Unexpected reboot GL-AX1800 Flint

Hi,
I have a GL-AX1800 Flint at home, and Yesterday it just reboot itself.
I was home and did not notice, but the uptime or the info in the Overview panel shows that it was rebooted.
I checked the logs, but I could not find them at all.
Would someone be able to help me find them? I already checked the folder/files that OpenWrt OS should create but no luck.
Thanks
Piero

can you share the device log? you can find it in System->Log

Hi,
the log for that day, and probably unexpected reboot, was gone from the System->Log.
There is any file that I can check to have olders log?
thanks
Cheers
Piero

Hi,
I think that it happened again, I could copy the logs, and as you can see, there is a 5 minutes gap between 21:32:32 and 21:38:42.
Please let me know if you see anything strange or if you have any suggestions.
I checked the logs, and there seems to be no sensible information in them. Otherwise, please let me know, and I will delete them

Summary

Tue Mar 14 21:32:20 2023 kern.info kernel: [ 3.995971] ehci-platform: EHCI generic platform driver
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 3.999684] ohci_hcd: USB 1.1 ‘Open’ Host Controller (OHCI) Driver
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.002339] ohci-platform: OHCI generic platform driver
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.009212] uhci_hcd: USB Universal Host Controller Interface driver
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 4.014769] ipq6018-pinctrl 1000000.pinctrl: pin GPIO_0 already requested by soc:gpio-export; cannot claim for 8af8800.usb3
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 4.019935] ipq6018-pinctrl 1000000.pinctrl: pin-0 (8af8800.usb3) status -22
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 4.030818] ipq6018-pinctrl 1000000.pinctrl: could not request pin 0 (GPIO_0) from group gpio0 on device 1000000.pinctrl
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 4.038085] dwc3-qcom 8af8800.usb3: Error applying setting, reverse things back
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.051996] msm-usb-ssphy-qmp 78000.ssphy: Initializing QMP phy
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 4.065419] msm-usb-ssphy-qmp 78000.ssphy: QMP PHY initialization timeout
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 4.065445] msm-usb-ssphy-qmp 78000.ssphy: USB3_PHY_PCS_STATUS:68686868
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.277875] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.277917] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.283166] xhci-hcd xhci-hcd.0.auto: hcc params 0x0220fe65 hci version 0x110 quirks 0x00010010
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.289868] xhci-hcd xhci-hcd.0.auto: irq 186, io mem 0x08a00000
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.298952] hub 1-0:1.0: USB hub found
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.304760] hub 1-0:1.0: 1 port detected
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.308518] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.312375] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.317749] usb usb2: We don’t know the algorithms for LPM for this host, disabling LPM.
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.325626] hub 2-0:1.0: USB hub found
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.333560] hub 2-0:1.0: 1 port detected
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.339187] usbcore: registered new interface driver usb-storage
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.341955] usbcore: registered new interface driver uas
Tue Mar 14 21:32:20 2023 user.info kernel: [ 4.347265] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Tue Mar 14 21:32:20 2023 user.info kernel: [ 4.353311] init: - preinit -
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.734549] usb 2-1: new SuperSpeed USB device number 2 using xhci-hcd
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.756342] usb-storage 2-1:1.0: USB Mass Storage device detected
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 4.756591] scsi host0: usb-storage 2-1:1.0
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 5.755745] scsi 0:0:0:0: Direct-Access SanDisk Ultra USB 3.0 1.00 PQ: 0 ANSI: 6
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 5.756789] sd 0:0:0:0: [sda] 60062500 512-byte logical blocks: (30.8 GB/28.6 GiB)
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 5.763575] sd 0:0:0:0: [sda] Write Protect is off
Tue Mar 14 21:32:20 2023 kern.debug kernel: [ 5.770305] sd 0:0:0:0: [sda] Mode Sense: 43 00 00 00
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 5.770626] sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn’t support DPO or FUA
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 5.782091] sda: sda1
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 5.785627] sd 0:0:0:0: [sda] Attached SCSI removable disk
Tue Mar 14 21:32:20 2023 user.info kernel: [ 9.112935] mount_root: loading kmods from internal overlay
Tue Mar 14 21:32:20 2023 user.info kernel: [ 9.125375] kmodloader: loading kernel modules from //etc/modules-boot.d/*
Tue Mar 14 21:32:20 2023 user.info kernel: [ 9.127149] kmodloader: done loading kernel modules from //etc/modules-boot.d/*
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.241829] UBIFS (ubi0:2): background thread “ubifs_bgt0_2” started, PID 243
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.277218] UBIFS (ubi0:2): recovery needed
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.392901] UBIFS (ubi0:2): recovery completed
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.392973] UBIFS (ubi0:2): UBIFS: mounted UBI device 0, volume 2, name “rootfs_data”
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.396260] UBIFS (ubi0:2): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.404145] UBIFS (ubi0:2): FS size: 60440576 bytes (57 MiB, 476 LEBs), journal size 3047424 bytes (2 MiB, 24 LEBs)
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.414050] UBIFS (ubi0:2): reserved for root: 2854757 bytes (2787 KiB)
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.424278] UBIFS (ubi0:2): media format: w4/r0 (latest is w4/r0), UUID B18A8EF6-80AE-41E7-A2E0-A1A4AC7F1E1F, small LPT model
Tue Mar 14 21:32:20 2023 user.info kernel: [ 10.432127] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Tue Mar 14 21:32:20 2023 user.info kernel: [ 10.447616] block: extroot: not configured
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.484481] UBIFS (ubi0:2): un-mount UBI device 0
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.484511] UBIFS (ubi0:2): background thread “ubifs_bgt0_2” stops
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.490852] UBIFS (ubi0:2): background thread “ubifs_bgt0_2” started, PID 244
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.554612] UBIFS (ubi0:2): UBIFS: mounted UBI device 0, volume 2, name “rootfs_data”
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.554641] UBIFS (ubi0:2): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.561421] UBIFS (ubi0:2): FS size: 60440576 bytes (57 MiB, 476 LEBs), journal size 3047424 bytes (2 MiB, 24 LEBs)
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.571332] UBIFS (ubi0:2): reserved for root: 2854757 bytes (2787 KiB)
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 10.581565] UBIFS (ubi0:2): media format: w4/r0 (latest is w4/r0), UUID B18A8EF6-80AE-41E7-A2E0-A1A4AC7F1E1F, small LPT model
Tue Mar 14 21:32:20 2023 user.info kernel: [ 10.591397] mount_root: loading kmods from internal overlay
Tue Mar 14 21:32:20 2023 user.info kernel: [ 10.610995] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Tue Mar 14 21:32:20 2023 user.info kernel: [ 10.612274] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 10.746034] ubi0 error: ubi_open_volume: cannot open device 0, volume 2, error -16
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 10.746075] ubi0 error: ubi_open_volume: cannot open device 0, volume 2, error -16
Tue Mar 14 21:32:20 2023 user.info kernel: [ 11.649773] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Tue Mar 14 21:32:20 2023 user.info kernel: [ 11.653413] block: extroot: not configured
Tue Mar 14 21:32:20 2023 user.info kernel: [ 11.696210] mount_root: switching to ubifs overlay
Tue Mar 14 21:32:20 2023 user.warn kernel: [ 11.704034] urandom-seed: Seeding with /etc/urandom.seed
Tue Mar 14 21:32:20 2023 user.info kernel: [ 11.739355] procd: - early -
Tue Mar 14 21:32:20 2023 user.info kernel: [ 11.739403] procd: - watchdog -
Tue Mar 14 21:32:20 2023 user.info kernel: [ 12.382005] procd: - watchdog -
Tue Mar 14 21:32:20 2023 user.info kernel: [ 12.385707] procd: - ubus -
Tue Mar 14 21:32:20 2023 user.info kernel: [ 12.540064] procd: - init -
Tue Mar 14 21:32:20 2023 user.info kernel: [ 13.013437] urngd: v1.0.2 started.
Tue Mar 14 21:32:20 2023 user.info kernel: [ 13.052339] kmodloader: loading kernel modules from /etc/modules.d/*
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 13.082128] ntfs: driver 2.1.32 [Flags: R/O MODULE].
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.386424] ssdk_switch_device_num_init[1160]:INFO:ess-switch dts node number: 1
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.386495] ssdk_dt_get_switch_node[971]:INFO:ess-switch DT exist!
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.392895] ssdk_dt_parse_access_mode[857]:INFO:switch_access_mode: local bus
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.398928] ssdk_dt_parse_access_mode[870]:INFO:switchreg_base_addr: 0x3a000000
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.406092] ssdk_dt_parse_access_mode[871]:INFO:switchreg_size: 0x1000000
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.413195] ssdk_dt_parse_mac_mode[296]:INFO:mac mode = 0x0
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.420459] ssdk_dt_parse_mac_mode[305]:INFO:mac mode1 = 0xff
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.425554] ssdk_dt_parse_mac_mode[314]:INFO:mac mode2 = 0xff
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.431516] ssdk_dt_parse_uniphy[333]:INFO:ess-uniphy DT exist!
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.437345] ssdk_dt_parse_intf_mac[802]:INFO:dp1 MAC 94:83:c4:27:e7:7d
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.442906] ssdk_dt_parse_intf_mac[802]:INFO:dp2 MAC 94:83:c4:27:e7:7e
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.449613] ssdk_plat_init start
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.535856] ssdk_gcc_clock_init[1033]:INFO:SSDK gcc clock init successfully!
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.536526] HPPE initializing…
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.542119] malibu_phy_api_ops_init[2848]:INFO:qca probe malibu phy driver succeeded!
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.548761] regi_init[3568]:INFO:Initializing HPPE!!
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.764462] ssdk_ppe_reset_init[1265]:INFO:ppe reset successfully!
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.767341] qca_hppe_tdm_hw_init[684]:INFO:tdm setup num=96
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.769784] qca_hppe_portctrl_hw_init[107]:INFO:Cypress PPE port initializing
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 13.884911] __adpt_hppe_uniphy_psgmii_mode_set[635]:INFO:uniphy 0 psgmii channel selection
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 14.099698] ssdk_switch_register[1719]:INFO:Chip version 0x1501
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 14.099741] qca_link_polling_select[1315]:INFO:link-polling-required node does not exist
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 14.104432] ssdk_switch_register[1745]:INFO:polling is selected
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 14.112752] regi_init[3572]:INFO:Initializing HPPE Done!!
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 14.118523] regi_init[3632]:INFO:qca-ssdk module init succeeded!
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.125332] tun: Universal TUN/TAP device driver, 1.6
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.130028] tun: (C) 1999-2004 Max Krasnyansky maxk@qualcomm.com
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.139218] EDMA ver 1 hw init
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.141260] EDMA HW Reset completed succesfully
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.144115] Num rings - TxDesc:1 (23-23) TxCmpl:1 (23-23)
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.148554] RxDesc:1 (15-15) RxFill:1 (7-7)
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.156571] GMAC3(9d168540) Invalid MAC@ - using fe:20:99:42:65:1e
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.158996] GMAC4(9d16ad40) Invalid MAC@ - using 26:22:16:5e:b1:fa
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.165358] GMAC5(9d16d540) Invalid MAC@ - using f6:a3:ef:f0:3f:cf
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.171367] **********************************************************
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.176655] * NSS Data Plane driver
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.183149] **********************************************************
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.412989] nss_driver - fw of size 860224 bytes copied to load addr: 40000000, nss_id : 0
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.414195] Supported Frequencies -
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.420151] 187.2 MHz 748.8 MHz
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.426125] 1.4976 GHz <1>[ 14.427074]
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.429487] 7f2c4940: set sdma 9d76c900
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.431011] node size 2 # items 4
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.434483] memory: 40000000 536870912 (avl 426700800) items 4 active_cores 1
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.437946] addr/size storage words 2 2 # words 4 in DTS, ddr size 1000000
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.445077] 7f2c4940: NSS core 0 DDR from 40000000 to 41000000
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.451938] 7f2c4940: meminfo init succeed
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.475630] Ethernet Channel Bonding Driver: v3.7.1 (April 27, 2011)
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.480648] ip6_tables: (C) 2000-2006 Netfilter Core Team
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.487143] nf_conntrack version 0.5.0 (6286 buckets, 25144 max)
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.488392] node size 2 # items 4
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.492422] memory: 40000000 536870912 (avl 426815488) items 4 active_cores 1
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.495651] addr/size storage words 2 2 # words 4 in DTS, ddr size 1000000
Tue Mar 14 21:32:20 2023 kern.alert kernel: [ 14.502762] 7f2c4940: nss core 0 booted successfully
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.635311] Netfilter messages via NETLINK v0.30.
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.636682] ip_set: protocol 6
Tue Mar 14 21:32:20 2023 kern.notice kernel: [ 14.652655] nss_wifi_meshmgr_init_module[1993]:Module Build Id: 11/14/22, 07:28:53 loaded
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.654334] GACT probability on
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.660285] Mirror/redirect action on
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.665861] u32 classifier
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.666573] input device check on
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.669180] Actions configured
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.683320] fuse init (API version 7.23)
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.686237] arp_tables: (C) 2002 David S. Miller
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.688343] usbcore: registered new interface driver cdc_acm
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.690902] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.697689] usbcore: registered new interface driver cdc_wdm
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.706872] Loading modules backported from Linux version v3.18-503864-g787674a
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.710176] Backport generated by backports.git v5.10-rc6-1-1-g79f0741
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.720836] Ebtables v2.0 registered
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.727308] Custom GPIO-based I2C driver version 0.1.1
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.727904] i2c-gpio i2c-gpio.0: using pins 43 (SDA) and 42 (SCL)
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.733735] ip_tables: (C) 2000-2006 Netfilter Core Team
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.739715] usbcore: registered new interface driver ipheth
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.747272] ctnetlink v0.93: registering with nfnetlink.
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.883195] usbcore: registered new interface driver usbserial
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.883259] usbcore: registered new interface driver usbserial_generic
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.887976] usbserial: USB Serial support registered for generic
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.901031] wireguard: WireGuard 1.0.20211208 loaded. See www.wireguard.com for information.
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.901062] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld Jason@zx2c4.com. All Rights Reserved.
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.924540] xt_time: kernel timezone is -0000
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.925532] usbcore: registered new interface driver cdc_ether
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.929442] usbcore: registered new interface driver cdc_ncm
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 14.997947] usbcore: registered new interface driver huawei_cdc_ncm
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 15.123232] PPP generic driver version 2.4.2
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 15.124101] NET: Registered protocol family 24
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 15.127836] usbcore: registered new interface driver qmi_wwan
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 15.132027] usbcore: registered new interface driver rndis_host
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 15.278575] usbcore: registered new interface driver option
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 15.278645] usbserial: USB Serial support registered for GSM modem (1-port)
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 20.294450] ath11k c000000.wifi: Not multipd architecture
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 20.294865] ath11k c000000.wifi: ipq6018 hw1.0
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 20.299153] remoteproc remoteproc0: powering up cd00000.qcom_q6v5_wcss
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 20.319967] remoteproc remoteproc0: Booting fw image IPQ6018/q6_fw.mdt, size 7340
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.383419] Subsystem error monitoring/handling services are up
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.383804] remoteproc remoteproc0: remote processor cd00000.qcom_q6v5_wcss is now up
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.384023] rpmsg_dev_probe: No pm domain
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.384237] rpmsg_dev_probe: No pm domain
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 21.389051] diag: In diag_send_feature_mask_update, control channel is not open, p: 2, 808c186c
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.390496] ath11k c000000.wifi: chip_id 0x0 chip_family 0x4 board_id 0xff soc_id 0xffffffff
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.390501] ath11k c000000.wifi: fw_version 0x2604835d fw_build_timestamp 2022-03-09 12:49 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HK.2.6.0.1-00861-QCAHKSWPL_SILICONZ-1
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.419420] ath11k c000000.wifi: qmi caldata downloaded: type: 2
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.692574] remoteproc remoteproc0: stopped remote processor cd00000.qcom_q6v5_wcss
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.692609] remoteproc remoteproc0: powering up cd00000.qcom_q6v5_wcss
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 21.699205] remoteproc remoteproc0: Booting fw image IPQ6018/q6_fw.mdt, size 7340
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 22.002454] Subsystem error monitoring/handling services are up
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 22.002848] remoteproc remoteproc0: remote processor cd00000.qcom_q6v5_wcss is now up
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 22.003064] rpmsg_dev_probe: No pm domain
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 22.003274] rpmsg_dev_probe: No pm domain
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 22.005604] ath11k c000000.wifi: chip_id 0x0 chip_family 0x4 board_id 0xff soc_id 0xffffffff
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 22.005609] ath11k c000000.wifi: fw_version 0x2604835d fw_build_timestamp 2022-03-09 12:49 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HK.2.6.0.1-00861-QCAHKSWPL_SILICONZ-1
Tue Mar 14 21:32:20 2023 kern.info kernel: [ 22.008402] ath11k c000000.wifi: qmi caldata downloaded: type: 2
Tue Mar 14 21:32:20 2023 user.info kernel: [ 22.051728] kmodloader: done loading kernel modules from /etc/modules.d/*
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 22.136207] applying ath11k-macs
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 22.160053] ath11k c000000.wifi: Direct firmware load for ath11k/IPQ6018/hw1.0/qdss_trace_config.bin failed with error -2
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 22.160091] ath11k c000000.wifi: Falling back to user helper
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 22.929633] firmware ath11k!IPQ6018!hw1.0!qdss_trace_config.bin: firmware_loading_store: map pages failed
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 22.934651] ath11k c000000.wifi: Direct firmware load for qdss_trace_config.bin failed with error -2
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 22.938181] ath11k c000000.wifi: Falling back to user helper
Tue Mar 14 21:32:20 2023 daemon.err procd: Could not find firmware /lib/firmware/qdss_trace_config.bin: No such file or directory
Tue Mar 14 21:32:20 2023 daemon.err procd: failed to write to /sys//devices/platform/soc/c000000.wifi/firmware/qdss_trace_config.bin/loading: Out of memory
Tue Mar 14 21:32:20 2023 kern.err kernel: [ 23.045622] firmware qdss_trace_config.bin: firmware_loading_store: map pages failed
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 23.045767] ath11k c000000.wifi: qmi failed to load QDSS config: qdss_trace_config.bin
Tue Mar 14 21:32:20 2023 kern.warn kernel: [ 23.053710] ath11k c000000.wifi: Failed to download QDSS config to FW: -11
Tue Mar 14 21:32:20 2023 daemon.info repeater: (/usr/sbin/repeater:488) load config…
Tue Mar 14 21:32:20 2023 daemon.info repeater: (/usr/sbin/repeater:398) found device: radio0 mac80211 phy0 5g
Tue Mar 14 21:32:20 2023 daemon.info repeater: (/usr/sbin/repeater:398) found device: radio1 mac80211 phy1 2g
Tue Mar 14 21:32:20 2023 daemon.info repeater: (/usr/sbin/repeater:430) Manager created…
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: Connected to system UBus
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: started, version 2.85 cachesize 150
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: UBus support enabled: connected to system bus
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using only locally-known addresses for domain test
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using only locally-known addresses for domain onion
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using only locally-known addresses for domain localhost
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using only locally-known addresses for domain local
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using only locally-known addresses for domain invalid
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using only locally-known addresses for domain bind
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using nameserver 1.0.0.1#53
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using nameserver 1.1.1.1#53
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using nameserver 8.8.4.4#53
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using nameserver 8.8.8.8#53
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: using only locally-known addresses for domain lan
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: read /etc/hosts - 4 addresses
Tue Mar 14 21:32:21 2023 daemon.info dnsmasq[2461]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Tue Mar 14 21:32:21 2023 authpriv.info dropbear[2524]: Not backgrounding
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: bonding
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: 8021ad
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: 8021q
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: macvlan
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: veth
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: bridge
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: Network device
Tue Mar 14 21:32:22 2023 user.notice : Added device handler type: tunnel
Tue Mar 14 21:32:22 2023 daemon.notice wpa_supplicant[2700]: Successfully initialized wpa_supplicant
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables v1.8.7 (legacy): Couldn’t load target ROUTE_POLICY':No such file or directory Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Try iptables -h’ or ‘iptables --help’ for more information.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables: No chain/target/match by that name.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables: No chain/target/match by that name.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables v1.8.7 (legacy): Couldn’t load target ROUTE_POLICY':No such file or directory Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Try iptables -h’ or ‘iptables --help’ for more information.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables: No chain/target/match by that name.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables: No chain/target/match by that name.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables v1.8.7 (legacy): Couldn’t load target ROUTE_POLICY':No such file or directory Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Try iptables -h’ or ‘iptables --help’ for more information.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables: No chain/target/match by that name.
Tue Mar 14 21:32:22 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables: No chain/target/match by that name.
Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables: Index of insertion too big.
Tue Mar 14 21:32:23 2023 user.notice route_policy: default_policy=0 mac_list=24:41:8C:35:E5:03 20:17:42:17:C4:51 A4:5E:60:D6:F4:49
Tue Mar 14 21:32:23 2023 user.notice route_policy: vpn_dns_via= dns_via= manual_dns=
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.749827] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.750221] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables v1.8.7 (legacy): option “–to” requires an argument
Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Try iptables -h' or 'iptables --help' for more information. Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables v1.8.7 (legacy): option "--to" requires an argument Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Try iptables -h’ or ‘iptables --help’ for more information.
Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables v1.8.7 (legacy): option “–to” requires an argument
Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Try iptables -h' or 'iptables --help' for more information. Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.754944] IPv6: ADDRCONF(NETDEV_UP): eth3: link is not ready Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.761088] IPv6: ADDRCONF(NETDEV_UP): eth4: link is not ready Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: iptables v1.8.7 (legacy): option "--to" requires an argument Tue Mar 14 21:32:23 2023 daemon.notice procd: /etc/rc.d/S29vpnpolicy-apply: Try iptables -h’ or ‘iptables --help’ for more information.
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.766789] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.772527] IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready
Tue Mar 14 21:32:23 2023 daemon.notice netifd: Interface ‘guest’ is enabled
Tue Mar 14 21:32:23 2023 daemon.notice netifd: Interface ‘guest’ is setting up now
Tue Mar 14 21:32:23 2023 daemon.notice netifd: Interface ‘guest’ is now up
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.827964] device eth1 entered promiscuous mode
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.829308] br-lan: port 1(eth1) entered forwarding state
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.831704] br-lan: port 1(eth1) entered forwarding state
Tue Mar 14 21:32:23 2023 daemon.notice netifd: Interface ‘lan’ is enabled
Tue Mar 14 21:32:23 2023 daemon.notice netifd: Interface ‘lan’ is setting up now
Tue Mar 14 21:32:23 2023 daemon.notice netifd: Interface ‘lan’ is now up
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.838062] br-lan: port 1(eth1) entered disabled state
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.845808] device eth2 entered promiscuous mode
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.847470] br-lan: port 2(eth2) entered forwarding state
Tue Mar 14 21:32:23 2023 kern.info kernel: [ 26.852272] br-lan: port 2(eth2) entered forwarding state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 26.863631] device eth3 entered promiscuous mode
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 26.863768] br-lan: port 3(eth3) entered forwarding state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 26.867649] br-lan: port 3(eth3) entered forwarding state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 26.876458] device eth4 entered promiscuous mode
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 26.878382] br-lan: port 4(eth4) entered forwarding state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 26.882999] br-lan: port 4(eth4) entered forwarding state
Tue Mar 14 21:32:24 2023 daemon.notice netifd: bridge ‘br-lan’ link is up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘lan’ has link connectivity
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘loopback’ is enabled
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘loopback’ is setting up now
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘loopback’ is now up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘ovpnserver’ is setting up now
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 26.892907] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘wan’ is enabled
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘wgserver’ is setting up now
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Network device ‘lo’ link is up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘loopback’ has link connectivity
Tue Mar 14 21:32:24 2023 user.notice mwan3[2979]: Using firewall mask 0x3F00
Tue Mar 14 21:32:24 2023 user.notice mwan3[2979]: Max interface count is 60

1 Like
Summary

Tue Mar 14 21:32:24 2023 daemon.info dnsmasq[2461]: exiting on receipt of SIGTERM
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.164604] nss-dp 3a001400.dp3 eth2: PHY Link up speed: 10
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.164928] nss-dp 3a001200.dp2 eth1: PHY Link up speed: 100
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.170355] nss-dp 3a001000.dp1 eth0: PHY Link up speed: 1000
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.177081] IPv6: ADDRCONF(NETDEV_UP): wgserver: link is not ready
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.181672] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.187077] br-lan: port 1(eth1) entered forwarding state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.192811] br-lan: port 1(eth1) entered forwarding state
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘wgserver’ is now up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Network device ‘eth2’ link is up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Network device ‘eth0’ link is up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: VLAN ‘eth0.10’ link is up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘wan’ has link connectivity
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘wan’ is setting up now
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Network device ‘eth1’ link is up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Network device ‘wgserver’ link is up
Tue Mar 14 21:32:24 2023 daemon.err insmod: module is already loaded - slhc
Tue Mar 14 21:32:24 2023 daemon.err insmod: module is already loaded - ppp_generic
Tue Mar 14 21:32:24 2023 daemon.err insmod: module is already loaded - pppox
Tue Mar 14 21:32:24 2023 daemon.err insmod: module is already loaded - pppoe
Tue Mar 14 21:32:24 2023 daemon.info pppd[3444]: Plugin rp-pppoe.so loaded.
Tue Mar 14 21:32:24 2023 daemon.info pppd[3444]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Tue Mar 14 21:32:24 2023 kern.err kernel: [ 27.664893] ubi0 error: ubi_open_volume: cannot open device 0, volume 2, error -16
Tue Mar 14 21:32:24 2023 kern.err kernel: [ 27.664945] ubi0 error: ubi_open_volume: cannot open device 0, volume 2, error -16
Tue Mar 14 21:32:24 2023 daemon.warn ovpnserver[3152]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: OpenVPN 2.5.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: net_route_v4_best_gw query: dst 0.0.0.0
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: net_route_v4_best_gw result: via 0.0.0.0 dev
Tue Mar 14 21:32:24 2023 daemon.warn ovpnserver[3152]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Mar 14 21:32:24 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) → new PHY
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: Diffie-Hellman initialized with 1024 bit key
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: TUN/TAP device ovpnserver opened
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: net_iface_mtu_set: mtu 1500 for ovpnserver
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: net_iface_up: set ovpnserver up
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: net_addr_v4_add: 10.8.0.1/24 dev ovpnserver
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: /etc/openvpn/scripts/ovpnserver-up ovpnserver ovpnserver 1500 1621 10.8.0.1 255.255.255.0 init
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.708261] device wlan1 entered promiscuous mode
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.708362] br-lan: port 5(wlan1) entered forwarding state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.711999] br-lan: port 5(wlan1) entered forwarding state
Tue Mar 14 21:32:24 2023 daemon.notice pppd[3444]: pppd 2.4.8 started by root, uid 0
Tue Mar 14 21:32:24 2023 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Tue Mar 14 21:32:24 2023 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->HT_SCAN
Tue Mar 14 21:32:24 2023 user.notice ovpnserver-up: env value:daemon_log_redirect=0 script_type=up proto_1=udp daemon=0 SHLVL=1 dev_type=tun dev=ovpnserver remote_port_1=1194 ifconfig_netmask=255.255.255.0 daemon_start_time=1678829544 script_context=init ifconfig_local=10.8.0.1 verb=3 local_port_1=1194 link_mtu=1621 tun_mtu=1500 daemon_pid=3152 config=/tmp/ovpnserver/ovpnserver PWD=/lib/netifd/proto
Tue Mar 14 21:32:24 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) → new PHY
Tue Mar 14 21:32:24 2023 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.734528] device wlan0 entered promiscuous mode
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.734648] br-lan: port 6(wlan0) entered forwarding state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.738257] br-lan: port 6(wlan0) entered forwarding state
Tue Mar 14 21:32:24 2023 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Interface ‘ovpnserver’ is now up
Tue Mar 14 21:32:24 2023 daemon.notice netifd: Network device ‘ovpnserver’ link is up
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.760508] IPv6: ADDRCONF(NETDEV_UP): ovpnserver: link is not ready
Tue Mar 14 21:32:24 2023 daemon.warn ovpnserver[3152]: Could not determine IPv4/IPv6 protocol. Using AF_INET
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: UDPv4 link local (bound): [AF_INET][undef]:1194
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: UDPv4 link remote: [AF_UNSPEC]
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: GID set to nogroup
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: UID set to nobody
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: MULTI: multi_init called, r=256 v=256
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: IFCONFIG POOL IPv4: base=10.8.0.2 size=252
Tue Mar 14 21:32:24 2023 daemon.notice ovpnserver[3152]: Initialization Sequence Completed
Tue Mar 14 21:32:24 2023 daemon.info pppd[3444]: PPP session is 35962
Tue Mar 14 21:32:24 2023 daemon.warn pppd[3444]: Connected to 40:b5:c1:21:a0:c0 via interface eth0.10
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.781142] pppoe-wan: renamed from ppp0
Tue Mar 14 21:32:24 2023 user.notice firewall: Reloading firewall due to ifup of guest (br-guest)
Tue Mar 14 21:32:24 2023 daemon.info pppd[3444]: Renamed interface ppp0 to pppoe-wan
Tue Mar 14 21:32:24 2023 daemon.info pppd[3444]: Using interface pppoe-wan
Tue Mar 14 21:32:24 2023 daemon.notice pppd[3444]: Connect: pppoe-wan <–> eth0.10
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.834547] br-lan: port 3(eth3) entered disabled state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.835040] br-lan: port 4(eth4) entered disabled state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.838831] br-lan: port 5(wlan1) entered disabled state
Tue Mar 14 21:32:24 2023 kern.info kernel: [ 27.844148] br-lan: port 6(wlan0) entered disabled state
Tue Mar 14 21:32:25 2023 daemon.emerg hostapd: WDS: disable encap - /sys/kernel/debug/ieee80211/phy0/netdev:wlan0/disable_offload
Tue Mar 14 21:32:25 2023 kern.info kernel: [ 28.189567] ath11k c000000.wifi: bss color param 0x81000000 set on vdev 1
Tue Mar 14 21:32:25 2023 kern.info kernel: [ 28.189653] br-lan: port 6(wlan0) entered forwarding state
Tue Mar 14 21:32:25 2023 kern.info kernel: [ 28.195414] br-lan: port 6(wlan0) entered forwarding state
Tue Mar 14 21:32:25 2023 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Tue Mar 14 21:32:25 2023 daemon.notice hostapd: wlan0: AP-ENABLED
Tue Mar 14 21:32:25 2023 cron.err crond[3985]: crond (busybox 1.33.2) started, log level 5
Tue Mar 14 21:32:25 2023 daemon.notice netifd: Wireless device ‘radio1’ is now up
Tue Mar 14 21:32:25 2023 daemon.notice netifd: Wireless device ‘radio0’ is now up
Tue Mar 14 21:32:25 2023 daemon.notice netifd: Network device ‘wlan0’ link is up
Tue Mar 14 21:32:25 2023 daemon.info pppd[3444]: CHAP authentication succeeded
Tue Mar 14 21:32:25 2023 daemon.notice pppd[3444]: CHAP authentication succeeded
Tue Mar 14 21:32:25 2023 daemon.notice pppd[3444]: peer from calling number 40:B5:C1:21:A0:C0 authorized
Tue Mar 14 21:32:26 2023 kern.info kernel: [ 28.955138] tertf: br-lan registered, add it
Tue Mar 14 21:32:26 2023 kern.info kernel: [ 28.955329] tertf: br-guest registered, add it
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Found user ‘nobody’ (UID 65534) and group ‘nogroup’ (GID 65534).
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Successfully dropped root privileges.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: avahi-daemon 0.8 starting up.
Tue Mar 14 21:32:26 2023 daemon.warn avahi-daemon[4149]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Tue Mar 14 21:32:26 2023 user.notice route_policy: default_policy=0 mac_list=24:41:8C:35:E5:03 20:17:42:17:C4:51 A4:5E:60:D6:F4:49
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: No service file found in /etc/avahi/services.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Joining mDNS multicast group on interface ovpnserver.IPv4 with address 10.8.0.1.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: New relevant interface ovpnserver.IPv4 for mDNS.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Joining mDNS multicast group on interface br-lan.IPv4 with address 192.168.8.1.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: New relevant interface br-lan.IPv4 for mDNS.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Joining mDNS multicast group on interface br-guest.IPv4 with address 192.168.9.1.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: New relevant interface br-guest.IPv4 for mDNS.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Joining mDNS multicast group on interface eth0.IPv6 with address fe80::9683:c4ff:fe27:e77d.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: New relevant interface eth0.IPv6 for mDNS.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Joining mDNS multicast group on interface lo.IPv6 with address ::1.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: New relevant interface lo.IPv6 for mDNS.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: New relevant interface lo.IPv4 for mDNS.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Network interface enumeration completed.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Registering new address record for 10.8.0.1 on ovpnserver.IPv4.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Registering new address record for 192.168.8.1 on br-lan.IPv4.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Registering new address record for 192.168.9.1 on br-guest.IPv4.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Registering new address record for fe80::9683:c4ff:fe27:e77d on eth0..
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Registering new address record for ::1 on lo.
.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Registering new address record for 127.0.0.1 on lo.IPv4.
Tue Mar 14 21:32:26 2023 daemon.info avahi-daemon[4149]: Registering HINFO record with values ‘ARMV7L’/‘LINUX’.
Tue Mar 14 21:32:26 2023 user.notice route_policy: vpn_dns_via= dns_via= manual_dns=
Tue Mar 14 21:32:26 2023 daemon.info hostapd: wlan0: STA 78:2b:64:6f:14:36 IEEE 802.11: authenticated
Tue Mar 14 21:32:26 2023 daemon.info hostapd: wlan0: STA 78:2b:64:6f:14:36 IEEE 802.11: associated (aid 1)
Tue Mar 14 21:32:26 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 78:2b:64:6f:14:36 0 0
Tue Mar 14 21:32:26 2023 daemon.info hostapd: wlan0: STA 78:2b:64:6f:14:36 RADIUS: starting accounting session 657267D8383BA84F
Tue Mar 14 21:32:26 2023 daemon.info hostapd: wlan0: STA 78:2b:64:6f:14:36 WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Tue Mar 14 21:32:26 2023 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Tue Mar 14 21:32:27 2023 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=1 sec=5 based on overlapping BSSes
Tue Mar 14 21:32:27 2023 daemon.notice hostapd: Fallback to 20 MHz
Tue Mar 14 21:32:27 2023 daemon.emerg hostapd: WDS: disable encap - /sys/kernel/debug/ieee80211/phy1/netdev:wlan1/disable_offload
Tue Mar 14 21:32:27 2023 daemon.notice netifd: Network device ‘wlan1’ link is up
Tue Mar 14 21:32:27 2023 kern.info kernel: [ 29.997944] ath11k c000000.wifi: bss color param 0x81000000 set on vdev 0
Tue Mar 14 21:32:27 2023 kern.info kernel: [ 29.998863] br-lan: port 5(wlan1) entered forwarding state
Tue Mar 14 21:32:27 2023 kern.info kernel: [ 30.003767] br-lan: port 5(wlan1) entered forwarding state
Tue Mar 14 21:32:27 2023 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
Tue Mar 14 21:32:27 2023 daemon.notice hostapd: wlan1: AP-ENABLED
Tue Mar 14 21:32:27 2023 daemon.info avahi-daemon[4149]: Server startup complete. Host name is GL-AX1800.local. Local service cookie is 1861601154.
Tue Mar 14 21:32:28 2023 daemon.info samba4-server: io_uring module found, enabling VFS io_uring. (also needs Kernel 5.4+ Support)
Tue Mar 14 21:32:28 2023 daemon.notice procd: /etc/rc.d/S99disk_manage: start app = /usr/bin/disk_manage
Tue Mar 14 21:32:29 2023 daemon.notice pppd[3444]: local IP address 84.203.91.254
Tue Mar 14 21:32:29 2023 daemon.notice pppd[3444]: remote IP address 83.147.159.104
Tue Mar 14 21:32:29 2023 daemon.notice pppd[3444]: primary DNS address 83.147.160.2
Tue Mar 14 21:32:29 2023 daemon.notice pppd[3444]: secondary DNS address 83.147.160.130
Tue Mar 14 21:32:29 2023 daemon.info avahi-daemon[4149]: Joining mDNS multicast group on interface pppoe-wan.IPv4 with address 84.203.91.254.
Tue Mar 14 21:32:29 2023 daemon.info avahi-daemon[4149]: New relevant interface pppoe-wan.IPv4 for mDNS.
Tue Mar 14 21:32:29 2023 daemon.info avahi-daemon[4149]: Registering new address record for 84.203.91.254 on pppoe-wan.IPv4.
Tue Mar 14 21:32:29 2023 daemon.notice procd: /etc/rc.d/S99gl_nas_diskmanager: start app = /usr/bin/gl_nas_diskmanager
Tue Mar 14 21:32:29 2023 daemon.notice netifd: Network device ‘pppoe-wan’ link is up
Tue Mar 14 21:32:29 2023 daemon.notice netifd: Interface ‘wan’ is now up
Tue Mar 14 21:32:29 2023 daemon.info mqtt[5656]: init set log level = 6
Tue Mar 14 21:32:29 2023 daemon.notice procd: /etc/rc.d/S99gl_nas_sys_dl: start app = /usr/bin/gl_nas_sys
Tue Mar 14 21:32:29 2023 daemon.notice procd: /etc/rc.d/S99gl_nas_sys_dl: === nas enable
Tue Mar 14 21:32:29 2023 daemon.notice procd: /etc/rc.d/S99gl_nas_sys_up: start app = /usr/bin/gl_nas_sys
Tue Mar 14 21:32:29 2023 daemon.notice procd: /etc/rc.d/S99gl_nas_sys_up: === nas enable
Tue Mar 14 21:32:29 2023 daemon.notice procd: /etc/rc.d/S99webdav_ser: start app = /usr/bin/webdav_ser
Tue Mar 14 21:32:29 2023 daemon.notice procd: /etc/rc.d/S99webdav_ser: === webdav enable
Tue Mar 14 21:32:29 2023 daemon.info procd: - init complete -
Tue Mar 14 21:32:30 2023 daemon.info mqtt[5656]: main.c(1377)mqtt start!
Tue Mar 14 21:32:30 2023 daemon.err nmbd[5289]: [2023/03/14 21:32:30.810029, 0] …/…/lib/util/become_daemon.c:136(daemon_ready)
Tue Mar 14 21:32:30 2023 daemon.err nmbd[5289]: daemon_ready: daemon ‘nmbd’ finished starting up and ready to serve connections
Tue Mar 14 21:32:30 2023 daemon.err nmbd[5289]: [2023/03/14 21:32:30.811255, 0] …/…/source3/nmbd/nmbd_become_dmb.c:294(become_domain_master_browser_bcast)
Tue Mar 14 21:32:30 2023 daemon.err nmbd[5289]: become_domain_master_browser_bcast:
Tue Mar 14 21:32:30 2023 daemon.err nmbd[5289]: Attempting to become domain master browser on workgroup WORKGROUP on subnet 192.168.8.1
Tue Mar 14 21:32:30 2023 daemon.err nmbd[5289]: [2023/03/14 21:32:30.811632, 0] …/…/source3/nmbd/nmbd_become_dmb.c:307(become_domain_master_browser_bcast)
Tue Mar 14 21:32:30 2023 daemon.err nmbd[5289]: become_domain_master_browser_bcast: querying subnet 192.168.8.1 for domain master browser on workgroup WORKGROUP
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: Connected to system UBus
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: started, version 2.85 cachesize 150
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: UBus support enabled: connected to system bus
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq-dhcp[5995]: DHCP, IP range 192.168.9.100 – 192.168.9.249, lease time 12h
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq-dhcp[5995]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using only locally-known addresses for domain test
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using only locally-known addresses for domain onion
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using only locally-known addresses for domain localhost
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using only locally-known addresses for domain local
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using only locally-known addresses for domain invalid
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using only locally-known addresses for domain bind
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using nameserver 1.0.0.1#53
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using nameserver 1.1.1.1#53
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using nameserver 8.8.4.4#53
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using nameserver 8.8.8.8#53
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: using only locally-known addresses for domain lan
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: read /etc/hosts - 4 addresses
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq[5995]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Tue Mar 14 21:32:30 2023 daemon.info dnsmasq-dhcp[5995]: read /etc/ethers - 0 addresses
Tue Mar 14 21:32:31 2023 daemon.err mqtt[5656]: timestamp invalid
Tue Mar 14 21:32:31 2023 daemon.err mqtt[5656]: utils_NLB failed!
Tue Mar 14 21:32:31 2023 daemon.err smbd[5288]: [2023/03/14 21:32:31.352176, 0] …/…/lib/util/become_daemon.c:136(daemon_ready)
Tue Mar 14 21:32:31 2023 daemon.err smbd[5288]: daemon_ready: daemon ‘smbd’ finished starting up and ready to serve connections
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[5995]: exiting on receipt of SIGTERM
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: Connected to system UBus
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: started, version 2.85 cachesize 150
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: UBus support enabled: connected to system bus
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq-dhcp[6228]: DHCP, IP range 192.168.9.100 – 192.168.9.249, lease time 12h
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq-dhcp[6228]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using only locally-known addresses for domain test
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using only locally-known addresses for domain onion
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using only locally-known addresses for domain localhost
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using only locally-known addresses for domain local
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using only locally-known addresses for domain invalid
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using only locally-known addresses for domain bind
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using nameserver 1.0.0.1#53
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using nameserver 1.1.1.1#53
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using nameserver 8.8.4.4#53
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using nameserver 8.8.8.8#53
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: using only locally-known addresses for domain lan
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: read /etc/hosts - 4 addresses
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq-dhcp[6228]: read /etc/ethers - 0 addresses
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: read /etc/hosts - 4 addresses
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq[6228]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Tue Mar 14 21:32:31 2023 daemon.info dnsmasq-dhcp[6228]: read /etc/ethers - 0 addresses
Tue Mar 14 21:32:31 2023 daemon.info samba4-server: io_uring module found, enabling VFS io_uring. (also needs Kernel 5.4+ Support)
Tue Mar 14 21:32:31 2023 daemon.err nmbd[5289]: [2023/03/14 21:32:31.910134, 0] …/…/source3/nmbd/nmbd.c:60(terminate)
Tue Mar 14 21:32:31 2023 daemon.err nmbd[5289]: Got SIGTERM: going down…
Tue Mar 14 21:32:32 2023 kern.info kernel: [ 34.864446] br-lan: port 2(eth2) entered forwarding state
Tue Mar 14 21:32:32 2023 daemon.err nmbd[6472]: [2023/03/14 21:32:32.037104, 0] …/…/lib/util/become_daemon.c:136(daemon_ready)
Tue Mar 14 21:32:32 2023 daemon.err nmbd[6472]: daemon_ready: daemon ‘nmbd’ finished starting up and ready to serve connections
Tue Mar 14 21:32:32 2023 daemon.err nmbd[6472]: [2023/03/14 21:32:32.038166, 0] …/…/source3/nmbd/nmbd_become_dmb.c:294(become_domain_master_browser_bcast)
Tue Mar 14 21:32:32 2023 daemon.err nmbd[6472]: become_domain_master_browser_bcast:
Tue Mar 14 21:32:32 2023 daemon.err nmbd[6472]: Attempting to become domain master browser on workgroup WORKGROUP on subnet 192.168.8.1
Tue Mar 14 21:32:32 2023 daemon.err nmbd[6472]: [2023/03/14 21:32:32.038710, 0] …/…/source3/nmbd/nmbd_become_dmb.c:307(become_domain_master_browser_bcast)
Tue Mar 14 21:32:32 2023 daemon.err nmbd[6472]: become_domain_master_browser_bcast: querying subnet 192.168.8.1 for domain master browser on workgroup WORKGROUP
Tue Mar 14 21:32:32 2023 daemon.err smbd[6471]: [2023/03/14 21:32:32.174712, 0] …/…/lib/util/become_daemon.c:136(daemon_ready)
Tue Mar 14 21:32:32 2023 daemon.err smbd[6471]: daemon_ready: daemon ‘smbd’ finished starting up and ready to serve connections
Tue Mar 14 21:32:32 2023 kern.info kernel: [ 35.204439] br-lan: port 1(eth1) entered forwarding state
Tue Mar 14 21:38:42 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 78:2b:64:6f:14:36
Tue Mar 14 21:38:42 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.146 78:2b:64:6f:14:36
Tue Mar 14 21:38:42 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.146 78:2b:64:6f:14:36
Tue Mar 14 21:38:42 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.146 78:2b:64:6f:14:36 Bose-Smart-Soundbar-900
Tue Mar 14 21:38:42 2023 user.notice ddns-scripts[6558]: glddns: PID ‘6558’ started at 2023-03-14 21:38
Tue Mar 14 21:38:43 2023 user.info mwan3rtmon[3609]: Detect rtchange event.
Tue Mar 14 21:38:43 2023 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Tue Mar 14 21:38:43 2023 kern.info kernel: [ 36.204419] br-lan: port 6(wlan0) entered forwarding state
Tue Mar 14 21:38:44 2023 daemon.err nmbd[6472]: [2023/03/14 21:38:44.247557, 0] …/…/source3/nmbd/nmbd_become_dmb.c:294(become_domain_master_browser_bcast)
Tue Mar 14 21:38:44 2023 daemon.err nmbd[6472]: become_domain_master_browser_bcast:
Tue Mar 14 21:38:44 2023 daemon.err nmbd[6472]: Attempting to become domain master browser on workgroup WORKGROUP on subnet 192.168.8.1
Tue Mar 14 21:38:44 2023 daemon.err nmbd[6472]: [2023/03/14 21:38:44.247755, 0] …/…/source3/nmbd/nmbd_become_dmb.c:307(become_domain_master_browser_bcast)
Tue Mar 14 21:38:44 2023 daemon.err nmbd[6472]: become_domain_master_browser_bcast: querying subnet 192.168.8.1 for domain master browser on workgroup WORKGROUP
Tue Mar 14 21:38:44 2023 user.notice route_policy: default_policy=0 mac_list=24:41:8C:35:E5:03 20:17:42:17:C4:51 A4:5E:60:D6:F4:49
Tue Mar 14 21:38:44 2023 user.notice route_policy: vpn_dns_via= dns_via= manual_dns=
Tue Mar 14 21:38:44 2023 daemon.info mqtt[5656]: mqtt init success!
Tue Mar 14 21:38:44 2023 user.info mwan3rtmon[3609]: Detect rtchange event.
Tue Mar 14 21:38:45 2023 user.notice route_policy: default_policy=0 mac_list=24:41:8C:35:E5:03 20:17:42:17:C4:51 A4:5E:60:D6:F4:49
Tue Mar 14 21:38:45 2023 user.notice route_policy: vpn_dns_via= dns_via= manual_dns=
Tue Mar 14 21:38:45 2023 kern.info kernel: [ 38.004435] br-lan: port 5(wlan1) entered forwarding state
Tue Mar 14 21:38:45 2023 daemon.info hostapd: wlan1: STA 34:3e:a4:51:ac:46 IEEE 802.11: authenticated
Tue Mar 14 21:38:45 2023 daemon.info hostapd: wlan1: STA 34:3e:a4:51:ac:46 IEEE 802.11: associated (aid 1)
Tue Mar 14 21:38:45 2023 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 34:3e:a4:51:ac:46 0 0
Tue Mar 14 21:38:45 2023 daemon.info hostapd: wlan1: STA 34:3e:a4:51:ac:46 RADIUS: starting accounting session 106D7C8824F87D23
Tue Mar 14 21:38:45 2023 daemon.info hostapd: wlan1: STA 34:3e:a4:51:ac:46 WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:38:46 2023 user.info mwan3rtmon[3609]: Detect rtchange event.
Tue Mar 14 21:38:46 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 192.168.8.102 00:1c:2b:10:b3:bf
Tue Mar 14 21:38:46 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.102 00:1c:2b:10:b3:bf
Tue Mar 14 21:38:46 2023 daemon.info mqtt[5656]: Subscribe succeeded
Tue Mar 14 21:38:46 2023 daemon.info mqtt[5656]: Subscribe succeeded
Tue Mar 14 21:38:46 2023 user.notice firewall: Reloading firewall due to ifup of wgserver (wgserver)
Tue Mar 14 21:38:47 2023 user.notice route_policy: default_policy=0 mac_list=24:41:8C:35:E5:03 20:17:42:17:C4:51 A4:5E:60:D6:F4:49
Tue Mar 14 21:38:47 2023 user.notice route_policy: vpn_dns_via= dns_via= manual_dns=
Tue Mar 14 21:38:48 2023 user.info mwan3rtmon[3609]: Detect rtchange event.
Tue Mar 14 21:38:48 2023 user.notice firewall: Reloading firewall due to ifup of ovpnserver (ovpnserver)
Tue Mar 14 21:38:49 2023 user.notice route_policy: default_policy=0 mac_list=24:41:8C:35:E5:03 20:17:42:17:C4:51 A4:5E:60:D6:F4:49
Tue Mar 14 21:38:49 2023 user.notice route_policy: vpn_dns_via= dns_via= manual_dns=
Tue Mar 14 21:38:49 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:38:49 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:38:50 2023 user.notice mwan3[8392]: Execute ifup event on interface wan (pppoe-wan)
Tue Mar 14 21:38:50 2023 daemon.err nmbd[6472]: [2023/03/14 21:38:50.264173, 0] …/…/source3/nmbd/nmbd_become_dmb.c:112(become_domain_master_stage2)
Tue Mar 14 21:38:50 2023 daemon.err nmbd[6472]: *****
Tue Mar 14 21:38:50 2023 daemon.err nmbd[6472]:
Tue Mar 14 21:38:50 2023 daemon.err nmbd[6472]: Samba server GL-AX1800 is now a domain master browser for workgroup WORKGROUP on subnet 192.168.8.1
Tue Mar 14 21:38:50 2023 daemon.err nmbd[6472]:
Tue Mar 14 21:38:50 2023 daemon.err nmbd[6472]: *****
Tue Mar 14 21:38:51 2023 user.notice mwan3[8392]: Starting tracker on interface wan (pppoe-wan)
Tue Mar 14 21:38:52 2023 daemon.err nmbd[6472]: [2023/03/14 21:38:52.267821, 0] …/…/source3/nmbd/nmbd_become_dmb.c:112(become_domain_master_stage2)
Tue Mar 14 21:38:52 2023 daemon.err nmbd[6472]: *****
Tue Mar 14 21:38:52 2023 daemon.err nmbd[6472]:
Tue Mar 14 21:38:52 2023 daemon.err nmbd[6472]: Samba server GL-AX1800 is now a domain master browser for workgroup WORKGROUP on subnet 192.168.8.1
Tue Mar 14 21:38:52 2023 daemon.err nmbd[6472]:
Tue Mar 14 21:38:52 2023 daemon.err nmbd[6472]: *****
Tue Mar 14 21:38:53 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:38:53 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:38:53 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:38:53 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:38:53 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.102 00:1c:2b:10:b3:bf
Tue Mar 14 21:38:53 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.102 00:1c:2b:10:b3:bf myHivehub
Tue Mar 14 21:38:53 2023 daemon.err dnsmasq[6228]: Conntrack connection mark retrieval failed: No such file or directory
Tue Mar 14 21:38:54 2023 user.info mwan3rtmon[3609]: Detect rtchange event.
Tue Mar 14 21:38:54 2023 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Tue Mar 14 21:38:55 2023 user.notice route_policy: default_policy=0 mac_list=24:41:8C:35:E5:03 20:17:42:17:C4:51 A4:5E:60:D6:F4:49
Tue Mar 14 21:38:55 2023 user.notice route_policy: vpn_dns_via= dns_via= manual_dns=
Tue Mar 14 21:38:56 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 34:3e:a4:51:ac:46
Tue Mar 14 21:38:56 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.119 34:3e:a4:51:ac:46
Tue Mar 14 21:38:57 2023 daemon.err usbmuxd[9363]: [21:38:57.601][3] usbmuxd v1.1.1 starting up
Tue Mar 14 21:38:57 2023 daemon.err usbmuxd[9363]: [21:38:57.601][3] Using libusb 1.0.22
Tue Mar 14 21:38:57 2023 daemon.err usbmuxd[9363]: [21:38:57.602][3] Initialization complete

1 Like
Summary

Tue Mar 14 21:38:57 2023 daemon.err usbmuxd[9363]: [21:38:57.602][3] Enabled exit on SIGUSR1 if no devices are attached. Start a new instance with “–exit” to trigger.
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) a4:5e:60:d6:f4:49
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.131 a4:5e:60:d6:f4:49
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.102 00:1c:2b:10:b3:bf
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.102 00:1c:2b:10:b3:bf myHivehub
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b devolo-piano-sopra
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 34:3e:a4:51:ac:46
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.119 34:3e:a4:51:ac:46
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b devolo-piano-sopra
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f devolo-sotto
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 34:3e:a4:51:ac:46
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.119 34:3e:a4:51:ac:46
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b devolo-piano-sopra
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f devolo-sotto
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.119 34:3e:a4:51:ac:46
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.119 34:3e:a4:51:ac:46 343EA451AC46-mysimplelink
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.158 f4:06:8d:23:f5:4f devolo-sotto
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b
Tue Mar 14 21:39:00 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.120 30:d3:2d:3e:80:2b devolo-piano-sopra
Tue Mar 14 21:39:04 2023 daemon.err nmbd[6472]: [2023/03/14 21:39:04.286683, 0] …/…/source3/nmbd/nmbd_become_lmb.c:398(become_local_master_stage2)
Tue Mar 14 21:39:04 2023 daemon.err nmbd[6472]: *****
Tue Mar 14 21:39:04 2023 daemon.err nmbd[6472]:
Tue Mar 14 21:39:04 2023 daemon.err nmbd[6472]: Samba name server GL-AX1800 is now a local master browser for workgroup WORKGROUP on subnet 192.168.8.1
Tue Mar 14 21:39:04 2023 daemon.err nmbd[6472]:
Tue Mar 14 21:39:04 2023 daemon.err nmbd[6472]: *****
Tue Mar 14 21:39:17 2023 daemon.info hostapd: wlan1: STA 30:09:c0:2b:f1:1f IEEE 802.11: authenticated
Tue Mar 14 21:39:17 2023 daemon.info hostapd: wlan1: STA 30:09:c0:2b:f1:1f IEEE 802.11: associated (aid 2)
Tue Mar 14 21:39:17 2023 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 30:09:c0:2b:f1:1f 0 0
Tue Mar 14 21:39:17 2023 daemon.info hostapd: wlan1: STA 30:09:c0:2b:f1:1f RADIUS: starting accounting session AEC719BD7CC981F3
Tue Mar 14 21:39:17 2023 daemon.info hostapd: wlan1: STA 30:09:c0:2b:f1:1f WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:39:17 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.166 30:09:c0:2b:f1:1f
Tue Mar 14 21:39:17 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.166 30:09:c0:2b:f1:1f
Tue Mar 14 21:39:33 2023 daemon.info hostapd: wlan1: STA 54:e0:19:fe:21:a5 IEEE 802.11: authenticated
Tue Mar 14 21:39:33 2023 daemon.info hostapd: wlan1: STA 54:e0:19:fe:21:a5 IEEE 802.11: associated (aid 3)
Tue Mar 14 21:39:33 2023 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 54:e0:19:fe:21:a5 0 0
Tue Mar 14 21:39:33 2023 daemon.info hostapd: wlan1: STA 54:e0:19:fe:21:a5 RADIUS: starting accounting session 2B84570D251109BD
Tue Mar 14 21:39:33 2023 daemon.info hostapd: wlan1: STA 54:e0:19:fe:21:a5 WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:39:37 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 54:e0:19:fe:21:a5
Tue Mar 14 21:39:37 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.101 54:e0:19:fe:21:a5
Tue Mar 14 21:39:37 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 54:e0:19:fe:21:a5
Tue Mar 14 21:39:37 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.101 54:e0:19:fe:21:a5
Tue Mar 14 21:39:37 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.101 54:e0:19:fe:21:a5
Tue Mar 14 21:39:37 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.101 54:e0:19:fe:21:a5 Ring-fe21a5
Tue Mar 14 21:40:22 2023 daemon.info hostapd: wlan0: STA 5e:00:88:df:c6:3f IEEE 802.11: authenticated
Tue Mar 14 21:40:22 2023 daemon.info hostapd: wlan0: STA 5e:00:88:df:c6:3f IEEE 802.11: associated (aid 2)
Tue Mar 14 21:40:22 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 5e:00:88:df:c6:3f 0 0
Tue Mar 14 21:40:22 2023 daemon.info hostapd: wlan0: STA 5e:00:88:df:c6:3f RADIUS: starting accounting session 76C0AFC99BE9FB22
Tue Mar 14 21:40:22 2023 daemon.info hostapd: wlan0: STA 5e:00:88:df:c6:3f WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:40:25 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 5e:00:88:df:c6:3f
Tue Mar 14 21:40:25 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.140 5e:00:88:df:c6:3f
Tue Mar 14 21:40:25 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) 5e:00:88:df:c6:3f
Tue Mar 14 21:40:25 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.140 5e:00:88:df:c6:3f
Tue Mar 14 21:40:26 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.140 5e:00:88:df:c6:3f
Tue Mar 14 21:40:26 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.140 5e:00:88:df:c6:3f
Tue Mar 14 21:40:29 2023 daemon.info hostapd: wlan0: STA 8a:fb:cd:fb:05:fb IEEE 802.11: authenticated
Tue Mar 14 21:40:29 2023 daemon.info hostapd: wlan0: STA 8a:fb:cd:fb:05:fb IEEE 802.11: associated (aid 3)
Tue Mar 14 21:40:29 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 8a:fb:cd:fb:05:fb 0 0
Tue Mar 14 21:40:29 2023 daemon.info hostapd: wlan0: STA 8a:fb:cd:fb:05:fb RADIUS: starting accounting session 2A78A1A0944B7012
Tue Mar 14 21:40:29 2023 daemon.info hostapd: wlan0: STA 8a:fb:cd:fb:05:fb WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:40:30 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.177 8a:fb:cd:fb:05:fb
Tue Mar 14 21:40:30 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.177 8a:fb:cd:fb:05:fb
Tue Mar 14 21:41:46 2023 daemon.info hostapd: wlan0: STA a4:5e:60:d6:f4:49 IEEE 802.11: authenticated
Tue Mar 14 21:41:46 2023 daemon.info hostapd: wlan0: STA a4:5e:60:d6:f4:49 IEEE 802.11: associated (aid 4)
Tue Mar 14 21:41:46 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a4:5e:60:d6:f4:49 0 0
Tue Mar 14 21:41:46 2023 daemon.info hostapd: wlan0: STA a4:5e:60:d6:f4:49 RADIUS: starting accounting session 2A963DE645E48CCC
Tue Mar 14 21:41:46 2023 daemon.info hostapd: wlan0: STA a4:5e:60:d6:f4:49 WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:41:47 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) a4:5e:60:d6:f4:49
Tue Mar 14 21:41:47 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.131 a4:5e:60:d6:f4:49
Tue Mar 14 21:41:47 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) a4:5e:60:d6:f4:49
Tue Mar 14 21:41:47 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.131 a4:5e:60:d6:f4:49
Tue Mar 14 21:41:48 2023 daemon.info dnsmasq-dhcp[6228]: DHCPDISCOVER(br-lan) a4:5e:60:d6:f4:49
Tue Mar 14 21:41:48 2023 daemon.info dnsmasq-dhcp[6228]: DHCPOFFER(br-lan) 192.168.8.131 a4:5e:60:d6:f4:49
Tue Mar 14 21:41:49 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.131 a4:5e:60:d6:f4:49
Tue Mar 14 21:41:49 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.131 a4:5e:60:d6:f4:49 MacBook-Nunzio
Tue Mar 14 21:45:35 2023 daemon.info hostapd: wlan0: STA e0:33:8e:7c:19:98 IEEE 802.11: authenticated
Tue Mar 14 21:45:35 2023 daemon.info hostapd: wlan0: STA e0:33:8e:7c:19:98 IEEE 802.11: associated (aid 5)
Tue Mar 14 21:45:35 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED e0:33:8e:7c:19:98 0 0
Tue Mar 14 21:45:35 2023 daemon.info hostapd: wlan0: STA e0:33:8e:7c:19:98 RADIUS: starting accounting session 8A7FDED2EBCEAAFE
Tue Mar 14 21:45:35 2023 daemon.info hostapd: wlan0: STA e0:33:8e:7c:19:98 WPA: pairwise key handshake completed (RSN)
Tue Mar 14 21:45:35 2023 daemon.info dnsmasq-dhcp[6228]: DHCPREQUEST(br-lan) 192.168.8.170 e0:33:8e:7c:19:98
Tue Mar 14 21:45:35 2023 daemon.info dnsmasq-dhcp[6228]: DHCPACK(br-lan) 192.168.8.170 e0:33:8e:7c:19:98 PierosiPhonexs
Tue Mar 14 21:48:48 2023 daemon.err smbd[4837]: [2023/03/14 21:48:48.641952, 0] …/…/source3/smbd/ipc.c:843(reply_trans)
Tue Mar 14 21:48:48 2023 daemon.err smbd[4837]: reply_trans: invalid trans parameters
Tue Mar 14 21:54:10 2023 daemon.notice ovpnserver[3152]: 167.94.138.109:5152 TLS: Initial packet from [AF_INET]167.94.138.109:5152, sid=4d658221 07fcfd52
Tue Mar 14 21:54:25 2023 daemon.notice ovpnserver[3152]: 167.94.138.124:36461 TLS: Initial packet from [AF_INET]167.94.138.124:36461, sid=78a8ab4e f7212a12
Tue Mar 14 21:55:10 2023 daemon.err ovpnserver[3152]: 167.94.138.109:5152 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Mar 14 21:55:10 2023 daemon.err ovpnserver[3152]: 167.94.138.109:5152 TLS Error: TLS handshake failed
Tue Mar 14 21:55:10 2023 daemon.notice ovpnserver[3152]: 167.94.138.109:5152 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 14 21:55:26 2023 daemon.err ovpnserver[3152]: 167.94.138.124:36461 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Mar 14 21:55:26 2023 daemon.err ovpnserver[3152]: 167.94.138.124:36461 TLS Error: TLS handshake failed
Tue Mar 14 21:55:26 2023 daemon.notice ovpnserver[3152]: 167.94.138.124:36461 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 14 21:58:51 2023 user.warn ddns-scripts[6558]: glddns: Get local IP via ‘web’ failed - retry 1/0 in 60 seconds
Tue Mar 14 22:02:07 2023 authpriv.info dropbear[10381]: Child connection from 192.168.8.131:52424
Tue Mar 14 22:02:19 2023 authpriv.notice dropbear[10381]: Password auth succeeded for ‘root’ from 192.168.8.131:52424

last part of the logs.

cheers
Piero

1 Like

Can you export LOG using the buttons on the UI? This can include the crash log.

Hi, I did last day and I have the tar file. the Crash log is empty.
cheers
Piero

1 Like

Another Reboot, and I have no idea why, and no way to check logs, the following are the first few line (I think):

Summary

Thu Mar 16 16:38:02 2023 daemon.notice procd: /etc/rc.d/S99webdav_ser: start app = /usr/bin/webdav_ser
Thu Mar 16 16:38:02 2023 daemon.notice procd: /etc/rc.d/S99webdav_ser: === webdav enable
Thu Mar 16 16:38:02 2023 daemon.info procd: - init complete -
Thu Mar 16 16:38:03 2023 daemon.err nmbd[5596]: [2023/03/16 16:38:03.605977, 0] …/…/lib/util/become_daemon.c:136(daemon_ready)
Thu Mar 16 16:38:03 2023 daemon.err nmbd[5596]: daemon_ready: daemon ‘nmbd’ finished starting up and ready to serve connections
Thu Mar 16 16:38:03 2023 daemon.err nmbd[5596]: [2023/03/16 16:38:03.607234, 0] …/…/source3/nmbd/nmbd_become_dmb.c:294(become_domain_master_browser_bcast)
Thu Mar 16 16:38:03 2023 daemon.err nmbd[5596]: become_domain_master_browser_bcast:
Thu Mar 16 16:38:03 2023 daemon.err nmbd[5596]: Attempting to become domain master browser on workgroup WORKGROUP on subnet 192.168.8.1
Thu Mar 16 16:38:03 2023 daemon.err nmbd[5596]: [2023/03/16 16:38:03.607489, 0] …/…/source3/nmbd/nmbd_become_dmb.c:307(become_domain_master_browser_bcast)
Thu Mar 16 16:38:03 2023 daemon.err nmbd[5596]: become_domain_master_browser_bcast: querying subnet 192.168.8.1 for domain master browser on workgroup WORKGROUP
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq[6538]: Connected to system UBus
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq[6538]: started, version 2.85 cachesize 150
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq[6538]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq[6538]: UBus support enabled: connected to system bus
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq-dhcp[6538]: DHCP, IP range 192.168.9.100 – 192.168.9.249, lease time 12h
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq-dhcp[6538]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq[6538]: using only locally-known addresses for domain test
Thu Mar 16 16:38:03 2023 daemon.info dnsmasq[6538]: using only locally-kno

No Crash logs…
Please let me know if I can check somewhere else inside the router to understand what is going on.
thanks
Cheers
Piero

Hi,
I update to the latest firmware 4.2.1, but I still have the same unexpected reboot.
The uptime goes normally between 2 and 5 days.
This is annoying because during the day, I work, and I can’t afford a reboot at a certain time of the day.
Do you have any idea to how troubleshoot this issue?
Thanks.
regards
Nunzio

1 Like

If there is no crash log, I think we can watch the memory changes in the overview page first.
By the way, do you have any devices connected to your USB?

Hi,
thanks for the answer, if you let me know how to check this memory changes in the overview page I will be happy.
And yes, I have an USB key attached in the USB port, but it was not doing streeming during the last 2 reboot (I’m sure about that).
If you think that this is the issue I can temporary remove it.
Let me know
thanks
regards
Piero

Are you using the original power supply?

Hi, yes, original power supply.

cheers
Piero

Hi, I removed the USB keys but the flint reboot itself after less than 3 days. can you please guide me to troubleshoot or let me know what is the next step?
Not to compare other routers, but I never had this amount of reboot in a router and I’m starting to worry about it.

1 Like

image
In order to facilitate the location of the problem, I have also set up an AX1800, which has been running for 3 days, but no reboot phenomenon has been found temporarily. I will continue to observe.

When you update do you do a clean install(do not keep settings)
Try using a different electrical outlet with no surge protector.
Does it happen around the same-time of day?
Does it always reboot around three days?
Are you running adguardhome with 8-15 list instead of one large blocklist?

Hi,
Some info for my case:

  1. time of the day, RANDOM;

  2. uptime, between 2 and 7 days;

    About what I’m doing to troubleshoot the problem:

  • first, I removed the USB key only, same issue;

  • shutdown the WG and OpenVPN servers, same issue;

  • now I moved the plug to a different socket, did it only yesterday, I will give some info in the next few days.

    My next step will be to reinitialize the firmware.
    In all the cases, I have no log that can help me to understand the issue.

cheers
Piero

I had the same issue as yours last year…

Hi,
And how was it solved? Just exchanged the item?
I will wait for the other few tests, and in case someone from GLINET can tell me what to do, I bought the item on Amazon, and I can always come back to them.
I will keep you updated.

Cheers
Piero