华硕网络产品技术交流平台

 找回密码
 立即注册

QQ登录

只需一步,快速开始

手机号码,快捷登录

123
返回列表 发新帖
楼主: yangren13

[求助] RT-AX68U频繁断流

[复制链接]

0

主题

6

回帖

22

积分

新手上路

Rank: 1

积分
22
发表于 2022-6-1 01:32:20 | 显示全部楼层
本帖最后由 包租公 于 2022-6-1 01:33 编辑
Master 发表于 2022-5-31 10:48
系统日志里面,有没有类似“ACSD”字串,有的话,证明你的路由器在进行频道的自动侦测和选择,只是侦测选 ...

有类似“ACSD”字串,那我这个要怎么解决?频繁的时候1天手动切换2次,慢的时候2天切换一次,固件已经更新到最新了,有线一直正常。

0

主题

6

回帖

22

积分

新手上路

Rank: 1

积分
22
发表于 2022-6-1 01:33:09 | 显示全部楼层
Jan  1 00:00:02 kernel: ubi2: attaching mtd10
Jan  1 00:00:02 kernel: ubi2: scanning is finished
Jan  1 00:00:02 kernel: ubi2: attached mtd10 (name "misc1", size 8 MiB)
Jan  1 00:00:02 kernel: ubi2: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Jan  1 00:00:02 kernel: ubi2: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Jan  1 00:00:02 kernel: ubi2: VID header offset: 2048 (aligned 2048), data offset: 4096
Jan  1 00:00:02 kernel: ubi2: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
Jan  1 00:00:02 kernel: ubi2: user volume: 1, internal volumes: 1, max. volumes count: 128
Jan  1 00:00:02 kernel: ubi2: max/mean erase counter: 29/11, WL threshold: 4096, image sequence number: 2099130947
Jan  1 00:00:02 kernel: ubi2: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
Jan  1 00:00:02 kernel: ubi2: background thread "ubi_bgt2d" started, PID 395
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" started, PID 410
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): UBIFS: mounted UBI device 2, volume 0, name "nvram"
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1396736 bytes (1 MiB, 11 LEBs)
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): reserved for root: 0 bytes (0 KiB)
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): media format: w4/r0 (latest is w4/r0), UUID EEC2680F-D67F-4D6C-BF0F-1260390EA30C, small LPT model
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): un-mount UBI device 2
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" stops
Jan  1 00:00:03 kernel: ubi2: detaching mtd10
Jan  1 00:00:03 kernel: ubi2: mtd10 is detached
Jan  1 00:00:03 jffs2: getting the information of jffs2
Jan  1 00:00:03 modprobe: module jffs2 not found in modules.dep
Jan  1 00:00:03 jffs2: mounting jffs2
Jan  1 00:00:04 init: notice[jffs]: Loaded
Jan  1 00:00:05 jffs2: create jffs2 successfully
Jan  1 00:00:05 kernel: Loading HND Module
Jan  1 00:00:05 kernel: igs_module_init:867:         IGS 29 create network socket successful
Jan  1 00:00:05 kernel: cfg80211: Calling CRDA to update world regulatory domain
Jan  1 00:00:05 kernel: dpsta_init: 17.10.157.2802 (r794271) cf953dc Jan 12 2021 15:19:57 msglevel 0x1
Jan  1 00:00:07 kernel: osl_skb_audit: PASS
Jan  1 00:00:07 kernel: wl_module_init: passivemode set to 0x1
Jan  1 00:00:07 kernel: wl_module_init: txworkq set to 0x0
Jan  1 00:00:07 kernel: ^[[0;32mwl_pktfwd_sys_init:  ^[[1m^[[34mWL_PKTFWD[1.1.0]^[[0m Success^[[0m
Jan  1 00:00:07 kernel: wl 0000:01:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:07 kernel: wl0: creating kthread wl0-kthrd
Jan  1 00:00:07 kernel: BME Service Initialization
Jan  1 00:00:07 kernel: BME: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
Jan  1 00:00:07 kernel: M2M: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc01e9dc000,ffffffc017ca2000>,ffffffc013ed5000 depth 256
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc015918000,ffffffc0158f0000>,ffffffc013ed4000 depth 256
Jan  1 00:00:07 kernel: M2M: DMA 0 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: M2M: DMA 1 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: wl0: phy_radio_attach: RF Band Cap: 2G:1 5G:1
Jan  1 00:00:07 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
Jan  1 00:00:07 kernel: wl0 taf_do_enable: TAF is enabled
Jan  1 00:00:07 kernel: CSIMON module registered
Jan  1 00:00:07 kernel: wfd0-thrd WL 0 FLowControl total<22877> lo<5719> hi<2287> favor prio<4>
Jan  1 00:00:07 kernel: ^[[0;31mwfd_bind: wfd0-thrd initialized pktlists: radio 0 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x3f0 [wl]
Jan  1 00:00:07 kernel: ^[[0m
Jan  1 00:00:07 kernel: Creating CPU ring for queue number 0 with 1024 packets descriptor=0xffffffbffc5c02c0
Jan  1 00:00:07 kernel:  Creating CPU ring for queue number 1 with 1024 packets descriptor=0xffffffbffc5c0300
Jan  1 00:00:07 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 0 wl_radio_idx 0 Type skb:sll configured WFD thread wfd0-thrd minQId/maxQId (8/9), status (0) qmask 0x3^[[0m
Jan  1 00:00:07 kernel: Instantiating WFD 0 thread
Jan  1 00:00:07 kernel: ^[[0;32mwl_wfd_bind: wl0 wfd_idx 0 success^[[0m
Jan  1 00:00:07 kernel: wfd_registerdevice Successfully registered dev eth5 ifidx 0 wfd_idx 0
Jan  1 00:00:07 kernel: eth5: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2803 (r795020)
Jan  1 00:00:07 kernel: wl 0001:01:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:07 kernel: wl1: creating kthread wl1-kthrd
Jan  1 00:00:07 kernel: BME Service Initialization
Jan  1 00:00:07 kernel: BME: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
Jan  1 00:00:07 kernel: M2M: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc0159d4000,ffffffc01587a000>,ffffffc013e85000 depth 256
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc0158a8000,ffffffc01589c000>,ffffffc013e72000 depth 256
Jan  1 00:00:07 kernel: M2M: DMA 0 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: M2M: DMA 1 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: wl1: phy_radio_attach: RF Band Cap: 2G:1 5G:1
Jan  1 00:00:07 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
Jan  1 00:00:07 kernel: wl1 taf_do_enable: TAF is enabled
Jan  1 00:00:07 kernel: CSIMON module registered
Jan  1 00:00:07 kernel: wfd1-thrd WL 1 FLowControl total<22877> lo<5719> hi<2287> favor prio<4>
Jan  1 00:00:07 kernel: ^[[0;31mwfd_bind: wfd1-thrd initialized pktlists: radio 1 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x3f0 [wl]
Jan  1 00:00:07 kernel: ^[[0m
Jan  1 00:00:07 kernel: Creating CPU ring for queue number 2 with 1024 packets descriptor=0xffffffbffc5c0340
Jan  1 00:00:07 kernel:  Creating CPU ring for queue number 3 with 1024 packets descriptor=0xffffffbffc5c0380
Jan  1 00:00:07 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 1 wl_radio_idx 1 Type skb:sll configured WFD thread wfd1-thrd minQId/maxQId (10/11), status (0) qmask 0xc^[[0m
Jan  1 00:00:07 kernel: Instantiating WFD 1 thread
Jan  1 00:00:07 kernel: ^[[0;32mwl_wfd_bind: wl1 wfd_idx 1 success^[[0m
Jan  1 00:00:07 kernel: wfd_registerdevice Successfully registered dev eth6 ifidx 0 wfd_idx 1
Jan  1 00:00:07 kernel: eth6: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2803 (r795020)
Jan  1 00:00:07 modprobe: module nf_conntrack_proto_gre not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_nat_proto_gre not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_conntrack_pptp not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_nat_pptp not found in modules.dep
May  5 05:05:01 kernel: random: init urandom read with 30 bits of entropy available
May  5 05:05:01 kernel: proc_dostring_crashlogsave:  crash log filename is /jffs/crashlog.log
May  5 05:05:01 kernel: crashFileSet: log signature invalid !
May  5 05:05:01 kernel: ret 0 retlen 65536 buff <6>usbcore: registered new interface driver usbfs
May  5 05:05:01 kernel: usbcore: registered new interface driver hub
May  5 05:05:01 kernel: usbcore: registered new device driver usb
May  5 05:05:01 kernel: ++++ Powering up USB blocks
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: xHCI Host Controller
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: new USB bus registered, assigned bus number 1
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: hcc params 0x0250f17c hci version 0x100 quirks 0x00014010
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: irq 25, io mem 0x8000d000
May  5 05:05:01 kernel: hub 1-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 1-0:1.0: config failed, hub doesn't have any ports! (err -19)
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: xHCI Host Controller
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: new USB bus registered, assigned bus number 2
May  5 05:05:01 kernel: hub 2-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 2-0:1.0: 2 ports detected
May  5 05:05:01 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
May  5 05:05:01 kernel: ehci-platform: EHCI generic platform driver
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: EHCI Host Controller
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: new USB bus registered, assigned bus number 3
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: irq 27, io mem 0x8000c300
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: USB 2.0 started, EHCI 1.00
May  5 05:05:01 kernel: hub 3-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 3-0:1.0: 2 ports detected
May  5 05:05:01 kernel: ehci-pci: EHCI PCI platform driver
May  5 05:05:01 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
May  5 05:05:01 kernel: ohci-platform: OHCI generic platform driver
May  5 05:05:01 kernel: ohci-platform ohci-platform.0: Generic Platform OHCI controller
May  5 05:05:01 kernel: ohci-platform ohci-platform.0: new USB bus registered, assigned bus number 4
May  5 05:05:01 kernel: ohci-platform ohci-platform.0: irq 26, io mem 0x8000c400
May  5 05:05:01 kernel: hub 4-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 4-0:1.0: 2 ports detected
May  5 05:05:01 kernel: ohci-pci: OHCI PCI platform driver
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_acm
May  5 05:05:01 kernel: cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
May  5 05:05:01 kernel: usbcore: registered new interface driver asix
May  5 05:05:01 kernel: usbcore: registered new interface driver ax88179_178a
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_ether
May  5 05:05:01 kernel: usbcore: registered new interface driver rndis_host
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_ncm
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_wdm
May  5 05:05:01 kernel: usbcore: registered new interface driver qmi_wwan
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_mbim
May  5 05:05:01 kernel: ^[[0;33;41m[ERROR pktrunner] runnerUcast_inet6addr_event,148: Could not rdpa_system_ipv6_host_address_table_find ret=-5^[[0m
May  5 05:05:01 kernel: device eth4 entered promiscuous mode
May  5 05:05:01 kernel: device eth3 entered promiscuous mode
May  5 05:05:01 kernel: device eth2 entered promiscuous mode
May  5 05:05:01 kernel: device eth1 entered promiscuous mode
May  5 05:05:01 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:01 kernel: CFG80211-ERROR) wl_allocate_wowl_config : Wowl not supported (-23)
May  5 05:05:01 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:01 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:02 kernel: device eth5 entered promiscuous mode
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CFG80211-ERROR) wl_allocate_wowl_config : Wowl not supported (-23)
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:02 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 05:05:02 kernel: device eth6 entered promiscuous mode
May  5 05:05:02 kernel: br0: port 6(eth6) entered listening state
May  5 05:05:02 kernel: br0: port 6(eth6) entered listening state
May  5 05:05:02 kernel: br0: port 5(eth5) entered listening state
May  5 05:05:02 kernel: br0: port 5(eth5) entered listening state
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CSIMON: M2M usr already registered ...
May  5 13:05:03 wlceventd: main(961): wlceventd Start...
May  5 13:05:03 acsd: eth5: Selecting 2g band ACS policy
May  5 13:05:03 dnsmasq[971]: started, version 2.84 cachesize 1500
May  5 13:05:03 dnsmasq[971]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID no-loop-detect no-inotify no-dumpfile
May  5 13:05:03 dnsmasq[971]: warning: interface br2 does not currently exist
May  5 13:05:03 dnsmasq[971]: warning: interface br1 does not currently exist
May  5 13:05:03 dnsmasq[971]: warning: interface pptp* does not currently exist
May  5 13:05:03 dnsmasq[971]: asynchronous logging enabled, queue limit is 5 messages
May  5 13:05:03 dnsmasq-dhcp[971]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d
May  5 13:05:03 dnsmasq-dhcp[971]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d
May  5 13:05:03 dnsmasq-dhcp[971]: DHCP, IP range 192.168.50.2 -- 192.168.50.254, lease time 1d
May  5 13:05:03 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 13:05:03 crond[986]: crond (busybox 1.24.1) started, log level 8
May  5 13:05:03 RT-AX68U: start httpd:80
May  5 13:05:03 httpd: Save SSL certificate...80
May  5 13:05:03 avahi-daemon[1013]: Found user 'lqcabcd' (UID 0) and group 'root' (GID 0).
May  5 13:05:03 avahi-daemon[1013]: Successfully dropped root privileges.
May  5 13:05:03 avahi-daemon[1013]: avahi-daemon 0.7 starting up.
May  5 13:05:03 avahi-daemon[1013]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
May  5 13:05:03 avahi-daemon[1013]: Loading service file /tmp/avahi/services/alexa.service.
May  5 13:05:03 avahi-daemon[1013]: Loading new alias name RT-AX68U.
May  5 13:05:03 avahi-daemon[1013]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
May  5 13:05:03 avahi-daemon[1013]: New relevant interface br0.IPv4 for mDNS.
May  5 13:05:03 avahi-daemon[1013]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
May  5 13:05:03 avahi-daemon[1013]: New relevant interface lo.IPv4 for mDNS.
May  5 13:05:03 avahi-daemon[1013]: Network interface enumeration completed.
May  5 13:05:03 avahi-daemon[1013]: Registering new address record for 192.168.50.1 on br0.IPv4.
May  5 13:05:03 avahi-daemon[1013]: Registering new address record for 127.0.1.1 on lo.IPv4.
May  5 13:05:03 httpd: mssl_cert_key_match : PASS
May  5 13:05:03 avahi-daemon[1013]: Registering new address record for 127.0.0.1 on lo.IPv4.
May  5 13:05:03 disk monitor: be idle
May  5 13:05:04 hour monitor: daemon is starting
May  5 13:05:04 hour monitor: daemon terminates
May  5 13:05:04 jffs2: valid logs(1)
May  5 13:05:04 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 13:05:04 miniupnpd[1086]: HTTP listening on port 57378
May  5 13:05:04 ERP: The model isn't under support list!
May  5 05:05:04 kernel: br0: port 6(eth6) entered learning state
May  5 05:05:04 kernel: br0: port 5(eth5) entered learning state
May  5 13:05:04 miniupnpd[1086]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 13:05:04 lldpd[1116]: could not open either /etc/os-release or /usr/lib/os-release
May  5 13:05:04 lldpd[1116]: lsb_release information not available
May  5 13:05:04 lldpd[1122]: created chroot directory /var/run/lldpd
May  5 13:05:04 lldpd[1122]: /etc/localtime copied to chroot
May  5 13:05:04 lldpd[1122]: protocol LLDP enabled
May  5 13:05:04 lldpd[1122]: protocol CDPv1 disabled
May  5 13:05:04 lldpd[1122]: protocol CDPv2 disabled
May  5 13:05:04 lldpd[1122]: protocol SONMP disabled
May  5 13:05:04 lldpd[1122]: protocol EDP disabled
May  5 13:05:04 lldpd[1122]: protocol FDP disabled
May  5 13:05:04 lldpd[1122]: libevent 2.0.21-stable initialized with epoll method
May  5 13:05:04 lldpd[1122]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
May  5 13:05:04 lldpcli[1119]: lldpd should resume operations
May  5 13:05:04 avahi-daemon[1013]: Server startup complete. Host name is RT-AX68U.local. Local service cookie is 3241213008.
May  5 13:05:04 avahi-daemon[1013]: Alias name RT-AX68U: avahi_server_add_cname failure: The requested operation is invalid because redundant
May  5 05:05:05 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:05 avahi-daemon[1013]: Service "RT-AX68U" (/tmp/avahi/services/alexa.service) successfully established.
May  5 05:05:06 kernel: br0: topology change detected, propagating
May  5 05:05:06 kernel: br0: port 6(eth6) entered forwarding state
May  5 05:05:06 kernel: br0: topology change detected, propagating
May  5 05:05:06 kernel: br0: port 5(eth5) entered forwarding state
May  5 13:05:07 acsd: eth5: selected channel spec: 0x1009 (9)
May  5 13:05:07 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May  5 13:05:07 acsd: eth5: selected channel spec: 0x1009 (9)
May  5 13:05:07 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_INIT
May  5 13:05:07 acsd: eth6: Selecting 5g band ACS policy
May  5 13:05:07 WAN Connection: WAN(0) link down.
May  5 13:05:07 reboot scheduler: [timecheck] NTP sync error
May  5 13:05:07 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 05:05:07 kernel: SCSI subsystem initialized
May  5 13:05:07 modprobe: module scsi_wait_scan not found in modules.dep
May  5 05:05:07 kernel: usbcore: registered new interface driver usb-storage
May  5 05:05:07 kernel: usbcore: registered new interface driver uas
May  5 13:05:07 modprobe: module mbcache not found in modules.dep
May  5 13:05:07 modprobe: module jbd not found in modules.dep
May  5 13:05:07 modprobe: module ext3 not found in modules.dep
May  5 13:05:07 modprobe: module ext4 not found in modules.dep
May  5 13:05:07 modprobe: module ext2 not found in modules.dep
May  5 05:05:07 kernel: tfat: loading out-of-tree module taints kernel.
May  5 05:05:07 kernel: Tuxera FAT 12/16/32 driver version 3017.7.24.32_1 [Flags: R/W MODULE].
May  5 05:05:07 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:07 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Thu Dec 30 19:02:51 CST 2021 aarch64
May  5 05:05:07 kernel: Tuxera NTFS driver 3018.6.5.3_1 [Flags: R/W MODULE].
May  5 05:05:07 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:07 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Thu Dec 30 19:02:51 CST 2021 aarch64
May  5 05:05:07 kernel: Tuxera HFS+ driver 3017.6.20
May  5 05:05:07 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:07 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Thu Dec 30 19:02:51 CST 2021 aarch64
May  5 13:05:07 modprobe: module btusbdrv not found in modules.dep
May  5 13:05:07 init: fwver: 3.0.0.4_386_46055-g2c347bc (snCICIA001326 /ha:24:4B:FE:6FC:28 )
May  5 13:05:08 ahs: [read_json]Update ahs JSON file.
May  5 13:05:08 Mastiff: init
May  5 05:05:08 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:08 acsd: eth6: selected channel spec: 0xe09b (149/80)
May  5 13:05:08 acsd: eth6: Adjusted channel spec: 0xe09b (149/80)
May  5 13:05:08 acsd: eth6: selected channel spec: 0xe09b (149/80)
May  5 13:05:08 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_INIT
May  5 05:05:11 kernel: <=== Deactivate Deep Green Mode
May  5 05:05:11 kernel: bcmswlpbk0 (Ext switch port: 8) (Logical Port: 8) Virtual link UP
May  5 05:05:11 kernel: eth0 (Int switch port: 3) (Logical Port: 3) (phyId: c) Link Up at 1000 mbps full duplex
May  5 05:05:11 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:13 httpd: Succeed to init SSL certificate...80
May  5 13:05:13 BONDING: option disabled
May  5 13:05:14 roamast: ROAMING Start...
May  5 13:05:14 cfg_server:  event: wl_chanspec_changed_action
May  5 13:05:14 cfg_server: skip event due no re
May  5 05:05:14 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:16 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 13:05:16 dnsmasq[971]: using nameserver 192.168.1.1#53
May  5 13:05:16 wan: finish adding multi routes
May  5 13:05:17 miniupnpd[1086]: shutting down MiniUPnPd
May  5 13:05:17 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 13:05:17 miniupnpd[1756]: HTTP listening on port 39809
May  5 13:05:17 miniupnpd[1756]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 13:05:17 WAN Connection: WAN was restored.
May  5 13:05:17 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 13:05:17 dnsmasq[971]: using nameserver 192.168.1.1#53
May  5 05:05:17 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:19 ntp: start NTP update
May 31 05:01:31 rc_service: ntp 1735:notify_rc restart_diskmon
May 31 05:01:32 disk_monitor: Finish
May 31 05:01:32 disk monitor: be idle
May 31 05:01:32 dhcp client: bound 192.168.1.5/255.255.255.0 via 192.168.1.1 for 259200 seconds.
May 30 21:01:33 kernel: tun: Universal TUN/TAP device driver, 1.6
May 30 21:01:33 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
May 30 21:01:33 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 31 05:01:34 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:272:FF:17:EF, status: Successful (0), rssi:0
May 31 05:01:34 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:272:FF:17:EF, status: Successful (0), rssi:-56
May 31 05:01:34 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
May 31 05:01:34 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session E698E25B2402432B
May 31 05:01:34 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
May 31 05:01:34 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 05:01:34 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 05:01:35 dnsmasq-script[971]: json_object_from_file: error opening file /jffs/nmp_vc_json.js: No such file or directory
May 30 21:01:36 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 30 21:01:40 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 30 21:01:43 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 30 21:01:46 kernel: cfg80211: Exceeded CRDA call max attempts. Not calling CRDA
May 31 05:02:13 crond[986]: time disparity of 2140797 minutes detected
May 31 05:02:50 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 05:02:50 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 05:02:50 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-69
May 31 05:02:50 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 01BED26FE66455EF
May 31 05:02:50 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 05:02:50 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 05:02:50 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 05:03:16 WATCHDOG: [FAUPGRADE][auto_firmware_check7419)]periodic_check AM 4:41
May 31 05:03:16 WATCHDOG: [FAUPGRADE][auto_firmware_check7458)]do webs_update
May 31 05:03:56 wlceventd: wlceventd_proc_event(527): eth6: Auth DE:73:03:05:B8:A3, status: Successful (0), rssi:0
May 31 05:03:56 hostapd: eth6: STA de:73:03:05:b8:a3 IEEE 802.11: associated
May 31 05:03:56 wlceventd: wlceventd_proc_event(556): eth6: Assoc DE:73:03:05:B8:A3, status: Successful (0), rssi:-51
May 31 05:03:56 hostapd: eth6: STA de:73:03:05:b8:a3 RADIUS: starting accounting session 6530D97743025CC5
May 31 05:03:56 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: pairwise key handshake completed (RSN)
May 31 05:03:56 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 05:03:56 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 05:04:14 WATCHDOG: [FAUPGRADE][auto_firmware_check7529)]could not retrieve firmware information: webs_state_update = 1, webs_state_error = 1, webs_state_dl_error = 0, webs_state_info.len = 0
May 31 05:04:44 WATCHDOG: [FAUPGRADE][auto_firmware_check7458)]do webs_update
May 31 05:05:36 WATCHDOG: [FAUPGRADE][auto_firmware_check7529)]could not retrieve firmware information: webs_state_update = 1, webs_state_error = 1, webs_state_dl_error = 0, webs_state_info.len = 0
May 31 05:06:06 WATCHDOG: [FAUPGRADE][auto_firmware_check7458)]do webs_update
May 31 05:07:04 WATCHDOG: [FAUPGRADE][auto_firmware_check7529)]could not retrieve firmware information: webs_state_update = 1, webs_state_error = 1, webs_state_dl_error = 0, webs_state_info.len = 0
May 31 05:10:35 wlceventd: wlceventd_proc_event(527): eth6: Auth B0:73:5D:BA:9B:2C, status: Successful (0), rssi:0
May 31 05:10:35 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: associated
May 31 05:10:35 wlceventd: wlceventd_proc_event(556): eth6: Assoc B0:73:5D:BA:9B:2C, status: Successful (0), rssi:-81
May 31 05:10:35 hostapd: eth6: STA b0:73:5d:ba:9b:2c RADIUS: starting accounting session 28EC9606A234EB37
May 31 05:10:35 hostapd: eth6: STA b0:73:5d:ba:9b:2c WPA: pairwise key handshake completed (RSN)
May 31 05:10:36 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.218 b0:73:5d:ba:9b:2c
May 31 05:10:36 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.218 b0:73:5d:ba:9b:2c nova_5i-215fd1e7271cf27e
May 31 05:11:02 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:374:92:87:09, status: Successful (0), rssi:0
May 31 05:11:02 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: associated
May 31 05:11:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:374:92:87:09, status: Successful (0), rssi:-68
May 31 05:11:02 hostapd: eth6: STA a2:37:d4:92:87:09 RADIUS: starting accounting session F58F7ED2FF95E2E4
May 31 05:11:02 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: pairwise key handshake completed (RSN)
May 31 05:11:02 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 05:11:02 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 05:20:32 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 05:20:32 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-78
May 31 05:20:32 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-78
May 31 05:20:32 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 30 21:20:33 kernel: wl1: random key value: E5A8D7336D0335705BFB016CB79C064FF31F1238A78A010FF0CF8C4284A6E816
May 31 05:20:33 wlceventd: wlceventd_proc_event(508): eth6: Disassoc B0:73:5D:BA:9B:2C, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 05:20:33 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 06:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 06:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 06:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 06:01:19 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake failed (RSN) after 4 tries
May 31 06:01:22 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:374:92:87:09, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 06:01:22 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 31 06:01:22 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:374:92:87:09, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 06:01:22 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 31 06:01:22 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:374:92:87:09, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 06:01:22 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 30 22:01:23 kernel: wl1: random key value: E9BCF1C4284D4E74315F008F15D038952CB562E1EC7D084C32ABA8B7C037EEBB
May 31 06:01:23 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:374:92:87:09, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 06:01:23 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 31 06:31:40 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 06:31:40 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 06:31:40 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 06:31:40 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 06:31:40 acsd: eth5 Performing CSA on chspec 0x1004
May 31 07:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 07:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 07:01:17 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 07:05:06 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 07:05:06 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 07:05:06 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 07:05:06 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 07:05:06 acsd: eth5 Performing CSA on chspec 0x1009
May 31 08:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 08:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 08:01:17 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 08:01:57 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 08:01:57 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 08:01:57 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 08:01:57 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 00:01:58 kernel: wl1: random key value: 2E65F2F37E044A77280E03D269E2FBCF98CFC8D1D1300147E435FC2E4EBDF5EF
May 31 08:01:58 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:01:58 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 08:06:44 wlceventd: wlceventd_proc_event(527): eth6: Auth B0:73:5D:BA:9B:2C, status: Successful (0), rssi:0
May 31 08:06:44 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: associated
May 31 08:06:44 wlceventd: wlceventd_proc_event(556): eth6: Assoc B0:73:5D:BA:9B:2C, status: Successful (0), rssi:-72
May 31 08:06:44 hostapd: eth6: STA b0:73:5d:ba:9b:2c RADIUS: starting accounting session 2DBEC454B5E6B69A
May 31 08:06:44 hostapd: eth6: STA b0:73:5d:ba:9b:2c WPA: pairwise key handshake completed (RSN)
May 31 08:06:44 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.218 b0:73:5d:ba:9b:2c
May 31 08:06:44 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.218 b0:73:5d:ba:9b:2c nova_5i-215fd1e7271cf27e
May 31 08:06:45 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.218 b0:73:5d:ba:9b:2c
May 31 08:06:45 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.218 b0:73:5d:ba:9b:2c nova_5i-215fd1e7271cf27e
May 31 08:09:52 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 08:09:52 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 08:09:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-85
May 31 08:09:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-85
May 31 00:09:53 kernel: wl1: random key value: D6F0D08FFADC9EA26CFD03974827A572A3CD2B57B052035A8598199AFCD2E82B
May 31 08:09:53 wlceventd: wlceventd_proc_event(508): eth6: Disassoc B0:73:5D:BA:9B:2C, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:09:53 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 08:16:29 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:374:92:87:09, status: Successful (0), rssi:0
May 31 08:16:29 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: associated
May 31 08:16:29 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:37:D4:92:87:09, status: Successful (0), rssi:-60
May 31 08:16:29 hostapd: eth6: STA a2:37:d4:92:87:09 RADIUS: starting accounting session 61F49E26B478FD92
May 31 08:16:29 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: pairwise key handshake completed (RSN)
May 31 08:16:29 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 08:16:29 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 08:35:25 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
May 31 08:35:25 acsd: eth5: selected_chspec is 0x1008 (8)
May 31 08:35:25 acsd: eth5: Adjusted channel spec: 0x1008 (8)
May 31 08:35:25 acsd: eth5: selected channel spec: 0x1008 (8)
May 31 08:35:25 acsd: eth5 Performing CSA on chspec 0x1008
May 31 00:47:44 kernel: wl1: random key value: 36D7C224044AB0BF31FB0254AACEE125681A55EE478705E6AA1A171D4138BFA0
May 31 08:47:44 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:47:44 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:47:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 08:47:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 08:55:16 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 08:55:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 08:55:16 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-73
May 31 08:55:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 5EC888F880E01BA5
May 31 08:55:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 08:55:17 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 08:55:17 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 09:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 09:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 09:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 09:08:52 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 09:08:52 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 09:08:52 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 09:08:52 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 09:08:52 acsd: eth5 Performing CSA on chspec 0x1009
May 31 09:47:20 wlceventd: wlceventd_proc_event(527): eth6: Auth AC:BD:70:7C:65:BA, status: Successful (0), rssi:0
May 31 09:47:20 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: associated
May 31 09:47:20 wlceventd: wlceventd_proc_event(556): eth6: Assoc AC:BD:70:7C:65:BA, status: Successful (0), rssi:-82
May 31 09:47:20 hostapd: eth6: STA ac:bd:70:7c:65:ba RADIUS: starting accounting session 5C3C6E9522D7D8FD
May 31 09:47:20 hostapd: eth6: STA ac:bd:70:7c:65:ba WPA: pairwise key handshake completed (RSN)
May 31 09:47:20 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.73 ac:bd:70:7c:65:ba
May 31 09:47:20 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.73 ac:bd:70:7c:65:ba nova_5i-ef103e5a92fa8680
May 31 10:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 10:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 10:01:16 hostapd: eth6: STA ac:bd:70:7c:65:ba WPA: group key handshake completed (RSN)
May 31 10:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 10:10:46 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 10:10:46 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 10:10:46 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 10:10:46 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 10:10:46 acsd: eth5 Performing CSA on chspec 0x1004
May 31 10:10:51 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:10:51 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 10:10:51 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:10:51 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 02:10:52 kernel: wl1: random key value: DF130EDDEBF5BF0E371101C93AE0B284720601E66602021F41E7A7B1C1698DD8
