsockets 3.2.0)
Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: tty configuration:
Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: start command: /usr/libexec/login.sh
Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: close signal: SIGHUP (1)
Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: terminal type: xterm-256color
Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: Using foreign event loop...
Tue Jan 26 23:42:27 2021 daemon.notice ttyd[5049]: Listening on port: 7681
Tue Jan 26 23:42:27 2021 daemon.err nmbd[4173]: [2021/01/26 23:42:27.665826, 0] ../../lib/util/become_daemon.c:136(daemon_ready)
Tue Jan 26 23:42:27 2021 daemon.err nmbd[4173]: daemon_ready: daemon 'nmbd' finished starting up and ready to serve connections
Tue Jan 26 23:42:27 2021 daemon.info procd: - init complete -
Tue Jan 26 23:42:27 2021 user.info wsdd2[5305]: starting.
Tue Jan 26 23:42:28 2021 daemon.err smbd[4172]: [2021/01/26 23:42:28.070233, 0] ../../lib/util/become_daemon.c:136(daemon_ready)
Tue Jan 26 23:42:28 2021 daemon.err smbd[4172]: daemon_ready: daemon 'smbd' finished starting up and ready to serve connections
Tue Jan 26 23:42:28 2021 cron.err crond[5502]: crond (busybox 1.31.1) started, log level 8
Tue Jan 26 23:42:28 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface br-lan.IPv6 with address fe80::1efd:8ff:fe70:a195.
Tue Jan 26 23:42:28 2021 daemon.info avahi-daemon[3762]: New relevant interface br-lan.IPv6 for mDNS.
Tue Jan 26 23:42:28 2021 daemon.info avahi-daemon[3762]: Registering new address record for fe80::1efd:8ff:fe70:a195 on br-lan..
Tue Jan 26 23:42:28 2021 user.notice mwan3[4532]: Starting tracker on interface wan (pppoe-wan)
Tue Jan 26 23:42:30 2021 daemon.info dnsmasq[6376]: Connected to system UBus
Tue Jan 26 23:42:30 2021 user.info mwan3rtmon[3346]: Detect rtchange event.
Tue Jan 26 23:42:30 2021 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Tue Jan 26 23:42:31 2021 user.notice firewall: Reloading firewall due to ifupdate of wan (pppoe-wan)
Tue Jan 26 23:42:31 2021 user.notice ddns-scripts[6715]: ipv4: PID '6715' started at 2021-01-26 23:42
Tue Jan 26 23:42:31 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Tue Jan 26 23:42:31 2021 user.info mwan3track[6225]: Check (ping) failed for target "114.114.114.114" on interface wan (pppoe-wan)
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: could not open lease file: /var/upnp.leases
Tue Jan 26 23:42:31 2021 daemon.notice miniupnpd[7081]: HTTP listening on port 5000
Tue Jan 26 23:42:31 2021 daemon.notice miniupnpd[7081]: Listening for NAT-PMP/PCP traffic on port 5351
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 daemon.err miniupnpd[7081]: sendto(udp_notify=6, 192.168.1.1): Operation not permitted
Tue Jan 26 23:42:31 2021 user.info mwan3rtmon[3346]: Detect rtchange event.
Tue Jan 26 23:42:31 2021 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan)
Tue Jan 26 23:42:33 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:33 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:33 2021 daemon.info dnsmasq[8407]: Connected to system UBus
Tue Jan 26 23:42:33 2021 cron.err crond[8476]: crond (busybox 1.31.1) started, log level 8
Tue Jan 26 23:42:38 2021 user.info mwan3track[6225]: Lost 2 ping(s) on interface wan (pppoe-wan)
Tue Jan 26 23:42:39 2021 daemon.notice netifd: Interface 'wan_6' has lost the connection
Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Leaving mDNS multicast group on interface br-lan.IPv6 with address fe80::1efd:8ff:fe70:a195.
Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Joining mDNS multicast group on interface br-lan.IPv6 with address 2408:823d:5614:7f8::1.
Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Registering new address record for 2408:823d:5614:7f8::1 on br-lan.
.
Tue Jan 26 23:42:39 2021 daemon.info avahi-daemon[3762]: Withdrawing address record for fe80::1efd:8ff:fe70:a195 on br-lan.
Tue Jan 26 23:42:39 2021 daemon.notice netifd: Interface 'wan_6' is now up
Tue Jan 26 23:42:39 2021 user.info mwan3rtmon[3346]: Detect rtchange event.
Tue Jan 26 23:42:39 2021 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan)
Tue Jan 26 23:42:40 2021 cron.err crond[10142]: crond (busybox 1.31.1) started, log level 8
Tue Jan 26 23:42:40 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:40 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:40 2021 daemon.info dnsmasq[10252]: Connected to system UBus
Tue Jan 26 23:42:42 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:42 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:42 2021 daemon.info dnsmasq[11295]: Connected to system UBus
Tue Jan 26 23:42:42 2021 cron.err crond[11364]: crond (busybox 1.31.1) started, log level 8
Tue Jan 26 23:42:43 2021 cron.err crond[11543]: crond (busybox 1.31.1) started, log level 8
Tue Jan 26 23:42:43 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:43 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:43 2021 daemon.info dnsmasq[11629]: Connected to system UBus
Tue Jan 26 23:42:45 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jan 26 23:42:45 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jan 26 23:42:45 2021 daemon.info dnsmasq[12618]: Connected to system UBus
Tue Jan 26 23:42:45 2021 cron.err crond[12687]: crond (busybox 1.31.1) started, log level 8
Tue Jan 26 23:42:47 2021 daemon.info procd: Instance vmtoolsd::instance1 s in a crash loop 6 crashes, 0 seconds since last crash
Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: [2021/01/26 23:42:50.705777, 0] ../../source3/nmbd/nmbd_become_lmb.c:397(become_local_master_stage2)
Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: *****
Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]:
Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: Samba name server OPENWRT is now a local master browser for workgroup WORKGROUP on subnet 192.168.1.1
Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]:
Tue Jan 26 23:42:50 2021 daemon.err nmbd[4173]: *****
Tue Jan 26 23:45:21 2021 authpriv.info dropbear[16335]: Child connection from 192.168.1.242:40686
Tue Jan 26 23:50:22 2021 authpriv.info dropbear[16335]: Exit before auth from <192.168.1.242:40686>: Timeout before auth
Wed Jan 27 00:12:01 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 00:12:01 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 00:12:01 2021 daemon.info dnsmasq[9287]: Connected to system UBus
Wed Jan 27 00:12:02 2021 cron.err crond[9476]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 00:12:02 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 00:12:02 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 00:12:02 2021 daemon.info dnsmasq[9585]: Connected to system UBus
Wed Jan 27 00:12:04 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 00:12:04 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 00:12:04 2021 daemon.info dnsmasq[10554]: Connected to system UBus
Wed Jan 27 00:12:04 2021 cron.err crond[10623]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 00:12:34 2021 cron.err crond[11693]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 00:12:34 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 00:12:34 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 00:12:34 2021 daemon.info dnsmasq[11779]: Connected to system UBus
Wed Jan 27 00:12:36 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 00:12:36 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 00:12:36 2021 daemon.info dnsmasq[12731]: Connected to system UBus
Wed Jan 27 00:12:36 2021 cron.err crond[12800]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 00:18:07 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 00:35:01 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 00:42:34 2021 cron.err crond[30341]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 00:42:34 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 00:42:34 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 00:42:34 2021 daemon.info dnsmasq[30427]: Connected to system UBus
Wed Jan 27 00:42:36 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 00:42:36 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 00:42:36 2021 daemon.info dnsmasq[31415]: Connected to system UBus
Wed Jan 27 00:42:36 2021 cron.err crond[31484]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:01:00 2021 cron.err crond[31484]: USER root pid 10288 cmd /usr/share/jd-dailybonus/newapp.sh -u
Wed Jan 27 01:05:00 2021 cron.err crond[31484]: USER root pid 12884 cmd sleep 4s; /usr/share/jd-dailybonus/newapp.sh -w
Wed Jan 27 01:12:33 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 01:12:33 2021 user.info mwan3track[6225]: Check (ping) failed for target "114.114.114.114" on interface wan (pppoe-wan)
Wed Jan 27 01:12:34 2021 cron.err crond[16945]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:12:34 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:12:34 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:12:34 2021 daemon.info dnsmasq[17031]: Connected to system UBus
Wed Jan 27 01:12:36 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:12:36 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:12:36 2021 daemon.info dnsmasq[17987]: Connected to system UBus
Wed Jan 27 01:12:36 2021 cron.err crond[18056]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:12:41 2021 user.info mwan3track[6225]: Lost 2 ping(s) on interface wan (pppoe-wan)
Wed Jan 27 01:28:36 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 01:29:24 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 01:30:32 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 01:31:05 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 01:31:58 2021 user.info mwan3track[6225]: Check (ping) failed for target "119.29.29.29" on interface wan (pppoe-wan)
Wed Jan 27 01:40:19 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:40:19 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:40:19 2021 daemon.info dnsmasq[2727]: Connected to system UBus
Wed Jan 27 01:40:19 2021 daemon.info acpid: starting up with netlink and the input layer
Wed Jan 27 01:40:19 2021 daemon.info acpid: 1 rule loaded
Wed Jan 27 01:40:19 2021 daemon.info acpid: waiting for events: event logging is off
Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: 8021ad
Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: 8021q
Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: macvlan
Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: veth
Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: bridge
Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: Network device
Wed Jan 27 01:40:19 2021 user.notice : Added device handler type: tunnel
Wed Jan 27 01:40:19 2021 daemon.notice wpa_supplicant[2846]: Successfully initialized wpa_supplicant
Wed Jan 27 01:40:20 2021 cron.err crond[3003]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.854166] eth0: 0xffffc90000051000, 1c:fd:08:70:a1:95, IRQ 28
Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.932633] br-lan: port 1(eth0) entered blocking state
Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.938015] br-lan: port 1(eth0) entered disabled state
Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.943438] device eth0 entered promiscuous mode
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'lan' is enabled
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'lan' is setting up now
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'lan' is now up
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' is enabled
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' is setting up now
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' is now up
Wed Jan 27 01:40:20 2021 kern.info kernel: [ 13.953123] eth1: 0xffffc90000059000, 24:1c:04:70:0a:e9, IRQ 29
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'wan' is enabled
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'wan6' is enabled
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Network device 'lo' link is up
Wed Jan 27 01:40:20 2021 daemon.notice netifd: Interface 'loopback' has link connectivity
Wed Jan 27 01:40:20 2021 user.notice mwan3[3058]: Using firewall mask 0x3F00
Wed Jan 27 01:40:20 2021 user.notice mwan3[3058]: Max interface count is 60
Wed Jan 27 01:40:20 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: net.ipv4.tcp_congestion_control = bbr
Wed Jan 27 01:40:20 2021 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Wed Jan 27 01:40:20 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:40:20 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:40:20 2021 daemon.notice procd: /etc/rc.d/S60flowoffload: DNSMASQ change
Wed Jan 27 01:40:20 2021 daemon.info dnsmasq[3434]: Connected to system UBus
Wed Jan 27 01:40:21 2021 user.notice upnp daemon: external interface not found, not starting
Wed Jan 27 01:40:21 2021 authpriv.info dropbear[3552]: Not backgrounding
