找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 839|回复: 1

[k2t] k2t刷openwr 7.7.3固件长时间下载会导致wifi断网需手动插拔电源恢复 非下载阶段无...

[复制链接]
问题总结:
1.k2t刷openwr 7.7.3固件长时间下载会导致wifi断网需手动插拔电源恢复  非下载阶段无症状

2.顺便问一下   k2t   a3现在适合刷什么固件满足平常正常使用即可   正常跑满带宽


3.还有一个问题就是非常奇怪,手机连wifi能进192.168.1.1,电脑连wifi就不能进。



这里贴出来系统日志:
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.000000] Linux version 4.9.107 (lean@lean-esx) (gcc version 7.3.0 (OpenWrt GCC 7.3.0 r478-730605b) ) #0 Sun Jun 10 09:45:25 2018
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000] MyLoader: sysp=69946996, boardp=69956997, parts=6d96ff96
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] bootconsole [early0] enabled
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] CPU0 revision is: 00019750 (MIPS 74Kc)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] SoC: Qualcomm Atheros QCA956X ver 1 rev 0
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Determined physical RAM map:
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000]  memory: 04000000 @ 00000000 (usable)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Sat Feb 22 19:30:44 2020 kern.warn kernel: [    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
Sat Feb 22 19:30:44 2020 kern.warn kernel: [    0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Zone ranges:
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000]   Normal   [mem 0x0000000000000000-0x0000000003ffffff]
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Movable zone start for each node
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Early memory node ranges
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000003ffffff]
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000003ffffff]
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000] On node 0 totalpages: 16384
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000] free_area_init_node: node 0, pgdat 8041ec74, node_mem_map 81000020
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000]   Normal zone: 128 pages used for memmap
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000]   Normal zone: 0 pages reserved
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000]   Normal zone: 16384 pages, LIFO batch:3
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 16256
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.000000] Kernel command line:  board=K2T mtdparts=spi0.0:192k(u-boot)ro,64k(config)ro,320k(permanent),15744k(firmware),64k(art)ro console=ttyS0,115200 rootfstype=squashfs noinitrd
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Writing ErrCtl register=00000000
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Readback ErrCtl register=00000000
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Memory: 60152K/65536K available (3241K kernel code, 171K rwdata, 428K rodata, 312K init, 213K bss, 5384K reserved, 0K cma-reserved)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] NR_IRQS:51
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] Clocks: CPU:850.000MHz, DDR:625.000MHz, AHB:283.333MHz, Ref:25.000MHz
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 4497083404 ns
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.000007] sched_clock: 32 bits at 425MHz, resolution 2ns, wraps every 5052902398ns
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.008843] Calibrating delay loop... 422.70 BogoMIPS (lpj=2113536)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.071916] pid_max: default: 32768 minimum: 301
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.077241] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.084750] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.094886] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.106062] futex hash table entries: 256 (order: -1, 3072 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.113467] NET: Registered protocol family 16
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.119777] MIPS: machine is Phicomm K2T A1/A2/A3 board
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.126095] ar71xx: using random MAC address for eth0
Sat Feb 22 19:30:44 2020 kern.warn kernel: [    0.358926] registering PCI controller with io_map_base unset
Sat Feb 22 19:30:44 2020 kern.warn kernel: [    0.365453] Can't analyze schedule() prologue at 80386b14
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.379366] PCI host bridge to bus 0000:00
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.384063] pci_bus 0000:00: root bus resource [mem 0x12000000-0x13ffffff]
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.391862] pci_bus 0000:00: root bus resource [io  0x0001]
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.398188] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.405885] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.414903] pci 0000:00:00.0: [168c:0056] type 00 class 0x028000
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.414941] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.415053] pci 0000:00:00.0: PME# supported from D0 D3hot
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.415214] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.415236] pci 0000:00:00.0: BAR 0: assigned [mem 0x12000000-0x121fffff 64bit]
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.423551] pci 0000:00:00.0: using irq 40 for pin 1
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.429770] clocksource: Switched to clocksource MIPS
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.436369] NET: Registered protocol family 2
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.442127] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.450080] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.457295] TCP: Hash tables configured (established 1024 bind 1024)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.464601] UDP hash table entries: 256 (order: 0, 4096 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.471263] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.478600] NET: Registered protocol family 1
Sat Feb 22 19:30:44 2020 kern.debug kernel: [    0.483612] PCI: CLS 0 bytes, default 32
Sat Feb 22 19:30:44 2020 kern.warn kernel: [    0.487137] Crashlog allocated RAM at address 0x3f00000
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.493892] workingset: timestamp_bits=30 max_order=14 bucket_order=0
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.506781] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.513429] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.531566] io scheduler noop registered
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.536017] io scheduler deadline registered (default)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.542188] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.549722] console [ttyS0] disabled
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.573844] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 1562500) is a 16550A
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.583638] console [ttyS0] enabled
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.591191] bootconsole [early0] disabled
Sat Feb 22 19:30:44 2020 kern.warn kernel: [    0.602464] m25p80 spi0.0: found gd25q128, expected m25p80
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.610188] m25p80 spi0.0: gd25q128 (16384 Kbytes)
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.615162] 5 cmdlinepart partitions found on MTD device spi0.0
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.621287] Creating 5 MTD partitions on "spi0.0":
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.626240] 0x000000000000-0x000000030000 : "u-boot"
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.632537] 0x000000030000-0x000000040000 : "config"
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.638901] 0x000000040000-0x000000090000 : "permanent"
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.645584] 0x000000090000-0x000000ff0000 : "firmware"
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.675170] 2 uimage-fw partitions found on MTD device firmware
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.681323] 0x000000090000-0x0000001e0000 : "kernel"
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.687502] 0x0000001e0000-0x000000ff0000 : "rootfs"
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.693934] mtd: device 5 (rootfs) set to be root filesystem
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.699864] 1 squashfs-split partitions found on MTD device rootfs
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.706255] 0x0000008b0000-0x000000ff0000 : "rootfs_data"
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    0.713111] 0x000000ff0000-0x000001000000 : "art"
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.720032] libphy: Fixed MDIO Bus: probed
Sat Feb 22 19:30:44 2020 kern.info kernel: [    0.735740] switch0: Atheros AR8337 rev. 2 switch registered on ag71xx-mdio.0
Sat Feb 22 19:30:44 2020 kern.info kernel: [    1.426973] libphy: ag71xx_mdio: probed
Sat Feb 22 19:30:44 2020 kern.info kernel: [    2.061218] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd036, driver=Atheros AR8216/AR8236/AR8316]
Sat Feb 22 19:30:44 2020 kern.info kernel: [    2.072747] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:SGMII
Sat Feb 22 19:30:44 2020 kern.info kernel: [    2.080337] NET: Registered protocol family 10
Sat Feb 22 19:30:44 2020 kern.info kernel: [    2.087480] NET: Registered protocol family 17
Sat Feb 22 19:30:44 2020 kern.info kernel: [    2.092246] 8021q: 802.1Q VLAN Support v1.8
Sat Feb 22 19:30:44 2020 kern.info kernel: [    2.102216] VFS: Mounted root (squashfs filesystem) readonly on device 31:5.
Sat Feb 22 19:30:44 2020 kern.info kernel: [    2.111299] Freeing unused kernel memory: 312K
Sat Feb 22 19:30:44 2020 kern.warn kernel: [    2.115886] This architecture does not have kernel memory protection.
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    2.569792] random: fast init done
Sat Feb 22 19:30:44 2020 user.info kernel: [    2.739546] init: Console is alive
Sat Feb 22 19:30:44 2020 user.info kernel: [    2.743300] init: - watchdog -
Sat Feb 22 19:30:44 2020 user.info kernel: [    4.508329] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.623221] usbcore: registered new interface driver usbfs
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.628949] usbcore: registered new interface driver hub
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.634567] usbcore: registered new device driver usb
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.667009] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    4.681094] SCSI subsystem initialized
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.689284] ehci-platform: EHCI generic platform driver
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.694805] ehci-platform ehci-platform.0: EHCI Host Controller
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.700964] ehci-platform ehci-platform.0: new USB bus registered, assigned bus number 1
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.711407] ehci-platform ehci-platform.0: irq 48, io mem 0x1b000000
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.739806] ehci-platform ehci-platform.0: USB 2.0 started, EHCI 1.00
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.747152] hub 1-0:1.0: USB hub found
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.751353] hub 1-0:1.0: 1 port detected
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.755696] ehci-platform ehci-platform.1: EHCI Host Controller
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.761880] ehci-platform ehci-platform.1: new USB bus registered, assigned bus number 2
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.772344] ehci-platform ehci-platform.1: irq 49, io mem 0x1b400000
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.799788] ehci-platform ehci-platform.1: USB 2.0 started, EHCI 1.00
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.807116] hub 2-0:1.0: USB hub found
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.811325] hub 2-0:1.0: 1 port detected
Sat Feb 22 19:30:44 2020 kern.info kernel: [    4.819213] usbcore: registered new interface driver usb-storage
Sat Feb 22 19:30:44 2020 user.info kernel: [    4.826126] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Sat Feb 22 19:30:44 2020 user.info kernel: [    4.835943] init: - preinit -
Sat Feb 22 19:30:44 2020 kern.info kernel: [    5.641121] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    5.770036] random: procd: uninitialized urandom read (4 bytes read)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    6.671159] eth0: link up (1000Mbps/Full duplex)
Sat Feb 22 19:30:44 2020 kern.info kernel: [    6.676051] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sat Feb 22 19:30:44 2020 user.info kernel: [    8.936195] mount_root: loading kmods from internal overlay
Sat Feb 22 19:30:44 2020 user.info kernel: [    8.998937] kmodloader: loading kernel modules from //etc/modules-boot.d/*
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.007521] kmodloader: done loading kernel modules from //etc/modules-boot.d/*
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    9.409759] jffs2: notice: (444) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.426101] block: attempting to load /tmp/jffs_cfg/upper/etc/config/fstab
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.437312] block: extroot: not configured
Sat Feb 22 19:30:44 2020 kern.notice kernel: [    9.543317] jffs2: notice: (442) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.560333] mount_root: loading kmods from internal overlay
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.621157] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.632127] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.856283] block: attempting to load /tmp/jffs_cfg/upper/etc/config/fstab
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.865908] block: extroot: not configured
Sat Feb 22 19:30:44 2020 user.info kernel: [    9.871054] mount_root: switching to jffs2 overlay
Sat Feb 22 19:30:44 2020 user.warn kernel: [    9.935408] urandom-seed: Seeding with /etc/urandom.seed
Sat Feb 22 19:30:44 2020 kern.info kernel: [   10.044194] eth0: link down
Sat Feb 22 19:30:44 2020 user.info kernel: [   10.056791] procd: - early -
Sat Feb 22 19:30:44 2020 user.info kernel: [   10.060426] procd: - watchdog -
Sat Feb 22 19:30:44 2020 user.info kernel: [   10.679643] procd: - watchdog -
Sat Feb 22 19:30:44 2020 user.info kernel: [   10.683380] procd: - ubus -
Sat Feb 22 19:30:44 2020 kern.notice kernel: [   10.920473] random: ubusd: uninitialized urandom read (4 bytes read)
Sat Feb 22 19:30:44 2020 kern.notice kernel: [   10.953370] random: ubusd: uninitialized urandom read (4 bytes read)
Sat Feb 22 19:30:44 2020 kern.notice kernel: [   10.962721] random: ubusd: uninitialized urandom read (4 bytes read)
Sat Feb 22 19:30:44 2020 user.info kernel: [   10.978142] procd: - init -
Sat Feb 22 19:30:44 2020 user.info kernel: [   11.725888] kmodloader: loading kernel modules from /etc/modules.d/*
Sat Feb 22 19:30:44 2020 kern.info kernel: [   11.849746] Initializing XFRM netlink socket
Sat Feb 22 19:30:44 2020 kern.info kernel: [   11.872507] NET: Registered protocol family 15
Sat Feb 22 19:30:44 2020 kern.info kernel: [   11.943846] gre: GRE over IPv4 demultiplexor driver
Sat Feb 22 19:30:44 2020 kern.info kernel: [   11.951013] ip_gre: GRE over IPv4 tunneling driver
Sat Feb 22 19:30:44 2020 kern.info kernel: [   11.973146] ip6_tables: (C) 2000-2006 Netfilter Core Team
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.004225] Netfilter messages via NETLINK v0.30.
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.012001] ip_set: protocol 6
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.124654] u32 classifier
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.127457]     input device check on
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.131272]     Actions configured
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.137477] Mirror/redirect action on
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.156900] nf_conntrack version 0.5.0 (1024 buckets, 4096 max)
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.194719] fuse init (API version 7.26)
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.216123] Loading modules backported from Linux version wt-2017-11-01-0-gfe248fc2c180
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.224433] Backport generated by backports.git v4.14-rc2-1-31-g86cf0e5d
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.252578] ip_tables: (C) 2000-2006 Netfilter Core Team
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.410776] ctnetlink v0.93: registering with nfnetlink.
