We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
正常使用
UBUNTU使用v2rayN开始tun模式后系统CPU资源占满且无网络连接
ubuntu2404 开启tun模式
Unix 6.8.0.51 - 64 启动服务(2024/12/20 13:37:53)... Xray 24.11.5 (Xray, Penetrates Everything.) afc7ec5 (go1.23.2 linux/amd64) A unified platform for anti-censorship. 2024/12/20 13:37:53 [Info] infra/conf/serial: Reading config: &{Name:config.json Format:json} 2024/12/20 13:37:54 [Warning] core: Xray 24.11.5 started 2024/12/20 13:37:55 [Warning] [3999166800] app/proxyman/inbound: connection ends > proxy/http: failed to read http request > malformed HTTP request "\x00" 2024/12/20 13:37:55 from tcp:127.0.0.1:48576 accepted tcp:www.google.com:443 [socks -> proxy] 2024/12/20 13:37:56 [Warning] [2801939689] app/proxyman/inbound: connection ends > proxy/http: failed to read http request > malformed HTTP request "\x00" 2024/12/20 13:37:56 from tcp:127.0.0.1:48594 accepted tcp:api.ip.sb:443 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48600 accepted tcp:91.189.91.98:80 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48616 accepted tcp:91.189.91.98:80 [socks -> proxy] 2024/12/20 13:37:57 from udp:127.0.0.1:44497 accepted udp:8.8.8.8:53 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48628 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48644 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48660 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48672 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48664 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48678 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48690 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48700 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48710 accepted tcp:47.239.113.252:22791 [socks -> proxy] 2024/12/20 13:37:57 from tcp:127.0.0.1:48726 accepted tcp:47.239.113.252:22791 [socks -> proxy]
No response
The text was updated successfully, but these errors were encountered:
我怀疑应该是路由环回了,但是不知道如何解决这个问题。
Sorry, something went wrong.
Tun和系统环境有太多关联了,所以只能自己找找问题。 有其他用户反馈,比如开了wifi热点会有问题,或者域名解析有问题等等吧
#4539 看下这,不过这里大部分是Windows的反馈
也遇到了,因为需要开全局代理,目前的解决方法是开启TUN 清除系统代理,路由全局模式,coretype选择的sing-box,可能跟coretype有关
No branches or pull requests
预期情况
正常使用
实际情况
UBUNTU使用v2rayN开始tun模式后系统CPU资源占满且无网络连接
复现方法
ubuntu2404 开启tun模式
日志信息
Unix 6.8.0.51 - 64
启动服务(2024/12/20 13:37:53)...
Xray 24.11.5 (Xray, Penetrates Everything.) afc7ec5 (go1.23.2 linux/amd64)
A unified platform for anti-censorship.
2024/12/20 13:37:53 [Info] infra/conf/serial: Reading config: &{Name:config.json Format:json}
2024/12/20 13:37:54 [Warning] core: Xray 24.11.5 started
2024/12/20 13:37:55 [Warning] [3999166800] app/proxyman/inbound: connection ends > proxy/http: failed to read http request > malformed HTTP request "\x00"
2024/12/20 13:37:55 from tcp:127.0.0.1:48576 accepted tcp:www.google.com:443 [socks -> proxy]
2024/12/20 13:37:56 [Warning] [2801939689] app/proxyman/inbound: connection ends > proxy/http: failed to read http request > malformed HTTP request "\x00"
2024/12/20 13:37:56 from tcp:127.0.0.1:48594 accepted tcp:api.ip.sb:443 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48600 accepted tcp:91.189.91.98:80 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48616 accepted tcp:91.189.91.98:80 [socks -> proxy]
2024/12/20 13:37:57 from udp:127.0.0.1:44497 accepted udp:8.8.8.8:53 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48628 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48644 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48660 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48672 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48664 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48678 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48690 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48700 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48710 accepted tcp:47.239.113.252:22791 [socks -> proxy]
2024/12/20 13:37:57 from tcp:127.0.0.1:48726 accepted tcp:47.239.113.252:22791 [socks -> proxy]
额外信息
No response
我确认已更新至最新版本
我确认已查询历史issues
The text was updated successfully, but these errors were encountered: