找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 4711|回复: 4

[openwrt(x86)] openwrt频繁掉线,求大佬

[复制链接]
发表于 2022-1-30 20:01 | 显示全部楼层 |阅读模式
代码如下,经常几个小时就掉线了,重启后就能解决。机型是z8350的瘦身机,用的usb3.0转千兆网卡做wan口,很多openwrt都这样,求大佬
  1. Sun Jan 30 17:42:23 2022 daemon.info pppd[3706]: LCP terminated by peer
  2. Sun Jan 30 17:42:23 2022 daemon.info pppd[3706]: Connect time 1100.6 minutes.
  3. Sun Jan 30 17:42:23 2022 daemon.info pppd[3706]: Sent 2107617579 bytes, received 3499094432 bytes.
  4. Sun Jan 30 17:42:23 2022 daemon.notice netifd: Network device 'pppoe-wan' link is down
  5. Sun Jan 30 17:42:23 2022 daemon.notice netifd: Network alias 'pppoe-wan' link is down
  6. Sun Jan 30 17:42:23 2022 daemon.notice netifd: Interface 'wan_6' has link connectivity loss
  7. Sun Jan 30 17:42:23 2022 daemon.err odhcp6c[4478]: Failed to send RS (Permission denied)
  8. Sun Jan 30 17:42:23 2022 daemon.err odhcp6c[4478]: Failed to send RELEASE message to ff02::1:2 (Permission denied)
  9. Sun Jan 30 17:42:23 2022 daemon.notice pppd[3706]: Modem hangup
  10. Sun Jan 30 17:42:23 2022 daemon.notice pppd[3706]: Connection terminated.
  11. Sun Jan 30 17:42:23 2022 daemon.info pppd[3706]: Connect time 1100.6 minutes.
  12. Sun Jan 30 17:42:23 2022 daemon.info pppd[3706]: Sent 2107617579 bytes, received 3499094432 bytes.
  13. Sun Jan 30 17:42:23 2022 daemon.notice netifd: Interface 'wan' has lost the connection
  14. Sun Jan 30 17:42:23 2022 daemon.notice netifd: wan_6 (4478): Command failed: Permission denied
  15. Sun Jan 30 17:42:23 2022 daemon.info pppd[3706]: Exit.
  16. Sun Jan 30 17:42:23 2022 daemon.notice netifd: Interface 'wan' is now down
  17. Sun Jan 30 17:42:23 2022 daemon.err odhcp6c[4478]: Failed to send SOLICIT message to ff02::1:2 (Permission denied)
  18. Sun Jan 30 17:42:23 2022 daemon.notice netifd: Interface 'wan' is disabled
  19. Sun Jan 30 17:42:24 2022 kern.warn kernel: [66067.043270] ax88179_178a 2-1:1.0 eth1: Failed to read reg index 0x0040: -32
  20. Sun Jan 30 17:42:24 2022 daemon.notice netifd: Interface 'wan' is enabled
  21. Sun Jan 30 17:42:24 2022 daemon.notice netifd: Interface 'wan' is setting up now
  22. Sun Jan 30 17:42:24 2022 daemon.notice netifd: Interface 'wan_6' is now down
  23. Sun Jan 30 17:42:24 2022 daemon.err insmod: module is already loaded - slhc
  24. Sun Jan 30 17:42:24 2022 daemon.err insmod: module is already loaded - ppp_generic
  25. Sun Jan 30 17:42:24 2022 daemon.err insmod: module is already loaded - pppox
  26. Sun Jan 30 17:42:24 2022 daemon.err insmod: module is already loaded - pppoe
  27. Sun Jan 30 17:42:24 2022 daemon.notice netifd: Interface 'wan_6' is disabled
  28. Sun Jan 30 17:42:24 2022 kern.info kernel: [66067.511572] netifd[2349]: segfault at 7f60b48a4208 ip 000000000041bbd6 sp 00007ffcca0e3ce0 error 4 in netifd[404000+1b000]
  29. Sun Jan 30 17:42:24 2022 kern.info kernel: [66067.524009] Code: 01 75 31 48 8b 53 58 be fe 3b 42 00 bf 02 00 00 00 31 c0 e8 01 e6 ff ff 48 89 df e8 23 f0 ff ff c7 83 90 00 00 00 00 00 00 00 <48> 8b 7b 68 5b e9 f1 cf ff ff 5b c3 53 48 8d 9f 48 ff ff ff 83 fa
  30. Sun Jan 30 17:42:27 2022 kern.info kernel: [66070.403379] ax88179_178a 2-1:1.0 eth1: ax88179 - Link status is: 1
  31. Sun Jan 30 17:42:27 2022 kern.info kernel: [66070.607739] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  32. Sun Jan 30 17:42:29 2022 user.notice : Added device handler type: 8021ad
  33. Sun Jan 30 17:42:29 2022 user.notice : Added device handler type: 8021q
  34. Sun Jan 30 17:42:29 2022 user.notice : Added device handler type: macvlan
  35. Sun Jan 30 17:42:29 2022 user.notice : Added device handler type: veth
  36. Sun Jan 30 17:42:29 2022 user.notice : Added device handler type: bridge
  37. Sun Jan 30 17:42:29 2022 user.notice : Added device handler type: Network device
  38. Sun Jan 30 17:42:29 2022 user.notice : Added device handler type: tunnel
  39. Sun Jan 30 17:42:30 2022 kern.info kernel: [66072.877453] br-lan: port 1(eth0) entered disabled state
  40. Sun Jan 30 17:42:30 2022 kern.info kernel: [66072.885670] device eth0 left promiscuous mode
  41. Sun Jan 30 17:42:30 2022 kern.info kernel: [66072.890598] br-lan: port 1(eth0) entered disabled state
  42. Sun Jan 30 17:42:30 2022 daemon.err netdata[5979]: Cannot refresh interface eth0 duplex state by reading '/sys/class/net/eth0/duplex'. I will stop updating it.
  43. Sun Jan 30 17:42:30 2022 daemon.err netdata[5979]: Cannot refresh interface eth0 carrier state by reading '/sys/class/net/eth0/carrier'. Stop updating it.
  44. Sun Jan 30 17:42:30 2022 daemon.err netdata[5979]: Cannot refresh interface eth0 speed by reading '/sys/class/net/eth0/speed'. Will not update its speed anymore.
  45. Sun Jan 30 17:42:30 2022 daemon.err netdata[5979]: Cannot refresh interface eth1 duplex state by reading '/sys/class/net/eth1/duplex'. I will stop updating it.
  46. Sun Jan 30 17:42:30 2022 daemon.err netdata[5979]: Cannot refresh interface eth1 carrier state by reading '/sys/class/net/eth1/carrier'. Stop updating it.
  47. Sun Jan 30 17:42:30 2022 daemon.err netdata[5979]: Cannot refresh interface eth1 speed by reading '/sys/class/net/eth1/speed'. Will not update its speed anymore.
  48. Sun Jan 30 17:42:30 2022 kern.info kernel: [66073.266974] eth0: 0xffffc90000055000, ec:d6:8a:4b:59:3a, IRQ 117
  49. Sun Jan 30 17:42:30 2022 kern.info kernel: [66073.347322] br-lan: port 1(eth0) entered blocking state
  50. Sun Jan 30 17:42:30 2022 kern.info kernel: [66073.353179] br-lan: port 1(eth0) entered disabled state
  51. Sun Jan 30 17:42:30 2022 kern.info kernel: [66073.359217] device eth0 entered promiscuous mode
  52. Sun Jan 30 17:42:30 2022 kern.info kernel: [66073.365565] br-lan: port 1(eth0) entered blocking state
  53. Sun Jan 30 17:42:30 2022 kern.info kernel: [66073.371420] br-lan: port 1(eth0) entered forwarding state
  54. Sun Jan 30 17:42:30 2022 daemon.notice netifd: Interface 'lan' is enabled
  55. Sun Jan 30 17:42:30 2022 daemon.notice netifd: Interface 'lan' is setting up now
  56. Sun Jan 30 17:42:30 2022 daemon.notice netifd: Interface 'lan' is now up
  57. Sun Jan 30 17:42:30 2022 daemon.notice netifd: bridge 'br-lan' link is up
  58. Sun Jan 30 17:42:30 2022 daemon.notice netifd: Interface 'lan' has link connectivity
  59. Sun Jan 30 17:42:30 2022 daemon.notice netifd: Interface 'loopback' is enabled
  60. Sun Jan 30 17:42:30 2022 daemon.notice netifd: Interface 'loopback' is setting up now
  61. Sun Jan 30 17:42:30 2022 daemon.notice netifd: Interface 'loopback' is now up
  62. Sun Jan 30 17:42:31 2022 kern.warn kernel: [66073.975929] ax88179_178a 2-1:1.0 eth1: Failed to read reg index 0x0040: -32
  63. Sun Jan 30 17:42:31 2022 daemon.notice netifd: Interface 'wan' is enabled
  64. Sun Jan 30 17:42:31 2022 daemon.notice netifd: Network device 'lo' link is up
  65. Sun Jan 30 17:42:31 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
  66. Sun Jan 30 17:42:31 2022 kern.info kernel: [66074.328845] br-lan: port 1(eth0) entered disabled state
  67. Sun Jan 30 17:42:31 2022 daemon.notice netifd: bridge 'br-lan' link is down
  68. Sun Jan 30 17:42:31 2022 daemon.notice netifd: Interface 'lan' has link connectivity loss
  69. Sun Jan 30 17:42:32 2022 daemon.err nlbwmon[15940]: The netlink receive buffer size of 1048576 bytes will be capped to 212992 bytes
  70. Sun Jan 30 17:42:32 2022 daemon.err nlbwmon[15940]: by the kernel. The net.core.rmem_max sysctl limit needs to be raised to
  71. Sun Jan 30 17:42:32 2022 daemon.err nlbwmon[15940]: at least 1048576 in order to sucessfully set the desired receive buffer size!
  72. Sun Jan 30 17:42:32 2022 daemon.info netdata[5979]: RRDSET: chart name 'net.br_lan' on host 'OpenWrt' already exists.
  73. Sun Jan 30 17:42:32 2022 daemon.info netdata[5979]: RRDSET: chart name 'net_operstate.br_lan' on host 'OpenWrt' already exists.
  74. Sun Jan 30 17:42:32 2022 daemon.info netdata[5979]: RRDSET: chart name 'net_carrier.br_lan' on host 'OpenWrt' already exists.
  75. Sun Jan 30 17:42:32 2022 daemon.info netdata[5979]: RRDSET: chart name 'net_mtu.br_lan' on host 'OpenWrt' already exists.
  76. Sun Jan 30 17:42:32 2022 daemon.info netdata[5979]: RRDSET: chart name 'net_packets.br_lan' on host 'OpenWrt' already exists.
  77. Sun Jan 30 17:42:32 2022 daemon.err odhcpd[2465]: Failed to send to ff02::1%lan@br-lan (Address not available)
  78. Sun Jan 30 17:42:34 2022 kern.info kernel: [66077.187433] ax88179_178a 2-1:1.0 eth1: ax88179 - Link status is: 1
  79. Sun Jan 30 17:42:34 2022 daemon.notice netifd: Network device 'eth1' link is up
  80. Sun Jan 30 17:42:34 2022 daemon.notice netifd: Interface 'wan' has link connectivity
  81. Sun Jan 30 17:42:34 2022 daemon.notice netifd: Interface 'wan' is setting up now
  82. Sun Jan 30 17:42:34 2022 kern.info kernel: [66077.394613] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  83. Sun Jan 30 17:42:34 2022 daemon.err insmod: module is already loaded - slhc
  84. Sun Jan 30 17:42:34 2022 daemon.err insmod: module is already loaded - ppp_generic
  85. Sun Jan 30 17:42:34 2022 daemon.err insmod: module is already loaded - pppox
  86. Sun Jan 30 17:42:34 2022 daemon.err insmod: module is already loaded - pppoe
  87. Sun Jan 30 17:42:34 2022 daemon.notice netifd: wan (16141): uci: Entry not found
  88. Sun Jan 30 17:42:34 2022 daemon.notice netifd: wan (16141): sh: out of range
  89. Sun Jan 30 17:42:34 2022 daemon.info pppd[16151]: Plugin pppoe.so loaded.
  90. Sun Jan 30 17:42:34 2022 daemon.info pppd[16151]: PPPoE plugin from pppd 2.4.9
  91. Sun Jan 30 17:42:34 2022 kern.info kernel: [66077.550118] r8168: eth0: link up
  92. Sun Jan 30 17:42:34 2022 kern.info kernel: [66077.554652] br-lan: port 1(eth0) entered blocking state
  93. Sun Jan 30 17:42:34 2022 kern.info kernel: [66077.560548] br-lan: port 1(eth0) entered forwarding state
  94. Sun Jan 30 17:42:34 2022 daemon.notice netifd: Network device 'eth0' link is up
  95. Sun Jan 30 17:42:34 2022 daemon.notice netifd: bridge 'br-lan' link is up
  96. Sun Jan 30 17:42:34 2022 daemon.notice netifd: Interface 'lan' has link connectivity
  97. Sun Jan 30 17:42:34 2022 daemon.notice pppd[16151]: pppd 2.4.9 started by root, uid 0
  98. Sun Jan 30 17:42:40 2022 daemon.info pppd[16151]: PPP session is 24172
  99. Sun Jan 30 17:42:40 2022 daemon.warn pppd[16151]: Connected to c4:b8:b4:97:f5:a4 via interface eth1
  100. Sun Jan 30 17:42:40 2022 kern.info kernel: [66082.826845] pppoe-wan: renamed from ppp0
  101. Sun Jan 30 17:42:40 2022 daemon.info pppd[16151]: Renamed interface ppp0 to pppoe-wan
  102. Sun Jan 30 17:42:40 2022 daemon.info pppd[16151]: Using interface pppoe-wan
  103. Sun Jan 30 17:42:40 2022 daemon.notice pppd[16151]: Connect: pppoe-wan <--> eth1
  104. Sun Jan 30 17:42:40 2022 daemon.err netdata[5979]: Cannot refresh interface pppoe-wan carrier state by reading '/sys/class/net/pppoe-wan/carrier'. Stop updating it.
  105. Sun Jan 30 17:42:40 2022 daemon.info netdata[5979]: RRDSET: chart name 'net_operstate.pppoe_wan' on host 'OpenWrt' already exists.
  106. Sun Jan 30 17:42:40 2022 daemon.info netdata[5979]: RRDSET: chart name 'net_mtu.pppoe_wan' on host 'OpenWrt' already exists.
  107. Sun Jan 30 17:42:43 2022 daemon.info pppd[16151]: syncppp not active
  108. Sun Jan 30 17:42:43 2022 daemon.info pppd[16151]: Remote message: Authentication success,Welcome!
  109. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: PAP authentication succeeded
  110. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: peer from calling number C4:B8:B4:97:F5:A4 authorized
  111. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: local  LL address fe80::293f:4ee1:a74b:f9fc
  112. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: remote LL address fe80::c6b8:b4ff:fe97:f5a4
  113. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: local  IP address 182.47.178.48
  114. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: remote IP address 182.47.176.1
  115. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: primary   DNS address 219.146.1.66
  116. Sun Jan 30 17:42:43 2022 daemon.notice pppd[16151]: secondary DNS address 219.147.1.66
  117. Sun Jan 30 17:42:43 2022 daemon.notice netifd: Network device 'pppoe-wan' link is up
  118. Sun Jan 30 17:42:43 2022 daemon.notice netifd: Interface 'wan' is now up
  119. Sun Jan 30 17:42:43 2022 daemon.notice netifd: Network alias 'pppoe-wan' link is up
  120. Sun Jan 30 17:42:43 2022 daemon.notice netifd: Interface 'wan_6' is enabled
  121. Sun Jan 30 17:42:43 2022 daemon.notice netifd: Interface 'wan_6' has link connectivity
  122. Sun Jan 30 17:42:43 2022 daemon.notice netifd: Interface 'wan_6' is setting up now
  123. Sun Jan 30 17:42:43 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  124. Sun Jan 30 17:42:44 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of lan (br-lan)
  125. Sun Jan 30 17:42:44 2022 daemon.info netdata[5979]: RRDSET: chart name 'net.pppoe_wan' on host 'OpenWrt' already exists.
  126. Sun Jan 30 17:42:44 2022 daemon.info netdata[5979]: RRDSET: chart name 'net_packets.pppoe_wan' on host 'OpenWrt' already exists.
  127. Sun Jan 30 17:42:45 2022 daemon.notice netifd: Interface 'wan_6' is now up
  128. Sun Jan 30 17:42:55 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of loopback (lo)
  129. Sun Jan 30 17:42:55 2022 daemon.err nlbwmon[16893]: The netlink receive buffer size of 1048576 bytes will be capped to 212992 bytes
  130. Sun Jan 30 17:42:55 2022 daemon.err nlbwmon[16893]: by the kernel. The net.core.rmem_max sysctl limit needs to be raised to
  131. Sun Jan 30 17:42:55 2022 daemon.err nlbwmon[16893]: at least 1048576 in order to sucessfully set the desired receive buffer size!
  132. Sun Jan 30 17:43:06 2022 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
  133. Sun Jan 30 17:43:06 2022 daemon.info netdata[5979]: Initializing file /var/cache/netdata/ipv4.sockstat_raw_sockets/main.db.
  134. Sun Jan 30 17:43:06 2022 daemon.info netdata[5979]: Initializing file /var/cache/netdata/ipv4.sockstat_raw_sockets/inuse.db.
  135. Sun Jan 30 17:43:06 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wan (pppoe-wan)
  136. Sun Jan 30 17:43:17 2022 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan)
  137. Sun Jan 30 17:43:18 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wan_6 (pppoe-wan)
复制代码
发表于 2022-2-4 23:27 | 显示全部楼层
之前我好像也有段时间总是断网,后来一个一个排查问题,再后来就很稳定了,每一个步骤自己挨个实验并观察一段时间,不要一次性做太多操作,否则是怎么解决问题的都不知道。
先把你的 WAN口的 ipv6 关了。

1. 关闭了防火墙中的FullCone-NAT:

2. 同时关闭了网络加速(这个软件流量分载就是Flow Offloading):

3. 删除了nft-qos(智能网络限速?),nlbwmon(流量监控,导致日志中出错),这几个软件包
回复 支持 反对

使用道具 举报

发表于 2022-2-4 23:27 | 显示全部楼层
之前我好像也有段时间总是断网,后来一个一个排查问题,再后来就很稳定了,每一个步骤自己挨个实验并观察一段时间,不要一次性做太多操作,否则是怎么解决问题的都不知道。
先把你的 WAN口的 ipv6 关了。

1. 关闭了防火墙中的FullCone-NAT:

2. 同时关闭了网络加速(这个软件流量分载就是Flow Offloading):

3. 删除了nft-qos(智能网络限速?),nlbwmon(流量监控,导致日志中出错),这几个软件包
回复 支持 反对

使用道具 举报

发表于 2022-2-4 23:32 | 显示全部楼层
你这前三行日志让我有点眼熟,我好像之前也有同样的错误日志,LCP 应该是默认值,发送或接收的数据大小超过了 LCP 的值导致报错,而之所以会超,十有八九是因为开了 Full  Nat加速和流量分载。我现在什么狗屁加速全关的,很稳定。
回复 支持 反对

使用道具 举报

发表于 2023-2-3 16:19 | 显示全部楼层
遇到过类似的情况,我把多拨删了就好了
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

欢迎大家光临恩山无线论坛上一条 /1 下一条

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-6-15 08:05

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com

快速回复 返回顶部 返回列表