|
打游戏时突然掉线,变红灯过几分钟后重启路由器光猫后恢复,想知道是什么原因附日志
Jan 2 00:56:33 rc_service: ntp 2112:notify_rc restart_diskmon
Jan 2 00:56:33 disk_monitor: Finish
Jan 2 00:56:33 disk monitor: be idle
Jan 2 00:56:34 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Jan 2 00:56:34 ddns update: ez-ipupdate: starting...
Jan 2 00:56:34 ddns update: asus_private() interface =ppp0
Jan 2 00:56:34 ddns update: g_asus_ddns_mode == 2
Jan 2 00:56:35 kernel: CPU: 0 PID: 2255 Comm: uuplugin Tainted: P O 4.1.52 #6
Jan 2 00:56:35 kernel: Hardware name: Generic DT based system
Jan 2 00:56:35 kernel: task: d2b2f000 ti: d1c90000 task.ti: d1c90000
Jan 2 00:56:35 kernel: PC is at 0xb6ed6200
Jan 2 00:56:35 kernel: LR is at 0x116028
Jan 2 00:56:35 kernel: pc : [<b6ed6200>] lr : [<00116028>] psr: 600b0010
Jan 2 00:56:35 kernel: sp : beb11a38 ip : 002292e0 fp : beb11ad8
Jan 2 00:56:35 kernel: r10: 01be6e70 r9 : 0032d450 r8 : beb122a8
Jan 2 00:56:35 kernel: r7 : beb122ac r6 : beb122a0 r5 : beb11a64 r4 : 0032d454
Jan 2 00:56:35 kernel: r3 : 00000000 r2 : beb122a0 r1 : 0032d450 r0 : 0032d454
Jan 2 00:56:35 kernel: Flags: nZCv IRQs on FIQs on Mode USER_32 ISA ARM Segment user
Jan 2 00:56:35 kernel: Control: 10c5387d Table: 12bd004a DAC: 00000015
Jan 2 00:56:35 kernel: CPU: 0 PID: 2255 Comm: uuplugin Tainted: P O 4.1.52 #6
Jan 2 00:56:35 kernel: Hardware name: Generic DT based system
Jan 2 00:56:35 kernel: [<c0026e60>] (unwind_backtrace) from [<c0022c38>] (show_stack+0x10/0x14)
Jan 2 00:56:35 kernel: [<c0022c38>] (show_stack) from [<c0445b64>] (dump_stack+0x8c/0xa0)
Jan 2 00:56:35 kernel: [<c0445b64>] (dump_stack) from [<c003aab8>] (get_signal+0x490/0x558)
Jan 2 00:56:35 kernel: [<c003aab8>] (get_signal) from [<c00221d0>] (do_signal+0xc8/0x3ac)
Jan 2 00:56:35 kernel: [<c00221d0>] (do_signal) from [<c0022658>] (do_work_pending+0x94/0xa4)
Jan 2 00:56:35 kernel: [<c0022658>] (do_work_pending) from [<c001f4cc>] (work_pending+0xc/0x20)
Jan 2 00:56:35 kernel: sched: RT throttling activated
Jan 2 00:56:35 ddns update: connected to nwsrv-ns1.asus.com (52.250.42.40) on port 443.
Jan 2 00:56:36 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Fri, 01 Jan 2021 16:56:35 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Jan 2 00:56:36 ddns update: retval= 0, ddns_return_code (,200)
Jan 2 00:56:36 ddns update: asusddns_update: 0
Jan 2 00:56:36 ddns: ddns update ok
Jan 2 00:56:37 ddns update: exit_main
Jan 2 00:56:41 kernel: SHN Release Version: 2.0.1 4b635f32
Jan 2 00:56:41 kernel: UDB Core Version: 0.2.18
Jan 2 00:56:41 kernel: sizeof forward pkt param = 192
Jan 2 00:56:41 kernel: The For ALL DEVICES flag of Prof 2 has been set to ENABLE
Jan 2 00:56:41 BWDPI: fun bitmap = 53f
Jan 2 00:56:41 kernel: The For ALL DEVICES flag of Prof 1 has been set to ENABLE
Jan 2 00:56:44 nat: apply nat rules (/tmp/nat_rules_ppp0_eth4)
Jan 2 00:56:44 kernel: Archer TCP Pure ACK Enabled
Jan 2 00:56:48 dnsmasq[1413]: nameserver 202.96.134.133 refused to do a recursive query
Jan 2 00:56:52 wlceventd: wlceventd_proc_event(499): eth5: Auth D6:BD:BC:24:52:2D, status: Successful (0)
Jan 2 00:56:52 wlceventd: wlceventd_proc_event(527): eth5: Assoc D6:BD:BC:24:52:2D, status: Successful (0)
Jan 2 00:57:06 crond[1421]: time disparity of 1400391 minutes detected
Jan 2 00:57:17 hour monitor: ntp sync fail, will retry after 120 sec
Jan 2 00:58:17 WATCHDOG: [FAUPGRADE][auto_firmware_check 6307)]periodic_check AM 2:19
Jan 2 00:58:21 wlceventd: wlceventd_proc_event(499): eth5: Auth 82:96:C7:65:6D:C5, status: Successful (0)
Jan 2 00:58:21 wlceventd: wlceventd_proc_event(527): eth5: Assoc 82:96:C7:65:6D:C5, status: Successful (0)
Jan 2 00:58:24 WATCHDOG: [FAUPGRADE][auto_firmware_check 6337)]retrieve firmware information
Jan 2 00:58:24 WATCHDOG: [FAUPGRADE][auto_firmware_check 6340)]user in use
Jan 2 00:58:38 wlceventd: wlceventd_proc_event(499): eth5: Auth D4:61 A:35:14:B7, status: Successful (0)
Jan 2 00:58:38 wlceventd: wlceventd_proc_event(527): eth5: Assoc D4:61 A:35:14:B7, status: Successful (0)
Jan 2 00:58:53 WATCHDOG: [FAUPGRADE][auto_firmware_check 6337)]retrieve firmware information
Jan 2 00:58:53 WATCHDOG: [FAUPGRADE][auto_firmware_check 6340)]user in use
Jan 2 00:59:23 WATCHDOG: [FAUPGRADE][auto_firmware_check 6337)]retrieve firmware information
Jan 2 00:59:23 WATCHDOG: [FAUPGRADE][auto_firmware_check 6340)]user in use
求大神看看是什么原因
|
|