Need help diagnosing OpenVPN client instability

Hi there. I’ve got this posted over at the OVPN community board as well, but thought I would inquire with the experts on this forum too (you’ve never let me down in the past!). All clients are on GL-MT300N-V2 firmware 2.271, and I’ve employed @nopro404 's fix for the OpenVPN toggle switch from this thread.

I’ve got an OVPN Access Server (2.1.9) running on AWS in multi-daemon mode (UDP and TCP), creating a Layer 3 (Routing/NAT) tunnel with about 30 unique clients configured (all on dynamic VPN IPs, using unique auto-login client configs). All internet traffic is being routed through the VPN, multiple sessions per user is enabled. While all clients are running on identical hardware and firmware, some of them have stable connections that will persist for days or weeks, while others seem to disconnect frequently, sometimes throwing a “disconnected because user-specific properties prevent concurrent VPN connections by this user” error. This error seems logical since each client is configured to act as a gateway to its own unique subnet, so if an immediate reconnect is attempted before the first session is closed, the server is probably detecting and preventing a routing anomaly (two clients shouldn’t both be the gateway for the same subnet).

Of those clients that experience disconnects, some come back up on their own (presumably on account of some of the config parameters like ping-restart, connect-retry, etc.) while others stay disconnected until a remote user power cycles their device. When I’m working on a client experiencing disconnects, I notice that my SSH session will terminate and the VPN session will still show as active for about 2.5 minutes before the server closes the connection. In some cases, I can observe a new session being initiated by the disconnected client very quickly thereafter. Others will not come back up without a reset done remotely.

My access server is configured with the following additional directives:

cipher AES-128-CBC keepalive 15 75 resolv-retry infinite persist-tun persist-key duplicate-cn

The following additional client directives are also specified:

cipher AES-128-CBC keepalive 15 75 resolv-retry infinite persist-tun persist-key connect-retry 60 connect-timeout 60 connect-retry-max infinite

The client config file looks like this (certs removed):

setenv FORWARD_COMPATIBLE 1 client server-poll-timeout 4 nobind remote [URL to OVPN server removed] 1194 udp remote [URL to OVPN server removed] 1194 udp remote [URL to OVPN server removed] 443 tcp remote [URL to OVPN server removed] 1194 udp remote [URL to OVPN server removed] 1194 udp remote [URL to OVPN server removed] 1194 udp remote [URL to OVPN server removed] 1194 udp remote [URL to OVPN server removed] 1194 udp dev tun dev-type tun ns-cert-type server reneg-sec 604800 sndbuf 100000 rcvbuf 100000 comp-lzo no verb 3 setenv PUSH_PEER_INFO

(….and then additional directives at the end of the file…)

cipher AES-128-CBC keepalive 15 75 resolv-retry infinite persist-tun persist-key connect-retry 60 connect-timeout 60 connect-retry-max infinite daemon

From the router logs, here is the PUSH string received by the clients:

PUSH: Received control message: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 15,ping-restart 75,comp-lzo yes,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway [VPN subnet removed].145,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,register-dns,block-ipv6,ifconfig [VPN subnet removed].151 255.255.255.240'

Is there something in the way I’ve configured things that is leading to certain clients experiencing disconnect issues (and/or problems auto-reconnecting)? I’ve been over every router setting and can’t find any discrepancies between a client whose connection persists and one whose connection drops frequently. Any insight is appreciated.

You don’t mention how these problem clients have WAN connection. Is it wired or wisp?

If wisp, I suspect their upstream AP is changing channels, gl_health kicks in and restarts networking after a timeout, but will not rejoin the AP on the new channel.

See: Bugs: Wifi Wrong Password Or Channel

If this doesn’t apply, please post system logs.

The clients are connected via attached LTE USB modem. Useful logs are sort of hard to come by, once they drop from the VPN, remote users reboot their device to re-establish connection. I’ve asked one of them to pause before doing this so we can capture the logs, but have not received them yet. Thinking I should setup a log server to capture all of them, but need to read up on how to do that.

An example client log looks like this (appears very beginning of boot process was cut off due to cap set on log size):

Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'VPN_client' -> 'lan'
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv6 mangle table
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'VPN_client'
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_ecn to off
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_syncookies to on
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_window_scaling to on
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Running script '/usr/share/miniupnpd/firewall.include'
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Failed to parse json data: unexpected end of data
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Failed to parse json data: unexpected end of data
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Running script '/var/etc/shadowsocks.include'
Mon Sep 10 21:32:47 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    ! Skipping due to path error: No such file or directory
Mon Sep 10 21:32:51 2018 user.notice : Added device handler type: 8021ad
Mon Sep 10 21:32:51 2018 user.notice : Added device handler type: 8021q
Mon Sep 10 21:32:51 2018 user.notice : Added device handler type: macvlan
Mon Sep 10 21:32:51 2018 user.notice : Added device handler type: bridge
Mon Sep 10 21:32:51 2018 user.notice : Added device handler type: Network device
Mon Sep 10 21:32:51 2018 user.notice : Added device handler type: tunnel
Mon Sep 10 21:32:52 2018 kern.warn kernel: [   32.321461] TX_BCN DESC a6be1000 size = 320
Mon Sep 10 21:32:52 2018 kern.warn kernel: [   32.325777] RX[0] DESC a6beb000 size = 2048
Mon Sep 10 21:32:52 2018 kern.warn kernel: [   32.333069] RX[1] DESC a6bec000 size = 1024
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.461156] prepare to get e2p access------------
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.466526] cfg_mode=9
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.468980] cfg_mode=9
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.471381] wmode_band_equal(): Band Equal!
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.478189] APSDCapable[0]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.481112] APSDCapable[1]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.484027] APSDCapable[2]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.486943] APSDCapable[3]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.489881] APSDCapable[4]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.492799] APSDCapable[5]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.495716] APSDCapable[6]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.498649] APSDCapable[7]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.501565] APSDCapable[8]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.504481] APSDCapable[9]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.507413] APSDCapable[10]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.510421] APSDCapable[11]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.513426] APSDCapable[12]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.516432] APSDCapable[13]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.519452] APSDCapable[14]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.522459] APSDCapable[15]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.525465] default ApCliAPSDCapable[0]=1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.723152] Key1Str is Invalid key length(0) or Type(0)
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.728717] Key2Str is Invalid key length(0) or Type(0)
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.734247] Key3Str is Invalid key length(0) or Type(0)
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.739811] Key4Str is Invalid key length(0) or Type(0)
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.775110] RTMPSetDefaultChannel() : default channel to 1
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.780845] load fw image from fw_header_image
Mon Sep 10 21:32:53 2018 kern.warn kernel: [   32.785352] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
Mon Sep 10 21:32:55 2018 authpriv.info dropbear[1696]: Not backgrounding
Mon Sep 10 21:32:55 2018 daemon.notice openvpn[1411]: OpenVPN 2.4.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Sep 10 21:32:55 2018 daemon.notice openvpn[1411]: library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
Mon Sep 10 21:32:55 2018 daemon.warn openvpn[1737]: WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Mon Sep 10 21:32:55 2018 daemon.warn openvpn[1737]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 10 21:32:56 2018 daemon.notice openvpn[1737]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 10 21:32:56 2018 daemon.notice openvpn[1737]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 10 21:32:58 2018 daemon.notice procd: /etc/rc.d/S50mjpg-streamer: /etc/rc.d/S50mjpg-streamer: device '/dev/video0' does not exist
Mon Sep 10 21:33:02 2018 daemon.err openvpn[1737]: RESOLVE: Cannot resolve host address: [VPN server domain name]:1194 (Try again)
Mon Sep 10 21:33:02 2018 user.notice root: drv_ralink_cleanup
Mon Sep 10 21:33:07 2018 daemon.err openvpn[1737]: RESOLVE: Cannot resolve host address: [VPN server domain name]:1194 (Try again)
Mon Sep 10 21:33:07 2018 daemon.warn openvpn[1737]: Could not determine IPv4/IPv6 protocol
Mon Sep 10 21:33:07 2018 daemon.notice openvpn[1737]: SIGUSR1[soft,init_instance] received, process restarting
Mon Sep 10 21:33:07 2018 daemon.notice openvpn[1737]: Restart pause, 60 second(s)
Mon Sep 10 21:33:07 2018 daemon.notice netifd: Interface 'lan' is enabled
Mon Sep 10 21:33:07 2018 daemon.notice netifd: Interface 'lan' is setting up now
Mon Sep 10 21:33:07 2018 daemon.notice netifd: Interface 'lan' is now up
Mon Sep 10 21:33:09 2018 daemon.err insmod: module is already loaded - xt_multiport
Mon Sep 10 21:33:09 2018 daemon.err insmod: module is already loaded - xt_connmark
Mon Sep 10 21:33:09 2018 daemon.err insmod: module is already loaded - xt_comment
Mon Sep 10 21:33:09 2018 daemon.err insmod: module is already loaded - xt_length
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'loopback' is enabled
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'loopback' is setting up now
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'loopback' is now up
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'wan' is enabled
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'wan6' is enabled
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Network device 'ra0' link is up
Mon Sep 10 21:33:10 2018 daemon.notice netifd: bridge 'br-lan' link is up
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'lan' has link connectivity
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Network device 'eth0' link is up
Mon Sep 10 21:33:10 2018 daemon.notice netifd: VLAN 'eth0.1' link is up
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Network device 'lo' link is up
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'loopback' has link connectivity
Mon Sep 10 21:33:10 2018 daemon.notice netifd: VLAN 'eth0.2' link is up
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'wan' has link connectivity
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'wan' is setting up now
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'wan6' has link connectivity
Mon Sep 10 21:33:10 2018 daemon.notice netifd: Interface 'wan6' is setting up now
Mon Sep 10 21:33:10 2018 daemon.info odhcpd[1627]: Raising SIGUSR1 due to address change on br-lan
Mon Sep 10 21:33:11 2018 daemon.notice netifd: wan (2250): udhcpc: started, v1.25.1
Mon Sep 10 21:33:11 2018 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Mon Sep 10 21:33:12 2018 daemon.notice netifd: modem (2170): "Failed to connect to service"
Mon Sep 10 21:33:12 2018 daemon.notice netifd: modem (2170): Waiting for network registration
Mon Sep 10 21:33:12 2018 daemon.notice netifd: wan (2250): udhcpc: sending discover
Mon Sep 10 21:33:12 2018 daemon.notice netifd: modem (2170): Starting network modem
Mon Sep 10 21:33:13 2018 daemon.notice netifd: modem (2170): Unable to connect IPv4
Mon Sep 10 21:33:13 2018 daemon.notice netifd: modem (2367): Stopping network modem
Mon Sep 10 21:33:14 2018 daemon.notice netifd: modem (2367): Command failed: Permission denied
Mon Sep 10 21:33:14 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:14 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:14 2018 daemon.notice netifd: modem (2429): "Failed to connect to service"
Mon Sep 10 21:33:14 2018 daemon.notice netifd: modem (2429): Waiting for network registration
Mon Sep 10 21:33:14 2018 daemon.notice netifd: modem (2429): Starting network modem
Mon Sep 10 21:33:14 2018 daemon.notice netifd: modem (2429): Unable to connect IPv4
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2519): Stopping network modem
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2519): Command failed: Permission denied
Mon Sep 10 21:33:15 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:15 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2542): "Failed to connect to service"
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2542): Waiting for network registration
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2542): Starting network modem
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2542): Unable to connect IPv4
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2575): Stopping network modem
Mon Sep 10 21:33:15 2018 daemon.notice netifd: wan (2250): udhcpc: sending discover
Mon Sep 10 21:33:15 2018 daemon.notice netifd: modem (2575): Command failed: Permission denied
Mon Sep 10 21:33:15 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:15 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:16 2018 daemon.notice netifd: modem (2582): "Failed to connect to service"
Mon Sep 10 21:33:16 2018 daemon.notice netifd: modem (2582): Waiting for network registration
Mon Sep 10 21:33:16 2018 daemon.notice netifd: modem (2582): Starting network modem
Mon Sep 10 21:33:16 2018 daemon.notice netifd: modem (2582): Unable to connect IPv4
Mon Sep 10 21:33:16 2018 daemon.notice netifd: modem (2676): Stopping network modem
Mon Sep 10 21:33:16 2018 daemon.notice netifd: modem (2676): Command failed: Permission denied
Mon Sep 10 21:33:16 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:16 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:16 2018 daemon.err insmod: module is already loaded - xt_multiport
Mon Sep 10 21:33:16 2018 daemon.err insmod: module is already loaded - xt_connmark
Mon Sep 10 21:33:16 2018 daemon.err insmod: module is already loaded - xt_comment
Mon Sep 10 21:33:17 2018 daemon.err insmod: module is already loaded - xt_length
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq[2765]: started, version 2.78 cachesize 150
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq[2765]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq-dhcp[2765]: DHCP, IP range [VPN client subnet].100 -- [VPN client subnet].249, lease time 12h
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.4.4#53
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.8.8#53
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq[2765]: using local addresses only for domain RVITclient.lan
Mon Sep 10 21:33:17 2018 daemon.warn dnsmasq[2765]: no servers found in /tmp/resolv.conf.auto, will retry
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq[2765]: read /etc/hosts - 4 addresses
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq[2765]: read /tmp/hosts/dhcp.cfg02411c - 4 addresses
Mon Sep 10 21:33:17 2018 daemon.info dnsmasq-dhcp[2765]: read /etc/ethers - 0 addresses
Mon Sep 10 21:33:17 2018 daemon.notice netifd: modem (2734): "Failed to connect to service"
Mon Sep 10 21:33:17 2018 daemon.notice netifd: modem (2734): Waiting for network registration
Mon Sep 10 21:33:17 2018 daemon.notice netifd: modem (2734): Starting network modem
Mon Sep 10 21:33:17 2018 daemon.notice netifd: modem (2734): Unable to connect IPv4
Mon Sep 10 21:33:17 2018 daemon.notice netifd: modem (2823): Stopping network modem
Mon Sep 10 21:33:18 2018 daemon.notice netifd: modem (2823): Command failed: Permission denied
Mon Sep 10 21:33:18 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:18 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:18 2018 daemon.notice netifd: modem (2849): "Failed to connect to service"
Mon Sep 10 21:33:18 2018 daemon.notice netifd: modem (2849): Waiting for network registration
Mon Sep 10 21:33:18 2018 daemon.notice netifd: modem (2849): Starting network modem
Mon Sep 10 21:33:18 2018 daemon.notice netifd: wan (2250): udhcpc: sending discover
Mon Sep 10 21:33:18 2018 daemon.notice netifd: modem (2849): Unable to connect IPv4
Mon Sep 10 21:33:19 2018 daemon.notice netifd: modem (2921): Stopping network modem
Mon Sep 10 21:33:19 2018 daemon.notice netifd: modem (2921): Command failed: Permission denied
Mon Sep 10 21:33:19 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:19 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:20 2018 daemon.notice netifd: modem (2940): "Failed to connect to service"
Mon Sep 10 21:33:20 2018 daemon.notice netifd: modem (2940): Waiting for network registration
Mon Sep 10 21:33:20 2018 daemon.notice netifd: modem (2940): Starting network modem
Mon Sep 10 21:33:20 2018 daemon.notice netifd: modem (2940): Unable to connect IPv4
Mon Sep 10 21:33:20 2018 daemon.notice netifd: modem (2997): Stopping network modem
Mon Sep 10 21:33:21 2018 daemon.notice netifd: modem (2997): Command failed: Permission denied
Mon Sep 10 21:33:21 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:21 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:21 2018 daemon.notice procd: /etc/rc.d/S90startvpn: OpenVPN already started... Exiting. - JAB
Mon Sep 10 21:33:21 2018 daemon.notice netifd: modem (3019): "Failed to connect to service"
Mon Sep 10 21:33:21 2018 daemon.notice netifd: modem (3019): Waiting for network registration
Mon Sep 10 21:33:21 2018 daemon.notice netifd: modem (3019): Starting network modem
Mon Sep 10 21:33:21 2018 daemon.notice netifd: modem (3019): Unable to connect IPv4
Mon Sep 10 21:33:21 2018 daemon.notice netifd: modem (3091): Stopping network modem
Mon Sep 10 21:33:22 2018 daemon.notice netifd: modem (3091): Command failed: Permission denied
Mon Sep 10 21:33:22 2018 daemon.notice netifd: Interface 'modem' is now down

.
.
.
(process of modem attempting to connect and failing repeats every second until signal acquired)
.
.
.
(with other various initialization activity interjecting)
.
.
.

Mon Sep 10 21:33:27 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:28 2018 daemon.notice netifd: modem (3535): "Failed to connect to service"
Mon Sep 10 21:33:28 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led wifi
Mon Sep 10 21:33:28 2018 daemon.notice netifd: modem (3535): Waiting for network registration
Mon Sep 10 21:33:28 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led vpn
Mon Sep 10 21:33:28 2018 daemon.notice netifd: modem (3535): Starting network modem
Mon Sep 10 21:33:28 2018 daemon.notice netifd: modem (3535): Unable to connect IPv4
Mon Sep 10 21:33:28 2018 daemon.notice ntfs-3g[3594]: Version 2016.2.22 integrated FUSE 27
Mon Sep 10 21:33:28 2018 daemon.notice ntfs-3g[3594]: Mounted /dev/sda1 (Read-Write, label "RVIT_tools", NTFS 3.1)
Mon Sep 10 21:33:28 2018 daemon.notice ntfs-3g[3594]: Cmdline options: utf8
Mon Sep 10 21:33:28 2018 daemon.notice ntfs-3g[3594]: Mount options: utf8,allow_other,nonempty,relatime,fsname=/dev/sda1,blkdev,blksize=4096
Mon Sep 10 21:33:28 2018 daemon.notice ntfs-3g[3594]: Ownership and permissions disabled, configuration type 1
Mon Sep 10 21:33:28 2018 daemon.notice netifd: modem (3589): Stopping network modem
Mon Sep 10 21:33:28 2018 daemon.notice netifd: modem (3589): Command failed: Permission denied
Mon Sep 10 21:33:28 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:28 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:29 2018 daemon.notice netifd: modem (3610): "Failed to connect to service"
Mon Sep 10 21:33:29 2018 daemon.notice netifd: modem (3610): Waiting for network registration
Mon Sep 10 21:33:29 2018 daemon.notice netifd: modem (3610): Starting network modem
Mon Sep 10 21:33:29 2018 daemon.notice netifd: modem (3610): Unable to connect IPv4
Mon Sep 10 21:33:29 2018 daemon.notice netifd: modem (3661): Stopping network modem
Mon Sep 10 21:33:29 2018 daemon.notice procd: /etc/rc.d/S99ss-server:
Mon Sep 10 21:33:29 2018 daemon.notice netifd: modem (3661): Command failed: Permission denied
Mon Sep 10 21:33:29 2018 daemon.notice netifd: Interface 'modem' is now down
Mon Sep 10 21:33:29 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:29 2018 daemon.info procd: - init complete -
Mon Sep 10 21:33:30 2018 daemon.notice netifd: modem (3679): "Failed to connect to service"
Mon Sep 10 21:33:30 2018 daemon.notice netifd: modem (3679): Waiting for network registration
Mon Sep 10 21:33:30 2018 daemon.notice netifd: modem (3679): Starting network modem
Mon Sep 10 21:33:30 2018 daemon.notice netifd: modem (3679): Unable to connect IPv4
Mon Sep 10 21:33:30 2018 daemon.notice netifd: modem (3719): Stopping network modem
Mon Sep 10 21:33:30 2018 daemon.notice netifd: modem (3719): Command failed: Permission denied
Mon Sep 10 21:33:30 2018 daemon.notice netifd: Interface 'modem' is now down

.
.
.
(more uneventful modem connect failures)
.
.
.

Mon Sep 10 21:33:38 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:38 2018 daemon.info dnsmasq-dhcp[2765]: DHCPREQUEST(br-lan) [VPN client subnet].228 50:dc:e7:63:c6:e0
Mon Sep 10 21:33:38 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].228 50:dc:e7:63:c6:e0 amazon-1daffec7e
Mon Sep 10 21:33:38 2018 daemon.notice netifd: modem (4402): "Failed to connect to service"
Mon Sep 10 21:33:38 2018 daemon.notice netifd: modem (4402): Waiting for network registration
Mon Sep 10 21:33:38 2018 daemon.notice netifd: modem (4402): Starting network modem
Mon Sep 10 21:33:38 2018 daemon.notice netifd: modem (4402): Unable to connect IPv4
Mon Sep 10 21:33:38 2018 daemon.notice netifd: modem (4427): Stopping network modem
Mon Sep 10 21:33:38 2018 daemon.notice netifd: modem (4427): Command failed: Permission denied
Mon Sep 10 21:33:38 2018 daemon.notice netifd: Interface 'modem' is now down

.
.
.
(more uneventful modem connect failures)
.
.
.

(log continued below)

Mon Sep 10 21:33:49 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 10 21:33:50 2018 daemon.notice netifd: modem (5266): "Failed to connect to service"
Mon Sep 10 21:33:50 2018 daemon.notice netifd: modem (5266): Waiting for network registration
Mon Sep 10 21:33:55 2018 daemon.notice netifd: modem (5266): Starting network modem
Mon Sep 10 21:33:55 2018 daemon.notice netifd: modem (5266): Setting up wwan0
Mon Sep 10 21:33:55 2018 daemon.notice netifd: Interface 'modem' is now up
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: reading /tmp/resolv.conf.auto
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.4.4#53
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.8.8#53
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using local addresses only for domain RVITclient.lan
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.8.8#53
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.4.4#53
Mon Sep 10 21:33:55 2018 daemon.notice netifd: Network device 'wwan0' link is up
Mon Sep 10 21:33:55 2018 daemon.notice netifd: Network alias 'wwan0' link is up
Mon Sep 10 21:33:55 2018 daemon.notice netifd: Interface 'modem_4' is enabled
Mon Sep 10 21:33:55 2018 daemon.notice netifd: Interface 'modem_4' has link connectivity
Mon Sep 10 21:33:55 2018 daemon.notice netifd: Interface 'modem_4' is setting up now
Mon Sep 10 21:33:55 2018 daemon.notice netifd: modem (5266): Command failed: Unknown error
Mon Sep 10 21:33:55 2018 daemon.notice netifd: modem_4 (5313): udhcpc: started, v1.25.1
Mon Sep 10 21:33:55 2018 daemon.notice netifd: modem_4 (5313): udhcpc: sending discover
Mon Sep 10 21:33:55 2018 daemon.notice netifd: modem_4 (5313): udhcpc: sending select for 33.103.202.28
Mon Sep 10 21:33:55 2018 daemon.notice netifd: modem_4 (5313): udhcpc: lease of 33.103.202.28 obtained, lease time 7200
Mon Sep 10 21:33:55 2018 daemon.notice netifd: Interface 'modem_4' is now up
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: reading /tmp/resolv.conf.auto
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.4.4#53
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.8.8#53
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using local addresses only for domain RVITclient.lan
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.8.8#53
Mon Sep 10 21:33:55 2018 daemon.info dnsmasq[2765]: using nameserver 8.8.4.4#53
Mon Sep 10 21:33:55 2018 user.notice mwan3: ifup interface modem (wwan0)
Mon Sep 10 21:33:56 2018 daemon.info dnsmasq-dhcp[2765]: DHCPREQUEST(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 10 21:33:56 2018 daemon.warn dnsmasq-dhcp[2765]: Ignoring domain remasonco.com for DHCP host name [user device name]
Mon Sep 10 21:33:56 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 10 21:33:57 2018 user.notice firewall: Reloading firewall due to ifup of modem (wwan0)
Mon Sep 17 13:12:50 2018 daemon.info dnsmasq-dhcp[2765]: DHCPREQUEST(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:12:50 2018 daemon.warn dnsmasq-dhcp[2765]: Ignoring domain remasonco.com for DHCP host name [user device name]
Mon Sep 17 13:12:50 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 13:12:54 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:12:54 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 13:12:56 2018 daemon.warn openvpn[1737]: WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Mon Sep 17 13:12:56 2018 daemon.warn openvpn[1737]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: TCP/UDP: Preserving recently used remote address: [AF_INET][VPN server public IP]:1194
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: Socket Buffers: R=[163840->200000] S=[163840->200000]
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: UDP link local: (not bound)
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: UDP link remote: [AF_INET][VPN server public IP]:1194
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: TLS: Initial packet from [AF_INET][VPN server public IP]:1194, sid=16adaee2 a31205a8
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: VERIFY OK: depth=1, CN=OpenVPN CA
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: VERIFY OK: nsCertType=SERVER
Mon Sep 17 13:12:56 2018 daemon.notice openvpn[1737]: VERIFY OK: depth=0, CN=OpenVPN Server
Mon Sep 17 13:12:57 2018 daemon.info dnsmasq[2765]: read /etc/hosts - 4 addresses
Mon Sep 17 13:12:57 2018 daemon.info dnsmasq[2765]: read /tmp/hosts/dhcp.cfg02411c - 4 addresses
Mon Sep 17 13:12:57 2018 daemon.info dnsmasq-dhcp[2765]: read /etc/ethers - 0 addresses
Mon Sep 17 13:12:57 2018 daemon.notice openvpn[1737]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Mon Sep 17 13:12:57 2018 daemon.notice openvpn[1737]: [OpenVPN Server] Peer Connection Initiated with [AF_INET][VPN server public IP]:1194
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1)
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: PUSH: Received control message: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 15,ping-restart 75,comp-lzo yes,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway [VPN server subnet].145,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,register-dns,block-ipv6,ifconfig [VPN server subnet].156 255.255.255.240'
Mon Sep 17 13:12:59 2018 daemon.warn openvpn[1737]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:4: dhcp-pre-release (2.4.3)
Mon Sep 17 13:12:59 2018 daemon.warn openvpn[1737]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: dhcp-renew (2.4.3)
Mon Sep 17 13:12:59 2018 daemon.warn openvpn[1737]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:6: dhcp-release (2.4.3)
Mon Sep 17 13:12:59 2018 daemon.warn openvpn[1737]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:17: register-dns (2.4.3)
Mon Sep 17 13:12:59 2018 daemon.warn openvpn[1737]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:18: block-ipv6 (2.4.3)
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: OPTIONS IMPORT: explicit notify parm(s) modified
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: OPTIONS IMPORT: compression parms modified
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: OPTIONS IMPORT: route options modified
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: OPTIONS IMPORT: route-related options modified
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 17 13:12:59 2018 daemon.notice netifd: Interface 'VPN_client' is enabled
Mon Sep 17 13:12:59 2018 daemon.notice netifd: Network device 'tun0' link is up
Mon Sep 17 13:12:59 2018 daemon.notice netifd: Interface 'VPN_client' has link connectivity
Mon Sep 17 13:12:59 2018 daemon.notice netifd: Interface 'VPN_client' is setting up now
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: TUN/TAP device tun0 opened
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: TUN/TAP TX queue length set to 100
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Sep 17 13:12:59 2018 daemon.notice netifd: Interface 'VPN_client' is now up
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: /sbin/ip link set dev tun0 up mtu 1500
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: /sbin/ip addr add dev tun0 [VPN server subnet].156/28 broadcast [VPN server subnet].159
Mon Sep 17 13:12:59 2018 daemon.notice openvpn[1737]: /etc/streampath/add-stream-routes.sh tun0 1500 1558 [VPN server subnet].156 255.255.255.240 init
Mon Sep 17 13:13:00 2018 user.notice firewall: Reloading firewall due to ifup of VPN_client (tun0)
Mon Sep 17 13:13:04 2018 daemon.notice openvpn[1737]: /sbin/ip route add [VPN server public IP]/32 via 33.103.202.25
Mon Sep 17 13:13:04 2018 daemon.notice openvpn[1737]: /sbin/ip route add 0.0.0.0/1 via [VPN server subnet].145
Mon Sep 17 13:13:04 2018 daemon.notice openvpn[1737]: /sbin/ip route add 128.0.0.0/1 via [VPN server subnet].145
Mon Sep 17 13:13:04 2018 daemon.warn openvpn[1737]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Sep 17 13:13:04 2018 daemon.notice openvpn[1737]: Initialization Sequence Completed
Mon Sep 17 13:16:47 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:16:47 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 13:21:14 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:21:14 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 13:29:30 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:29:30 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 13:36:03 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:36:03 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 13:41:23 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:41:23 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 13:59:42 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 13:59:42 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 14:04:01 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 14:04:01 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 14:08:18 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 14:08:18 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 14:11:57 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 14:11:57 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 14:12:44 2018 daemon.notice netifd: modem_4 (5313): udhcpc: sending renew
Mon Sep 17 14:12:44 2018 daemon.notice netifd: modem_4 (5313): udhcpc: lease of 33.103.202.28 obtained, lease time 7200
Mon Sep 17 14:12:58 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 14:12:58 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 14:17:49 2018 authpriv.info dropbear[5942]: Child connection from [VPN server subnet].145:65280
Mon Sep 17 14:18:04 2018 authpriv.notice dropbear[5942]: Password auth succeeded for 'root' from [VPN server subnet].145:65280
Mon Sep 17 14:19:25 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 14:19:25 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 14:47:48 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 14:47:48 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 15:12:44 2018 daemon.notice netifd: modem_4 (5313): udhcpc: sending renew
Mon Sep 17 15:12:44 2018 daemon.notice netifd: modem_4 (5313): udhcpc: lease of 33.103.202.28 obtained, lease time 7200
Mon Sep 17 15:13:01 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 15:13:01 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 15:14:02 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 15:14:02 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 15:19:59 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 15:19:59 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 15:49:06 2018 authpriv.info dropbear[5942]: Exit (root): Exited normally
Mon Sep 17 16:10:22 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 16:10:22 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 16:12:45 2018 daemon.notice netifd: modem_4 (5313): udhcpc: sending renew
Mon Sep 17 16:12:45 2018 daemon.notice netifd: modem_4 (5313): udhcpc: lease of 33.103.202.28 obtained, lease time 7200
Mon Sep 17 16:13:22 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 16:13:22 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 16:14:23 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 16:14:23 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 16:20:47 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 16:20:47 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 17:07:01 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 17:07:01 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 17:12:45 2018 daemon.notice netifd: modem_4 (5313): udhcpc: sending renew
Mon Sep 17 17:12:45 2018 daemon.notice netifd: modem_4 (5313): udhcpc: lease of 33.103.202.28 obtained, lease time 7200
Mon Sep 17 17:13:43 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 17:13:43 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 17:14:44 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 17:14:44 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 17:22:07 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 17:22:07 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 17:41:24 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 17:41:24 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 17:44:26 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 17:44:26 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:05:56 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 18:05:56 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:08:45 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 18:08:45 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:11:59 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 18:11:59 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:12:45 2018 daemon.notice netifd: modem_4 (5313): udhcpc: sending renew
Mon Sep 17 18:12:45 2018 daemon.notice netifd: modem_4 (5313): udhcpc: lease of 33.103.202.28 obtained, lease time 7200
Mon Sep 17 18:13:54 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 18:13:54 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:14:55 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 18:14:55 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:21:58 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 18:21:58 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:35:20 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 18:35:20 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]
Mon Sep 17 18:58:03 2018 daemon.info dnsmasq-dhcp[2765]: DHCPREQUEST(br-lan) [VPN client subnet].228 50:dc:e7:63:c6:e0
Mon Sep 17 18:58:03 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].228 50:dc:e7:63:c6:e0 amazon-1daffec7e
Mon Sep 17 19:02:17 2018 authpriv.info dropbear[12515]: Child connection from [VPN server subnet].145:62188
Mon Sep 17 19:02:21 2018 authpriv.warn dropbear[12515]: Bad password attempt for 'root' from [VPN server subnet].145:62188
Mon Sep 17 19:02:28 2018 authpriv.notice dropbear[12515]: Password auth succeeded for 'root' from [VPN server subnet].145:62188
Mon Sep 17 19:02:48 2018 daemon.info dnsmasq-dhcp[2765]: DHCPINFORM(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b
Mon Sep 17 19:02:48 2018 daemon.info dnsmasq-dhcp[2765]: DHCPACK(br-lan) [VPN client subnet].202 20:10:7a:2f:a8:4b [user device name]

This all takes us up to a point where the connection is still presumably active and clients have connectivity. Would like to be able to see what happens in the logs as the connection drops, but will need to figure out how to capture that without being on-site.

Yeah, the good bits are missing. Need the logs around the disconnect and failure to reconnect time. If it happens regularly setup rsyslog to log to somewhere persistent as well as remote (maybe https://papertrailapp.com/) You may need to have the client put a usb hub on the device to put the modem and a flash device to log to… Tough times!

Appreciate your help. Come to think of it, I have an SD card with space on the device. Should just write the logs to it. I’ll do that and post back with the relevant entries.

OK, I managed to get a client to pause after losing connectivity so I could export the system logs.

Oddly enough, the client reports no connectivity, but I am still able to SSH into the device remotely, so it must have an internet connection and active VPN session. All I see in the logs are hourly DHCP renewals on the 4G connection, and then what looks like excessive DHCP chatter on the local wifi.

Fri Sep 21 04:41:20 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 04:41:20 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 04:41:23 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 04:41:23 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Fri Sep 21 04:41:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 SAMSUNG-SM-G955U
Fri Sep 21 04:42:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 04:42:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 04:49:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 04:49:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 04:52:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 04:52:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:01:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:01:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:09:15 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:09:15 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:12:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:12:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:22:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:22:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:25:17 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:25:17 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:32:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:32:41 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:40:50 2018 daemon.notice netifd: modem_4 (5003): udhcpc: sending renew
Fri Sep 21 05:40:50 2018 daemon.notice netifd: modem_4 (5003): udhcpc: lease of 21.99.74.94 obtained, lease time 7200
Fri Sep 21 05:41:29 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:41:29 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 05:57:45 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 05:57:45 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:02:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:02:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:14:01 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:14:01 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:22:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:22:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:30:30 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:30:30 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:31:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:31:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:40:50 2018 daemon.notice netifd: modem_4 (5003): udhcpc: sending renew
Fri Sep 21 06:40:50 2018 daemon.notice netifd: modem_4 (5003): udhcpc: lease of 21.99.74.94 obtained, lease time 7200
Fri Sep 21 06:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:46:30 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:46:30 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 06:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 06:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:02:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:02:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:19:14 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:19:14 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:22:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:22:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:32:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:32:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:35:23 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:35:23 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: sending renew
Fri Sep 21 07:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: lease of 21.99.74.94 obtained, lease time 7200
Fri Sep 21 07:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:51:34 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:51:34 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 07:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 07:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:01:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:01:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:07:47 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:07:47 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:19:02 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:19:02 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:22:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:22:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:24:25 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:24:25 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:32:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:32:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:36:31 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:36:31 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:37:53 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:37:53 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:39:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:39:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:40:40 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:40:40 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: sending renew
Fri Sep 21 08:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: lease of 21.99.74.94 obtained, lease time 7200
Fri Sep 21 08:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:42:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:49:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:49:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:52:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:57:26 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:57:26 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 08:59:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 08:59:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:02:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:02:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:06:49 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:06:49 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:09:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:09:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:12:42 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:19:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:19:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:29:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:29:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:32:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:32:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:39:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:39:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: sending renew
Fri Sep 21 09:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: lease of 21.99.74.94 obtained, lease time 7200
Fri Sep 21 09:40:59 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:40:59 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:42:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:42:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:45:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) 78:fd:94:23:1f:f6 
Fri Sep 21 09:45:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 09:45:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) 78:fd:94:23:1f:f6 
Fri Sep 21 09:45:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 09:45:58 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 09:45:58 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Fri Sep 21 09:46:08 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:46:08 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:47:25 2018 daemon.info dnsmasq-dhcp[2863]: DHCPRELEASE(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 09:47:28 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) 78:fd:94:23:1f:f6 
Fri Sep 21 09:47:28 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 09:47:37 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) 78:fd:94:23:1f:f6 
Fri Sep 21 09:47:37 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 09:47:38 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 09:47:38 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Fri Sep 21 09:49:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:49:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:52:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:52:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 09:59:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 09:59:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:02:14 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:02:14 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:09:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:09:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:10:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPRELEASE(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 10:11:00 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) 78:fd:94:23:1f:f6 
Fri Sep 21 10:11:00 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 10:11:08 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) 78:fd:94:23:1f:f6 
Fri Sep 21 10:11:08 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 10:11:09 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Fri Sep 21 10:11:09 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Fri Sep 21 10:12:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:12:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:18:48 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:18:48 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:24:39 2018 daemon.info dnsmasq-dhcp[2863]: DHCPDISCOVER(br-lan) 94:44:44:0f:4b:fe 
Fri Sep 21 10:24:39 2018 daemon.info dnsmasq-dhcp[2863]: DHCPOFFER(br-lan) 10.29.22.198 94:44:44:0f:4b:fe 
Fri Sep 21 10:24:44 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.198 94:44:44:0f:4b:fe 
Fri Sep 21 10:24:44 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.198 94:44:44:0f:4b:fe 
Fri Sep 21 10:25:13 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:25:13 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:27:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Fri Sep 21 10:27:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 SAMSUNG-SM-G955U
Fri Sep 21 10:29:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:29:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:31:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:31:57 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:34:55 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:34:55 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:39:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:39:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: sending renew
Fri Sep 21 10:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: lease of 21.99.74.94 obtained, lease time 7200
Fri Sep 21 10:41:19 2018 daemon.info dnsmasq-dhcp[2863]: DHCPREQUEST(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:41:19 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:42:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:42:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:49:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:49:10 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:51:08 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:51:08 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:52:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:52:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 10:59:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 10:59:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:02:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:02:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:07:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:07:33 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:09:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:09:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:10:59 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:10:59 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:12:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:12:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:19:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:19:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:24:01 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:24:01 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:29:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:29:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:32:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:32:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:39:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:39:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:40:39 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:40:39 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: sending renew
Fri Sep 21 11:40:51 2018 daemon.notice netifd: modem_4 (5003): udhcpc: lease of 21.99.74.94 obtained, lease time 7200
Fri Sep 21 11:42:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:42:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:49:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:49:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:52:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:52:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:57:13 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:57:13 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 11:59:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 11:59:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 12:02:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 12:02:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 12:09:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 12:09:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 12:12:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 12:12:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 12:16:00 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 12:16:00 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 12:19:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 12:19:11 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop
Fri Sep 21 12:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPINFORM(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 
Fri Sep 21 12:22:43 2018 daemon.info dnsmasq-dhcp[2863]: DHCPACK(br-lan) 10.29.22.202 88:9f:fa:95:c3:59 Doug-HP-Laptop

Had another instance where I could access the remote GL-MT300N-V2 via SSH through its OpenVPN connection, while local wifi clients could not get out to the internet (and in some instances, phones and other devices could not connect to the local wifi ssid). I’m stumped. Still a lot of redundant DHCP chatter from dnsmasq.

Here is the sys log from the point the VPN connects:

Sun Sep 23 22:27:50 2018 daemon.notice openvpn[1735]: Initialization Sequence Completed
Sun Sep 23 22:28:02 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:28:02 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:28:08 2018 daemon.info dnsmasq-dhcp[2710]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:08 2018 daemon.info dnsmasq-dhcp[2710]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:08 2018 daemon.info dnsmasq-dhcp[2710]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:08 2018 daemon.info dnsmasq-dhcp[2710]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:10 2018 daemon.info dnsmasq-dhcp[2710]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:10 2018 daemon.info dnsmasq-dhcp[2710]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:10 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:10 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 SAMSUNG-SM-G955U
Sun Sep 23 22:28:10 2018 daemon.info dnsmasq[2710]: read /etc/hosts - 4 addresses
Sun Sep 23 22:28:10 2018 daemon.info dnsmasq[2710]: read /tmp/hosts/dhcp.cfg02411c - 3 addresses
Sun Sep 23 22:28:10 2018 daemon.info dnsmasq-dhcp[2710]: read /etc/ethers - 0 addresses
Sun Sep 23 22:28:19 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:28:19 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:28:23 2018 daemon.info dnsmasq-dhcp[2710]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:23 2018 daemon.info dnsmasq-dhcp[2710]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:23 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:28:23 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 SAMSUNG-SM-G955U
Sun Sep 23 22:28:38 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:28:38 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:28:51 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:28:51 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:29:02 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:29:02 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:29:05 2018 daemon.info dnsmasq-dhcp[2710]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:29:05 2018 daemon.info dnsmasq-dhcp[2710]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:29:05 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:29:05 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 SAMSUNG-SM-G955U
Sun Sep 23 22:29:12 2018 daemon.info dnsmasq-dhcp[2710]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:29:12 2018 daemon.info dnsmasq-dhcp[2710]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:31:31 2018 daemon.info dnsmasq[2710]: exiting on receipt of SIGTERM
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: started, version 2.78 cachesize 150
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq-dhcp[9471]: DHCP, IP range 10.29.22.100 -- 10.29.22.249, lease time 12h
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using nameserver 8.8.4.4#53
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using nameserver 8.8.8.8#53
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using local addresses only for domain RVITclient.lan
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: reading /tmp/resolv.conf.auto
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using nameserver 8.8.4.4#53
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using nameserver 8.8.8.8#53
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using local addresses only for domain RVITclient.lan
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using nameserver 8.8.8.8#53
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: using nameserver 8.8.4.4#53
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: read /etc/hosts - 4 addresses
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq[9471]: read /tmp/hosts/dhcp.cfg02411c - 3 addresses
Sun Sep 23 22:31:35 2018 daemon.info dnsmasq-dhcp[9471]: read /etc/ethers - 0 addresses
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:32:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:33:38 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:33:38 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:34:18 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:34:18 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:34:30 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:34:30 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:34:42 2018 authpriv.info dropbear[13232]: Child connection from 10.27.0.145:60447
Sun Sep 23 22:35:07 2018 authpriv.notice dropbear[13232]: Password auth succeeded for 'root' from 10.27.0.145:60447
Sun Sep 23 22:35:28 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:35:28 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:35:28 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:35:28 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:37:10 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:37:10 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:37:10 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:37:10 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.151 e8:61:7e:f1:78:29 
Sun Sep 23 22:41:43 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:41:43 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:44:37 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:44:37 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:44:37 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:44:37 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 SAMSUNG-SM-G955U
Sun Sep 23 22:45:04 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) 78:fd:94:23:1f:f6 
Sun Sep 23 22:45:04 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:45:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:45:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:45:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPDISCOVER(br-lan) dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:45:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPOFFER(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:45:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 
Sun Sep 23 22:45:06 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.187 dc:ef:ca:3d:c8:a7 SAMSUNG-SM-G955U
Sun Sep 23 22:45:38 2018 daemon.info dnsmasq-dhcp[9471]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 
Sun Sep 23 22:45:38 2018 daemon.info dnsmasq-dhcp[9471]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone

You can see I tried to manually restart dnsmasq with no change. Help!

Rebooted and seeing the wireless interface having connectivity problems (ra0):

Sun Sep 23 22:50:17 2018 daemon.notice openvpn[1429]: Initialization Sequence Completed
Sun Sep 23 22:51:41 2018 daemon.notice netifd: Network device ‘ra0’ link is down
Sun Sep 23 22:51:42 2018 daemon.notice netifd: Network device ‘ra0’ link is up
Sun Sep 23 22:51:42 2018 daemon.notice netifd: Network device ‘ra0’ link is down
Sun Sep 23 22:51:43 2018 daemon.notice netifd: Network device ‘ra0’ link is up
Sun Sep 23 22:51:47 2018 daemon.err insmod: module is already loaded - xt_multiport
Sun Sep 23 22:51:47 2018 daemon.err insmod: module is already loaded - xt_connmark
Sun Sep 23 22:51:47 2018 daemon.err insmod: module is already loaded - xt_comment
Sun Sep 23 22:51:47 2018 daemon.err insmod: module is already loaded - xt_length
Sun Sep 23 22:52:21 2018 daemon.info dnsmasq-dhcp[2326]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6
Sun Sep 23 22:52:21 2018 daemon.info dnsmasq-dhcp[2326]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone
Sun Sep 23 22:52:27 2018 daemon.notice netifd: Network device ‘ra0’ link is down
Sun Sep 23 22:52:28 2018 daemon.notice netifd: Network device ‘ra0’ link is up
Sun Sep 23 22:52:29 2018 daemon.notice netifd: Network device ‘ra0’ link is down
Sun Sep 23 22:52:30 2018 daemon.notice netifd: Network device ‘ra0’ link is up
Sun Sep 23 22:52:35 2018 daemon.err insmod: module is already loaded - xt_multiport
Sun Sep 23 22:52:35 2018 daemon.err insmod: module is already loaded - xt_connmark
Sun Sep 23 22:52:35 2018 daemon.err insmod: module is already loaded - xt_comment
Sun Sep 23 22:52:35 2018 daemon.err insmod: module is already loaded - xt_length
Sun Sep 23 22:52:36 2018 daemon.notice netifd: Network device ‘ra0’ link is down
Sun Sep 23 22:52:37 2018 daemon.notice netifd: Network device ‘ra0’ link is up
Sun Sep 23 22:52:38 2018 daemon.notice netifd: Network device ‘ra0’ link is down
Sun Sep 23 22:52:39 2018 daemon.notice netifd: Network device ‘ra0’ link is up
Sun Sep 23 22:52:42 2018 daemon.err insmod: module is already loaded - xt_multiport
Sun Sep 23 22:52:42 2018 daemon.err insmod: module is already loaded - xt_connmark
Sun Sep 23 22:52:42 2018 daemon.err insmod: module is already loaded - xt_comment
Sun Sep 23 22:52:42 2018 daemon.err insmod: module is already loaded - xt_length
Sun Sep 23 22:52:48 2018 daemon.info dnsmasq-dhcp[2326]: DHCPREQUEST(br-lan) 10.29.22.195 78:fd:94:23:1f:f6
Sun Sep 23 22:52:48 2018 daemon.info dnsmasq-dhcp[2326]: DHCPACK(br-lan) 10.29.22.195 78:fd:94:23:1f:f6 iPhone

Aha - Looks like hardware/driver issue. See if you can get the kernel log too.

Sample kernel log from one of the problematic clients. Will see if I can capture it once again after the connection has dropped for the wifi clients, too. However, I do see some ra0 entries that don’t strike me as normal… for example:

[ 35.876358] mt7628_set_ed_cca: TURN OFF EDCCA mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[ 35.884502] WiFi Startup Cost (ra0): 2.610s

and:

[ 43.530260] device ra0 entered promiscuous mode
[ 43.536129] device ra0 left promiscuous mode
[ 43.540628] br-lan: port 2(ra0) entered disabled state

[    0.000000] Linux version 4.4.92 (kyson@gl-inet) (gcc version 5.4.0 (LEDE GCC 5.4.0 r3560-79f57e422d) ) #0 Tue Oct 17 17:46:20 2017
    [    0.000000] Board has DDR2
    [    0.000000] Analog PMU set to hw control
    [    0.000000] Digital PMU set to hw control
    [    0.000000] SoC Type: MediaTek MT7628AN ver:1 eco:2
    [    0.000000] bootconsole [early0] enabled
    [    0.000000] CPU0 revision is: 00019655 (MIPS 24KEc)
    [    0.000000] MIPS: machine is GL-MT300N-V2
    [    0.000000] Determined physical RAM map:
    [    0.000000]  memory: 08000000 @ 00000000 (usable)
    [    0.000000] Initrd not found or empty - disabling initrd
    [    0.000000] Zone ranges:
    [    0.000000]   Normal   [mem 0x0000000000000000-0x0000000007ffffff]
    [    0.000000] Movable zone start for each node
    [    0.000000] Early memory node ranges
    [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000007ffffff]
    [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff]
    [    0.000000] On node 0 totalpages: 32768
    [    0.000000] free_area_init_node: node 0, pgdat 803bc4b0, node_mem_map 81000000
    [    0.000000]   Normal zone: 256 pages used for memmap
    [    0.000000]   Normal zone: 0 pages reserved
    [    0.000000]   Normal zone: 32768 pages, LIFO batch:7
    [    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
    [    0.000000] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
    [    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
    [    0.000000] pcpu-alloc: [0] 0 
    [    0.000000] Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 32512
    [    0.000000] Kernel command line: console=ttyS0,115200 rootfstype=squashfs,jffs2
    [    0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
    [    0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
    [    0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
    [    0.000000] Writing ErrCtl register=0007b3f1
    [    0.000000] Readback ErrCtl register=0007b3f1
    [    0.000000] Memory: 125552K/131072K available (3059K kernel code, 145K rwdata, 728K rodata, 156K init, 200K bss, 5520K reserved, 0K cma-reserved)
    [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
    [    0.000000] NR_IRQS:256
    [    0.000000] intc: using register map from devicetree
    [    0.000000] CPU Clock: 575MHz
    [    0.000000] clocksource_probe: no matching clocksources found
    [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6647862422 ns
    [    0.000012] sched_clock: 32 bits at 287MHz, resolution 3ns, wraps every 7469508094ns
    [    0.007529] Calibrating delay loop... 380.92 BogoMIPS (lpj=1904640)
    [    0.070011] pid_max: default: 32768 minimum: 301
    [    0.074614] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
    [    0.080955] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
    [    0.094302] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
    [    0.103808] futex hash table entries: 256 (order: -1, 3072 bytes)
    [    0.109841] pinctrl core: initialized pinctrl subsystem
    [    0.116259] NET: Registered protocol family 16
    [    0.139110] mt7621_gpio 10000600.gpio: registering 32 gpios
    [    0.144598] mt7621_gpio 10000600.gpio: registering 32 gpios
    [    0.150124] mt7621_gpio 10000600.gpio: registering 32 gpios
    [    0.157312] clocksource: Switched to clocksource MIPS
    [    0.163786] NET: Registered protocol family 2
    [    0.169022] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
    [    0.175715] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
    [    0.181905] TCP: Hash tables configured (established 1024 bind 1024)
    [    0.188104] UDP hash table entries: 256 (order: 0, 4096 bytes)
    [    0.193704] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
    [    0.200090] NET: Registered protocol family 1
    [    0.204292] PCI: CLS 0 bytes, default 32
    [    0.209803] Crashlog allocated RAM at address 0x3f00000
    [    0.231852] squashfs: version 4.0 (2009/01/31) Phillip Lougher
    [    0.237512] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
    [    0.249802] io scheduler noop registered
    [    0.253541] io scheduler deadline registered (default)
    [    0.259367] gpio-export gpio_export: 1 gpio(s) exported
    [    0.264606] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
    [    0.274402] console [ttyS0] disabled
    [    0.277894] 10000c00.uartlite: ttyS0 at MMIO 0x10000c00 (irq = 28, base_baud = 2500000) is a 16550A
    [    0.286601] console [ttyS0] enabled
    [    0.293637] bootconsole [early0] disabled
    [    0.303430] spi-mt7621 10000b00.spi: sys_freq: 191666666
    [    0.314603] m25p80 spi32766.0: using chunked io (size=32)
    [    0.320166] m25p80 spi32766.0: w25q128 (16384 Kbytes)
    [    0.325322] 4 ofpart partitions found on MTD device spi32766.0
    [    0.331254] Creating 4 MTD partitions on "spi32766.0":
    [    0.336471] 0x000000000000-0x000000030000 : "u-boot"
    [    0.343357] 0x000000030000-0x000000040000 : "u-boot-env"
    [    0.350733] 0x000000040000-0x000000050000 : "factory"
    [    0.357772] 0x000000050000-0x000001000000 : "firmware"
    [    0.415040] 2 uimage-fw partitions found on MTD device firmware
    [    0.421097] 0x000000050000-0x000000192c81 : "kernel"
    [    0.427863] 0x000000192c81-0x000001000000 : "rootfs"
    [    0.434718] mtd: device 5 (rootfs) set to be root filesystem
    [    0.440630] 1 squashfs-split partitions found on MTD device rootfs
    [    0.446914] 0x000000a10000-0x000001000000 : "rootfs_data"
    [    0.463706] rt3050-esw 10110000.esw: link changed 0x00
    [    0.471379] mtk_soc_eth 10100000.ethernet eth0: mediatek frame engine at 0xb0100000, irq 5
    [    0.480526] mt7621_wdt 10000120.watchdog: Initialized
    [    0.487193] NET: Registered protocol family 10
    [    0.495440] NET: Registered protocol family 17
    [    0.500125] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
    [    0.512951] 8021q: 802.1Q VLAN Support v1.8
    [    0.519030] hctosys: unable to open rtc device (rtc0)
    [    0.533652] VFS: Mounted root (squashfs filesystem) readonly on device 31:5.
    [    0.541739] Freeing unused kernel memory: 156K
    [    2.296985] init: Console is alive
    [    2.300751] init: - watchdog -
    [    6.058240] kmodloader: loading kernel modules from /etc/modules-boot.d/*
    [    6.148679] usbcore: registered new interface driver usbfs
    [    6.154347] usbcore: registered new interface driver hub
    [    6.159902] usbcore: registered new device driver usb
    [    6.171639] exFAT: Version 1.2.9
    [    6.215863] SCSI subsystem initialized
    [    6.226939] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
    [    6.235612] ehci-platform: EHCI generic platform driver
    [    6.251247] phy phy-10120000.usbphy.0: remote usb device wakeup disabled
    [    6.258065] phy phy-10120000.usbphy.0: UTMI 16bit 30MHz
    [    6.263397] ehci-platform 101c0000.ehci: EHCI Host Controller
    [    6.269281] ehci-platform 101c0000.ehci: new USB bus registered, assigned bus number 1
    [    6.277472] ehci-platform 101c0000.ehci: irq 26, io mem 0x101c0000
    [    6.297334] ehci-platform 101c0000.ehci: USB 2.0 started, EHCI 1.00
    [    6.304873] hub 1-0:1.0: USB hub found
    [    6.309110] hub 1-0:1.0: 1 port detected
    [    6.316811] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
    [    6.325000] ohci-platform: OHCI generic platform driver
    [    6.330625] ohci-platform 101c1000.ohci: Generic Platform OHCI controller
    [    6.337587] ohci-platform 101c1000.ohci: new USB bus registered, assigned bus number 2
    [    6.345706] ohci-platform 101c1000.ohci: irq 26, io mem 0x101c1000
    [    6.412514] hub 2-0:1.0: USB hub found
    [    6.416734] hub 2-0:1.0: 1 port detected
    [    6.423814] uhci_hcd: USB Universal Host Controller Interface driver
    [    6.438001] usbcore: registered new interface driver usb-storage
    [    6.445267] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
    [    6.454751] init: - preinit -
    [    6.711630] usb 1-1: new high-speed USB device number 2 using ehci-platform
    [    6.962492] random: procd: uninitialized urandom read (4 bytes read, 12 bits of entropy available)
    [    6.975187] usb-storage 1-1:1.6: USB Mass Storage device detected
    [    6.997041] scsi host0: usb-storage 1-1:1.6
    [    7.002360] usb-storage 1-1:1.7: USB Mass Storage device detected
    [    7.027473] scsi host1: usb-storage 1-1:1.7
    [    7.409142] rt3050-esw 10110000.esw: link changed 0x00
    [    7.999300] scsi 0:0:0:0: CD-ROM            HUAWEI   Mass Storage     2.31 PQ: 0 ANSI: 0
    [    8.029172] scsi 1:0:0:0: Direct-Access     HUAWEI   SD Storage       2.31 PQ: 0 ANSI: 2
    [    8.040615] sd 1:0:0:0: [sda] 1966080 512-byte logical blocks: (1.01 GB/960 MiB)
    [    8.049201] sd 1:0:0:0: [sda] Write Protect is off
    [    8.054081] sd 1:0:0:0: [sda] Mode Sense: 0f 0e 00 00
    [    8.054947] sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
    [    8.072488]  sda: sda1
    [    8.080076] sd 1:0:0:0: [sda] Attached SCSI removable disk
    [   11.096512] jffs2: notice: (425) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
    [   11.114317] mount_root: switching to jffs2 overlay
    [   11.132566] urandom-seed: Seeding with /etc/urandom.seed
    [   11.281466] procd: - early -
    [   11.284508] procd: - watchdog -
    [   12.071658] procd: - watchdog -
    [   12.075131] procd: - ubus -
    [   12.375108] random: ubusd: uninitialized urandom read (4 bytes read, 31 bits of entropy available)
    [   12.384804] random: ubusd: uninitialized urandom read (4 bytes read, 31 bits of entropy available)
    [   12.394065] random: ubusd: uninitialized urandom read (4 bytes read, 31 bits of entropy available)
    [   12.406899] random: ubusd: uninitialized urandom read (4 bytes read, 31 bits of entropy available)
    [   12.416134] random: ubusd: uninitialized urandom read (4 bytes read, 31 bits of entropy available)
    [   12.426102] random: ubusd: uninitialized urandom read (4 bytes read, 31 bits of entropy available)
    [   12.435993] random: ubusd: uninitialized urandom read (4 bytes read, 31 bits of entropy available)
    [   12.532860] procd: - init -
    [   13.532072] random: jshn: uninitialized urandom read (4 bytes read, 33 bits of entropy available)
    [   13.576753] kmodloader: loading kernel modules from /etc/modules.d/*
    [   13.813196] random: ubusd: uninitialized urandom read (4 bytes read, 34 bits of entropy available)
    [   14.124418] ntfs: driver 2.1.32 [Flags: R/O MODULE].
    [   14.189718] Initializing XFRM netlink socket
    [   14.197467] NET: Registered protocol family 15
    [   14.213735] tun: Universal TUN/TAP device driver, 1.6
    [   14.218939] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
    [   14.330541] l2tp_core: L2TP core driver, V2.0
    [   14.772438] l2tp_netlink: L2TP netlink interface
    [   14.800792] gre: GRE over IPv4 demultiplexor driver
    [   14.814265] ip_gre: GRE over IPv4 tunneling driver
    [   14.849334] ip6_tables: (C) 2000-2006 Netfilter Core Team
    [   14.883434] Netfilter messages via NETLINK v0.30.
    [   14.912768] ip_set: protocol 6
    [   15.218916] i2c /dev entries driver
    [   15.246614] Linux video capture interface: v2.00
    [   15.378653] u32 classifier
    [   15.381411]     input device check on
    [   15.385117]     Actions configured
    [   15.440031] Mirror/redirect action on
    [   15.473080] nf_conntrack version 0.5.0 (1964 buckets, 7856 max)
    [   15.557972] fuse init (API version 7.23)
    [   16.779429] 
    [   16.779429] 
    [   16.779429] === pAd = c070d000, size = 1354736 ===
    [   16.779429] 
    [   16.789062] <-- RTMPAllocTxRxRingMemory, Status=0, ErrorValue=0x
    [   16.796392] <-- RTMPAllocAdapterBlock, Status=0
    [   16.801029] RtmpChipOpsHook(748): Not support for HIF_MT yet!
    [   16.806854] mt7628_init()-->
    [   16.809795] mt7628_init(FW(8a00), HW(8a01), CHIPID(7628))
    [   16.815270] e2.bin mt7628_init(1142)::(2), pChipCap->fw_len(63536)
    [   16.821550] mt_bcn_buf_init(289): Not support for HIF_MT yet!
    [   16.827381] <--mt7628_init()
    [   16.908912] usbcore: registered new interface driver cdc_acm
    [   16.914665] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
    [   16.949819] usbcore: registered new interface driver cdc_wdm
    [   16.988718] ip_tables: (C) 2000-2006 Netfilter Core Team
    [   17.003557] usbcore: registered new interface driver ipheth
    [   17.166726] usbcore: registered new interface driver usbserial
    [   17.172851] usbcore: registered new interface driver usbserial_generic
    [   17.179611] usbserial: USB Serial support registered for generic
    [   17.333495] xt_time: kernel timezone is -0000
    [   17.348371] usbcore: registered new interface driver cdc_ether
    [   17.366886] usbcore: registered new interface driver cdc_ncm
    [   17.398840] usbcore: registered new interface driver cp210x
    [   17.404626] usbserial: USB Serial support registered for cp210x
    [   17.424752] gspca_main: v2.14.0 registered
    [   17.449868] usbcore: registered new interface driver sonixb
    [   17.466477] usbcore: registered new interface driver sonixj
    [   17.491376] usbcore: registered new interface driver gspca_zc3xx
    [   17.509165] usbcore: registered new interface driver huawei_cdc_ncm
    [   17.574570] PPP generic driver version 2.4.2
    [   17.588499] PPP MPPE Compression module registered
    [   17.602949] NET: Registered protocol family 24
    [   17.619245] PPTP driver version 0.8.5
    [   17.634663] qmi_wwan 1-1:1.4: cdc-wdm0: USB WDM device
    [   17.641143] qmi_wwan 1-1:1.4 wwan0: register 'qmi_wwan' at usb-101c0000.ehci-1, WWAN/QMI device, 32:bf:1e:16:10:1f
    [   17.652048] usbcore: registered new interface driver qmi_wwan
    [   17.691228] usbcore: registered new interface driver rndis_host
    [   17.708150] usbcore: registered new interface driver sierra
    [   17.713918] usbserial: USB Serial support registered for Sierra USB modem
    [   17.750472] usbcore: registered new interface driver sierra_net
    [   17.800047] usbcore: registered new interface driver uvcvideo
    [   17.805887] USB Video Class driver (1.1.1)
    [   17.833449] l2tp_ppp: PPPoL2TP kernel driver, V2.0
    [   17.850002] usbcore: registered new interface driver option
    [   17.855781] usbserial: USB Serial support registered for GSM modem (1-port)
    [   17.863337] option 1-1:1.0: GSM modem (1-port) converter detected
    [   17.869909] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB0
    [   17.876882] option 1-1:1.1: GSM modem (1-port) converter detected
    [   17.883458] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB1
    [   17.890485] option 1-1:1.2: GSM modem (1-port) converter detected
    [   17.897003] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB2
    [   17.904033] option 1-1:1.3: GSM modem (1-port) converter detected
    [   17.910592] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB3
    [   18.001698] kmodloader: done loading kernel modules from /etc/modules.d/*
    [   29.090502] TX_BCN DESC a6931000 size = 320
    [   29.094822] RX[0] DESC a6933000 size = 2048
    [   29.102120] RX[1] DESC a693c000 size = 1024
    [   29.241023] Read file "/etc/wireless/mt7628/mt7628.dat" failed(errCode=0)!
    [   29.248080] RTMPSetDefaultChannel() : default channel to 1 
    [   29.253793] load fw image from fw_header_image
    [   29.258324] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
    [   29.264324] FW Version:_e2_mp
    [   29.267746] FW Build Date:20150625211422
    [   29.434539] CmdAddressLenReq:(ret = 0)
    [   29.439168] CmdFwStartReq: override = 1, address = 1048576
    [   29.444830] CmdStartDLRsp: WiFI FW Download Success
    [   29.486527] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
    [   29.492703] efuse_probe: efuse = 10000012
    [   29.496770] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
    [   29.502264] RtmpEepromGetDefault::e2p_dafault=2
    [   29.506861] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
    [   29.514544] NVM is FLASH mode
    [   29.517619] 1. Phy Mode = 6
    [   29.687479] Country Region from e2p = ffff
    [   29.691743] tssi_1_target_pwr_g_band = 33
    [   29.695814] 2. Phy Mode = 6
    [   29.699815] 3. Phy Mode = 6
    [   29.702657] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
    [   29.708517] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
    [   29.716454] mt_mac_init()-->
    [   29.719387] MtAsicInitMac()-->
    [   29.827478] mt7628_init_mac_cr()-->
    [   29.831044] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
    [   29.837128] <--mt_mac_init()
    [   29.840238] 	WTBL Segment 1 info:
    [   29.843600] 		MemBaseAddr/FID:0x28000/0
    [   29.847495] 		EntrySize/Cnt:32/128
    [   29.850940] 	WTBL Segment 2 info:
    [   29.854296] 		MemBaseAddr/FID:0x40000/0
    [   29.858196] 		EntrySize/Cnt:64/128
    [   29.861643] 	WTBL Segment 3 info:
    [   29.864999] 		MemBaseAddr/FID:0x42000/64
    [   29.868988] 		EntrySize/Cnt:64/128
    [   29.872433] 	WTBL Segment 4 info:
    [   29.875789] 		MemBaseAddr/FID:0x44000/128
    [   29.879872] 		EntrySize/Cnt:32/128
    [   29.883397] AntCfgInit(3591): Not support for HIF_MT yet!
    [   29.889066] MCS Set = 00 00 00 00 00
    [   29.892695] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
    [   29.899049] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
    [   29.905152] [PMF]ap_pmf_init:: apidx=1, MFPC=0, MFPR=0, SHA256=0
    [   29.911266] [PMF]ap_pmf_init:: apidx=2, MFPC=0, MFPR=0, SHA256=0
    [   29.917371] [PMF]ap_pmf_init:: apidx=3, MFPC=0, MFPR=0, SHA256=0
    [   29.923467] [PMF]ap_pmf_init:: apidx=4, MFPC=0, MFPR=0, SHA256=0
    [   29.929577] [PMF]ap_pmf_init:: apidx=5, MFPC=0, MFPR=0, SHA256=0
    [   29.935675] [PMF]ap_pmf_init:: apidx=6, MFPC=0, MFPR=0, SHA256=0
    [   29.941786] [PMF]ap_pmf_init:: apidx=7, MFPC=0, MFPR=0, SHA256=0
    [   29.947892] [PMF]ap_pmf_init:: apidx=8, MFPC=0, MFPR=0, SHA256=0
    [   29.953987] [PMF]ap_pmf_init:: apidx=9, MFPC=0, MFPR=0, SHA256=0
    [   29.960097] [PMF]ap_pmf_init:: apidx=10, MFPC=0, MFPR=0, SHA256=0
    [   29.966282] [PMF]ap_pmf_init:: apidx=11, MFPC=0, MFPR=0, SHA256=0
    [   29.972481] [PMF]ap_pmf_init:: apidx=12, MFPC=0, MFPR=0, SHA256=0
    [   29.978675] [PMF]ap_pmf_init:: apidx=13, MFPC=0, MFPR=0, SHA256=0
    [   29.984860] [PMF]ap_pmf_init:: apidx=14, MFPC=0, MFPR=0, SHA256=0
    [   29.991059] [PMF]ap_pmf_init:: apidx=15, MFPC=0, MFPR=0, SHA256=0
    [   29.997237] RTMPSetPhyMode(): channel out of range, use first ch=0
    [   30.003665] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
    [   30.010394] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
    [   30.031846] CmdChannelSwitch: central channel = 0 is invalid
    [   30.037604] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
    [   30.044042] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
    [   30.050261] Main bssid = e4:95:6e:45:24:33
    [   30.054495] <==== rt28xx_init, Status=0
    [   31.277373] random: nonblocking pool is initialized
    [   31.358798] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
    [   31.366932] WiFi Startup Cost (ra0): 2.270s
    [   31.387759] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
    [   31.393890] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
    [   33.247526] tx_kickout_fail_count = 0
    [   33.251255] tx_timeout_fail_count = 0
    [   33.254965] rx_receive_fail_count = 0
    [   33.258716] alloc_cmd_msg = 105
    [   33.261899] free_cmd_msg = 105
    [   33.270397] TX_BCN DESC a6931000 size = 320
    [   33.274709] RX[0] DESC a6933000 size = 2048
    [   33.281955] RX[1] DESC a693c000 size = 1024
    [   33.314653] prepare to get e2p access------------
    [   33.319751] E2pAccessMode=2
    [   33.323339] cfg_mode=9
    [   33.325729] cfg_mode=9
    [   33.328146] wmode_band_equal(): Band Equal!
    [   33.336581] APSDCapable[0]=1
    [   33.339521] APSDCapable[1]=1
    [   33.342438] APSDCapable[2]=1
    [   33.345356] APSDCapable[3]=1
    [   33.348282] APSDCapable[4]=1
    [   33.351199] APSDCapable[5]=1
    [   33.354118] APSDCapable[6]=1
    [   33.357034] APSDCapable[7]=1
    [   33.359971] APSDCapable[8]=1
    [   33.362890] APSDCapable[9]=1
    [   33.365806] APSDCapable[10]=1
    [   33.368831] APSDCapable[11]=1
    [   33.371838] APSDCapable[12]=1
    [   33.374850] APSDCapable[13]=1
    [   33.377870] APSDCapable[14]=1
    [   33.380877] APSDCapable[15]=1
    [   33.383884] default ApCliAPSDCapable[0]=1
    [   33.583359] Key1Str is Invalid key length(0) or Type(0)
    [   33.589053] Key2Str is Invalid key length(0) or Type(0)
    [   33.594710] Key3Str is Invalid key length(0) or Type(0)
    [   33.600403] Key4Str is Invalid key length(0) or Type(0)
    [   33.655612] RTMPSetDefaultChannel() : default channel to 1 
    [   33.661353] load fw image from fw_header_image
    [   33.665861] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
    [   33.671873] FW Version:_e2_mp
    [   33.675272] FW Build Date:20150625211422
    [   33.679475] CmdReStartDLRsp: WiFI FW Download Success
    [   34.529807] CmdSlotTimeSet:(ret = 0)
    [   35.173977] CmdAddressLenReq:(ret = 0)
    [   35.178558] CmdFwStartReq: override = 1, address = 1048576
    [   35.197427] CmdStartDLRsp: WiFI FW Download Success
    [   35.202522] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
    [   35.208663] efuse_probe: efuse = 10000012
    [   35.212730] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
    [   35.218216] RtmpEepromGetDefault::e2p_dafault=2
    [   35.222818] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
    [   35.230506] NVM is FLASH mode
    [   35.233569] 1. Phy Mode = 14
    [   35.427486] Country Region from e2p = ffff
    [   35.431767] tssi_1_target_pwr_g_band = 33
    [   35.435838] 2. Phy Mode = 14
    [   35.439926] 3. Phy Mode = 14
    [   35.442853] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
    [   35.448707] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
    [   35.456643] mt_mac_init()-->
    [   35.459576] MtAsicInitMac()-->
    [   35.597544] mt7628_init_mac_cr()-->
    [   35.601105] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
    [   35.607190] <--mt_mac_init()
    [   35.610295] 	WTBL Segment 1 info:
    [   35.613655] 		MemBaseAddr/FID:0x28000/0
    [   35.617549] 		EntrySize/Cnt:32/128
    [   35.620994] 	WTBL Segment 2 info:
    [   35.624349] 		MemBaseAddr/FID:0x40000/0
    [   35.628248] 		EntrySize/Cnt:64/128
    [   35.631694] 	WTBL Segment 3 info:
    [   35.635051] 		MemBaseAddr/FID:0x42000/64
    [   35.639039] 		EntrySize/Cnt:64/128
    [   35.642485] 	WTBL Segment 4 info:
    [   35.645841] 		MemBaseAddr/FID:0x44000/128
    [   35.649915] 		EntrySize/Cnt:32/128
    [   35.653440] AntCfgInit(3591): Not support for HIF_MT yet!
    [   35.659052] MCS Set = ff ff 00 00 01
    [   35.662681] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
    [   35.669022] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
    [   35.675125] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
    [   35.681456] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
    [   35.688176] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
    [   35.837375] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
    [   35.847550] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
    [   35.854204] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
    [   35.861936] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
    [   35.868146] Main bssid = e4:95:6e:45:24:33
    [   35.872391] <==== rt28xx_init, Status=0
    [   35.876358] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
    [   35.884502] WiFi Startup Cost (ra0): 2.610s
    [   35.889684] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
    [   35.898489] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
    [   35.904621] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
    [   36.972649] tx_kickout_fail_count = 0
    [   36.976378] tx_timeout_fail_count = 0
    [   36.980124] rx_receive_fail_count = 0
    [   36.983834] alloc_cmd_msg = 37
    [   36.986927] free_cmd_msg = 37
    [   36.995222] TX_BCN DESC a6931000 size = 320
    [   36.999599] RX[0] DESC a6933000 size = 2048
    [   37.006711] RX[1] DESC a693c000 size = 1024

kernel log continued…

[   37.041411] prepare to get e2p access------------
[   37.046447] E2pAccessMode=2
[   37.050088] cfg_mode=9
[   37.052479] cfg_mode=9
[   37.054876] wmode_band_equal(): Band Equal!
[   37.063328] APSDCapable[0]=1
[   37.066251] APSDCapable[1]=1
[   37.069188] APSDCapable[2]=1
[   37.072106] APSDCapable[3]=1
[   37.075022] APSDCapable[4]=1
[   37.077961] APSDCapable[5]=1
[   37.080881] APSDCapable[6]=1
[   37.083798] APSDCapable[7]=1
[   37.086717] APSDCapable[8]=1
[   37.089661] APSDCapable[9]=1
[   37.092579] APSDCapable[10]=1
[   37.095585] APSDCapable[11]=1
[   37.098598] APSDCapable[12]=1
[   37.101606] APSDCapable[13]=1
[   37.104611] APSDCapable[14]=1
[   37.107631] APSDCapable[15]=1
[   37.110640] default ApCliAPSDCapable[0]=1
[   37.310132] Key1Str is Invalid key length(0) or Type(0)
[   37.315791] Key2Str is Invalid key length(0) or Type(0)
[   37.321478] Key3Str is Invalid key length(0) or Type(0)
[   37.327139] Key4Str is Invalid key length(0) or Type(0)
[   37.382373] RTMPSetDefaultChannel() : default channel to 1 
[   37.388112] load fw image from fw_header_image
[   37.392619] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   37.398631] FW Version:_e2_mp
[   37.402031] FW Build Date:20150625211422
[   37.406229] CmdReStartDLRsp: WiFI FW Download Success
[   37.787459] CmdAddressLenReq:(ret = 0)
[   37.791987] CmdFwStartReq: override = 1, address = 1048576
[   37.797672] CmdStartDLRsp: WiFI FW Download Success
[   37.817369] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   37.823489] efuse_probe: efuse = 10000012
[   37.827617] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   37.833094] RtmpEepromGetDefault::e2p_dafault=2
[   37.837707] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   37.845379] NVM is FLASH mode
[   37.848459] 1. Phy Mode = 14
[   38.014646] Country Region from e2p = ffff
[   38.018926] tssi_1_target_pwr_g_band = 33
[   38.022999] 2. Phy Mode = 14
[   38.027113] 3. Phy Mode = 14
[   38.030111] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   38.035940] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   38.043890] mt_mac_init()-->
[   38.046811] MtAsicInitMac()-->
[   38.050078] mt7628_init_mac_cr()-->
[   38.053629] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   38.059740] <--mt_mac_init()
[   38.062820] 	WTBL Segment 1 info:
[   38.066179] 		MemBaseAddr/FID:0x28000/0
[   38.070078] 		EntrySize/Cnt:32/128
[   38.073523] 	WTBL Segment 2 info:
[   38.076879] 		MemBaseAddr/FID:0x40000/0
[   38.080780] 		EntrySize/Cnt:64/128
[   38.084226] 	WTBL Segment 3 info:
[   38.087591] 		MemBaseAddr/FID:0x42000/64
[   38.091563] 		EntrySize/Cnt:64/128
[   38.095007] 	WTBL Segment 4 info:
[   38.098378] 		MemBaseAddr/FID:0x44000/128
[   38.102440] 		EntrySize/Cnt:32/128
[   38.105963] AntCfgInit(3591): Not support for HIF_MT yet!
[   38.111591] MCS Set = ff ff 00 00 01
[   38.115224] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   38.121570] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   38.127711] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   38.134029] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   38.140758] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   38.167812] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   38.177870] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   38.184510] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   38.192212] flush result = ffffff
[   38.195568] check pse fid Q7:set_get_fid, q_idx:7 empty!!
[   38.201136] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   38.207350] Main bssid = e4:95:6e:45:24:33
[   38.211624] <==== rt28xx_init, Status=0
[   38.215589] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   38.223791] WiFi Startup Cost (ra0): 1.230s
[   38.230950] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   38.239742] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   38.245837] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   38.922927] tx_kickout_fail_count = 0
[   38.926653] tx_timeout_fail_count = 0
[   38.930417] rx_receive_fail_count = 0
[   38.934127] alloc_cmd_msg = 36
[   38.937221] free_cmd_msg = 36
[   38.945482] TX_BCN DESC a6931000 size = 320
[   38.949856] RX[0] DESC a6933000 size = 2048
[   38.956892] RX[1] DESC a693c000 size = 1024
[   38.974207] prepare to get e2p access------------
[   38.979307] E2pAccessMode=2
[   38.982895] cfg_mode=9
[   38.985285] cfg_mode=9
[   38.987703] wmode_band_equal(): Band Equal!
[   38.996136] APSDCapable[0]=1
[   38.999077] APSDCapable[1]=1
[   39.001995] APSDCapable[2]=1
[   39.004912] APSDCapable[3]=1
[   39.007845] APSDCapable[4]=1
[   39.010764] APSDCapable[5]=1
[   39.013682] APSDCapable[6]=1
[   39.016598] APSDCapable[7]=1
[   39.019537] APSDCapable[8]=1
[   39.022454] APSDCapable[9]=1
[   39.025372] APSDCapable[10]=1
[   39.028387] APSDCapable[11]=1
[   39.031393] APSDCapable[12]=1
[   39.034395] APSDCapable[13]=1
[   39.037427] APSDCapable[14]=1
[   39.040434] APSDCapable[15]=1
[   39.043440] default ApCliAPSDCapable[0]=1
[   39.242927] Key1Str is Invalid key length(0) or Type(0)
[   39.248615] Key2Str is Invalid key length(0) or Type(0)
[   39.254275] Key3Str is Invalid key length(0) or Type(0)
[   39.259962] Key4Str is Invalid key length(0) or Type(0)
[   39.315145] RTMPSetDefaultChannel() : default channel to 1 
[   39.320885] load fw image from fw_header_image
[   39.325390] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   39.331403] FW Version:_e2_mp
[   39.334803] FW Build Date:20150625211422
[   39.339003] CmdReStartDLRsp: WiFI FW Download Success
[   39.344252] CmdAddressLenReq:(ret = 0)
[   39.348803] CmdFwStartReq: override = 1, address = 1048576
[   39.354446] CmdStartDLRsp: WiFI FW Download Success
[   39.359450] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   39.365554] efuse_probe: efuse = 10000012
[   39.369642] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   39.375114] RtmpEepromGetDefault::e2p_dafault=2
[   39.379725] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   39.387405] NVM is FLASH mode
[   39.390467] 1. Phy Mode = 14
[   39.556584] Country Region from e2p = ffff
[   39.560855] tssi_1_target_pwr_g_band = 33
[   39.564927] 2. Phy Mode = 14
[   39.569062] 3. Phy Mode = 14
[   39.571988] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   39.577845] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   39.585780] mt_mac_init()-->
[   39.588743] MtAsicInitMac()-->
[   39.592004] mt7628_init_mac_cr()-->
[   39.595551] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   39.601665] <--mt_mac_init()
[   39.604745] 	WTBL Segment 1 info:
[   39.608112] 		MemBaseAddr/FID:0x28000/0
[   39.611999] 		EntrySize/Cnt:32/128
[   39.615443] 	WTBL Segment 2 info:
[   39.618812] 		MemBaseAddr/FID:0x40000/0
[   39.622700] 		EntrySize/Cnt:64/128
[   39.626143] 	WTBL Segment 3 info:
[   39.629511] 		MemBaseAddr/FID:0x42000/64
[   39.633487] 		EntrySize/Cnt:64/128
[   39.636930] 	WTBL Segment 4 info:
[   39.640302] 		MemBaseAddr/FID:0x44000/128
[   39.644367] 		EntrySize/Cnt:32/128
[   39.647899] AntCfgInit(3591): Not support for HIF_MT yet!
[   39.653513] MCS Set = ff ff 00 00 01
[   39.657142] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   39.663487] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   39.669609] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   39.675926] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   39.682652] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   39.709734] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   39.719790] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   39.726430] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   39.734201] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   39.740418] Main bssid = e4:95:6e:45:24:33
[   39.744649] <==== rt28xx_init, Status=0
[   39.748618] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   39.756768] WiFi Startup Cost (ra0): 0.810s
[   39.766328] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   39.775169] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   39.781299] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   40.472138] tx_kickout_fail_count = 0
[   40.475867] tx_timeout_fail_count = 0
[   40.479605] rx_receive_fail_count = 0
[   40.483315] alloc_cmd_msg = 36
[   40.486407] free_cmd_msg = 36
[   40.495235] TX_BCN DESC a6931000 size = 320
[   40.499613] RX[0] DESC a6933000 size = 2048
[   40.506645] RX[1] DESC a693c000 size = 1024
[   40.574802] prepare to get e2p access------------
[   40.579902] E2pAccessMode=2
[   40.583489] cfg_mode=9
[   40.585880] cfg_mode=9
[   40.588301] wmode_band_equal(): Band Equal!
[   40.596736] APSDCapable[0]=1
[   40.599678] APSDCapable[1]=1
[   40.602596] APSDCapable[2]=1
[   40.605514] APSDCapable[3]=1
[   40.608449] APSDCapable[4]=1
[   40.611366] APSDCapable[5]=1
[   40.614282] APSDCapable[6]=1
[   40.617197] APSDCapable[7]=1
[   40.620134] APSDCapable[8]=1
[   40.623051] APSDCapable[9]=1
[   40.625967] APSDCapable[10]=1
[   40.628981] APSDCapable[11]=1
[   40.631987] APSDCapable[12]=1
[   40.634993] APSDCapable[13]=1
[   40.638013] APSDCapable[14]=1
[   40.641020] APSDCapable[15]=1
[   40.644027] default ApCliAPSDCapable[0]=1
[   40.843527] Key1Str is Invalid key length(0) or Type(0)
[   40.849219] Key2Str is Invalid key length(0) or Type(0)
[   40.854875] Key3Str is Invalid key length(0) or Type(0)
[   40.860566] Key4Str is Invalid key length(0) or Type(0)
[   40.915741] RTMPSetDefaultChannel() : default channel to 1 
[   40.921479] load fw image from fw_header_image
[   40.925985] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   40.931997] FW Version:_e2_mp
[   40.935396] FW Build Date:20150625211422
[   40.939595] CmdReStartDLRsp: WiFI FW Download Success
[   41.024634] CmdAddressLenReq:(ret = 0)
[   41.029200] CmdFwStartReq: override = 1, address = 1048576
[   41.034850] CmdStartDLRsp: WiFI FW Download Success
[   41.039853] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   41.045957] efuse_probe: efuse = 10000012
[   41.050043] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   41.055515] RtmpEepromGetDefault::e2p_dafault=2
[   41.060126] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   41.067807] NVM is FLASH mode
[   41.070868] 1. Phy Mode = 14
[   41.236990] Country Region from e2p = ffff
[   41.241250] tssi_1_target_pwr_g_band = 33
[   41.245323] 2. Phy Mode = 14
[   41.249418] 3. Phy Mode = 14
[   41.252344] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   41.258198] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   41.266134] mt_mac_init()-->
[   41.269097] MtAsicInitMac()-->
[   41.272361] mt7628_init_mac_cr()-->
[   41.275910] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   41.282024] <--mt_mac_init()
[   41.285103] 	WTBL Segment 1 info:
[   41.288471] 		MemBaseAddr/FID:0x28000/0
[   41.292359] 		EntrySize/Cnt:32/128
[   41.295803] 	WTBL Segment 2 info:
[   41.299174] 		MemBaseAddr/FID:0x40000/0
[   41.303060] 		EntrySize/Cnt:64/128
[   41.306504] 	WTBL Segment 3 info:
[   41.309875] 		MemBaseAddr/FID:0x42000/64
[   41.313849] 		EntrySize/Cnt:64/128
[   41.317302] 	WTBL Segment 4 info:
[   41.320661] 		MemBaseAddr/FID:0x44000/128
[   41.324723] 		EntrySize/Cnt:32/128
[   41.328257] AntCfgInit(3591): Not support for HIF_MT yet!
[   41.333874] MCS Set = ff ff 00 00 01
[   41.337528] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   41.343851] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   41.349973] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   41.356288] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   41.363014] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   41.390101] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   41.400160] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   41.406798] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   41.414511] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   41.420719] Main bssid = e4:95:6e:45:24:33
[   41.424950] <==== rt28xx_init, Status=0
[   41.428918] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   41.437060] WiFi Startup Cost (ra0): 0.940s
[   41.603648] device eth0.1 entered promiscuous mode
[   41.608595] device eth0 entered promiscuous mode
[   41.635280] flush result = ffffff
[   41.638703] check pse fid Q7:set_get_fid, q_idx:7 empty!!
[   41.685667] br-lan: port 1(eth0.1) entered forwarding state
[   41.691432] br-lan: port 1(eth0.1) entered forwarding state
[   41.784396] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   41.793218] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   41.799355] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   43.476464] tx_kickout_fail_count = 0
[   43.480251] tx_timeout_fail_count = 0
[   43.483960] rx_receive_fail_count = 0
[   43.487686] alloc_cmd_msg = 36
[   43.490780] free_cmd_msg = 36
[   43.530260] device ra0 entered promiscuous mode
[   43.536129] device ra0 left promiscuous mode
[   43.540628] br-lan: port 2(ra0) entered disabled state
[   43.559907] TX_BCN DESC a6931000 size = 320
[   43.564224] RX[0] DESC a6933000 size = 2048
[   43.571279] RX[1] DESC a693c000 size = 1024
[   43.604616] prepare to get e2p access------------
[   43.609715] E2pAccessMode=2
[   43.613304] cfg_mode=9
[   43.615694] cfg_mode=9
[   43.618110] wmode_band_equal(): Band Equal!
[   43.626547] APSDCapable[0]=1
[   43.629490] APSDCapable[1]=1
[   43.632408] APSDCapable[2]=1
[   43.635325] APSDCapable[3]=1
[   43.638257] APSDCapable[4]=1
[   43.641176] APSDCapable[5]=1
[   43.644094] APSDCapable[6]=1
[   43.647011] APSDCapable[7]=1
[   43.649948] APSDCapable[8]=1
[   43.652867] APSDCapable[9]=1
[   43.655785] APSDCapable[10]=1
[   43.658800] APSDCapable[11]=1
[   43.661804] APSDCapable[12]=1
[   43.664810] APSDCapable[13]=1
[   43.667831] APSDCapable[14]=1
[   43.670836] APSDCapable[15]=1
[   43.673842] default ApCliAPSDCapable[0]=1
[   43.687313] br-lan: port 1(eth0.1) entered forwarding state
[   43.879128] Key1Str is Invalid key length(0) or Type(0)
[   43.884789] Key2Str is Invalid key length(0) or Type(0)
[   43.890476] Key3Str is Invalid key length(0) or Type(0)
[   43.896137] Key4Str is Invalid key length(0) or Type(0)
[   43.951549] RTMPSetDefaultChannel() : default channel to 1 
[   43.957273] load fw image from fw_header_image
[   43.961795] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   43.967801] FW Version:_e2_mp
[   43.971201] FW Build Date:20150625211422
[   43.976060] CmdReStartDLRsp: WiFI FW Download Success
[   44.481895] CmdAddressLenReq:(ret = 0)
[   44.486387] CmdFwStartReq: override = 1, address = 1048576
[   44.492091] CmdStartDLRsp: WiFI FW Download Success
[   44.508455] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   44.514577] efuse_probe: efuse = 10000012
[   44.518680] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   44.524152] RtmpEepromGetDefault::e2p_dafault=2
[   44.528765] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   44.536438] NVM is FLASH mode
[   44.539524] 1. Phy Mode = 14
[   44.705708] Country Region from e2p = ffff
[   44.710022] tssi_1_target_pwr_g_band = 33
[   44.714097] 2. Phy Mode = 14
[   44.718185] 3. Phy Mode = 14
[   44.721112] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   44.726937] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   44.734905] mt_mac_init()-->
[   44.737833] MtAsicInitMac()-->
[   44.741086] mt7628_init_mac_cr()-->
[   44.744633] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   44.750746] <--mt_mac_init()
[   44.753826] 	WTBL Segment 1 info:
[   44.757185] 		MemBaseAddr/FID:0x28000/0
[   44.761084] 		EntrySize/Cnt:32/128
[   44.764528] 	WTBL Segment 2 info:
[   44.767891] 		MemBaseAddr/FID:0x40000/0
[   44.771777] 		EntrySize/Cnt:64/128
[   44.775220] 	WTBL Segment 3 info:
[   44.778591] 		MemBaseAddr/FID:0x42000/64
[   44.782566] 		EntrySize/Cnt:64/128
[   44.786010] 	WTBL Segment 4 info:
[   44.789379] 		MemBaseAddr/FID:0x44000/128
[   44.793442] 		EntrySize/Cnt:32/128
[   44.796966] AntCfgInit(3591): Not support for HIF_MT yet!
[   44.802594] MCS Set = ff ff 00 00 01
[   44.806227] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   44.812602] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   44.818722] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   44.825038] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   44.831771] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   44.858834] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   44.868908] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   44.875550] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   44.883341] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   44.889579] Main bssid = e4:95:6e:45:24:33
[   44.893810] <==== rt28xx_init, Status=0
[   44.897783] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   44.905940] WiFi Startup Cost (ra0): 1.340s
[   44.926448] device ra0 entered promiscuous mode
[   44.931484] br-lan: port 2(ra0) entered forwarding state
[   44.936899] br-lan: port 2(ra0) entered forwarding state
[   45.460250] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[   45.460250] 
[   46.927393] br-lan: port 2(ra0) entered forwarding state
[   53.476955] Rcv Wcid(1) AddBAReq
[   53.480303] Start Seq = 0000001d
[  132.730573] Rcv Wcid(2) AddBAReq
[  132.733915] Start Seq = 00000000
[  132.742827] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[  132.742827] 
[  149.834792] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[  149.834792] 
[  150.049659] Rcv Wcid(3) AddBAReq
[  150.053057] Start Seq = 00000002
[  153.608678] Rcv Wcid(3) AddBAReq
[  153.612201] Start Seq = 00000000
[ 1340.157959] MtPsWatchDog(): HIT PsmPktCount/Dur: 0/1 on Wcid 3 (SW_PSM:[0|0])
[ 1340.157959] 
[ 1340.157959] 
[ 1340.157959] 
[ 1340.157959] 
[ 2360.195740] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 2360.195740] 
[ 2360.666226] Rcv Wcid(2) AddBAReq
[ 2360.670130] Start Seq = 00000002
[ 2450.890411] 46, flush one!
[ 3646.062795] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3646.062795] 
[ 3646.193830] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3646.193830] 
[ 3646.222009] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3646.222009] 
[ 3648.053022] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[ 7247.031938] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 7247.031938] 
[ 7247.116681] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 7247.116681] 
[ 7249.025735] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[10848.014646] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10848.014646] 
[10848.932624] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10848.932624] 
[10850.005031] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[12367.974617] Rcv Wcid(3) AddBAReq
[12367.978019] Start Seq = 00000000
[12367.987108] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[12367.987108] 
[12374.309232] Rcv Wcid(3) AddBAReq
[12374.312863] Start Seq = 00000000
[12379.561269] Rcv Wcid(3) AddBAReq
[12379.564943] Start Seq = 00000000

Admittedly out of my depth here, not really sure how to read the kernel log, but getting a whole lot of these too:

[453773.341790] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[457373.089011] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[457373.089011] 
[457374.279951] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[460974.974221] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[460974.974221] 
[460975.284917] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[464575.000380] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[464575.000380] 
[464576.296944] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[468175.953571] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[468175.953571] 
[468177.281685] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[471776.778063] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[471776.778063] 
[471778.254111] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[475377.559510] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[475377.559510] 
[475379.233811] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[478978.906385] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[478978.906385] 
[478980.233985] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[482581.179375] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[486182.154630] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[489783.168064] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[493384.199274] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[496985.233603] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[500586.229543] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[504187.184729] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[507788.169386] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!

Looks almost as thought the WiFi encryption is being reset repeatedly? Or a client keeps disconnecting and reauthenticating? Any chance I’m reading that right?

Another suspect sequence…

[  648.046451] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[  648.046451] 
[  711.868238] Rcv Wcid(1) AddBAReq
[  711.871536] Start Seq = 00000017
[ 2359.210169] Rcv Wcid(2) AddBAReq
[ 2359.213778] Start Seq = 00000000
[ 2390.534720] 362, flush one!
[ 2648.054652] ca8, flush one!
[ 2650.722042] ddf, flush one!
[ 2651.917505] e19, flush one!
[ 2664.612859] f89, flush one!
[ 2664.983436] f9c, flush one!
[ 2680.429103] 54, flush one!
[ 2681.291714] 59, flush one!
[ 2691.969737] 143, flush one!
[ 2703.697034] 191, flush one!
[ 2704.340725] 1dd, flush one!
[ 2704.912391] 204, flush one!
[ 2705.195180] 217, flush one!
[ 2705.437968] 229, flush one!
[ 2705.953378] 268, flush one!
[ 2707.150527] 27d, flush one!
[ 2720.311559] 333, flush one!
[ 3650.631862] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3650.631862] 
[ 3652.625715] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[ 3959.684902] Rcv Wcid(1) AddBAReq
[ 3959.688414] Start Seq = 00000019
[ 3961.222503] Rcv Wcid(1) AddBAReq
[ 3961.225988] Start Seq = 000005ab
[ 3964.520650] Rcv Wcid(1) AddBAReq
[ 3964.524258] Start Seq = 000005ac
[ 4159.509622] Rcv Wcid(1) AddBAReq
[ 4159.513043] Start Seq = 000005ad
[ 4199.677552] Rcv Wcid(1) AddBAReq
[ 4199.681064] Start Seq = 000007bb
[ 4204.878741] Rcv Wcid(1) AddBAReq
[ 4204.882335] Start Seq = 000007bc
[ 4216.883312] Rcv Wcid(1) AddBAReq
[ 4216.886669] Start Seq = 000007be
[ 4330.782349] Rcv Wcid(1) AddBAReq
[ 4330.785748] Start Seq = 000007bf
[ 4439.658056] Rcv Wcid(1) AddBAReq
[ 4439.661397] Start Seq = 000007c1
[ 4482.076838] Rcv Wcid(1) AddBAReq
[ 4482.080204] Start Seq = 000007d5
[ 4541.141856] Rcv Wcid(1) AddBAReq
[ 4541.145433] Start Seq = 000007d6
[ 4679.686560] Rcv Wcid(1) AddBAReq
[ 4679.689962] Start Seq = 000007d8
[ 4745.070018] Rcv Wcid(1) AddBAReq
[ 4745.073688] Start Seq = 000007db
[ 4919.755851] Rcv Wcid(1) AddBAReq
[ 4919.759210] Start Seq = 000007dd
[ 4985.037579] Rcv Wcid(1) AddBAReq
[ 4985.041152] Start Seq = 000007e0
[ 5159.671856] Rcv Wcid(1) AddBAReq
[ 5159.675497] Start Seq = 000007e2
[ 5225.749266] Rcv Wcid(1) AddBAReq
[ 5225.752698] Start Seq = 000007e5
[ 5285.878772] Rcv Wcid(1) AddBAReq
[ 5285.882194] Start Seq = 000007e6
[ 5316.864220] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 5316.864220] 
[ 5316.907224] Rcv Wcid(2) AddBAReq
[ 5316.910514] Start Seq = 00000002
[ 5318.685765] 4c, flush one!
[ 5319.241961] 83, flush one!
[ 5320.081070] Rcv Wcid(2) AddBAReq
[ 5320.084699] Start Seq = 00000000
[ 5325.400048] 36e, flush one!
[ 5346.077176] Rcv Wcid(1) AddBAReq
[ 5346.080467] Start Seq = 000007e7
[ 5393.225214] 442, flush one!
[ 5394.763510] 47c, flush one!
[ 5395.059777] 485, flush one!
[ 5396.139402] 4a9, flush one!
[ 5397.423214] 4ca, flush one!
[ 5399.695625] Rcv Wcid(1) AddBAReq
[ 5399.699163] Start Seq = 000007e8
[ 5404.682997] 578, flush one!
[ 5406.697908] 5dd, flush one!
[ 5411.342605] 622, flush one!
[ 5412.281607] 637, flush one!
[ 5414.472705] 680, flush one!
[ 5416.273220] 6c6, flush one!
[ 5416.650579] 6dc, flush one!
[ 5417.292738] 6ef, flush one!
[ 5422.938734] 7c6, flush one!
[ 5424.936098] 873, flush one!
[ 5464.931422] Rcv Wcid(1) AddBAReq
[ 5464.934944] Start Seq = 000007ea
[ 5639.668264] Rcv Wcid(1) AddBAReq
[ 5639.671899] Start Seq = 000007ec
[ 5704.834658] Rcv Wcid(1) AddBAReq
[ 5704.838121] Start Seq = 000007ef
[ 5765.920026] Rcv Wcid(1) AddBAReq
[ 5765.923318] Start Seq = 000007f0
[ 5824.819998] Rcv Wcid(1) AddBAReq
[ 5824.823419] Start Seq = 000007f1
[ 5879.753529] Rcv Wcid(1) AddBAReq
[ 5879.757068] Start Seq = 000007f2
[ 5945.110309] Rcv Wcid(1) AddBAReq
[ 5945.113905] Start Seq = 000007f5
[ 6119.086925] Rcv Wcid(1) AddBAReq
[ 6119.090307] Start Seq = 000007f7
[ 6184.441914] Rcv Wcid(1) AddBAReq
[ 6184.445362] Start Seq = 000007fa
[ 6244.601036] Rcv Wcid(1) AddBAReq
[ 6244.604457] Start Seq = 000007fb
[ 6304.491108] Rcv Wcid(1) AddBAReq
[ 6304.494529] Start Seq = 000007fc
[ 6359.371496] Rcv Wcid(1) AddBAReq
[ 6359.375008] Start Seq = 000007fd
[ 6425.083812] Rcv Wcid(1) AddBAReq
[ 6425.087412] Start Seq = 00000800
[ 6599.373651] Rcv Wcid(1) AddBAReq
[ 6599.376991] Start Seq = 00000802
[ 6664.520354] Rcv Wcid(1) AddBAReq
[ 6664.523857] Start Seq = 00000805
[ 6839.473400] Rcv Wcid(1) AddBAReq
[ 6839.477040] Start Seq = 00000807
[ 6905.074402] Rcv Wcid(1) AddBAReq
[ 6905.077825] Start Seq = 0000080a
[ 6964.713447] Rcv Wcid(1) AddBAReq
[ 6964.716881] Start Seq = 0000080b
[ 7025.421946] Rcv Wcid(1) AddBAReq
[ 7025.425379] Start Seq = 0000080c
[ 7079.109101] Rcv Wcid(1) AddBAReq
[ 7079.112465] Start Seq = 0000080d
[ 7145.162253] Rcv Wcid(1) AddBAReq
[ 7145.165545] Start Seq = 0000080f
[ 7251.603737] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 7251.603737] 
[ 7253.596405] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[ 7319.376455] Rcv Wcid(1) AddBAReq
[ 7319.380078] Start Seq = 00000811
[ 7385.103136] Rcv Wcid(1) AddBAReq
[ 7385.106491] Start Seq = 00000814
[ 7445.243137] Rcv Wcid(1) AddBAReq
[ 7445.246614] Start Seq = 00000815
[ 7505.406713] Rcv Wcid(1) AddBAReq
[ 7505.410005] Start Seq = 00000816
[ 7559.383731] Rcv Wcid(1) AddBAReq
[ 7559.387090] Start Seq = 00000817
[ 7624.594811] Rcv Wcid(1) AddBAReq
[ 7624.598389] Start Seq = 00000819
[ 7799.019461] Rcv Wcid(1) AddBAReq
[ 7799.023113] Start Seq = 0000081b
[ 7864.252323] Rcv Wcid(1) AddBAReq
[ 7864.255642] Start Seq = 0000081e
[ 7924.431095] Rcv Wcid(1) AddBAReq
[ 7924.434518] Start Seq = 0000081f
[ 7984.250305] Rcv Wcid(1) AddBAReq
[ 7984.253726] Start Seq = 00000820
[ 8039.297015] Rcv Wcid(1) AddBAReq
[ 8039.300382] Start Seq = 00000821
[ 8104.621789] Rcv Wcid(1) AddBAReq
[ 8104.625307] Start Seq = 00000824
[ 8279.011448] Rcv Wcid(1) AddBAReq
[ 8279.014804] Start Seq = 00000826
[ 8342.405610] Rcv Wcid(1) AddBAReq
[ 8342.409218] Start Seq = 00000829
[ 8404.376850] Rcv Wcid(1) AddBAReq
[ 8404.380271] Start Seq = 0000082a
[ 8464.276146] Rcv Wcid(1) AddBAReq
[ 8464.279570] Start Seq = 0000082b
[ 8519.370585] Rcv Wcid(1) AddBAReq
[ 8519.374130] Start Seq = 0000082c
[ 8585.031306] Rcv Wcid(1) AddBAReq
[ 8585.034665] Start Seq = 0000082f
[ 8759.001717] Rcv Wcid(1) AddBAReq
[ 8759.005354] Start Seq = 00000831
[ 8825.082206] Rcv Wcid(1) AddBAReq
[ 8825.085633] Start Seq = 00000834
[ 8885.232446] Rcv Wcid(1) AddBAReq
[ 8885.235873] Start Seq = 00000835
[ 8945.411968] Rcv Wcid(1) AddBAReq
[ 8945.415260] Start Seq = 00000836
[ 8999.009542] Rcv Wcid(1) AddBAReq
[ 8999.012835] Start Seq = 00000837
[ 9064.449803] Rcv Wcid(1) AddBAReq
[ 9064.453332] Start Seq = 00000839
[ 9239.008325] Rcv Wcid(1) AddBAReq
[ 9239.011618] Start Seq = 0000083b
[ 9304.153136] Rcv Wcid(1) AddBAReq
[ 9304.156603] Start Seq = 0000083e
[ 9364.179400] Rcv Wcid(1) AddBAReq
[ 9364.182822] Start Seq = 0000083f
[ 9424.169349] Rcv Wcid(1) AddBAReq
[ 9424.172770] Start Seq = 00000840
[ 9479.001512] Rcv Wcid(1) AddBAReq
[ 9479.004919] Start Seq = 00000841
[ 9544.218502] Rcv Wcid(1) AddBAReq
[ 9544.222022] Start Seq = 00000843
[ 9719.006536] Rcv Wcid(1) AddBAReq
[ 9719.010066] Start Seq = 00000845
[ 9784.491395] Rcv Wcid(1) AddBAReq
[ 9784.494898] Start Seq = 00000848
[ 9959.036787] Rcv Wcid(1) AddBAReq
[ 9959.040436] Start Seq = 0000084a
[10024.464187] Rcv Wcid(1) AddBAReq
[10024.467610] Start Seq = 0000084d
[10084.624681] Rcv Wcid(1) AddBAReq
[10084.628102] Start Seq = 0000084e
[10144.756459] Rcv Wcid(1) AddBAReq
[10144.759884] Start Seq = 0000084f
[10199.005917] Rcv Wcid(1) AddBAReq
[10199.009210] Start Seq = 00000851
[10264.147238] Rcv Wcid(1) AddBAReq
[10264.150810] Start Seq = 00000852
[10438.998469] Rcv Wcid(1) AddBAReq
[10439.001985] Start Seq = 00000854
[10504.420140] Rcv Wcid(1) AddBAReq
[10504.423432] Start Seq = 00000857
[10564.589831] Rcv Wcid(1) AddBAReq
[10564.593253] Start Seq = 00000858
[10624.789786] Rcv Wcid(1) AddBAReq
[10624.793214] Start Seq = 00000859
[10678.998224] Rcv Wcid(1) AddBAReq
[10679.001741] Start Seq = 0000085a
[10745.083994] Rcv Wcid(1) AddBAReq
[10745.087495] Start Seq = 0000085c
[10852.593286] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10852.593286] 
[10854.586597] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[10919.038349] Rcv Wcid(1) AddBAReq
[10919.041641] Start Seq = 0000085e
[10984.509359] Rcv Wcid(1) AddBAReq
[10984.512651] Start Seq = 00000862
[11044.269950] Rcv Wcid(1) AddBAReq
[11044.273244] Start Seq = 00000862
[11104.762846] Rcv Wcid(1) AddBAReq
[11104.766316] Start Seq = 00000863
[11158.995692] Rcv Wcid(1) AddBAReq
[11158.999090] Start Seq = 00000864
[11225.098007] Rcv Wcid(1) AddBAReq
[11225.101600] Start Seq = 00000866
[11399.000592] Rcv Wcid(1) AddBAReq
[11399.003998] Start Seq = 00000868
[11464.495346] Rcv Wcid(1) AddBAReq
[11464.498806] Start Seq = 0000086b
[11524.514623] Rcv Wcid(1) AddBAReq
[11524.518073] Start Seq = 0000086c
[11584.274561] Rcv Wcid(1) AddBAReq
[11584.277984] Start Seq = 0000086d
[11638.993100] Rcv Wcid(1) AddBAReq
[11638.996619] Start Seq = 0000086e
[11704.505405] Rcv Wcid(1) AddBAReq
[11704.508698] Start Seq = 00000870
[11879.004970] Rcv Wcid(1) AddBAReq
[11879.008653] Start Seq = 00000872
[11944.442758] Rcv Wcid(1) AddBAReq
[11944.446051] Start Seq = 00000875
[12004.617306] Rcv Wcid(1) AddBAReq
[12004.620742] Start Seq = 00000876
[12118.995975] Rcv Wcid(1) AddBAReq
[12118.999426] Start Seq = 00000878
[12184.378585] Rcv Wcid(1) AddBAReq
[12184.382057] Start Seq = 0000087a
[12359.010897] Rcv Wcid(1) AddBAReq
[12359.014248] Start Seq = 0000087c
[12424.347198] Rcv Wcid(1) AddBAReq
[12424.350623] Start Seq = 0000087f
[12484.284995] Rcv Wcid(1) AddBAReq
[12484.288413] Start Seq = 00000880
[12544.274853] Rcv Wcid(1) AddBAReq
[12544.278275] Start Seq = 00000881
[12599.008741] Rcv Wcid(1) AddBAReq
[12599.012287] Start Seq = 00000882
[12664.154314] Rcv Wcid(1) AddBAReq
[12664.157763] Start Seq = 00000884
[12839.358635] Rcv Wcid(1) AddBAReq
[12839.362218] Start Seq = 00000886
[12965.872938] Rcv Wcid(1) AddBAReq
[12965.876231] Start Seq = 0000088a
[13024.751063] Rcv Wcid(1) AddBAReq
[13024.754355] Start Seq = 0000088c
[13079.359183] Rcv Wcid(1) AddBAReq
[13079.362475] Start Seq = 0000088c
[13145.069832] Rcv Wcid(1) AddBAReq
[13145.073356] Start Seq = 0000088e
[13318.991421] Rcv Wcid(1) AddBAReq
[13318.995044] Start Seq = 00000890
[13384.304518] Rcv Wcid(1) AddBAReq
[13384.307810] Start Seq = 00000893
[13444.442701] Rcv Wcid(1) AddBAReq
[13444.446126] Start Seq = 00000894
[13504.243162] Rcv Wcid(1) AddBAReq
[13504.246584] Start Seq = 00000895
[13559.222558] Rcv Wcid(1) AddBAReq
[13559.225850] Start Seq = 00000896
[13624.734239] Rcv Wcid(1) AddBAReq
[13624.737768] Start Seq = 00000899
[13799.360161] Rcv Wcid(1) AddBAReq
[13799.363818] Start Seq = 0000089b
[13865.194672] Rcv Wcid(1) AddBAReq
[13865.198109] Start Seq = 0000089e
[13924.684610] Rcv Wcid(1) AddBAReq
[13924.688037] Start Seq = 0000089f
[13984.750045] Rcv Wcid(1) AddBAReq
[13984.753382] Start Seq = 000008a0
[14039.458121] Rcv Wcid(1) AddBAReq
[14039.461478] Start Seq = 000008a1
[14105.095331] Rcv Wcid(1) AddBAReq
[14105.098907] Start Seq = 000008a4
[14279.458496] Rcv Wcid(1) AddBAReq
[14279.461852] Start Seq = 000008a6
[14344.907525] Rcv Wcid(1) AddBAReq
[14344.911121] Start Seq = 000008a9
[14453.578205] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[14453.578205] 
[14455.571509] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[14519.358581] Rcv Wcid(1) AddBAReq
[14519.362259] Start Seq = 000008ab
[14584.583950] Rcv Wcid(1) AddBAReq
[14584.587467] Start Seq = 000008ae
[14645.312950] Rcv Wcid(1) AddBAReq
[14645.316373] Start Seq = 000008af
[14705.425606] Rcv Wcid(1) AddBAReq
[14705.429035] Start Seq = 000008b0
[14759.360220] Rcv Wcid(1) AddBAReq
[14759.363569] Start Seq = 000008b2
[14825.703982] Rcv Wcid(1) AddBAReq
[14825.707461] Start Seq = 000008b3
[14999.460976] Rcv Wcid(1) AddBAReq
[14999.464502] Start Seq = 000008b5
[15065.081508] Rcv Wcid(1) AddBAReq
[15065.084801] Start Seq = 000008b8
[15125.229890] Rcv Wcid(1) AddBAReq
[15125.233311] Start Seq = 000008b9
[15185.390004] Rcv Wcid(1) AddBAReq
[15185.393427] Start Seq = 000008ba
[15239.355835] Rcv Wcid(1) AddBAReq
[15239.359176] Start Seq = 000008bb
[15304.851579] Rcv Wcid(1) AddBAReq
[15304.854953] Start Seq = 000008bd
[15479.360023] Rcv Wcid(1) AddBAReq
[15479.363642] Start Seq = 000008bf
[15545.047012] Rcv Wcid(1) AddBAReq
[15545.050442] Start Seq = 000008c2
[15605.237169] Rcv Wcid(1) AddBAReq
[15605.240488] Start Seq = 000008c3
[15665.407055] Rcv Wcid(1) AddBAReq
[15665.410493] Start Seq = 000008c4
[15719.360580] Rcv Wcid(1) AddBAReq
[15719.363921] Start Seq = 000008c5
[15784.996422] Rcv Wcid(1) AddBAReq
[15784.999928] Start Seq = 000008c7
[15959.457234] Rcv Wcid(1) AddBAReq
[15959.460556] Start Seq = 000008c9
[16025.094899] Rcv Wcid(1) AddBAReq
[16025.098320] Start Seq = 000008cc
[16085.266879] Rcv Wcid(1) AddBAReq
[16085.270308] Start Seq = 000008cd
[16144.844996] Rcv Wcid(1) AddBAReq
[16144.848442] Start Seq = 000008ce
[16199.352139] Rcv Wcid(1) AddBAReq
[16199.355654] Start Seq = 000008cf
[16265.283931] Rcv Wcid(1) AddBAReq
[16265.287519] Start Seq = 000008d1

OK, here is the complete kernel log from a device that I was able to access remotely through the VPN, while local wifi devices are unable to get to the internet.

[    0.000000] Linux version 4.4.92 (kyson@gl-inet) (gcc version 5.4.0 (LEDE GCC 5.4.0 r3560-79f57e422d) ) #0 Tue Oct 17 17:46:20 2017
[    0.000000] Board has DDR2
[    0.000000] Analog PMU set to hw control
[    0.000000] Digital PMU set to hw control
[    0.000000] SoC Type: MediaTek MT7628AN ver:1 eco:2
[    0.000000] bootconsole [early0] enabled
[    0.000000] CPU0 revision is: 00019655 (MIPS 24KEc)
[    0.000000] MIPS: machine is GL-MT300N-V2
[    0.000000] Determined physical RAM map:
[    0.000000]  memory: 08000000 @ 00000000 (usable)
[    0.000000] Initrd not found or empty - disabling initrd
[    0.000000] Zone ranges:
[    0.000000]   Normal   [mem 0x0000000000000000-0x0000000007ffffff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x0000000000000000-0x0000000007ffffff]
[    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff]
[    0.000000] On node 0 totalpages: 32768
[    0.000000] free_area_init_node: node 0, pgdat 803bc4b0, node_mem_map 81000000
[    0.000000]   Normal zone: 256 pages used for memmap
[    0.000000]   Normal zone: 0 pages reserved
[    0.000000]   Normal zone: 32768 pages, LIFO batch:7
[    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
[    0.000000] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
[    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
[    0.000000] pcpu-alloc: [0] 0 
[    0.000000] Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 32512
[    0.000000] Kernel command line: console=ttyS0,115200 rootfstype=squashfs,jffs2
[    0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
[    0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
[    0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
[    0.000000] Writing ErrCtl register=0000000c
[    0.000000] Readback ErrCtl register=0000000c
[    0.000000] Memory: 125552K/131072K available (3059K kernel code, 145K rwdata, 728K rodata, 156K init, 200K bss, 5520K reserved, 0K cma-reserved)
[    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
[    0.000000] NR_IRQS:256
[    0.000000] intc: using register map from devicetree
[    0.000000] CPU Clock: 575MHz
[    0.000000] clocksource_probe: no matching clocksources found
[    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6647862422 ns
[    0.000012] sched_clock: 32 bits at 287MHz, resolution 3ns, wraps every 7469508094ns
[    0.007529] Calibrating delay loop... 380.92 BogoMIPS (lpj=1904640)
[    0.070011] pid_max: default: 32768 minimum: 301
[    0.074614] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
[    0.080955] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
[    0.094302] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.103808] futex hash table entries: 256 (order: -1, 3072 bytes)
[    0.109841] pinctrl core: initialized pinctrl subsystem
[    0.116259] NET: Registered protocol family 16
[    0.139110] mt7621_gpio 10000600.gpio: registering 32 gpios
[    0.144598] mt7621_gpio 10000600.gpio: registering 32 gpios
[    0.150124] mt7621_gpio 10000600.gpio: registering 32 gpios
[    0.157312] clocksource: Switched to clocksource MIPS
[    0.163786] NET: Registered protocol family 2
[    0.169021] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
[    0.175714] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
[    0.181905] TCP: Hash tables configured (established 1024 bind 1024)
[    0.188104] UDP hash table entries: 256 (order: 0, 4096 bytes)
[    0.193704] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
[    0.200090] NET: Registered protocol family 1
[    0.204292] PCI: CLS 0 bytes, default 32
[    0.209803] Crashlog allocated RAM at address 0x3f00000
[    0.231851] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[    0.237511] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[    0.249802] io scheduler noop registered
[    0.253541] io scheduler deadline registered (default)
[    0.259367] gpio-export gpio_export: 1 gpio(s) exported
[    0.264606] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
[    0.274402] console [ttyS0] disabled
[    0.277894] 10000c00.uartlite: ttyS0 at MMIO 0x10000c00 (irq = 28, base_baud = 2500000) is a 16550A
[    0.286600] console [ttyS0] enabled
[    0.293636] bootconsole [early0] disabled
[    0.303430] spi-mt7621 10000b00.spi: sys_freq: 191666666
[    0.314602] m25p80 spi32766.0: using chunked io (size=32)
[    0.320166] m25p80 spi32766.0: w25q128 (16384 Kbytes)
[    0.325322] 4 ofpart partitions found on MTD device spi32766.0
[    0.331253] Creating 4 MTD partitions on "spi32766.0":
[    0.336471] 0x000000000000-0x000000030000 : "u-boot"
[    0.343357] 0x000000030000-0x000000040000 : "u-boot-env"
[    0.350733] 0x000000040000-0x000000050000 : "factory"
[    0.357770] 0x000000050000-0x000001000000 : "firmware"
[    0.415040] 2 uimage-fw partitions found on MTD device firmware
[    0.421098] 0x000000050000-0x000000192c81 : "kernel"
[    0.427862] 0x000000192c81-0x000001000000 : "rootfs"
[    0.434716] mtd: device 5 (rootfs) set to be root filesystem
[    0.440628] 1 squashfs-split partitions found on MTD device rootfs
[    0.446912] 0x000000a10000-0x000001000000 : "rootfs_data"
[    0.463708] rt3050-esw 10110000.esw: link changed 0x00
[    0.471380] mtk_soc_eth 10100000.ethernet eth0: mediatek frame engine at 0xb0100000, irq 5
[    0.480527] mt7621_wdt 10000120.watchdog: Initialized
[    0.487194] NET: Registered protocol family 10
[    0.495440] NET: Registered protocol family 17
[    0.500123] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
[    0.512950] 8021q: 802.1Q VLAN Support v1.8
[    0.519026] hctosys: unable to open rtc device (rtc0)
[    0.533648] VFS: Mounted root (squashfs filesystem) readonly on device 31:5.
[    0.541736] Freeing unused kernel memory: 156K
[    2.297131] init: Console is alive
[    2.300901] init: - watchdog -
[    6.058303] kmodloader: loading kernel modules from /etc/modules-boot.d/*
[    6.149325] usbcore: registered new interface driver usbfs
[    6.154992] usbcore: registered new interface driver hub
[    6.160545] usbcore: registered new device driver usb
[    6.172264] exFAT: Version 1.2.9
[    6.218484] SCSI subsystem initialized
[    6.229546] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[    6.238234] ehci-platform: EHCI generic platform driver
[    6.253825] phy phy-10120000.usbphy.0: remote usb device wakeup disabled
[    6.260643] phy phy-10120000.usbphy.0: UTMI 16bit 30MHz
[    6.265973] ehci-platform 101c0000.ehci: EHCI Host Controller
[    6.271858] ehci-platform 101c0000.ehci: new USB bus registered, assigned bus number 1
[    6.280049] ehci-platform 101c0000.ehci: irq 26, io mem 0x101c0000
[    6.297335] ehci-platform 101c0000.ehci: USB 2.0 started, EHCI 1.00
[    6.304803] hub 1-0:1.0: USB hub found
[    6.309089] hub 1-0:1.0: 1 port detected
[    6.316677] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[    6.324882] ohci-platform: OHCI generic platform driver
[    6.330523] ohci-platform 101c1000.ohci: Generic Platform OHCI controller
[    6.337491] ohci-platform 101c1000.ohci: new USB bus registered, assigned bus number 2
[    6.345610] ohci-platform 101c1000.ohci: irq 26, io mem 0x101c1000
[    6.412518] hub 2-0:1.0: USB hub found
[    6.416732] hub 2-0:1.0: 1 port detected
[    6.423810] uhci_hcd: USB Universal Host Controller Interface driver
[    6.437966] usbcore: registered new interface driver usb-storage
[    6.445216] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
[    6.454708] init: - preinit -
[    6.713092] usb 1-1: new high-speed USB device number 2 using ehci-platform
[    6.961197] random: procd: uninitialized urandom read (4 bytes read, 12 bits of entropy available)
[    6.971453] usb-storage 1-1:1.0: USB Mass Storage device detected
[    6.988871] scsi host0: usb-storage 1-1:1.0
[    7.395259] rt3050-esw 10110000.esw: link changed 0x00
[    7.988997] scsi 0:0:0:0: CD-ROM            HUAWEI   Mass Storage     2.31 PQ: 0 ANSI: 0
[   11.089839] jffs2: notice: (404) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
[   11.107731] mount_root: switching to jffs2 overlay
[   11.128636] urandom-seed: Seeding with /etc/urandom.seed
[   11.280867] procd: - early -
[   11.283907] procd: - watchdog -
[   11.996767] procd: - watchdog -
[   12.007869] procd: - ubus -
[   12.301069] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
[   12.310766] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
[   12.320027] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
[   12.332859] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
[   12.342093] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
[   12.351415] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
[   12.362417] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
[   12.464821] procd: - init -
[   13.484611] random: jshn: uninitialized urandom read (4 bytes read, 23 bits of entropy available)
[   13.704705] kmodloader: loading kernel modules from /etc/modules.d/*
[   13.772567] random: ubusd: uninitialized urandom read (4 bytes read, 23 bits of entropy available)
[   14.095317] ntfs: driver 2.1.32 [Flags: R/O MODULE].
[   14.154115] Initializing XFRM netlink socket
[   14.170056] NET: Registered protocol family 15
[   14.180668] tun: Universal TUN/TAP device driver, 1.6
[   14.185804] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
[   14.735962] l2tp_core: L2TP core driver, V2.0
[   14.749238] l2tp_netlink: L2TP netlink interface
[   14.776406] gre: GRE over IPv4 demultiplexor driver
[   14.799626] ip_gre: GRE over IPv4 tunneling driver
[   14.823332] ip6_tables: (C) 2000-2006 Netfilter Core Team
[   14.867796] Netfilter messages via NETLINK v0.30.
[   14.901428] ip_set: protocol 6
[   15.198930] i2c /dev entries driver
[   15.246038] Linux video capture interface: v2.00
[   15.362266] u32 classifier
[   15.365023]     input device check on
[   15.368801]     Actions configured
[   15.420218] Mirror/redirect action on
[   15.463580] nf_conntrack version 0.5.0 (1964 buckets, 7856 max)
[   15.513559] usb 1-1: USB disconnect, device number 2
[   15.614432] fuse init (API version 7.23)
[   16.774794] 
[   16.774794] 
[   16.774794] === pAd = c0704000, size = 1354736 ===
[   16.774794] 
[   16.784428] <-- RTMPAllocTxRxRingMemory, Status=0, ErrorValue=0x
[   16.791767] <-- RTMPAllocAdapterBlock, Status=0
[   16.796370] RtmpChipOpsHook(748): Not support for HIF_MT yet!
[   16.802226] mt7628_init()-->
[   16.805152] mt7628_init(FW(8a00), HW(8a01), CHIPID(7628))
[   16.810642] e2.bin mt7628_init(1142)::(2), pChipCap->fw_len(63536)
[   16.816907] mt_bcn_buf_init(289): Not support for HIF_MT yet!
[   16.822742] <--mt7628_init()
[   16.890147] usbcore: registered new interface driver cdc_acm
[   16.895899] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
[   16.929805] usbcore: registered new interface driver cdc_wdm
[   16.970193] ip_tables: (C) 2000-2006 Netfilter Core Team
[   16.984967] usbcore: registered new interface driver ipheth
[   17.156106] usbcore: registered new interface driver usbserial
[   17.162198] usbcore: registered new interface driver usbserial_generic
[   17.168951] usbserial: USB Serial support registered for generic
[   17.319842] xt_time: kernel timezone is -0000
[   17.334334] usbcore: registered new interface driver cdc_ether
[   17.363025] usbcore: registered new interface driver cdc_ncm
[   17.378887] usbcore: registered new interface driver cp210x
[   17.384658] usbserial: USB Serial support registered for cp210x
[   17.410618] gspca_main: v2.14.0 registered
[   17.429816] usbcore: registered new interface driver sonixb
[   17.446638] usbcore: registered new interface driver sonixj
[   17.471330] usbcore: registered new interface driver gspca_zc3xx
[   17.489115] usbcore: registered new interface driver huawei_cdc_ncm
[   17.552710] PPP generic driver version 2.4.2
[   17.568771] PPP MPPE Compression module registered
[   17.583893] NET: Registered protocol family 24
[   17.599219] PPTP driver version 0.8.5
[   17.611217] usbcore: registered new interface driver qmi_wwan
[   17.641711] usbcore: registered new interface driver rndis_host
[   17.652540] usbcore: registered new interface driver sierra
[   17.658393] usbserial: USB Serial support registered for Sierra USB modem
[   17.686383] usbcore: registered new interface driver sierra_net
[   17.729975] usbcore: registered new interface driver uvcvideo
[   17.735814] USB Video Class driver (1.1.1)
[   17.773494] l2tp_ppp: PPPoL2TP kernel driver, V2.0
[   17.787399] usbcore: registered new interface driver option
[   17.793188] usbserial: USB Serial support registered for GSM modem (1-port)
[   17.827753] kmodloader: done loading kernel modules from /etc/modules.d/*
[   20.877936] usb 1-1: new high-speed USB device number 3 using ehci-platform
[   21.104415] option 1-1:1.0: GSM modem (1-port) converter detected
[   21.111057] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB0
[   21.118832] option 1-1:1.1: GSM modem (1-port) converter detected
[   21.125334] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB1
[   21.132988] option 1-1:1.2: GSM modem (1-port) converter detected
[   21.139573] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB2
[   21.147142] option 1-1:1.3: GSM modem (1-port) converter detected
[   21.153740] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB3
[   21.242696] qmi_wwan 1-1:1.4: cdc-wdm0: USB WDM device
[   21.249227] qmi_wwan 1-1:1.4 wwan0: register 'qmi_wwan' at usb-101c0000.ehci-1, WWAN/QMI device, a6:45:9a:ff:9c:71
[   21.260654] usb-storage 1-1:1.6: USB Mass Storage device detected
[   21.312085] scsi host1: usb-storage 1-1:1.6
[   21.317446] usb-storage 1-1:1.7: USB Mass Storage device detected
[   21.347435] scsi host2: usb-storage 1-1:1.7
[   22.906314] scsi 2:0:0:0: Direct-Access     HUAWEI   SD Storage       2.31 PQ: 0 ANSI: 2
[   22.920810] scsi 1:0:0:0: CD-ROM            HUAWEI   Mass Storage     2.31 PQ: 0 ANSI: 0
[   22.930947] sd 2:0:0:0: [sda] 1966080 512-byte logical blocks: (1.01 GB/960 MiB)
[   22.951397] sd 2:0:0:0: [sda] Write Protect is off
[   22.956340] sd 2:0:0:0: [sda] Mode Sense: 0f 0e 00 00
[   23.090762] sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[   23.110160]  sda: sda1
[   23.118454] sd 2:0:0:0: [sda] Attached SCSI removable disk
[   32.371018] TX_BCN DESC a6bf2000 size = 320
[   32.375333] RX[0] DESC a6bf4000 size = 2048
[   32.382635] RX[1] DESC a6bf5000 size = 1024
[   32.541150] prepare to get e2p access------------
[   32.546521] cfg_mode=9
[   32.548976] cfg_mode=9
[   32.551375] wmode_band_equal(): Band Equal!
[   32.558188] APSDCapable[0]=1
[   32.561111] APSDCapable[1]=1
[   32.564028] APSDCapable[2]=1
[   32.566945] APSDCapable[3]=1
[   32.569883] APSDCapable[4]=1
[   32.572801] APSDCapable[5]=1
[   32.575719] APSDCapable[6]=1
[   32.578665] APSDCapable[7]=1
[   32.581584] APSDCapable[8]=1
[   32.584502] APSDCapable[9]=1
[   32.587435] APSDCapable[10]=1
[   32.590442] APSDCapable[11]=1
[   32.593447] APSDCapable[12]=1
[   32.596453] APSDCapable[13]=1
[   32.599473] APSDCapable[14]=1
[   32.602479] APSDCapable[15]=1
[   32.605485] default ApCliAPSDCapable[0]=1
[   32.803173] Key1Str is Invalid key length(0) or Type(0)
[   32.808737] Key2Str is Invalid key length(0) or Type(0)
[   32.814269] Key3Str is Invalid key length(0) or Type(0)
[   32.819831] Key4Str is Invalid key length(0) or Type(0)
[   32.855150] RTMPSetDefaultChannel() : default channel to 1 
[   32.860887] load fw image from fw_header_image
[   32.865392] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   32.871407] FW Version:_e2_mp
[   32.874806] FW Build Date:20150625211422
[   33.828486] CmdSlotTimeSet:(ret = 0)
[   35.255481] CmdAddressLenReq:(ret = 0)
[   35.260095] CmdFwStartReq: override = 1, address = 1048576
[   35.265760] CmdStartDLRsp: WiFI FW Download Success
[   35.287405] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   35.293528] efuse_probe: efuse = 10000012
[   35.297627] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   35.303100] RtmpEepromGetDefault::e2p_dafault=2
[   35.307710] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   35.315383] NVM is FLASH mode
[   35.318458] 1. Phy Mode = 14
[   35.488962] Country Region from e2p = ffff
[   35.493215] tssi_1_target_pwr_g_band = 33
[   35.497285] 2. Phy Mode = 14
[   35.501400] 3. Phy Mode = 14
[   35.504328] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   35.510184] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   35.518135] mt_mac_init()-->
[   35.521055] MtAsicInitMac()-->
[   35.617455] mt7628_init_mac_cr()-->
[   35.621021] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   35.627105] <--mt_mac_init()
[   35.630216] 	WTBL Segment 1 info:
[   35.633577] 		MemBaseAddr/FID:0x28000/0
[   35.637479] 		EntrySize/Cnt:32/128
[   35.640924] 	WTBL Segment 2 info:
[   35.644282] 		MemBaseAddr/FID:0x40000/0
[   35.648188] 		EntrySize/Cnt:64/128
[   35.651635] 	WTBL Segment 3 info:
[   35.654993] 		MemBaseAddr/FID:0x42000/64
[   35.658980] 		EntrySize/Cnt:64/128
[   35.662425] 	WTBL Segment 4 info:
[   35.665783] 		MemBaseAddr/FID:0x44000/128
[   35.669858] 		EntrySize/Cnt:32/128
[   35.673383] AntCfgInit(3591): Not support for HIF_MT yet!
[   35.679002] MCS Set = ff ff 00 00 01
[   35.682634] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   36.262142] SYNC - BBP R4 to 20MHz.l
[   36.575231] SYNC - BBP R4 to 20MHz.l
[   37.035236] SYNC - BBP R4 to 20MHz.l
[   37.476308] SYNC - BBP R4 to 20MHz.l
[   38.026521] SYNC - BBP R4 to 20MHz.l
[   38.557526] SYNC - BBP R4 to 20MHz.l
[   38.936338] SYNC - BBP R4 to 20MHz.l
[   39.465307] SYNC - BBP R4 to 20MHz.l
[   39.807432] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   39.813554] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   39.819922] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   39.826633] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   39.928187] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   39.938400] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   39.945045] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   39.952824] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   39.959033] Main bssid = e4:95:6e:45:21:5b
[   39.963336] <==== rt28xx_init, Status=0
[   40.010672] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   40.018876] WiFi Startup Cost (ra0): 7.650s
[   40.024455] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   40.033233] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   40.039516] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   41.082633] tx_kickout_fail_count = 0
[   41.086362] tx_timeout_fail_count = 0
[   41.090120] rx_receive_fail_count = 0
[   41.093831] alloc_cmd_msg = 51
[   41.096925] free_cmd_msg = 51
[   41.105263] TX_BCN DESC a6bf2000 size = 320
[   41.109637] RX[0] DESC a6bf4000 size = 2048
[   41.116830] RX[1] DESC a6bf5000 size = 1024
[   41.154620] prepare to get e2p access------------
[   41.159722] E2pAccessMode=2
[   41.163309] cfg_mode=9
[   41.165699] cfg_mode=9
[   41.168124] wmode_band_equal(): Band Equal!
[   41.176562] APSDCapable[0]=1
[   41.179507] APSDCapable[1]=1
[   41.182426] APSDCapable[2]=1
[   41.185342] APSDCapable[3]=1
[   41.188276] APSDCapable[4]=1
[   41.191195] APSDCapable[5]=1
[   41.194112] APSDCapable[6]=1
[   41.197029] APSDCapable[7]=1
[   41.199977] APSDCapable[8]=1
[   41.202898] APSDCapable[9]=1
[   41.205814] APSDCapable[10]=1
[   41.208840] APSDCapable[11]=1
[   41.211847] APSDCapable[12]=1
[   41.214852] APSDCapable[13]=1
[   41.217873] APSDCapable[14]=1
[   41.220880] APSDCapable[15]=1
[   41.223887] default ApCliAPSDCapable[0]=1
[   41.423387] Key1Str is Invalid key length(0) or Type(0)
[   41.429079] Key2Str is Invalid key length(0) or Type(0)
[   41.434737] Key3Str is Invalid key length(0) or Type(0)
[   41.440427] Key4Str is Invalid key length(0) or Type(0)
[   41.495663] RTMPSetDefaultChannel() : default channel to 1 
[   41.501411] load fw image from fw_header_image
[   41.505917] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   41.511933] FW Version:_e2_mp
[   41.515332] FW Build Date:20150625211422
[   41.519533] CmdReStartDLRsp: WiFI FW Download Success
[   42.107369] CmdAddressLenReq:(ret = 0)
[   42.111930] CmdFwStartReq: override = 1, address = 1048576
[   42.117622] CmdStartDLRsp: WiFI FW Download Success
[   42.127376] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   42.133492] efuse_probe: efuse = 10000012
[   42.137577] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   42.143050] RtmpEepromGetDefault::e2p_dafault=2
[   42.147695] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   42.155369] NVM is FLASH mode
[   42.158450] 1. Phy Mode = 14
[   42.327922] Country Region from e2p = ffff
[   42.332176] tssi_1_target_pwr_g_band = 33
[   42.336248] 2. Phy Mode = 14
[   42.340349] 3. Phy Mode = 14
[   42.343278] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   42.350143] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   42.358114] mt_mac_init()-->
[   42.361033] MtAsicInitMac()-->
[   42.364340] mt7628_init_mac_cr()-->
[   42.367915] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   42.374002] <--mt_mac_init()
[   42.377080] 	WTBL Segment 1 info:
[   42.380453] 		MemBaseAddr/FID:0x28000/0
[   42.384340] 		EntrySize/Cnt:32/128
[   42.387797] 	WTBL Segment 2 info:
[   42.391155] 		MemBaseAddr/FID:0x40000/0
[   42.395041] 		EntrySize/Cnt:64/128
[   42.398500] 	WTBL Segment 3 info:
[   42.401859] 		MemBaseAddr/FID:0x42000/64
[   42.405831] 		EntrySize/Cnt:64/128
[   42.409288] 	WTBL Segment 4 info:
[   42.412646] 		MemBaseAddr/FID:0x44000/128
[   42.416706] 		EntrySize/Cnt:32/128
[   42.420242] AntCfgInit(3591): Not support for HIF_MT yet!
[   42.425856] MCS Set = ff ff 00 00 01
[   42.429510] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   42.435840] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   42.441958] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   42.448311] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   42.455021] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   42.484292] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   42.494341] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   42.500998] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   42.508772] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   42.514987] Main bssid = e4:95:6e:45:21:5b
[   42.519236] <==== rt28xx_init, Status=0
[   42.523197] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   42.531368] WiFi Startup Cost (ra0): 1.430s
[   42.538988] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   42.547800] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   42.553905] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   43.233626] tx_kickout_fail_count = 0
[   43.237415] tx_timeout_fail_count = 0
[   43.241125] rx_receive_fail_count = 0
[   43.244835] alloc_cmd_msg = 36
[   43.247940] free_cmd_msg = 36
[   43.256194] TX_BCN DESC a6bf2000 size = 320
[   43.260568] RX[0] DESC a6bf4000 size = 2048
[   43.267795] RX[1] DESC a6bf5000 size = 1024
[   43.285061] prepare to get e2p access------------
[   43.290170] E2pAccessMode=2
[   43.293758] cfg_mode=9
[   43.296149] cfg_mode=9
[   43.298564] wmode_band_equal(): Band Equal!
[   43.306998] APSDCapable[0]=1
[   43.309939] APSDCapable[1]=1
[   43.312858] APSDCapable[2]=1
[   43.315774] APSDCapable[3]=1
[   43.318706] APSDCapable[4]=1
[   43.321623] APSDCapable[5]=1
[   43.324539] APSDCapable[6]=1
[   43.327476] APSDCapable[7]=1
[   43.330395] APSDCapable[8]=1
[   43.333312] APSDCapable[9]=1
[   43.336228] APSDCapable[10]=1
[   43.339249] APSDCapable[11]=1
[   43.342255] APSDCapable[12]=1
[   43.345261] APSDCapable[13]=1
[   43.348291] APSDCapable[14]=1
[   43.351295] APSDCapable[15]=1
[   43.354303] default ApCliAPSDCapable[0]=1
[   43.553777] Key1Str is Invalid key length(0) or Type(0)
[   43.559468] Key2Str is Invalid key length(0) or Type(0)
[   43.565127] Key3Str is Invalid key length(0) or Type(0)
[   43.570817] Key4Str is Invalid key length(0) or Type(0)
[   43.626019] RTMPSetDefaultChannel() : default channel to 1 
[   43.631759] load fw image from fw_header_image
[   43.636267] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   43.642281] FW Version:_e2_mp
[   43.645679] FW Build Date:20150625211422
[   43.649880] CmdReStartDLRsp: WiFI FW Download Success
[   43.655122] CmdAddressLenReq:(ret = 0)
[   43.659666] CmdFwStartReq: override = 1, address = 1048576
[   43.665311] CmdStartDLRsp: WiFI FW Download Success

continued…

[   43.670314] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   43.676419] efuse_probe: efuse = 10000012
[   43.680508] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   43.685980] RtmpEepromGetDefault::e2p_dafault=2
[   43.690589] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   43.698275] NVM is FLASH mode
[   43.701336] 1. Phy Mode = 14
[   43.870763] Country Region from e2p = ffff
[   43.875011] tssi_1_target_pwr_g_band = 33
[   43.879108] 2. Phy Mode = 14
[   43.883189] 3. Phy Mode = 14
[   43.886116] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   43.891970] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   43.899945] mt_mac_init()-->
[   43.902868] MtAsicInitMac()-->
[   43.906124] mt7628_init_mac_cr()-->
[   43.909698] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   43.915784] <--mt_mac_init()
[   43.918875] 	WTBL Segment 1 info:
[   43.922236] 		MemBaseAddr/FID:0x28000/0
[   43.926123] 		EntrySize/Cnt:32/128
[   43.929580] 	WTBL Segment 2 info:
[   43.932938] 		MemBaseAddr/FID:0x40000/0
[   43.936822] 		EntrySize/Cnt:64/128
[   43.940279] 	WTBL Segment 3 info:
[   43.943638] 		MemBaseAddr/FID:0x42000/64
[   43.947625] 		EntrySize/Cnt:64/128
[   43.951071] 	WTBL Segment 4 info:
[   43.954429] 		MemBaseAddr/FID:0x44000/128
[   43.958502] 		EntrySize/Cnt:32/128
[   43.962028] AntCfgInit(3591): Not support for HIF_MT yet!
[   43.967662] MCS Set = ff ff 00 00 01
[   43.971294] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   43.977639] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   43.983743] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   43.990075] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   43.996784] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   44.026082] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   44.036138] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   44.042798] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   44.050573] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   44.056766] Main bssid = e4:95:6e:45:21:5b
[   44.061034] <==== rt28xx_init, Status=0
[   44.065005] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   44.073142] WiFi Startup Cost (ra0): 0.820s
[   44.081168] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   44.089953] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   44.096047] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   44.615528] tx_kickout_fail_count = 0
[   44.619315] tx_timeout_fail_count = 0
[   44.623026] rx_receive_fail_count = 0
[   44.626736] alloc_cmd_msg = 36
[   44.629839] free_cmd_msg = 36
[   44.638650] TX_BCN DESC a6bf2000 size = 320
[   44.642963] RX[0] DESC a6bf4000 size = 2048
[   44.650210] RX[1] DESC a6bf5000 size = 1024
[   44.714961] prepare to get e2p access------------
[   44.720061] E2pAccessMode=2
[   44.723649] cfg_mode=9
[   44.726037] cfg_mode=9
[   44.728455] wmode_band_equal(): Band Equal!
[   44.736889] APSDCapable[0]=1
[   44.739841] APSDCapable[1]=1
[   44.742759] APSDCapable[2]=1
[   44.745676] APSDCapable[3]=1
[   44.748610] APSDCapable[4]=1
[   44.751528] APSDCapable[5]=1
[   44.754446] APSDCapable[6]=1
[   44.757383] APSDCapable[7]=1
[   44.760302] APSDCapable[8]=1
[   44.763220] APSDCapable[9]=1
[   44.766137] APSDCapable[10]=1
[   44.769159] APSDCapable[11]=1
[   44.772164] APSDCapable[12]=1
[   44.775169] APSDCapable[13]=1
[   44.778190] APSDCapable[14]=1
[   44.781197] APSDCapable[15]=1
[   44.784203] default ApCliAPSDCapable[0]=1
[   44.983721] Key1Str is Invalid key length(0) or Type(0)
[   44.989412] Key2Str is Invalid key length(0) or Type(0)
[   44.995073] Key3Str is Invalid key length(0) or Type(0)
[   45.000764] Key4Str is Invalid key length(0) or Type(0)
[   45.055964] RTMPSetDefaultChannel() : default channel to 1 
[   45.061703] load fw image from fw_header_image
[   45.066210] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   45.072224] FW Version:_e2_mp
[   45.075630] FW Build Date:20150625211422
[   45.079833] CmdReStartDLRsp: WiFI FW Download Success
[   45.168554] CmdAddressLenReq:(ret = 0)
[   45.173110] CmdFwStartReq: override = 1, address = 1048576
[   45.178833] CmdStartDLRsp: WiFI FW Download Success
[   45.183814] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   45.189944] efuse_probe: efuse = 10000012
[   45.194012] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   45.199498] RtmpEepromGetDefault::e2p_dafault=2
[   45.204094] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   45.211812] NVM is FLASH mode
[   45.214878] 1. Phy Mode = 14
[   45.384321] Country Region from e2p = ffff
[   45.388581] tssi_1_target_pwr_g_band = 33
[   45.392653] 2. Phy Mode = 14
[   45.396806] 3. Phy Mode = 14
[   45.399770] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   45.405598] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   45.413573] mt_mac_init()-->
[   45.416495] MtAsicInitMac()-->
[   45.419765] mt7628_init_mac_cr()-->
[   45.423316] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   45.429427] <--mt_mac_init()
[   45.432507] 	WTBL Segment 1 info:
[   45.435866] 		MemBaseAddr/FID:0x28000/0
[   45.439765] 		EntrySize/Cnt:32/128
[   45.443210] 	WTBL Segment 2 info:
[   45.446565] 		MemBaseAddr/FID:0x40000/0
[   45.450464] 		EntrySize/Cnt:64/128
[   45.453907] 	WTBL Segment 3 info:
[   45.457264] 		MemBaseAddr/FID:0x42000/64
[   45.461253] 		EntrySize/Cnt:64/128
[   45.464698] 	WTBL Segment 4 info:
[   45.468066] 		MemBaseAddr/FID:0x44000/128
[   45.472130] 		EntrySize/Cnt:32/128
[   45.475652] AntCfgInit(3591): Not support for HIF_MT yet!
[   45.481278] MCS Set = ff ff 00 00 01
[   45.484909] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   45.491252] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   45.497374] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   45.503686] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   45.510440] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   45.539708] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   45.549765] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   45.556405] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   45.564183] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   45.570392] Main bssid = e4:95:6e:45:21:5b
[   45.574640] <==== rt28xx_init, Status=0
[   45.578621] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   45.586740] WiFi Startup Cost (ra0): 0.940s
[   45.592245] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   45.600994] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   45.607086] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   46.300548] tx_kickout_fail_count = 0
[   46.304276] tx_timeout_fail_count = 0
[   46.308025] rx_receive_fail_count = 0
[   46.311735] alloc_cmd_msg = 36
[   46.314827] free_cmd_msg = 36
[   46.323054] TX_BCN DESC a6bf2000 size = 320
[   46.327423] RX[0] DESC a6bf4000 size = 2048
[   46.334608] RX[1] DESC a6bf5000 size = 1024
[   46.352114] prepare to get e2p access------------
[   46.357149] E2pAccessMode=2
[   46.360804] cfg_mode=9
[   46.363196] cfg_mode=9
[   46.365594] wmode_band_equal(): Band Equal!
[   46.374046] APSDCapable[0]=1
[   46.376967] APSDCapable[1]=1
[   46.379906] APSDCapable[2]=1
[   46.382824] APSDCapable[3]=1
[   46.385742] APSDCapable[4]=1
[   46.388677] APSDCapable[5]=1
[   46.391596] APSDCapable[6]=1
[   46.394511] APSDCapable[7]=1
[   46.397442] APSDCapable[8]=1
[   46.400360] APSDCapable[9]=1
[   46.403276] APSDCapable[10]=1
[   46.406282] APSDCapable[11]=1
[   46.409301] APSDCapable[12]=1
[   46.412308] APSDCapable[13]=1
[   46.415312] APSDCapable[14]=1
[   46.418341] APSDCapable[15]=1
[   46.421351] default ApCliAPSDCapable[0]=1
[   46.620848] Key1Str is Invalid key length(0) or Type(0)
[   46.626507] Key2Str is Invalid key length(0) or Type(0)
[   46.632195] Key3Str is Invalid key length(0) or Type(0)
[   46.637881] Key4Str is Invalid key length(0) or Type(0)
[   46.693058] RTMPSetDefaultChannel() : default channel to 1 
[   46.698795] load fw image from fw_header_image
[   46.703302] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   46.709314] FW Version:_e2_mp
[   46.712714] FW Build Date:20150625211422
[   46.716904] CmdReStartDLRsp: WiFI FW Download Success
[   46.723861] CmdAddressLenReq:(ret = 0)
[   46.728435] CmdFwStartReq: override = 1, address = 1048576
[   46.734100] CmdStartDLRsp: WiFI FW Download Success
[   46.739114] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   46.745218] efuse_probe: efuse = 10000012
[   46.749307] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   46.754778] RtmpEepromGetDefault::e2p_dafault=2
[   46.759386] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   46.767058] NVM is FLASH mode
[   46.770131] 1. Phy Mode = 14
[   46.939552] Country Region from e2p = ffff
[   46.943787] tssi_1_target_pwr_g_band = 33
[   46.947881] 2. Phy Mode = 14
[   46.951956] 3. Phy Mode = 14
[   46.954882] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   46.960735] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   46.968715] mt_mac_init()-->
[   46.971637] MtAsicInitMac()-->
[   46.974895] mt7628_init_mac_cr()-->
[   46.978470] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   46.984556] <--mt_mac_init()
[   46.987646] 	WTBL Segment 1 info:
[   46.991007] 		MemBaseAddr/FID:0x28000/0
[   46.994892] 		EntrySize/Cnt:32/128
[   46.998349] 	WTBL Segment 2 info:
[   47.001708] 		MemBaseAddr/FID:0x40000/0
[   47.005593] 		EntrySize/Cnt:64/128
[   47.009049] 	WTBL Segment 3 info:
[   47.012408] 		MemBaseAddr/FID:0x42000/64
[   47.016380] 		EntrySize/Cnt:64/128
[   47.019839] 	WTBL Segment 4 info:
[   47.023199] 		MemBaseAddr/FID:0x44000/128
[   47.027259] 		EntrySize/Cnt:32/128
[   47.030795] AntCfgInit(3591): Not support for HIF_MT yet!
[   47.036411] MCS Set = ff ff 00 00 01
[   47.040065] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   47.046387] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   47.052506] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   47.058831] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   47.065539] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   47.094842] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   47.104892] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   47.111546] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   47.119330] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   47.125524] Main bssid = e4:95:6e:45:21:5b
[   47.129787] <==== rt28xx_init, Status=0
[   47.133749] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   47.141882] WiFi Startup Cost (ra0): 0.820s
[   47.243279] device eth0.1 entered promiscuous mode
[   47.248254] device eth0 entered promiscuous mode
[   47.288207] br-lan: port 1(eth0.1) entered forwarding state
[   47.293943] br-lan: port 1(eth0.1) entered forwarding state
[   47.410632] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   47.419415] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0x0
[   47.425509] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   48.654538] tx_kickout_fail_count = 0
[   48.658320] tx_timeout_fail_count = 0
[   48.662030] rx_receive_fail_count = 0
[   48.665739] alloc_cmd_msg = 36
[   48.668841] free_cmd_msg = 36
[   48.677548] device ra0 entered promiscuous mode
[   48.685700] device ra0 left promiscuous mode
[   48.690220] br-lan: port 2(ra0) entered disabled state
[   48.710981] TX_BCN DESC a6bf2000 size = 320
[   48.715293] RX[0] DESC a6bf4000 size = 2048
[   48.722473] RX[1] DESC a6bf5000 size = 1024
[   48.755789] prepare to get e2p access------------
[   48.760897] E2pAccessMode=2
[   48.764486] cfg_mode=9
[   48.766878] cfg_mode=9
[   48.769305] wmode_band_equal(): Band Equal!
[   48.777768] APSDCapable[0]=1
[   48.780689] APSDCapable[1]=1
[   48.783604] APSDCapable[2]=1
[   48.786520] APSDCapable[3]=1
[   48.789454] APSDCapable[4]=1
[   48.792372] APSDCapable[5]=1
[   48.795288] APSDCapable[6]=1
[   48.798225] APSDCapable[7]=1
[   48.801142] APSDCapable[8]=1
[   48.804058] APSDCapable[9]=1
[   48.806974] APSDCapable[10]=1
[   48.809995] APSDCapable[11]=1
[   48.813000] APSDCapable[12]=1
[   48.816006] APSDCapable[13]=1
[   48.819025] APSDCapable[14]=1
[   48.822032] APSDCapable[15]=1
[   48.825039] default ApCliAPSDCapable[0]=1
[   49.024536] Key1Str is Invalid key length(0) or Type(0)
[   49.030224] Key2Str is Invalid key length(0) or Type(0)
[   49.035881] Key3Str is Invalid key length(0) or Type(0)
[   49.041569] Key4Str is Invalid key length(0) or Type(0)
[   49.096755] RTMPSetDefaultChannel() : default channel to 1 
[   49.102497] load fw image from fw_header_image
[   49.107005] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
[   49.113018] FW Version:_e2_mp
[   49.116418] FW Build Date:20150625211422
[   49.120640] CmdReStartDLRsp: WiFI FW Download Success
[   49.135095] CmdAddressLenReq:(ret = 0)
[   49.139647] CmdFwStartReq: override = 1, address = 1048576
[   49.145297] CmdStartDLRsp: WiFI FW Download Success
[   49.150366] MtAsicDMASchedulerInit(): DMA Scheduler Mode=0(LMAC)
[   49.156472] efuse_probe: efuse = 10000012
[   49.160562] RtmpChipOpsEepromHook::e2p_type=2, inf_Type=4
[   49.166034] RtmpEepromGetDefault::e2p_dafault=2
[   49.170645] RtmpChipOpsEepromHook: E2P type(2), E2pAccessMode = 2, E2P default = 2
[   49.178331] NVM is FLASH mode
[   49.181392] 1. Phy Mode = 14
[   49.287313] br-lan: port 1(eth0.1) entered forwarding state
[   49.350818] Country Region from e2p = ffff
[   49.355053] tssi_1_target_pwr_g_band = 33
[   49.359148] 2. Phy Mode = 14
[   49.363218] 3. Phy Mode = 14
[   49.366145] NICInitPwrPinCfg(11): Not support for HIF_MT yet!
[   49.372000] NICInitializeAsic(848): Not support rtmp_mac_sys_reset () for HIF_MT yet!
[   49.379977] mt_mac_init()-->
[   49.382898] MtAsicInitMac()-->
[   49.386763] mt7628_init_mac_cr()-->
[   49.390371] MtAsicSetMacMaxLen(1842): Set the Max RxPktLen=1024!
[   49.396457] <--mt_mac_init()
[   49.399552] 	WTBL Segment 1 info:
[   49.402913] 		MemBaseAddr/FID:0x28000/0
[   49.406801] 		EntrySize/Cnt:32/128
[   49.410261] 	WTBL Segment 2 info:
[   49.413617] 		MemBaseAddr/FID:0x40000/0
[   49.417517] 		EntrySize/Cnt:64/128
[   49.420962] 	WTBL Segment 3 info:
[   49.424319] 		MemBaseAddr/FID:0x42000/64
[   49.428313] 		EntrySize/Cnt:64/128
[   49.431759] 	WTBL Segment 4 info:
[   49.435116] 		MemBaseAddr/FID:0x44000/128
[   49.439193] 		EntrySize/Cnt:32/128
[   49.442718] AntCfgInit(3591): Not support for HIF_MT yet!
[   49.448342] MCS Set = ff ff 00 00 01
[   49.451974] MtAsicSetChBusyStat(1146): Not support for HIF_MT yet!
[   49.458318] [PMF]ap_pmf_init:: apidx=0, MFPC=0, MFPR=0, SHA256=0
[   49.464421] [PMF]RTMPMakeRsnIeCap: RSNIE Capability MFPC=0, MFPR=0
[   49.470754] MtAsicSetRalinkBurstMode(4061): Not support for HIF_MT yet!
[   49.477512] MtAsicSetPiggyBack(1081): Not support for HIF_MT yet!
[   49.611986] MtAsicSetTxPreamble(4040): Not support for HIF_MT yet!
[   49.622115] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[   49.628782] The 2-BSSID mode is enabled, the BSSID byte5 MUST be the multiple of 2
[   49.636546] MtAsicSetPreTbtt(): bss_idx=0, PreTBTT timeout = 0xf0
[   49.642758] Main bssid = e4:95:6e:45:21:5b
[   49.647010] <==== rt28xx_init, Status=0
[   49.650988] mt7628_set_ed_cca: TURN OFF EDCCA  mac 0x10618 = 0xd7083f0f, EDCCA_Status=0
[   49.659135] WiFi Startup Cost (ra0): 0.950s
[   49.966130] device ra0 entered promiscuous mode
[   49.970888] br-lan: port 2(ra0) entered forwarding state
[   49.976301] br-lan: port 2(ra0) entered forwarding state
[   51.967400] br-lan: port 2(ra0) entered forwarding state
[   53.517239] Rcv Wcid(1) AddBAReq
[   53.520641] Start Seq = 00000517
[   53.531230] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[   53.531230] 
[   59.347841] random: nonblocking pool is initialized
[   99.973147] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[   99.973147] 
[  102.284622] Rcv Wcid(2) AddBAReq
[  102.287964] Start Seq = 00000056
[  384.127539] MTSmartCarrierSense(): CSC=UL
[  387.127677] MTSmartCarrierSense(): CSC=H (Default)
[  595.130405] MTSmartCarrierSense(): CSC=UL
[  596.130393] MTSmartCarrierSense(): CSC=H (Default)
[  597.289647] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[  597.289647] 
[  603.369526] Rcv Wcid(2) AddBAReq
[  603.372894] Start Seq = 00000081
[  654.128708] MTSmartCarrierSense(): CSC=UL
[  656.128535] MTSmartCarrierSense(): CSC=H (Default)
[  993.120217] MTSmartCarrierSense(): CSC=UL
[  995.120092] MTSmartCarrierSense(): CSC=H (Default)
[ 1003.120049] MTSmartCarrierSense(): CSC=UL
[ 1006.119879] MTSmartCarrierSense(): CSC=H (Default)
[ 1096.118169] MTSmartCarrierSense(): CSC=L
[ 1097.118141] MTSmartCarrierSense(): CSC=UL
[ 1099.118031] MTSmartCarrierSense(): CSC=H (Default)
[ 1536.112013] MTSmartCarrierSense(): CSC=L
[ 1537.112014] MTSmartCarrierSense(): CSC=UL
[ 1538.112061] MTSmartCarrierSense(): CSC=L
[ 1540.112154] MTSmartCarrierSense(): CSC=UL
[ 1545.111983] MTSmartCarrierSense(): CSC=L
[ 1546.112066] MTSmartCarrierSense(): CSC=UL
[ 1556.111947] MTSmartCarrierSense(): CSC=L
[ 1557.111922] MTSmartCarrierSense(): CSC=UL
[ 1567.111927] MTSmartCarrierSense(): CSC=L
[ 1568.111982] MTSmartCarrierSense(): CSC=UL
[ 1569.111898] MTSmartCarrierSense(): CSC=L
[ 1570.111949] MTSmartCarrierSense(): CSC=UL
[ 1571.111817] MTSmartCarrierSense(): CSC=L
[ 1594.111862] MTSmartCarrierSense(): CSC=UL
[ 1595.111779] MTSmartCarrierSense(): CSC=L
[ 1597.111829] MTSmartCarrierSense(): CSC=UL
[ 1598.111801] MTSmartCarrierSense(): CSC=L
[ 1602.111864] MTSmartCarrierSense(): CSC=UL
[ 1603.111777] MTSmartCarrierSense(): CSC=L
[ 1604.111717] MTSmartCarrierSense(): CSC=H (Default)
[ 1605.059099] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1605.059099] 
[ 1606.183732] Rcv Wcid(2) AddBAReq
[ 1606.187122] Start Seq = 00000045
[ 1615.946898] ---->CmdPsRetrieveStartRspFromCR Entry(wcid=2) ps state(0) is not APPS_RETRIEVE_START_PS
[ 1616.036239] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1616.036239] 
[ 1617.691597] Rcv Wcid(2) AddBAReq
[ 1617.694900] Start Seq = 0000006d
[ 1627.111655] MTSmartCarrierSense(): CSC=L
[ 1628.111679] MTSmartCarrierSense(): CSC=H (Default)
[ 1629.140703] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1629.140703] 
[ 1630.181244] Rcv Wcid(2) AddBAReq
[ 1630.184618] Start Seq = 00000055
[ 1642.980642] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1642.980642] 
[ 1644.127381] Rcv Wcid(2) AddBAReq
[ 1644.130709] Start Seq = 00000044
[ 1664.543568] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1664.543568] 
[ 1666.189551] Rcv Wcid(2) AddBAReq
[ 1666.192992] Start Seq = 00000055
[ 1676.111512] MTSmartCarrierSense(): CSC=L
[ 1677.111555] MTSmartCarrierSense(): CSC=H (Default)
[ 1683.063813] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1683.063813] 
[ 1684.487266] Rcv Wcid(2) AddBAReq
[ 1684.490763] Start Seq = 0000004d
[ 1719.111861] MTSmartCarrierSense(): CSC=L
[ 1720.111877] MTSmartCarrierSense(): CSC=UL
[ 1722.111917] MTSmartCarrierSense(): CSC=L
[ 1723.111925] MTSmartCarrierSense(): CSC=UL
[ 1724.111921] MTSmartCarrierSense(): CSC=L
[ 1725.111971] MTSmartCarrierSense(): CSC=UL
[ 1726.111994] MTSmartCarrierSense(): CSC=L
[ 1728.112047] MTSmartCarrierSense(): CSC=UL
[ 1729.112023] MTSmartCarrierSense(): CSC=L
[ 1731.112062] MTSmartCarrierSense(): CSC=UL
[ 1732.112093] MTSmartCarrierSense(): CSC=L
[ 1733.112066] MTSmartCarrierSense(): CSC=UL
[ 1734.112108] MTSmartCarrierSense(): CSC=L
[ 1735.112092] MTSmartCarrierSense(): CSC=UL
[ 1736.112127] MTSmartCarrierSense(): CSC=L
[ 1737.112146] MTSmartCarrierSense(): CSC=UL
[ 1738.112208] MTSmartCarrierSense(): CSC=L
[ 1739.112191] MTSmartCarrierSense(): CSC=UL
[ 1741.112297] MTSmartCarrierSense(): CSC=L
[ 1743.112227] MTSmartCarrierSense(): CSC=UL
[ 1744.112270] MTSmartCarrierSense(): CSC=L
[ 1745.112253] MTSmartCarrierSense(): CSC=UL
[ 1746.112254] MTSmartCarrierSense(): CSC=L
[ 1747.112409] MTSmartCarrierSense(): CSC=UL
[ 1752.112367] MTSmartCarrierSense(): CSC=L
[ 1753.112382] MTSmartCarrierSense(): CSC=UL
[ 1754.112407] MTSmartCarrierSense(): CSC=L
[ 1756.112419] MTSmartCarrierSense(): CSC=UL
[ 1757.112422] MTSmartCarrierSense(): CSC=L
[ 1758.112450] MTSmartCarrierSense(): CSC=UL
[ 1760.112468] MTSmartCarrierSense(): CSC=L
[ 1761.112510] MTSmartCarrierSense(): CSC=UL
[ 1762.112539] MTSmartCarrierSense(): CSC=L
[ 1763.112687] MTSmartCarrierSense(): CSC=UL
[ 1764.112653] MTSmartCarrierSense(): CSC=L
[ 1765.112524] MTSmartCarrierSense(): CSC=UL
[ 1766.112607] MTSmartCarrierSense(): CSC=L
[ 1767.112605] MTSmartCarrierSense(): CSC=UL
[ 1769.112642] MTSmartCarrierSense(): CSC=L
[ 1776.112767] MTSmartCarrierSense(): CSC=UL
[ 1778.112971] MTSmartCarrierSense(): CSC=L
[ 1780.113149] MTSmartCarrierSense(): CSC=UL
[ 1781.113414] MTSmartCarrierSense(): CSC=L
[ 1782.113626] MTSmartCarrierSense(): CSC=UL
[ 1783.113836] MTSmartCarrierSense(): CSC=L
[ 1784.114109] MTSmartCarrierSense(): CSC=UL
[ 1785.114281] MTSmartCarrierSense(): CSC=L
[ 1786.114546] MTSmartCarrierSense(): CSC=UL
[ 1787.114746] MTSmartCarrierSense(): CSC=L
[ 1788.114929] MTSmartCarrierSense(): CSC=UL
[ 1789.115144] MTSmartCarrierSense(): CSC=L
[ 1790.115577] MTSmartCarrierSense(): CSC=UL
[ 1791.115621] MTSmartCarrierSense(): CSC=L
[ 1792.115788] MTSmartCarrierSense(): CSC=UL
[ 1793.116003] MTSmartCarrierSense(): CSC=L
[ 1794.116257] MTSmartCarrierSense(): CSC=UL
[ 1795.116483] MTSmartCarrierSense(): CSC=L
[ 1796.116706] MTSmartCarrierSense(): CSC=UL
[ 1797.116877] MTSmartCarrierSense(): CSC=L
[ 1800.117482] MTSmartCarrierSense(): CSC=UL
[ 1801.117745] MTSmartCarrierSense(): CSC=H (Default)
[ 1801.158429] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1801.158429] 
[ 1802.122206] Rcv Wcid(2) AddBAReq
[ 1802.125729] Start Seq = 00000044
[ 1807.118982] MTSmartCarrierSense(): CSC=UL
[ 1808.119208] MTSmartCarrierSense(): CSC=L
[ 1809.119445] MTSmartCarrierSense(): CSC=UL
[ 1810.119659] MTSmartCarrierSense(): CSC=L
[ 1811.119842] MTSmartCarrierSense(): CSC=UL
[ 1812.120027] MTSmartCarrierSense(): CSC=H (Default)
[ 1812.754714] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 1812.754714] 
[ 1813.120243] MTSmartCarrierSense(): CSC=UL
[ 1813.302306] Rcv Wcid(2) AddBAReq
[ 1813.305760] Start Seq = 00000044
[ 1814.120633] MTSmartCarrierSense(): CSC=H (Default)
[ 1830.123778] MTSmartCarrierSense(): CSC=L
[ 1860.129659] MTSmartCarrierSense(): CSC=H (Default)
[ 1900.136957] MTSmartCarrierSense(): CSC=L
[ 1901.137110] MTSmartCarrierSense(): CSC=H (Default)
[ 2048.405425] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 2048.405425] 
[ 3175.401887] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3175.401887] 
[ 3196.771005] Rcv Wcid(2) AddBAReq
[ 3196.774348] Start Seq = 00000061
[ 3611.412265] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3611.412265] 
[ 3612.501475] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3612.501475] 
[ 3616.866230] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3616.866230] 
[ 3650.790266] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3650.790266] 
[ 3650.800997] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3650.800997] 
[ 3652.784164] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[ 3900.502040] Rcv Wcid(2) AddBAReq
[ 3900.505335] Start Seq = 00000062
[ 3972.689146] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 3972.689146] 
[ 4036.658380] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4036.658380] 
[ 4249.861989] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4249.861989] 
[ 4303.390327] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4303.390327] 
[ 4320.610450] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4320.610450] 
[ 4373.742047] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4373.742047] 
[ 4388.117693] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4388.117693] 
[ 4406.921224] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4406.921224] 
[ 4419.093407] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4419.093407] 
[ 4453.830453] ---->CmdPsRetrieveStartRspFromCR Entry(wcid=2) ps state(0) is not APPS_RETRIEVE_START_PS
[ 4454.924823] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4454.924823] 
[ 4473.617969] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES

continued…

[ 4473.617969] 
[ 4532.479978] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4532.479978] 
[ 4593.288461] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4593.288461] 
[ 4675.567904] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4675.567904] 
[ 4915.934257] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 4915.934257] 
[ 4998.306869] Rcv Wcid(2) AddBAReq
[ 4998.310162] Start Seq = 00000060
[ 5164.093733] MTSmartCarrierSense(): CSC=L
[ 5166.093645] MTSmartCarrierSense(): CSC=H (Default)
[ 5171.093680] MTSmartCarrierSense(): CSC=L
[ 5184.093552] MTSmartCarrierSense(): CSC=H (Default)
[ 5375.092573] MTSmartCarrierSense(): CSC=L
[ 5376.092591] MTSmartCarrierSense(): CSC=H (Default)
[ 5383.961033] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 5383.961033] 
[ 5385.092526] MTSmartCarrierSense(): CSC=L
[ 5386.798375] Rcv Wcid(2) AddBAReq
[ 5386.801714] Start Seq = 0000005b
[ 5389.092556] MTSmartCarrierSense(): CSC=UL
[ 5390.092505] MTSmartCarrierSense(): CSC=L
[ 5393.092486] MTSmartCarrierSense(): CSC=UL
[ 5394.092571] MTSmartCarrierSense(): CSC=L
[ 5396.092453] MTSmartCarrierSense(): CSC=UL
[ 5397.092476] MTSmartCarrierSense(): CSC=H (Default)
[ 5400.092516] MTSmartCarrierSense(): CSC=L
[ 5401.092511] MTSmartCarrierSense(): CSC=UL
[ 5403.092529] MTSmartCarrierSense(): CSC=L
[ 5405.092501] MTSmartCarrierSense(): CSC=UL
[ 5409.092407] MTSmartCarrierSense(): CSC=H (Default)
[ 5417.092357] MTSmartCarrierSense(): CSC=L
[ 5418.092375] MTSmartCarrierSense(): CSC=H (Default)
[ 5421.092394] MTSmartCarrierSense(): CSC=L
[ 5422.092491] MTSmartCarrierSense(): CSC=UL
[ 5424.092307] MTSmartCarrierSense(): CSC=H (Default)
[ 5429.092342] MTSmartCarrierSense(): CSC=L
[ 5430.092283] MTSmartCarrierSense(): CSC=H (Default)
[ 5442.092333] MTSmartCarrierSense(): CSC=L
[ 5447.092225] MTSmartCarrierSense(): CSC=H (Default)
[ 5578.099203] MTSmartCarrierSense(): CSC=L
[ 5578.210680] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 5578.210680] 
[ 5579.099285] MTSmartCarrierSense(): CSC=H (Default)
[ 5579.656993] Rcv Wcid(2) AddBAReq
[ 5579.660385] Start Seq = 00000048
[ 5599.990781] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 5599.990781] 
[ 5600.274378] Rcv Wcid(2) AddBAReq
[ 5600.277696] Start Seq = 00000039
[ 5631.103846] MTSmartCarrierSense(): CSC=L
[ 5632.103927] MTSmartCarrierSense(): CSC=H (Default)
[ 5664.106700] MTSmartCarrierSense(): CSC=L
[ 5668.106950] MTSmartCarrierSense(): CSC=H (Default)
[ 5682.108129] MTSmartCarrierSense(): CSC=L
[ 5683.108198] MTSmartCarrierSense(): CSC=H (Default)
[ 5730.111978] MTSmartCarrierSense(): CSC=L
[ 5755.113924] MTSmartCarrierSense(): CSC=UL
[ 5756.113988] MTSmartCarrierSense(): CSC=L
[ 5759.114173] MTSmartCarrierSense(): CSC=UL
[ 5760.114282] MTSmartCarrierSense(): CSC=L
[ 5761.114356] MTSmartCarrierSense(): CSC=UL
[ 5762.114466] MTSmartCarrierSense(): CSC=L
[ 5763.114784] MTSmartCarrierSense(): CSC=UL
[ 5764.114584] MTSmartCarrierSense(): CSC=L
[ 5766.114750] MTSmartCarrierSense(): CSC=UL
[ 5767.114817] MTSmartCarrierSense(): CSC=L
[ 5787.116315] MTSmartCarrierSense(): CSC=UL
[ 5788.116506] MTSmartCarrierSense(): CSC=L
[ 5792.116695] MTSmartCarrierSense(): CSC=UL
[ 5793.116736] MTSmartCarrierSense(): CSC=L
[ 5795.116895] MTSmartCarrierSense(): CSC=UL
[ 5796.116957] MTSmartCarrierSense(): CSC=L
[ 5797.117029] MTSmartCarrierSense(): CSC=UL
[ 5798.117105] MTSmartCarrierSense(): CSC=L
[ 5806.117602] MTSmartCarrierSense(): CSC=UL
[ 5807.117571] MTSmartCarrierSense(): CSC=L
[ 5828.118346] MTSmartCarrierSense(): CSC=H (Default)
[ 5879.120520] MTSmartCarrierSense(): CSC=L
[ 5882.120619] MTSmartCarrierSense(): CSC=H (Default)
[ 5972.001417] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 5972.001417] 
[ 5972.670187] Rcv Wcid(2) AddBAReq
[ 5972.673506] Start Seq = 0000004b
[ 6100.827576] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6100.827576] 
[ 6105.763861] Rcv Wcid(2) AddBAReq
[ 6105.767154] Start Seq = 0000005a
[ 6124.029824] MtPsWatchDog(): HIT PsmPktCount/Dur: 0/1 on Wcid 2 (SW_PSM:[0|0])
[ 6124.029824] 
[ 6124.029824] 
[ 6124.029824] 
[ 6124.029824] 
[ 6126.028452] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6126.028452] 
[ 6126.922817] Rcv Wcid(2) AddBAReq
[ 6126.926110] Start Seq = 00000039
[ 6321.845992] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6321.845992] 
[ 6323.059387] Rcv Wcid(2) AddBAReq
[ 6323.062872] Start Seq = 00000057
[ 6352.147928] MTSmartCarrierSense(): CSC=L
[ 6354.147888] MTSmartCarrierSense(): CSC=H (Default)
[ 6359.148075] MTSmartCarrierSense(): CSC=L
[ 6359.273423] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6359.273423] 
[ 6360.148063] MTSmartCarrierSense(): CSC=UL
[ 6360.752228] Rcv Wcid(2) AddBAReq
[ 6360.755539] Start Seq = 00000033
[ 6361.148160] MTSmartCarrierSense(): CSC=H (Default)
[ 6495.152406] MTSmartCarrierSense(): CSC=L
[ 6496.152427] MTSmartCarrierSense(): CSC=UL
[ 6497.152457] MTSmartCarrierSense(): CSC=L
[ 6498.152486] MTSmartCarrierSense(): CSC=UL
[ 6499.152527] MTSmartCarrierSense(): CSC=L
[ 6501.152593] MTSmartCarrierSense(): CSC=UL
[ 6502.152600] MTSmartCarrierSense(): CSC=L
[ 6503.152665] MTSmartCarrierSense(): CSC=UL
[ 6508.152801] MTSmartCarrierSense(): CSC=L
[ 6509.152831] MTSmartCarrierSense(): CSC=UL
[ 6510.152854] MTSmartCarrierSense(): CSC=L
[ 6511.152892] MTSmartCarrierSense(): CSC=UL
[ 6512.152924] MTSmartCarrierSense(): CSC=L
[ 6514.152996] MTSmartCarrierSense(): CSC=UL
[ 6516.152998] MTSmartCarrierSense(): CSC=L
[ 6517.153051] MTSmartCarrierSense(): CSC=UL
[ 6519.153095] MTSmartCarrierSense(): CSC=L
[ 6525.152942] MTSmartCarrierSense(): CSC=H (Default)
[ 6533.260104] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6533.260104] 
[ 6539.762686] Rcv Wcid(2) AddBAReq
[ 6539.766278] Start Seq = 00000066
[ 6543.688162] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6543.688162] 
[ 6545.004912] Rcv Wcid(2) AddBAReq
[ 6545.008382] Start Seq = 0000005b
[ 6576.733259] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6576.733259] 
[ 6577.447820] Rcv Wcid(2) AddBAReq
[ 6577.451121] Start Seq = 0000003a
[ 6905.326200] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6905.326200] 
[ 6911.355098] Rcv Wcid(2) AddBAReq
[ 6911.358435] Start Seq = 00000046
[ 6949.425402] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6949.425402] 
[ 6949.999055] Rcv Wcid(2) AddBAReq
[ 6950.002377] Start Seq = 0000003e
[ 6963.770241] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6963.770241] 
[ 6965.063780] Rcv Wcid(2) AddBAReq
[ 6965.067135] Start Seq = 0000004a
[ 6970.255502] Rcv Wcid(2) AddBAReq
[ 6970.258850] Start Seq = 000000e3
[ 6976.892565] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 6976.892565] 
[ 6977.891448] Rcv Wcid(2) AddBAReq
[ 6977.894769] Start Seq = 00000047
[ 7050.620837] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 7050.620837] 
[ 7051.083693] Rcv Wcid(2) AddBAReq
[ 7051.087066] Start Seq = 00000036
[ 7251.828002] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 7251.828002] 
[ 7253.822582] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[ 8949.123813] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 8949.123813] 
[ 8952.222864] Rcv Wcid(2) AddBAReq
[ 8952.226216] Start Seq = 00000042
[ 8964.073566] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 8964.073566] 
[ 8970.226138] Rcv Wcid(2) AddBAReq
[ 8970.229664] Start Seq = 00000055
[ 8976.793292] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 8976.793292] 
[ 8983.218143] Rcv Wcid(2) AddBAReq
[ 8983.221720] Start Seq = 00000058
[ 9087.962262] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9087.962262] 
[ 9091.212240] Rcv Wcid(2) AddBAReq
[ 9091.215605] Start Seq = 00000055
[ 9102.106869] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9102.106869] 
[ 9105.186939] Rcv Wcid(2) AddBAReq
[ 9105.190231] Start Seq = 0000003c
[ 9653.252439] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9653.252439] 
[ 9659.713743] Rcv Wcid(2) AddBAReq
[ 9659.717034] Start Seq = 00000064
[ 9668.885568] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9668.885568] 
[ 9673.194271] Rcv Wcid(2) AddBAReq
[ 9673.197657] Start Seq = 00000055
[ 9683.306898] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9683.306898] 
[ 9701.126776] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9701.126776] 
[ 9706.708421] Rcv Wcid(2) AddBAReq
[ 9706.711852] Start Seq = 0000003e
[ 9846.660038] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9846.660038] 
[ 9852.698680] Rcv Wcid(2) AddBAReq
[ 9852.702324] Start Seq = 0000004d
[ 9857.285521] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9857.285521] 
[ 9858.820537] Rcv Wcid(2) AddBAReq
[ 9858.823830] Start Seq = 0000003c
[ 9901.685741] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[ 9901.685741] 
[ 9907.804763] Rcv Wcid(2) AddBAReq
[ 9907.808107] Start Seq = 00000052
[10172.585153] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10172.585153] 
[10178.792458] Rcv Wcid(2) AddBAReq
[10178.795851] Start Seq = 00000050
[10231.463463] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10231.463463] 
[10237.704179] Rcv Wcid(2) AddBAReq
[10237.707542] Start Seq = 0000005a
[10242.545233] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10242.545233] 
[10248.698702] Rcv Wcid(2) AddBAReq
[10248.702049] Start Seq = 0000005a
[10286.153417] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10286.153417] 
[10292.195385] Rcv Wcid(2) AddBAReq
[10292.198901] Start Seq = 00000051
[10344.232950] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10344.232950] 
[10351.212259] Rcv Wcid(2) AddBAReq
[10351.215600] Start Seq = 00000060
[10442.125066] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10442.125066] 
[10448.447511] Rcv Wcid(2) AddBAReq
[10448.450865] Start Seq = 00000057
[10469.897487] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10469.897487] 
[10476.197809] Rcv Wcid(2) AddBAReq
[10476.201135] Start Seq = 0000004f
[10480.823724] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10480.823724] 
[10487.198421] Rcv Wcid(2) AddBAReq
[10487.201715] Start Seq = 0000005b
[10491.417200] Rcv Wcid(2) AddBAReq
[10491.420553] Start Seq = 000000cc
[10493.112305] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10493.112305] 
[10496.278880] Rcv Wcid(2) AddBAReq
[10496.282197] Start Seq = 0000005e
[10522.116856] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10522.116856] 
[10529.197582] Rcv Wcid(2) AddBAReq
[10529.200875] Start Seq = 00000060
[10548.324888] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10548.324888] 
[10554.702462] Rcv Wcid(2) AddBAReq
[10554.705814] Start Seq = 00000048
[10558.711915] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10558.711915] 
[10561.103780] Rcv Wcid(2) AddBAReq
[10561.107344] Start Seq = 0000003a
[10596.416964] ---->CmdPsRetrieveStartRspFromCR Entry(wcid=2) ps state(0) is not APPS_RETRIEVE_START_PS
[10596.511824] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10596.511824] 
[10602.694015] Rcv Wcid(2) AddBAReq
[10602.697337] Start Seq = 00000051
[10608.708220] ---->CmdPsRetrieveStartRspFromCR Entry(wcid=2) ps state(0) is not APPS_RETRIEVE_START_PS
[10609.801740] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10609.801740] 
[10613.558663] Rcv Wcid(2) AddBAReq
[10613.561957] Start Seq = 00000039
[10773.542174] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10773.542174] 
[10781.688276] Rcv Wcid(2) AddBAReq
[10781.691580] Start Seq = 00000042
[10852.798474] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10852.798474] 
[10854.792052] MtAsicAddSharedKeyEntry(1909): Not support for HIF_MT yet!
[10875.770692] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[10875.770692] 
[10882.321494] Rcv Wcid(2) AddBAReq
[10882.324837] Start Seq = 0000006f
[11010.010000] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11010.010000] 
[11016.321771] Rcv Wcid(2) AddBAReq
[11016.325083] Start Seq = 00000060
[11040.600751] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11040.600751] 
[11044.801581] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11044.801581] 
[11048.181579] Rcv Wcid(2) AddBAReq
[11048.184872] Start Seq = 00000042
[11057.829833] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11057.829833] 
[11061.232932] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11061.232932] 
[11064.722130] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11064.722130] 
[11067.685971] Rcv Wcid(2) AddBAReq
[11067.689294] Start Seq = 0000004a
[11078.819750] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11078.819750] 
[11087.180377] Rcv Wcid(2) AddBAReq
[11087.183737] Start Seq = 00000055
[11093.589833] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11093.589833] 
[11099.790109] Rcv Wcid(2) AddBAReq
[11099.793460] Start Seq = 00000060
[11363.239044] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11363.239044] 
[11367.173107] Rcv Wcid(2) AddBAReq
[11367.176425] Start Seq = 00000060
[11375.059076] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11375.059076] 
[11375.498264] Rcv Wcid(2) AddBAReq
[11375.501629] Start Seq = 00000069
[11390.914171] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11390.914171] 
[11393.610545] Rcv Wcid(2) AddBAReq
[11393.613895] Start Seq = 00000048
[11904.277716] AP SETKEYS DONE - WPA2, AuthMode(7)=WPA2PSK, WepStatus(6)=AES, GroupWepStatus(6)=AES
[11904.277716] 
[11907.776763] Rcv Wcid(2) AddBAReq
[11907.780117] Start Seq = 00000046

Here is the system log to accompany it (truncated, but you get the idea)…

Mon Sep 24 22:16:56 2018 kern.info kernel: [    0.533648] VFS: Mounted root (squashfs filesystem) readonly on device 31:5.
Mon Sep 24 22:16:56 2018 kern.info kernel: [    0.541736] Freeing unused kernel memory: 156K
Mon Sep 24 22:16:56 2018 user.info kernel: [    2.297131] init: Console is alive
Mon Sep 24 22:16:56 2018 user.info kernel: [    2.300901] init: - watchdog -
Mon Sep 24 22:16:56 2018 user.info kernel: [    6.058303] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.149325] usbcore: registered new interface driver usbfs
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.154992] usbcore: registered new interface driver hub
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.160545] usbcore: registered new device driver usb
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.172264] exFAT: Version 1.2.9
Mon Sep 24 22:16:56 2018 kern.notice kernel: [    6.218484] SCSI subsystem initialized
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.229546] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.238234] ehci-platform: EHCI generic platform driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.253825] phy phy-10120000.usbphy.0: remote usb device wakeup disabled
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.260643] phy phy-10120000.usbphy.0: UTMI 16bit 30MHz
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.265973] ehci-platform 101c0000.ehci: EHCI Host Controller
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.271858] ehci-platform 101c0000.ehci: new USB bus registered, assigned bus number 1
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.280049] ehci-platform 101c0000.ehci: irq 26, io mem 0x101c0000
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.297335] ehci-platform 101c0000.ehci: USB 2.0 started, EHCI 1.00
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.304803] hub 1-0:1.0: USB hub found
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.309089] hub 1-0:1.0: 1 port detected
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.316677] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.324882] ohci-platform: OHCI generic platform driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.330523] ohci-platform 101c1000.ohci: Generic Platform OHCI controller
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.337491] ohci-platform 101c1000.ohci: new USB bus registered, assigned bus number 2
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.345610] ohci-platform 101c1000.ohci: irq 26, io mem 0x101c1000
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.412518] hub 2-0:1.0: USB hub found
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.416732] hub 2-0:1.0: 1 port detected
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.423810] uhci_hcd: USB Universal Host Controller Interface driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.437966] usbcore: registered new interface driver usb-storage
Mon Sep 24 22:16:56 2018 user.info kernel: [    6.445216] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Mon Sep 24 22:16:56 2018 user.info kernel: [    6.454708] init: - preinit -
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.713092] usb 1-1: new high-speed USB device number 2 using ehci-platform
Mon Sep 24 22:16:56 2018 kern.notice kernel: [    6.961197] random: procd: uninitialized urandom read (4 bytes read, 12 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.971453] usb-storage 1-1:1.0: USB Mass Storage device detected
Mon Sep 24 22:16:56 2018 kern.info kernel: [    6.988871] scsi host0: usb-storage 1-1:1.0
Mon Sep 24 22:16:56 2018 kern.info kernel: [    7.395259] rt3050-esw 10110000.esw: link changed 0x00
Mon Sep 24 22:16:56 2018 kern.notice kernel: [    7.988997] scsi 0:0:0:0: CD-ROM            HUAWEI   Mass Storage     2.31 PQ: 0 ANSI: 0
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   11.089839] jffs2: notice: (404) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
Mon Sep 24 22:16:56 2018 user.info kernel: [   11.107731] mount_root: switching to jffs2 overlay
Mon Sep 24 22:16:56 2018 user.warn kernel: [   11.128636] urandom-seed: Seeding with /etc/urandom.seed
Mon Sep 24 22:16:56 2018 user.info kernel: [   11.280867] procd: - early -
Mon Sep 24 22:16:56 2018 user.info kernel: [   11.283907] procd: - watchdog -
Mon Sep 24 22:16:56 2018 user.info kernel: [   11.996767] procd: - watchdog -
Mon Sep 24 22:16:56 2018 user.info kernel: [   12.007869] procd: - ubus -
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   12.301069] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   12.310766] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   12.320027] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   12.332859] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   12.342093] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   12.351415] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   12.362417] random: ubusd: uninitialized urandom read (4 bytes read, 21 bits of entropy available)
Mon Sep 24 22:16:56 2018 user.info kernel: [   12.464821] procd: - init -
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   13.484611] random: jshn: uninitialized urandom read (4 bytes read, 23 bits of entropy available)
Mon Sep 24 22:16:56 2018 user.info kernel: [   13.704705] kmodloader: loading kernel modules from /etc/modules.d/*
Mon Sep 24 22:16:56 2018 kern.notice kernel: [   13.772567] random: ubusd: uninitialized urandom read (4 bytes read, 23 bits of entropy available)
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.095317] ntfs: driver 2.1.32 [Flags: R/O MODULE].
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.154115] Initializing XFRM netlink socket
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.170056] NET: Registered protocol family 15
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.180668] tun: Universal TUN/TAP device driver, 1.6
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.185804] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.735962] l2tp_core: L2TP core driver, V2.0
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.749238] l2tp_netlink: L2TP netlink interface
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.776406] gre: GRE over IPv4 demultiplexor driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.799626] ip_gre: GRE over IPv4 tunneling driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.823332] ip6_tables: (C) 2000-2006 Netfilter Core Team
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.867796] Netfilter messages via NETLINK v0.30.
Mon Sep 24 22:16:56 2018 kern.info kernel: [   14.901428] ip_set: protocol 6
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.198930] i2c /dev entries driver
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.246038] Linux video capture interface: v2.00
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.362266] u32 classifier
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.365023]     input device check on
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.368801]     Actions configured
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.420218] Mirror/redirect action on
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.463580] nf_conntrack version 0.5.0 (1964 buckets, 7856 max)
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.513559] usb 1-1: USB disconnect, device number 2
Mon Sep 24 22:16:56 2018 kern.info kernel: [   15.614432] fuse init (API version 7.23)
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.774794] 
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.774794] 
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.774794] === pAd = c0704000, size = 1354736 ===
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.774794] 
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.784428] <-- RTMPAllocTxRxRingMemory, Status=0, ErrorValue=0x
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.791767] <-- RTMPAllocAdapterBlock, Status=0
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.796370] RtmpChipOpsHook(748): Not support for HIF_MT yet!
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.802226] mt7628_init()-->
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.805152] mt7628_init(FW(8a00), HW(8a01), CHIPID(7628))
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.810642] e2.bin mt7628_init(1142)::(2), pChipCap->fw_len(63536)
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.816907] mt_bcn_buf_init(289): Not support for HIF_MT yet!
Mon Sep 24 22:16:56 2018 kern.warn kernel: [   16.822742] <--mt7628_init()
Mon Sep 24 22:16:56 2018 kern.info kernel: [   16.890147] usbcore: registered new interface driver cdc_acm
Mon Sep 24 22:16:56 2018 kern.info kernel: [   16.895899] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Mon Sep 24 22:16:56 2018 kern.info kernel: [   16.929805] usbcore: registered new interface driver cdc_wdm
Mon Sep 24 22:16:56 2018 kern.info kernel: [   16.970193] ip_tables: (C) 2000-2006 Netfilter Core Team
Mon Sep 24 22:16:56 2018 kern.info kernel: [   16.984967] usbcore: registered new interface driver ipheth
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.156106] usbcore: registered new interface driver usbserial
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.162198] usbcore: registered new interface driver usbserial_generic
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.168951] usbserial: USB Serial support registered for generic
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.319842] xt_time: kernel timezone is -0000
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.334334] usbcore: registered new interface driver cdc_ether
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.363025] usbcore: registered new interface driver cdc_ncm
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.378887] usbcore: registered new interface driver cp210x
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.384658] usbserial: USB Serial support registered for cp210x
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.410618] gspca_main: v2.14.0 registered
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.429816] usbcore: registered new interface driver sonixb
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.446638] usbcore: registered new interface driver sonixj
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.471330] usbcore: registered new interface driver gspca_zc3xx
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.489115] usbcore: registered new interface driver huawei_cdc_ncm
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.552710] PPP generic driver version 2.4.2
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.568771] PPP MPPE Compression module registered
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.583893] NET: Registered protocol family 24
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.599219] PPTP driver version 0.8.5
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.611217] usbcore: registered new interface driver qmi_wwan
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.641711] usbcore: registered new interface driver rndis_host
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.652540] usbcore: registered new interface driver sierra
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.658393] usbserial: USB Serial support registered for Sierra USB modem
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.686383] usbcore: registered new interface driver sierra_net
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.729975] usbcore: registered new interface driver uvcvideo
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.735814] USB Video Class driver (1.1.1)
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.773494] l2tp_ppp: PPPoL2TP kernel driver, V2.0
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.787399] usbcore: registered new interface driver option
Mon Sep 24 22:16:56 2018 kern.info kernel: [   17.793188] usbserial: USB Serial support registered for GSM modem (1-port)
Mon Sep 24 22:16:56 2018 user.info kernel: [   17.827753] kmodloader: done loading kernel modules from /etc/modules.d/*
Mon Sep 24 22:16:56 2018 kern.info kernel: [   20.877936] usb 1-1: new high-speed USB device number 3 using ehci-platform
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.104415] option 1-1:1.0: GSM modem (1-port) converter detected
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.111057] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB0
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.118832] option 1-1:1.1: GSM modem (1-port) converter detected
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.125334] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB1
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.132988] option 1-1:1.2: GSM modem (1-port) converter detected
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.139573] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB2
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.147142] option 1-1:1.3: GSM modem (1-port) converter detected
Mon Sep 24 22:16:56 2018 kern.info kernel: [   21.153740] usb 1-1: GSM modem (1-port) converter now attached to ttyUSB3
Mon Sep 24 22:16:57 2018 kern.info kernel: [   21.242696] qmi_wwan 1-1:1.4: cdc-wdm0: USB WDM device
Mon Sep 24 22:16:57 2018 kern.info kernel: [   21.249227] qmi_wwan 1-1:1.4 wwan0: register 'qmi_wwan' at usb-101c0000.ehci-1, WWAN/QMI device, a6:45:9a:ff:9c:71
Mon Sep 24 22:16:57 2018 kern.info kernel: [   21.260654] usb-storage 1-1:1.6: USB Mass Storage device detected
Mon Sep 24 22:16:57 2018 kern.info kernel: [   21.312085] scsi host1: usb-storage 1-1:1.6
Mon Sep 24 22:16:57 2018 kern.info kernel: [   21.317446] usb-storage 1-1:1.7: USB Mass Storage device detected
Mon Sep 24 22:16:57 2018 kern.info kernel: [   21.347435] scsi host2: usb-storage 1-1:1.7
Mon Sep 24 22:16:58 2018 kern.notice kernel: [   22.906314] scsi 2:0:0:0: Direct-Access     HUAWEI   SD Storage       2.31 PQ: 0 ANSI: 2
Mon Sep 24 22:16:58 2018 kern.notice kernel: [   22.920810] scsi 1:0:0:0: CD-ROM            HUAWEI   Mass Storage     2.31 PQ: 0 ANSI: 0
Mon Sep 24 22:16:58 2018 kern.notice kernel: [   22.930947] sd 2:0:0:0: [sda] 1966080 512-byte logical blocks: (1.01 GB/960 MiB)
Mon Sep 24 22:16:58 2018 kern.notice kernel: [   22.951397] sd 2:0:0:0: [sda] Write Protect is off
Mon Sep 24 22:16:58 2018 kern.debug kernel: [   22.956340] sd 2:0:0:0: [sda] Mode Sense: 0f 0e 00 00
Mon Sep 24 22:16:58 2018 kern.notice kernel: [   23.090762] sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Mon Sep 24 22:16:58 2018 kern.info kernel: [   23.110160]  sda: sda1
Mon Sep 24 22:16:58 2018 kern.notice kernel: [   23.118454] sd 2:0:0:0: [sda] Attached SCSI removable disk
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: cat: can't open '/var/run/ovpn_client.pid': No such file or directory
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Failed to connect to ubus
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[0] (lan) cannot resolve device of network 'lan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'wan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'wan6'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'modem'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'tethering'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'DROIDTETHER'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'modem'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[0] (lan) has no device, network, subnet or extra options
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) has no device, network, subnet or extra options
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[2] (VPN_client) has no device, network, subnet or extra options
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv4 filter table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv4 nat table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv4 mangle table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv4 filter table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-DHCP-Renew'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-Ping'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-IGMP'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-IPSec-ESP'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ISAKMP'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'glservice'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'lan' -> 'wan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv4 nat table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv4 mangle table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv6 filter table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv6 mangle table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv6 filter table
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-DHCPv6'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-MLD'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ICMPv6-Input'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ICMPv6-Forward'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-IPSec-ESP'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ISAKMP'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'glservice'
Mon Sep 24 22:17:00 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'lan' -> 'wan'
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv6 mangle table
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_ecn to off
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_syncookies to on
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_window_scaling to on
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Running script '/usr/share/miniupnpd/firewall.include'
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Failed to parse json data: unexpected end of data
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Failed to parse json data: unexpected end of data
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Running script '/var/etc/shadowsocks.include'
Mon Sep 24 22:17:01 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    ! Skipping due to path error: No such file or directory
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Failed to connect to ubus
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[0] (lan) cannot resolve device of network 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'wan6'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'modem'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'tethering'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'DROIDTETHER'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) cannot resolve device of network 'modem'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section 'vpn_zone' cannot resolve device of network 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[0] (lan) has no device, network, subnet or extra options
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Warning: Section @zone[1] (wan) has no device, network, subnet or extra options
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv4 filter table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv4 nat table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv4 mangle table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv4 filter table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-DHCP-Renew'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-Ping'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-IGMP'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-IPSec-ESP'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ISAKMP'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'glservice'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'lan' -> 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'lan' -> 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'VPN_client' -> 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv4 nat table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv4 mangle table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv6 filter table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Clearing IPv6 mangle table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv6 filter table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-DHCPv6'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-MLD'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ICMPv6-Input'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ICMPv6-Forward'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-IPSec-ESP'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'Allow-ISAKMP'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Rule 'glservice'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'lan' -> 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'lan' -> 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Forward 'VPN_client' -> 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Populating IPv6 mangle table
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'lan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'wan'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    * Zone 'VPN_client'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_ecn to off
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_syncookies to on
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Set tcp_window_scaling to on
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Running script '/usr/share/miniupnpd/firewall.include'
Mon Sep 24 22:17:02 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 24 22:17:03 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 24 22:17:03 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Failed to parse json data: unexpected end of data
Mon Sep 24 22:17:03 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Command failed: Not found
Mon Sep 24 22:17:03 2018 daemon.notice procd: /etc/rc.d/S19initswitch: Failed to parse json data: unexpected end of data
Mon Sep 24 22:17:03 2018 daemon.notice procd: /etc/rc.d/S19initswitch:  * Running script '/var/etc/shadowsocks.include'
Mon Sep 24 22:17:03 2018 daemon.notice procd: /etc/rc.d/S19initswitch:    ! Skipping due to path error: No such file or directory
Mon Sep 24 22:17:06 2018 user.notice : Added device handler type: 8021ad
Mon Sep 24 22:17:06 2018 user.notice : Added device handler type: 8021q
Mon Sep 24 22:17:06 2018 user.notice : Added device handler type: macvlan
Mon Sep 24 22:17:06 2018 user.notice : Added device handler type: bridge
Mon Sep 24 22:17:06 2018 user.notice : Added device handler type: Network device
Mon Sep 24 22:17:06 2018 user.notice : Added device handler type: tunnel
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.371018] TX_BCN DESC a6bf2000 size = 320
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.375333] RX[0] DESC a6bf4000 size = 2048
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.382635] RX[1] DESC a6bf5000 size = 1024
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.541150] prepare to get e2p access------------
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.546521] cfg_mode=9
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.548976] cfg_mode=9

syslog continued…

Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.551375] wmode_band_equal(): Band Equal!
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.558188] APSDCapable[0]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.561111] APSDCapable[1]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.564028] APSDCapable[2]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.566945] APSDCapable[3]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.569883] APSDCapable[4]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.572801] APSDCapable[5]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.575719] APSDCapable[6]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.578665] APSDCapable[7]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.581584] APSDCapable[8]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.584502] APSDCapable[9]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.587435] APSDCapable[10]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.590442] APSDCapable[11]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.593447] APSDCapable[12]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.596453] APSDCapable[13]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.599473] APSDCapable[14]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.602479] APSDCapable[15]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.605485] default ApCliAPSDCapable[0]=1
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.803173] Key1Str is Invalid key length(0) or Type(0)
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.808737] Key2Str is Invalid key length(0) or Type(0)
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.814269] Key3Str is Invalid key length(0) or Type(0)
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.819831] Key4Str is Invalid key length(0) or Type(0)
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.855150] RTMPSetDefaultChannel() : default channel to 1 
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.860887] load fw image from fw_header_image
Mon Sep 24 22:17:08 2018 kern.warn kernel: [   32.865392] AndesMTLoadFwMethod1(2548)::pChipCap->fw_len(63536)
Mon Sep 24 22:17:11 2018 authpriv.info dropbear[1693]: Not backgrounding
Mon Sep 24 22:17:11 2018 daemon.notice openvpn[1402]: OpenVPN 2.4.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Sep 24 22:17:11 2018 daemon.notice openvpn[1402]: library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
Mon Sep 24 22:17:11 2018 daemon.warn openvpn[1736]: WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Mon Sep 24 22:17:12 2018 daemon.notice openvpn[1736]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 22:17:12 2018 daemon.notice openvpn[1736]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 22:17:14 2018 daemon.notice procd: /etc/rc.d/S50mjpg-streamer: /etc/rc.d/S50mjpg-streamer: device '/dev/video0' does not exist
Mon Sep 24 22:17:17 2018 daemon.err openvpn[1736]: RESOLVE: Cannot resolve host address: mothership.thervitguy.com:1194 (Try again)
Mon Sep 24 22:17:17 2018 user.notice root: drv_ralink_cleanup
Mon Sep 24 22:17:22 2018 daemon.err openvpn[1736]: RESOLVE: Cannot resolve host address: mothership.thervitguy.com:1194 (Try again)
Mon Sep 24 22:17:22 2018 daemon.warn openvpn[1736]: Could not determine IPv4/IPv6 protocol
Mon Sep 24 22:17:22 2018 daemon.notice openvpn[1736]: SIGUSR1[soft,init_instance] received, process restarting
Mon Sep 24 22:17:22 2018 daemon.notice openvpn[1736]: Restart pause, 60 second(s)
Mon Sep 24 22:17:23 2018 daemon.notice netifd: Interface 'lan' is enabled
Mon Sep 24 22:17:23 2018 daemon.notice netifd: Interface 'lan' is setting up now
Mon Sep 24 22:17:23 2018 daemon.notice netifd: Interface 'lan' is now up
Mon Sep 24 22:17:24 2018 daemon.err insmod: module is already loaded - xt_multiport
Mon Sep 24 22:17:24 2018 daemon.err insmod: module is already loaded - xt_connmark
Mon Sep 24 22:17:24 2018 daemon.err insmod: module is already loaded - xt_comment
Mon Sep 24 22:17:24 2018 daemon.err insmod: module is already loaded - xt_length
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Interface 'loopback' is enabled
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Interface 'loopback' is setting up now
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Interface 'loopback' is now up
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Interface 'modem' is setting up now
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Interface 'wan' is enabled
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Interface 'wan6' is enabled
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Network device 'ra0' link is up
Mon Sep 24 22:17:25 2018 daemon.notice netifd: bridge 'br-lan' link is up
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Interface 'lan' has link connectivity 
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Network device 'eth0' link is up
Mon Sep 24 22:17:25 2018 daemon.notice netifd: VLAN 'eth0.1' link is up
Mon Sep 24 22:17:25 2018 daemon.notice netifd: Network device 'lo' link is up
Mon Sep 24 22:17:26 2018 daemon.notice netifd: Interface 'loopback' has link connectivity 
Mon Sep 24 22:17:26 2018 daemon.notice netifd: VLAN 'eth0.2' link is up
Mon Sep 24 22:17:26 2018 daemon.notice netifd: Interface 'wan' has link connectivity 
Mon Sep 24 22:17:26 2018 daemon.notice netifd: Interface 'wan' is setting up now
Mon Sep 24 22:17:26 2018 daemon.notice netifd: Interface 'wan6' has link connectivity 
Mon Sep 24 22:17:26 2018 daemon.notice netifd: Interface 'wan6' is setting up now
Mon Sep 24 22:17:27 2018 daemon.notice netifd: wan (2264): udhcpc: started, v1.25.1
Mon Sep 24 22:17:27 2018 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Mon Sep 24 22:17:28 2018 daemon.notice netifd: modem (2186): "Failed to connect to service"
Mon Sep 24 22:17:28 2018 daemon.notice netifd: modem (2186): Waiting for network registration
Mon Sep 24 22:17:28 2018 daemon.notice netifd: wan (2264): udhcpc: sending discover
Mon Sep 24 22:17:28 2018 daemon.notice netifd: modem (2186): Starting network modem
Mon Sep 24 22:17:28 2018 daemon.notice netifd: modem (2186): Setting up wwan0
Mon Sep 24 22:17:29 2018 daemon.notice netifd: Interface 'modem' is now up
Mon Sep 24 22:17:29 2018 daemon.notice netifd: Network device 'wwan0' link is up
Mon Sep 24 22:17:29 2018 daemon.notice netifd: Network alias 'wwan0' link is up
Mon Sep 24 22:17:29 2018 daemon.notice netifd: Interface 'modem_4' is enabled
Mon Sep 24 22:17:29 2018 daemon.notice netifd: Interface 'modem_4' has link connectivity 
Mon Sep 24 22:17:29 2018 daemon.notice netifd: Interface 'modem_4' is setting up now
Mon Sep 24 22:17:29 2018 daemon.notice netifd: modem (2186): Command failed: Unknown error
Mon Sep 24 22:17:29 2018 daemon.notice netifd: modem_4 (2464): udhcpc: started, v1.25.1
Mon Sep 24 22:17:29 2018 daemon.notice netifd: modem_4 (2464): udhcpc: sending discover
Mon Sep 24 22:17:29 2018 daemon.notice netifd: modem_4 (2464): udhcpc: sending select for 25.188.235.108
Mon Sep 24 22:17:29 2018 daemon.notice netifd: modem_4 (2464): udhcpc: lease of 25.188.235.108 obtained, lease time 7200
Mon Sep 24 22:17:30 2018 daemon.notice netifd: Interface 'modem_4' is now up
Mon Sep 24 22:17:31 2018 daemon.err insmod: module is already loaded - xt_multiport
Mon Sep 24 22:17:31 2018 daemon.notice netifd: wan (2264): udhcpc: sending discover
Mon Sep 24 22:17:31 2018 daemon.err insmod: module is already loaded - xt_connmark
Mon Sep 24 22:17:31 2018 daemon.err insmod: module is already loaded - xt_comment
Mon Sep 24 22:17:31 2018 daemon.err insmod: module is already loaded - xt_length
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: started, version 2.78 cachesize 150
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq-dhcp[2731]: DHCP, IP range 10.29.21.100 -- 10.29.21.249, lease time 12h
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using nameserver 8.8.4.4#53
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using nameserver 8.8.8.8#53
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using local addresses only for domain RVITclient.lan
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: reading /tmp/resolv.conf.auto
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using nameserver 8.8.4.4#53
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using nameserver 8.8.8.8#53
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using local addresses only for domain RVITclient.lan
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using nameserver 8.8.8.8#53
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: using nameserver 8.8.4.4#53
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: read /etc/hosts - 4 addresses
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq[2731]: read /tmp/hosts/dhcp.cfg02411c - 3 addresses
Mon Sep 24 22:17:32 2018 daemon.info dnsmasq-dhcp[2731]: read /etc/ethers - 0 addresses
Mon Sep 24 22:17:34 2018 daemon.notice netifd: wan (2264): udhcpc: sending discover
Mon Sep 24 22:17:34 2018 daemon.notice procd: /etc/rc.d/S90startvpn: OpenVPN already started... Exiting. - JAB
Mon Sep 24 22:17:35 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led wifi
Mon Sep 24 22:17:35 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led vpn
Mon Sep 24 22:17:36 2018 daemon.notice procd: /etc/rc.d/S99ss-server: 
Mon Sep 24 22:17:36 2018 daemon.info procd: - init complete -
Mon Sep 24 22:17:37 2018 user.notice mwan3: ifup interface modem (wwan0)
Mon Sep 24 22:30:46 2018 user.notice firewall: Reloading firewall due to ifup of modem (wwan0)
Mon Sep 24 22:30:46 2018 daemon.info dnsmasq-dhcp[2731]: DHCPDISCOVER(br-lan) b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:46 2018 daemon.info dnsmasq-dhcp[2731]: DHCPOFFER(br-lan) 10.29.21.230 b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:49 2018 daemon.info dnsmasq-dhcp[2731]: DHCPDISCOVER(br-lan) b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:49 2018 daemon.info dnsmasq-dhcp[2731]: DHCPOFFER(br-lan) 10.29.21.230 b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:49 2018 daemon.info dnsmasq-dhcp[2731]: DHCPDISCOVER(br-lan) b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:49 2018 daemon.info dnsmasq-dhcp[2731]: DHCPOFFER(br-lan) 10.29.21.230 b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:49 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.230 b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:49 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.230 b0:ee:7b:c4:fe:b9 
Mon Sep 24 22:30:50 2018 daemon.notice ntfs-3g[3286]: Version 2016.2.22 integrated FUSE 27
Mon Sep 24 22:30:50 2018 daemon.notice ntfs-3g[3286]: Mounted /dev/sda1 (Read-Write, label "RVIT_tools", NTFS 3.1)
Mon Sep 24 22:30:50 2018 daemon.notice ntfs-3g[3286]: Cmdline options: utf8
Mon Sep 24 22:30:50 2018 daemon.notice ntfs-3g[3286]: Mount options: utf8,allow_other,nonempty,relatime,fsname=/dev/sda1,blkdev,blksize=4096
Mon Sep 24 22:30:50 2018 daemon.notice ntfs-3g[3286]: Ownership and permissions disabled, configuration type 1
Mon Sep 24 22:31:19 2018 daemon.info dnsmasq[2731]: read /etc/hosts - 4 addresses
Mon Sep 24 22:31:19 2018 daemon.info dnsmasq[2731]: read /tmp/hosts/dhcp.cfg02411c - 3 addresses
Mon Sep 24 22:31:19 2018 daemon.info dnsmasq-dhcp[2731]: read /etc/ethers - 0 addresses
Mon Sep 24 22:31:23 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:31:23 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:31:27 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:31:27 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:31:30 2018 daemon.warn openvpn[1736]: WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: TCP/UDP: Preserving recently used remote address: [AF_INET]35.170.208.208:1194
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: Socket Buffers: R=[163840->200000] S=[163840->200000]
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: UDP link local: (not bound)
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: UDP link remote: [AF_INET]35.170.208.208:1194
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: TLS: Initial packet from [AF_INET]35.170.208.208:1194, sid=01078a1b 10fb6afa
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: VERIFY OK: depth=1, CN=OpenVPN CA
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: VERIFY OK: nsCertType=SERVER
Mon Sep 24 22:31:30 2018 daemon.notice openvpn[1736]: VERIFY OK: depth=0, CN=OpenVPN Server
Mon Sep 24 22:31:32 2018 daemon.notice openvpn[1736]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Mon Sep 24 22:31:32 2018 daemon.notice openvpn[1736]: [OpenVPN Server] Peer Connection Initiated with [AF_INET]35.170.208.208:1194
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1)
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: PUSH: Received control message: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 15,ping-restart 75,comp-lzo yes,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway 10.27.0.145,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,register-dns,block-ipv6,ifconfig 10.27.0.150 255.255.255.240'
Mon Sep 24 22:31:33 2018 daemon.warn openvpn[1736]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:4: dhcp-pre-release (2.4.3)
Mon Sep 24 22:31:33 2018 daemon.warn openvpn[1736]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: dhcp-renew (2.4.3)
Mon Sep 24 22:31:33 2018 daemon.warn openvpn[1736]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:6: dhcp-release (2.4.3)
Mon Sep 24 22:31:33 2018 daemon.warn openvpn[1736]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:17: register-dns (2.4.3)
Mon Sep 24 22:31:33 2018 daemon.warn openvpn[1736]: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:18: block-ipv6 (2.4.3)
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: OPTIONS IMPORT: explicit notify parm(s) modified
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: OPTIONS IMPORT: compression parms modified
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: OPTIONS IMPORT: route options modified
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: OPTIONS IMPORT: route-related options modified
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 22:31:33 2018 daemon.notice netifd: Interface 'VPN_client' is enabled
Mon Sep 24 22:31:33 2018 daemon.notice netifd: Network device 'tun0' link is up
Mon Sep 24 22:31:33 2018 daemon.notice netifd: Interface 'VPN_client' has link connectivity 
Mon Sep 24 22:31:33 2018 daemon.notice netifd: Interface 'VPN_client' is setting up now
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: TUN/TAP device tun0 opened
Mon Sep 24 22:31:33 2018 daemon.notice netifd: Interface 'VPN_client' is now up
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: TUN/TAP TX queue length set to 100
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: /sbin/ip link set dev tun0 up mtu 1500
Mon Sep 24 22:31:33 2018 daemon.notice openvpn[1736]: /sbin/ip addr add dev tun0 10.27.0.150/28 broadcast 10.27.0.159
Mon Sep 24 22:31:34 2018 user.notice firewall: Reloading firewall due to ifup of VPN_client (tun0)
Mon Sep 24 22:31:38 2018 daemon.notice openvpn[1736]: /sbin/ip route add 35.170.208.208/32 via 25.188.235.105
Mon Sep 24 22:31:38 2018 daemon.notice openvpn[1736]: /sbin/ip route add 0.0.0.0/1 via 10.27.0.145
Mon Sep 24 22:31:38 2018 daemon.notice openvpn[1736]: /sbin/ip route add 128.0.0.0/1 via 10.27.0.145
Mon Sep 24 22:31:38 2018 daemon.warn openvpn[1736]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Sep 24 22:31:38 2018 daemon.notice openvpn[1736]: Initialization Sequence Completed
Mon Sep 24 22:39:40 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:39:40 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:39:45 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:39:45 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:56:28 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:56:28 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:56:39 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:56:39 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:56:52 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:56:52 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:56:55 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:56:55 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:57:06 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 
Mon Sep 24 22:57:06 2018 daemon.info dnsmasq-dhcp[2731]: DHCPACK(br-lan) 10.29.21.123 60:57:18:80:c7:c1 DESKTOP-D666TCA
Mon Sep 24 22:57:28 2018 daemon.info dnsmasq-dhcp[2731]: DHCPREQUEST(br-lan) 10.29.21.123 60:57:18:80:c7:c1 

DHCP CHATTER LIKE THIS CONTINUES…

I’m wondering if there is some jacka$$ doing a deauth attack on the wifi trying to gain free wifi.

causing the router to lock up - or at least cause the customer inability to use any of the devices on the network.

try disabling SSID broadcast - you’d probably have to change it too, if this is the case. if customer is in a smallish location turn the router transmit power down to decrease ability of the remote attacker to connect. honestly I’m not to sure how to fully combat this.

I have been at hotels where this has happened, its annoying as hell.