Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FS#1152 - WDR3600: Wifi randomly turns off and get disabled #7978

Closed
openwrt-bot opened this issue Nov 6, 2017 · 7 comments
Closed

FS#1152 - WDR3600: Wifi randomly turns off and get disabled #7978

openwrt-bot opened this issue Nov 6, 2017 · 7 comments
Labels

Comments

@openwrt-bot
Copy link

kclkcl:

Running LEDE 17.01.4

I'm not sure how do I reproduce this problem, it just happen randomly at random time.

This never happened back when I used OpenWRT, were there some regression somewhere?

So with LEDE, my router's wifi randomly disconnect and disable itself. I have read the logs (provided below) yet I can't see anything suspicious. I only see these:

Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled

This was around the time people in my home messaged me that they cannot find the access point from their devices

It bugs me because I usually go to the office in the afternoon and people in my house complains to me that Wifi stops working without anything being done to the router, I have not set up VPN access to my home network so I cannot do anything until I go home in the evening.

@openwrt-bot
Copy link
Author

kclkcl:

Full log:

Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.000000] Linux version 4.4.92 (buildbot@builds-02.infra.lede-project.org) (gcc version 5.4.0 (LEDE GCC 5.4.0 r3101-bce140e) ) #0 Tue Oct 17 14:59:45 2017
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] MyLoader: sysp=d41aa8a5, boardp=3bb52003, parts=bd952718
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] bootconsole [early0] enabled
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] CPU0 revision is: 0001974c (MIPS 74Kc)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] SoC: Atheros AR9344 rev 2
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Determined physical RAM map:
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] memory: 08000000 @ 00000000 (usable)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Initrd not found or empty - disabling initrd
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 0.000000] No valid device tree found, continuing without
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Zone ranges:
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Normal [mem 0x0000000000000000-0x0000000007ffffff]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Movable zone start for each node
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Early memory node ranges
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] node 0: [mem 0x0000000000000000-0x0000000007ffffff]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff]
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] free_area_init_node: node 0, pgdat 803d04d0, node_mem_map 81000000
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] Normal zone: 256 pages used for memmap
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=132768
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.000000] Kernel command line: board=TL-WDR4300 console=ttyS0,115200 rootfstype=squashfs,jffs2 noinitrd
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Writing ErrCtl register=00000000
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Readback ErrCtl register=00000000
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Memory: 125328K/131072K available (3076K kernel code, 160K rwdata, 412K rodata, 312K init, 205K bss, 5744K reserved, 0K cma-reserved)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] NR_IRQS:51
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] Clocks: CPU:560.000MHz, DDR:450.000MHz, AHB:225.000MHz, Ref:40.000MHz
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6825930166 ns
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.000009] sched_clock: 32 bits at 280MHz, resolution 3ns, wraps every 7669584382ns
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.008299] Calibrating delay loop... 278.93 BogoMIPS (lpj=1394688)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.081137] pid_max: default: 32768 minimum: 301
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.086176] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.093228] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.102971] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.113480] futex hash table entries: 256 (order: -1, 3072 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.121050] NET: Registered protocol family 16
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.127046] MIPS: machine is TP-LINK TL-WDR3600/4300/4310
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 0.136142] registering PCI controller with io_map_base unset
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 0.360347] Can't analyze schedule() prologue at 800670fc
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.374777] PCI host bridge to bus 0000:00
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.379199] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.386510] pci_bus 0000:00: root bus resource [io 0x0000]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.392455] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.399673] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.408155] pci 0000:00:00.0: [168c:0033] type 00 class 0x028000
Mon Nov 6 13:54:42 2017 kern.err kernel: [ 0.408188] pci 0000:00:00.0: invalid calibration data
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.413676] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.413736] pci 0000:00:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.413805] pci 0000:00:00.0: supports D1
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.413821] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.414049] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.414084] pci 0000:00:00.0: BAR 0: assigned [mem 0x10000000-0x1001ffff 64bit]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.421915] pci 0000:00:00.0: BAR 6: assigned [mem 0x10020000-0x1002ffff pref]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.429610] pci 0000:00:00.0: using irq 40 for pin 1
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.435623] clocksource: Switched to clocksource MIPS
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.442041] NET: Registered protocol family 2
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.447607] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.455036] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.461848] TCP: Hash tables configured (established 1024 bind 1024)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.468694] UDP hash table entries: 256 (order: 0, 4096 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.474921] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.481857] NET: Registered protocol family 1
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 0.486567] PCI: CLS 0 bytes, default 32
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 0.490790] Crashlog allocated RAM at address 0x3f00000
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.510733] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.516988] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.529856] io scheduler noop registered
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.534035] io scheduler deadline registered (default)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.539751] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.549312] console [ttyS0] disabled
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.573190] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 2500000) is a 16550A
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.582384] console [ttyS0] enabled
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.589807] bootconsole [early0] disabled
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 0.602896] m25p80 spi0.0: found en25q64, expected m25p80
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.608439] m25p80 spi0.0: en25q64 (8192 Kbytes)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.614203] 5 tp-link partitions found on MTD device spi0.0
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.619905] Creating 5 MTD partitions on "spi0.0":
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.624773] 0x000000000000-0x000000020000 : "u-boot"
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.631211] 0x000000020000-0x0000001533cc : "kernel"
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.637876] 0x0000001533cc-0x0000007f0000 : "rootfs"
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.644457] mtd: device 2 (rootfs) set to be root filesystem
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.650285] 1 squashfs-split partitions found on MTD device rootfs
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.656581] 0x000000390000-0x0000007f0000 : "rootfs_data"
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.663646] 0x0000007f0000-0x000000800000 : "art"
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 0.670074] 0x000000020000-0x0000007f0000 : "firmware"
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 0.684067] switch0: Atheros AR8327 rev. 2 switch registered on ag71xx-mdio.0
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.297511] libphy: ag71xx_mdio: probed
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.887017] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd033, driver=Atheros AR8216/AR8236/AR8316]
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.898483] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:RGMII
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.906785] NET: Registered protocol family 10
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.914843] NET: Registered protocol family 17
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.919478] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.932389] 8021q: 802.1Q VLAN Support v1.8
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.942363] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 1.950990] Freeing unused kernel memory: 312K
Mon Nov 6 13:54:42 2017 user.info kernel: [ 2.965897] init: Console is alive
Mon Nov 6 13:54:42 2017 user.info kernel: [ 2.969551] init: - watchdog -
Mon Nov 6 13:54:42 2017 user.info kernel: [ 3.896452] kmodloader: loading kernel modules from /etc/modules-boot.d/

Mon Nov 6 13:54:42 2017 kern.info kernel: [ 3.979461] usbcore: registered new interface driver usbfs
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 3.985143] usbcore: registered new interface driver hub
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 3.990660] usbcore: registered new device driver usb
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.000751] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.008826] ehci-platform: EHCI generic platform driver
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.014217] ehci-platform ehci-platform: EHCI Host Controller
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.020133] ehci-platform ehci-platform: new USB bus registered, assigned bus number 1
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.030263] ehci-platform ehci-platform: irq 3, io mem 0x1b000000
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.055665] ehci-platform ehci-platform: USB 2.0 started, EHCI 1.00
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.062919] hub 1-0:1.0: USB hub found
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.067098] hub 1-0:1.0: 1 port detected
Mon Nov 6 13:54:42 2017 user.info kernel: [ 4.071890] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Mon Nov 6 13:54:42 2017 user.info kernel: [ 4.089673] init: - preinit -
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.605719] usb 1-1: new high-speed USB device number 2 using ehci-platform
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.708934] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 4.735070] random: procd: uninitialized urandom read (4 bytes read, 7 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.779722] hub 1-1:1.0: USB hub found
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 4.785893] hub 1-1:1.0: 4 ports detected
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 5.075645] usb 1-1.2: new high-speed USB device number 3 using ehci-platform
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 5.886883] eth0: link up (1000Mbps/Full duplex)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 5.891650] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 7.955750] jffs2: notice: (412) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
Mon Nov 6 13:54:42 2017 user.info kernel: [ 7.973997] mount_root: switching to jffs2 overlay
Mon Nov 6 13:54:42 2017 user.warn kernel: [ 8.029837] urandom-seed: Seeding with /etc/urandom.seed
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 8.252220] eth0: link down
Mon Nov 6 13:54:42 2017 user.info kernel: [ 8.268354] procd: - early -
Mon Nov 6 13:54:42 2017 user.info kernel: [ 8.271381] procd: - watchdog -
Mon Nov 6 13:54:42 2017 user.info kernel: [ 8.907000] procd: - watchdog -
Mon Nov 6 13:54:42 2017 user.info kernel: [ 8.910461] procd: - ubus -
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 8.925586] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 8.965046] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 8.974693] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 8.983890] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 8.993438] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 9.002624] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 9.012399] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 9.021739] random: ubusd: uninitialized urandom read (4 bytes read, 16 bits of entropy available)
Mon Nov 6 13:54:42 2017 user.info kernel: [ 9.031291] procd: - init -
Mon Nov 6 13:54:42 2017 user.info kernel: [ 9.372240] kmodloader: loading kernel modules from /etc/modules.d/*
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.383111] ip6_tables: (C) 2000-2006 Netfilter Core Team
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.400834] Loading modules backported from Linux version wt-2017-01-31-0-ge882dff19e7f
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.409018] Backport generated by backports.git backports-20160324-13-g24da7d3c
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.419857] ip_tables: (C) 2000-2006 Netfilter Core Team
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.433210] nf_conntrack version 0.5.0 (1963 buckets, 7852 max)
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.471438] xt_time: kernel timezone is -0000
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.530430] PPP generic driver version 2.4.2
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.537265] NET: Registered protocol family 24
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.635947] ath: EEPROM regdomain: 0x0
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.635966] ath: EEPROM indicates default country code should be used
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.635976] ath: doing EEPROM country->regdmn map search
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.635997] ath: country maps to regdmn code: 0x3a
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.636008] ath: Country alpha2 being used: US
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.636018] ath: Regpair used: 0x3a
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.648188] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.653014] ieee80211 phy0: Atheros AR9340 Rev:2 mem=0xb8100000, irq=47
Mon Nov 6 13:54:42 2017 kern.warn kernel: [ 9.659970] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.670983] ath: EEPROM regdomain: 0x0
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.671000] ath: EEPROM indicates default country code should be used
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.671010] ath: doing EEPROM country->regdmn map search
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.671031] ath: country maps to regdmn code: 0x3a
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.671042] ath: Country alpha2 being used: US
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.671052] ath: Regpair used: 0x3a
Mon Nov 6 13:54:42 2017 kern.debug kernel: [ 9.680672] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Mon Nov 6 13:54:42 2017 kern.info kernel: [ 9.685551] ieee80211 phy1: Atheros AR9300 Rev:4 mem=0xb0000000, irq=40
Mon Nov 6 13:54:42 2017 user.info kernel: [ 9.805349] kmodloader: done loading kernel modules from /etc/modules.d/*
Mon Nov 6 13:54:42 2017 kern.notice kernel: [ 11.296264] random: jshn: uninitialized urandom read (4 bytes read, 20 bits of entropy available)
Mon Nov 6 13:54:45 2017 user.notice : Added device handler type: 8021ad
Mon Nov 6 13:54:45 2017 user.notice : Added device handler type: 8021q
Mon Nov 6 13:54:45 2017 user.notice : Added device handler type: macvlan
Mon Nov 6 13:54:45 2017 user.notice : Added device handler type: bridge
Mon Nov 6 13:54:45 2017 user.notice : Added device handler type: Network device
Mon Nov 6 13:54:45 2017 user.notice : Added device handler type: tunnel
Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Mon Nov 6 13:54:45 2017 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Mon Nov 6 13:54:48 2017 kern.info kernel: [ 17.444610] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Mon Nov 6 13:54:48 2017 kern.info kernel: [ 17.470298] device eth0.1 entered promiscuous mode
Mon Nov 6 13:54:48 2017 kern.info kernel: [ 17.475174] device eth0 entered promiscuous mode
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'lan' is enabled
Mon Nov 6 13:54:48 2017 kern.info kernel: [ 17.486809] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'lan' is setting up now
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'lan' is now up
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'loopback' is enabled
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'loopback' is setting up now
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'loopback' is now up
Mon Nov 6 13:54:48 2017 kern.info kernel: [ 17.543843] IPv6: ADDRCONF(NETDEV_UP): eth0.2: link is not ready
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'wan' is enabled
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'wan6' is enabled
Mon Nov 6 13:54:48 2017 daemon.info odhcpd[786]: Raising SIGUSR1 due to address change on br-lan
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Network device 'lo' link is up
Mon Nov 6 13:54:48 2017 daemon.notice netifd: Interface 'loopback' has link connectivity
Mon Nov 6 13:54:49 2017 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Mon Nov 6 13:54:49 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 13:54:49 2017 daemon.notice odhcpd[786]: Failed to send to ff02::1%br-lan (Address not available)
