Hi, does anyone know why my raspberry pi 4's WAN port always lost connection after period of time? Restart the WAN port will help but it will happen again after period of time. I'm using USB3 to ethernet for the WAN port and the default ethernet port for LAN.
Here is the log when it lost connection. Thank you.
Tue May 31 23:15:07 2022 kern.warn kernel: [206007.491439] ------------[ cut here ]------------
Tue May 31 23:15:07 2022 kern.info kernel: [206007.496203] NETDEV WATCHDOG: eth1 (ax88179_178a): transmit queue 0 timed out
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.503420] WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:473 0xffffffc010623980
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.511253] Modules linked in: pppoe ppp_async iptable_nat brcmfmac xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack ipt_REJECT cfg80211 ax88179_178a xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG usbnet usbhid slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables hid_generic crc_ccitt compat brcmutil snd_bcm2835(C) hid evdev nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 snd_rawmidi snd_seq_device snd_pcm_oss snd_pcm_dmaengine snd_pcm snd_timer snd_mixer_oss snd_hwdep snd_compress snd soundcore nls_utf8 vfat fat nls_iso8859_1 nls_cp437 uhci_hcd ohci_platform ohci_hcd
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.582409] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G C 5.4.188 #0
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.589889] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.595807] pstate: 60400005 (nZCv daif +PAN -UAO)
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.600680] pc : 0xffffffc010623980
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.604250] lr : 0xffffffc010623980
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.607819] sp : ffffffc010003da0
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.611214] x29: ffffffc010003da0 x28: 0000000000000140
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.616610] x27: 00000000ffffffff x26: 0000000000000000
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.622006] x25: 0000000000000000 x24: 0000000000000000
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.627401] x23: 0000000000000001 x22: ffffff807c557000
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.632796] x21: ffffff807c557480 x20: ffffffc010926000
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.638191] x19: 0000000000000000 x18: 0000000000000000
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.643585] x17: 0000000000000000 x16: 0000000000000000
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.648979] x15: 0000000000000000 x14: 07740775076f0720
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.654374] x13: 07640765076d0769 x12: 0774072007300720
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.659768] x11: 0765077507650775 x10: 0771072007740769
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.665163] x9 : 076d0773076e0761 x8 : 077207740720073a
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.670557] x7 : 0729076107380737 x6 : 0000000000000001
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.675951] x5 : ffffffc0103a8f78 x4 : 0000000000000001
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.681345] x3 : ffffffc010928e64 x2 : 0000000000000004
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.686740] x1 : 0000000000000004 x0 : 0000000000000040
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.692135] Call trace:
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.694663] 0xffffffc010623980
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.697884] 0xffffffc0101150e8
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.701106] 0xffffffc010115908
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.704327] 0xffffffc0100813f4
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.707548] 0xffffffc0100a92fc
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.710769] 0xffffffc0100fad9c
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.713990] 0xffffffc0100810e4
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.717211] 0xffffffc010082e30
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.720432] 0xffffffc010087e00
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.723653] 0xffffffc0100d6c54
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.726875] 0xffffffc0100d6e4c
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.730096] 0xffffffc010760498
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.733318] 0xffffffc0108a0874
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.736539] 0xffffffc0108a0c80
Tue May 31 23:15:08 2022 kern.warn kernel: [206007.739760] ---[ end trace f8aae5ce8015a21f ]---
Just an extra problem that annoys me is the possible DNS-rebind attack detected. Is it possible that the log stops recording it without disabling the Rebind protection? Thank you.
Tue May 31 23:30:50 2022 daemon.warn dnsmasq[2244]: possible DNS-rebind attack detected: apd-pcdnwxlogin.teg.tencent-cloud.net
Tue May 31 23:30:50 2022 daemon.warn dnsmasq[2244]: possible DNS-rebind attack detected: apd-pcdnwxlogin.teg.tencent-cloud.net
Tue May 31 23:30:50 2022 daemon.warn dnsmasq[2244]: possible DNS-rebind attack detected: apd-pcdnwxlogin.teg.tencent-cloud.net
Tue May 31 23:30:50 2022 daemon.warn dnsmasq[2244]: possible DNS-rebind attack detected: apd-pcdnwxlogin.teg.tencent-cloud.net
Tue May 31 23:30:50 2022 daemon.warn dnsmasq[26626]: possible DNS-rebind attack detected: apd-pcdnwxlogin.teg.tencent-cloud.net
Tue May 31 23:30:50 2022 daemon.warn dnsmasq[2244]: possible DNS-rebind attack detected: apd-pcdnwxlogin.teg.tencent-cloud.net
Tue May 31 23:30:50 2022 daemon.warn dnsmasq[2244]: possible DNS-rebind attack detected: apd-pcdnwxlogin.teg.tencent-cloud.net