|
本帖最后由 yuzhiyuan 于 2023-5-29 22:10 编辑
不知道哪里出现了问题,然后搞了一些系统日志,X86主路径由内部日志有lan1进入阻塞模式,进入转发状态,然后杂刊模型,再限制制带10S,什么情况?这只网络拓扑图
这是op交换机的系统日志
Mon May 29 18:10:55 2023 kern.notice kernel: [ 111.871786] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.debug kernel: [ 111.884723] entrytb_aid_aquire(): found non-occupied aid:8, allocated from:2
Mon May 29 18:10:55 2023 kern.warn kernel: [ 111.891784] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [ 111.901368] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - 58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.err kernel: [ 111.910563] 7981@C08L1,APBuildAssociation() 693: invalid status code(53) !!!
Mon May 29 18:10:55 2023 kern.notice kernel: [ 111.917670] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=53)...
Mon May 29 18:10:55 2023 kern.notice kernel: [ 111.962702] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=3, Status=0 from [wcid=7]58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.067505] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#2, Alg=3, Status=0 from [wcid=7]58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.080278] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - 58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.089568] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.098749] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.104840] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.227284] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.238880] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.245938] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:10:55 2023 kern.notice kernel: [ 112.252604] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:10:55 2023 kern.warn kernel: [ 112.264146] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA3PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=7 from 58:85:a2:00:df:77
Mon May 29 18:10:55 2023 kern.warn kernel: [ 112.264146]
Mon May 29 18:16:26 2023 kern.notice kernel: [ 443.406071] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=3, Status=0 from [wcid=1023]ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.notice kernel: [ 443.509947] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#2, Alg=3, Status=0 from [wcid=1023]ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.debug kernel: [ 443.522922] entrytb_aid_aquire(): found non-occupied aid:9, allocated from:2
Mon May 29 18:16:26 2023 kern.warn kernel: [ 443.529985] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.notice kernel: [ 443.537119] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - ee:4b:77:72:a2:57
Mon May 29 18:16:26 2023 kern.notice kernel: [ 443.546398] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:16:26 2023 kern.notice kernel: [ 443.555497] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:16:26 2023 kern.notice kernel: [ 443.561525] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:16:27 2023 kern.err kernel: [ 443.582360] 7981@C15L1,store_pmkid_cache_in_sec_config() 3327: pStaCfg is null
Mon May 29 18:16:27 2023 kern.notice kernel: [ 443.691273] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:16:27 2023 kern.notice kernel: [ 443.697944] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:16:27 2023 kern.notice kernel: [ 443.705023] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:16:27 2023 kern.notice kernel: [ 443.711724] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:16:27 2023 kern.warn kernel: [ 443.723291] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA3PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=8 from ee:4b:77:72:a2:57
Mon May 29 18:16:27 2023 kern.warn kernel: [ 443.723291]
Mon May 29 18:19:45 2023 kern.err kernel: [ 641.926764] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=0
Mon May 29 18:19:46 2023 kern.err kernel: [ 642.970742] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(0), del PMKID CacheIdx=1
Mon May 29 18:19:46 2023 kern.notice kernel: [ 643.545989] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]94:58:cb:72:d0:58
Mon May 29 18:19:46 2023 kern.debug kernel: [ 643.558910] entrytb_aid_aquire(): found non-occupied aid:10, allocated from:2
Mon May 29 18:19:46 2023 kern.warn kernel: [ 643.566063] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:94:58:cb:72:d0:58
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.574062] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - 94:58:cb:72:d0:58
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.583411] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.592549] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.598655] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.723251] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.729874] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.736713] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:19:47 2023 kern.notice kernel: [ 643.743339] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:19:47 2023 kern.warn kernel: [ 643.755011] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=9 from 94:58:cb:72:d0:58
Mon May 29 18:19:47 2023 kern.warn kernel: [ 643.755011]
Mon May 29 18:19:49 2023 kern.err kernel: [ 646.094772] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=2
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.602470] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.debug kernel: [ 648.615389] entrytb_aid_aquire(): found non-occupied aid:11, allocated from:2
Mon May 29 18:19:52 2023 kern.warn kernel: [ 648.622539] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.631154] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.640444] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.649547] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.655574] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.779275] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.786002] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.793125] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:19:52 2023 kern.notice kernel: [ 648.799881] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:19:52 2023 kern.warn kernel: [ 648.811745] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=10 from b0:41:1d:f2:54:7f
Mon May 29 18:19:52 2023 kern.warn kernel: [ 648.811745]
Mon May 29 18:19:59 2023 kern.warn kernel: [ 655.582517] 7981@C08L2,ap_peer_disassoc_action() 3479: ASSOC - 1 receive DIS-ASSOC request
Mon May 29 18:19:59 2023 kern.warn kernel: [ 655.590854] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=1
Mon May 29 18:19:59 2023 kern.notice kernel: [ 655.598062] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=1
Mon May 29 18:19:59 2023 kern.warn kernel: [ 655.605120] 7981@C13L2,MacTableDeleteEntry() 1793: Del Sta:94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.notice kernel: [ 676.435853] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.debug kernel: [ 676.448770] entrytb_aid_aquire(): found non-occupied aid:10, allocated from:2
Mon May 29 18:20:19 2023 kern.warn kernel: [ 676.455918] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.notice kernel: [ 676.463985] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - 94:58:cb:72:d0:58
Mon May 29 18:20:19 2023 kern.notice kernel: [ 676.473259] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
Mon May 29 18:20:19 2023 kern.notice kernel: [ 676.482394] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Mon May 29 18:20:19 2023 kern.notice kernel: [ 676.488414] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Mon May 29 18:20:20 2023 kern.notice kernel: [ 676.611264] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
Mon May 29 18:20:20 2023 kern.notice kernel: [ 676.617899] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
Mon May 29 18:20:20 2023 kern.notice kernel: [ 676.624745] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
Mon May 29 18:20:20 2023 kern.notice kernel: [ 676.631391] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
Mon May 29 18:20:20 2023 kern.warn kernel: [ 676.642914] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=9 from 94:58:cb:72:d0:58
Mon May 29 18:20:20 2023 kern.warn kernel: [ 676.642914]
Mon May 29 18:20:56 2023 kern.err kernel: [ 712.666740] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=3
Mon May 29 18:26:27 2023 kern.err kernel: [ 1044.458794] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=4
这是交换机的内核日志:
[ 646.094772] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=2
[ 648.602470] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]b0:41:1d:f2:54:7f
[ 648.615389] entrytb_aid_aquire(): found non-occupied aid:11, allocated from:2
[ 648.622539] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:b0:41:1d:f2:54:7f
[ 648.631154] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - b0:41:1d:f2:54:7f
[ 648.640444] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
[ 648.649547] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
[ 648.655574] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
[ 648.779275] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
[ 648.786002] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
[ 648.793125] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
[ 648.799881] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
[ 648.811745] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=10 from b0:41:1d:f2:54:7f
[ 648.811745]
[ 655.582517] 7981@C08L2,ap_peer_disassoc_action() 3479: ASSOC - 1 receive DIS-ASSOC request
[ 655.590854] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=1
[ 655.598062] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=1
[ 655.605120] 7981@C13L2,MacTableDeleteEntry() 1793: Del Sta:94:58:cb:72:d0:58
[ 676.435853] 7981@C08L3,ap_peer_auth_req_at_idle_action() 717: AUTH - MBSS(1), Rcv AUTH seq#1, Alg=0, Status=0 from [wcid=1023]94:58:cb:72:d0:58
[ 676.448770] entrytb_aid_aquire(): found non-occupied aid:10, allocated from:2
[ 676.455918] 7981@C13L2,MacTableInsertEntry() 1537: New Sta:94:58:cb:72:d0:58
[ 676.463985] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1647: Recv Assoc from STA - 94:58:cb:72:d0:58
[ 676.473259] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2170: ASSOC Send ASSOC response (Status=0)...
[ 676.482394] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
[ 676.488414] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
[ 676.611264] 7981@C15L3,WPABuildPairMsg1() 5278: <=== send Msg1 of 4-way
[ 676.617899] 7981@C15L3,PeerPairMsg2Action() 6197: ===>Receive msg 2
[ 676.624745] 7981@C15L3,WPABuildPairMsg3() 5555: <=== send Msg3 of 4-way
[ 676.631391] 7981@C15L3,PeerPairMsg4Action() 6627: ===>Receive msg 4
[ 676.642914] 7981@C15L2,PeerPairMsg4Action() 6989: AP SETKEYS DONE(rai0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=9 from 94:58:cb:72:d0:58
[ 676.642914]
[ 712.666740] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=3
[ 1044.458794] WiFi@C15L1,RTMPDeletePMKIDCache() 1246: IF(1), del PMKID CacheIdx=4
这是主系统日志:
Mon May 29 18:17:43 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:20:19 2023 daemon.err nmbd[9978]: [2023/05/29 18:20:19.346380, 0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:20:19 2023 daemon.err nmbd[9978]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:20:19 2023 daemon.err nmbd[9978]: This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:22:38 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:25:19 2023 daemon.err nmbd[9978]: [2023/05/29 18:25:19.878883, 0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:25:19 2023 daemon.err nmbd[9978]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:25:19 2023 daemon.err nmbd[9978]: This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:27:46 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:30:22 2023 daemon.err nmbd[9978]: [2023/05/29 18:30:22.965440, 0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:30:22 2023 daemon.err nmbd[9978]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:30:22 2023 daemon.err nmbd[9978]: This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:32:46 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:35:28 2023 daemon.err nmbd[9978]: [2023/05/29 18:35:28.765545, 0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:35:28 2023 daemon.err nmbd[9978]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:35:28 2023 daemon.err nmbd[9978]: This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:37:53 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:40:31 2023 daemon.err nmbd[9978]: [2023/05/29 18:40:31.067753, 0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:40:31 2023 daemon.err nmbd[9978]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:40:31 2023 daemon.err nmbd[9978]: This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:42:58 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:45:32 2023 daemon.err nmbd[9978]: [2023/05/29 18:45:32.988158, 0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:45:32 2023 daemon.err nmbd[9978]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:45:32 2023 daemon.err nmbd[9978]: This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
Mon May 29 18:47:41 2023 user.warn igmpproxy[16403]: MRT_DEL_MFC; Errno(2): No such file or directory
Mon May 29 18:50:35 2023 daemon.err nmbd[9978]: [2023/05/29 18:50:35.746398, 0] ../../source3/nmbd/nmbd_namequery.c:109(query_name_response)
Mon May 29 18:50:35 2023 daemon.err nmbd[9978]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.1.1 for name WORKGROUP<1d>.
Mon May 29 18:50:35 2023 daemon.err nmbd[9978]: This response was from IP 192.168.1.2, reporting an IP address of 192.168.1.2.
这是主路由内核日志:
[ 19.386179] eth1: 0xffffc90000039000, 94:c6:91:36:e2:61, IRQ 26
[ 19.438111] e1000: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None
[ 19.439094] br-lan: port 1(eth0) entered blocking state
[ 19.439243] br-lan: port 1(eth0) entered forwarding state
[ 19.439426] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[ 23.576740] r8168: eth1: link up
[ 23.577127] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 23.837063] pppoe-wan: renamed from ppp0
[ 25.490640] init oaf sysctl...ok
[ 27.127113] br-lan: port 1(eth0) entered disabled state
[ 27.157178] e1000: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None
[ 27.157931] br-lan: port 1(eth0) entered blocking state
[ 27.158078] br-lan: port 1(eth0) entered forwarding state
[ 27.288862] device br-lan entered promiscuous mode
[ 31.741085] overlayfs: filesystem on '/opt/docker/check-overlayfs-support1460502460/upper' not supported as upperdir
[ 31.751443] overlayfs: filesystem on '/opt/docker/check-overlayfs-support558070916/upper' not supported as upperdir
[ 32.332338] traps: check[15134] general protection fault ip:8049007 sp:fff58f10 error:402 in check[8049000+1000]
[ 44.132223] squashfs: Unknown parameter 'discard'
[ 44.132626] F2FS-fs (sda128): Magic Mismatch, valid(0xf2f52010) - read(0x89e45589)
[ 44.133038] F2FS-fs (sda128): Can't find valid F2FS filesystem in 1th superblock
[ 44.133437] F2FS-fs (sda128): Magic Mismatch, valid(0xf2f52010) - read(0x2e48937b)
[ 44.133652] F2FS-fs (sda128): Can't find valid F2FS filesystem in 2th superblock
[ 44.134590] exFAT-fs (sda128): mounting with "discard" option, but the device does not support discard
[ 44.135016] exFAT-fs (sda128): invalid boot record signature
[ 44.135178] exFAT-fs (sda128): failed to read boot sector
[ 44.135335] exFAT-fs (sda128): failed to recognize exfat type
[ 44.135918] fuseblk: Unknown parameter 'discard'
[ 46.087999] NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory
[ 46.088243] NFSD: Using legacy client tracking operations.
[ 46.088401] NFSD: starting 10-second grace period (net f0000000)
[ 67.188605] process '/usr/bin/zerotier-one' started with executable stack
[ 5601.927103] TCP: request_sock_TCP: Possible SYN flooding on port 5000. Sending cookies. Check SNMP counters.
[ 9449.264838] sh (24873): drop_caches: 3
请不要胡乱输入以及粘贴、复制等方式灌水
请尊重作者、并共同维护网站的正常阅读,否则账户将会被限制发帖、回帖,并且积分可能会被清零,站内短信以及阅读权限等都会受到影响,谢谢。
具体限制方式:https://www.right.com.cn/forum/thread-8307840-1-1.html
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?立即注册
×
|