Mon Nov 6 13:54:49 2017 kern.info kernel: [ 18.906947] eth0: link up (1000Mbps/Full duplex)
Mon Nov 6 13:54:49 2017 daemon.notice netifd: Network device 'eth0' link is up
Mon Nov 6 13:54:49 2017 kern.info kernel: [ 18.921051] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Mon Nov 6 13:54:49 2017 authpriv.warn dropbear[915]: Failed listening on '22': Error listening: Address not available
Mon Nov 6 13:54:49 2017 authpriv.info dropbear[915]: Not backgrounding
Mon Nov 6 13:54:49 2017 kern.info kernel: [ 18.944258] br-lan: port 1(eth0.1) entered forwarding state
Mon Nov 6 13:54:49 2017 kern.info kernel: [ 18.950009] br-lan: port 1(eth0.1) entered forwarding state
Mon Nov 6 13:54:49 2017 kern.info kernel: [ 18.955919] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.2: link becomes ready
Mon Nov 6 13:54:49 2017 daemon.notice netifd: VLAN 'eth0.1' link is up
Mon Nov 6 13:54:49 2017 daemon.notice netifd: VLAN 'eth0.2' link is up
Mon Nov 6 13:54:49 2017 daemon.notice netifd: Interface 'wan' has link connectivity
Mon Nov 6 13:54:49 2017 daemon.notice netifd: Interface 'wan' is setting up now
Mon Nov 6 13:54:49 2017 daemon.notice netifd: Interface 'wan' is now up
Mon Nov 6 13:54:49 2017 daemon.notice netifd: Interface 'wan6' has link connectivity
Mon Nov 6 13:54:49 2017 daemon.notice netifd: Interface 'wan6' is setting up now
Mon Nov 6 13:54:49 2017 daemon.notice netifd: bridge 'br-lan' link is up
Mon Nov 6 13:54:49 2017 daemon.notice netifd: Interface 'lan' has link connectivity
Mon Nov 6 13:54:49 2017 kern.info kernel: [ 19.115768] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Mon Nov 6 13:54:50 2017 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
Mon Nov 6 13:54:50 2017 daemon.err odhcp6c[961]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
Mon Nov 6 13:54:50 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 13:54:50 2017 daemon.notice odhcpd[786]: Failed to send to ff02::1%br-lan (Address not available)
Mon Nov 6 13:54:51 2017 daemon.notice procd: /etc/rc.d/S96led: setting up led USB1
Mon Nov 6 13:54:51 2017 kern.info kernel: [ 20.945682] br-lan: port 1(eth0.1) entered forwarding state
Mon Nov 6 13:54:51 2017 daemon.notice procd: /etc/rc.d/S96led: setting up led USB2
Mon Nov 6 13:54:51 2017 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN2G
Mon Nov 6 13:54:52 2017 daemon.info procd: - init complete -
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: started, version 2.78 cachesize 150
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: DNS service limited to local subnets
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify
Mon Nov 6 13:54:56 2017 daemon.warn dnsmasq[1136]: warning: ignoring resolv-file flag because no-resolv is set
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq-dhcp[1136]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: using nameserver 208.67.222.222#53 for domain pool.ntp.org
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: using nameserver 127.0.0.1#5353
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: using local addresses only for domain lan
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: read /etc/hosts - 4 addresses
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/odhcpd - 0 addresses
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Mon Nov 6 13:54:56 2017 daemon.info dnsmasq-dhcp[1136]: read /etc/ethers - 0 addresses
Mon Nov 6 14:32:47 2017 daemon.info dnsmasq[1136]: read /etc/hosts - 4 addresses
Mon Nov 6 14:32:47 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/odhcpd - 0 addresses
Mon Nov 6 14:32:47 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Mon Nov 6 14:32:47 2017 daemon.info dnsmasq-dhcp[1136]: read /etc/ethers - 0 addresses
Mon Nov 6 14:32:54 2017 kern.notice kernel: [ 73.215739] random: nonblocking pool is initialized
Mon Nov 6 14:32:54 2017 user.info : dnscrypt-proxy - [cisco] does not support DNS Security Extensions
Mon Nov 6 14:32:54 2017 user.warn : dnscrypt-proxy - [cisco] logs your activity - a different provider might be better a choice if privacy is a concern
Mon Nov 6 14:32:54 2017 daemon.notice dnscrypt-proxy[813]: dnscrypt-proxy Starting dnscrypt-proxy 1.9.4
Mon Nov 6 14:32:54 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Generating a new session key pair
Mon Nov 6 14:32:54 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Done
Mon Nov 6 14:32:54 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server certificate with serial #1490391488 received
Mon Nov 6 14:32:54 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy This certificate is valid
Mon Nov 6 14:32:54 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Chosen certificate #1490391488 is valid from [2017-03-24] to [2018-03-24]
Mon Nov 6 14:32:54 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy The key rotation period for this server may exceed the recommended value. This is bad for forward secrecy.
Mon Nov 6 14:32:54 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server key fingerprint is E7F8:4477:BF89:1434:1ECE:23F0:D6A6:6EB9:4F45:3167:D71F:80BB:4E80:A04F:F180:F778
Mon Nov 6 14:32:54 2017 daemon.notice dnscrypt-proxy[813]: dnscrypt-proxy Proxying from 127.0.0.1:5353 to 208.67.220.220:443
Mon Nov 6 14:41:38 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 14:49:40 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 14:56:00 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:05:20 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:14:07 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:20:39 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:25:50 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:33:30 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Refetching server certificates
Mon Nov 6 15:33:30 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server certificate with serial #1490391488 received
Mon Nov 6 15:33:30 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy This certificate is valid
Mon Nov 6 15:33:30 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Chosen certificate #1490391488 is valid from [2017-03-24] to [2018-03-24]
Mon Nov 6 15:33:30 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy The key rotation period for this server may exceed the recommended value. This is bad for forward secrecy.
Mon Nov 6 15:33:30 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server key fingerprint is E7F8:4477:BF89:1434:1ECE:23F0:D6A6:6EB9:4F45:3167:D71F:80BB:4E80:A04F:F180:F778
Mon Nov 6 15:35:36 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:40:20 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:49:11 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 15:54:13 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:00:47 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:04:09 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:11:46 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:21:03 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:30:52 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:33:39 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Refetching server certificates
Mon Nov 6 16:33:39 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server certificate with serial #1490391488 received
Mon Nov 6 16:33:39 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy This certificate is valid
Mon Nov 6 16:33:39 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Chosen certificate #1490391488 is valid from [2017-03-24] to [2018-03-24]
Mon Nov 6 16:33:39 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy The key rotation period for this server may exceed the recommended value. This is bad for forward secrecy.
Mon Nov 6 16:33:39 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server key fingerprint is E7F8:4477:BF89:1434:1ECE:23F0:D6A6:6EB9:4F45:3167:D71F:80BB:4E80:A04F:F180:F778
Mon Nov 6 16:37:50 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:46:08 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:50:18 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 16:58:17 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:06:16 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:09:49 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:17:50 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:27:05 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:32:35 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:34:53 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Refetching server certificates
Mon Nov 6 17:34:53 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server certificate with serial #1490391488 received
Mon Nov 6 17:34:53 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy This certificate is valid
Mon Nov 6 17:34:53 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Chosen certificate #1490391488 is valid from [2017-03-24] to [2018-03-24]
Mon Nov 6 17:34:53 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy The key rotation period for this server may exceed the recommended value. This is bad for forward secrecy.
Mon Nov 6 17:34:53 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server key fingerprint is E7F8:4477:BF89:1434:1ECE:23F0:D6A6:6EB9:4F45:3167:D71F:80BB:4E80:A04F:F180:F778
Mon Nov 6 17:39:39 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:47:58 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 17:54:42 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:04:02 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:07:30 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:15:39 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:23:45 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:30:59 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:34:21 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:36:21 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Refetching server certificates
Mon Nov 6 18:36:21 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server certificate with serial #1490391488 received
Mon Nov 6 18:36:21 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy This certificate is valid
Mon Nov 6 18:36:21 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Chosen certificate #1490391488 is valid from [2017-03-24] to [2018-03-24]
Mon Nov 6 18:36:21 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy The key rotation period for this server may exceed the recommended value. This is bad for forward secrecy.
Mon Nov 6 18:36:21 2017 daemon.info dnscrypt-proxy[813]: dnscrypt-proxy Server key fingerprint is E7F8:4477:BF89:1434:1ECE:23F0:D6A6:6EB9:4F45:3167:D71F:80BB:4E80:A04F:F180:F778
Mon Nov 6 18:42:16 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:52:02 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:57:51 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:57:54 2017 daemon.info dnsmasq-dhcp[1136]: DHCPDISCOVER(br-lan) 28:d2:44:af:ef:1b
Mon Nov 6 18:57:54 2017 daemon.info dnsmasq-dhcp[1136]: DHCPOFFER(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 18:57:54 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:57:54 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:57:58 2017 daemon.info dnsmasq-dhcp[1136]: DHCPDISCOVER(br-lan) 28:d2:44:af:ef:1b
Mon Nov 6 18:57:58 2017 daemon.info dnsmasq-dhcp[1136]: DHCPOFFER(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 18:57:58 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 18:57:58 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.100 28:d2:44:af:ef:1b THINK-PC
Mon Nov 6 18:58:02 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:58:02 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:02 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:02 2017 daemon.info dnsmasq-dhcp[1136]: DHCPINFORM(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 18:58:02 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.100 28:d2:44:af:ef:1b THINK-PC
Mon Nov 6 18:58:02 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 18:58:02 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.100 28:d2:44:af:ef:1b THINK-PC
Mon Nov 6 18:58:03 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:03 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:09 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 18:58:09 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.100 28:d2:44:af:ef:1b THINK-PC
Mon Nov 6 18:58:09 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:58:10 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:10 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:11 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:11 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:12 2017 daemon.info dnsmasq-dhcp[1136]: DHCPINFORM(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 18:58:12 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.100 28:d2:44:af:ef:1b THINK-PC
Mon Nov 6 18:58:13 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:13 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:13 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:58:17 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:17 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:17 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:58:24 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:24 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:36 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 18:58:40 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:40 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:56 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:56 2017 daemon.warn odhcpd[786]: DHCPV6 REQUEST IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:56 2017 daemon.info dnsmasq[1136]: read /etc/hosts - 4 addresses
Mon Nov 6 18:58:56 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 6 18:58:56 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Mon Nov 6 18:58:56 2017 daemon.info dnsmasq-dhcp[1136]: read /etc/ethers - 0 addresses
Mon Nov 6 18:58:57 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:57 2017 daemon.warn odhcpd[786]: DHCPV6 REQUEST IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:58:59 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:58:59 2017 daemon.warn odhcpd[786]: DHCPV6 REQUEST IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:59:03 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:59:03 2017 daemon.warn odhcpd[786]: DHCPV6 REQUEST IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:59:04 2017 authpriv.info dropbear[1279]: Child connection from 192.168.1.100:49234
Mon Nov 6 18:59:11 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 18:59:11 2017 daemon.warn odhcpd[786]: DHCPV6 REQUEST IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 18:59:14 2017 authpriv.notice dropbear[1279]: Password auth succeeded for 'root' from 192.168.1.100:49234
Mon Nov 6 19:01:03 2017 daemon.info dnsmasq-dhcp[1136]: DHCPINFORM(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 19:01:03 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.100 28:d2:44:af:ef:1b THINK-PC
Mon Nov 6 19:02:12 2017 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
Mon Nov 6 19:02:12 2017 kern.info kernel: [16231.707008] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
Mon Nov 6 19:02:12 2017 kern.info kernel: [16231.759101] device wlan1 entered promiscuous mode
Mon Nov 6 19:02:12 2017 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Mon Nov 6 19:02:12 2017 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Mon Nov 6 19:02:12 2017 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ACS
Mon Nov 6 19:02:12 2017 daemon.notice hostapd: wlan1: ACS-STARTED
Mon Nov 6 19:02:17 2017 daemon.warn hostapd: Failed to check if DFS is required; ret=-1
Mon Nov 6 19:02:17 2017 daemon.warn hostapd: Failed to check if DFS is required; ret=-1
Mon Nov 6 19:02:17 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:17 2017 daemon.warn hostapd: Failed to check if DFS is required; ret=-1
Mon Nov 6 19:02:17 2017 daemon.warn hostapd: Failed to check if DFS is required; ret=-1
Mon Nov 6 19:02:17 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:17 2017 daemon.warn hostapd: Failed to check if DFS is required; ret=-1
Mon Nov 6 19:02:17 2017 daemon.warn hostapd: Failed to check if DFS is required; ret=-1
Mon Nov 6 19:02:17 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:26 2017 daemon.notice hostapd: wlan1: ACS-COMPLETED freq=5785 channel=157
Mon Nov 6 19:02:26 2017 daemon.notice hostapd: wlan1: interface state ACS->HT_SCAN
Mon Nov 6 19:02:26 2017 daemon.err hostapd: Using interface wlan1 with hwaddr 64:70:02:5d:b4:5e and ssid "ArifGanteng_5GHz"
Mon Nov 6 19:02:26 2017 kern.info kernel: [16245.695572] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Mon Nov 6 19:02:26 2017 kern.info kernel: [16245.702198] br-lan: port 2(wlan1) entered forwarding state
Mon Nov 6 19:02:26 2017 kern.info kernel: [16245.707864] br-lan: port 2(wlan1) entered forwarding state
Mon Nov 6 19:02:26 2017 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
Mon Nov 6 19:02:26 2017 daemon.notice hostapd: wlan1: AP-ENABLED
Mon Nov 6 19:02:26 2017 daemon.notice netifd: Network device 'wlan1' link is up
Mon Nov 6 19:02:28 2017 kern.info kernel: [16247.705120] br-lan: port 2(wlan1) entered forwarding state
Mon Nov 6 19:02:31 2017 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Mon Nov 6 19:02:31 2017 kern.info kernel: [16250.173766] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 6 19:02:31 2017 kern.info kernel: [16250.253452] device wlan0 entered promiscuous mode
Mon Nov 6 19:02:31 2017 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Mon Nov 6 19:02:31 2017 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Mon Nov 6 19:02:31 2017 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ACS
Mon Nov 6 19:02:31 2017 daemon.notice hostapd: wlan0: ACS-STARTED
Mon Nov 6 19:02:36 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:36 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:36 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:36 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:36 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:36 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:02:37 2017 daemon.notice hostapd: wlan0: ACS-COMPLETED freq=2437 channel=6
Mon Nov 6 19:02:37 2017 daemon.err hostapd: Using interface wlan0 with hwaddr 64:70:02:5d:b4:5d and ssid "ArifGanteng"
Mon Nov 6 19:02:37 2017 kern.info kernel: [16256.869187] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Mon Nov 6 19:02:37 2017 kern.info kernel: [16256.875874] br-lan: port 3(wlan0) entered forwarding state
Mon Nov 6 19:02:37 2017 kern.info kernel: [16256.881522] br-lan: port 3(wlan0) entered forwarding state
Mon Nov 6 19:02:37 2017 daemon.notice hostapd: wlan0: interface state ACS->ENABLED
Mon Nov 6 19:02:37 2017 daemon.notice hostapd: wlan0: AP-ENABLED
Mon Nov 6 19:02:38 2017 daemon.notice netifd: Network device 'wlan0' link is up
Mon Nov 6 19:02:39 2017 kern.info kernel: [16258.874978] br-lan: port 3(wlan0) entered forwarding state
Mon Nov 6 19:02:41 2017 daemon.info hostapd: wlan0: STA e8:2a:ea:7d:cf:d0 IEEE 802.11: authenticated
Mon Nov 6 19:02:41 2017 daemon.info hostapd: wlan0: STA e8:2a:ea:7d:cf:d0 IEEE 802.11: associated (aid 1)
Mon Nov 6 19:02:41 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED e8:2a:ea:7d:cf:d0
Mon Nov 6 19:02:41 2017 daemon.info hostapd: wlan0: STA e8:2a:ea:7d:cf:d0 WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:02:41 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.200.87 e8:2a:ea:7d:cf:d0
Mon Nov 6 19:02:41 2017 daemon.info dnsmasq-dhcp[1136]: DHCPNAK(br-lan) 192.168.200.87 e8:2a:ea:7d:cf:d0 wrong network
Mon Nov 6 19:02:41 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:41 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 19:02:41 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 19:02:42 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 19:02:42 2017 daemon.warn odhcpd[786]: DHCPV6 REQUEST IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 19:02:44 2017 daemon.info hostapd: wlan0: STA b0:e2:35:33:45:ba IEEE 802.11: authenticated
Mon Nov 6 19:02:44 2017 daemon.info hostapd: wlan0: STA b0:e2:35:33:45:ba IEEE 802.11: associated (aid 2)
Mon Nov 6 19:02:44 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED b0:e2:35:33:45:ba
Mon Nov 6 19:02:44 2017 daemon.info hostapd: wlan0: STA b0:e2:35:33:45:ba WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq-dhcp[1136]: DHCPDISCOVER(br-lan) e8:2a:ea:7d:cf:d0
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq-dhcp[1136]: DHCPOFFER(br-lan) 192.168.1.101 e8:2a:ea:7d:cf:d0
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq[1136]: read /etc/hosts - 4 addresses
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq-dhcp[1136]: read /etc/ethers - 0 addresses
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq-dhcp[1136]: DHCPINFORM(br-lan) 192.168.1.100 28:d2:44:af:ef:1b
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.100 28:d2:44:af:ef:1b THINK-PC
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq[1136]: read /etc/hosts - 4 addresses
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Mon Nov 6 19:02:45 2017 daemon.info dnsmasq-dhcp[1136]: read /etc/ethers - 0 addresses
Mon Nov 6 19:02:45 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:45 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:45 2017 daemon.info hostapd: wlan0: STA 40:30:04:5b:6d:67 IEEE 802.11: authenticated
Mon Nov 6 19:02:45 2017 daemon.info hostapd: wlan0: STA 40:30:04:5b:6d:67 IEEE 802.11: associated (aid 3)
Mon Nov 6 19:02:45 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 40:30:04:5b:6d:67
Mon Nov 6 19:02:45 2017 daemon.info hostapd: wlan0: STA 40:30:04:5b:6d:67 WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:02:46 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:47 2017 daemon.info hostapd: wlan0: STA 48:88:ca:82:00:98 IEEE 802.11: authenticated
Mon Nov 6 19:02:47 2017 daemon.info hostapd: wlan0: STA 48:88:ca:82:00:98 IEEE 802.11: associated (aid 4)
Mon Nov 6 19:02:47 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 48:88:ca:82:00:98
Mon Nov 6 19:02:47 2017 daemon.info hostapd: wlan0: STA 48:88:ca:82:00:98 WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPDISCOVER(br-lan) b0:e2:35:33:45:ba
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPOFFER(br-lan) 192.168.1.102 b0:e2:35:33:45:ba
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.101 e8:2a:ea:7d:cf:d0
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.101 e8:2a:ea:7d:cf:d0 THINK-PC
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.188 40:30:04:5b:6d:67
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.188 40:30:04:5b:6d:67 Arifs-iPad
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.188 40:30:04:5b:6d:67
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.188 40:30:04:5b:6d:67 Arifs-iPad
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.217 48:88:ca:82:00:98
Mon Nov 6 19:02:49 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.217 48:88:ca:82:00:98 android-73b6fd6b5d4a45e4
Mon Nov 6 19:02:49 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:49 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:50 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPDISCOVER(br-lan) b0:e2:35:33:45:ba
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPOFFER(br-lan) 192.168.1.218 b0:e2:35:33:45:ba
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.102 b0:e2:35:33:45:ba
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.102 b0:e2:35:33:45:ba Redmi3-Redmi
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.217 48:88:ca:82:00:98
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.217 48:88:ca:82:00:98 android-73b6fd6b5d4a45e4
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.102 b0:e2:35:33:45:ba
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.102 b0:e2:35:33:45:ba Redmi3-Redmi
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPINFORM(br-lan) 192.168.1.101 e8:2a:ea:7d:cf:d0
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.101 e8:2a:ea:7d:cf:d0 THINK-PC
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPDISCOVER(br-lan) 48:88:ca:82:00:98
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPOFFER(br-lan) 192.168.1.217 48:88:ca:82:00:98
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.217 48:88:ca:82:00:98
Mon Nov 6 19:02:53 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.217 48:88:ca:82:00:98 android-73b6fd6b5d4a45e4
Mon Nov 6 19:02:53 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:02:55 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:28 2017 kern.info kernel: [16307.263529] device wlan1 left promiscuous mode
Mon Nov 6 19:03:28 2017 kern.info kernel: [16307.268233] br-lan: port 2(wlan1) entered disabled state
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 48:88:ca:82:00:98
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 40:30:04:5b:6d:67
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED b0:e2:35:33:45:ba
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED e8:2a:ea:7d:cf:d0
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 6 19:03:28 2017 kern.info kernel: [16307.646328] device wlan0 left promiscuous mode
Mon Nov 6 19:03:28 2017 kern.info kernel: [16307.650993] br-lan: port 3(wlan0) entered disabled state
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan1: interface state ENABLED->DISABLED
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan1: AP-DISABLED
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: wlan1: CTRL-EVENT-TERMINATING