Wed Jan 27 01:40:21 2021 daemon.warn odhcpd[2973]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Wed Jan 27 01:40:21 2021 daemon.err odhcpd[2973]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534).
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Successfully dropped root privileges.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: avahi-daemon 0.8 starting up.
Wed Jan 27 01:40:21 2021 daemon.warn avahi-daemon[3678]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: No service file found in /etc/avahi/services.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface br-lan.IPv4 with address 192.168.1.1.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: New relevant interface br-lan.IPv4 for mDNS.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface lo.IPv6 with address ::1.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: New relevant interface lo.IPv6 for mDNS.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: New relevant interface lo.IPv4 for mDNS.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Network interface enumeration completed.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering new address record for 192.168.1.1 on br-lan.IPv4.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering new address record for ::1 on lo..
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering new address record for 127.0.0.1 on lo.IPv4.
Wed Jan 27 01:40:21 2021 daemon.info avahi-daemon[3678]: Registering HINFO record with values 'X86_64'/'LINUX'.
Wed Jan 27 01:40:21 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: workdir is a f2fs filesystem
Wed Jan 27 01:40:21 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: AdGuardHome service enabled
Wed Jan 27 01:40:21 2021 daemon.notice procd: /etc/rc.d/S95AdGuardHome: luci enable switch=1
Wed Jan 27 01:40:21 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:40:21 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:40:21 2021 daemon.info dnsmasq[4104]: Connected to system UBus
Wed Jan 27 01:40:22 2021 daemon.info procd: Not starting instance acpid::data, command not set
Wed Jan 27 01:40:22 2021 kern.info kernel: [ 16.095786] r8168: eth1: link up
Wed Jan 27 01:40:22 2021 kern.info kernel: [ 16.099118] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Wed Jan 27 01:40:22 2021 daemon.notice netifd: Network device 'eth1' link is up
Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan' has link connectivity
Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan' is setting up now
Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan6' has link connectivity
Wed Jan 27 01:40:22 2021 daemon.notice netifd: Interface 'wan6' is setting up now
Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - slhc
Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - ppp_generic
Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - pppox
Wed Jan 27 01:40:22 2021 daemon.err odhcp6c[4256]: Failed to send RS (Address not available)
Wed Jan 27 01:40:22 2021 daemon.err insmod: module is already loaded - pppoe
Wed Jan 27 01:40:22 2021 daemon.info avahi-daemon[3678]: Server startup complete. Host name is OpenWrt.local. Local service cookie is 13493876.
Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: Plugin rp-pppoe.so loaded.
Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Wed Jan 27 01:40:22 2021 daemon.notice pppd[4298]: pppd 2.4.8 started by root, uid 0
Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: PPP session is 7104
Wed Jan 27 01:40:22 2021 daemon.warn pppd[4298]: Connected to cc:1a:fa:ee:7c:a0 via interface eth1
Wed Jan 27 01:40:22 2021 kern.info kernel: [ 16.397175] pppoe-wan: renamed from ppp0
Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: Renamed interface ppp0 to pppoe-wan
Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: Using interface pppoe-wan
Wed Jan 27 01:40:22 2021 daemon.notice pppd[4298]: Connect: pppoe-wan <--> eth1
Wed Jan 27 01:40:22 2021 daemon.notice procd: /etc/rc.d/S99dnsfilter: 2021-01-27 01:40:22 [DNSFilter is disabled]
Wed Jan 27 01:40:22 2021 daemon.notice procd: /etc/rc.d/S99haproxy: /etc/rc.common: /etc/rc.d/S99haproxy: line 21: extra_command: not found
Wed Jan 27 01:40:22 2021 daemon.info pppd[4298]: syncppp not active
Wed Jan 27 01:40:22 2021 daemon.notice procd: /etc/init.d/haproxy: /etc/rc.common: /etc/init.d/haproxy: line 21: extra_command: not found
Wed Jan 27 01:40:23 2021 daemon.info pppd[4298]: CHAP authentication succeeded: Authentication Successful,Welcome!
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: CHAP authentication succeeded
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: peer from calling number CC:1A:FA:EE:7C:A0 authorized
Wed Jan 27 01:40:23 2021 daemon.err odhcp6c[4256]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: local IP address 122.193.x.x
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: remote IP address 122.193.x.x
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: primary DNS address 58.240.x.33
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: secondary DNS address 221.6.x.66
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: local LL address fe80::261c:044d:d670:0ae9
Wed Jan 27 01:40:23 2021 daemon.notice pppd[4298]: remote LL address fe80::ce1a:faff:feee:7ca0
Wed Jan 27 01:40:23 2021 daemon.notice netifd: Network device 'pppoe-wan' link is up
Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan' is now up
Wed Jan 27 01:40:23 2021 daemon.notice netifd: Network alias 'pppoe-wan' link is up
Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan_6' is enabled
Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan_6' has link connectivity
Wed Jan 27 01:40:23 2021 daemon.notice netifd: Interface 'wan_6' is setting up now
Wed Jan 27 01:40:23 2021 daemon.err nmbd[4174]: [2021/01/27 01:40:23.595280, 0] ../../lib/util/become_daemon.c:136(daemon_ready)
Wed Jan 27 01:40:23 2021 daemon.err nmbd[4174]: daemon_ready: daemon 'nmbd' finished starting up and ready to serve connections
Wed Jan 27 01:40:23 2021 user.info : SIGNAL: Not enabling reaper
Wed Jan 27 01:40:23 2021 user.info mwan3rtmon[3351]: Detect rtchange event.
Wed Jan 27 01:40:23 2021 daemon.err smbd[4173]: [2021/01/27 01:40:23.967236, 0] ../../lib/util/become_daemon.c:136(daemon_ready)
Wed Jan 27 01:40:23 2021 daemon.err smbd[4173]: daemon_ready: daemon 'smbd' finished starting up and ready to serve connections
Wed Jan 27 01:40:24 2021 user.notice mwan3[4457]: Execute ifup event on interface wan (pppoe-wan)
Wed Jan 27 01:40:24 2021 daemon.err odhcp6c[4256]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
Wed Jan 27 01:40:24 2021 daemon.warn odhcpd[2973]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Wed Jan 27 01:40:24 2021 daemon.err odhcpd[2973]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Wed Jan 27 01:40:24 2021 daemon.notice procd: /etc/rc.d/S99serverchan: serverchan is starting now ...
Wed Jan 27 01:40:24 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::261c:4ff:fe70:ae9.
Wed Jan 27 01:40:24 2021 daemon.info avahi-daemon[3678]: New relevant interface eth1.IPv6 for mDNS.
Wed Jan 27 01:40:24 2021 daemon.info avahi-daemon[3678]: Registering new address record for fe80::261c:4ff:fe70:ae9 on eth1.
.
Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: ttyd 1.6.0-13d699e (libwebsockets 3.2.0)
Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: tty configuration:
Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: start command: /usr/libexec/login.sh
Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: close signal: SIGHUP (1)
Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: terminal type: xterm-256color
Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: Using foreign event loop...
Wed Jan 27 01:40:24 2021 daemon.notice ttyd[4932]: Listening on port: 7681
Wed Jan 27 01:40:24 2021 daemon.info procd: - init complete -
Wed Jan 27 01:40:24 2021 user.info wsdd2[5180]: starting.
Wed Jan 27 01:40:25 2021 cron.err crond[5248]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.071790] r8168: eth0: link up
Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.075918] br-lan: port 1(eth0) entered blocking state
Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.081257] br-lan: port 1(eth0) entered forwarding state
Wed Jan 27 01:40:25 2021 daemon.notice netifd: Network device 'eth0' link is up
Wed Jan 27 01:40:25 2021 kern.info kernel: [ 19.088161] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Wed Jan 27 01:40:25 2021 daemon.notice netifd: bridge 'br-lan' link is up
Wed Jan 27 01:40:25 2021 daemon.notice netifd: Interface 'lan' has link connectivity
Wed Jan 27 01:40:25 2021 user.notice mwan3[4457]: Starting tracker on interface wan (pppoe-wan)
Wed Jan 27 01:40:26 2021 daemon.warn odhcpd[2973]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Wed Jan 27 01:40:26 2021 daemon.err odhcpd[2973]: Failed to send to ff02::1%lan@br-lan (Address not available)
Wed Jan 27 01:40:27 2021 daemon.info avahi-daemon[3678]: Joining mDNS multicast group on interface br-lan.IPv6 with address 2408:823d:5614:1f7c::1.
Wed Jan 27 01:40:27 2021 daemon.info avahi-daemon[3678]: New relevant interface br-lan.IPv6 for mDNS.
Wed Jan 27 01:40:27 2021 daemon.info avahi-daemon[3678]: Registering new address record for 2408:823d:5614:x::1 on br-lan.*.
Wed Jan 27 01:40:27 2021 daemon.notice netifd: Interface 'wan_6' is now up
Wed Jan 27 01:40:27 2021 authpriv.info dropbear[3552]: Early exit: Terminated by signal
Wed Jan 27 01:40:27 2021 authpriv.warn dropbear[6679]: Failed listening on '22': Error listening: Address not available
Wed Jan 27 01:40:27 2021 authpriv.info dropbear[6679]: Not backgrounding
Wed Jan 27 01:40:27 2021 user.info mwan3rtmon[3351]: Detect rtchange event.
Wed Jan 27 01:40:27 2021 cron.err crond[6863]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:40:27 2021 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Wed Jan 27 01:40:27 2021 daemon.err miniupnpd[7072]: could not open lease file: /var/upnp.leases
Wed Jan 27 01:40:27 2021 daemon.notice miniupnpd[7072]: HTTP listening on port 5000
Wed Jan 27 01:40:27 2021 daemon.notice miniupnpd[7072]: Listening for NAT-PMP/PCP traffic on port 5351
Wed Jan 27 01:40:27 2021 cron.err crond[7116]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:40:28 2021 user.notice firewall: Reloading firewall due to ifupdate of wan (pppoe-wan)
Wed Jan 27 01:40:28 2021 user.notice ddns-scripts[7180]: ipv4: PID '7180' started at 2021-01-27 01:40
Wed Jan 27 01:40:28 2021 user.info mwan3rtmon[3351]: Detect rtchange event.
Wed Jan 27 01:40:28 2021 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan)
Wed Jan 27 01:40:29 2021 daemon.info dnsmasq[9364]: Connected to system UBus
Wed Jan 27 01:40:30 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:40:30 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:40:30 2021 daemon.info dnsmasq[10897]: Connected to system UBus
Wed Jan 27 01:40:30 2021 cron.err crond[10966]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:40:31 2021 cron.err crond[11144]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:40:31 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:40:31 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:40:31 2021 daemon.info dnsmasq[11230]: Connected to system UBus
Wed Jan 27 01:40:32 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed Jan 27 01:40:33 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed Jan 27 01:40:33 2021 daemon.info dnsmasq[12186]: Connected to system UBus
Wed Jan 27 01:40:33 2021 cron.err crond[12258]: crond (busybox 1.31.1) started, log level 8
Wed Jan 27 01:40:44 2021 daemon.info procd: Instance vmtoolsd::instance1 s in a crash loop 6 crashes, 0 seconds since last crash
Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: [2021/01/27 01:40:46.624177, 0] ../../source3/nmbd/nmbd_become_lmb.c:397(become_local_master_stage2)
Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: *****
Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]:
Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: Samba name server OPENWRT is now a local master browser for workgroup WORKGROUP on subnet 192.168.1.1
Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]:
Wed Jan 27 01:40:46 2021 daemon.err nmbd[4174]: *****

@AwesomeSky
Copy link

AwesomeSky commented Feb 2, 2021

J1900 5.4.92 每天重启一次 Turbo ACC里面写SFE和Qos可能有冲突
现在关闭Qos正在测试 不知道还有没有人有同样问题 如何解决的

@9k001
Copy link

9k001 commented Feb 3, 2021

J1900 5.4.92 每天重启一次 Turbo ACC里面写SFE和Qos可能有冲突
现在关闭Qos正在测试 不知道还有没有人有同样问题 如何解决的

同追问题解决,现在关闭sfe

@Xymmh
Copy link

Xymmh commented Feb 5, 2021

用百度网盘快速刷图片时发现路由器重启,不过我用的是flowoffload

@9k001
Copy link

9k001 commented Feb 7, 2021

基本上可以确认是这个问题了 我已经没重启了

@AwesomeSky
Copy link

基本上可以确认是这个问题了 我已经没重启了

同关闭SFE后 已正常运行四天

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests