找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 1280|回复: 15

X86op做主路由,硬路由op做Vlan交换机,无故死机

[复制链接]
发表于 2023-5-29 19:08 | 显示全部楼层 |阅读模式
本帖最后由 yuzhiyuan 于 2023-5-29 22:10 编辑

不知道哪里出现了问题,然后搞了一些系统日志,X86主路径由内部日志有lan1进入阻塞模式,进入转发状态,然后杂刊模型,再限制制带10S,什么情况?这只网络拓扑图




这是op交换机的系统日志

Mon May 29 18:10:55 2023 kern.notice kernel: [  111.871786] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.debug kernel: [  111.884723] entrytb_aid_aquire(): found non-occupied aid:8, allocated from:2
Mon May 29 18:10:55 2023 kern.warn kernel: [  111.891784] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [  111.901368] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - 58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.err kernel: [  111.910563] 7981@C08L1,APBuildAssociation() 693: invalid status code(53) !!!
Mon May 29 18:10:55 2023 kern.notice kernel: [  111.917670] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=53)...
Mon May 29 18:10:55 2023 kern.notice kernel: [  111.962702] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=3, Status=0 from [wcid=7]58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.067505] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#2, Alg=3, Status=0 from [wcid=7]58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.080278] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - 58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.089568] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.098749] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.104840] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.227284] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.238880] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.245938] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:10:55 2023 kern.notice kernel: [  112.252604] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:10:55 2023 kern.warn kernel: [  112.264146] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA3PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=7 from 58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.warn kernel: [  112.264146]
Mon May 29 18:16:26 2023 kern.notice kernel: [  443.406071] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=3, Status=0 from [wcid=1023]ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.notice kernel: [  443.509947] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#2, Alg=3, Status=0 from [wcid=1023]ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.debug kernel: [  443.522922] entrytb_aid_aquire(): found non-occupied aid:9, allocated from:2
Mon May 29 18:16:26 2023 kern.warn kernel: [  443.529985] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.notice kernel: [  443.537119] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.notice kernel: [  443.546398] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:16:26 2023 kern.notice kernel: [  443.555497] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:16:26 2023 kern.notice kernel: [  443.561525] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:16:27 2023 kern.err kernel: [  443.582360] 7981@C15L1,store_pmkid_cache_in_sec_config() 3327: pStaCfg is null
Mon May 29 18:16:27 2023 kern.notice kernel: [  443.691273] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:16:27 2023 kern.notice kernel: [  443.697944] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:16:27 2023 kern.notice kernel: [  443.705023] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:16:27 2023 kern.notice kernel: [  443.711724] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:16:27 2023 kern.warn kernel: [  443.723291] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA3PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=8 from ee:4b:77:72:a2:57
Mon May 29 18:16:27 2023 kern.warn kernel: [  443.723291]
Mon May 29 18:19:45 2023 kern.err kernel: [  641.926764] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=0
Mon May 29 18:19:46 2023 kern.err kernel: [  642.970742] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(0), del PMKID CacheIdx=1
Mon May 29 18:19:46 2023 kern.notice kernel: [  643.545989] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]94:58:cb:72:d0:58
Mon May 29 18:19:46 2023 kern.debug kernel: [  643.558910] entrytb_aid_aquire(): found non-occupied aid:10, allocated from:2
Mon May 29 18:19:46 2023 kern.warn kernel: [  643.566063] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:94:58:cb:72:d0:58
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.574062] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - 94:58:cb:72:d0:58
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.583411] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.592549] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.598655] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.723251] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.729874] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.736713] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:19:47 2023 kern.notice kernel: [  643.743339] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:19:47 2023 kern.warn kernel: [  643.755011] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=9 from 94:58:cb:72:d0:58
Mon May 29 18:19:47 2023 kern.warn kernel: [  643.755011]
Mon May 29 18:19:49 2023 kern.err kernel: [  646.094772] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=2
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.602470] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.debug kernel: [  648.615389] entrytb_aid_aquire(): found non-occupied aid:11, allocated from:2
Mon May 29 18:19:52 2023 kern.warn kernel: [  648.622539] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.631154] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.640444] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.649547] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.655574] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.779275] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.786002] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.793125] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:19:52 2023 kern.notice kernel: [  648.799881] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:19:52 2023 kern.warn kernel: [  648.811745] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=10 from b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.warn kernel: [  648.811745]
Mon May 29 18:19:59 2023 kern.warn kernel: [  655.582517] 7981@C08L2,ap_peer_disassoc_action() 3479: ASSOC - 1 receive DIS-ASSOC request
Mon May 29 18:19:59 2023 kern.warn kernel: [  655.590854] 7981@C01L2,wifi_sys_disconn_act() 1002:  wdev_idx=1
Mon May 29 18:19:59 2023 kern.notice kernel: [  655.598062] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=1
Mon May 29 18:19:59 2023 kern.warn kernel: [  655.605120] 7981@C13L2,MacTableDeleteEntry() 1793: Del Sta:94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.notice kernel: [  676.435853] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.debug kernel: [  676.448770] entrytb_aid_aquire(): found non-occupied aid:10, allocated from:2
Mon May 29 18:20:19 2023 kern.warn kernel: [  676.455918] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.notice kernel: [  676.463985] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - 94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.notice kernel: [  676.473259] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:20:19 2023 kern.notice kernel: [  676.482394] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:20:19 2023 kern.notice kernel: [  676.488414] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:20:20 2023 kern.notice kernel: [  676.611264] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:20:20 2023 kern.notice kernel: [  676.617899] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:20:20 2023 kern.notice kernel: [  676.624745] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:20:20 2023 kern.notice kernel: [  676.631391] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:20:20 2023 kern.warn kernel: [  676.642914] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=9 from 94:58:cb:72:d0:58
Mon May 29 18:20:20 2023 kern.warn kernel: [  676.642914]
Mon May 29 18:20:56 2023 kern.err kernel: [  712.666740] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=3
Mon May 29 18:26:27 2023 kern.err kernel: [ 1044.458794] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=4






这是交换机的内核日志:

[  646.094772] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=2
[  648.602470] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]b0:41:1d:f2:54:7f
[  648.615389] entrytb_aid_aquire(): found non-occupied aid:11, allocated from:2
[  648.622539] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:b0:41:1d:f2:54:7f
[  648.631154] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - b0:41:1d:f2:54:7f
[  648.640444] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
[  648.649547] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
[  648.655574] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
[  648.779275] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
[  648.786002] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
[  648.793125] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
[  648.799881] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
[  648.811745] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=10 from b0:41:1d:f2:54:7f
[  648.811745]
[  655.582517] 7981@C08L2,ap_peer_disassoc_action() 3479: ASSOC - 1 receive DIS-ASSOC request
[  655.590854] 7981@C01L2,wifi_sys_disconn_act() 1002:  wdev_idx=1
[  655.598062] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=1
[  655.605120] 7981@C13L2,MacTableDeleteEntry() 1793: Del Sta:94:58:cb:72:d0:58
[  676.435853] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]94:58:cb:72:d0:58
[  676.448770] entrytb_aid_aquire(): found non-occupied aid:10, allocated from:2
[  676.455918] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:94:58:cb:72:d0:58
[  676.463985] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647:  Recv Assoc from STA - 94:58:cb:72:d0:58
[  676.473259] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
[  676.482394] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
[  676.488414] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
[  676.611264] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
[  676.617899] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
[  676.624745] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
[  676.631391] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
[  676.642914] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=9 from 94:58:cb:72:d0:58
[  676.642914]
[  712.666740] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=3
[ 1044.458794] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=4





这是主系统日志:


Mon May 29 18:17:43 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:20:19 2023 daemon.err nmbd[9978]: [2023/05/29 18:20:19.346380,  0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:20:19 2023 daemon.err nmbd[9978]:   query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:20:19 2023 daemon.err nmbd[9978]:   This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:22:38 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:25:19 2023 daemon.err nmbd[9978]: [2023/05/29 18:25:19.878883,  0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:25:19 2023 daemon.err nmbd[9978]:   query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:25:19 2023 daemon.err nmbd[9978]:   This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:27:46 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:30:22 2023 daemon.err nmbd[9978]: [2023/05/29 18:30:22.965440,  0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:30:22 2023 daemon.err nmbd[9978]:   query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:30:22 2023 daemon.err nmbd[9978]:   This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:32:46 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:35:28 2023 daemon.err nmbd[9978]: [2023/05/29 18:35:28.765545,  0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:35:28 2023 daemon.err nmbd[9978]:   query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:35:28 2023 daemon.err nmbd[9978]:   This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:37:53 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:40:31 2023 daemon.err nmbd[9978]: [2023/05/29 18:40:31.067753,  0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:40:31 2023 daemon.err nmbd[9978]:   query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:40:31 2023 daemon.err nmbd[9978]:   This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:42:58 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:45:32 2023 daemon.err nmbd[9978]: [2023/05/29 18:45:32.988158,  0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:45:32 2023 daemon.err nmbd[9978]:   query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:45:32 2023 daemon.err nmbd[9978]:   This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:47:41 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:50:35 2023 daemon.err nmbd[9978]: [2023/05/29 18:50:35.746398,  0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:50:35 2023 daemon.err nmbd[9978]:   query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:50:35 2023 daemon.err nmbd[9978]:   This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.




这是主路由内核日志:

[   19.386179] eth1: 0xffffc90000039000, 94:c6:91:36:e2:61, IRQ 26
[   19.438111] e1000: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None
[   19.439094] br-lan: port 1(eth0) entered blocking state
[   19.439243] br-lan: port 1(eth0) entered forwarding state
[   19.439426] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   23.576740] r8168: eth1: link up
[   23.577127] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[   23.837063] pppoe-wan: renamed from ppp0
[   25.490640] init oaf sysctl...ok
[   27.127113] br-lan: port 1(eth0) entered disabled state
[   27.157178] e1000: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None
[   27.157931] br-lan: port 1(eth0) entered blocking state
[   27.158078] br-lan: port 1(eth0) entered forwarding state
[   27.288862] device br-lan entered promiscuous mode
[   31.741085] overlayfs: filesystem on '/opt/docker/check-overlayfs-support1460502460/upper' not supported as upperdir
[   31.751443] overlayfs: filesystem on '/opt/docker/check-overlayfs-support558070916/upper' not supported as upperdir
[   32.332338] traps: check[15134] general protection fault ip:8049007 sp:fff58f10 error:402 in check[8049000+1000]
[   44.132223] squashfs: Unknown parameter 'discard'
[   44.132626] F2FS-fs (sda128): Magic Mismatch, valid(0xf2f52010) - read(0x89e45589)
[   44.133038] F2FS-fs (sda128): Can't find valid F2FS filesystem in 1th superblock
[   44.133437] F2FS-fs (sda128): Magic Mismatch, valid(0xf2f52010) - read(0x2e48937b)
[   44.133652] F2FS-fs (sda128): Can't find valid F2FS filesystem in 2th superblock
[   44.134590] exFAT-fs (sda128): mounting with "discard" option, but the device does not support discard
[   44.135016] exFAT-fs (sda128): invalid boot record signature
[   44.135178] exFAT-fs (sda128): failed to read boot sector
[   44.135335] exFAT-fs (sda128): failed to recognize exfat type
[   44.135918] fuseblk: Unknown parameter 'discard'
[   46.087999] NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory
[   46.088243] NFSD: Using legacy client tracking operations.
[   46.088401] NFSD: starting 10-second grace period (net f0000000)
[   67.188605] process '/usr/bin/zerotier-one' started with executable stack
[ 5601.927103] TCP: request_sock_TCP: Possible SYN flooding on port 5000. Sending cookies.  Check SNMP counters.
[ 9449.264838] sh (24873): drop_caches: 3



本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

×
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
发表于 2023-5-29 19:59 | 显示全部楼层
op主路由和vlan交换机配置发上来,不然都不知道你是怎么配置的。你说进入阻塞模式那不就是有环路了所以stp阻塞了端口
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-29 20:28 | 显示全部楼层
本帖最后由 yuzhiyuan 于 2023-5-29 22:12 编辑

就是说X86软路由做主路由,硬路由OP做Vlan交换机,没事就死机两次了。这是Vlan配置,还有一个192.168.1.2的op旁路由挂网心

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

×
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-29 20:28 | 显示全部楼层
EXIA文 发表于 2023-5-29 19:59
op主路由和vlan交换机配置发上来,不然都不知道你是怎么配置的。你说进入阻塞模式那不就是有环路了所以stp ...

楼下发了大佬
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-29 23:53 | 显示全部楼层
EXIA文 发表于 2023-5-29 19:59
op主路由和vlan交换机配置发上来,不然都不知道你是怎么配置的。你说进入阻塞模式那不就是有环路了所以stp ...

有个op旁路由,是不是这个堵塞了

点评

这个N1堵塞也只会堵塞和N1连接的接口,你可以先断开N1看看还会不会堵塞。不会那就是N1的问题,还有你的ESXi不是内部也有一个交换机吗,这个交换机是不是新建的端口组出现了你配置错误导致在内部出现了环路。当然你要  详情 回复 发表于 2023-5-30 10:39
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2023-5-30 10:39 | 显示全部楼层
yuzhiyuan 发表于 2023-5-29 23:53
有个op旁路由,是不是这个堵塞了

这个N1堵塞也只会堵塞和N1连接的接口,你可以先断开N1看看还会不会堵塞。不会那就是N1的问题,还有你的ESXi不是内部也有一个交换机吗,这个交换机是不是新建的端口组出现了你配置错误导致在内部出现了环路。当然你要解决也可以直接关闭交换机上面的stp协议,看看lan接口里面 18.0系列是在接口就有开启生成树 20.0系列在设备这个选项卡里面的br-lan网桥设备里面有个生成树的开关。
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-30 13:38 | 显示全部楼层
EXIA文 发表于 2023-5-30 10:39
这个N1堵塞也只会堵塞和N1连接的接口,你可以先断开N1看看还会不会堵塞。不会那就是N1的问题,还有你的ES ...

交换机的stp默认就是关闭的
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-30 13:38 | 显示全部楼层
EXIA文 发表于 2023-5-30 10:39
这个N1堵塞也只会堵塞和N1连接的接口,你可以先断开N1看看还会不会堵塞。不会那就是N1的问题,还有你的ES ...



本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

×
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-30 13:47 | 显示全部楼层
EXIA文 发表于 2023-5-30 10:39
这个N1堵塞也只会堵塞和N1连接的接口,你可以先断开N1看看还会不会堵塞。不会那就是N1的问题,还有你的ES ...

esxi就两个单网口网卡,一个做了lan口,一个直通给op做了wan口,我今天把旁路由断电了,因为我看他总是发送查询几个端口的命令。之前我主路由开UU加速器,直接把交换机干崩溃了,连WiFi都失联。
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-30 14:10 | 显示全部楼层
EXIA文 发表于 2023-5-30 10:39
这个N1堵塞也只会堵塞和N1连接的接口,你可以先断开N1看看还会不会堵塞。不会那就是N1的问题,还有你的ES ...



本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

×
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-30 16:53 | 显示全部楼层
EXIA文 发表于 2023-5-30 10:39
这个N1堵塞也只会堵塞和N1连接的接口,你可以先断开N1看看还会不会堵塞。不会那就是N1的问题,还有你的ES ...

有没有可能是8111E网卡性能太低,完成了拥堵,我开uu加速器也死机崩溃,vlan交换机直接挂了

点评

你不是在主路由上面开UU的吗,要死也是主路由先挂的。而且你的硬路由重启日志也会没有的。你可以把vlan交换机里面的cpu这一项的关联改成关,数据就不上到CPU上面了可以试试看。如果还不行那就是op版本的问题了。  详情 回复 发表于 2023-5-30 17:07
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2023-5-30 17:07 | 显示全部楼层
yuzhiyuan 发表于 2023-5-30 16:53
有没有可能是8111E网卡性能太低,完成了拥堵,我开uu加速器也死机崩溃,vlan交换机直接挂了
...

你不是在主路由上面开UU的吗,要死也是主路由先挂的。而且你的硬路由重启日志也会没有的。你可以把vlan交换机里面的cpu这一项的关联改成关,数据就不上到CPU上面了可以试试看。如果还不行那就是op版本的问题了。

点评

刚刚改了关闭,WiFi没网速能进后台,有线有网进不去后台,主路由开了加速器没崩,电脑ping不通主路由和esxi,ping通交换机但是延迟大丢包严重。 开启UU的主路由日志::Tue May 30 18:02:42 2023 daemon.notice ttyd  详情 回复 发表于 2023-5-30 18:29
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-30 18:29 | 显示全部楼层
EXIA文 发表于 2023-5-30 17:07
你不是在主路由上面开UU的吗,要死也是主路由先挂的。而且你的硬路由重启日志也会没有的。你可以把vlan交 ...

刚刚改了关闭,WiFi没网速能进后台,有线有网进不去后台,主路由开了加速器没崩,电脑ping不通主路由和esxi,ping通交换机但是延迟大丢包严重。
开启UU的主路由日志::Tue May 30 18:02:42 2023 daemon.notice ttyd[23525]: [2023/05/30 18:02:42:3063] N: rops_handle_POLLIN_netlink: DELADDR
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Joining mDNS multicast group on interface tun163.IPv4 with address 172.19.163.1.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: New relevant interface tun163.IPv4 for mDNS.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Registering new address record for 172.19.163.1 on tun163.IPv4.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Joining mDNS multicast group on interface tun163.IPv6 with address fe80::1a6e:6fb4:b2f9:7123.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: New relevant interface tun163.IPv6 for mDNS.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Registering new address record for fe80::1a6e:6fb4:b2f9:7123 on tun163.*.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Withdrawing address record for 172.19.163.1 on tun163.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Leaving mDNS multicast group on interface tun163.IPv4 with address 172.19.163.1.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Interface tun163.IPv4 no longer relevant for mDNS.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Joining mDNS multicast group on interface tun163.IPv4 with address 172.19.163.1.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: New relevant interface tun163.IPv4 for mDNS.
Tue May 30 18:02:42 2023 daemon.info avahi-daemon[4093]: Registering new address record for 172.19.163.1 on tun163.IPv4.
Tue May 30 18:02:42 2023 daemon.info netdata[16700]: Initializing file /var/cache/netdata/net.tun163/main.db.
Tue May 30 18:02:42 2023 daemon.info netdata[16700]: Initializing file /var/cache/netdata/net.tun163/received.db.
Tue May 30 18:02:42 2023 daemon.info netdata[16700]: Initializing file /var/cache/netdata/net.tun163/sent.db.
Tue May 30 18:02:42 2023 daemon.info netdata[16700]: Initializing file /var/cache/netdata/net_operstate.tun163/main.db.
Tue May 30 18:02:42 2023 daemon.info netdata[16700]: Initializing file /var/cache/netdata/net_operstate.tun163/state.db.
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-6-1 06:39 | 显示全部楼层
顶一下
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2023-6-1 07:12 | 显示全部楼层
状态转换是有线连接的正常操作,不是故障。
倒是你日志里的其他错误太多了,特别是IGMPPROXY和SAMBA
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

欢迎大家光临恩山无线论坛上一条 /1 下一条

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-10-3 05:33

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com

快速回复 返回顶部 返回列表