AP1300-Outdoor | R39 | B06688FF007C | 1.15.31-20230506-101251 1.15.31-20230506-101251 1.15.31-20230506-101251 Sat May 6 19:05:58 2023 kern.notice kernel: [ 0.000000] Linux version 4.4.140 (jenkins@release) (gcc version 5.4.0 (LEDE GCC 5.4.0 1.15.5) ) #0 SMP Sat May 6 02:05:08 2023 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] SoC Type: MediaTek MT7621 ver:1 eco:3 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] bootconsole [early0] enabled Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] CPU0 revision is: 0001992f (MIPS 1004Kc) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] MIPS: machine is R39 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Determined physical RAM map: Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] memory: 08000000 @ 00000000 (usable) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Initrd not found or empty - disabling initrd Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Zone ranges: Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Normal [mem 0x0000000000000000-0x0000000007ffffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Movable zone start for each node Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Early memory node ranges Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] node 0: [mem 0x0000000000000000-0x0000000007ffffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff] Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768 Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.000000] free_area_init_node: node 0, pgdat 8079b300, node_mem_map 81000000 Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.000000] Normal zone: 256 pages used for memmap Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] VPE topology {2,2} total 4 Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.000000] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.000000] MIPS secondary cache 256kB, 8-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] PERCPU: Embedded 10 pages/cpu @8110e000 s8576 r8192 d24192 u40960 Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.000000] pcpu-alloc: s8576 r8192 d24192 u40960 alloc=10*4096 Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512 Sat May 6 19:05:58 2023 kern.notice kernel: [ 0.000000] Kernel command line: console=ttyS0,115200 rootfstype=squashfs,jffs2 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Writing ErrCtl register=00043004 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Readback ErrCtl register=00043004 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Memory: 120684K/131072K available (6246K kernel code, 813K rwdata, 1468K rodata, 228K init, 238K bss, 10388K reserved, 0K cma-reserved) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] Hierarchical RCU implementation. Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] NR_IRQS:256 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] clocksource: GIC: mask: 0xffffffffffffffff max_cycles: 0xcaf478abb4, max_idle_ns: 440795247997 ns Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 4343773742 ns Sat May 6 19:05:58 2023 kern.info kernel: [ 0.000009] sched_clock: 32 bits at 440MHz, resolution 2ns, wraps every 4880645118ns Sat May 6 19:05:58 2023 kern.info kernel: [ 0.007773] Calibrating delay loop... 586.13 BogoMIPS (lpj=2930688) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.070402] pid_max: default: 32768 minimum: 301 Sat May 6 19:05:58 2023 kern.info kernel: [ 0.075101] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.081625] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes) Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.092333] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.092343] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.092353] MIPS secondary cache 256kB, 8-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.info kernel: [ 0.092489] CPU1 revision is: 0001992f (MIPS 1004Kc) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.167525] Synchronize counters for CPU 1: done. Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.182992] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.182999] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.183005] MIPS secondary cache 256kB, 8-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.info kernel: [ 0.183075] CPU2 revision is: 0001992f (MIPS 1004Kc) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.257852] Synchronize counters for CPU 2: done. Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.263909] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.263915] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.263922] MIPS secondary cache 256kB, 8-way, linesize 32 bytes. Sat May 6 19:05:58 2023 kern.info kernel: [ 0.264000] CPU3 revision is: 0001992f (MIPS 1004Kc) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.343023] Synchronize counters for CPU 3: done. Sat May 6 19:05:58 2023 kern.info kernel: [ 0.347748] Brought up 4 CPUs Sat May 6 19:05:58 2023 kern.info kernel: [ 0.354607] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns Sat May 6 19:05:58 2023 kern.info kernel: [ 0.364402] futex hash table entries: 1024 (order: 3, 32768 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 0.370729] pinctrl core: initialized pinctrl subsystem Sat May 6 19:05:58 2023 kern.info kernel: [ 0.376485] NET: Registered protocol family 16 Sat May 6 19:05:58 2023 kern.debug kernel: [ 0.385796] FPU Affinity set after 11720 emulations Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.386074] pull PCIe RST: RALINK_RSTCTRL = 0 Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.690665] release PCIe RST: RALINK_RSTCTRL = 7000000 Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.695695] ***** Xtal 40MHz ***** Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.699083] release PCIe RST: RALINK_RSTCTRL = 7000000 Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.704162] Port 0 N_FTS = 1b102800 Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.707618] Port 1 N_FTS = 1b102800 Sat May 6 19:05:58 2023 kern.warn kernel: [ 0.711090] Port 2 N_FTS = 1b102800 Sat May 6 19:05:58 2023 kern.warn kernel: [ 1.865743] PCIE2 no card, disable it(RST&CLK) Sat May 6 19:05:58 2023 kern.warn kernel: [ 1.870085] -> 21007f2 Sat May 6 19:05:58 2023 kern.warn kernel: [ 1.872519] PCIE0 enabled Sat May 6 19:05:58 2023 kern.warn kernel: [ 1.875093] PCIE1 enabled Sat May 6 19:05:58 2023 kern.info kernel: [ 1.877689] PCI host bridge /pcie@1e140000 ranges: Sat May 6 19:05:58 2023 kern.info kernel: [ 1.882454] MEM 0x0000000060000000..0x000000006fffffff Sat May 6 19:05:58 2023 kern.info kernel: [ 1.887646] IO 0x000000001e160000..0x000000001e16ffff Sat May 6 19:05:58 2023 kern.warn kernel: [ 1.892811] PCI coherence region base: 0x60000000, mask/settings: 0xf0000002 Sat May 6 19:05:58 2023 kern.info kernel: [ 1.906259] mt7621_gpio 1e000600.gpio: registering 32 gpios Sat May 6 19:05:58 2023 kern.info kernel: [ 1.911874] mt7621_gpio 1e000600.gpio: registering 32 gpios Sat May 6 19:05:58 2023 kern.info kernel: [ 1.917424] mt7621_gpio 1e000600.gpio: registering 32 gpios Sat May 6 19:05:58 2023 kern.info kernel: [ 1.923885] usbcore: registered new interface driver usbfs Sat May 6 19:05:58 2023 kern.info kernel: [ 1.929375] usbcore: registered new interface driver hub Sat May 6 19:05:58 2023 kern.info kernel: [ 1.934768] usbcore: registered new device driver usb Sat May 6 19:05:58 2023 kern.info kernel: [ 1.940328] PCI host bridge to bus 0000:00 Sat May 6 19:05:58 2023 kern.info kernel: [ 1.944348] pci_bus 0000:00: root bus resource [mem 0x60000000-0x6fffffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 1.951190] pci_bus 0000:00: root bus resource [io 0xffffffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 1.957036] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0] Sat May 6 19:05:58 2023 kern.info kernel: [ 1.963802] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.971682] pci 0000:00:00.0: [0e8d:0801] type 01 class 0x060400 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.971723] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x7fffffff] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.971738] pci 0000:00:00.0: reg 0x14: [mem 0x00000000-0x0000ffff] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.971793] pci 0000:00:00.0: supports D1 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.971806] pci 0000:00:00.0: PME# supported from D0 D1 D3hot Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.972046] pci 0000:00:01.0: [0e8d:0801] type 01 class 0x060400 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.972077] pci 0000:00:01.0: reg 0x10: [mem 0x00000000-0x7fffffff] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.972093] pci 0000:00:01.0: reg 0x14: [mem 0x00000000-0x0000ffff] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.972133] pci 0000:00:01.0: supports D1 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.972145] pci 0000:00:01.0: PME# supported from D0 D1 D3hot Sat May 6 19:05:58 2023 kern.info kernel: [ 1.972355] pci 0000:00:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring Sat May 6 19:05:58 2023 kern.info kernel: [ 1.980278] pci 0000:00:01.0: bridge configuration invalid ([bus 00-00]), reconfiguring Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.988380] pci 0000:01:00.0: [14c3:7603] type 00 class 0x028000 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.988435] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x000fffff] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.988544] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.988728] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.988901] pci 0000:02:00.0: [14c3:7663] type 00 class 0x000280 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.988966] pci 0000:02:00.0: reg 0x10: [mem 0x00000000-0x000fffff 64bit pref] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.988993] pci 0000:02:00.0: reg 0x18: [mem 0x00000000-0x00003fff 64bit pref] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.989019] pci 0000:02:00.0: reg 0x20: [mem 0x00000000-0x00000fff 64bit pref] Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.989100] pci 0000:02:00.0: supports D1 D2 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.989112] pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.989301] pci_bus 0000:02: busn_res: [bus 02-ff] end is updated to 02 Sat May 6 19:05:58 2023 kern.debug kernel: [ 1.989324] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 02 Sat May 6 19:05:58 2023 kern.info kernel: [ 1.989394] pci 0000:00:00.0: BAR 0: no space for [mem size 0x80000000] Sat May 6 19:05:58 2023 kern.info kernel: [ 1.995928] pci 0000:00:00.0: BAR 0: failed to assign [mem size 0x80000000] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.002821] pci 0000:00:01.0: BAR 0: no space for [mem size 0x80000000] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.009395] pci 0000:00:01.0: BAR 0: failed to assign [mem size 0x80000000] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.016299] pci 0000:00:00.0: BAR 8: assigned [mem 0x60000000-0x600fffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.023054] pci 0000:00:01.0: BAR 9: assigned [mem 0x60100000-0x602fffff pref] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.030213] pci 0000:00:00.0: BAR 1: assigned [mem 0x60300000-0x6030ffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.036965] pci 0000:00:01.0: BAR 1: assigned [mem 0x60310000-0x6031ffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.043695] pci 0000:01:00.0: BAR 0: assigned [mem 0x60000000-0x600fffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.050442] pci 0000:00:00.0: PCI bridge to [bus 01] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.055344] pci 0000:00:00.0: bridge window [mem 0x60000000-0x600fffff] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.062113] pci 0000:02:00.0: BAR 0: assigned [mem 0x60100000-0x601fffff 64bit pref] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.069783] pci 0000:02:00.0: BAR 2: assigned [mem 0x60200000-0x60203fff 64bit pref] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.077496] pci 0000:02:00.0: BAR 4: assigned [mem 0x60204000-0x60204fff 64bit pref] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.085167] pci 0000:00:01.0: PCI bridge to [bus 02] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.090096] pci 0000:00:01.0: bridge window [mem 0x60100000-0x602fffff pref] Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.097262] BAR0 at slot 0 = 0 Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.100294] bus=0x0, slot = 0x0 Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.103384] BAR0 at slot 1 = 0 Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.106398] bus=0x0, slot = 0x1 Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.109514] bus=0x1, slot = 0x0, irq=0xff Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.113513] bus=0x2, slot = 0x1, irq=0x0 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.118564] clocksource: Switched to clocksource GIC Sat May 6 19:05:58 2023 kern.info kernel: [ 2.124992] NET: Registered protocol family 2 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.130104] TCP established hash table entries: 1024 (order: 0, 4096 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.136980] TCP bind hash table entries: 1024 (order: 1, 8192 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.143307] TCP: Hash tables configured (established 1024 bind 1024) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.149675] UDP hash table entries: 256 (order: 1, 8192 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.155434] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.161916] NET: Registered protocol family 1 Sat May 6 19:05:58 2023 kern.debug kernel: [ 2.166257] PCI: CLS 80 bytes, default 32 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.398493] 4 CPUs re-calibrate udelay(lpj = 2924544) Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.404764] Crashlog allocated RAM at address 0x3f00000 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.416965] squashfs: version 4.0 (2009/01/31) Phillip Lougher Sat May 6 19:05:58 2023 kern.info kernel: [ 2.422833] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc. Sat May 6 19:05:58 2023 kern.info kernel: [ 2.434969] io scheduler noop registered Sat May 6 19:05:58 2023 kern.info kernel: [ 2.438854] io scheduler deadline registered (default) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.444375] Serial: 8250/16550 driver, 3 ports, IRQ sharing disabled Sat May 6 19:05:58 2023 kern.info kernel: [ 2.451907] console [ttyS0] disabled Sat May 6 19:05:58 2023 kern.info kernel: [ 2.455449] 1e000c00.uartlite: ttyS0 at MMIO 0x1e000c00 (irq = 33, base_baud = 3125000) is a 16550A Sat May 6 19:05:58 2023 kern.info kernel: [ 2.464443] console [ttyS0] enabled Sat May 6 19:05:58 2023 kern.info kernel: [ 2.471323] bootconsole [early0] disabled Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.480630] MediaTek Nand driver init, version v2.1 Fix AHB virt2phys error Sat May 6 19:05:58 2023 kern.info kernel: [ 2.487899] spi-mt7621 1e000b00.spi: sys_freq: 50000000 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.494052] m25p80 spi32766.0: using chunked io (size=32) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.499465] m25p80 spi32766.0: XM25QH128C (16384 Kbytes) Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.504841] 7 ofpart partitions found on MTD device spi32766.0 Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.510661] Creating 7 MTD partitions on "spi32766.0": Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.515780] 0x000000000000-0x000000030000 : "u-boot" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.521921] 0x000000030000-0x000000040000 : "u-boot-env" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.528349] 0x000000040000-0x000000050000 : "factory" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.534657] 0x000000fd0000-0x000000fe0000 : "debug" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.540675] 0x000000fe0000-0x000000ff0000 : "backup" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.546619] 0x000000ff0000-0x000001000000 : "bdinfo" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.552638] 0x000000050000-0x000000fd0000 : "firmware" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.582428] 2 uimage-fw partitions found on MTD device firmware Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.588343] 0x000000050000-0x000000334bf3 : "kernel" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.594389] 0x000000334bf3-0x000000fd0000 : "rootfs" Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.600432] mtd: device 8 (rootfs) set to be root filesystem Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.606133] 1 squashfs-split partitions found on MTD device rootfs Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.612338] 0x000000aa0000-0x000000fd0000 : "rootfs_data" Sat May 6 19:05:58 2023 kern.info kernel: [ 2.619279] libphy: Fixed MDIO Bus: probed Sat May 6 19:05:58 2023 kern.info kernel: [ 2.658800] libphy: mdio: probed Sat May 6 19:05:58 2023 kern.info kernel: [ 2.662946] mtk_soc_eth 1e100000.ethernet: connected mac 0 to PHY at fixed-0:00 [uid=00000000, driver=Generic PHY] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.674036] mtk_soc_eth 1e100000.ethernet eth0: mediatek frame engine at 0xbe100000, irq 10 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.682979] mtk_soc_eth 1e100000.ethernet: connected mac 1 to PHY at fixed-0:01 [uid=00000000, driver=Generic PHY] Sat May 6 19:05:58 2023 kern.info kernel: [ 2.693995] mtk_soc_eth 1e100000.ethernet eth1: mediatek frame engine at 0xbe100000, irq 10 Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.702674] MT7663E module init Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.731785] MT7613 AP Driver version-6.0.4.0 Sat May 6 19:05:58 2023 kern.warn kernel: [ 2.741188] mt7663e nlwifi attach Sat May 6 19:05:58 2023 kern.info kernel: [ 2.745850] xhci-mtk 1e1c0000.xhci: xHCI Host Controller Sat May 6 19:05:58 2023 kern.info kernel: [ 2.751282] xhci-mtk 1e1c0000.xhci: new USB bus registered, assigned bus number 1 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.768687] xhci-mtk 1e1c0000.xhci: hcc params 0x01401198 hci version 0x96 quirks 0x00210010 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.777141] xhci-mtk 1e1c0000.xhci: irq 29, io mem 0x1e1c0000 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.783792] hub 1-0:1.0: USB hub found Sat May 6 19:05:58 2023 kern.info kernel: [ 2.787606] hub 1-0:1.0: 2 ports detected Sat May 6 19:05:58 2023 kern.info kernel: [ 2.792006] xhci-mtk 1e1c0000.xhci: xHCI Host Controller Sat May 6 19:05:58 2023 kern.info kernel: [ 2.797305] xhci-mtk 1e1c0000.xhci: new USB bus registered, assigned bus number 2 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.804938] usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Sat May 6 19:05:58 2023 kern.info kernel: [ 2.813797] hub 2-0:1.0: USB hub found Sat May 6 19:05:58 2023 kern.info kernel: [ 2.817623] hub 2-0:1.0: 1 port detected Sat May 6 19:05:58 2023 kern.info kernel: [ 2.822581] mt7621_wdt 1e000100.wdt: Initialized Sat May 6 19:05:58 2023 kern.info kernel: [ 2.828405] NET: Registered protocol family 10 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.834339] NET: Registered protocol family 17 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.838915] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this. Sat May 6 19:05:58 2023 kern.notice kernel: [ 2.851526] Bridge firewalling registered Sat May 6 19:05:58 2023 kern.info kernel: [ 2.855524] 8021q: 802.1Q VLAN Support v1.8 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.898675] mt753x gsw: Switch is MediaTek MT7530 rev 1 Sat May 6 19:05:58 2023 kern.info kernel: [ 2.925430] libphy: mt753x_mdio: probed Sat May 6 19:05:58 2023 kern.info kernel: [ 2.935255] hctosys: unable to open rtc device (rtc0) Sat May 6 19:05:58 2023 kern.info kernel: [ 2.946225] VFS: Mounted root (squashfs filesystem) readonly on device 31:8. Sat May 6 19:05:58 2023 kern.info kernel: [ 2.953804] Freeing unused kernel memory: 228K Sat May 6 19:05:58 2023 kern.notice kernel: [ 3.156299] random: nonblocking pool is initialized Sat May 6 19:05:58 2023 user.info kernel: [ 3.961666] init: Console is alive Sat May 6 19:05:58 2023 user.info kernel: [ 3.965243] init: - watchdog - Sat May 6 19:05:58 2023 user.info kernel: [ 5.244378] kmodloader: loading kernel modules from /etc/modules-boot.d/* Sat May 6 19:05:58 2023 user.info kernel: [ 5.339452] kmodloader: done loading kernel modules from /etc/modules-boot.d/* Sat May 6 19:05:58 2023 user.info kernel: [ 5.348840] init: - preinit - Sat May 6 19:05:58 2023 user.warn kernel: [ 5.566371] boot from spi Sat May 6 19:05:58 2023 kern.notice kernel: [ 5.755476] jffs2: notice: (404) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found. Sat May 6 19:05:58 2023 user.info kernel: [ 5.772918] mount_root: switching to jffs2 overlay Sat May 6 19:05:58 2023 user.warn kernel: [ 5.797624] urandom-seed: Seeding with /etc/urandom.seed Sat May 6 19:05:58 2023 user.info kernel: [ 6.633634] procd: - early - Sat May 6 19:05:58 2023 user.info kernel: [ 6.636606] procd: - watchdog - Sat May 6 19:05:58 2023 user.info kernel: [ 7.278677] procd: - watchdog - Sat May 6 19:05:58 2023 user.info kernel: [ 7.282082] procd: - ubus - Sat May 6 19:05:58 2023 user.info kernel: [ 7.493614] procd: - init - Sat May 6 19:05:58 2023 user.info kernel: [ 7.944035] kmodloader: loading kernel modules from /etc/modules.d/* Sat May 6 19:05:58 2023 kern.info kernel: [ 7.970772] Initializing XFRM netlink socket Sat May 6 19:05:58 2023 kern.info kernel: [ 7.976744] NET: Registered protocol family 15 Sat May 6 19:05:58 2023 kern.info kernel: [ 7.982857] tun: Universal TUN/TAP device driver, 1.6 Sat May 6 19:05:58 2023 kern.info kernel: [ 7.987907] tun: (C) 1999-2004 Max Krasnyansky Sat May 6 19:05:58 2023 kern.info kernel: [ 8.018164] l2tp_core: L2TP core driver, V2.0 Sat May 6 19:05:58 2023 kern.info kernel: [ 8.024524] l2tp_netlink: L2TP netlink interface Sat May 6 19:05:58 2023 kern.warn kernel: [ 8.031895] nat46: module (version 362640b41ae52b732d9e9729e61ac555492442a3) loaded. Sat May 6 19:05:58 2023 kern.info kernel: [ 8.045275] gre: GRE over IPv4 demultiplexor driver Sat May 6 19:05:58 2023 kern.info kernel: [ 8.051766] ip_gre: GRE over IPv4 tunneling driver Sat May 6 19:05:58 2023 kern.info kernel: [ 8.100966] ip6_tables: (C) 2000-2006 Netfilter Core Team Sat May 6 19:05:58 2023 kern.info kernel: [ 8.113587] Netfilter messages via NETLINK v0.30. Sat May 6 19:05:58 2023 kern.info kernel: [ 8.120632] ip_set: protocol 6 Sat May 6 19:05:58 2023 kern.info kernel: [ 8.163054] u32 classifier Sat May 6 19:05:58 2023 kern.info kernel: [ 8.165782] input device check on Sat May 6 19:05:58 2023 kern.info kernel: [ 8.169551] Actions configured Sat May 6 19:05:58 2023 kern.info kernel: [ 8.175046] Mirror/redirect action on Sat May 6 19:05:58 2023 kern.info kernel: [ 8.189286] nf_conntrack version 0.5.0 (1889 buckets, 7556 max) Sat May 6 19:05:58 2023 kern.warn kernel: [ 8.565017] MT7603E module init Sat May 6 19:05:58 2023 kern.warn kernel: [ 8.577211] MT7603E AP Driver version-4.0.1.0rev2.P1 Sat May 6 19:05:58 2023 kern.warn kernel: [ 10.911690] mt7603e nlwifi attach Sat May 6 19:05:58 2023 kern.info kernel: [ 10.923272] ip_tables: (C) 2000-2006 Netfilter Core Team Sat May 6 19:05:58 2023 kern.info kernel: [ 11.016577] ctnetlink v0.93: registering with nfnetlink. Sat May 6 19:05:58 2023 kern.warn kernel: [ 11.025195] nf_conntrack_rtsp v0.7 loading Sat May 6 19:05:58 2023 kern.warn kernel: [ 11.142357] nf_nat_rtsp v0.7 loading Sat May 6 19:05:58 2023 kern.info kernel: [ 11.157343] wireguard: WireGuard 1.0.20210219 loaded. See www.wireguard.com for information. Sat May 6 19:05:58 2023 kern.info kernel: [ 11.165791] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sat May 6 19:05:58 2023 kern.info kernel: [ 11.197549] xt_time: kernel timezone is -0000 Sat May 6 19:05:58 2023 kern.info kernel: [ 11.216617] PPP generic driver version 2.4.2 Sat May 6 19:05:58 2023 kern.info kernel: [ 11.222119] PPP MPPE Compression module registered Sat May 6 19:05:58 2023 kern.info kernel: [ 11.227965] NET: Registered protocol family 24 Sat May 6 19:05:58 2023 kern.info kernel: [ 11.233569] PPTP driver version 0.8.5 Sat May 6 19:05:58 2023 kern.info kernel: [ 11.240999] l2tp_ppp: PPPoL2TP kernel driver, V2.0 Sat May 6 19:05:58 2023 user.info kernel: [ 11.248236] kmodloader: done loading kernel modules from /etc/modules.d/* Sat May 6 19:05:58 2023 kern.warn kernel: [ 16.344112] hc_radio_res_request(): wdev=3, hobj is not ready! Sat May 6 19:05:58 2023 kern.warn kernel: [ 16.350022] hc_radio_res_request(): wdev=3, hobj is not ready! Sat May 6 19:05:58 2023 kern.warn kernel: [ 18.328793] HcGetEdca(): wdev=0, hobj is not ready! Sat May 6 19:05:59 2023 daemon.warn wireless[1021]: MSG_INFO: softapd start Sat May 6 19:05:59 2023 daemon.info hyfibr: hyfibr start Sat May 6 19:06:01 2023 user.notice : Added device handler type: 8021ad Sat May 6 19:06:01 2023 user.notice : Added device handler type: 8021q Sat May 6 19:06:01 2023 user.notice : Added device handler type: macvlan Sat May 6 19:06:01 2023 user.notice : Added device handler type: bridge Sat May 6 19:06:01 2023 user.notice : Added device handler type: Network device Sat May 6 19:06:01 2023 user.notice : Added device handler type: tunnel Sat May 6 19:06:01 2023 user.notice wireless: procd[1]-->network[1096]-->wifi reload_legacy Sat May 6 19:06:01 2023 daemon.notice procd: /etc/init.d/network: wireless: procd[1]-->network[1096]-->wifi reload_legacy Sat May 6 19:06:01 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_wds down Sat May 6 19:06:01 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_wds down Sat May 6 19:06:01 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_notify ifname: wlan00, command: device, argu: up Sat May 6 19:06:01 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: device, argu: up Sat May 6 19:06:03 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_up ra0 Sat May 6 19:06:03 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: iface, argu: up Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: up interface ra0 Sat May 6 19:06:04 2023 kern.info kernel: [ 23.877411] device eth0 entered promiscuous mode Sat May 6 19:06:04 2023 kern.info kernel: [ 23.888352] br-lan: port 1(eth0) entered forwarding state Sat May 6 19:06:04 2023 kern.info kernel: [ 23.893889] br-lan: port 1(eth0) entered forwarding state Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'lan' is enabled Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'lan' is setting up now Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'lan' is now up Sat May 6 19:06:04 2023 kern.info kernel: [ 23.922701] device eth1 entered promiscuous mode Sat May 6 19:06:04 2023 kern.info kernel: [ 23.934986] br-wan: port 1(eth1) entered forwarding state Sat May 6 19:06:04 2023 kern.info kernel: [ 23.940538] br-wan: port 1(eth1) entered forwarding state Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'wan' is enabled Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'loopback' is enabled Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'loopback' is setting up now Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'loopback' is now up Sat May 6 19:06:04 2023 daemon.notice netifd: bridge 'br-lan' link is up Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'lan' has link connectivity Sat May 6 19:06:04 2023 daemon.notice netifd: Network device 'eth0' link is up Sat May 6 19:06:04 2023 daemon.notice netifd: bridge 'br-wan' link is up Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'wan' has link connectivity Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'wan' is setting up now Sat May 6 19:06:04 2023 daemon.notice netifd: Network device 'eth1' link is up Sat May 6 19:06:04 2023 daemon.notice netifd: Network device 'lo' link is up Sat May 6 19:06:04 2023 daemon.notice netifd: Interface 'loopback' has link connectivity Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: wpa_init_auth: ra0 init wpa success, ssid: Cudy-Outdoor Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: hidden, argu: (null) Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: isolate, argu: (null) Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: lowrssi, argu: (null) Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: maxsta, argu: 64 Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: ra0: update GTK Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: neighbor add bss ra0:Cudy-Outdoor (B0:66:88:FF:00:7C) Sat May 6 19:06:04 2023 daemon.notice netifd: wan (1346): udhcpc: started, v1.25.1 Sat May 6 19:06:04 2023 user.notice wireless: iface { "iface": "wlan00", "action": "up" } Sat May 6 19:06:04 2023 daemon.info hyfibr: ubus init br-wan as relovr APS Sat May 6 19:06:04 2023 user.notice wireless: iface { "iface": "eth1", "action": "join" } Sat May 6 19:06:04 2023 daemon.notice netifd: wan (1346): udhcpc: sending discover Sat May 6 19:06:04 2023 daemon.notice netifd: Network device 'ra0' link is up Sat May 6 19:06:04 2023 user.notice wan-detect: all ports linkdown Sat May 6 19:06:04 2023 kern.info kernel: [ 24.499806] device ra0 entered promiscuous mode Sat May 6 19:06:04 2023 kern.info kernel: [ 24.504525] br-lan: port 2(ra0) entered forwarding state Sat May 6 19:06:04 2023 kern.info kernel: [ 24.509952] br-lan: port 2(ra0) entered forwarding state Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_up ra2 Sat May 6 19:06:04 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra2, command: iface, argu: up Sat May 6 19:06:04 2023 daemon.err insmod: module is already loaded - xt_multiport Sat May 6 19:06:04 2023 daemon.err insmod: module is already loaded - xt_connmark Sat May 6 19:06:04 2023 daemon.err insmod: module is already loaded - xt_comment Sat May 6 19:06:04 2023 daemon.err insmod: module is already loaded - xt_length Sat May 6 19:06:05 2023 daemon.err insmod: module is already loaded - xt_multiport Sat May 6 19:06:05 2023 daemon.err insmod: module is already loaded - xt_connmark Sat May 6 19:06:05 2023 daemon.err insmod: module is already loaded - xt_comment Sat May 6 19:06:05 2023 daemon.err insmod: module is already loaded - xt_length Sat May 6 19:06:06 2023 kern.info kernel: [ 25.888532] br-lan: port 1(eth0) entered forwarding state Sat May 6 19:06:06 2023 kern.info kernel: [ 25.938572] br-wan: port 1(eth1) entered forwarding state Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: up interface ra2 Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: wpa_init_auth: ra2 init wpa success, ssid: a0fcc076246f1970a613f0e48eefb560 Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra2, command: hidden, argu: 1 Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra2, command: isolate, argu: (null) Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra2, command: lowrssi, argu: (null) Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra2, command: maxsta, argu: (null) Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: ra2: update GTK Sat May 6 19:06:06 2023 daemon.warn wireless[1021]: MSG_INFO: neighbor add bss ra2:a0fcc076246f1970a613f0e48eefb560 (B2:66:88:EF:00:7C) Sat May 6 19:06:06 2023 user.notice wireless: iface { "iface": "wlan03", "action": "up" } Sat May 6 19:06:06 2023 kern.info kernel: [ 26.508640] br-lan: port 2(ra0) entered forwarding state Sat May 6 19:06:06 2023 daemon.notice netifd: Network device 'ra2' link is up Sat May 6 19:06:06 2023 kern.info kernel: [ 26.832523] device ra2 entered promiscuous mode Sat May 6 19:06:06 2023 kern.info kernel: [ 26.837284] br-lan: port 3(ra2) entered forwarding state Sat May 6 19:06:06 2023 kern.info kernel: [ 26.842880] br-lan: port 3(ra2) entered forwarding state Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_wds up Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_notify ifname: wlan00, command: channel, argu: 0 Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: channel, argu: 0 Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_notify ifname: wlan10, command: device, argu: up Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: device, argu: up Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_up rai0 Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: iface, argu: up Sat May 6 19:06:07 2023 daemon.warn wireless[1021]: MSG_INFO: up interface rai0 Sat May 6 19:06:07 2023 kern.warn kernel: [ 27.021855] [RcGetHdevByPhyMode]-- channel 0 fix for rdev fetching Sat May 6 19:06:07 2023 user.info : htpdate version 1.1.1 started Sat May 6 19:06:07 2023 daemon.notice netifd: wan (1346): udhcpc: sending discover Sat May 6 19:06:08 2023 daemon.notice cmagent: cmagent start Sat May 6 19:06:08 2023 daemon.notice cmagent: mqtt id C748501E16|000000000000 Sat May 6 19:06:08 2023 kern.info kernel: [ 28.838540] br-lan: port 3(ra2) entered forwarding state Sat May 6 19:06:09 2023 kern.warn kernel: [ 28.988554] ==================================================================== Sat May 6 19:06:09 2023 kern.warn kernel: [ 28.995943] Channel 36 : Busy Time = 17454, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.003386] Channel 40 : Busy Time = 14598, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.010785] Channel 44 : Busy Time = 12977, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.018152] Channel 48 : Busy Time = 9085, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.025556] Channel 149 : Busy Time = 3670, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.032956] Channel 153 : Busy Time = 3990, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.040351] Channel 157 : Busy Time = 5203, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.047717] Channel 161 : Busy Time = 6792, Skip Channel = FALSE, BwCap = TRUE Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.055102] ==================================================================== Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.062515] Rule 3 Channel Busy time value : Select Primary Channel 149 Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.069208] Rule 3 Channel Busy time value : Min Channel Busy = 6792 Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.075534] Rule 3 Channel Busy time value : BW = 80 Sat May 6 19:06:09 2023 kern.warn kernel: [ 29.080514] ApAutoChannelAtBootUp : Auto channel selection: Selected channel = 149, IsAband = 1 Sat May 6 19:06:09 2023 daemon.notice cmagent: connect to mqtt server ok Sat May 6 19:06:09 2023 daemon.notice cmagent: subscribed (mid: 1): 1 Sat May 6 19:06:09 2023 daemon.info dnsmasq[1953]: started, version 2.78 cachesize 150 Sat May 6 19:06:09 2023 daemon.info dnsmasq[1953]: DNS service limited to local subnets Sat May 6 19:06:09 2023 daemon.info dnsmasq[1953]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP conntrack ipset no-auth no-DNSSEC no-ID loop-detect inotify Sat May 6 19:06:09 2023 daemon.info dnsmasq-dhcp[1953]: DHCP, IP range 192.168.10.10 -- 192.168.10.250, lease time 2m Sat May 6 19:06:09 2023 daemon.info dnsmasq[1953]: using local addresses only for domain lan Sat May 6 19:06:09 2023 daemon.warn dnsmasq[1953]: no servers found in /tmp/resolv.conf.auto, will retry Sat May 6 19:06:09 2023 daemon.info dnsmasq[1953]: read /etc/hosts - 4 addresses Sat May 6 19:06:09 2023 daemon.info dnsmasq[1953]: read /tmp/hosts/dhcp.cfg02411c - 0 addresses Sat May 6 19:06:09 2023 daemon.info dnsmasq-dhcp[1953]: read /etc/ethers - 0 addresses Sat May 6 19:06:09 2023 daemon.notice cmagent: subscribed (mid: 2): 1 Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: wpa_init_auth: rai0 init wpa success, ssid: Cudy-Outdoor-5G Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: hidden, argu: (null) Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: isolate, argu: (null) Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: lowrssi, argu: (null) Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: maxsta, argu: 64 Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: rai0: update GTK Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: neighbor add bss rai0:Cudy-Outdoor-5G (B0:66:88:FF:00:7E) Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_event_cb wds up/down for none as bcast Sat May 6 19:06:09 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 change channel to 149 Sat May 6 19:06:09 2023 user.notice wireless: iface { "iface": "wlan10", "action": "up" } Sat May 6 19:06:10 2023 daemon.notice netifd: Network device 'rai0' link is up Sat May 6 19:06:10 2023 kern.info kernel: [ 29.869377] device rai0 entered promiscuous mode Sat May 6 19:06:10 2023 kern.info kernel: [ 29.874218] br-lan: port 4(rai0) entered forwarding state Sat May 6 19:06:10 2023 kern.info kernel: [ 29.879804] br-lan: port 4(rai0) entered forwarding state Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_up rai2 Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai2, command: iface, argu: up Sat May 6 19:06:10 2023 kern.warn kernel: [ 29.993279] hc_radio_res_request(): wdev=2, hobj is not ready! Sat May 6 19:06:10 2023 kern.warn kernel: [ 29.999222] hc_radio_res_request(): wdev=2, hobj is not ready! Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: up interface rai2 Sat May 6 19:06:10 2023 daemon.info cmagent[2005]: connection: 000000000000 connected Sat May 6 19:06:10 2023 daemon.notice procd: /etc/rc.d/S90zerotier: disabled in config Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: wpa_init_auth: rai2 init wpa success, ssid: a0fcc076246f1970a613f0e48eefb560 Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai2, command: hidden, argu: 1 Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai2, command: isolate, argu: (null) Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai2, command: lowrssi, argu: (null) Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai2, command: maxsta, argu: (null) Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: rai2: update GTK Sat May 6 19:06:10 2023 daemon.warn wireless[1021]: MSG_INFO: neighbor add bss rai2:a0fcc076246f1970a613f0e48eefb560 (B2:66:88:EF:00:7E) Sat May 6 19:06:10 2023 user.notice wireless: iface { "iface": "wlan13", "action": "up" } Sat May 6 19:06:10 2023 daemon.notice netifd: wan (1346): udhcpc: sending discover Sat May 6 19:06:10 2023 daemon.info cmagent[2005]: connection: 000000000000 connected Sat May 6 19:06:10 2023 daemon.info pingcheck[2226]: Configured interface 'wan' interval 10 timeout 60 host @dns+private ICMP (80) Sat May 6 19:06:10 2023 daemon.info pingcheck[2226]: Configured interface 'wan6' interval 10 timeout 60 host @dns6 NSLOOKUP (80) Sat May 6 19:06:10 2023 daemon.info pingcheck[2226]: Configured interface 'wisp' interval 10 timeout 60 host @dns ICMP (80) Sat May 6 19:06:10 2023 daemon.info pingcheck[2226]: Interface 'wan' not up Sat May 6 19:06:10 2023 daemon.info pingcheck[2226]: Interface 'wan6' not found or error Sat May 6 19:06:10 2023 daemon.info pingcheck[2226]: Interface 'wisp' not found or error Sat May 6 19:06:11 2023 daemon.notice netifd: Network device 'rai2' link is up Sat May 6 19:06:11 2023 kern.info kernel: [ 30.852692] device rai2 entered promiscuous mode Sat May 6 19:06:11 2023 kern.info kernel: [ 30.857525] br-lan: port 5(rai2) entered forwarding state Sat May 6 19:06:11 2023 kern.info kernel: [ 30.863082] br-lan: port 5(rai2) entered forwarding state Sat May 6 19:06:11 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_wds up Sat May 6 19:06:11 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_notify ifname: wlan10, command: htbw, argu: auto Sat May 6 19:06:11 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: htbw, argu: auto Sat May 6 19:06:11 2023 kern.warn kernel: [ 30.949870] set_thermal_protection_admin_ctrl_duty_proc: ucBand:0, u4Lv0Duty:100, u4Lv1Duty:60, u4Lv2Duty:30, u4Lv3Duty:15 Sat May 6 19:06:11 2023 kern.warn kernel: [ 30.969904] set_thermal_protection_criteria_proc: fgHighEn: 1, fgLowEn: 1, fgRFOffEn: 0, cHighTempTh: 122, cLowTempTh: 112, cRFOffTh: 125 Sat May 6 19:06:11 2023 kern.warn kernel: [ 30.982600] set_thermal_protection_criteria_proc: u4RechkTimer: 10, ucType: Duty Cycle Sat May 6 19:06:11 2023 kern.warn kernel: [ 30.990713] MtCmdThermalProtect: ucBand:0, HighEn:1, HighTempTh:122, LowEn:1, LowTempTh:112, RechkTimer:10 Sat May 6 19:06:11 2023 kern.warn kernel: [ 31.000453] MtCmdThermalProtect: RFOffEn: 0, RFOffTh: 125, ucType: 1 Sat May 6 19:06:11 2023 kern.info kernel: [ 31.533603] S95done (2411): drop_caches: 3 Sat May 6 19:06:12 2023 kern.info kernel: [ 31.878644] br-lan: port 4(rai0) entered forwarding state Sat May 6 19:06:12 2023 daemon.info cmagent[2005]: clients: 000000000000 connected Sat May 6 19:06:12 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN Sat May 6 19:06:12 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led wifi5g Sat May 6 19:06:12 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led wifi Sat May 6 19:06:12 2023 user.notice ddns-scripts[2409]: myddns: PID '2409' started at 2023-05-06 19:06 Sat May 6 19:06:12 2023 user.notice automesh: init Sat May 6 19:06:13 2023 kern.info kernel: [ 32.858591] br-lan: port 5(rai2) entered forwarding state Sat May 6 19:06:13 2023 user.warn ddns-scripts[2409]: myddns: Service section disabled! - TERMINATE Sat May 6 19:06:13 2023 user.warn ddns-scripts[2409]: myddns: PID '2409' exit WITH ERROR '1' at 2023-05-06 19:06 Sat May 6 19:06:13 2023 daemon.warn wireless[1021]: MSG_INFO: ra0 change channel to 5 Sat May 6 19:06:13 2023 daemon.notice procd: /etc/rc.d/S99smp: run smp.sh.... Sat May 6 19:06:13 2023 daemon.info procd: - init complete - Sat May 6 19:06:17 2023 daemon.warn wireless[1021]: MSG_INFO: ra0 do auto htbw for apcnt 42, dirtyness 390 Sat May 6 19:06:21 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 do auto htbw for apcnt 47, dirtyness 0 Sat May 6 19:07:10 2023 user.notice automesh: start Sat May 6 19:07:10 2023 user.notice automesh: init smtap and exit Sat May 6 19:07:10 2023 user.notice automesh: exit Sat May 6 19:07:33 2023 kern.info kernel: [ 113.199964] mt753x gsw: Port 4 Link is Up - 1Gbps/Full Sat May 6 19:07:33 2023 kern.notice kernel: [ 113.205219] gmac: port4 linkup Sat May 6 19:07:34 2023 daemon.warn dnsmasq-dhcp[1953]: DHCP packet received on br-wan which has no address Sat May 6 19:07:35 2023 user.notice wan-detect: re wandetect for port4 linkup Sat May 6 19:07:36 2023 kern.info kernel: [ 116.812711] device eth1 left promiscuous mode Sat May 6 19:07:36 2023 kern.info kernel: [ 116.817155] br-wan: port 1(eth1) entered disabled state Sat May 6 19:07:36 2023 kern.info kernel: [ 116.824845] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready Sat May 6 19:07:36 2023 daemon.notice netifd: bridge 'br-wan' link is down Sat May 6 19:07:36 2023 daemon.notice netifd: Interface 'wan' has link connectivity loss Sat May 6 19:07:37 2023 daemon.notice netifd: Network device 'eth1' link is up Sat May 6 19:07:37 2023 kern.info kernel: [ 116.863188] device eth1 entered promiscuous mode Sat May 6 19:07:37 2023 kern.info kernel: [ 116.868030] br-lan: port 6(eth1) entered forwarding state Sat May 6 19:07:37 2023 kern.info kernel: [ 116.873596] br-lan: port 6(eth1) entered forwarding state Sat May 6 19:07:37 2023 user.notice wan-detect: detect ports 4| Sat May 6 19:07:37 2023 kern.warn kernel: [ 116.902905] wan-detect: macaddr b0:66:88:ff:00:7c, proto dhcp Sat May 6 19:07:37 2023 daemon.notice netifd: wan (1346): udhcpc: received SIGTERM Sat May 6 19:07:37 2023 daemon.notice netifd: wan (1346): udhcpc: entering released state Sat May 6 19:07:37 2023 daemon.notice netifd: Interface 'wan' is now down Sat May 6 19:07:37 2023 kern.err kernel: [ 117.040418] hyfi_bridge_dev_event:197:Interface br-wan is down, ptr = 84830000 Sat May 6 19:07:37 2023 daemon.notice netifd: Interface 'wan' is disabled Sat May 6 19:07:39 2023 kern.info kernel: [ 118.868551] br-lan: port 6(eth1) entered forwarding state Sat May 6 19:07:42 2023 daemon.info dnsmasq-dhcp[1953]: DHCPDISCOVER(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:07:42 2023 daemon.info dnsmasq-dhcp[1953]: DHCPOFFER(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:07:42 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:07:42 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Sat May 6 19:08:43 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:08:43 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Sat May 6 19:09:39 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:09:39 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Sat May 6 19:10:33 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:10:33 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Sat May 6 19:11:26 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:11:26 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Sat May 6 19:12:18 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:12:18 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Sat May 6 19:13:15 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Sat May 6 19:13:15 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Mon May 8 09:02:10 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Mon May 8 09:02:10 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Mon May 8 09:02:44 2023 daemon.warn wireless[1021]: MSG_INFO: smt_ap_start ssid=a0fcc076246f1970a613f0e48eefb560, psk=7e790192e8ddfd34553988268b9bb4ed, macaddr=00:00:00:00:00:00 Mon May 8 09:02:44 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra2, command: scan, argu: (null) Mon May 8 09:02:44 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_wscon ra0 Mon May 8 09:02:44 2023 daemon.warn wireless[1021]: MSG_INFO: ra0:wsc start Mon May 8 09:02:44 2023 user.notice wireless: smt { "iface": "wlan03", "content": "{ \"status\": \"start\" }" } Mon May 8 09:02:45 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: wsc, argu: start Mon May 8 09:02:45 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_wscon rai0 Mon May 8 09:02:45 2023 daemon.warn wireless[1021]: MSG_INFO: rai0:wsc start Mon May 8 09:02:45 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: wsc, argu: start Mon May 8 09:02:45 2023 user.notice wireless: wsc { "iface": "wlan00", "status": "start" } Mon May 8 09:02:45 2023 user.notice wireless: wsc { "iface": "wlan10", "status": "start" } Mon May 8 09:03:05 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.214 74:86:e2:10:22:61 Mon May 8 09:03:05 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.214 74:86:e2:10:22:61 NICK Mon May 8 09:03:20 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 auth sucess, rssi 52, 38:D5:7A:23:01:07 Mon May 8 09:03:20 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 assoc 38:D5:7A:23:01:07 for psk-mixed Mon May 8 09:03:20 2023 kern.info kernel: [ 581.597303] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead. Mon May 8 09:03:20 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 start wpa 2 for 38:D5:7A:23:01:07 Mon May 8 09:03:20 2023 daemon.warn wireless[1021]: MSG_INFO: sending 1/4 msg of 4-Way Handshake Mon May 8 09:03:20 2023 daemon.warn wireless[1021]: MSG_INFO: receive 2/4 msg of 4-Way Handshake Mon May 8 09:03:20 2023 daemon.warn wireless[1021]: MSG_INFO: sending 3/4 msg of 4-Way Handshake Mon May 8 09:03:20 2023 daemon.warn wireless[1021]: MSG_INFO: receive 4/4 msg of 4-Way Handshake Mon May 8 09:03:20 2023 user.notice wireless: assoc { "iface": "wlan10", "macaddr": "38:D5:7A:23:01:07", "device": "normal" } Mon May 8 09:03:36 2023 daemon.info dnsmasq-dhcp[1953]: DHCPDISCOVER(br-lan) 38:d5:7a:23:01:07 Mon May 8 09:03:36 2023 daemon.info dnsmasq-dhcp[1953]: DHCPOFFER(br-lan) 192.168.10.68 38:d5:7a:23:01:07 Mon May 8 09:03:36 2023 daemon.info dnsmasq-dhcp[1953]: DHCPDISCOVER(br-lan) 38:d5:7a:23:01:07 Mon May 8 09:03:36 2023 daemon.info dnsmasq-dhcp[1953]: DHCPOFFER(br-lan) 192.168.10.68 38:d5:7a:23:01:07 Mon May 8 09:03:36 2023 daemon.info dnsmasq-dhcp[1953]: DHCPREQUEST(br-lan) 192.168.10.68 38:d5:7a:23:01:07 Mon May 8 09:03:36 2023 daemon.info dnsmasq-dhcp[1953]: DHCPACK(br-lan) 192.168.10.68 38:d5:7a:23:01:07 NICK Mon May 8 09:03:44 2023 kern.info kernel: [ 605.465288] mt753x gsw: Port 4 Link is Down Mon May 8 09:03:44 2023 kern.notice kernel: [ 605.469700] gmac: port4 linkdown Mon May 8 09:03:44 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra2, command: scan, argu: (null) Mon May 8 09:04:16 2023 kern.info kernel: [ 636.993976] mt753x gsw: Port 4 Link is Up - 1Gbps/Full Mon May 8 09:04:16 2023 kern.notice kernel: [ 636.999267] gmac: port4 linkup Mon May 8 09:04:21 2023 kern.warn kernel: [ 641.900655] wan-detect: ifname eth0 proto dhcp detect Mon May 8 09:04:21 2023 user.notice wan-detect: detect eth0 port4 as wan port proto dhcp Mon May 8 09:04:21 2023 kern.info kernel: [ 642.058397] device eth1 left promiscuous mode Mon May 8 09:04:21 2023 kern.info kernel: [ 642.063262] br-lan: port 6(eth1) entered disabled state Mon May 8 09:04:21 2023 daemon.notice netifd: Network device 'eth1' link is up Mon May 8 09:04:21 2023 kern.info kernel: [ 642.101501] device eth1 entered promiscuous mode Mon May 8 09:04:21 2023 kern.info kernel: [ 642.109916] br-wan: port 1(eth1) entered forwarding state Mon May 8 09:04:21 2023 kern.info kernel: [ 642.115388] br-wan: port 1(eth1) entered forwarding state Mon May 8 09:04:21 2023 kern.err kernel: [ 642.121302] hyfi_bridge_dev_event:209:Interface br-wan is up, ptr = 866e1000 Mon May 8 09:04:21 2023 daemon.notice netifd: Interface 'wan' is enabled Mon May 8 09:04:21 2023 daemon.warn hyfibr: hyfibr br-wan link up Mon May 8 09:04:21 2023 daemon.notice netifd: bridge 'br-wan' link is up Mon May 8 09:04:21 2023 daemon.notice netifd: Interface 'wan' has link connectivity Mon May 8 09:04:21 2023 daemon.notice netifd: Interface 'wan' is setting up now Mon May 8 09:04:21 2023 daemon.notice netifd: wan (5494): udhcpc: started, v1.25.1 Mon May 8 09:04:21 2023 daemon.crit hyfibr: bridgeDetach br-wan Mon May 8 09:04:23 2023 daemon.notice netifd: wan (5494): udhcpc: sending discover Mon May 8 09:04:23 2023 daemon.info hyfibr: ubus init br-wan as relovr APS Mon May 8 09:04:23 2023 user.notice wireless: iface { "iface": "eth1", "action": "join" } Mon May 8 09:04:23 2023 daemon.notice netifd: wan (5494): udhcpc: sending select for 192.168.0.176 Mon May 8 09:04:23 2023 kern.info kernel: [ 644.108609] br-wan: port 1(eth1) entered forwarding state Mon May 8 09:04:25 2023 daemon.notice netifd: wan (5494): udhcpc: lease of 192.168.0.176 obtained, lease time 43200 Mon May 8 09:04:25 2023 daemon.info pingcheck[2226]: Interface 'wan' event UP Mon May 8 09:04:25 2023 daemon.notice netifd: Interface 'wan' is now up Mon May 8 09:04:25 2023 daemon.info dnsmasq[1953]: reading /tmp/resolv.conf.auto Mon May 8 09:04:25 2023 daemon.info dnsmasq[1953]: using local addresses only for domain lan Mon May 8 09:04:25 2023 daemon.info dnsmasq[1953]: using nameserver 192.168.0.1#53 Mon May 8 09:04:25 2023 daemon.info pingcheck[2226]: Init ICMP ping on 'wan' Mon May 8 09:04:25 2023 daemon.info pingcheck[2226]: Interface 'wan' changed to ONLINE Mon May 8 09:04:25 2023 daemon.info pingcheck[2226]: Interface 'wan' ICMP 192.168.0.1 ONLINE Mon May 8 09:04:25 2023 daemon.notice pingcheck[2226]: Scheduling 'online' scripts for 'wan' Mon May 8 09:04:25 2023 daemon.notice pingcheck[5628]: Running 'online' scripts for 'wan' Mon May 8 09:04:25 2023 user.notice internet: pingcheck online Mon May 8 09:04:25 2023 kern.info kernel: [ 646.574743] device eth0 left promiscuous mode Mon May 8 09:04:25 2023 kern.info kernel: [ 646.579436] br-lan: port 1(eth0) entered disabled state Mon May 8 09:04:25 2023 daemon.notice netifd: Network device 'eth0' link is up Mon May 8 09:04:25 2023 kern.info kernel: [ 646.641342] device eth0 entered promiscuous mode Mon May 8 09:04:25 2023 kern.info kernel: [ 646.646225] br-wan: port 2(eth0) entered forwarding state Mon May 8 09:04:25 2023 kern.info kernel: [ 646.651821] br-wan: port 2(eth0) entered forwarding state Mon May 8 09:04:25 2023 user.notice wireless: iface { "iface": "eth0", "action": "join" } Mon May 8 09:04:26 2023 kern.info kernel: [ 646.749342] device ra0 left promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 646.753825] br-lan: port 2(ra0) entered disabled state Mon May 8 09:04:26 2023 daemon.notice netifd: Network device 'ra0' link is up Mon May 8 09:04:26 2023 kern.info kernel: [ 646.817946] device ra0 entered promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 646.822825] br-wan: port 3(ra0) entered forwarding state Mon May 8 09:04:26 2023 kern.info kernel: [ 646.828318] br-wan: port 3(ra0) entered forwarding state Mon May 8 09:04:26 2023 kern.info kernel: [ 646.859754] device ra2 left promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 646.864366] br-lan: port 3(ra2) entered disabled state Mon May 8 09:04:26 2023 daemon.notice netifd: Network device 'ra2' link is up Mon May 8 09:04:26 2023 user.notice wireless: iface { "iface": "wlan00", "action": "join" } Mon May 8 09:04:26 2023 kern.info kernel: [ 646.916393] device ra2 entered promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 646.921278] br-wan: port 4(ra2) entered forwarding state Mon May 8 09:04:26 2023 kern.info kernel: [ 646.926703] br-wan: port 4(ra2) entered forwarding state Mon May 8 09:04:26 2023 kern.info kernel: [ 646.957943] device rai0 left promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 646.962695] br-lan: port 4(rai0) entered disabled state Mon May 8 09:04:26 2023 daemon.notice netifd: Network device 'rai0' link is up Mon May 8 09:04:26 2023 kern.info kernel: [ 647.007508] device rai0 entered promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 647.012758] br-wan: port 5(rai0) entered forwarding state Mon May 8 09:04:26 2023 kern.info kernel: [ 647.018303] br-wan: port 5(rai0) entered forwarding state Mon May 8 09:04:26 2023 daemon.crit hyfibr: bridgeDetach br-wan Mon May 8 09:04:26 2023 kern.info kernel: [ 647.041215] device rai2 left promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 647.045760] br-lan: port 5(rai2) entered disabled state Mon May 8 09:04:26 2023 daemon.notice netifd: Interface 'lan' is now down Mon May 8 09:04:26 2023 kern.info kernel: [ 647.058391] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready Mon May 8 09:04:26 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_handle_cleanup (null) Mon May 8 09:04:26 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 deauth 38:D5:7A:23:01:07 for cleanup Mon May 8 09:04:26 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: deauth, argu: 38:D5:7A:23:01:07 Mon May 8 09:04:26 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 disassoc: 38:D5:7A:23:01:07, rssi: 49 Mon May 8 09:04:26 2023 daemon.info hyfibr: ubus init br-wan as relovr APS Mon May 8 09:04:26 2023 daemon.info hyfibr: ubus set ra0 relay 3 w2 Mon May 8 09:04:26 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 auth sucess, rssi 51, 38:D5:7A:23:01:07 Mon May 8 09:04:26 2023 user.notice wireless: iface { "iface": "wlan03", "action": "join" } Mon May 8 09:04:26 2023 daemon.notice netifd: Interface 'lan' is disabled Mon May 8 09:04:26 2023 daemon.notice netifd: bridge 'br-lan' link is down Mon May 8 09:04:26 2023 daemon.notice netifd: Interface 'lan' has link connectivity loss Mon May 8 09:04:26 2023 daemon.err odhcpd[1184]: setsockopt(IPV6_ADD_MEMBERSHIP): No such device Mon May 8 09:04:26 2023 daemon.err odhcpd[1184]: setsockopt(SO_BINDTODEVICE): No such device Mon May 8 09:04:26 2023 daemon.notice netifd: Network device 'rai2' link is up Mon May 8 09:04:26 2023 kern.info kernel: [ 647.148219] device rai2 entered promiscuous mode Mon May 8 09:04:26 2023 kern.info kernel: [ 647.153468] br-wan: port 6(rai2) entered forwarding state Mon May 8 09:04:26 2023 kern.info kernel: [ 647.159132] br-wan: port 6(rai2) entered forwarding state Mon May 8 09:04:26 2023 daemon.info hyfibr: ubus set ra2 relay 3 w2 Mon May 8 09:04:26 2023 user.notice wireless: iface { "iface": "wlan10", "action": "join" } Mon May 8 09:04:26 2023 daemon.info hyfibr: ubus set rai0 relay 3 w5 Mon May 8 09:04:26 2023 user.notice wireless: disassoc { "iface": "wlan10", "macaddr": "38:D5:7A:23:01:07" } Mon May 8 09:04:27 2023 user.info : htpdate version 1.1.1 started Mon May 8 09:04:27 2023 user.notice wireless: iface { "iface": "wlan10", "action": "join" } Mon May 8 09:04:27 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 assoc 38:D5:7A:23:01:07 for psk-mixed Mon May 8 09:04:27 2023 daemon.info hyfibr: ubus set rai0 relay 3 w5 Mon May 8 09:04:27 2023 daemon.info dnsmasq[1953]: exiting on receipt of SIGTERM Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: started, version 2.78 cachesize 150 Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: DNS service limited to local subnets Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP conntrack ipset no-auth no-DNSSEC no-ID loop-detect inotify Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: using local addresses only for domain lan Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: reading /tmp/resolv.conf.auto Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: using local addresses only for domain lan Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: using nameserver 192.168.0.1#53 Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: read /etc/hosts - 4 addresses Mon May 8 09:04:27 2023 daemon.info dnsmasq[5940]: read /tmp/hosts/dhcp.cfg02411c - 0 addresses Mon May 8 09:04:27 2023 daemon.warn wireless[1021]: MSG_INFO: rai0 start wpa 2 for 38:D5:7A:23:01:07 Mon May 8 09:04:27 2023 daemon.warn wireless[1021]: MSG_INFO: sending 1/4 msg of 4-Way Handshake Mon May 8 09:04:27 2023 daemon.warn wireless[1021]: MSG_INFO: receive 2/4 msg of 4-Way Handshake Mon May 8 09:04:27 2023 daemon.warn wireless[1021]: MSG_INFO: sending 3/4 msg of 4-Way Handshake Mon May 8 09:04:27 2023 daemon.warn wireless[1021]: MSG_INFO: receive 4/4 msg of 4-Way Handshake Mon May 8 09:04:27 2023 user.notice wireless: iface { "iface": "wlan03", "action": "join" } Mon May 8 09:04:27 2023 daemon.info hyfibr: ubus set ra2 relay 3 w2 Mon May 8 09:04:27 2023 user.notice wireless: iface { "iface": "wlan00", "action": "join" } Mon May 8 09:04:27 2023 kern.info kernel: [ 648.648650] br-wan: port 2(eth0) entered forwarding state Mon May 8 09:04:28 2023 daemon.info hyfibr: ubus set ra0 relay 3 w2 Mon May 8 09:04:28 2023 user.notice wireless: iface { "iface": "eth0", "action": "join" } Mon May 8 09:04:28 2023 kern.info kernel: [ 648.818634] br-wan: port 3(ra0) entered forwarding state Mon May 8 09:04:28 2023 user.notice wireless: iface { "iface": "eth1", "action": "join" } Mon May 8 09:04:28 2023 kern.info kernel: [ 648.918668] br-wan: port 4(ra2) entered forwarding state Mon May 8 09:04:28 2023 kern.info kernel: [ 649.008695] br-wan: port 5(rai0) entered forwarding state Mon May 8 09:04:28 2023 user.notice wireless: iface { "iface": "wlan13", "action": "join" } Mon May 8 09:04:28 2023 daemon.info hyfibr: ubus set rai2 relay 3 w5 Mon May 8 09:04:28 2023 kern.info kernel: [ 649.158652] br-wan: port 6(rai2) entered forwarding state Mon May 8 09:04:28 2023 user.notice wireless: assoc { "iface": "wlan10", "macaddr": "38:D5:7A:23:01:07", "device": "normal" } Mon May 8 09:04:28 2023 user.notice ddns-scripts[6087]: myddns: PID '6087' started at 2023-05-08 09:04 Mon May 8 09:04:28 2023 user.warn ddns-scripts[6087]: myddns: Service section disabled! - TERMINATE Mon May 8 09:04:28 2023 user.warn ddns-scripts[6087]: myddns: PID '6087' exit WITH ERROR '1' at 2023-05-08 09:04 Mon May 8 09:04:31 2023 daemon.warn wireless[1021]: MSG_INFO: ubus_event_cb wds up/down for none as bcast Mon May 8 09:04:33 2023 user.info : Setting 2.000 seconds Mon May 8 09:04:35 2023 user.info : Set: Mon May 8 09:04:35 2023 Mon May 8 09:04:35 2023 user.info : htpdate hotplug call time Mon May 8 09:04:45 2023 daemon.warn wireless[1021]: MSG_WARNING: ra2 stop send for time out! Mon May 8 09:04:45 2023 user.notice wireless: smt { "iface": "wlan03", "content": "{ \"status\": \"timeout\" }" } Mon May 8 09:04:47 2023 daemon.warn wireless[1021]: MSG_INFO: ra0:WSC IDEL Mon May 8 09:04:47 2023 daemon.warn wireless[1021]: MSG_INFO: rai0:WSC IDEL Mon May 8 09:04:48 2023 daemon.warn wireless[1021]: MSG_INFO: ra0:WSC failed, session time out. Mon May 8 09:04:48 2023 daemon.warn wireless[1021]: MSG_INFO: rai0:WSC failed, session time out. Mon May 8 09:04:48 2023 user.notice wireless: wsc { "iface": "wlan00", "status": "timeout" } Mon May 8 09:04:48 2023 user.notice wireless: wsc { "iface": "wlan10", "status": "timeout" } Mon May 8 09:04:53 2023 daemon.warn wireless[1021]: MSG_INFO: ra0:WSC IDEL Mon May 8 09:04:53 2023 daemon.warn wireless[1021]: MSG_INFO: rai0:WSC IDEL Mon May 8 09:04:54 2023 daemon.warn wireless[1021]: MSG_INFO: ra0:wsc stop Mon May 8 09:04:54 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set ra0, command: wsc, argu: stop Mon May 8 09:04:54 2023 daemon.warn wireless[1021]: MSG_INFO: rai0:wsc stop Mon May 8 09:04:54 2023 daemon.warn wireless[1021]: MSG_INFO: nlwifi set rai0, command: wsc, argu: stop Mon May 8 09:04:54 2023 user.notice wireless: wsc { "iface": "wlan00", "status": "stop" } Mon May 8 09:04:54 2023 user.notice wireless: wsc { "iface": "wlan10", "status": "stop" } Mon May 8 09:07:05 2023 user.warn igmpproxy[6016]: MRT_DEL_MFC; Errno(2): No such file or directory Mon May 8 09:07:05 2023 user.warn igmpproxy[6016]: MRT_DEL_MFC; Errno(2): No such file or directory Mon May 8 09:08:01 2023 user.warn igmpproxy[6016]: MRT_DEL_MFC; Errno(2): No such file or directory Mon May 8 09:09:05 2023 user.warn igmpproxy[6016]: MRT_DEL_MFC; Errno(2): No such file or directory Mon May 8 09:09:06 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/vpn/openvpns/status'. Mon May 8 09:09:06 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:09:06 2023 daemon.err uhttpd[1811]: bad argument #1 to 'lines' (/tmp/openvpn-status.log: No such file or directory) Mon May 8 09:09:06 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:09:06 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:09:06 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:09:06 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:09:28 2023 daemon.err uhttpd[1811]: tar: diag: No such file or directory Mon May 8 09:09:28 2023 daemon.err uhttpd[1811]: tar: error exit delayed from previous errors Mon May 8 09:09:31 2023 daemon.err uhttpd[1811]: cat: can't open '/var/run/xl2tpd.pid': No such file or directory Mon May 8 09:09:31 2023 daemon.err uhttpd[1811]: sh: you need to specify whom to kill Mon May 8 09:10:14 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/mesh/client'. Mon May 8 09:10:14 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:14 2023 daemon.err uhttpd[1811]: ?:0: attempt to concatenate a nil value Mon May 8 09:10:14 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:14 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:14 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:14 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:15 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/mesh/upgrade'. Mon May 8 09:10:15 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:15 2023 daemon.err uhttpd[1811]: ?:0: attempt to index a nil value Mon May 8 09:10:15 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:15 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:15 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:15 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:16 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/mesh/devinfo'. Mon May 8 09:10:16 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:16 2023 daemon.err uhttpd[1811]: ?:0: attempt to index field 'sysreport' (a nil value) Mon May 8 09:10:16 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:16 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:16 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:16 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:19 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/mesh/upgrade'. Mon May 8 09:10:19 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:19 2023 daemon.err uhttpd[1811]: ?:0: attempt to index a nil value Mon May 8 09:10:19 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:19 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:19 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:19 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/mesh/devinfo'. Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?:0: attempt to index field 'sysreport' (a nil value) Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/mesh/devinfo'. Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?:0: attempt to index field 'sysreport' (a nil value) Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/mesh/upgrade'. Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?:0: attempt to index a nil value Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:20 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: Failed to execute template dispatcher target for entry '/admin/network/bandwidth'. Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: Failed to execute template 'carousel/statistic'. Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: A runtime error occured: bad argument #2 to 'get' (string expected, got nil) Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:26 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:10:35 2023 daemon.err uhttpd[1811]: cat: can't open '/var/run/xl2tpd.pid': No such file or directory Mon May 8 09:10:35 2023 daemon.err uhttpd[1811]: sh: you need to specify whom to kill Mon May 8 09:10:36 2023 daemon.err uhttpd[1811]: Failed to execute cbi dispatcher target for entry '/admin/network/vpn/openvpns/status'. Mon May 8 09:10:36 2023 daemon.err uhttpd[1811]: The called action terminated with an exception: Mon May 8 09:10:36 2023 daemon.err uhttpd[1811]: bad argument #1 to 'lines' (/tmp/openvpn-status.log: No such file or directory) Mon May 8 09:10:36 2023 daemon.err uhttpd[1811]: stack traceback: Mon May 8 09:10:36 2023 daemon.err uhttpd[1811]: [C]: in function 'assert' Mon May 8 09:10:36 2023 daemon.err uhttpd[1811]: ?: in function 'dispatch' Mon May 8 09:10:36 2023 daemon.err uhttpd[1811]: ?: in function Mon May 8 09:11:46 2023 daemon.err uhttpd[1811]: cat: can't open '/var/run/xl2tpd.pid': No such file or directory Mon May 8 09:11:46 2023 daemon.err uhttpd[1811]: sh: you need to specify whom to kill Mon May 8 09:11:56 2023 daemon.err uhttpd[1811]: cat: can't open '/var/run/xl2tpd.pid': No such file or directory Mon May 8 09:11:56 2023 daemon.err uhttpd[1811]: sh: you need to specify whom to kill Mon May 8 09:12:08 2023 user.warn igmpproxy[6016]: MRT_DEL_MFC; Errno(2): No such file or directory Mon May 8 09:12:08 2023 user.warn igmpproxy[6016]: MRT_DEL_MFC; Errno(2): No such file or directory