276

Odp: Gargoyle 1.13.x

możesz to łatwo sprawdzić ustawiając połączenie pppoe na komputerze, pamiętać wtedy należy aby ustawić mac adres portu wan routera na karcie komputera. jakie mtu masz ustawione? ew wgraj openwrt i na nim sprawdź . chyba, że masz inny router pod ręką.

router https://imgur.com/I4Li5lr | pihole https://imgur.com/lrqh63O.png | ESXI https://imgur.com/UZTeGiy.png | zyxel gs2210-48 | gs108t | rb hex poe gbit sfp |ezviz w3 ac1200 openwrt ap | Linksys ea7500 v1@ openwrt thanks to ~Królik | kilka kamer reolink 5MP i jakieś tam jeszcze ustrojstwa połączone światłowodami, skrętką i wifi ,  apc smart ups 750 lcd smile

277 (edytowany przez roofman 2020-08-27 09:45:52)

Odp: Gargoyle 1.13.x

Rozebrałem modem. Napuchnięte kondensatory. To modem Zyxel 600.
Zasilacz daje napięcie przemienne - 10V, prostownik jest na płytce samego modemu i to on szwankuje.

--edit: kondensatory wymienione, całość śmiga już bez restartów.

r6220 - Gargoyle 1.12.0.2
wndr4300 - Gargoyle 1.13
wndr4300 - OpenWRT LuCI 21.02

278

Odp: Gargoyle 1.13.x

Hello again.
My WRT1900ac seems to be having problems. I have lossed fixed IP's after uncommanded restarts and other strange things.
Have you any idea if their is a clue in this part of the log file before the router crashed and I did a manual recover and restore.

20:49 things are happening. It might be a uncommanded restart.
23:29 I did the restore.

Thu Jul 30 20:49:07 2020 kern.info kernel: [    4.185388] mvneta f1034000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
Thu Jul 30 20:49:07 2020 kern.info kernel: [    4.193303] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Thu Jul 30 20:49:07 2020 user.info kernel: [    7.257890] mount_root: loading kmods from internal overlay
Thu Jul 30 20:49:07 2020 user.info kernel: [    7.273438] kmodloader: loading kernel modules from //etc/modules-boot.d/*
Thu Jul 30 20:49:07 2020 user.info kernel: [    7.280698] kmodloader: done loading kernel modules from //etc/modules-boot.d/*
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.488194] random: crng init done
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.491616] random: 3 urandom warning(s) missed due to ratelimiting
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.515383] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 816
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.543819] UBIFS (ubi0:1): recovery needed
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.610021] UBIFS (ubi0:1): recovery completed
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.614525] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.622395] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.632355] UBIFS (ubi0:1): FS size: 22855680 bytes (21 MiB, 180 LEBs), journal size 1142784 bytes (1 MiB, 9 LEBs)
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.642749] UBIFS (ubi0:1): reserved for root: 1079530 bytes (1054 KiB)
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.649390] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 91B3D597-7F86-435F-9F49-FA9CA83D14DE, small LPT model
Thu Jul 30 20:49:07 2020 user.info kernel: [    7.661508] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Thu Jul 30 20:49:07 2020 user.info kernel: [    7.672025] block: extroot: not configured
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.721428] UBIFS (ubi0:1): un-mount UBI device 0
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.726157] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" stops
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.782298] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 819
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.830399] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.838273] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.848234] UBIFS (ubi0:1): FS size: 22855680 bytes (21 MiB, 180 LEBs), journal size 1142784 bytes (1 MiB, 9 LEBs)
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.858628] UBIFS (ubi0:1): reserved for root: 1079530 bytes (1054 KiB)
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    7.865273] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 91B3D597-7F86-435F-9F49-FA9CA83D14DE, small LPT model
Thu Jul 30 20:49:07 2020 user.info kernel: [    8.024948] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Thu Jul 30 20:49:07 2020 user.info kernel: [    8.034621] block: extroot: not configured
Thu Jul 30 20:49:07 2020 user.info kernel: [    8.082158] mount_root: switching to ubifs overlay
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.134491] ubi1: attaching mtd8
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.236877] ubi1: scanning is finished
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.244962] ubi1: attached mtd8 (name "syscfg", size 38 MiB)
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.250645] ubi1: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.257555] ubi1: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.264374] ubi1: VID header offset: 2048 (aligned 2048), data offset: 4096
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.271364] ubi1: good PEBs: 296, bad PEBs: 8, corrupted PEBs: 0
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.277396] ubi1: user volume: 1, internal volumes: 1, max. volumes count: 128
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.284650] ubi1: max/mean erase counter: 165/98, WL threshold: 4096, image sequence number: 1012196839
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.294084] ubi1: available PEBs: 0, total reserved PEBs: 296, PEBs reserved for bad PEB handling: 12
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.303348] ubi1: background thread "ubi_bgt1d" started, PID 830
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.315101] UBIFS (ubi1:0): background thread "ubifs_bgt1_0" started, PID 834
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.365875] UBIFS (ubi1:0): UBIFS: mounted UBI device 1, volume 0, name "syscfg"
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.373314] UBIFS (ubi1:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.383277] UBIFS (ubi1:0): FS size: 34283520 bytes (32 MiB, 270 LEBs), journal size 1777664 bytes (1 MiB, 14 LEBs)
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.393758] UBIFS (ubi1:0): reserved for root: 1619295 bytes (1581 KiB)
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    8.400399] UBIFS (ubi1:0): media format: w4/r0 (latest is w5/r0), UUID DA699003-C573-4568-A773-1EB70D7D0211, small LPT model
Thu Jul 30 20:49:07 2020 user.warn kernel: [    8.413609] urandom-seed: Seeding with /etc/urandom.seed
Thu Jul 30 20:49:07 2020 kern.info kernel: [    8.455966] mvneta f1034000.ethernet eth0: Link is Down
Thu Jul 30 20:49:07 2020 user.info kernel: [    8.513246] procd: - early -
Thu Jul 30 20:49:07 2020 user.info kernel: [    8.516162] procd: - watchdog -
Thu Jul 30 20:49:07 2020 user.info kernel: [    9.148274] procd: - watchdog -
Thu Jul 30 20:49:07 2020 user.info kernel: [    9.151513] procd: - ubus -
Thu Jul 30 20:49:07 2020 user.info kernel: [    9.204612] procd: - init -
Thu Jul 30 20:49:07 2020 user.info kernel: [    9.404857] kmodloader: loading kernel modules from /etc/modules.d/*
Thu Jul 30 20:49:07 2020 user.info kernel: [    9.439664] urngd: v1.0.2 started.
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.446516] device-mapper: ioctl: 4.37.0-ioctl (2017-09-20) initialised: dm-devel@redhat.com
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    9.458096] Key type dns_resolver registered
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.466889] RPC: Registered named UNIX socket transport module.
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.472861] RPC: Registered udp transport module.
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.477582] RPC: Registered tcp transport module.
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.482309] RPC: Registered tcp NFSv4.1 backchannel transport module.
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.491720] tun: Universal TUN/TAP device driver, 1.6
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.499641] gre: GRE over IPv4 demultiplexor driver
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.505264] ip_gre: GRE over IPv4 tunneling driver
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.516924] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    9.525602] NFS: Registering the id_resolver key type
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    9.530693] Key type id_resolver registered
Thu Jul 30 20:49:07 2020 kern.notice kernel: [    9.534906] Key type id_legacy registered
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.540785] ip6_tables: (C) 2000-2006 Netfilter Core Team
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.549557] nf_conntrack version 0.5.0 (8192 buckets, 32768 max)
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.568090] Loading modules backported from Linux version v4.19.120-0-gfdc072324f3c
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.575816] Backport generated by backports.git v4.19.120-1-0-g60c3a249
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.598244] <<Marvell Mac80211 Wireless PCIE Network Driver version 10.3.8.0-20181210>>
Thu Jul 30 20:49:07 2020 kern.info kernel: [    9.606314] pci 0000:00:01.0: enabling device (0140 -> 0142)
Thu Jul 30 20:49:07 2020 kern.debug kernel: [    9.612114] ieee80211 phy0: priv->pcmd_buf = de160000  priv->pphys_cmd_buf = 1e160000
Thu Jul 30 20:49:07 2020 kern.debug kernel: [    9.618971] ieee80211 phy0: fw download start
Thu Jul 30 20:49:07 2020 kern.debug kernel: [    9.736397] ieee80211 phy0: FwSize = 118776 downloaded Size = 118776 curr_iteration 65495
Thu Jul 30 20:49:07 2020 kern.debug kernel: [   10.707400] ieee80211 phy0: fw download complete
Thu Jul 30 20:49:07 2020 kern.info kernel: [   10.707418] ieee80211 phy0: device node: /soc/pcie/pcie@1,0
Thu Jul 30 20:49:07 2020 kern.debug kernel: [   10.713517] ieee80211 phy0: pcmd = de160000
Thu Jul 30 20:49:07 2020 kern.info kernel: [   10.730411] ieee80211 phy0: firmware version: 0x702091a
Thu Jul 30 20:49:07 2020 kern.info kernel: [   11.081384] ieee80211 phy0: firmware region code: 30
Thu Jul 30 20:49:07 2020 kern.info kernel: [   11.120609] ieee80211 phy0: 2G disabled, 5G enabled
Thu Jul 30 20:49:07 2020 kern.info kernel: [   11.125598] ieee80211 phy0: 4 TX antennas, 4 RX antennas
Thu Jul 30 20:49:07 2020 kern.info kernel: [   11.131180] pci 0000:00:02.0: enabling device (0140 -> 0142)
Thu Jul 30 20:49:07 2020 kern.debug kernel: [   11.136961] ieee80211 phy1: priv->pcmd_buf = dde4c000  priv->pphys_cmd_buf = 1de4c000
Thu Jul 30 20:49:07 2020 kern.debug kernel: [   11.141450] ieee80211 phy1: fw download start
Thu Jul 30 20:49:07 2020 kern.debug kernel: [   11.261755] ieee80211 phy1: FwSize = 118776 downloaded Size = 118776 curr_iteration 65510
Thu Jul 30 20:49:07 2020 kern.debug kernel: [   12.221417] ieee80211 phy1: fw download complete
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.221434] ieee80211 phy1: device node: /soc/pcie/pcie@2,0
Thu Jul 30 20:49:07 2020 kern.debug kernel: [   12.227511] ieee80211 phy1: pcmd = dde4c000
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.245458] ieee80211 phy1: firmware version: 0x702091a
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.597400] ieee80211 phy1: firmware region code: 30
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.634163] ieee80211 phy1: 2G enabled, 5G disabled
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.639070] ieee80211 phy1: 4 TX antennas, 4 RX antennas
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.673064] Mirror/redirect action on
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.679038] u32 classifier
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.681775]     input device check on
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.685451]     Actions configured
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.692055] GACT probability on
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.696788] Simple TC action Loaded
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.706730] fuse init (API version 7.26)
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.713240] usbcore: registered new interface driver cdc_acm
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.718928] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.727643] usbcore: registered new interface driver cdc_wdm
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.737028] Ebtables v2.0 registered
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.741753] ip_tables: (C) 2000-2006 Netfilter Core Team
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.787778] usbcore: registered new interface driver ums-alauda
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.794551] usbcore: registered new interface driver ums-cypress
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.800999] usbcore: registered new interface driver ums-datafab
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.807793] usbcore: registered new interface driver ums-freecom
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.814349] usbcore: registered new interface driver ums-isd200
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.820747] usbcore: registered new interface driver ums-jumpshot
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.827538] usbcore: registered new interface driver ums-karma
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.834006] usbcore: registered new interface driver ums-sddr09
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.840495] usbcore: registered new interface driver ums-sddr55
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.847402] usbcore: registered new interface driver ums-usbat
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.853875] usbcore: registered new interface driver usblp
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.863135] usbcore: registered new interface driver usbserial
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.869037] usbcore: registered new interface driver usbserial_generic
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.875660] usbserial: USB Serial support registered for generic
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.883591] wireguard: WireGuard 1.0.20200611 loaded. See www.wireguard.com for information.
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.892102] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.918173] xt_time: kernel timezone is -0000
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.923466] usbcore: registered new interface driver cdc_ether
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.930616] usbcore: registered new interface driver cdc_ncm
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.938214] usbcore: registered new interface driver huawei_cdc_ncm
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.949583] PPP generic driver version 2.4.2
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.954989] NET: Registered protocol family 24
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.960062] PPTP driver version 0.8.5
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.964468] usbcore: registered new interface driver qmi_wwan
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.971000] usbcore: registered new interface driver rndis_host
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.977405] usbcore: registered new interface driver sierra
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.983040] usbserial: USB Serial support registered for Sierra USB modem
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.990452] usbcore: registered new interface driver sierra_net
Thu Jul 30 20:49:07 2020 kern.info kernel: [   12.997704] usbcore: registered new interface driver cdc_mbim
Thu Jul 30 20:49:07 2020 kern.info kernel: [   13.003961] usbcore: registered new interface driver option
Thu Jul 30 20:49:07 2020 kern.info kernel: [   13.009579] usbserial: USB Serial support registered for GSM modem (1-port)
Thu Jul 30 20:49:07 2020 kern.info kernel: [   13.017814] usbcore: registered new interface driver qcserial
Thu Jul 30 20:49:07 2020 kern.info kernel: [   13.023618] usbserial: USB Serial support registered for Qualcomm USB modem
Thu Jul 30 20:49:07 2020 user.info kernel: [   13.030692] kmodloader: done loading kernel modules from /etc/modules.d/*
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .bit
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .glue
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .parody
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .dyn
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .bbs
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .free
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .fur
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .geek
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .gopher
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .indy
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .ing
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .null
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .oss
Thu Jul 30 20:49:08 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .micro
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: started, version 2.80 cachesize 150
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: DNS service limited to local subnets
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using local addresses only for domain test
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using local addresses only for domain onion
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using local addresses only for domain localhost
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using local addresses only for domain local
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using local addresses only for domain invalid
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using local addresses only for domain bind
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain micro
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain micro
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain micro
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain oss
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain oss
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain oss
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain null
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain null
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain null
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain ing
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain ing
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain ing
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain indy
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain indy
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain indy
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain gopher
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain gopher
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain gopher
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain geek
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain geek
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain geek
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain fur
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain fur
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain fur
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain free
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain free
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain free
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain bbs
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain bbs
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain bbs
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: using 11 more nameservers
Thu Jul 30 20:49:08 2020 daemon.warn dnsmasq[2623]: no servers found in /tmp/resolv.conf.auto, will retry
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: read /etc/hosts - 15 addresses
Thu Jul 30 20:49:08 2020 daemon.info dnsmasq[2623]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Thu Jul 30 20:49:08 2020 daemon.err dnsmasq[2623]: failed to load names from /adblock/block.hosts: No such file or directory
Thu Jul 30 20:49:08 2020 authpriv.info dropbear[2656]: Not backgrounding
Thu Jul 30 20:49:09 2020 user.notice : Added device handler type: 8021ad
Thu Jul 30 20:49:09 2020 user.notice : Added device handler type: 8021q
Thu Jul 30 20:49:09 2020 user.notice : Added device handler type: macvlan
Thu Jul 30 20:49:09 2020 user.notice : Added device handler type: veth
Thu Jul 30 20:49:09 2020 user.notice : Added device handler type: bridge
Thu Jul 30 20:49:09 2020 user.notice : Added device handler type: Network device
Thu Jul 30 20:49:09 2020 user.notice : Added device handler type: tunnel
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.459229] mvneta f1034000.ethernet eth0: configuring for fixed/sgmii link mode
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.466796] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.472731] mvneta f1034000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.475018] br-lan: port 1(eth0.1) entered blocking state
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.486070] br-lan: port 1(eth0.1) entered disabled state
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.491644] device eth0.1 entered promiscuous mode
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.496466] device eth0 entered promiscuous mode
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.501620] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.508195] br-lan: port 1(eth0.1) entered blocking state
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.513637] br-lan: port 1(eth0.1) entered forwarding state
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.519370] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'lan' is enabled
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'lan' is setting up now
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'lan' is now up
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: reading /tmp/resolv.conf.auto
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain test
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain onion
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain localhost
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain local
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain invalid
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain bind
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain micro
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain micro
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain micro
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain oss
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'loopback' is enabled
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'loopback' is setting up now
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain oss
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain oss
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'loopback' is now up
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain null
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain null
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain null
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain ing
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain ing
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain ing
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain indy
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain indy
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain indy
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain gopher
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain gopher
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain gopher
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain geek
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain geek
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain geek
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain fur
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain fur
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain fur
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain free
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain free
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain free
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain bbs
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain bbs
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain bbs
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using 13 more nameservers
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.528420] mvneta f1070000.ethernet eth1: configuring for fixed/rgmii-id link mode
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.536763] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Thu Jul 30 20:49:10 2020 daemon.warn dnsmasq[2623]: Ignoring query from non-local network
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.542705] mvneta f1070000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.550584] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan' is enabled
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan6' is enabled
Thu Jul 30 20:49:10 2020 daemon.notice netifd: bridge 'br-lan' link is up
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'lan' has link connectivity
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Network device 'eth0' link is up
Thu Jul 30 20:49:10 2020 daemon.notice netifd: VLAN 'eth0.1' link is up
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Network device 'lo' link is up
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Network device 'eth1' link is up
Thu Jul 30 20:49:10 2020 daemon.notice netifd: VLAN 'eth1.2' link is up
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan' has link connectivity
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan' is setting up now
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan6' has link connectivity
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan6' is setting up now
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan6' is now up
Thu Jul 30 20:49:10 2020 daemon.err insmod: module is already loaded - slhc
Thu Jul 30 20:49:10 2020 daemon.err insmod: module is already loaded - ppp_generic
Thu Jul 30 20:49:10 2020 daemon.err insmod: module is already loaded - pppox
Thu Jul 30 20:49:10 2020 daemon.err insmod: module is already loaded - pppoe
Thu Jul 30 20:49:10 2020 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Thu Jul 30 20:49:10 2020 daemon.info pppd[3253]: Plugin rp-pppoe.so loaded.
Thu Jul 30 20:49:10 2020 daemon.info pppd[3253]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: pppd 2.4.7 started by root, uid 0
Thu Jul 30 20:49:10 2020 daemon.info pppd[3253]: PPP session is 3029
Thu Jul 30 20:49:10 2020 daemon.warn pppd[3253]: Connected to f8:13:08:40:73:14 via interface eth1.2
Thu Jul 30 20:49:10 2020 kern.info kernel: [   15.902515] pppoe-wan: renamed from ppp0
Thu Jul 30 20:49:10 2020 daemon.info pppd[3253]: Renamed interface ppp0 to pppoe-wan
Thu Jul 30 20:49:10 2020 daemon.info pppd[3253]: Using interface pppoe-wan
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: Connect: pppoe-wan <--> eth1.2
Thu Jul 30 20:49:10 2020 daemon.info pppd[3253]: CHAP authentication succeeded: CHAP authentication success
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: CHAP authentication succeeded
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: peer from calling number F8:13:08:40:73:14 authorized
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: local  IP address 146.199.248.160
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: remote IP address 172.16.12.120
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: primary   DNS address 212.159.6.9
Thu Jul 30 20:49:10 2020 daemon.notice pppd[3253]: secondary DNS address 212.159.6.10
Thu Jul 30 20:49:10 2020 user.notice mac80211: Failed command: iw phy phy0 set antenna 0xffffffff 0xffffffff
Thu Jul 30 20:49:10 2020 user.notice mac80211: Failed command: iw phy phy1 set antenna 0xffffffff 0xffffffff
Thu Jul 30 20:49:10 2020 daemon.notice netifd: radio0 (3189): command failed: Not supported (-95)
Thu Jul 30 20:49:10 2020 user.notice mac80211: Failed command: iw phy phy0 set distance 0
Thu Jul 30 20:49:10 2020 daemon.notice netifd: radio1 (3190): command failed: Not supported (-95)
Thu Jul 30 20:49:10 2020 user.notice mac80211: Failed command: iw phy phy1 set distance 0
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Network device 'pppoe-wan' link is up
Thu Jul 30 20:49:10 2020 daemon.notice netifd: Interface 'wan' is now up
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: reading /tmp/resolv.conf.auto
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain test
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain onion
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain localhost
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain local
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain invalid
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using local addresses only for domain bind
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain micro
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain micro
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain micro
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain oss
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain oss
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain oss
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain null
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain null
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain null
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain ing
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain ing
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain ing
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain indy
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain indy
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain indy
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain gopher
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain gopher
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain gopher
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain geek
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain geek
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain geek
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain fur
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain fur
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain fur
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain free
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain free
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain free
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.142.171.235#53 for domain bbs
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 95.211.32.162#53 for domain bbs
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using nameserver 66.244.95.20#53 for domain bbs
Thu Jul 30 20:49:10 2020 daemon.info dnsmasq[2623]: using 15 more nameservers
Thu Jul 30 20:49:11 2020 kern.info kernel: [   16.565028] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Thu Jul 30 20:49:11 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
Thu Jul 30 20:49:11 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Thu Jul 30 20:49:11 2020 user.err : error starting threads: errno 2 (No such file or directory)
Thu Jul 30 20:49:11 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: could not open /var/lib/nfs/.etab.lock for locking: errno 2 (No such file or directory)
Thu Jul 30 20:49:11 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: can't lock /var/lib/nfs/etab for writing
Thu Jul 30 20:49:11 2020 daemon.notice procd: /etc/rc.d/S60nfsd: Command failed: Not found
Thu Jul 30 20:49:11 2020 kern.debug kernel: [   16.884165] ieee80211 phy1: change: 0xffffffff
Thu Jul 30 20:49:11 2020 kern.info kernel: [   16.941853] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
Thu Jul 30 20:49:11 2020 kern.debug kernel: [   17.063580] ieee80211 phy0: change: 0xffffffff
Thu Jul 30 20:49:11 2020 daemon.err odhcpd[3070]: Failed to send to ff02::1%lan@br-lan (Address not available)
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.137806] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.144481] br-lan: port 2(wlan1) entered blocking state
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.149837] br-lan: port 2(wlan1) entered disabled state
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.155366] device wlan1 entered promiscuous mode
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.160171] br-lan: port 2(wlan1) entered blocking state
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.165553] br-lan: port 2(wlan1) entered forwarding state
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.171248] br-lan: port 3(wlan0) entered blocking state
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.176668] br-lan: port 3(wlan0) entered disabled state
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.182171] device wlan0 entered promiscuous mode
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.186948] br-lan: port 3(wlan0) entered blocking state
Thu Jul 30 20:49:11 2020 kern.info kernel: [   17.192293] br-lan: port 3(wlan0) entered forwarding state
Thu Jul 30 20:49:11 2020 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Jul 30 20:49:11 2020 daemon.err hostapd: Using interface wlan1 with hwaddr 00:25:9c:14:41:c2 and ssid "England"
Thu Jul 30 20:49:11 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Jul 30 20:49:11 2020 daemon.err hostapd: Using interface wlan0 with hwaddr 00:25:9c:14:41:c3 and ssid "England"
Thu Jul 30 20:49:11 2020 kern.debug kernel: [   17.311839] ieee80211 phy0: change: 0x100
Thu Jul 30 20:49:11 2020 kern.debug kernel: [   17.321045] ieee80211 phy0: change: 0x42
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.466523] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Thu Jul 30 20:49:12 2020 kern.debug kernel: [   17.473292] ieee80211 phy1: change: 0x100
Thu Jul 30 20:49:12 2020 kern.debug kernel: [   17.481405] ieee80211 phy1: change: 0x42
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: OpenVPN 2.4.4 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: library versions: OpenSSL 1.1.1g  21 Apr 2020, LZO 2.10
Thu Jul 30 20:49:12 2020 daemon.warn openvpn(custom_config)[4474]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: Diffie-Hellman initialized with 1024 bit key
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.631442] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: TUN/TAP device tun0 opened
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: TUN/TAP TX queue length set to 100
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: /sbin/ifconfig tun0 10.8.0.1 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.667182] br-lan: port 4(wlan0-1) entered blocking state
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.672779] br-lan: port 4(wlan0-1) entered disabled state
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.678371] device wlan0-1 entered promiscuous mode
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: /etc/openvpn.up tun0 1500 1624 10.8.0.1 255.255.255.0 init
Thu Jul 30 20:49:12 2020 user.notice root: openvpn up script called
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.744822] IPv6: ADDRCONF(NETDEV_UP): wlan0-1: link is not ready
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.750963] br-lan: port 4(wlan0-1) entered blocking state
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.756501] br-lan: port 4(wlan0-1) entered forwarding state
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.762543] br-lan: port 5(wlan1-1) entered blocking state
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.768059] br-lan: port 5(wlan1-1) entered disabled state
Thu Jul 30 20:49:12 2020 daemon.err hostapd: Using interface wlan0-1 with hwaddr 02:25:9c:14:41:c8 and ssid "Skynet Guests"
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.773766] device wlan1-1 entered promiscuous mode
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.836664] IPv6: ADDRCONF(NETDEV_UP): wlan1-1: link is not ready
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.842858] br-lan: port 5(wlan1-1) entered blocking state
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.848384] br-lan: port 5(wlan1-1) entered forwarding state
Thu Jul 30 20:49:12 2020 daemon.err hostapd: Using interface wlan1-1 with hwaddr 02:25:9c:14:41:cf and ssid "Skynet Guests"
Thu Jul 30 20:49:12 2020 kern.info kernel: [   17.931539] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-1: link becomes ready
Thu Jul 30 20:49:12 2020 kern.info kernel: [   18.047651] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1-1: link becomes ready
Thu Jul 30 20:49:12 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ENABLED
Thu Jul 30 20:49:12 2020 daemon.notice hostapd: wlan0: AP-ENABLED
Thu Jul 30 20:49:12 2020 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
Thu Jul 30 20:49:12 2020 daemon.notice hostapd: wlan1: AP-ENABLED
Thu Jul 30 20:49:12 2020 daemon.notice netifd: Network device 'wlan0' link is up
Thu Jul 30 20:49:12 2020 daemon.notice netifd: Network device 'wlan0-1' link is up
Thu Jul 30 20:49:12 2020 daemon.notice netifd: Network device 'wlan1' link is up
Thu Jul 30 20:49:12 2020 daemon.notice netifd: Network device 'wlan1-1' link is up
Thu Jul 30 20:49:12 2020 daemon.warn openvpn(custom_config)[4474]: Could not determine IPv4/IPv6 protocol. Using AF_INET
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: Listening for incoming TCP connection on [AF_INET][undef]:4443
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: TCPv4_SERVER link local (bound): [AF_INET][undef]:4443
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: TCPv4_SERVER link remote: [AF_UNSPEC]
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: MULTI: multi_init called, r=256 v=256
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: MULTI: TCP INIT maxclients=1024 maxevents=1028
Thu Jul 30 20:49:12 2020 daemon.notice openvpn(custom_config)[4474]: Initialization Sequence Completed
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]: Forcing update:
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]:     service provider=freedns.afraid.org
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]:     domain=micko.mooo.com
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]:         Could not determine local ip from url: http://www.ipchicken.com
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]:         Could not determine local ip from url: http://www.tracemyip.org
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]:         Successfully retrieved local ip from url: http://checkip.dyndns.org
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]:     local IP  = 146.199.248.160
Thu Jul 30 20:49:13 2020 daemon.info ddns_gargoyle[4452]:     remote IP cannot be determined
Sat Oct 10 23:29:26 2020 daemon.info dnsmasq[2623]: exiting on receipt of SIGTERM
Sat Oct 10 23:29:26 2020 daemon.info dnsmasq[5125]: started, version 2.80 cachesize 150
Sat Oct 10 23:29:26 2020 daemon.info dnsmasq[5125]: DNS service limited to local subnets
Sat Oct 10 23:29:26 2020 daemon.info dnsmasq[5125]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile

279

Odp: Gargoyle 1.13.x

There is nothing here. Logs are only in ram, no information before rebooting.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

280

Odp: Gargoyle 1.13.x

Gargoyle dorobiło się obsługi klienta openvpn z autoryzacją przez użytkownka/hasła (nie tylko certyfikat jak było dotychczas). Nie budowałem jeszcze obrazów z tym, jak ktoś chce to mogę wystawić sam plugin do aktualizacji.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

281

Odp: Gargoyle 1.13.x

Przyszedł czas na łącze GigaBit i postanowiłem zmienić WDR3600 na ASUS RT-AC58U.

Przez przypadek zainstalowałem na start 1.13.0.0pre7.
Działało prawidłowo ale jako że nie chciałem być "testerem" to postanowiłem zainstalować stabilną wersję.
Niestety/stety okazało się że stabilna wersja osiągała prędkość WAN <-> LAN max 600 Mbit/s
Postanowiłem zostać na 1.13 i na razie wszystko działa stabilnie osiągając transfery LAN/WAN 920 Mbit/s.

Jak dotąd wykorzystuje i nie znalazłem problemów z:
- DDNS
- Wireguard
- Przekierowanie portów
- PXE boot serwer

Testowałem jeszcze offloading ale nie zauważyłem efektów.

Dzięki za prace i przygotowanie obrazów

282

Odp: Gargoyle 1.13.x

Odświeżę troszkę temat pytaniem wink

Czy w Gargoyle 1.13.xx jest jakiś klikalny plugin wysyłający na zdefiniowany adres e-mail raport, że router właśnie wstał po  awarii zasilania?
W rodzinie gdzie pracuje router na Gargoyle jest problem z zanikami napięcia i walczą z elektrownią. Fanie by było jakby zebrali maile z datami i godzinami np. z dwu tygodni i przedstawili do biura w jakich godzinach najczęściej to się dzieje.
Niestety nie mam dostępu do tego routera a oni średnio techniczni, więc najłatwiej było by mi przez telefon instruować gdzie i co wyklikać.

r6220 - Gargoyle 1.12.0.2
wndr4300 - Gargoyle 1.13
wndr4300 - OpenWRT LuCI 21.02

283

Odp: Gargoyle 1.13.x

Pośrednio plugin-gargoyle-email-notifications, tylko że on wysyła status systemu a nie sam fakt że router się uruchomił.

Taki coś możesz robić samodzielnie - np. w dodają do /etc/rc.local odpowiednią linię: https://eko.one.pl/?p=openwrt-email

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

284 (edytowany przez roofman 2020-12-15 07:43:01)

Odp: Gargoyle 1.13.x

Dzięki. Nie sądzę że uda mi się wymusić aby coś tam klepali w konsoli big_smile
Po nowym roku dopiero tam będę to popatrzę na materiały które przesłałeś i może u siebie przetestuję.
Skrypt po prostu najlepiej wrzuć aby startował po starcie routera i nawiązaniu połączenia wysyłał maila w stylu "ja żyję"?
I chyba tyle, nic więcej nie potrzeba w tym przypadku smile

r6220 - Gargoyle 1.12.0.2
wndr4300 - Gargoyle 1.13
wndr4300 - OpenWRT LuCI 21.02

285

Odp: Gargoyle 1.13.x

Jeżeli potrzebujesz tylko informacji że router właśnie się uruchomił  to tylko tyle.

Jeżeli zadowala Cię samo info że był restart i używasz moich obrazów to po prostu włącz wysyłanie statystyki - wtedy w panelu będziesz widział że był restart danego dnia bo wysyłany jest m.in uptime routera.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

286 (edytowany przez roofman 2020-12-15 08:15:27)

Odp: Gargoyle 1.13.x

Tak, używam Twoich obrazów.
W domu 1.12, w pracy 1.13. W rodzinie różnie, tam akurat gdzie tego potrzeba jest 1.13.

Teraz patrze w pracy i ślepy jestem bo nie widzę gdzie uruchomić wysyłanie statystyk? Plugin dodatkowy?

Fakt że byłoby to na szybko rozwiązanie, trzeba po prostu zajrzeć w plik, wyłuskać godzinę restartu i zapisać sobie na karteczce wink

EDIT: A, dobra, znalazłem. Faktycznie ślepy jestem wink

Hmmm... nie wiem czemu ale jakoś dziwnie statystyki pokazuje.
W pracy mam włączone, a grafika pokazuje że ostatnie zgłoszenie routera to 17.08.2020r.
Przestało to działać, coś się zmieniło?

r6220 - Gargoyle 1.12.0.2
wndr4300 - Gargoyle 1.13
wndr4300 - OpenWRT LuCI 21.02

287

Odp: Gargoyle 1.13.x

Statystyki przesyłają się raz dziennie w cronie o wylosowanej godzinie, więc... poczekaj do jutra. Na dodatek musisz mieć router włączony o tej godzinie smile

Chyba że sobie to z konsoli uruchomisz żeby zobaczyć czy przechodzą dane.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

288

Odp: Gargoyle 1.13.x

Router pracuje 24/24. Statystyki zaptaszone. W tabelce wygląda to tak:
https://i.ibb.co/L8Hk6wT/Statystyka1.jpg

r6220 - Gargoyle 1.12.0.2
wndr4300 - Gargoyle 1.13
wndr4300 - OpenWRT LuCI 21.02

289

Odp: Gargoyle 1.13.x

Zrób

/sbin/stat.sh debug

i wyślij mi to mejlem, zobaczę czy mam go w ogóle w bazie.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

290

Odp: Gargoyle 1.13.x

Wynik poszedł.

r6220 - Gargoyle 1.12.0.2
wndr4300 - Gargoyle 1.13
wndr4300 - OpenWRT LuCI 21.02

291

Odp: Gargoyle 1.13.x

Z Gargoyle korzystałem lata temu. Z tego co pamiętam była możliwość konfiguracji jednego radia przez GUI a pozostałe tylko z konsoli. Nadal tak jest?

292

Odp: Gargoyle 1.13.x

Nie, obecnie jeżeli są dwa radia to oba możesz skonfigurować w gui. Ale tylko dwa wg ustalonego przez gui schematu. Wszystkie inne - z konsoli.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

293 (edytowany przez badziewiak 2020-12-17 14:04:04)

Odp: Gargoyle 1.13.x

Witam
Nadejszła wiekopomna chwiła... że mamy wersję gargoyle 1.13. Cieszy mnie to niezmiernie. Mam 2 pytania:
1. Czy jest to już na tyle stabilne, że można to instalować produkcyjnie?
2. Czy w przypadku klienta openvpn na routerze, gdy używamy dodatkowego hasła, to hasło zostanie zapamiętane po restarcie routera klienckiego, czy trzeba je wpisywać przez web-gui?

Linksys WRT3200ACM (Gargoyle)
PC Engines APU.4C4 Platforma 4x i211AT LAN, 4GB RAM, AMD GX-412TC CPU (Gargoyle)
Tp-link 1043NDv2 (Gargoyle)

294

Odp: Gargoyle 1.13.x

1. Jest stabilne, tylko nigdy oficjalnie nie zostało wydane. Więc nie, nie instaluj smile
2. hasło wklepujesz w gui i zostaje w systemie. Nie wpisujesz go za każdym razem.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

295 (edytowany przez badziewiak 2020-12-17 16:07:35)

Odp: Gargoyle 1.13.x

Zaryzykowałem. Nadpisałem configi serwera openvpn i samby. W sambie musiałem standardowo zaktualizować hasła, bo coś poszło nie tak. Ale to nie problem. Wszystko fajnie, ale wi-fi 5GHz nie mogę włączyć. Po depnięciu "Zapisz zmiany" ta opcja się chowa. Sieć jest widoczna w telefonie, ale nie można się z nią połączyć.

Linksys WRT3200ACM (Gargoyle)
PC Engines APU.4C4 Platforma 4x i211AT LAN, 4GB RAM, AMD GX-412TC CPU (Gargoyle)
Tp-link 1043NDv2 (Gargoyle)

296

Odp: Gargoyle 1.13.x

Jest jest widoczna to włączyłeś przecież. Zrestartuj jeszcze raz router i zobacz  w konfigu czy jest wszystko to co ustawiłeś.

Standardowo - na jakim routerze to robisz?

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

297

Odp: Gargoyle 1.13.x

Router WRT3200ACM. Przywróciłem domyślną konfigurację i zacząłem od nowa. Efekt podobny, ale już się połączyłem przez 5GHz. Gui jednak nie pokazuje tej sieci. Po restarcie tej sieci nie widać. Pojawia się dopiero, gdy ponownie włączę ją w gui.

Linksys WRT3200ACM (Gargoyle)
PC Engines APU.4C4 Platforma 4x i211AT LAN, 4GB RAM, AMD GX-412TC CPU (Gargoyle)
Tp-link 1043NDv2 (Gargoyle)

298

Odp: Gargoyle 1.13.x

Pokaz uci show wireless

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

299

Odp: Gargoyle 1.13.x

Przed restartem:

root@Gargoyle:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.channel='36'
wireless.radio0.hwmode='11a'
wireless.radio0.path='soc/soc:pcie/pci0000:00/0000:00:01.0/0000:01:00.0'
wireless.radio0.htmode='VHT80'
wireless.radio0.noscan='1'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.channel='11'
wireless.radio1.hwmode='11g'
wireless.radio1.path='soc/soc:pcie/pci0000:00/0000:00:02.0/0000:02:00.0'
wireless.radio1.noscan='1'
wireless.radio1.htmode='NONE'
wireless.radio2=wifi-device
wireless.radio2.type='mac80211'
wireless.radio2.channel='36'
wireless.radio2.hwmode='11a'
wireless.radio2.path='platform/soc/soc:internal-regs/f10d8000.sdhci/mmc_host/mmc                                                                                                                                                             0/mmc0:0001/mmc0:0001:1'
wireless.radio2.noscan='1'
wireless.radio2.htmode='VHT20'
wireless.ap_g=wifi-iface
wireless.ap_g.device='radio1'
wireless.ap_g.mode='ap'
wireless.ap_g.network='lan'
wireless.ap_g.disassoc_low_ack='0'
wireless.ap_g.ssid='Gargoyle'
wireless.ap_g.encryption='psk2'
wireless.ap_g.key='******'
wireless.ap_a=wifi-iface
wireless.ap_a.device='radio2'
wireless.ap_a.mode='ap'
wireless.ap_a.network='lan'
wireless.ap_a.disassoc_low_ack='0'
wireless.ap_a.ssid='Gargoyle 5GHz'
wireless.ap_a.encryption='psk2'
wireless.ap_a.key='******'

Po restarcie jest tak samo. Teraz telefon łączy się z 5GHz, ale w gui nadal nie widać.

Linksys WRT3200ACM (Gargoyle)
PC Engines APU.4C4 Platforma 4x i211AT LAN, 4GB RAM, AMD GX-412TC CPU (Gargoyle)
Tp-link 1043NDv2 (Gargoyle)

300

Odp: Gargoyle 1.13.x

Odinstaluj pakiet kmod-mwifiex-sdio i zrestartuj route ponownie. Nie możesz mieć obsługi trzeciego radia.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.