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.638500] usbcore: registered new interface driver ums-alauda
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.662916] usbcore: registered new interface driver ums-cypress
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.671666] usbcore: registered new interface driver ums-datafab
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.685931] usbcore: registered new interface driver ums-freecom
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.702683] usbcore: registered new interface driver ums-isd200
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.731993] usbcore: registered new interface driver ums-jumpshot
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.740620] usbcore: registered new interface driver ums-karma
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.762488] usbcore: registered new interface driver ums-sddr09
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.786864] usbcore: registered new interface driver ums-sddr55
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.795817] usbcore: registered new interface driver ums-usbat
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.821864] usbcore: registered new interface driver usblp
Sat Feb 22 19:30:44 2020 kern.info kernel: [   12.910213] xt_time: kernel timezone is -0000
Sat Feb 22 19:30:44 2020 kern.alert kernel: [   13.042163] fast-classifier: starting up
Sat Feb 22 19:30:44 2020 kern.alert kernel: [   13.046368] fast-classifier: registered
Sat Feb 22 19:30:44 2020 kern.info kernel: [   13.155487] PPP generic driver version 2.4.2
Sat Feb 22 19:30:44 2020 kern.info kernel: [   13.175061] PPP MPPE Compression module registered
Sat Feb 22 19:30:44 2020 kern.info kernel: [   13.181806] NET: Registered protocol family 24
Sat Feb 22 19:30:44 2020 kern.warn kernel: [   13.254161] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
Sat Feb 22 19:30:44 2020 kern.info kernel: [   13.260359] ath10k_pci 0000:00:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
Sat Feb 22 19:30:44 2020 kern.warn kernel: [   13.483849] ath10k_pci 0000:00:00.0: Direct firmware load for ath10k/QCA9888/hw2.0/firmware-6.bin failed with error -2
Sat Feb 22 19:30:44 2020 kern.warn kernel: [   13.494957] ath10k_pci 0000:00:00.0: Falling back to user helper
Sat Feb 22 19:30:44 2020 kern.err kernel: [   14.417059] firmware ath10k!QCA9888!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
Sat Feb 22 19:30:44 2020 kern.info kernel: [   14.963070] ath10k_pci 0000:00:00.0: qca9888 hw2.0 target 0x01000000 chip_id 0x00000000 sub 0000:0000
Sat Feb 22 19:30:44 2020 kern.info kernel: [   14.972628] ath10k_pci 0000:00:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
Sat Feb 22 19:30:44 2020 kern.info kernel: [   14.992302] ath10k_pci 0000:00:00.0: firmware ver 10.4-3.5.3-00053 api 5 features no-p2p,mfp,peer-flow-ctrl,allows-mesh-bcast,no-ps crc32 a9603656
Sat Feb 22 19:30:44 2020 kern.err kernel: [   15.308570] ath10k_pci 0000:00:00.0: failed to fetch board data for bus=pci,bmi-chip-id=0,bmi-board-id=20 from ath10k/QCA9888/hw2.0/board-2.bin
Sat Feb 22 19:30:44 2020 kern.info kernel: [   15.322626] ath10k_pci 0000:00:00.0: board_file api 1 bmi_id 0:20 crc32 641f2a00
Sat Feb 22 19:30:44 2020 kern.info kernel: [   17.483132] ath10k_pci 0000:00:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 512 raw 0 hwcrypto 1
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.590905] ath: EEPROM regdomain: 0x0
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.590911] ath: EEPROM indicates default country code should be used
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.590914] ath: doing EEPROM country->regdmn map search
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.590925] ath: country maps to regdmn code: 0x3a
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.590929] ath: Country alpha2 being used: US
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.590931] ath: Regpair used: 0x3a
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.701151] ath: EEPROM regdomain: 0x0
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.701159] ath: EEPROM indicates default country code should be used
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.701162] ath: doing EEPROM country->regdmn map search
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.701172] ath: country maps to regdmn code: 0x3a
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.701176] ath: Country alpha2 being used: US
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.701178] ath: Regpair used: 0x3a
Sat Feb 22 19:30:44 2020 kern.debug kernel: [   17.710874] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Sat Feb 22 19:30:44 2020 kern.info kernel: [   17.714505] ieee80211 phy1: Atheros AR9561 Rev:0 mem=0xb8100000, irq=47
Sat Feb 22 19:30:44 2020 user.info kernel: [   17.803482] kmodloader: done loading kernel modules from /etc/modules.d/*
Sat Feb 22 19:30:44 2020 kern.warn kernel: [   18.935586] urandom_read: 5 callbacks suppressed
Sat Feb 22 19:30:44 2020 kern.notice kernel: [   18.935593] random: jshn: uninitialized urandom read (4 bytes read)
Sat Feb 22 19:30:45 2020 cron.info crond[1269]: crond (busybox 1.28.3) started, log level 5
Sat Feb 22 19:30:45 2020 daemon.notice procd: /etc/rc.d/S19firewall: stop mem mode
Sat Feb 22 19:30:46 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sat Feb 22 19:30:46 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sat Feb 22 19:30:46 2020 daemon.notice procd: /etc/rc.d/S19firewall: start mem mode
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: started, version 2.79 cachesize 150
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: DNS service limited to local subnets
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack ipset no-auth no-DNSSEC loop-detect inotify
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using local addresses only for domain test
Sat Feb 22 19:30:46 2020 daemon.notice procd: /etc/rc.d/S19firewall: mount adbyby
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using local addresses only for domain onion
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using local addresses only for domain localhost
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using local addresses only for domain local
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using local addresses only for domain invalid
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using local addresses only for domain bind
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using nameserver 219.147.1.66#53
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using nameserver 219.146.0.130#53
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: using local addresses only for domain lan
Sat Feb 22 19:30:46 2020 daemon.warn dnsmasq[1330]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: read /etc/hosts - 4 addresses
Sat Feb 22 19:30:46 2020 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Sat Feb 22 19:30:46 2020 daemon.notice procd: /etc/rc.d/S19firewall: add adbyby rules
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1330]: exiting on receipt of SIGTERM
Sat Feb 22 19:30:49 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sat Feb 22 19:30:49 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: started, version 2.79 cachesize 150
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: DNS service limited to local subnets
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack ipset no-auth no-DNSSEC loop-detect inotify
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using local addresses only for domain test
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using local addresses only for domain onion
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using local addresses only for domain localhost
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using local addresses only for domain local
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using local addresses only for domain invalid
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using local addresses only for domain bind
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using nameserver 114.114.114.114#53 for domain valf.atm.youku.com
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using nameserver 219.147.1.66#53
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using nameserver 219.146.0.130#53
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: using local addresses only for domain lan
Sat Feb 22 19:30:49 2020 daemon.warn dnsmasq[1845]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: read /etc/hosts - 4 addresses
Sat Feb 22 19:30:49 2020 daemon.info dnsmasq[1845]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Sat Feb 22 19:30:51 2020 user.notice : Added device handler type: tunnel
Sat Feb 22 19:30:51 2020 user.notice : Added device handler type: Network device
Sat Feb 22 19:30:51 2020 user.notice : Added device handler type: bridge
Sat Feb 22 19:30:51 2020 user.notice : Added device handler type: veth
Sat Feb 22 19:30:51 2020 user.notice : Added device handler type: macvlan
Sat Feb 22 19:30:51 2020 user.notice : Added device handler type: 8021ad
Sat Feb 22 19:30:51 2020 user.notice : Added device handler type: 8021q
Sat Feb 22 19:30:52 2020 daemon.notice procd: /etc/rc.d/S30sfe: enable
Sat Feb 22 19:30:52 2020 daemon.notice procd: /etc/rc.d/S30sfe: wifi
Sat Feb 22 19:30:52 2020 daemon.notice procd: /etc/rc.d/S30sfe: no ipv6
Sat Feb 22 19:30:52 2020 daemon.err block: /dev/mtdblock5 is already mounted on /rom
Sat Feb 22 19:30:52 2020 daemon.err block: /dev/mtdblock6 is already mounted on /overlay
Sat Feb 22 19:30:52 2020 daemon.notice procd: /etc/rc.d/S50autoreboot: sh: 1: unknown operand
Sat Feb 22 19:30:52 2020 daemon.notice procd: /etc/rc.d/S50autoreboot: Auto REBOOT has started.
Sat Feb 22 19:30:54 2020 authpriv.info dropbear[1977]: Not backgrounding
Sat Feb 22 19:30:55 2020 kern.info kernel: [   30.822104] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Sat Feb 22 19:30:55 2020 kern.info kernel: [   30.855248] br-lan: port 1(eth0.1) entered blocking state
Sat Feb 22 19:30:55 2020 kern.info kernel: [   30.860895] br-lan: port 1(eth0.1) entered disabled state
Sat Feb 22 19:30:55 2020 kern.info kernel: [   30.866760] device eth0.1 entered promiscuous mode
Sat Feb 22 19:30:55 2020 kern.info kernel: [   30.871748] device eth0 entered promiscuous mode
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'lan' is enabled
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'lan' is setting up now
Sat Feb 22 19:30:55 2020 kern.info kernel: [   30.940880] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'lan' is now up
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'loopback' is enabled
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'loopback' is setting up now
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'loopback' is now up
Sat Feb 22 19:30:55 2020 kern.info kernel: [   30.997348] IPv6: ADDRCONF(NETDEV_UP): eth0.2: link is not ready
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'wan' is enabled
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'wan6' is enabled
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Network device 'lo' link is up
Sat Feb 22 19:30:55 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
Sat Feb 22 19:30:56 2020 kern.info kernel: [   31.871547] eth0: link up (1000Mbps/Full duplex)
Sat Feb 22 19:30:56 2020 kern.info kernel: [   31.876437] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sat Feb 22 19:30:56 2020 daemon.notice netifd: VLAN 'eth0.1' link is up
Sat Feb 22 19:30:56 2020 daemon.notice netifd: VLAN 'eth0.2' link is up
Sat Feb 22 19:30:56 2020 daemon.notice netifd: Interface 'wan' has link connectivity
Sat Feb 22 19:30:56 2020 daemon.notice netifd: Interface 'wan' is setting up now
Sat Feb 22 19:30:56 2020 daemon.notice netifd: Interface 'wan6' has link connectivity
Sat Feb 22 19:30:56 2020 daemon.notice netifd: Interface 'wan6' is setting up now
Sat Feb 22 19:30:56 2020 daemon.notice netifd: Interface 'wan6' is now up
Sat Feb 22 19:30:56 2020 daemon.notice netifd: Network device 'eth0' link is up
Sat Feb 22 19:30:56 2020 kern.info kernel: [   31.970036] br-lan: port 1(eth0.1) entered blocking state
Sat Feb 22 19:30:56 2020 kern.info kernel: [   31.975618] br-lan: port 1(eth0.1) entered forwarding state
Sat Feb 22 19:30:56 2020 kern.info kernel: [   31.981528] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.2: link becomes ready
Sat Feb 22 19:30:56 2020 daemon.notice netifd: bridge 'br-lan' link is up
Sat Feb 22 19:30:56 2020 daemon.notice netifd: Interface 'lan' has link connectivity
Sat Feb 22 19:30:56 2020 kern.info kernel: [   32.149900] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Sat Feb 22 19:30:56 2020 daemon.err insmod: module is already loaded - slhc
Sat Feb 22 19:30:56 2020 daemon.err insmod: module is already loaded - ppp_generic
Sat Feb 22 19:30:56 2020 daemon.err insmod: module is already loaded - pppox
Sat Feb 22 19:30:56 2020 daemon.err insmod: module is already loaded - pppoe
Sat Feb 22 19:30:56 2020 daemon.notice netifd: wan (2228): uci: Entry not found
Sat Feb 22 19:30:57 2020 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sat Feb 22 19:30:58 2020 daemon.info pppd[2335]: Plugin rp-pppoe.so loaded.
Sat Feb 22 19:30:58 2020 daemon.info pppd[2335]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Sat Feb 22 19:30:58 2020 daemon.notice pppd[2335]: pppd 2.4.7 started by root, uid 0
Sat Feb 22 19:30:58 2020 daemon.notice netifd: radio0 (2125): command failed: Not supported (-122)
Sat Feb 22 19:31:00 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Sat Feb 22 19:31:00 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
Sat Feb 22 19:31:00 2020 cron.info crond[1269]: USER root pid 2621 cmd /etc/hotplug.d/iface/25-Oray start
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.822987] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.859346] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.887119] br-lan: port 2(wlan0) entered blocking state
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.892673] br-lan: port 2(wlan0) entered disabled state
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.898546] device wlan0 entered promiscuous mode
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.933728] br-lan: port 3(wlan1) entered blocking state
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.939221] br-lan: port 3(wlan1) entered disabled state
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.945090] device wlan1 entered promiscuous mode
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.950066] br-lan: port 3(wlan1) entered blocking state
Sat Feb 22 19:31:03 2020 kern.info kernel: [   38.955555] br-lan: port 3(wlan1) entered forwarding state
Sat Feb 22 19:31:03 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Sat Feb 22 19:31:03 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Sat Feb 22 19:31:03 2020 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Sat Feb 22 19:31:03 2020 daemon.err hostapd: Using interface wlan1 with hwaddr 98:bb:99:0c:6b:a0 and ssid "TP-LINK_2.4GHz_B3319D"
Sat Feb 22 19:31:03 2020 daemon.err hostapd: Using interface wlan0 with hwaddr 98:bb:99:0c:6b:9f and ssid "TP-LINK_5GHz_B3319E_RPT2G"
Sat Feb 22 19:31:04 2020 kern.info kernel: [   40.220924] br-lan: port 3(wlan1) entered disabled state
Sat Feb 22 19:31:05 2020 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
Sat Feb 22 19:31:05 2020 daemon.notice hostapd: wlan1: AP-ENABLED
Sat Feb 22 19:31:05 2020 kern.info kernel: [   40.561501] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Sat Feb 22 19:31:05 2020 kern.info kernel: [   40.568294] br-lan: port 3(wlan1) entered blocking state
Sat Feb 22 19:31:05 2020 kern.info kernel: [   40.573833] br-lan: port 3(wlan1) entered forwarding state
Sat Feb 22 19:31:05 2020 daemon.notice netifd: Network device 'wlan1' link is up
Sat Feb 22 19:31:05 2020 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Sat Feb 22 19:31:05 2020 daemon.notice hostapd: wlan0: AP-ENABLED
Sat Feb 22 19:31:05 2020 daemon.notice procd: /etc/rc.d/S90vlmcsd: OpenWrt
Sat Feb 22 19:31:05 2020 daemon.notice procd: /etc/rc.d/S90vlmcsd: OpenWrt
Sat Feb 22 19:31:05 2020 daemon.notice procd: /etc/rc.d/S90vlmcsd: KMS Server has started.
Sat Feb 22 19:31:06 2020 daemon.notice netifd: Network device 'wlan0' link is up
Sat Feb 22 19:31:06 2020 kern.info kernel: [   41.610001] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Sat Feb 22 19:31:06 2020 kern.info kernel: [   41.616740] br-lan: port 2(wlan0) entered blocking state
Sat Feb 22 19:31:06 2020 kern.info kernel: [   41.622276] br-lan: port 2(wlan0) entered forwarding state
Sat Feb 22 19:31:06 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN(blue)
Sat Feb 22 19:31:06 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led STATUS(yellow)
Sat Feb 22 19:31:06 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led RUNNING(red)
Sat Feb 22 19:31:07 2020 daemon.err miniupnpd[3234]: could not open lease file: /var/run/miniupnpd.leases
Sat Feb 22 19:31:07 2020 daemon.notice miniupnpd[3234]: HTTP listening on port 5000
Sat Feb 22 19:31:07 2020 daemon.notice miniupnpd[3234]: HTTP IPv6 address given to control points : [fdfa:d94:f84b::1]
Sat Feb 22 19:31:07 2020 daemon.notice miniupnpd[3234]: Listening for NAT-PMP/PCP traffic on port 5351
Sat Feb 22 19:31:07 2020 daemon.info hostapd: wlan1: STA fe:7c:02:18:44:6c IEEE 802.11: authenticated
Sat Feb 22 19:31:07 2020 daemon.info hostapd: wlan1: STA fe:7c:02:18:44:6c IEEE 802.11: associated (aid 1)
Sat Feb 22 19:31:07 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED fe:7c:02:18:44:6c
Sat Feb 22 19:31:07 2020 daemon.info hostapd: wlan1: STA fe:7c:02:18:44:6c RADIUS: starting accounting session 13CDDA271DC3152F
Sat Feb 22 19:31:07 2020 daemon.info hostapd: wlan1: STA fe:7c:02:18:44:6c WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:07 2020 daemon.notice procd: /etc/rc.d/S99adbyby: start mem mode
Sat Feb 22 19:31:07 2020 daemon.info dnsmasq[1845]: exiting on receipt of SIGTERM
Sat Feb 22 19:31:08 2020 daemon.notice procd: /etc/rc.d/S99adbyby: has mount
Sat Feb 22 19:31:08 2020 daemon.notice procd: /etc/rc.d/S99adbyby: add adbyby rules
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:8b:4e:2b IEEE 802.11: authenticated
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:8b:4e:2b IEEE 802.11: associated (aid 2)
Sat Feb 22 19:31:08 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 02:6b:8e:8b:4e:2b
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:8b:4e:2b RADIUS: starting accounting session 8E9D8A5076844D4F
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:8b:4e:2b WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:95:1a:bd IEEE 802.11: authenticated
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:b9:b4:25 IEEE 802.11: authenticated
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:95:1a:bd IEEE 802.11: associated (aid 3)
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:b9:b4:25 IEEE 802.11: associated (aid 4)
Sat Feb 22 19:31:08 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 02:6b:8e:95:1a:bd
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:95:1a:bd RADIUS: starting accounting session 06E218BEEF386B94
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:95:1a:bd WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:08 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 02:6b:8e:b9:b4:25
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:b9:b4:25 RADIUS: starting accounting session 9C8B6300FEEEFA96
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:b9:b4:25 WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: started, version 2.79 cachesize 150
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: DNS service limited to local subnets
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack ipset no-auth no-DNSSEC loop-detect inotify
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq-dhcp[3297]: DHCP, IP range 192.168.1.100 -- 192.168.1.199, lease time 3d
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using local addresses only for domain test
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using local addresses only for domain onion
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using local addresses only for domain localhost
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using local addresses only for domain local
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using local addresses only for domain invalid
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using local addresses only for domain bind
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA d4:4b:b6:25:1e:5c IEEE 802.11: authenticated
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using nameserver 114.114.114.114#53 for domain valf.atm.youku.com
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using nameserver 219.147.1.66#53
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using nameserver 219.146.0.130#53
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: using local addresses only for domain lan
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA d4:4b:b6:25:1e:5c IEEE 802.11: associated (aid 5)
Sat Feb 22 19:31:08 2020 daemon.warn dnsmasq[3297]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: read /etc/hosts - 4 addresses
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq-dhcp[3297]: read /etc/ethers - 0 addresses
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:24:5a:78 IEEE 802.11: authenticated
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:24:5a:78 IEEE 802.11: associated (aid 6)
Sat Feb 22 19:31:08 2020 daemon.info dnsmasq[3297]: exiting on receipt of SIGTERM
Sat Feb 22 19:31:08 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 02:6b:8e:24:5a:78
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:24:5a:78 RADIUS: starting accounting session 035ED5A4DD7EEBF4
Sat Feb 22 19:31:08 2020 daemon.info hostapd: wlan1: STA 02:6b:8e:24:5a:78 WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:09 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sat Feb 22 19:31:09 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sat Feb 22 19:31:09 2020 daemon.notice procd: /etc/rc.d/S99adbyby: udhcpc: started, v1.28.3
Sat Feb 22 19:31:09 2020 daemon.notice procd: /etc/rc.d/S99adbyby: udhcpc: sending discover
Sat Feb 22 19:31:09 2020 user.notice ddns-scripts[3353]: 3322: PID '3353' started at 2020-02-22 19:31
Sat Feb 22 19:31:09 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d4:4b:b6:25:1e:5c
Sat Feb 22 19:31:09 2020 daemon.info hostapd: wlan1: STA d4:4b:b6:25:1e:5c RADIUS: starting accounting session A67A7E85AF40155A
Sat Feb 22 19:31:09 2020 daemon.info hostapd: wlan1: STA d4:4b:b6:25:1e:5c WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:10 2020 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
Sat Feb 22 19:31:12 2020 daemon.notice procd: /etc/rc.d/S99adbyby: udhcpc: no lease, failing
Sat Feb 22 19:31:13 2020 daemon.notice procd: /etc/rc.d/S99乳酸菌饮料pro: WARNING: 违禁软件 is disabled.
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: started, version 2.79 cachesize 150
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: DNS service limited to local subnets
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack ipset no-auth no-DNSSEC loop-detect inotify
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq-dhcp[4022]: DHCP, IP range 192.168.1.100 -- 192.168.1.199, lease time 3d
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using local addresses only for domain test
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using local addresses only for domain onion
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using local addresses only for domain localhost
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using local addresses only for domain local
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using local addresses only for domain invalid
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using local addresses only for domain bind
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using nameserver 114.114.114.114#53 for domain valf.atm.youku.com
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using nameserver 219.147.1.66#53
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using nameserver 219.146.0.130#53
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: using local addresses only for domain lan
Sat Feb 22 19:31:13 2020 daemon.warn dnsmasq[4022]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Feb 22 19:31:13 2020 daemon.warn pppd[2335]: Timeout waiting for PADO packets
Sat Feb 22 19:31:13 2020 daemon.err pppd[2335]: Unable to complete PPPoE Discovery
Sat Feb 22 19:31:13 2020 daemon.info pppd[2335]: Exit.
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: read /etc/hosts - 4 addresses
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq[4022]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Feb 22 19:31:13 2020 daemon.info dnsmasq-dhcp[4022]: read /etc/ethers - 0 addresses
Sat Feb 22 19:31:13 2020 daemon.info procd: - init complete -
Sat Feb 22 19:31:13 2020 daemon.notice netifd: Interface 'wan' is now down
Sat Feb 22 19:31:13 2020 daemon.notice netifd: Interface 'wan' is setting up now
Sat Feb 22 19:31:13 2020 daemon.err insmod: module is already loaded - slhc
Sat Feb 22 19:31:13 2020 daemon.err insmod: module is already loaded - ppp_generic
Sat Feb 22 19:31:13 2020 daemon.err insmod: module is already loaded - pppox
Sat Feb 22 19:31:13 2020 daemon.err insmod: module is already loaded - pppoe
Sat Feb 22 19:31:13 2020 daemon.notice netifd: wan (4111): uci: Entry not found
Sat Feb 22 19:31:13 2020 daemon.info pppd[4156]: Plugin rp-pppoe.so loaded.
Sat Feb 22 19:31:13 2020 daemon.info pppd[4156]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Sat Feb 22 19:31:13 2020 daemon.notice pppd[4156]: pppd 2.4.7 started by root, uid 0
Sat Feb 22 19:31:13 2020 daemon.info hostapd: wlan0: STA fe:7c:02:18:44:6d IEEE 802.11: authenticated
Sat Feb 22 19:31:13 2020 daemon.info hostapd: wlan0: STA fe:7c:02:18:44:6d IEEE 802.11: associated (aid 1)
Sat Feb 22 19:31:15 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED fe:7c:02:18:44:6d
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA fe:7c:02:18:44:6d RADIUS: starting accounting session E3CF7DD4981CACD4
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA fe:7c:02:18:44:6d WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:25:1e:5c IEEE 802.11: authenticated
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:0c:6b:9d IEEE 802.11: authenticated
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:24:5a:78 IEEE 802.11: authenticated
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:25:1e:5c IEEE 802.11: associated (aid 2)
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:0c:6b:9d IEEE 802.11: associated (aid 3)
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:24:5a:78 IEEE 802.11: associated (aid 4)
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b IEEE 802.11: authenticated
Sat Feb 22 19:31:15 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b IEEE 802.11: associated (aid 5)
Sat Feb 22 19:31:16 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 02:6b:8e:25:1e:5c
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:25:1e:5c RADIUS: starting accounting session 8E84E2DA2D6F773A
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:25:1e:5c WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:16 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 02:6b:8e:0c:6b:9d
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:0c:6b:9d RADIUS: starting accounting session C9DAEC61FEEAC278
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:0c:6b:9d WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:16 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 02:6b:8e:24:5a:78
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:24:5a:78 RADIUS: starting accounting session 4F1B844317A5A39E
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:24:5a:78 WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:16 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 02:6b:8e:8b:4e:2b
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b RADIUS: starting accounting session 68737B28DA6F9953
Sat Feb 22 19:31:16 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:19 2020 daemon.info dnsmasq-dhcp[4022]: DHCPDISCOVER(br-lan) d4:4b:b6:25:1e:5c
Sat Feb 22 19:31:19 2020 daemon.info dnsmasq-dhcp[4022]: DHCPOFFER(br-lan) 192.168.1.196 d4:4b:b6:25:1e:5c
Sat Feb 22 19:31:19 2020 daemon.info dnsmasq[4022]: read /etc/hosts - 4 addresses
Sat Feb 22 19:31:19 2020 daemon.info dnsmasq[4022]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Feb 22 19:31:19 2020 daemon.info dnsmasq-dhcp[4022]: read /etc/ethers - 0 addresses
Sat Feb 22 19:31:19 2020 daemon.info dnsmasq-dhcp[4022]: DHCPREQUEST(br-lan) 192.168.1.160 d4:4b:b6:25:1e:5c
Sat Feb 22 19:31:19 2020 daemon.info dnsmasq-dhcp[4022]: DHCPNAK(br-lan) 192.168.1.160 d4:4b:b6:25:1e:5c wrong server-ID
Sat Feb 22 19:31:19 2020 daemon.info hostapd: wlan0: STA 34:08:bc:a2:f2:84 IEEE 802.11: authenticated
Sat Feb 22 19:31:19 2020 daemon.info hostapd: wlan0: STA 34:08:bc:a2:f2:84 IEEE 802.11: associated (aid 6)
Sat Feb 22 19:31:19 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 34:08:bc:a2:f2:84
Sat Feb 22 19:31:19 2020 daemon.info hostapd: wlan0: STA 34:08:bc:a2:f2:84 RADIUS: starting accounting session 47A88105B3F7DFB1
Sat Feb 22 19:31:19 2020 daemon.info hostapd: wlan0: STA 34:08:bc:a2:f2:84 WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:20 2020 user.err ddns-scripts[3353]: 3322: BusyBox nslookup error: '1'
Sat Feb 22 19:31:23 2020 daemon.info dnsmasq-dhcp[4022]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 19:31:23 2020 daemon.info dnsmasq-dhcp[4022]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 19:31:23 2020 daemon.info dnsmasq-dhcp[4022]: DHCPREQUEST(br-lan) 192.168.1.100 34:08:bc:a2:f2:84
Sat Feb 22 19:31:23 2020 daemon.info dnsmasq-dhcp[4022]: DHCPACK(br-lan) 192.168.1.100 34:08:bc:a2:f2:84 an
Sat Feb 22 19:31:23 2020 daemon.info dnsmasq-dhcp[4022]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 19:31:23 2020 daemon.info dnsmasq-dhcp[4022]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 19:31:25 2020 user.err ddns-scripts[3353]: 3322: BusyBox nslookup error: '1'
Sat Feb 22 19:31:25 2020 user.warn ddns-scripts[3353]: 3322: Get registered/public IP for 'hksj.f3322.net' failed - retry 1/0 in 60 seconds
Sat Feb 22 19:31:28 2020 daemon.info hostapd: wlan0: STA 48:89:e7:e7:ec:fd IEEE 802.11: authenticated
Sat Feb 22 19:31:28 2020 daemon.info hostapd: wlan0: STA 48:89:e7:e7:ec:fd IEEE 802.11: associated (aid 7)
Sat Feb 22 19:31:28 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 48:89:e7:e7:ec:fd
Sat Feb 22 19:31:28 2020 daemon.info hostapd: wlan0: STA 48:89:e7:e7:ec:fd RADIUS: starting accounting session 2F83FF0848D559D8
Sat Feb 22 19:31:28 2020 daemon.info hostapd: wlan0: STA 48:89:e7:e7:ec:fd WPA: pairwise key handshake completed (RSN)
Sat Feb 22 19:31:28 2020 daemon.info dnsmasq-dhcp[4022]: DHCPREQUEST(br-lan) 192.168.1.106 48:89:e7:e7:ec:fd
Sat Feb 22 19:31:28 2020 daemon.info dnsmasq-dhcp[4022]: DHCPACK(br-lan) 192.168.1.106 48:89:e7:e7:ec:fd MagicBook-Pro
Sat Feb 22 19:31:28 2020 kern.notice kernel: [   64.246632] random: crng init done
Sat Feb 22 19:31:28 2020 daemon.info pppd[4156]: PPP session is 17395
Sat Feb 22 19:31:28 2020 daemon.warn pppd[4156]: Connected to 7c:c3:85:a8:8c:62 via interface eth0.2
Sat Feb 22 19:31:28 2020 kern.info kernel: [   64.388689] pppoe-wan: renamed from ppp0
Sat Feb 22 19:31:28 2020 daemon.info pppd[4156]: Using interface pppoe-wan
Sat Feb 22 19:31:28 2020 daemon.notice pppd[4156]: Connect: pppoe-wan <--> eth0.2
Sat Feb 22 19:31:31 2020 daemon.info pppd[4156]: syncppp not active
Sat Feb 22 19:31:31 2020 daemon.info pppd[4156]: CHAP authentication succeeded: Authentication success,Welcome!
Sat Feb 22 19:31:31 2020 daemon.notice pppd[4156]: CHAP authentication succeeded
Sat Feb 22 19:31:31 2020 daemon.notice pppd[4156]: peer from calling number 7C:C3:85:A8:8C:62 authorized
Sat Feb 22 19:31:31 2020 daemon.notice pppd[4156]: local  LL address fe80::609e:1cce:795f:1c0e
Sat Feb 22 19:31:31 2020 daemon.notice pppd[4156]: remote LL address fe80::7ec3:85ff:fea8:8c62
Sat Feb 22 19:31:32 2020 daemon.notice pppd[4156]: local  IP address 113.120.119.55
Sat Feb 22 19:31:32 2020 daemon.notice pppd[4156]: remote IP address 113.120.118.1
Sat Feb 22 19:31:32 2020 daemon.notice pppd[4156]: primary   DNS address 219.147.1.66
Sat Feb 22 19:31:32 2020 daemon.notice pppd[4156]: secondary DNS address 219.146.1.66
Sat Feb 22 19:31:32 2020 daemon.notice netifd: Network device 'pppoe-wan' link is up
Sat Feb 22 19:31:32 2020 daemon.notice netifd: Interface 'wan' is now up
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: reading /tmp/resolv.conf.auto
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using local addresses only for domain test
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using local addresses only for domain onion
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using local addresses only for domain localhost
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using local addresses only for domain local
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using local addresses only for domain invalid
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using local addresses only for domain bind
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using nameserver 114.114.114.114#53 for domain valf.atm.youku.com
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using nameserver 219.147.1.66#53
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using nameserver 219.146.0.130#53
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using local addresses only for domain lan
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using nameserver 219.147.1.66#53
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq[4022]: using nameserver 219.146.1.66#53
Sat Feb 22 19:31:32 2020 daemon.notice netifd: Network alias 'pppoe-wan' link is up
Sat Feb 22 19:31:32 2020 daemon.notice netifd: Interface 'wan_6' is enabled
Sat Feb 22 19:31:32 2020 daemon.notice netifd: Interface 'wan_6' has link connectivity
Sat Feb 22 19:31:32 2020 daemon.notice netifd: Interface 'wan_6' is setting up now
Sat Feb 22 19:31:32 2020 daemon.notice netifd: Interface 'wan_6' is now up
Sat Feb 22 19:31:32 2020 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq-dhcp[4022]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 19:31:32 2020 daemon.info dnsmasq-dhcp[4022]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 19:31:33 2020 daemon.info dnsmasq-dhcp[4022]: DHCPRELEASE(br-lan) 192.168.1.188 fe:7c:02:18:44:6c unknown lease
Sat Feb 22 19:31:33 2020 daemon.info dnsmasq-dhcp[4022]: DHCPDISCOVER(br-lan) 192.168.1.188 fe:7c:02:18:44:6c
Sat Feb 22 19:31:33 2020 daemon.info dnsmasq-dhcp[4022]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 19:31:33 2020 daemon.info dnsmasq-dhcp[4022]: DHCPREQUEST(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 19:31:33 2020 daemon.info dnsmasq-dhcp[4022]: DHCPACK(br-lan) 192.168.1.189 fe:7c:02:18:44:6c E1
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4022]: exiting on receipt of SIGTERM
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: started, version 2.79 cachesize 150
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: DNS service limited to local subnets
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack ipset no-auth no-DNSSEC loop-detect inotify
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq-dhcp[4974]: DHCP, IP range 192.168.1.100 -- 192.168.1.199, lease time 3d
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain test
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain onion
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain localhost
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain local
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain invalid
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain bind
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 114.114.114.114#53 for domain valf.atm.youku.com
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 219.147.1.66#53
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 219.146.0.130#53
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain lan
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: reading /tmp/resolv.conf.auto
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain test
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain onion
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain localhost
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain local
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain invalid
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain bind
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 114.114.114.114#53 for domain valf.atm.youku.com
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 219.147.1.66#53
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 219.146.0.130#53
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using local addresses only for domain lan
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 219.147.1.66#53
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: using nameserver 219.146.1.66#53
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: read /etc/hosts - 4 addresses
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq[4974]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Feb 22 19:31:35 2020 daemon.info dnsmasq-dhcp[4974]: read /etc/ethers - 0 addresses
Sat Feb 22 20:38:52 2020 daemon.info pppd[4156]: System time change detected.
Sat Feb 22 20:38:52 2020 user.notice firewall: Reloading firewall due to ifupdate of wan (pppoe-wan)
Sat Feb 22 20:38:54 2020 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 02:6b:8e:8b:4e:2b
Sat Feb 22 20:38:55 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) 02:6b:8e:b9:b4:25
Sat Feb 22 20:38:55 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.141 02:6b:8e:b9:b4:25
Sat Feb 22 20:38:55 2020 daemon.info dnsmasq-dhcp[4974]: DHCPREQUEST(br-lan) 192.168.1.167 02:6b:8e:95:1a:bd
Sat Feb 22 20:38:55 2020 daemon.info dnsmasq-dhcp[4974]: DHCPACK(br-lan) 192.168.1.167 02:6b:8e:95:1a:bd android-1ca49533dfec165b
Sat Feb 22 20:38:55 2020 daemon.info dnsmasq-dhcp[4974]: DHCPREQUEST(br-lan) 192.168.1.141 02:6b:8e:b9:b4:25
Sat Feb 22 20:38:55 2020 daemon.info dnsmasq-dhcp[4974]: DHCPACK(br-lan) 192.168.1.141 02:6b:8e:b9:b4:25 00000000android-5f1bf8b95e097e3b
Sat Feb 22 20:39:07 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b IEEE 802.11: authenticated
Sat Feb 22 20:39:07 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b IEEE 802.11: associated (aid 5)
Sat Feb 22 20:39:08 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 02:6b:8e:8b:4e:2b
Sat Feb 22 20:39:08 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b RADIUS: starting accounting session 0C5B51F60D909CA3
Sat Feb 22 20:39:08 2020 daemon.info hostapd: wlan0: STA 02:6b:8e:8b:4e:2b WPA: pairwise key handshake completed (RSN)
Sat Feb 22 20:39:16 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) 02:6b:8e:8b:4e:2b
Sat Feb 22 20:39:16 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.119 02:6b:8e:8b:4e:2b
Sat Feb 22 20:39:16 2020 daemon.info dnsmasq-dhcp[4974]: DHCPREQUEST(br-lan) 192.168.1.119 02:6b:8e:8b:4e:2b
Sat Feb 22 20:39:16 2020 daemon.info dnsmasq-dhcp[4974]: DHCPACK(br-lan) 192.168.1.119 02:6b:8e:8b:4e:2b android-50392737a151410e
Sat Feb 22 20:39:16 2020 cron.err crond[1269]: time disparity of 68 minutes detected
Sat Feb 22 20:39:20 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 20:39:20 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 20:39:31 2020 daemon.info dnsmasq-dhcp[4974]: DHCPREQUEST(br-lan) 192.168.1.160 d4:4b:b6:25:1e:5c
Sat Feb 22 20:39:31 2020 daemon.info dnsmasq-dhcp[4974]: DHCPACK(br-lan) 192.168.1.160 d4:4b:b6:25:1e:5c Tmall-Genie
Sat Feb 22 20:39:41 2020 user.err ddns-scripts[3353]: 3322: No or private or invalid IP '192.168.1.1' given! Please check your configuration
Sat Feb 22 20:39:41 2020 user.err ddns-scripts[3353]: 3322: No update send to DDNS Provider
Sat Feb 22 20:39:51 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 20:39:51 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 20:40:00 2020 cron.info crond[1269]: USER root pid 5913 cmd /etc/hotplug.d/iface/25-Oray start
Sat Feb 22 20:40:21 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 20:40:21 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 20:40:52 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 20:40:52 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 20:41:00 2020 cron.info crond[1269]: USER root pid 5935 cmd /etc/hotplug.d/iface/25-Oray start
Sat Feb 22 20:41:17 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) 34:08:bc:a2:f2:84
Sat Feb 22 20:41:17 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.100 34:08:bc:a2:f2:84
Sat Feb 22 20:41:18 2020 daemon.info dnsmasq-dhcp[4974]: DHCPREQUEST(br-lan) 192.168.1.100 34:08:bc:a2:f2:84
Sat Feb 22 20:41:18 2020 daemon.info dnsmasq-dhcp[4974]: DHCPACK(br-lan) 192.168.1.100 34:08:bc:a2:f2:84 an
Sat Feb 22 20:41:22 2020 daemon.info dnsmasq-dhcp[4974]: DHCPDISCOVER(br-lan) fe:7c:02:18:44:6c
Sat Feb 22 20:41:22 2020 daemon.info dnsmasq-dhcp[4974]: DHCPOFFER(br-lan) 192.168.1.189 fe:7c:02:18:44:6c
Sat Feb 22 20:41:43 2020 daemon.err uhttpd[2336]: luci: accepted login on / for root from 192.168.1.100


我的恩山、我的无线 The best wifi forum is right here.
官改固件你试试
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-4-27 09:24

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com 举报电话:0519-86695797

快速回复 返回顶部 返回列表