May 31 10:10:52 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 10:10:52 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:10:52 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: disassociated
May 31 10:10:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind AC:BD:70:7C:65:BA, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 10:10:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind AC:BD:70:7C:65:BA, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 10:10:52 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: disassociated
May 31 02:10:53 kernel: wl1: random key value: 02E93885295741A163D601D61231292EA0726EF139340C6AF17F82D9C055AF37
May 31 10:10:53 wlceventd: wlceventd_proc_event(508): eth6: Disassoc AC:BD:70:7C:65:BA, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 10:10:53 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: disassociated
May 31 10:44:12 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 10:44:12 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 10:44:12 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 10:44:12 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 10:44:12 acsd: eth5 Performing CSA on chspec 0x1009
May 31 11:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 11:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 11:17:39 acsd: acs_set_chspec: 0x1005 (5) for reason APCS_CSTIMER
May 31 11:17:39 acsd: eth5: selected_chspec is 0x1005 (5)
May 31 11:17:39 acsd: eth5: Adjusted channel spec: 0x1005 (5)
May 31 11:17:39 acsd: eth5: selected channel spec: 0x1005 (5)
May 31 11:17:39 acsd: eth5 Performing CSA on chspec 0x1005
May 31 11:51:05 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 11:51:05 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 11:51:05 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 11:51:05 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 11:51:05 acsd: eth5 Performing CSA on chspec 0x1009
May 31 11:53:02 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:27:D2:FF:17:EF, status: Successful (0), rssi:0
May 31 11:53:02 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
May 31 11:53:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:27:D2:FF:17:EF, status: Successful (0), rssi:-80
May 31 11:53:02 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session 818D26FA2AA5BA2D
May 31 11:53:02 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
May 31 11:53:02 dnsmasq-dhcp[971]: DHCPDISCOVER(br0) 16:27:d2:ff:17:ef
May 31 11:53:02 dnsmasq-dhcp[971]: DHCPOFFER(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 11:53:03 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 11:53:03 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 12:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 12:01:16 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 12:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 12:24:32 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 12:24:32 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 12:24:32 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 12:24:32 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 12:24:32 acsd: eth5 Performing CSA on chspec 0x1004
May 31 12:27:40 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 12:27:40 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 12:27:40 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-74
May 31 12:27:40 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session AD6A04FD83C1F979
May 31 12:27:40 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 12:27:40 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 12:27:40 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 12:57:59 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 12:57:59 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 12:57:59 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 12:57:59 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 12:57:59 acsd: eth5 Performing CSA on chspec 0x1009
May 31 13:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 13:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 13:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 13:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 05:11:05 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 05:11:05 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:05 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:07 kernel: br0: port 1(eth4) entered learning state
May 31 05:11:09 kernel: br0: topology change detected, propagating
May 31 05:11:09 kernel: br0: port 1(eth4) entered forwarding state
May 31 05:11:13 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 05:11:13 kernel: br0: port 1(eth4) entered disabled state
May 31 05:11:16 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 05:11:16 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:16 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:18 kernel: br0: port 1(eth4) entered learning state
May 31 05:11:20 kernel: br0: topology change detected, propagating
May 31 05:11:20 kernel: br0: port 1(eth4) entered forwarding state
May 31 13:11:21 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.253 04:d4:c4:57:73:88
May 31 13:11:21 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.253 04:d4:c4:57:73:88 DESKTOP-6KJNDUQ
May 31 05:50:20 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 05:50:20 kernel: br0: port 1(eth4) entered disabled state
May 31 05:50:22 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 10 mbps full duplex
May 31 05:50:22 kernel: br0: port 1(eth4) entered listening state
May 31 05:50:22 kernel: br0: port 1(eth4) entered listening state
May 31 05:50:24 kernel: br0: port 1(eth4) entered learning state
May 31 05:50:26 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 05:50:26 kernel: br0: port 1(eth4) entered disabled state
May 31 13:52:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 13:52:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 16:27:D2:FF:17:EF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 13:52:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 13:52:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 16:27:D2:FF:17:EF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 05:52:45 kernel: wl1: random key value: CF2751899EB4DC0B0DF800640D4D319D9E7C74F7E1A30A07BE2F5EF0C65C2328
May 31 13:52:45 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 13:52:45 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 13:56:05 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 13:56:05 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 13:56:05 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 13:56:05 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 05:56:06 kernel: wl1: random key value: 593A3B28D224691D3B1E030315CDC1F7EE30EE3702DB0B6681FB459492093CD8
May 31 13:56:06 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 13:56:06 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 13:59:52 acsd: acs_set_chspec: 0x1002 (2) for reason APCS_CSTIMER
May 31 13:59:52 acsd: eth5: selected_chspec is 0x1002 (2)
May 31 13:59:52 acsd: eth5: Adjusted channel spec: 0x1002 (2)
May 31 13:59:52 acsd: eth5: selected channel spec: 0x1002 (2)
May 31 13:59:52 acsd: eth5 Performing CSA on chspec 0x1002
May 31 14:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 14:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 14:08:23 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 14:08:23 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 14:08:23 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-56
May 31 14:08:23 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 32622AC611A14EB3
May 31 14:08:23 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 14:08:23 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 14:08:23 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 14:33:18 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 14:33:18 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 14:33:18 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 14:33:18 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 14:33:18 acsd: eth5 Performing CSA on chspec 0x1009
May 31 15:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 15:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 15:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 15:19:42 miniupnpd[1756]: remove port mapping 36494 UDP because it has expired
May 31 15:56:14 miniupnpd[1756]: remove port mapping 32647 UDP because it has expired
May 31 16:01:16 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 16:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 16:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 16:32:05 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
May 31 16:32:05 acsd: eth5: selected_chspec is 0x1008 (8)
May 31 16:32:05 acsd: eth5: Adjusted channel spec: 0x1008 (8)
May 31 16:32:05 acsd: eth5: selected channel spec: 0x1008 (8)
May 31 16:32:05 acsd: eth5 Performing CSA on chspec 0x1008
May 31 16:54:27 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 16:54:27 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 16:54:27 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 16:54:27 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 08:54:28 kernel: wl1: random key value: 1D2BF8F2EB5D87D07CD400776B55223F83E2F50F22160436AE8C2C4A58D9894B
May 31 16:54:28 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 16:54:28 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 17:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 17:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 17:05:32 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 17:05:32 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 17:05:32 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 17:05:32 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 17:05:32 acsd: eth5 Performing CSA on chspec 0x1004
May 31 17:06:39 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 17:06:39 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 17:18:47 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 17:18:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 17:18:47 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-43
May 31 17:18:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session FD76D2A44B24834C
May 31 17:18:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 17:18:47 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 17:18:47 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 17:38:58 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 17:38:58 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 17:38:58 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 17:38:58 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 17:38:58 acsd: eth5 Performing CSA on chspec 0x1009
May 31 09:58:21 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 10 mbps full duplex
May 31 09:58:21 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:21 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:22 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 09:58:22 kernel: br0: port 1(eth4) entered disabled state
May 31 09:58:28 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 09:58:28 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:28 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:30 kernel: br0: port 1(eth4) entered learning state
May 31 09:58:32 kernel: br0: topology change detected, propagating
May 31 09:58:32 kernel: br0: port 1(eth4) entered forwarding state
May 31 09:58:35 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 09:58:35 kernel: br0: port 1(eth4) entered disabled state
May 31 09:58:38 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 09:58:38 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:38 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:40 kernel: br0: port 1(eth4) entered learning state
May 31 09:58:42 kernel: br0: topology change detected, propagating
May 31 09:58:42 kernel: br0: port 1(eth4) entered forwarding state
May 31 17:58:43 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.253 04:d4:c4:57:73:88
May 31 17:58:43 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.253 04:d4:c4:57:73:88 DESKTOP-6KJNDUQ
May 31 18:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 18:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 18:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 18:06:44 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 18:06:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-80
May 31 18:06:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-80
May 31 18:06:44 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:06:45 kernel: wl1: random key value: 7B657B82217A00323935030AD9D7B0DDAA4EDB2ECF6B00903012584CCC5C1AEA
May 31 18:06:45 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 18:06:45 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 18:10:03 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:27:D2:FF:17:EF, status: Successful (0), rssi:0
May 31 18:10:03 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
May 31 18:10:03 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:27:D2:FF:17:EF, status: Successful (0), rssi:-52
May 31 18:10:03 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session 61BECFF17C691A93
May 31 18:10:03 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
May 31 18:10:03 dnsmasq-dhcp[971]: DHCPDISCOVER(br0) 16:27:d2:ff:17:ef
May 31 18:10:03 dnsmasq-dhcp[971]: DHCPOFFER(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 18:10:04 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 18:10:04 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 19:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 19:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 19:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 19:09:18 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 19:09:18 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 19:09:18 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 19:09:18 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 19:09:18 acsd: eth5 Performing CSA on chspec 0x1004
May 31 19:16:21 miniupnpd[1756]: recv (state0): Connection reset by peer
May 31 11:17:23 kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
May 31 19:33:32 miniupnpd[1756]: recv (state0): Connection reset by peer
May 31 19:42:45 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 19:42:45 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 19:42:45 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 19:42:45 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 19:42:45 acsd: eth5 Performing CSA on chspec 0x1009
May 31 20:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 20:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 20:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 20:16:30 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 20:16:30 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 20:36:47 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 20:36:47 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-74
May 31 20:36:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 20:36:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session D206B9B93EF864FE
May 31 20:36:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 20:36:47 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 20:36:47 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 21:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 21:01:16 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 21:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 13:10:25 kernel: wl1: random key value: 46F9705D59106A6115D00223F926110436B4A178340E037CD4B92944E03BDFDC
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 21:10:25 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 21:10:25 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 21:10:25 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 21:10:25 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-52
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 8A61388CDFF4BAEE
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 21:10:25 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:10:25 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:22:00 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:22:00 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 13:23:20 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 13:23:20 kernel: br0: port 1(eth4) entered disabled state
May 31 13:23:22 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 10 mbps full duplex
May 31 13:23:22 kernel: br0: port 1(eth4) entered listening state
May 31 13:23:22 kernel: br0: port 1(eth4) entered listening state
May 31 13:23:24 kernel: br0: port 1(eth4) entered learning state
May 31 13:23:26 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 13:23:26 kernel: br0: topology change detected, propagating
May 31 13:23:26 kernel: br0: port 1(eth4) entered forwarding state
May 31 13:23:26 kernel: br0: port 1(eth4) entered disabled state
May 31 22:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 22:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 22:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 22:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 22:09:57 acsd: acs_set_chspec: 0x1003 (3) for reason APCS_CSTIMER
May 31 22:09:57 acsd: eth5: selected_chspec is 0x1003 (3)
May 31 22:09:57 acsd: eth5: Adjusted channel spec: 0x1003 (3)
May 31 22:09:57 acsd: eth5: selected channel spec: 0x1003 (3)
May 31 22:09:57 acsd: eth5 Performing CSA on chspec 0x1003
May 31 22:39:57 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 22:39:57 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 22:39:57 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 22:39:57 acsd: eth5 Performing CSA on chspec 0x1009
May 31 22:55:01 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
May 31 22:55:01 acsd: eth5: selected_chspec is 0x1008 (8)
May 31 22:55:01 acsd: eth5: Adjusted channel spec: 0x1008 (8)
May 31 22:55:01 acsd: eth5: selected channel spec: 0x1008 (8)
May 31 22:55:01 acsd: eth5 Performing CSA on chspec 0x1008
May 31 23:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 23:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 23:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 23:01:16 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 23:01:31 disk_monitor: Got SIGALRM...
May 31 23:28:31 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 23:28:31 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 23:28:31 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 23:28:31 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 23:28:31 acsd: eth5 Performing CSA on chspec 0x1009
May 31 15:52:06 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 15:52:06 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:06 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:08 kernel: br0: port 1(eth4) entered learning state
May 31 15:52:10 kernel: br0: topology change detected, propagating
May 31 15:52:10 kernel: br0: port 1(eth4) entered forwarding state
May 31 15:52:14 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 15:52:14 kernel: br0: port 1(eth4) entered disabled state
May 31 15:52:17 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 15:52:17 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:17 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:19 kernel: br0: port 1(eth4) entered learning state
May 31 15:52:21 kernel: br0: topology change detected, propagating
May 31 15:52:21 kernel: br0: port 1(eth4) entered forwarding state
May 31 23:52:28 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.253 04:d4:c4:57:73:88
May 31 23:52:28 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.253 04:d4:c4:57:73:88 DESKTOP-6KJNDUQ
Jun  1 00:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
Jun  1 00:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
Jun  1 00:01:16 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
Jun  1 00:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
Jun  1 00:01:58 acsd: acs_set_chspec: 0x1003 (3) for reason APCS_CSTIMER
Jun  1 00:01:58 acsd: eth5: selected_chspec is 0x1003 (3)
Jun  1 00:01:58 acsd: eth5: Adjusted channel spec: 0x1003 (3)
Jun  1 00:01:58 acsd: eth5: selected channel spec: 0x1003 (3)
Jun  1 00:01:58 acsd: eth5 Performing CSA on chspec 0x1003
Jun  1 00:35:24 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
Jun  1 00:35:24 acsd: eth5: selected_chspec is 0x1009 (9)
Jun  1 00:35:24 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Jun  1 00:35:24 acsd: eth5: selected channel spec: 0x1009 (9)
Jun  1 00:35:24 acsd: eth5 Performing CSA on chspec 0x1009
Jun  1 01:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
Jun  1 01:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
Jun  1 01:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
Jun  1 01:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 17:04:11 kernel: wl1: random key value: F3C80C05D8E6536D1D7E035F6421EC134E3906FDE06802674276ED9896B4A572
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:27:D2:FF:17:EF, status: Successful (0), rssi:0
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:27:D2:FF:17:EF, status: Successful (0), rssi:-48
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session 4DBD02240D8DC424
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
Jun  1 01:04:12 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
Jun  1 01:04:12 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
Jun  1 01:08:51 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
Jun  1 01:08:51 acsd: eth5: selected_chspec is 0x1008 (8)
Jun  1 01:08:51 acsd: eth5: Adjusted channel spec: 0x1008 (8)
Jun  1 01:08:51 acsd: eth5: selected channel spec: 0x1008 (8)
Jun  1 01:08:51 acsd: eth5 Performing CSA on chspec 0x1008
May 31 17:24:05 kernel: httpd (987): drop_caches: 1


631

主题

6211

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16942

RT-AC88URT-AX68U

发表于 2022-6-2 10:27:20 | 显示全部楼层
包租公 发表于 2022-6-1 01:33
Jan  1 00:00:02 kernel: ubi2: attaching mtd10
Jan  1 00:00:02 kernel: ubi2: scanning is finished
Jan ...

从你的日志看,执行ACSD的都是2.4G,5G是被你固定频道了吗?

如果你的5G没固定,又不执行ACSD,那5G确实有问题了。

尝试一下这个测试版固件
链接: https://pan.baidu.com/s/1F7mR63kBd0UByOQaZFl-Bg 提取码: fk2b

升级后记得恢复出厂设置,然后重新手动设定。

0

主题

6

回帖

22

积分

新手上路

Rank: 1

积分
22
发表于 2022-6-5 23:06:02 | 显示全部楼层
Master 发表于 2022-6-2 10:27
从你的日志看,执行ACSD的都是2.4G,5G是被你固定频道了吗?

如果你的5G没固定,又不执行ACSD,那5G确实 ...

May  5 05:05:08 kernel: klogd started: BusyBox v1.24.1 (2022-03-21 14:31:41 CST)
May  5 05:05:08 kernel:   bcm963xx-pcie: [1] DT node available: /pcie@80050000
May  5 05:05:08 kernel:   bcm963xx-pcie: found port [1] GEN2 Core Rev [3.04] with 1 Lanes^M
May  5 05:05:08 kernel: getrcal for res select 5, int 656, ext 624, ratio 121 ratio1 156, rcal 9
May  5 05:05:08 kernel:   bcm963xx-pcie: Core [1] setting resistor calibration value to 0x9
May  5 05:05:08 kernel:   bcm963xx-pcie: core [1] Link UP - [1] lanes, [GEN2] speed^M
May  5 05:05:08 kernel:   bcm963xx-pcie: Core [1] Enabled PCIE/UBUS Error Interrupts^M
May  5 05:05:08 kernel:   bcm963xx-pcie: Core [1] UBUS Intr [UBUS_LINKUP]^M
May  5 05:05:08 kernel:   bcm963xx-pcie: [2] DT node available: /pcie@80060000
May  5 05:05:08 kernel:   bcm963xx-pcie: found port [2] GEN2 Core Rev [3.04] with 1 Lanes^M
May  5 05:05:08 kernel: getrcal for res select 5, int 656, ext 624, ratio 121 ratio1 156, rcal 9
May  5 05:05:08 kernel:   bcm963xx-pcie: Core [2] setting resistor calibration value to 0x9
May  5 05:05:08 kernel:   bcm963xx-pcie: core [2] link is DOWN^M
May  5 05:05:08 kernel:   bcm963xx-pcie: core [2] powered down^M
May  5 05:05:08 kernel: ^[[1m^[[34mWifi Forwarding Driver is initialized!^[[0m
May  5 05:05:08 kernel: broadcomThermalDrv brcm-therm: init (CPU count 2 2 2 2)
May  5 05:05:08 kernel: brcm_otp_init entry
May  5 05:05:08 kernel: ubi2: attaching mtd9
May  5 05:05:08 kernel: ubi2: scanning is finished
May  5 05:05:08 kernel: ubi2: attached mtd9 (name "misc1", size 8 MiB)
May  5 05:05:08 kernel: ubi2: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
May  5 05:05:08 kernel: ubi2: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
May  5 05:05:08 kernel: ubi2: VID header offset: 2048 (aligned 2048), data offset: 4096
May  5 05:05:08 kernel: ubi2: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
May  5 05:05:08 kernel: ubi2: user volume: 1, internal volumes: 1, max. volumes count: 128
May  5 05:05:08 kernel: ubi2: max/mean erase counter: 29/11, WL threshold: 4096, image sequence number: 2099130947
May  5 05:05:08 kernel: ubi2: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
May  5 05:05:08 kernel: ubi2: background thread "ubi_bgt2d" started, PID 419
May  5 05:05:08 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" started, PID 434
May  5 05:05:08 kernel: UBIFS (ubi2:0): UBIFS: mounted UBI device 2, volume 0, name "nvram"
May  5 05:05:08 kernel: UBIFS (ubi2:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
May  5 05:05:08 kernel: UBIFS (ubi2:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1396736 bytes (1 MiB, 11 LEBs)
May  5 05:05:08 kernel: UBIFS (ubi2:0): reserved for root: 0 bytes (0 KiB)
May  5 05:05:08 kernel: UBIFS (ubi2:0): media format: w4/r0 (latest is w4/r0), UUID EEC2680F-D67F-4D6C-BF0F-1260390EA30C, small LPT model
May  5 05:05:08 kernel: UBIFS (ubi2:0): un-mount UBI device 2
May  5 05:05:08 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" stops
May  5 05:05:08 kernel: ubi2: detaching mtd9
May  5 05:05:08 kernel: ubi2: mtd9 is detached
May  5 05:05:08 kernel: random: init urandom read with 8 bits of entropy available
May  5 05:05:08 kernel: Loading HND Module
May  5 05:05:08 kernel: igs_module_init:867:         IGS 29 create network socket successful
May  5 05:05:08 kernel: dpsta_init: 17.10.157.2809 (r801046) 3a6a0ab Sep 15 2021 18:25:02 msglevel 0x1
May  5 05:05:08 kernel: osl_skb_audit: PASS
May  5 05:05:08 kernel: wl_module_init: passivemode set to 0x1
May  5 05:05:08 kernel: wl_module_init: txworkq set to 0x0
May  5 05:05:08 kernel: ^[[0;32mwl_pktfwd_sys_init:  ^[[1m^[[34mWL_PKTFWD[1.1.0]^[[0m Success^[[0m
May  5 05:05:08 kernel: BME Service Initialization
May  5 05:05:08 kernel: BME: M2M Core id 0x844 rev 129
May  5 05:05:08 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
May  5 05:05:08 kernel: M2M: M2M Core id 0x844 rev 129
May  5 05:05:08 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc015770000,ffffffc013620000>,ffffffc013696000 depth 256
May  5 05:05:08 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc015114000,ffffffc015052000>,ffffffc013691000 depth 256
May  5 05:05:08 kernel: M2M: DMA 0 IntRcvLazy 01000000
May  5 05:05:08 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
May  5 05:05:08 kernel: M2M: DMA 1 IntRcvLazy 01000000
May  5 05:05:08 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
May  5 05:05:08 kernel: wl0: phy_radio_attach: RF Band Cap: 2G:1 5G:1
May  5 05:05:08 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
May  5 05:05:08 kernel: wl0 taf_do_enable: TAF is enabled
May  5 05:05:08 kernel: CSIMON module registered
May  5 05:05:08 kernel: wfd0-thrd WL 0 FLowControl total<28597> lo<7149> hi<2859> favor prio<4>
May  5 05:05:08 kernel: ^[[0;31mwfd_bind: wfd0-thrd initialized pktlists: radio 0 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x440 [wl]
May  5 05:05:08 kernel: ^[[0m
May  5 05:05:08 kernel: Creating CPU ring for queue number 0 with 1024 packets descriptor=0xffffffbffc5d32c0
May  5 05:05:08 kernel:  Creating CPU ring for queue number 1 with 1024 packets descriptor=0xffffffbffc5d3300
May  5 05:05:08 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 0 wl_radio_idx 0 Type skb:sll configured WFD thread wfd0-thrd minQId/maxQId (8/9), status (0) qmask 0x3^[[0m
May  5 05:05:08 kernel: Instantiating WFD 0 thread
May  5 05:05:08 kernel: ^[[0;32mwl_wfd_bind: wl0 wfd_idx 0 success^[[0m
May  5 05:05:08 kernel: wfd_registerdevice Successfully registered dev eth5 ifidx 0 wfd_idx 0
May  5 05:05:08 kernel: eth5: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2809 (r801046)
May  5 05:05:08 kernel: BME Service Initialization
May  5 05:05:08 kernel: BME: M2M Core id 0x844 rev 129
May  5 05:05:08 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
May  5 05:05:08 kernel: M2M: M2M Core id 0x844 rev 129
May  5 05:05:08 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc0157b6000,ffffffc01504c000>,ffffffc013631000 depth 256
May  5 05:05:08 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc013422000,ffffffc012fa4000>,ffffffc013630000 depth 256
May  5 05:05:08 kernel: M2M: DMA 0 IntRcvLazy 01000000
May  5 05:05:08 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
May  5 05:05:08 kernel: M2M: DMA 1 IntRcvLazy 01000000
May  5 05:05:08 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
May  5 05:05:08 kernel: wl1: phy_radio_attach: RF Band Cap: 2G:1 5G:1
May  5 05:05:08 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
May  5 05:05:08 kernel: wl1 taf_do_enable: TAF is enabled
May  5 05:05:08 kernel: CSIMON module registered
May  5 05:05:08 kernel: wfd1-thrd WL 1 FLowControl total<28597> lo<7149> hi<2859> favor prio<4>
May  5 05:05:08 kernel: ^[[0;31mwfd_bind: wfd1-thrd initialized pktlists: radio 1 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x440 [wl]
May  5 05:05:08 kernel: ^[[0m
May  5 05:05:08 kernel: Creating CPU ring for queue number 2 with 1024 packets descriptor=0xffffffbffc5d3340
May  5 05:05:08 kernel:  Creating CPU ring for queue number 3 with 1024 packets descriptor=0xffffffbffc5d3380
May  5 05:05:08 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 1 wl_radio_idx 1 Type skb:sll configured WFD thread wfd1-thrd minQId/maxQId (10/11), status (0) qmask 0xc^[[0m
May  5 05:05:08 kernel: Instantiating WFD 1 thread
May  5 05:05:08 kernel: ^[[0;32mwl_wfd_bind: wl1 wfd_idx 1 success^[[0m
May  5 05:05:08 kernel: wfd_registerdevice Successfully registered dev eth6 ifidx 0 wfd_idx 1
May  5 05:05:08 kernel: eth6: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2809 (r801046)
May  5 05:05:08 kernel: proc_dostring_crashlogsave:  crash log filename is /jffs/crashlog.log
May  5 05:05:08 kernel:  crashFileSet: Failed to get mtd !
May  5 05:05:08 kernel: ++++ Powering up USB blocks
May  5 05:05:08 kernel: hub 1-0:1.0: config failed, hub doesn't have any ports! (err -19)
May  5 05:05:08 kernel: ^[[0;33;41m[ERROR pktrunner] runnerUcast_inet6addr_event,148: Could not rdpa_system_ipv6_host_address_table_find ret=-5^[[0m
May  5 05:05:08 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:09 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:09 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:09 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:09 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:09 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:09 wlceventd: main(961): wlceventd Start...
May  5 05:05:10 RT-AX68U: start httpd:80
May  5 05:05:10 httpd: Save SSL certificate...80
May  5 05:05:10 httpd: Generating SSL certificate...80
May  5 05:05:10 avahi-daemon[1142]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
May  5 05:05:10 disk monitor: be idle
May  5 05:05:10 hour monitor: daemon is starting
May  5 05:05:10 hour monitor: daemon terminates
May  5 05:05:10 jffs2: valid logs(1)
May  5 05:05:10 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 05:05:10 ERP: The model isn't under support list!
May  5 05:05:10 miniupnpd[1179]: HTTP listening on port 40452
May  5 05:05:10 miniupnpd[1179]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 05:05:10 lldpd[1195]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
May  5 05:05:11 avahi-daemon[1142]: Alias name "RT-AX68U" successfully established.
May  5 05:05:12 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:12 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:12 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:12 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:13 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:13 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:13 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:13 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:13 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:13 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:13 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:13 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:13 kernel: sched: RT throttling activated
May  5 05:05:13 acsd: eth5: Selecting 2g band ACS policy
May  5 05:05:13 wlceventd: main(961): wlceventd Start...
May  5 05:05:13 kernel: <=== Deactivate Deep Green Mode
May  5 05:05:13 kernel: bcmswlpbk0 (Ext switch port: 8) (Logical Port: 8) Virtual link UP
May  5 05:05:13 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May  5 05:05:14 WAN Connection: WAN(0) link down.
May  5 05:05:15 kernel: SCSI subsystem initialized
May  5 05:05:15 modprobe: module scsi_wait_scan not found in modules.dep
May  5 05:05:15 modprobe: module mbcache not found in modules.dep
May  5 05:05:15 modprobe: module jbd not found in modules.dep
May  5 05:05:15 modprobe: module ext3 not found in modules.dep
May  5 05:05:15 Mastiff: init
May  5 05:05:15 modprobe: module ext4 not found in modules.dep
May  5 05:05:15 modprobe: module ext2 not found in modules.dep
May  5 05:05:15 kernel: tfat: loading out-of-tree module taints kernel.
May  5 05:05:15 modprobe: module btusbdrv not found in modules.dep
May  5 05:05:15 init: fwver: 9.0.0.4_386_48307-gc092123 (snCICIA001326 /ha:24:4B:FE:6FC:28 )
May  5 05:05:15 ahs: [read_json]Update ahs JSON file.
May  5 05:05:17 acsd: eth5: selected channel spec: 0x1006 (6)
May  5 05:05:17 acsd: eth5: Adjusted channel spec: 0x1006 (6)
May  5 05:05:17 acsd: eth5: selected channel spec: 0x1006 (6)
May  5 05:05:17 acsd: acs_set_chspec: 0x1006 (6) for reason APCS_INIT
May  5 05:05:17 acsd: eth6: Selecting 5g band ACS policy
May  5 05:05:19 acsd: eth6: selected channel spec: 0xe09b (149/80)
May  5 05:05:19 acsd: eth6: Adjusted channel spec: 0xe09b (149/80)
May  5 05:05:19 acsd: eth6: selected channel spec: 0xe09b (149/80)
May  5 05:05:19 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_INIT
May  5 05:05:19 kernel: eth0 (Int switch port: 3) (Logical Port: 3) (phyId: c) Link Up at 1000 mbps full duplex
May  5 05:05:20 httpd: Succeed to init SSL certificate...80
May  5 05:05:20 BONDING: option disabled
May  5 05:05:23 wan: finish adding multi routes
May  5 05:05:24 miniupnpd[1179]: shutting down MiniUPnPd
May  5 05:05:24 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 05:05:24 miniupnpd[1501]: HTTP listening on port 58054
May  5 05:05:24 miniupnpd[1501]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 05:05:24 dhcp client: bound 192.168.1.5/255.255.255.0 via 192.168.1.1 for 259200 seconds.
May  5 05:05:25 roamast: ROAMING Start...
May  5 05:05:28 WAN Connection: WAN was restored.
May  5 05:05:29 ntp: start NTP update
Jun  5 14:54:37 rc_service: ntp 1475:notify_rc restart_diskmon
Jun  5 14:54:37 disk_monitor: Finish
Jun  5 14:54:37 disk monitor: be idle
Jun  5 14:55:07 crond[1119]: time disparity of 2149069 minutes detected
Jun  5 14:55:12 rc_service: httpd 1120:notify_rc start_autodet
Jun  5 14:55:14 rc_service: httpd 1120:notify_rc start_webs_update
Jun  5 14:55:33 kernel: CPU: 1 PID: 1361 Comm: obd Tainted: P           O    4.1.52 #2
Jun  5 14:55:33 kernel: Hardware name: Broadcom-v8A (DT)
Jun  5 14:55:33 kernel: task: ffffffc01eb521c0 ti: ffffffc010c90000 task.ti: ffffffc010c90000
Jun  5 14:55:33 kernel: PC is at 0xcdce4
Jun  5 14:55:33 kernel: LR is at 0x19f8f7
Jun  5 14:55:33 kernel: pc : [<00000000000cdce4>] lr : [<000000000019f8f7>] pstate: a00d0010
Jun  5 14:55:33 kernel: sp : 00000000ffb900b8
Jun  5 14:55:33 kernel: x12: 00000000ffb941f2
Jun  5 14:55:33 kernel: x11: 0000000000000000 x10: 00000000ffba2025
Jun  5 14:55:33 kernel: x9 : 000000000000000b x8 : 0000000000000000
Jun  5 14:55:33 kernel: x7 : 0000000000000009 x6 : 00000000fffef656
Jun  5 14:55:33 kernel: x5 : 0000000000000000 x4 : 00000000ffb914cc
Jun  5 14:55:33 kernel: x3 : 0000000000000050 x2 : 0000000000000003
Jun  5 14:55:33 kernel: x1 : 00000000ffffff08 x0 : 00000000ffffff08
Jun  5 14:56:18 WATCHDOG: [FAUPGRADE][auto_firmware_check7642)]periodic_check AM 4:29
Jun  5 14:56:18 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
Jun  5 14:56:20 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
Jun  5 14:56:20 WATCHDOG: [FAUPGRADE][auto_firmware_check7702)]user in use
Jun  5 14:56:29 kernel: eth0 (Int switch port: 3) (Logical Port: 3) (phyId: c) Link DOWN.
Jun  5 14:56:31 kernel: eth0 (Int switch port: 3) (Logical Port: 3) (phyId: c) Link Up at 1000 mbps full duplex
Jun  5 14:56:35 WAN Connection: WAN(0) link up.
Jun  5 14:56:35 rc_service: wanduck 1054:notify_rc restart_wan_if 0
Jun  5 14:56:40 wan: finish adding multi routes
Jun  5 14:56:40 miniupnpd[1501]: shutting down MiniUPnPd
Jun  5 14:56:40 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
Jun  5 14:56:40 miniupnpd[2438]: HTTP listening on port 37485
Jun  5 14:56:40 dhcp client: bound 192.168.1.5/255.255.255.0 via 192.168.1.1 for 259200 seconds.
Jun  5 14:56:40 miniupnpd[2438]: Listening for NAT-PMP/PCP traffic on port 5351
Jun  5 14:56:42 WAN Connection: WAN was restored.
Jun  5 14:56:50 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
Jun  5 14:56:50 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
Jun  5 14:56:50 WATCHDOG: [FAUPGRADE][auto_firmware_check7702)]user in use
Jun  5 14:57:17 rc_service: httpd 1120:notify_rc chpass;restart_time;restart_upnp;restart_usb_idle;restart_bhblock;restart_ftpsamba;
Jun  5 14:57:17 kernel: klogd started: BusyBox v1.24.1 (2022-03-21 14:31:41 CST)
Jun  5 14:57:18 miniupnpd[2438]: shutting down MiniUPnPd
Jun  5 14:57:18 hour monitor: daemon is starting
Jun  5 14:57:18 hour monitor: daemon terminates
Jun  5 14:57:18 FTP Server: daemon is stopped
Jun  5 14:57:18 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
Jun  5 14:57:18 miniupnpd[2671]: HTTP listening on port 54116
Jun  5 14:57:18 miniupnpd[2671]: Listening for NAT-PMP/PCP traffic on port 5351
Jun  5 14:57:18 Samba Server: smb daemon is stoped
Jun  5 14:57:18 rc_service: httpd 1120:notify_rc restart_firewall
Jun  5 14:57:19 lldpd[2729]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Jun  5 14:57:19 rc_service: httpd 1120:notify_rc chpass;restart_time;restart_wireless;restart_cfgsync
Jun  5 14:57:20 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
Jun  5 14:57:20 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
Jun  5 14:57:20 WATCHDOG: [FAUPGRADE][auto_firmware_check7702)]user in use
Jun  5 14:57:20 rc_service: watchdog 1125:notify_rc start_cfgsync
Jun  5 14:57:20 rc_service: waitting "chpass;restart_time;restart_wireless;restart_cfgsync" via httpd ...
Jun  5 22:57:21 kernel: klogd started: BusyBox v1.24.1 (2022-03-21 14:31:41 CST)
Jun  5 14:57:21 wlceventd: wlceventd_proc_event(527): eth5: Auth B2:60:73:A7:E1:41, status: Successful (0), rssi:0
Jun  5 22:57:21 hour monitor: daemon is starting
Jun  5 22:57:21 hour monitor: daemon terminates
Jun  5 22:57:21 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 22:57:21 kernel: CSIMON: M2M usr already registered ...
Jun  5 22:57:21 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 22:57:21 kernel: CSIMON: M2M usr already registered ...
Jun  5 22:57:21 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 22:57:21 kernel: CSIMON: M2M usr already registered ...
Jun  5 22:57:21 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 22:57:21 kernel: CSIMON: M2M usr already registered ...
Jun  5 22:57:22 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 22:57:22 kernel: CSIMON: M2M usr already registered ...
Jun  5 22:57:22 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 22:57:22 kernel: CSIMON: M2M usr already registered ...
Jun  5 22:57:22 acsd: eth5: Selecting 2g band ACS policy
Jun  5 22:57:22 wlceventd: main(961): wlceventd Start...
Jun  5 22:57:26 cfg_server:  event: wl_chanspec_changed_action
Jun  5 22:57:26 cfg_server: skip event due no re
Jun  5 22:57:26 acsd: eth5: selected channel spec: 0x100a (10)
Jun  5 22:57:26 acsd: eth5: Adjusted channel spec: 0x100a (10)
Jun  5 22:57:26 acsd: eth5: selected channel spec: 0x100a (10)
Jun  5 22:57:26 acsd: acs_set_chspec: 0x100a (10) for reason APCS_INIT
Jun  5 22:57:26 acsd: eth6: Selecting 5g band ACS policy
Jun  5 22:57:27 acsd: eth6: selected channel spec: 0xe09b (149/80)
Jun  5 22:57:27 acsd: eth6: Adjusted channel spec: 0xe09b (149/80)
Jun  5 22:57:27 acsd: eth6: selected channel spec: 0xe09b (149/80)
Jun  5 22:57:27 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_INIT
Jun  5 22:57:32 roamast: ROAMING Start...
Jun  5 22:57:35 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:374:92:87:09, status: Successful (0), rssi:0
Jun  5 22:57:36 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:374:92:87:09, status: Successful (0), rssi:-61
Jun  5 22:57:40 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:272:FF:17:EF, status: Successful (0), rssi:0
Jun  5 22:57:40 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:272:FF:17:EF, status: Successful (0), rssi:-55
Jun  5 22:57:46 wlceventd: wlceventd_proc_event(527): eth6: Auth DE:73:03:05:B8:A3, status: Successful (0), rssi:-56
Jun  5 22:57:46 wlceventd: wlceventd_proc_event(556): eth6: Assoc DE:73:03:05:B8:A3, status: Successful (0), rssi:-56
Jun  5 22:59:40 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 16:272:FF:17:EF, status: 0, reason: Disassociated due to inactivity (4), rssi:-57
Jun  5 22:59:40 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 16:272:FF:17:EF, status: 0, reason: Previous authentication no longer valid (2), rssi:-57
Jun  5 22:59:41 kernel: wl1: random key value: 1D198D5C53A584B7617D00CD585DCB2B96CC33C50F910D891866170242263AA5
Jun  5 22:59:41 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:272:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun  5 22:59:42 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind DE:73:03:05:B8:A3, status: 0, reason: Disassociated due to inactivity (4), rssi:-56
Jun  5 22:59:42 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind DE:73:03:05:B8:A3, status: 0, reason: Previous authentication no longer valid (2), rssi:-56
Jun  5 22:59:43 kernel: wl1: random key value: DB7D1112BC3B192433E2018DA3A6713DF349F718931809971E0E85DA38A26066
Jun  5 22:59:43 wlceventd: wlceventd_proc_event(508): eth6: Disassoc DE:73:03:05:B8:A3, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun  5 15:00:37 disk_monitor: Got SIGALRM...
Jun  5 23:04:58 rc_service: cfg_server 2893:notify_rc restart_wireless
Jun  5 23:04:58 kernel: wl1: random key value: F740AABC231A9F2E77A902835746FDC1B376D44D0DCD0EBF194EA2D1B798EAA1
Jun  5 23:04:58 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 23:04:58 kernel: CSIMON: M2M usr already registered ...
Jun  5 23:04:58 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 23:04:58 kernel: CSIMON: M2M usr already registered ...
Jun  5 23:04:58 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 23:04:58 kernel: CSIMON: M2M usr already registered ...
Jun  5 23:04:58 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 23:04:58 kernel: CSIMON: M2M usr already registered ...
Jun  5 23:04:59 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 23:04:59 kernel: CSIMON: M2M usr already registered ...
Jun  5 23:04:59 kernel: CSIMON:  CSIMON[1.1.0] Initialization
Jun  5 23:04:59 kernel: CSIMON: M2M usr already registered ...
Jun  5 23:04:59 acsd: eth5: Selecting 2g band ACS policy
Jun  5 23:04:59 wlceventd: main(961): wlceventd Start...
Jun  5 23:05:01 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
Jun  5 23:05:01 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-61
Jun  5 23:05:03 acsd: eth5: selected channel spec: 0x1009 (9)
Jun  5 23:05:03 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Jun  5 23:05:03 acsd: eth5: selected channel spec: 0x1009 (9)
Jun  5 23:05:03 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_INIT
Jun  5 23:05:07 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:272:FF:17:EF, status: Successful (0), rssi:0
Jun  5 23:05:07 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:272:FF:17:EF, status: Successful (0), rssi:-57
Jun  5 23:05:09 wlceventd: wlceventd_proc_event(527): eth6: Auth DE:73:03:05:B8:A3, status: Successful (0), rssi:0
Jun  5 23:05:09 wlceventd: wlceventd_proc_event(556): eth6: Assoc DE:73:03:05:B8:A3, status: Successful (0), rssi:-53
Jun  5 23:05:09 roamast: ROAMING Start...

0

主题

6

回帖

22

积分

新手上路

Rank: 1

积分
22
发表于 2022-6-5 23:09:57 | 显示全部楼层
Master 发表于 2022-6-2 10:27
从你的日志看,执行ACSD的都是2.4G,5G是被你固定频道了吗?

如果你的5G没固定,又不执行ACSD,那5G确实 ...

装完测试版固件,恢复出厂设置,问题依然存在,我发现频道设置自动,每次都是默认选149,还是隔三差五的断网,需要重启或切换频道才能恢复,有线正常

631

主题

6211

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16942

RT-AC88URT-AX68U

发表于 2022-6-6 09:40:36 | 显示全部楼层
包租公 发表于 2022-6-5 23:09
装完测试版固件,恢复出厂设置,问题依然存在,我发现频道设置自动,每次都是默认选149,还是隔三差五的 ...

判断你的5G是有问题的,等等官方固件更新吧。

1

主题

11

回帖

57

积分

注册会员

Rank: 2

积分
57
发表于 2022-9-25 12:40:14 | 显示全部楼层
去我帖子下载最新固件吧
等审核通过
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

快速回复 返回列表 搜索 官方QQ群
×

秒后自动关闭

小黑屋|手机版|Archiver|华硕网络产品技术交流平台 ( 苏ICP备16010857号-1 )苏公网安备 32050502000499号

GMT+8, 2024-6-8 22:14 , Processed in 0.056943 second(s), 29 queries .

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表