找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 2391|回复: 8

[openwrt(x86)] 各位大佬,我的I350-T4在openwrt21.02.1中无法正常使用

[复制链接]
发表于 2022-1-23 23:35 | 显示全部楼层 |阅读模式
我的I350-T4在openwrt21.02.1中无法正常使用,但是在19.07.8中能使用。请问是什么问题,一直在刷断线和上线?日志在附件里,有大佬帮忙看一下吗


  1. Sun Jan 23 23:16:43 2022 kern.info kernel: [    8.446106] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
  2. Sun Jan 23 23:16:43 2022 daemon.err odhcpd[3616]: Failed to send to ff02::1%lan@br-lan (Address not available)
  3. Sun Jan 23 23:16:43 2022 authpriv.info dropbear[5480]: Not backgrounding
  4. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Network device 'eth4' link is up
  5. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.058429] igb 0000:0b:00.3 eth4: igb: eth4 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX/TX
  6. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.060665] br-lan: port 2(eth4) entered blocking state
  7. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.061136] br-lan: port 2(eth4) entered forwarding state
  8. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Network device 'eth1' link is up
  9. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.394485] igb 0000:0b:00.0 eth1: igb: eth1 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX
  10. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.396745] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  11. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.397360] IPv6: ADDRCONF(NETDEV_CHANGE): vth1: link becomes ready
  12. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Network device 'vth1' link is up
  13. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan1' has link connectivity
  14. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan1' is setting up now
  15. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.398215] IPv6: ADDRCONF(NETDEV_CHANGE): vth2: link becomes ready
  16. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.399021] IPv6: ADDRCONF(NETDEV_CHANGE): vth3: link becomes ready
  17. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Network device 'vth2' link is up
  18. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan2' has link connectivity
  19. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan2' is setting up now
  20. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Network device 'vth3' link is up
  21. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan3' has link connectivity
  22. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan3' is setting up now
  23. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Network device 'vth4' link is up
  24. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan4' has link connectivity
  25. Sun Jan 23 23:16:45 2022 daemon.notice netifd: Interface 'wan4' is setting up now
  26. Sun Jan 23 23:16:45 2022 kern.info kernel: [   11.399803] IPv6: ADDRCONF(NETDEV_CHANGE): vth4: link becomes ready
  27. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - slhc
  28. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - ppp_generic
  29. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppox
  30. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - slhc
  31. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppoe
  32. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - slhc
  33. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - ppp_generic
  34. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - ppp_generic
  35. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - slhc
  36. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppox
  37. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppox
  38. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - ppp_generic
  39. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppoe
  40. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppoe
  41. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppox
  42. Sun Jan 23 23:16:45 2022 daemon.err insmod: module is already loaded - pppoe
  43. Sun Jan 23 23:16:45 2022 daemon.info pppd[5748]: Plugin rp-pppoe.so loaded.
  44. Sun Jan 23 23:16:45 2022 daemon.info pppd[5748]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
  45. Sun Jan 23 23:16:45 2022 daemon.info pppd[5749]: Plugin rp-pppoe.so loaded.
  46. Sun Jan 23 23:16:45 2022 daemon.info pppd[5749]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
  47. Sun Jan 23 23:16:45 2022 daemon.info pppd[5733]: Plugin rp-pppoe.so loaded.
  48. Sun Jan 23 23:16:45 2022 daemon.info pppd[5733]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
  49. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[2557]: exiting on receipt of SIGTERM
  50. Sun Jan 23 23:16:45 2022 daemon.info pppd[5750]: Plugin rp-pppoe.so loaded.
  51. Sun Jan 23 23:16:45 2022 daemon.info pppd[5750]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
  52. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: Connected to system UBus
  53. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: started, version 2.85 cachesize 10000
  54. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: DNS service limited to local subnets
  55. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
  56. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: UBus support enabled: connected to system bus
  57. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq-dhcp[5801]: DHCP, IP range 10.10.1.2 -- 10.10.1.200, lease time 1d
  58. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain test
  59. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain onion
  60. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain localhost
  61. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain local
  62. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain invalid
  63. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain bind
  64. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain lan
  65. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: reading /tmp/resolv.conf.d/resolv.conf.auto
  66. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain test
  67. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain onion
  68. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain localhost
  69. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain local
  70. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain invalid
  71. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain bind
  72. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using only locally-known addresses for domain lan
  73. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using nameserver 223.5.5.5#53
  74. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: using nameserver 223.6.6.6#53
  75. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: read /etc/hosts - 7 addresses
  76. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq[5801]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
  77. Sun Jan 23 23:16:45 2022 daemon.info dnsmasq-dhcp[5801]: read /etc/ethers - 0 addresses
  78. Sun Jan 23 23:16:45 2022 daemon.notice pppd[5748]: pppd 2.4.8 started by root, uid 0
  79. Sun Jan 23 23:16:45 2022 daemon.notice pppd[5733]: pppd 2.4.8 started by root, uid 0
  80. Sun Jan 23 23:16:46 2022 kern.info kernel: [   11.441056] xt_CT: No such helper "tftp"
  81. Sun Jan 23 23:16:46 2022 daemon.notice pppd[5750]: pppd 2.4.8 started by root, uid 0
  82. Sun Jan 23 23:16:46 2022 daemon.notice pppd[5749]: pppd 2.4.8 started by root, uid 0
  83. Sun Jan 23 23:16:49 2022 authpriv.info dropbear[5938]: Child connection from 10.10.1.232:56070
  84. Sun Jan 23 23:16:50 2022 authpriv.notice dropbear[5938]: Pubkey auth succeeded for 'root' with key sha1!! 39:dc:9c:5a:f4:f1:80:fb:8a:b1:7e:41:52:71:cc:8f:d9:43:45:c4 from 10.10.1.232:56070
  85. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.894098] ------------[ cut here ]------------
  86. Sun Jan 23 23:16:51 2022 kern.info kernel: [   16.896145] NETDEV WATCHDOG: eth1 (igb): transmit queue 0 timed out
  87. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.896577] WARNING: CPU: 3 PID: 0 at 0xffffffff8179790c
  88. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.896994] Modules linked in: pppoe ppp_async pppox ppp_generic iptable_nat ipt_REJECT xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_MASQUERADE xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY slhc r8169 nf_reject_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_conntrack_netlink nf_conncount macvlan iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables forcedeth e1000e crc_ccitt bnx2 act_connmark nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact i2c_dev xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport
  89. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.897012]  ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ixgbe igb e1000 ifb mdio tun nls_utf8 nls_iso8859_1 nls_cp437 vfat fat button_hotplug ptp realtek pps_core mii libphy
  90. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.902754] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 5.4.154 #0
  91. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.903301] Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.16707776.B64.2008070230 08/07/2020
  92. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.905220] RIP: 0010:0xffffffff8179790c
  93. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.906948] Code: 00 49 63 4d e0 eb 92 4c 89 e7 c6 05 6e 10 90 00 01 e8 78 37 fc ff 89 d9 4c 89 e6 48 c7 c7 48 ba f7 81 48 89 c2 e8 5a 00 12 00 <0f> 0b eb c0 55 48 89 e5 41 57 49 89 d7 41 56 4d 89 c6 41 55 49 89
  94. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.908330] RSP: 0018:ffffc9000011ce90 EFLAGS: 00010286
  95. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.908953] RAX: 0000000000000037 RBX: 0000000000000000 RCX: 0000000000000006
  96. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.909569] RDX: 0000000000000007 RSI: 0000000000000002 RDI: ffff88803ed974d0
  97. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.910196] RBP: ffffc9000011cec0 R08: 0000000000000000 R09: 000000000000046a
  98. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.910809] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800f6d8000
  99. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.911418] R13: ffff88800f6d8480 R14: 0000000000000008 R15: 0000000000000003
  100. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.912042] FS:  0000000000000000(0000) GS:ffff88803ed80000(0000) knlGS:0000000000000000
  101. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.912662] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  102. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.913258] CR2: 00007fd823c4d948 CR3: 0000000003008006 CR4: 00000000001606e0
  103. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.913898] Call Trace:
  104. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.915116]  <IRQ>
  105. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.916966]  ? 0xffffffff817976f0
  106. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.917543]  0xffffffff811075e6
  107. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.918133]  0xffffffff811077b4
  108. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.918710]  ? 0xffffffff810453b7
  109. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.919293]  ? 0xffffffff81113c4b
  110. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.919873]  0xffffffff81c000c9
  111. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.920457]  0xffffffff810b37bf
  112. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.921014]  0xffffffff81a01c26
  113. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.921563]  0xffffffff81a0163f
  114. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.922116]  </IRQ>
  115. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.922643] RIP: 0010:0xffffffff818fd437
  116. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.923204] Code: 00 a8 08 75 c3 e9 77 ff ff ff 90 90 90 90 90 90 90 90 90 55 8b 05 19 09 8e 00 48 89 e5 85 c0 7e 07 0f 00 2d 1b be 50 00 fb f4 <5d> c3 0f 1f 80 00 00 00 00 55 8b 05 f9 08 8e 00 48 89 e5 85 c0 7e
  117. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.924475] RSP: 0018:ffffc9000008fea0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
  118. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.927140] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000001
  119. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.927766] RDX: 000000000000dff2 RSI: 0000000000000000 RDI: 0000000000000000
  120. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.928385] RBP: ffffc9000008fea0 R08: ffff88803ea1a780 R09: ffff88803ed9d5e8
  121. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.929016] R10: 0000000000000000 R11: 0000000000000010 R12: ffffffff8209bb80
  122. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.929632] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
  123. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.930256]  0xffffffff818fd2d9
  124. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.930826]  0xffffffff8102d5e0
  125. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.931369]  0xffffffff818fd4e7
  126. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.931891]  0xffffffff810d598f
  127. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.932398]  0xffffffff810d5b08
  128. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.932884]  0xffffffff81043885
  129. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.933354]  0xffffffff810000d4
  130. Sun Jan 23 23:16:51 2022 kern.warn kernel: [   16.933810] ---[ end trace 7eaff32ed5e01a01 ]---
  131. Sun Jan 23 23:16:51 2022 kern.err kernel: [   16.934322] igb 0000:0b:00.0 eth1: Reset adapter
  132. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Network device 'eth1' link is down
  133. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Network device 'vth1' link is down
  134. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan1' has link connectivity loss
  135. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Network device 'vth2' link is down
  136. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan2' has link connectivity loss
  137. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Network device 'vth3' link is down
  138. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan3' has link connectivity loss
  139. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Network device 'vth4' link is down
  140. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan4' has link connectivity loss
  141. Sun Jan 23 23:16:51 2022 kern.err kernel: [   16.998722] igb 0000:0b:00.3 eth4: Reset adapter
  142. Sun Jan 23 23:16:51 2022 daemon.err pppd[5733]: select (waitForPADO): Interrupted system call
  143. Sun Jan 23 23:16:51 2022 daemon.warn pppd[5733]: Timeout waiting for PADO packets
  144. Sun Jan 23 23:16:51 2022 daemon.err pppd[5733]: Unable to complete PPPoE Discovery
  145. Sun Jan 23 23:16:51 2022 daemon.info pppd[5733]: Exit.
  146. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan1' is now down
  147. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan1' is disabled
  148. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan1' is enabled
  149. Sun Jan 23 23:16:51 2022 daemon.err pppd[5748]: select (waitForPADO): Interrupted system call
  150. Sun Jan 23 23:16:51 2022 daemon.warn pppd[5748]: Timeout waiting for PADO packets
  151. Sun Jan 23 23:16:51 2022 daemon.err pppd[5749]: select (waitForPADO): Interrupted system call
  152. Sun Jan 23 23:16:51 2022 daemon.warn pppd[5749]: Timeout waiting for PADO packets
  153. Sun Jan 23 23:16:51 2022 kern.info kernel: [   17.074775] 8021q: adding VLAN 0 to HW filter on device vth1
  154. Sun Jan 23 23:16:51 2022 daemon.err pppd[5750]: select (waitForPADO): Interrupted system call
  155. Sun Jan 23 23:16:51 2022 daemon.warn pppd[5750]: Timeout waiting for PADO packets
  156. Sun Jan 23 23:16:51 2022 daemon.err pppd[5748]: Unable to complete PPPoE Discovery
  157. Sun Jan 23 23:16:51 2022 daemon.err pppd[5749]: Unable to complete PPPoE Discovery
  158. Sun Jan 23 23:16:51 2022 daemon.info pppd[5749]: Exit.
  159. Sun Jan 23 23:16:51 2022 daemon.info pppd[5748]: Exit.
  160. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan4' is now down
  161. Sun Jan 23 23:16:51 2022 daemon.err pppd[5750]: Unable to complete PPPoE Discovery
  162. Sun Jan 23 23:16:51 2022 daemon.info pppd[5750]: Exit.
  163. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan4' is disabled
  164. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan4' is enabled
  165. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan2' is now down
  166. Sun Jan 23 23:16:51 2022 kern.info kernel: [   17.110551] 8021q: adding VLAN 0 to HW filter on device vth4
  167. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan2' is disabled
  168. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan2' is enabled
  169. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan3' is now down
  170. Sun Jan 23 23:16:51 2022 kern.info kernel: [   17.126747] 8021q: adding VLAN 0 to HW filter on device vth2
  171. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan3' is disabled
  172. Sun Jan 23 23:16:51 2022 daemon.notice netifd: Interface 'wan3' is enabled
  173. Sun Jan 23 23:16:51 2022 kern.info kernel: [   17.142666] 8021q: adding VLAN 0 to HW filter on device vth3
  174. Sun Jan 23 23:16:52 2022 daemon.notice netifd: Network device 'eth4' link is down
  175. Sun Jan 23 23:16:52 2022 kern.info kernel: [   18.014175] br-lan: port 2(eth4) entered disabled state
  176. Sun Jan 23 23:16:53 2022 kern.err kernel: [   18.850207] igb 0000:0b:00.3 eth4: Reset adapter
  177. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Network device 'eth1' link is up
  178. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Network device 'vth1' link is up
  179. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan1' has link connectivity
  180. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan1' is setting up now
  181. Sun Jan 23 23:16:55 2022 kern.info kernel: [   20.446435] igb 0000:0b:00.0 eth1: igb: eth1 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX
  182. Sun Jan 23 23:16:55 2022 kern.info kernel: [   20.448804] IPv6: ADDRCONF(NETDEV_CHANGE): vth1: link becomes ready
  183. Sun Jan 23 23:16:55 2022 kern.info kernel: [   20.449328] IPv6: ADDRCONF(NETDEV_CHANGE): vth2: link becomes ready
  184. Sun Jan 23 23:16:55 2022 kern.info kernel: [   20.450080] IPv6: ADDRCONF(NETDEV_CHANGE): vth3: link becomes ready
  185. Sun Jan 23 23:16:55 2022 kern.info kernel: [   20.450861] IPv6: ADDRCONF(NETDEV_CHANGE): vth4: link becomes ready
  186. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Network device 'vth2' link is up
  187. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan2' has link connectivity
  188. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan2' is setting up now
  189. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Network device 'vth3' link is up
  190. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan3' has link connectivity
  191. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan3' is setting up now
  192. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Network device 'vth4' link is up
  193. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan4' has link connectivity
  194. Sun Jan 23 23:16:55 2022 daemon.notice netifd: Interface 'wan4' is setting up now
复制代码


本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

×
我的恩山、我的无线 The best wifi forum is right here.
发表于 2022-1-24 10:44 | 显示全部楼层
折腾啥
前两天隔壁提醒,这网卡现在回收价高的离谱
我150包邮买的俩
现在回收780包邮

点评

没办法,现在千兆多播刚好需要四口千兆。目前情况下在19.07.8中可以使用,怀疑是驱动问题  详情 回复 发表于 2022-1-24 15:20
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

 楼主| 发表于 2022-1-24 15:20 | 显示全部楼层
吃烧饼喝三鹿 发表于 2022-1-24 10:44
折腾啥
前两天隔壁提醒,这网卡现在回收价高的离谱
我150包邮买的俩

没办法,现在千兆多播刚好需要四口千兆。目前情况下在19.07.8中可以使用,怀疑是驱动问题
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

发表于 2022-1-24 18:32 | 显示全部楼层
在虚拟平台上运行。目前可以很好解决,openwrt编译时驱动问题。

点评

使用得是官方驱动  详情 回复 发表于 2022-1-24 22:36
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

 楼主| 发表于 2022-1-24 22:36 | 显示全部楼层
book_live 发表于 2022-1-24 18:32
在虚拟平台上运行。目前可以很好解决,openwrt编译时驱动问题。

使用得是官方驱动
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

 楼主| 发表于 2022-1-26 14:38 | 显示全部楼层
大佬求救啊
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

发表于 2022-2-11 18:53 | 显示全部楼层
你这是买的寨卡 还是 正版的,我找了好久搞到了 IBM正版的。小一千块啊。寨卡好早几年二百三百没买,现在还都涨价了。
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

发表于 2022-2-18 23:14 | 显示全部楼层
应该是驱动的问题,我用官方 openwrt 21.02.1 也是同样的问题内核版本 5.4.154
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

发表于 2022-10-3 16:29 | 显示全部楼层
咋搞啊,我也是这个问题。 也没找到合适的固件
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-4-24 14:40

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com 举报电话:0519-86695797

快速回复 返回顶部 返回列表