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Mon Nov 6 19:03:28 2017 daemon.notice hostapd: nl80211: Failed to remove interface wlan1 from bridge br-lan: Invalid argument
Mon Nov 6 19:03:28 2017 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 6 19:03:29 2017 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Mon Nov 6 19:03:29 2017 kern.info kernel: [16308.946177] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 6 19:03:30 2017 kern.info kernel: [16309.031880] device wlan0 entered promiscuous mode
Mon Nov 6 19:03:30 2017 kern.info kernel: [16309.036815] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 6 19:03:30 2017 kern.info kernel: [16309.042404] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ACS
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: wlan0: ACS-STARTED
Mon Nov 6 19:03:30 2017 kern.info kernel: [16309.674591] br-lan: port 2(wlan0) entered disabled state
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:30 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:31 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:31 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:31 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:31 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:31 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:31 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:31 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:32 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:32 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:32 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:32 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:32 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:32 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:33 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:34 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:35 2017 daemon.notice hostapd: handle_probe_req: send failed
Mon Nov 6 19:03:36 2017 daemon.notice hostapd: wlan0: ACS-COMPLETED freq=2437 channel=6
Mon Nov 6 19:03:36 2017 daemon.err hostapd: Using interface wlan0 with hwaddr 64:70:02:5d:b4:5d and ssid "ArifGanteng"
Mon Nov 6 19:03:37 2017 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
Mon Nov 6 19:03:37 2017 kern.info kernel: [16316.169324] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
Mon Nov 6 19:03:37 2017 kern.info kernel: [16316.273699] device wlan1 entered promiscuous mode
Mon Nov 6 19:03:37 2017 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Mon Nov 6 19:03:37 2017 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Mon Nov 6 19:03:37 2017 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ACS
Mon Nov 6 19:03:37 2017 daemon.notice hostapd: wlan1: ACS-STARTED
Mon Nov 6 19:03:37 2017 kern.info kernel: [16316.738050] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Mon Nov 6 19:03:37 2017 kern.info kernel: [16316.744751] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 6 19:03:37 2017 kern.info kernel: [16316.750367] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 6 19:03:37 2017 daemon.notice hostapd: wlan0: interface state ACS->ENABLED
Mon Nov 6 19:03:37 2017 daemon.notice hostapd: wlan0: AP-ENABLED
Mon Nov 6 19:03:38 2017 daemon.notice netifd: Network device 'wlan0' link is up
Mon Nov 6 19:03:38 2017 daemon.info hostapd: wlan0: STA 48:88:ca:82:00:98 IEEE 802.11: authenticated
Mon Nov 6 19:03:38 2017 daemon.info hostapd: wlan0: STA 48:88:ca:82:00:98 IEEE 802.11: associated (aid 1)
Mon Nov 6 19:03:38 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 48:88:ca:82:00:98
Mon Nov 6 19:03:38 2017 daemon.info hostapd: wlan0: STA 48:88:ca:82:00:98 WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:03:39 2017 daemon.info hostapd: wlan0: STA e8:2a:ea:7d:cf:d0 IEEE 802.11: authenticated
Mon Nov 6 19:03:39 2017 daemon.info hostapd: wlan0: STA e8:2a:ea:7d:cf:d0 IEEE 802.11: associated (aid 2)
Mon Nov 6 19:03:39 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED e8:2a:ea:7d:cf:d0
Mon Nov 6 19:03:39 2017 daemon.info hostapd: wlan0: STA e8:2a:ea:7d:cf:d0 WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:03:39 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.101 e8:2a:ea:7d:cf:d0
Mon Nov 6 19:03:39 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.101 e8:2a:ea:7d:cf:d0 THINK-PC
Mon Nov 6 19:03:39 2017 daemon.info hostapd: wlan0: STA 40:30:04:5b:6d:67 IEEE 802.11: authenticated
Mon Nov 6 19:03:39 2017 daemon.info hostapd: wlan0: STA 40:30:04:5b:6d:67 IEEE 802.11: associated (aid 3)
Mon Nov 6 19:03:39 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 40:30:04:5b:6d:67
Mon Nov 6 19:03:39 2017 daemon.info hostapd: wlan0: STA 40:30:04:5b:6d:67 WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:03:39 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.188 40:30:04:5b:6d:67
Mon Nov 6 19:03:39 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.188 40:30:04:5b:6d:67 Arifs-iPad
Mon Nov 6 19:03:39 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:39 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:39 2017 kern.info kernel: [16318.744448] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 6 19:03:39 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.217 48:88:ca:82:00:98
Mon Nov 6 19:03:39 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.217 48:88:ca:82:00:98 android-73b6fd6b5d4a45e4
Mon Nov 6 19:03:40 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 19:03:40 2017 daemon.warn odhcpd[786]: DHCPV6 CONFIRM IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: not on-link fd5f:bbb8:8397::1eb/128
Mon Nov 6 19:03:40 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 19:03:40 2017 daemon.warn odhcpd[786]: DHCPV6 SOLICIT IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 19:03:40 2017 daemon.info dnsmasq[1136]: read /etc/hosts - 4 addresses
Mon Nov 6 19:03:40 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/odhcpd - 0 addresses
Mon Nov 6 19:03:40 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Mon Nov 6 19:03:40 2017 daemon.info dnsmasq-dhcp[1136]: read /etc/ethers - 0 addresses
Mon Nov 6 19:03:41 2017 daemon.notice odhcpd[786]: Got DHCPv6 request
Mon Nov 6 19:03:41 2017 daemon.warn odhcpd[786]: DHCPV6 REQUEST IA_NA from 0001000120fe9b5fe82aea7dcfd0 on br-lan: ok fd5f:bbb8:8397::1eb/128
Mon Nov 6 19:03:41 2017 daemon.info dnsmasq[1136]: read /etc/hosts - 4 addresses
Mon Nov 6 19:03:41 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 6 19:03:41 2017 daemon.info dnsmasq[1136]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Mon Nov 6 19:03:41 2017 daemon.info dnsmasq-dhcp[1136]: read /etc/ethers - 0 addresses
Mon Nov 6 19:03:43 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:44 2017 daemon.info hostapd: wlan0: STA b0:e2:35:33:45:ba IEEE 802.11: authenticated
Mon Nov 6 19:03:44 2017 daemon.info hostapd: wlan0: STA b0:e2:35:33:45:ba IEEE 802.11: associated (aid 4)
Mon Nov 6 19:03:44 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED b0:e2:35:33:45:ba
Mon Nov 6 19:03:44 2017 daemon.info hostapd: wlan0: STA b0:e2:35:33:45:ba WPA: pairwise key handshake completed (RSN)
Mon Nov 6 19:03:44 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:44 2017 daemon.info dnsmasq-dhcp[1136]: DHCPREQUEST(br-lan) 192.168.1.102 b0:e2:35:33:45:ba
Mon Nov 6 19:03:44 2017 daemon.info dnsmasq-dhcp[1136]: DHCPACK(br-lan) 192.168.1.102 b0:e2:35:33:45:ba Redmi3-Redmi
Mon Nov 6 19:03:45 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:47 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:48 2017 daemon.info odhcpd[786]: Using a RA lifetime of 0 seconds on br-lan
Mon Nov 6 19:03:50 2017 daemon.notice hostapd: wlan1: ACS-COMPLETED freq=5745 channel=149
Mon Nov 6 19:03:50 2017 daemon.notice hostapd: wlan1: interface state ACS->HT_SCAN
Mon Nov 6 19:03:50 2017 daemon.err hostapd: Using interface wlan1 with hwaddr 64:70:02:5d:b4:5e and ssid "ArifGanteng_5GHz"
Mon Nov 6 19:03:51 2017 kern.info kernel: [16330.270040] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Mon Nov 6 19:03:51 2017 kern.info kernel: [16330.276719] br-lan: port 3(wlan1) entered forwarding state
Mon Nov 6 19:03:51 2017 kern.info kernel: [16330.282340] br-lan: port 3(wlan1) entered forwarding state
Mon Nov 6 19:03:51 2017 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
Mon Nov 6 19:03:51 2017 daemon.notice hostapd: wlan1: AP-ENABLED
Mon Nov 6 19:03:51 2017 daemon.notice netifd: Network device 'wlan1' link is up
Mon Nov 6 19:03:53 2017 kern.info kernel: [16332.274305] br-lan: port 3(wlan1) entered forwarding state

@openwrt-bot
Copy link
Author

FrancYescO:

I can confirm this, but this is happening very rarely instead i'm having a lot of wifi drops between WDS AP and WDS Client (2 WDR3600 v1.2 and v1.4 on the 2.4GHz) that automatically restore connection after ~30secs

this is driving me crazy to get whats wrong but i'm start supposing that is something to do with tx power of the radios

@openwrt-bot
Copy link
Author

solt:

I'm observing the similar with 18.06.1 (r7258) on WNDR3800.
What is truly shocking is that the router suddenly gets wifi interfaces disabled and they don't come back after reboot!

/etc/config/wireless shows disabled=1

config wifi-device 'radio0'
option type 'mac80211'
option hwmode '11g'
option path 'pci0000:00/0000:00:11.0'
option legacy_rates '1'
option country 'PL'
option txpower '17'
option channel '6'
option disabled '1'

config wifi-iface 'default_radio0'
option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'OpenWrt'
option encryption 'psk2'
option key '[hidden]'
option wpa_disable_eapol_key_retries '1'

config wifi-device 'radio1'
option type 'mac80211'
option channel '36'
option hwmode '11a'
option path 'pci0000:00/0000:00:12.0'
option htmode 'HT20'
option country 'PL'
option txpower '17'
option legacy_rates '0'
option disabled '1'

config wifi-iface 'default_radio1'
option device 'radio1'
option network 'lan'
option mode 'ap'
option encryption 'psk2'
option key '[hidden]'
option wpa_disable_eapol_key_retries '1'
option ssid 'OpenWrt5'

Packages installed:
base-files - 192-r7258-5eb055306f
bcp38 - 5-4
busybox - 1.28.3-4
dnscrypt-proxy - 1.9.5-8
dnscrypt-proxy-resolvers - 1.9.5+git-20171001-2d43be3-8
dnsmasq - 2.80test3-1
dropbear - 2017.75-5.1
firewall - 2018-07-26-aa8846bb-1
fstools - 2018-04-16-e2436836-1
fwtool - 1
hostapd-common - 2018-04-09-fa617ee6-5
ip6tables - 1.6.2-1
ipset - 6.34-1
iptables - 1.6.2-1
iptables-mod-conntrack-extra - 1.6.2-1
iptables-mod-ipopt - 1.6.2-1
iw - 4.14-1
iwinfo - 2018-07-24-94b1366d-1
jshn - 2018-07-25-c83a84af-2
jsonfilter - 2018-02-04-c7e938d6-1
kernel - 4.9.120-1-adfb989aae12e239d65a2c73ca35b8a3
kmod-ath - 4.9.120+2017-11-01-9
kmod-ath9k - 4.9.120+2017-11-01-9
kmod-ath9k-common - 4.9.120+2017-11-01-9
kmod-cfg80211 - 4.9.120+2017-11-01-9
kmod-gpio-button-hotplug - 4.9.120-2
kmod-ifb - 4.9.120-1
kmod-ip6tables - 4.9.120-1
kmod-ipt-conntrack - 4.9.120-1
kmod-ipt-conntrack-extra - 4.9.120-1
kmod-ipt-core - 4.9.120-1
kmod-ipt-ipopt - 4.9.120-1
kmod-ipt-ipset - 4.9.120-1
kmod-ipt-nat - 4.9.120-1
kmod-leds-wndr3700-usb - 4.9.120-1
kmod-lib-crc-ccitt - 4.9.120-1
kmod-mac80211 - 4.9.120+2017-11-01-9
kmod-nf-conntrack - 4.9.120-1
kmod-nf-conntrack6 - 4.9.120-1
kmod-nf-ipt - 4.9.120-1
kmod-nf-ipt6 - 4.9.120-1
kmod-nf-nat - 4.9.120-1
kmod-nf-reject - 4.9.120-1
kmod-nf-reject6 - 4.9.120-1
kmod-nfnetlink - 4.9.120-1
kmod-nls-base - 4.9.120-1
kmod-ppp - 4.9.120-1
kmod-pppoe - 4.9.120-1
kmod-pppox - 4.9.120-1
kmod-sched-cake - 4.9.120+2018-07-16-f39ab9a4-1
kmod-sched-core - 4.9.120-1
kmod-slhc - 4.9.120-1
kmod-usb-core - 4.9.120-1
kmod-usb-ehci - 4.9.120-1
kmod-usb-ledtrig-usbport - 4.9.120-1
kmod-usb-ohci - 4.9.120-1
kmod-usb2 - 4.9.120-1
libblobmsg-json - 2018-07-25-c83a84af-1
libc - 1.1.19-1
libgcc - 7.3.0-1
libip4tc - 1.6.2-1
libip6tc - 1.6.2-1
libipset - 6.34-1
libiwinfo - 2018-07-24-94b1366d-1
libiwinfo-lua - 2018-07-24-94b1366d-1
libjson-c - 0.12.1-2
libjson-script - 2018-07-25-c83a84af-1
liblua - 5.1.5-1
liblucihttp - 2018-05-18-cb119ded-1
liblucihttp-lua - 2018-05-18-cb119ded-1
libmnl - 1.0.4-1
libnl-tiny - 0.1-5
libpcap - 1.8.1-1
libpthread - 1.1.19-1
librt - 1.1.19-1
libsodium - 1.0.16-1
libubox - 2018-07-25-c83a84af-1
libubus - 2018-07-26-40e0931e-1
libubus-lua - 2018-07-26-40e0931e-1
libuci - 2018-08-11-4c8b4d6e-1
libuclient - 2018-08-03-ae1c656f-1
libuuid - 2.32-2
libxtables - 1.6.2-1
logd - 2018-02-14-128bc35f-2
lua - 5.1.5-1
luci - git-18.228.31946-f64b152-1
luci-app-bcp38 - git-18.247.71242-9541751-1
luci-app-firewall - git-18.228.31946-f64b152-1
luci-app-sqm - 1.2.4-1
luci-app-upnp - git-18.247.71242-9541751-1
luci-base - git-18.228.31946-f64b152-1
luci-lib-ip - git-18.228.31946-f64b152-1
luci-lib-jsonc - git-18.228.31946-f64b152-1
luci-lib-nixio - git-18.228.31946-f64b152-1
luci-mod-admin-full - git-18.228.31946-f64b152-1
luci-proto-ipv6 - git-18.228.31946-f64b152-1
luci-proto-ppp - git-18.228.31946-f64b152-1
luci-theme-bootstrap - git-18.228.31946-f64b152-1
miniupnpd - 2.1-1
mtd - 23
netifd - 2018-07-30-a0a1e52e-1
odhcp6c - 2018-07-14-67ae6a71-14.1
odhcpd-ipv6only - 1.10-1
openwrt-keyring - 2018-05-18-103a32e9-1
opkg - 2017-12-07-3b417b9f-2
ppp - 2.4.7-12
ppp-mod-pppoe - 2.4.7-12
procd - 2018-03-28-dfb68f85-1
rpcd - 2018-08-16-41333abe-1
rpcd-mod-rrdns - 20170710
sqm-scripts - 1.2.4-1
swconfig - 11
tc - 4.16.0-8
tcpdump - 4.9.2-1
uboot-envtools - 2018.03-1
ubox - 2018-02-14-128bc35f-2
ubus - 2018-07-26-40e0931e-1
ubusd - 2018-07-26-40e0931e-1
uci - 2018-08-11-4c8b4d6e-1
uclient-fetch - 2018-08-03-ae1c656f-1
uhttpd - 2018-06-26-796d42bc-1
usign - 2015-07-04-ef641914-1
wireless-regdb - 2017-10-20-4343d359
wpad-mini - 2018-04-09-fa617ee6-5

@openwrt-bot
Copy link
Author

Adam1986:

Hello,

I can confirm that I am facing the same issue as above, 2.4GHz will drop out and a reboot is required.

I have not encountered the interface still remaining disabled following a reboot but the logs show the same as pasted above.

@nuschpl
Copy link

nuschpl commented Nov 13, 2022

How this was fixed ? I'm sttill experiencing this issue in 2022

@iDm1
Copy link
Contributor

iDm1 commented Dec 9, 2022

Issue still exist in OpenWrt 22.03.1.

@majcosta
Copy link

majcosta commented Oct 9, 2023

Happens to my TP-Link WDR3600 running OpenWrt 22.03.2 r19803-9a599fee93.
log.txt

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants