华硕网络产品技术交流平台

 找回密码
 立即注册

QQ登录

只需一步,快速开始

手机号码,快捷登录

查看: 13036|回复: 26

[求助] RT-AX68U频繁断流

[复制链接]

7

主题

36

回帖

287

积分

中级会员

Rank: 3Rank: 3

积分
287
发表于 2021-12-1 08:53:57 | 显示全部楼层 |阅读模式
求助大伙,家里的RT-AX68U每天断流两次,系统记录实在看不懂。想问一下这个跟设置有关么?拜谢。

Nov 30 19:42:24 Timemachine: daemon is stoped
Nov 30 19:42:24 miniupnpd[1844]: shutting down MiniUPnPd
Nov 30 19:42:24 avahi-daemon[2089]: Found user 'yangren13' (UID 0) and group 'root' (GID 0).
Nov 30 19:42:24 avahi-daemon[2089]: Successfully dropped root privileges.
Nov 30 19:42:24 avahi-daemon[2089]: avahi-daemon 0.7 starting up.
Nov 30 19:42:24 avahi-daemon[2089]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Nov 30 19:42:24 avahi-daemon[2089]: Loading service file /tmp/avahi/services/alexa.service.
Nov 30 19:42:24 avahi-daemon[2089]: Loading new alias name RT-AX68U.
Nov 30 19:42:24 avahi-daemon[2089]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
Nov 30 19:42:24 avahi-daemon[2089]: New relevant interface br0.IPv4 for mDNS.
Nov 30 19:42:24 avahi-daemon[2089]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
Nov 30 19:42:24 avahi-daemon[2089]: New relevant interface lo.IPv4 for mDNS.
Nov 30 19:42:24 avahi-daemon[2089]: Network interface enumeration completed.
Nov 30 19:42:24 avahi-daemon[2089]: Registering new address record for 192.168.50.1 on br0.IPv4.
Nov 30 19:42:24 avahi-daemon[2089]: Registering new address record for 127.0.1.1 on lo.IPv4.
Nov 30 19:42:24 avahi-daemon[2089]: Registering new address record for 127.0.0.1 on lo.IPv4.
Nov 30 19:42:24 Samba Server: daemon is started
Nov 30 19:42:24 avahi-daemon[2089]: Got SIGTERM, quitting.
Nov 30 19:42:24 avahi-daemon[2089]: Leaving mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
Nov 30 19:42:24 avahi-daemon[2089]: Leaving mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
Nov 30 19:42:24 avahi-daemon[2089]: avahi-daemon 0.7 exiting.
Dec  1 00:42:24 kernel: cfg80211: Calling CRDA to update world regulatory domain
Nov 30 19:42:24 mt-daapd[2110]: Starting signal handler
Nov 30 19:42:24 avahi-daemon[2117]: Found user 'yangren13' (UID 0) and group 'root' (GID 0).
Nov 30 19:42:24 avahi-daemon[2117]: Successfully dropped root privileges.
Nov 30 19:42:24 avahi-daemon[2117]: avahi-daemon 0.7 starting up.
Nov 30 19:42:24 avahi-daemon[2117]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Nov 30 19:42:24 avahi-daemon[2117]: Loading service file /tmp/avahi/services/alexa.service.
Nov 30 19:42:24 avahi-daemon[2117]: Loading service file /tmp/avahi/services/mt-daap.service.
Nov 30 19:42:24 avahi-daemon[2117]: Loading new alias name RT-AX68U.
Nov 30 19:42:24 iTunes Server: daemon is started
Nov 30 19:42:24 avahi-daemon[2117]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
Nov 30 19:42:24 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
Nov 30 19:42:24 avahi-daemon[2117]: New relevant interface br0.IPv4 for mDNS.
Nov 30 19:42:24 avahi-daemon[2117]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
Nov 30 19:42:24 avahi-daemon[2117]: New relevant interface lo.IPv4 for mDNS.
Nov 30 19:42:24 avahi-daemon[2117]: Network interface enumeration completed.
Nov 30 19:42:24 avahi-daemon[2117]: Registering new address record for 192.168.50.1 on br0.IPv4.
Nov 30 19:42:24 avahi-daemon[2117]: Registering new address record for 127.0.1.1 on lo.IPv4.
Nov 30 19:42:24 avahi-daemon[2117]: Registering new address record for 127.0.0.1 on lo.IPv4.
Nov 30 19:42:25 miniupnpd[2119]: HTTP listening on port 48319
Nov 30 19:42:25 miniupnpd[2119]: Listening for NAT-PMP/PCP traffic on port 5351
Nov 30 19:42:25 mt-daapd[2110]: Loading playlists
Nov 30 19:42:25 mt-daapd[2110]: Initializing database
Dec  1 00:42:25 kernel: SHN Release Version: 2.0.1 4b635f32
Nov 30 19:42:25 mt-daapd[2110]: Starting mp3 scan
Dec  1 00:42:25 kernel: UDB Core Version: 0.2.18
Dec  1 00:42:25 kernel: Init chrdev /dev/idpfw with major 191
Dec  1 00:42:25 kernel: IDPfw: flush fc
Dec  1 00:42:25 kernel: IDPfw: IDPfw is ready
Dec  1 00:42:25 kernel: sizeof forward pkt param = 280
Nov 30 19:42:25 BWDPI: fun bitmap = 50b
Nov 30 19:42:25 avahi-daemon[2117]: Server startup complete. Host name is RT-AX68U-6058.local. Local service cookie is 1346006746.
Nov 30 19:42:25 avahi-daemon[2117]: Alias name "RT-AX68U" successfully established.
Nov 30 19:42:26 avahi-daemon[2117]: Service "RT-AX68U-6058" (/tmp/avahi/services/mt-daap.service) successfully established.
Nov 30 19:42:26 avahi-daemon[2117]: Service "RT-AX68U-6058" (/tmp/avahi/services/alexa.service) successfully established.
Dec  1 00:42:28 kernel: cfg80211: Calling CRDA to update world regulatory domain
Nov 30 19:42:28 mt-daapd[2110]: Starting web server from /rom/etc/web on port 3689
Nov 30 19:42:28 mt-daapd[2110]: Scanned 0 songs in  4 seconds
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x41) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x2d) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x44) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x921) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x54) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x79) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x57) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x32) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x1e0) failed with error code -2.
Dec  1 00:42:28 kernel: tntfs error (device sda1, pid 2120): ntfs_lookup(): ntfs_iget(0x75) failed with error code -2.
Nov 30 19:42:29 dhcp client: bound 72.88.158.9/255.255.255.0 via 72.88.158.1 for 7200 seconds.
Dec  1 00:42:31 kernel: cfg80211: Calling CRDA to update world regulatory domain
Nov 30 19:42:34 wlceventd: wlceventd_proc_event(527): eth6: Auth 26:3A:CA:76:BA:92, status: Successful (0), rssi:0
Nov 30 19:42:34 wlceventd: wlceventd_proc_event(556): eth6: Assoc 26:3A:CA:76:BA:92, status: Successful (0), rssi:-53
Nov 30 19:42:34 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: associated
Nov 30 19:42:34 hostapd: eth6: STA 26:3a:ca:76:ba:92 RADIUS: starting accounting session 278FB69A40E4D340
Nov 30 19:42:34 hostapd: eth6: STA 26:3a:ca:76:ba:92 WPA: pairwise key handshake completed (RSN)
Dec  1 00:42:34 kernel: cfg80211: Calling CRDA to update world regulatory domain
Nov 30 19:42:34 dnsmasq-dhcp[789]: DHCPREQUEST(br0) 192.168.50.69 26:3a:ca:76:ba:92
Nov 30 19:42:34 dnsmasq-dhcp[789]: DHCPACK(br0) 192.168.50.69 26:3a:ca:76:ba:92
Nov 30 19:42:35 wlceventd: wlceventd_proc_event(527): eth6: Auth 14:7DAB:A4:53, status: Successful (0), rssi:0
Nov 30 19:42:35 hostapd: eth6: STA 14:7d:da:db:a4:53 IEEE 802.11: associated
Nov 30 19:42:35 wlceventd: wlceventd_proc_event(556): eth6: Assoc 14:7DAB:A4:53, status: Successful (0), rssi:-51
Nov 30 19:42:35 hostapd: eth6: STA 14:7d:da:db:a4:53 RADIUS: starting accounting session 972C725DA317768A
Nov 30 19:42:35 hostapd: eth6: STA 14:7d:da:db:a4:53 WPA: pairwise key handshake completed (RSN)
Nov 30 19:42:37 dnsmasq-dhcp[789]: DHCPREQUEST(br0) 192.168.50.219 14:7d:da:db:a4:53
Nov 30 19:42:37 dnsmasq-dhcp[789]: DHCPACK(br0) 192.168.50.219 14:7d:da:db:a4:53 cindyguan-mbp
Dec  1 00:42:37 kernel: cfg80211: Exceeded CRDA call max attempts. Not calling CRDA
Nov 30 19:43:03 crond[833]: time disparity of 1880377 minutes detected
Nov 30 19:43:04 wlceventd: wlceventd_proc_event(527): eth5: Auth A2:E2:AA:4DB:80, status: Successful (0), rssi:0
Nov 30 19:43:04 hostapd: eth5: STA a2:e2:aa:4d:db:80 IEEE 802.11: associated
Nov 30 19:43:04 wlceventd: wlceventd_proc_event(556): eth5: Assoc A2:E2:AA:4DB:80, status: Successful (0), rssi:-40
Nov 30 19:43:05 hostapd: eth5: STA a2:e2:aa:4d:db:80 RADIUS: starting accounting session 1AA40AFDABD87BB7
Nov 30 19:43:05 hostapd: eth5: STA a2:e2:aa:4d:db:80 WPA: pairwise key handshake completed (RSN)
Nov 30 19:43:05 dnsmasq-dhcp[789]: DHCPREQUEST(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Nov 30 19:43:05 dnsmasq-dhcp[789]: DHCPACK(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Nov 30 19:43:08 dnsmasq-dhcp[789]: DHCPREQUEST(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Nov 30 19:43:08 dnsmasq-dhcp[789]: DHCPACK(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Nov 30 19:43:28 wlceventd: wlceventd_proc_event(527): eth5: Auth 5A:7B:9B:39:38:B3, status: Successful (0), rssi:0
Nov 30 19:43:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 IEEE 802.11: associated
Nov 30 19:43:28 wlceventd: wlceventd_proc_event(556): eth5: Assoc 5A:7B:9B:39:38:B3, status: Successful (0), rssi:-46
Nov 30 19:43:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 RADIUS: starting accounting session 3435AE6C0B5B2CFF
Nov 30 19:43:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: pairwise key handshake completed (RSN)
Nov 30 19:43:28 dnsmasq-dhcp[789]: DHCPREQUEST(br0) 192.168.50.222 5a:7b:9b:39:38:b3
Nov 30 19:43:28 dnsmasq-dhcp[789]: DHCPACK(br0) 192.168.50.222 5a:7b:9b:39:38:b3
Nov 30 19:44:07 WATCHDOG: [FAUPGRADE][auto_firmware_check7396)]periodic_check AM 2:14
Nov 30 19:44:07 WATCHDOG: [FAUPGRADE][auto_firmware_check7435)]do webs_update
Nov 30 19:44:10 WATCHDOG: [FAUPGRADE][auto_firmware_check7453)]retrieve firmware information
Nov 30 19:44:10 WATCHDOG: [FAUPGRADE][auto_firmware_check7468)]fimrware update check first time
Nov 30 19:44:10 WATCHDOG: [FAUPGRADE][auto_firmware_check7501)]no need to upgrade firmware
Dec  1 00:44:17 kernel: wl0: random key value: EEF2221A9BBB09926B1F00288B87EB7D5CA6DC598F220EEFDCFB5F5BBA41D41A
Nov 30 19:44:17 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Nov 30 19:44:17 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Nov 30 19:44:17 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Nov 30 19:44:17 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Nov 30 19:44:17 wlceventd: wlceventd_proc_event(527): eth6: Auth 46:C2:C4:B2:22:CE, status: Successful (0), rssi:0
Nov 30 19:44:17 hostapd: eth6: STA 46:c2:c4:b2:22:ce IEEE 802.11: associated
Nov 30 19:44:17 wlceventd: wlceventd_proc_event(556): eth6: Assoc 46:C2:C4:B2:22:CE, status: Successful (0), rssi:-41
Nov 30 19:44:17 hostapd: eth6: STA 46:c2:c4:b2:22:ce RADIUS: starting accounting session DDB6D1215CFE1BD3
Nov 30 19:44:17 hostapd: eth6: STA 46:c2:c4:b2:22:ce WPA: pairwise key handshake completed (RSN)
Nov 30 19:44:21 dnsmasq-dhcp[789]: DHCPDISCOVER(br0) 46:c2:c4:b2:22:ce
Nov 30 19:44:21 dnsmasq-dhcp[789]: DHCPOFFER(br0) 192.168.50.206 46:c2:c4:b2:22:ce
Nov 30 19:44:21 dnsmasq-dhcp[789]: DHCPDISCOVER(br0) 46:c2:c4:b2:22:ce
Nov 30 19:44:21 dnsmasq-dhcp[789]: DHCPOFFER(br0) 192.168.50.206 46:c2:c4:b2:22:ce
Nov 30 19:44:21 dnsmasq-dhcp[789]: DHCPDISCOVER(br0) 46:c2:c4:b2:22:ce
Nov 30 19:44:21 dnsmasq-dhcp[789]: DHCPOFFER(br0) 192.168.50.206 46:c2:c4:b2:22:ce
Nov 30 19:44:22 dnsmasq-dhcp[789]: DHCPREQUEST(br0) 192.168.50.206 46:c2:c4:b2:22:ce
Nov 30 19:44:22 dnsmasq-dhcp[789]: DHCPACK(br0) 192.168.50.206 46:c2:c4:b2:22:ce

微信扫一扫,阅读更方便^_^

632

主题

6223

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16981

RT-AC88URT-AX68U

发表于 2021-12-1 09:18:09 | 显示全部楼层
具体描述一下断流现象,是所有客户端(包括2.4G/5G/有线)都断开了与RT-AX68U的连接,还是只有某一客户端断开连接?

还是说,所有客户端都能保持与RT-AX68U的连接,只是出不了外网?

7

主题

36

回帖

287

积分

中级会员

Rank: 3Rank: 3

积分
287
 楼主| 发表于 2021-12-1 10:17:34 | 显示全部楼层
Master 发表于 2021-12-1 09:18
具体描述一下断流现象,是所有客户端(包括2.4G/5G/有线)都断开了与RT-AX68U的连接,还是只有某一客户端断开 ...

设备都连在5G上,所有设备都和路由器断开了。改连2.4G的wifi就好了。

43

主题

274

回帖

6107

积分

论坛元老

Rank: 8Rank: 8

积分
6107

RT-AX86U高达定制版RT-AX86URT-AC5300RT-AX88U

发表于 2021-12-1 15:20:42 | 显示全部楼层
我都是X86..3.0版本...
這個星期 5G斷...

632

主题

6223

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16981

RT-AC88URT-AX68U

发表于 2021-12-1 18:16:10 | 显示全部楼层
yangren13 发表于 2021-12-1 10:17
设备都连在5G上,所有设备都和路由器断开了。改连2.4G的wifi就好了。

看你提供的这段日志,相反,2.4G WiFi出现了断线现象,5G WiFi倒是客户端连线成功。有没有完成的日志,打包传上来。

7

主题

36

回帖

287

积分

中级会员

Rank: 3Rank: 3

积分
287
 楼主| 发表于 2021-12-1 22:24:48 | 显示全部楼层
Master 发表于 2021-12-1 18:16
看你提供的这段日志,相反,2.4G WiFi出现了断线现象,5G WiFi倒是客户端连线成功。有没有完成的日志,打 ...

我回头导出一下完整的日志。之前因为家里设备少,都集中连接在5G WiFi上,至于2.4G WiFi发生了什么也不知道,所以现象描述上可能有偏差。现在确认的是2.4G和5G的WiFi都出现了手机WiFi自己断开的现象。等下次断网的时候我找一下网线接个有线设备试一下。

7

主题

36

回帖

287

积分

中级会员

Rank: 3Rank: 3

积分
287
 楼主| 发表于 2021-12-2 01:47:26 | 显示全部楼层
Master 发表于 2021-12-1 18:16
看你提供的这段日志,相反,2.4G WiFi出现了断线现象,5G WiFi倒是客户端连线成功。有没有完成的日志,打 ...

从描述上看我和这个贴主的问题有点儿像
https://52asus.com/thread-16572-1-1.html

7

主题

36

回帖

287

积分

中级会员

Rank: 3Rank: 3

积分
287
 楼主| 发表于 2021-12-2 06:30:52 | 显示全部楼层
完整的日志

Jan  1 00:00:02 kernel: ubi2: attaching mtd10
Jan  1 00:00:02 kernel: ubi2: scanning is finished
Jan  1 00:00:02 kernel: ubi2: attached mtd10 (name "misc1", size 8 MiB)
Jan  1 00:00:02 kernel: ubi2: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Jan  1 00:00:02 kernel: ubi2: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Jan  1 00:00:02 kernel: ubi2: VID header offset: 2048 (aligned 2048), data offset: 4096
Jan  1 00:00:02 kernel: ubi2: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
Jan  1 00:00:02 kernel: ubi2: user volume: 1, internal volumes: 1, max. volumes count: 128
Jan  1 00:00:02 kernel: ubi2: max/mean erase counter: 28/10, WL threshold: 4096, image sequence number: 2099130947
Jan  1 00:00:02 kernel: ubi2: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
Jan  1 00:00:02 kernel: ubi2: background thread "ubi_bgt2d" started, PID 395
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" started, PID 410
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): UBIFS: mounted UBI device 2, volume 0, name "nvram"
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1396736 bytes (1 MiB, 11 LEBs)
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): reserved for root: 0 bytes (0 KiB)
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): media format: w4/r0 (latest is w4/r0), UUID EEC2680F-D67F-4D6C-BF0F-1260390EA30C, small LPT model
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): un-mount UBI device 2
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" stops
Jan  1 00:00:03 kernel: ubi2: detaching mtd10
Jan  1 00:00:03 kernel: ubi2: mtd10 is detached
Jan  1 00:00:03 jffs2: getting the information of jffs2
Jan  1 00:00:03 modprobe: module jffs2 not found in modules.dep
Jan  1 00:00:03 jffs2: mounting jffs2
Jan  1 00:00:05 init: notice[jffs]: Loaded
Jan  1 00:00:05 jffs2: create jffs2 successfully
Jan  1 00:00:05 kernel: Loading HND Module
Jan  1 00:00:05 kernel: igs_module_init:867:         IGS 29 create network socket successful
Jan  1 00:00:06 kernel: cfg80211: Calling CRDA to update world regulatory domain
Jan  1 00:00:06 kernel: dpsta_init: 17.10.157.2802 (r794271) cf953dc Jan 12 2021 15:19:57 msglevel 0x1
Jan  1 00:00:07 kernel: osl_skb_audit: PASS
Jan  1 00:00:07 kernel: wl_module_init: passivemode set to 0x1
Jan  1 00:00:07 kernel: wl_module_init: txworkq set to 0x0
Jan  1 00:00:07 kernel: ^[[0;32mwl_pktfwd_sys_init:  ^[[1m^[[34mWL_PKTFWD[1.1.0]^[[0m Success^[[0m
Jan  1 00:00:07 kernel: wl 0000:01:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:07 kernel: wl0: creating kthread wl0-kthrd
Jan  1 00:00:07 kernel: BME Service Initialization
Jan  1 00:00:07 kernel: BME: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
Jan  1 00:00:07 kernel: M2M: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc015c64000,ffffffc018122000>,ffffffc013ece000 depth 256
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc015914000,ffffffc0158d6000>,ffffffc013ed1000 depth 256
Jan  1 00:00:07 kernel: M2M: DMA 0 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: M2M: DMA 1 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: wl0: phy_radio_attach: RF Band Cap: 2G:1 5G:1
Jan  1 00:00:07 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
Jan  1 00:00:07 kernel: wl0 taf_do_enable: TAF is enabled
Jan  1 00:00:07 kernel: CSIMON module registered
Jan  1 00:00:07 kernel: wfd0-thrd WL 0 FLowControl total<22877> lo<5719> hi<2287> favor prio<4>
Jan  1 00:00:07 kernel: ^[[0;31mwfd_bind: wfd0-thrd initialized pktlists: radio 0 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x3f0 [wl]
Jan  1 00:00:07 kernel: ^[[0m
Jan  1 00:00:07 kernel: Creating CPU ring for queue number 0 with 1024 packets descriptor=0xffffffbffc5c02c0
Jan  1 00:00:07 kernel:  Creating CPU ring for queue number 1 with 1024 packets descriptor=0xffffffbffc5c0300
Jan  1 00:00:07 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 0 wl_radio_idx 0 Type skb:sll configured WFD thread wfd0-thrd minQId/maxQId (8/9), status (0) qmask 0x3^[[0m
Jan  1 00:00:07 kernel: Instantiating WFD 0 thread
Jan  1 00:00:07 kernel: ^[[0;32mwl_wfd_bind: wl0 wfd_idx 0 success^[[0m
Jan  1 00:00:07 kernel: wfd_registerdevice Successfully registered dev eth5 ifidx 0 wfd_idx 0
Jan  1 00:00:07 kernel: eth5: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2803 (r795020)
Jan  1 00:00:07 kernel: wl 0001:01:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:07 kernel: wl1: creating kthread wl1-kthrd
Jan  1 00:00:07 kernel: BME Service Initialization
Jan  1 00:00:07 kernel: BME: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
Jan  1 00:00:07 kernel: M2M: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc013c4e000,ffffffc015ba8000>,ffffffc013e8c000 depth 256
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc015baa000,ffffffc015be0000>,ffffffc013e88000 depth 256
Jan  1 00:00:07 kernel: M2M: DMA 0 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: M2M: DMA 1 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: wl1: phy_radio_attach: RF Band Cap: 2G:1 5G:1
Jan  1 00:00:07 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
Jan  1 00:00:07 kernel: wl1 taf_do_enable: TAF is enabled
Jan  1 00:00:07 kernel: CSIMON module registered
Jan  1 00:00:07 kernel: wfd1-thrd WL 1 FLowControl total<22877> lo<5719> hi<2287> favor prio<4>
Jan  1 00:00:07 kernel: ^[[0;31mwfd_bind: wfd1-thrd initialized pktlists: radio 1 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x3f0 [wl]
Jan  1 00:00:07 kernel: ^[[0m
Jan  1 00:00:07 kernel: Creating CPU ring for queue number 2 with 1024 packets descriptor=0xffffffbffc5c0340
Jan  1 00:00:07 kernel:  Creating CPU ring for queue number 3 with 1024 packets descriptor=0xffffffbffc5c0380
Jan  1 00:00:07 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 1 wl_radio_idx 1 Type skb:sll configured WFD thread wfd1-thrd minQId/maxQId (10/11), status (0) qmask 0xc^[[0m
Jan  1 00:00:07 kernel: Instantiating WFD 1 thread
Jan  1 00:00:07 kernel: ^[[0;32mwl_wfd_bind: wl1 wfd_idx 1 success^[[0m
Jan  1 00:00:07 kernel: wfd_registerdevice Successfully registered dev eth6 ifidx 0 wfd_idx 1
Jan  1 00:00:07 kernel: eth6: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2803 (r795020)
Jan  1 00:00:07 modprobe: module nf_conntrack_proto_gre not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_nat_proto_gre not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_conntrack_pptp not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_nat_pptp not found in modules.dep
May  5 05:05:02 kernel: random: init urandom read with 30 bits of entropy available
May  5 05:05:02 kernel: proc_dostring_crashlogsave:  crash log filename is /jffs/crashlog.log
May  5 05:05:02 kernel: crashFileSet: log signature invalid !
May  5 05:05:02 kernel: ret 0 retlen 65536 buff <6>usbcore: registered new interface driver usbfs
May  5 05:05:02 kernel: usbcore: registered new interface driver hub
May  5 05:05:02 kernel: usbcore: registered new device driver usb
May  5 05:05:02 kernel: ++++ Powering up USB blocks
May  5 05:05:02 kernel: xhci-hcd xhci-hcd.0: xHCI Host Controller
May  5 05:05:02 kernel: xhci-hcd xhci-hcd.0: new USB bus registered, assigned bus number 1
May  5 05:05:02 kernel: xhci-hcd xhci-hcd.0: hcc params 0x0250f17c hci version 0x100 quirks 0x00014010
May  5 05:05:02 kernel: xhci-hcd xhci-hcd.0: irq 25, io mem 0x8000d000
May  5 05:05:02 kernel: hub 1-0:1.0: USB hub found
May  5 05:05:02 kernel: hub 1-0:1.0: config failed, hub doesn't have any ports! (err -19)
May  5 05:05:02 kernel: xhci-hcd xhci-hcd.0: xHCI Host Controller
May  5 05:05:02 kernel: xhci-hcd xhci-hcd.0: new USB bus registered, assigned bus number 2
May  5 05:05:02 kernel: hub 2-0:1.0: USB hub found
May  5 05:05:02 kernel: hub 2-0:1.0: 2 ports detected
May  5 05:05:02 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
May  5 05:05:02 kernel: ehci-platform: EHCI generic platform driver
May  5 05:05:02 kernel: ehci-platform ehci-platform.0: EHCI Host Controller
May  5 05:05:02 kernel: ehci-platform ehci-platform.0: new USB bus registered, assigned bus number 3
May  5 05:05:02 kernel: ehci-platform ehci-platform.0: irq 27, io mem 0x8000c300
May  5 05:05:02 kernel: ehci-platform ehci-platform.0: USB 2.0 started, EHCI 1.00
May  5 05:05:02 kernel: hub 3-0:1.0: USB hub found
May  5 05:05:02 kernel: hub 3-0:1.0: 2 ports detected
May  5 05:05:02 kernel: ehci-pci: EHCI PCI platform driver
May  5 05:05:02 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
May  5 05:05:02 kernel: ohci-platform: OHCI generic platform driver
May  5 05:05:02 kernel: ohci-platform ohci-platform.0: Generic Platform OHCI controller
May  5 05:05:02 kernel: ohci-platform ohci-platform.0: new USB bus registered, assigned bus number 4
May  5 05:05:02 kernel: ohci-platform ohci-platform.0: irq 26, io mem 0x8000c400
May  5 05:05:02 kernel: hub 4-0:1.0: USB hub found
May  5 05:05:02 kernel: hub 4-0:1.0: 2 ports detected
May  5 05:05:02 kernel: ohci-pci: OHCI PCI platform driver
May  5 05:05:02 kernel: usbcore: registered new interface driver cdc_acm
May  5 05:05:02 kernel: cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
May  5 05:05:02 kernel: usbcore: registered new interface driver asix
May  5 05:05:02 kernel: usbcore: registered new interface driver ax88179_178a
May  5 05:05:02 kernel: usbcore: registered new interface driver cdc_ether
May  5 05:05:02 kernel: usbcore: registered new interface driver rndis_host
May  5 05:05:02 kernel: usbcore: registered new interface driver cdc_ncm
May  5 05:05:02 kernel: usbcore: registered new interface driver cdc_wdm
May  5 05:05:02 kernel: usbcore: registered new interface driver qmi_wwan
May  5 05:05:02 kernel: usbcore: registered new interface driver cdc_mbim
May  5 05:05:02 kernel: ^[[0;33;41m[ERROR pktrunner] runnerUcast_inet6addr_event,148: Could not rdpa_system_ipv6_host_address_table_find ret=-5^[[0m
May  5 05:05:02 kernel: device eth4 entered promiscuous mode
May  5 05:05:02 kernel: device eth3 entered promiscuous mode
May  5 05:05:02 kernel: device eth2 entered promiscuous mode
May  5 05:05:02 kernel: device eth1 entered promiscuous mode
May  5 05:05:02 kernel: usb 2-2: new SuperSpeed USB device number 2 using xhci-hcd
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CFG80211-ERROR) wl_allocate_wowl_config : Wowl not supported (-23)
May  5 05:05:02 kernel: usbcore: registered new interface driver usblp
May  5 05:05:03 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 05:05:03 kernel: jffs2: notice: (449) check_node_data: wrong data CRC in data node at 0x0226bf24: read 0x664dab01, calculated 0x328ab4fe.
May  5 05:05:03 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:03 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:03 kernel: device eth5 entered promiscuous mode
May  5 05:05:03 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:03 kernel: CFG80211-ERROR) wl_allocate_wowl_config : Wowl not supported (-23)
May  5 05:05:04 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:04 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:04 kernel: device eth6 entered promiscuous mode
May  5 05:05:04 kernel: br0: port 6(eth6) entered listening state
May  5 05:05:04 kernel: br0: port 6(eth6) entered listening state
May  5 05:05:04 kernel: br0: port 5(eth5) entered listening state
May  5 05:05:04 kernel: br0: port 5(eth5) entered listening state
May  5 05:05:04 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:04 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:04 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:04 kernel: CSIMON: M2M usr already registered ...
May  5 01:05:05 acsd: eth5: Selecting 2g band ACS policy
May  5 01:05:05 wlceventd: main(961): wlceventd Start...
May  5 01:05:05 dnsmasq[787]: started, version 2.84 cachesize 1500
May  5 01:05:05 dnsmasq[787]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID no-loop-detect no-inotify no-dumpfile
May  5 01:05:05 dnsmasq[787]: warning: interface br2 does not currently exist
May  5 01:05:05 dnsmasq[787]: warning: interface br1 does not currently exist
May  5 01:05:05 dnsmasq[787]: warning: interface pptp* does not currently exist
May  5 01:05:05 dnsmasq[787]: asynchronous logging enabled, queue limit is 5 messages
May  5 01:05:05 dnsmasq-dhcp[787]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d
May  5 01:05:05 dnsmasq-dhcp[787]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d
May  5 01:05:05 dnsmasq-dhcp[787]: DHCP, IP range 192.168.50.2 -- 192.168.50.254, lease time 1d
May  5 01:05:05 dnsmasq[787]: read /etc/hosts - 6 addresses
May  5 01:05:05 RT-AX68U: start https:8443
May  5 01:05:05 RT-AX68U: start httpd:80
May  5 01:05:05 crond[801]: crond (busybox 1.24.1) started, log level 8
May  5 01:05:05 httpd: Save SSL certificate...80
May  5 01:05:05 avahi-daemon[826]: Found user 'yangren13' (UID 0) and group 'root' (GID 0).
May  5 01:05:05 avahi-daemon[826]: Successfully dropped root privileges.
May  5 01:05:05 avahi-daemon[826]: avahi-daemon 0.7 starting up.
May  5 01:05:05 avahi-daemon[826]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
May  5 01:05:05 avahi-daemon[826]: Loading service file /tmp/avahi/services/alexa.service.
May  5 01:05:05 avahi-daemon[826]: Loading new alias name RT-AX68U.
May  5 01:05:05 httpd: mssl_cert_key_match : PASS
May  5 01:05:05 avahi-daemon[826]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
May  5 01:05:05 avahi-daemon[826]: New relevant interface br0.IPv4 for mDNS.
May  5 01:05:05 avahi-daemon[826]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
May  5 01:05:05 avahi-daemon[826]: New relevant interface lo.IPv4 for mDNS.
May  5 01:05:05 avahi-daemon[826]: Network interface enumeration completed.
May  5 01:05:05 avahi-daemon[826]: Registering new address record for 192.168.50.1 on br0.IPv4.
May  5 01:05:05 avahi-daemon[826]: Registering new address record for 127.0.1.1 on lo.IPv4.
May  5 01:05:05 avahi-daemon[826]: Registering new address record for 127.0.0.1 on lo.IPv4.
May  5 01:05:06 disk monitor: be idle
May  5 01:05:06 hour monitor: daemon is starting
May  5 01:05:06 hour monitor: daemon terminates
May  5 01:05:06 jffs2: valid logs(1)
May  5 05:05:06 kernel: br0: port 6(eth6) entered learning state
May  5 05:05:06 kernel: br0: port 5(eth5) entered learning state
May  5 01:05:06 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 01:05:06 miniupnpd[899]: HTTP listening on port 44780
May  5 01:05:06 ERP: The model isn't under support list!
May  5 01:05:06 miniupnpd[899]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 01:05:06 lldpd[933]: could not open either /etc/os-release or /usr/lib/os-release
May  5 01:05:06 lldpd[933]: lsb_release information not available
May  5 01:05:06 lldpd[938]: created chroot directory /var/run/lldpd
May  5 01:05:06 lldpd[938]: /etc/localtime copied to chroot
May  5 01:05:06 lldpd[938]: protocol LLDP enabled
May  5 01:05:06 lldpd[938]: protocol CDPv1 disabled
May  5 01:05:06 lldpd[938]: protocol CDPv2 disabled
May  5 01:05:06 lldpd[938]: protocol SONMP disabled
May  5 01:05:06 lldpd[938]: protocol EDP disabled
May  5 01:05:06 lldpd[938]: protocol FDP disabled
May  5 01:05:06 lldpd[938]: libevent 2.0.21-stable initialized with epoll method
May  5 01:05:06 lldpd[938]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
May  5 01:05:06 lldpcli[936]: lldpd should resume operations
May  5 05:05:06 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 01:05:06 avahi-daemon[826]: Server startup complete. Host name is RT-AX68U-6058.local. Local service cookie is 295964993.
May  5 01:05:06 avahi-daemon[826]: Alias name "RT-AX68U" successfully established.
May  5 01:05:07 avahi-daemon[826]: Service "RT-AX68U-6058" (/tmp/avahi/services/alexa.service) successfully established.
May  5 05:05:08 kernel: br0: topology change detected, propagating
May  5 05:05:08 kernel: br0: port 6(eth6) entered forwarding state
May  5 05:05:08 kernel: br0: topology change detected, propagating
May  5 05:05:08 kernel: br0: port 5(eth5) entered forwarding state
May  5 01:05:08 acsd: acsd_main_loop(1178): sync_id: 35769, status:1, misc.error/abort
May  5 01:05:08 acsd: eth5: selected channel spec: 0x1908 (10u)
May  5 01:05:08 acsd: eth5: Adjusted channel spec: 0x1908 (10u)
May  5 01:05:08 acsd: eth5: selected channel spec: 0x1908 (10u)
May  5 01:05:08 acsd: acs_set_chspec: 0x1908 (10u) for reason APCS_INIT
May  5 01:05:08 acsd: acs_update_driver(441): acs update failed ret code: -22
May  5 01:05:08 acsd: acs_init_run(1059): eth5: update driver failed
May  5 01:05:08 acsd: eth6: Selecting 5g band ACS policy
May  5 05:05:08 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:08 kernel: CSIMON: M2M usr already registered ...
May  5 01:05:09 wlceventd: wlceventd_proc_event(527): eth5: Auth 2C:AA:8EF:B6:1B, status: Successful (0), rssi:0
May  5 01:05:09 hostapd: eth5: STA 2c:aa:8e:df:b6:1b IEEE 802.11: associated
May  5 01:05:09 wlceventd: wlceventd_proc_event(556): eth5: Assoc 2C:AA:8EF:B6:1B, status: Successful (0), rssi:-59
May  5 01:05:09 WAN Connection: WAN(0) link down.
May  5 01:05:09 hostapd: eth5: STA 2c:aa:8e:df:b6:1b RADIUS: starting accounting session 521E97F605EA0E05
May  5 01:05:09 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: pairwise key handshake completed (RSN)
May  5 05:05:09 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 01:05:10 dnsmasq[787]: read /etc/hosts - 6 addresses
May  5 05:05:10 kernel: SCSI subsystem initialized
May  5 01:05:10 modprobe: module scsi_wait_scan not found in modules.dep
May  5 05:05:10 kernel: usb-storage 2-2:1.0: USB Mass Storage device detected
May  5 01:05:10 Mastiff: init
May  5 05:05:10 kernel: scsi host0: usb-storage 2-2:1.0
May  5 05:05:10 kernel: usbcore: registered new interface driver usb-storage
May  5 05:05:10 kernel: usbcore: registered new interface driver uas
May  5 01:05:10 modprobe: module mbcache not found in modules.dep
May  5 01:05:10 modprobe: module jbd not found in modules.dep
May  5 01:05:10 modprobe: module ext3 not found in modules.dep
May  5 01:05:10 modprobe: module ext4 not found in modules.dep
May  5 01:05:10 modprobe: module ext2 not found in modules.dep
May  5 05:05:10 kernel: tfat: loading out-of-tree module taints kernel.
May  5 05:05:10 kernel: Tuxera FAT 12/16/32 driver version 3017.7.24.32_1 [Flags: R/W MODULE].
May  5 05:05:10 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:10 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Wed Oct 27 21:05:59 CST 2021 aarch64
May  5 05:05:10 kernel: Tuxera NTFS driver 3018.6.5.3_1 [Flags: R/W MODULE].
May  5 05:05:10 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:10 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Wed Oct 27 21:05:59 CST 2021 aarch64
May  5 05:05:10 kernel: Tuxera HFS+ driver 3017.6.20
May  5 05:05:10 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:10 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Wed Oct 27 21:05:59 CST 2021 aarch64
May  5 01:05:10 modprobe: module btusbdrv not found in modules.dep
May  5 01:05:10 init: fwver: 3.0.0.4_386_45934-gb23bdac (snCICIA001540 /ha:24:4B:FE:70:60:58 )
May  5 01:05:10 ahs: [read_json]Update ahs JSON file.
May  5 01:05:11 httpd: Succeed to init SSL certificate...80
May  5 01:05:11 httpd: Succeed to init SSL certificate...8443
May  5 05:05:11 kernel: scsi 0:0:0:0: Direct-Access     WD       My Passport 0820 1007 PQ: 0 ANSI: 6
May  5 05:05:11 kernel: sd 0:0:0:0: [sda] Spinning up disk...
May  5 05:05:11 kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0
May  5 05:05:11 kernel: scsi 0:0:0:1: Enclosure         WD       SES Device       1007 PQ: 0 ANSI: 6
May  5 05:05:11 kernel: scsi 0:0:0:1: Attached scsi generic sg1 type 13
May  5 01:05:11 acsd: eth6: selected channel spec: 0xe32a (48/80)
May  5 01:05:11 acsd: eth6: Adjusted channel spec: 0xe32a (48/80)
May  5 01:05:11 acsd: eth6: selected channel spec: 0xe32a (48/80)
May  5 01:05:11 acsd: acs_set_chspec: 0xe32a (48/80) for reason APCS_INIT
May  5 05:05:12 kernel: .ready
May  5 05:05:12 kernel: sd 0:0:0:0: [sda] 2930210816 512-byte logical blocks: (1.50 TB/1.36 TiB)
May  5 05:05:12 kernel: sd 0:0:0:0: [sda] Write Protect is off
May  5 05:05:12 kernel: sd 0:0:0:0: [sda] Mode Sense: 47 00 10 08
May  5 05:05:12 kernel: sd 0:0:0:0: [sda] No Caching mode page found
May  5 05:05:12 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
May  5 05:05:12 kernel:  sda: sda1
May  5 05:05:12 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
May  5 05:05:12 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 01:05:13 cfg_server:  event: wl_chanspec_changed_action
May  5 01:05:13 cfg_server: skip event due no re
May  5 05:05:13 kernel: <=== Deactivate Deep Green Mode
May  5 05:05:13 kernel: bcmswlpbk0 (Ext switch port: 8) (Logical Port: 8) Virtual link UP
May  5 05:05:13 kernel: eth0 (Int switch port: 3) (Logical Port: 3) (phyId: c) Link Up at 1000 mbps full duplex
May  5 01:05:15 BONDING: option disabled
May  5 05:05:15 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 01:05:16 roamast: ROAMING Start...
May  5 01:05:16 lldpd[938]: removal request for address of 72.88.158.9%11, but no knowledge of it
May  5 01:05:16 dnsmasq[787]: read /etc/hosts - 6 addresses
May  5 01:05:16 dnsmasq[787]: using nameserver 71.242.0.12#53 for domain verizon.net
May  5 01:05:16 dnsmasq[787]: using nameserver 71.250.0.12#53 for domain verizon.net
May  5 01:05:16 dnsmasq[787]: using nameserver 71.242.0.12#53
May  5 01:05:16 dnsmasq[787]: using nameserver 71.250.0.12#53
May  5 01:05:16 wan: finish adding multi routes
May  5 01:05:17 miniupnpd[899]: shutting down MiniUPnPd
May  5 01:05:17 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 01:05:17 miniupnpd[1839]: HTTP listening on port 42681
May  5 01:05:17 miniupnpd[1839]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 05:05:19 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 05:05:19 kernel: tntfs error (device sda1, pid 1880): parse_options(): Unrecognized mount option codepage.
May  5 01:05:19 hotplug[1871]: USB /dev/sda1(ntfs) failed to mount as NTFS!
May  5 05:05:19 kernel: tfat: fail_safe is enabled
May  5 05:05:19 kernel: tfat: fail_safe is enabled
May  5 05:05:19 kernel: tfat: fail_safe is enabled
May  5 05:05:19 kernel: tntfs info (device sda1, pid 1882): ntfs_fill_super(): fail_safe is enabled.
May  5 05:05:19 kernel: tntfs info (device sda1, pid 1882): load_system_files(): NTFS volume name 'My Passport', version 3.1 (cluster_size 4096, PAGE_SIZE 4096).
May  5 01:05:19 hotplug[1871]: USB ntfs fs at /dev/sda1 mounted on /tmp/mnt/My_Passport
May  5 01:05:19 usb: USB ntfs fs at /dev/sda1 mounted on /tmp/mnt/My_Passport.
May  5 01:05:20 rc_service: hotplug 1871:notify_rc restart_nasapps
May  5 01:05:20 avahi-daemon[826]: Got SIGTERM, quitting.
May  5 01:05:20 avahi-daemon[826]: Leaving mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
May  5 01:05:20 avahi-daemon[826]: Leaving mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
May  5 01:05:20 avahi-daemon[826]: avahi-daemon 0.7 exiting.
May  5 01:05:20 wlceventd: wlceventd_proc_event(527): eth5: Auth 90:3C:92:CB:5E8, status: Successful (0), rssi:0
May  5 01:05:20 hostapd: eth5: STA 90:3c:92:cb:5e:d8 IEEE 802.11: associated
May  5 01:05:20 wlceventd: wlceventd_proc_event(556): eth5: Assoc 90:3C:92:CB:5E8, status: Successful (0), rssi:-48
May  5 01:05:20 WAN Connection: WAN was restored.
May  5 01:05:20 dnsmasq[787]: read /etc/hosts - 6 addresses
May  5 01:05:20 dnsmasq[787]: using nameserver 71.242.0.12#53 for domain verizon.net
May  5 01:05:20 dnsmasq[787]: using nameserver 71.250.0.12#53 for domain verizon.net
May  5 01:05:20 dnsmasq[787]: using nameserver 71.242.0.12#53
May  5 01:05:20 dnsmasq[787]: using nameserver 71.250.0.12#53
May  5 01:05:20 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 90:3C:92:CB:5E8, status: 0, reason: Unspecified reason (1), rssi:0
May  5 01:05:20 wlceventd: wlceventd_proc_event(527): eth5: Auth 90:3C:92:CB:5E8, status: Successful (0), rssi:0
May  5 01:05:20 wlceventd: wlceventd_proc_event(556): eth5: Assoc 90:3C:92:CB:5E8, status: Successful (0), rssi:-47
May  5 01:05:20 hostapd: eth5: STA 90:3c:92:cb:5e:d8 IEEE 802.11: associated
May  5 01:05:20 hostapd: eth5: STA 90:3c:92:cb:5e:d8 RADIUS: starting accounting session 10F394888F77AD78
May  5 01:05:20 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: pairwise key handshake completed (RSN)
May  5 01:05:21 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.5 90:3c:92:cb:5e:d8
May  5 01:05:21 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.5 90:3c:92:cb:5e:d8 YueGuansiPhone
May  5 01:05:22 avahi-daemon[1924]: Found user 'yangren13' (UID 0) and group 'root' (GID 0).
May  5 01:05:22 avahi-daemon[1924]: Successfully dropped root privileges.
May  5 01:05:22 avahi-daemon[1924]: avahi-daemon 0.7 starting up.
May  5 01:05:22 avahi-daemon[1924]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
May  5 01:05:22 avahi-daemon[1924]: Loading service file /tmp/avahi/services/alexa.service.
May  5 01:05:22 avahi-daemon[1924]: Loading new alias name RT-AX68U.
May  5 01:05:22 avahi-daemon[1924]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
May  5 01:05:22 avahi-daemon[1924]: New relevant interface br0.IPv4 for mDNS.
May  5 01:05:22 avahi-daemon[1924]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
May  5 01:05:22 avahi-daemon[1924]: New relevant interface lo.IPv4 for mDNS.
May  5 01:05:22 avahi-daemon[1924]: Network interface enumeration completed.
May  5 01:05:22 avahi-daemon[1924]: Registering new address record for 192.168.50.1 on br0.IPv4.
May  5 01:05:22 avahi-daemon[1924]: Registering new address record for 127.0.1.1 on lo.IPv4.
May  5 01:05:22 avahi-daemon[1924]: Registering new address record for 127.0.0.1 on lo.IPv4.
May  5 01:05:22 iTunes: daemon is stoped
May  5 01:05:22 FTP Server: daemon is stopped
May  5 01:05:22 Samba Server: smb daemon is stoped
May  5 01:05:22 avahi-daemon[1924]: Got SIGTERM, quitting.
May  5 01:05:22 avahi-daemon[1924]: Leaving mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
May  5 01:05:22 avahi-daemon[1924]: Leaving mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
May  5 01:05:22 avahi-daemon[1924]: avahi-daemon 0.7 exiting.
May  5 05:05:22 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 01:05:22 ntp: start NTP update
May  5 01:05:22 wlceventd: wlceventd_proc_event(527): eth6: Auth 26:3A:CA:76:BA:92, status: Successful (0), rssi:0
May  5 01:05:22 wlceventd: wlceventd_proc_event(556): eth6: Assoc 26:3A:CA:76:BA:92, status: Successful (0), rssi:-42
May  5 01:05:22 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: associated
May  5 01:05:22 hostapd: eth6: STA 26:3a:ca:76:ba:92 RADIUS: starting accounting session F4B32E28EA7A0B04
May  5 01:05:22 hostapd: eth6: STA 26:3a:ca:76:ba:92 WPA: pairwise key handshake completed (RSN)
Dec  1 08:14:45 rc_service: ntp 1826:notify_rc restart_diskmon
Dec  1 08:14:45 rc_service: waitting "restart_nasapps" via hotplug ...
Dec  1 13:14:45 kernel: tun: Universal TUN/TAP device driver, 1.6
Dec  1 13:14:45 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Dec  1 13:14:45 kernel: IPv6: ADDRCONF(NETDEV_UP): tun21: link is not ready
Dec  1 13:14:45 kernel: IPv6: ADDRCONF(NETDEV_UP): tun21: link is not ready
Dec  1 13:14:45 kernel: device tun21 entered promiscuous mode
Dec  1 08:14:45 vpnserver1[1963]: Multiple --up scripts defined.  The previously configured script is overridden.
Dec  1 08:14:45 vpnserver1[1963]: OpenVPN 2.4.11 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 27 2021
Dec  1 08:14:45 vpnserver1[1963]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.03
Dec  1 08:14:45 vpnserver1[1964]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Dec  1 08:14:45 vpnserver1[1964]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
Dec  1 08:14:45 vpnserver1[1964]: Diffie-Hellman initialized with 2048 bit key
Dec  1 08:14:45 vpnserver1[1964]: TUN/TAP device tun21 opened
Dec  1 08:14:45 vpnserver1[1964]: TUN/TAP TX queue length set to 100
Dec  1 08:14:45 vpnserver1[1964]: /sbin/ifconfig tun21 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Dec  1 13:14:45 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): tun21: link becomes ready
Dec  1 08:14:45 lldpd[938]: removal request for address of 10.8.0.1%23, but no knowledge of it
Dec  1 08:14:45 vpnserver1[1964]: /bin/sh /jffs/etc/profile tun21 1500 1622 10.8.0.1 10.8.0.2 init
Dec  1 08:14:45 vpnserver1[1964]: WARNING: Failed running command (--up/--down): external program exited with error status: 2
Dec  1 08:14:45 vpnserver1[1964]: Exiting due to fatal error
Dec  1 08:14:45 Timemachine: daemon is stoped
Dec  1 08:14:45 miniupnpd[1839]: shutting down MiniUPnPd
Dec  1 08:14:45 avahi-daemon[1990]: Found user 'yangren13' (UID 0) and group 'root' (GID 0).
Dec  1 08:14:45 avahi-daemon[1990]: Successfully dropped root privileges.
Dec  1 08:14:45 avahi-daemon[1990]: avahi-daemon 0.7 starting up.
Dec  1 08:14:45 avahi-daemon[1990]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Dec  1 08:14:45 avahi-daemon[1990]: Loading service file /tmp/avahi/services/alexa.service.
Dec  1 08:14:45 avahi-daemon[1990]: Loading new alias name RT-AX68U.
Dec  1 08:14:45 avahi-daemon[1990]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
Dec  1 08:14:45 avahi-daemon[1990]: New relevant interface br0.IPv4 for mDNS.
Dec  1 08:14:45 avahi-daemon[1990]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
Dec  1 08:14:45 avahi-daemon[1990]: New relevant interface lo.IPv4 for mDNS.
Dec  1 08:14:45 avahi-daemon[1990]: Network interface enumeration completed.
Dec  1 08:14:45 avahi-daemon[1990]: Registering new address record for 192.168.50.1 on br0.IPv4.
Dec  1 08:14:45 avahi-daemon[1990]: Registering new address record for 127.0.1.1 on lo.IPv4.
Dec  1 08:14:45 avahi-daemon[1990]: Registering new address record for 127.0.0.1 on lo.IPv4.
Dec  1 08:14:45 start_ddns: Clear ddns cache.
Dec  1 08:14:45 start_ddns: update WWW.ASUS.COM update@asus.com, wan_unit 0
Dec  1 08:14:45 start_ddns: Start Inadyn.
Dec  1 08:14:45 inadyn[2004]: In-a-dyn version 2.8.1 -- Dynamic DNS update client.
Dec  1 08:14:45 inadyn[2004]: Update forced for alias renjun.asuscomm.com, new IP# 72.88.158.9
Dec  1 08:14:45 Samba Server: daemon is started
Dec  1 08:14:45 FTP server: daemon is started
Dec  1 08:14:45 avahi-daemon[1990]: Got SIGTERM, quitting.
Dec  1 08:14:45 avahi-daemon[1990]: Leaving mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
Dec  1 08:14:45 avahi-daemon[1990]: Leaving mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
Dec  1 08:14:45 avahi-daemon[1990]: avahi-daemon 0.7 exiting.
Dec  1 08:14:46 mt-daapd[2041]: Starting signal handler
Dec  1 08:14:46 inadyn[2004]: alias address=<72.88.158.9>
Dec  1 08:14:46 inadyn[2004]: request<GET /ddns/update.jsp?hostname=renjun.asuscomm.com&myip=72.88.158.9&model=RT-AX68U&fw_ver=3.0.0.4.386_45934-gb23bdac HTTP/1.0^M Authorization: Basic MjQ0QkZFNzA2MDU4OjI1QjkyQTZDNkU2MTc5NkY4ODMxMjk2MEQ1NkVGRjFF^M Host: ns1.asuscomm.com^M User-Agent: inadyn/2.8.1 https://github.com/troglobit/inadyn/issues^M ^M >
Dec  1 08:14:46 inadyn[2004]: [response_update]HTTP/1.1 200 OK^M Date: Wed, 01 Dec 2021 13:14:46 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Dec  1 08:14:46 inadyn[2004]: Updating cache for renjun.asuscomm.com
Dec  1 08:14:46 ddns: ddns update ok
Dec  1 08:14:46 iTunes Server: daemon is started
Dec  1 08:14:46 avahi-daemon[2053]: Found user 'yangren13' (UID 0) and group 'root' (GID 0).
Dec  1 08:14:46 avahi-daemon[2053]: Successfully dropped root privileges.
Dec  1 08:14:46 avahi-daemon[2053]: avahi-daemon 0.7 starting up.
Dec  1 08:14:46 avahi-daemon[2053]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Dec  1 08:14:46 avahi-daemon[2053]: Loading service file /tmp/avahi/services/alexa.service.
Dec  1 08:14:46 avahi-daemon[2053]: Loading service file /tmp/avahi/services/mt-daap.service.
Dec  1 08:14:46 avahi-daemon[2053]: Loading new alias name RT-AX68U.
Dec  1 08:14:46 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
Dec  1 08:14:46 avahi-daemon[2053]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
Dec  1 08:14:46 avahi-daemon[2053]: New relevant interface br0.IPv4 for mDNS.
Dec  1 08:14:46 avahi-daemon[2053]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
Dec  1 08:14:46 avahi-daemon[2053]: New relevant interface lo.IPv4 for mDNS.
Dec  1 08:14:46 avahi-daemon[2053]: Network interface enumeration completed.
Dec  1 08:14:46 avahi-daemon[2053]: Registering new address record for 192.168.50.1 on br0.IPv4.
Dec  1 08:14:46 avahi-daemon[2053]: Registering new address record for 127.0.1.1 on lo.IPv4.
Dec  1 08:14:46 avahi-daemon[2053]: Registering new address record for 127.0.0.1 on lo.IPv4.
Dec  1 08:14:46 miniupnpd[2056]: HTTP listening on port 33400
Dec  1 08:14:46 miniupnpd[2056]: Listening for NAT-PMP/PCP traffic on port 5351
Dec  1 08:14:47 mt-daapd[2041]: Loading playlists
Dec  1 08:14:47 mt-daapd[2041]: Initializing database
Dec  1 08:14:47 mt-daapd[2041]: Starting mp3 scan
Dec  1 13:14:47 kernel: Init chrdev /dev/idp with major 190
Dec  1 13:14:47 kernel: tdts: tcp_conn_max = 8000
Dec  1 13:14:47 kernel: tdts: tcp_conn_timeout = 300 sec
Dec  1 08:14:47 avahi-daemon[2053]: Server startup complete. Host name is RT-AX68U-6058.local. Local service cookie is 4243624866.
Dec  1 08:14:47 avahi-daemon[2053]: Alias name "RT-AX68U" successfully established.
Dec  1 08:14:47 disk_monitor: Finish
Dec  1 08:14:47 disk monitor: be idle
Dec  1 08:14:47 avahi-daemon[2053]: Service "RT-AX68U-6058" (/tmp/avahi/services/mt-daap.service) successfully established.
Dec  1 08:14:47 avahi-daemon[2053]: Service "RT-AX68U-6058" (/tmp/avahi/services/alexa.service) successfully established.
Dec  1 13:14:47 kernel: cfg80211: Calling CRDA to update world regulatory domain
Dec  1 08:14:49 mt-daapd[2041]: Starting web server from /rom/etc/web on port 3689
Dec  1 08:14:49 mt-daapd[2041]: Scanned 0 songs in  4 seconds
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x41) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x2d) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x44) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x921) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x54) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x79) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x57) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x32) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x1e0) failed with error code -2.
Dec  1 13:14:49 kernel: tntfs error (device sda1, pid 2045): ntfs_lookup(): ntfs_iget(0x75) failed with error code -2.
Dec  1 08:14:49 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) 26:3a:ca:76:ba:92
Dec  1 08:14:49 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 08:14:49 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) 26:3a:ca:76:ba:92
Dec  1 08:14:49 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 08:14:49 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) 26:3a:ca:76:ba:92
Dec  1 08:14:49 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 13:14:49 kernel: SHN Release Version: 2.0.1 4b635f32
Dec  1 13:14:49 kernel: UDB Core Version: 0.2.18
Dec  1 13:14:49 kernel: Init chrdev /dev/idpfw with major 191
Dec  1 13:14:49 kernel: IDPfw: flush fc
Dec  1 13:14:49 kernel: IDPfw: IDPfw is ready
Dec  1 13:14:49 kernel: sizeof forward pkt param = 280
Dec  1 08:14:49 BWDPI: fun bitmap = 50b
Dec  1 08:14:50 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 08:14:50 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 13:14:51 kernel: cfg80211: Calling CRDA to update world regulatory domain
Dec  1 08:14:53 dhcp client: bound 72.88.158.9/255.255.255.0 via 72.88.158.1 for 7200 seconds.
Dec  1 13:14:54 kernel: cfg80211: Calling CRDA to update world regulatory domain
Dec  1 13:14:57 kernel: cfg80211: Exceeded CRDA call max attempts. Not calling CRDA
Dec  1 13:15:01 kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Dec  1 13:15:04 kernel: wl1: random key value: 522C70F6BE3503E046BA00516733B821EB875A8CDABF094F8062E5EE6FF89E4B
Dec  1 08:15:04 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: disassociated
Dec  1 08:15:04 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 26:3A:CA:76:BA:92, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:15:04 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 26:3A:CA:76:BA:92, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:15:04 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: disassociated
Dec  1 08:15:23 crond[801]: time disparity of 1881130 minutes detected
Dec  1 08:15:27 wlceventd: wlceventd_proc_event(527): eth6: Auth F2:6E:24:663:A2, status: Successful (0), rssi:0
Dec  1 08:15:27 wlceventd: wlceventd_proc_event(556): eth6: Assoc F2:6E:24:663:A2, status: Successful (0), rssi:-50
Dec  1 08:15:27 hostapd: eth6: STA f2:6e:24:66:d3:a2 IEEE 802.11: associated
Dec  1 08:15:27 hostapd: eth6: STA f2:6e:24:66:d3:a2 RADIUS: starting accounting session 3CCCAB948EF045D0
Dec  1 08:15:27 hostapd: eth6: STA f2:6e:24:66:d3:a2 WPA: pairwise key handshake completed (RSN)
Dec  1 08:15:27 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.80 f2:6e:24:66:d3:a2
Dec  1 08:15:27 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.80 f2:6e:24:66:d3:a2 OnePlus-8T
Dec  1 08:15:41 wlceventd: wlceventd_proc_event(527): eth5: Auth 5A:7B:9B:39:38:B3, status: Successful (0), rssi:0
Dec  1 08:15:41 wlceventd: wlceventd_proc_event(556): eth5: Assoc 5A:7B:9B:39:38:B3, status: Successful (0), rssi:-45
Dec  1 08:15:41 hostapd: eth5: STA 5a:7b:9b:39:38:b3 IEEE 802.11: associated
Dec  1 08:15:41 hostapd: eth5: STA 5a:7b:9b:39:38:b3 RADIUS: starting accounting session 7306A581B7CF96A9
Dec  1 08:15:41 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: pairwise key handshake completed (RSN)
Dec  1 08:15:41 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.222 5a:7b:9b:39:38:b3
Dec  1 08:15:41 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.222 5a:7b:9b:39:38:b3
Dec  1 08:15:52 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 08:15:52 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 08:15:52 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-61
Dec  1 08:15:52 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 28CFCC27892F3820
Dec  1 08:15:52 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 08:15:52 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 08:15:52 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 08:16:28 WATCHDOG: [FAUPGRADE][auto_firmware_check7396)]periodic_check AM 3:20
Dec  1 08:16:28 WATCHDOG: [FAUPGRADE][auto_firmware_check7435)]do webs_update
Dec  1 08:16:31 WATCHDOG: [FAUPGRADE][auto_firmware_check7453)]retrieve firmware information
Dec  1 08:16:31 WATCHDOG: [FAUPGRADE][auto_firmware_check7468)]fimrware update check first time
Dec  1 08:16:31 WATCHDOG: [FAUPGRADE][auto_firmware_check7501)]no need to upgrade firmware
Dec  1 08:16:45 wlceventd: wlceventd_proc_event(527): eth6: Auth 26:3A:CA:76:BA:92, status: Successful (0), rssi:0
Dec  1 08:16:45 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: associated
Dec  1 08:16:45 wlceventd: wlceventd_proc_event(556): eth6: Assoc 26:3A:CA:76:BA:92, status: Successful (0), rssi:-86
Dec  1 08:16:45 hostapd: eth6: STA 26:3a:ca:76:ba:92 RADIUS: starting accounting session 3BCF10106597BE00
Dec  1 08:16:45 hostapd: eth6: STA 26:3a:ca:76:ba:92 WPA: pairwise key handshake completed (RSN)
Dec  1 08:16:46 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 08:16:46 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 08:17:31 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: disassociated
Dec  1 08:17:31 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 26:3A:CA:76:BA:92, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-88
Dec  1 08:17:31 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 26:3A:CA:76:BA:92, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-88
Dec  1 08:17:31 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: disassociated
Dec  1 13:17:32 kernel: wl1: random key value: 17B4C476992A647155700344F61051F0CCFF439347E80A6164FC4299D9A72C88
Dec  1 08:17:32 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: disassociated
Dec  1 08:17:32 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 26:3A:CA:76:BA:92, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:32:03 hostapd: eth6: STA f2:6e:24:66:d3:a2 IEEE 802.11: disassociated
Dec  1 08:32:03 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind F2:6E:24:663:A2, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-51
Dec  1 08:32:03 hostapd: eth6: STA f2:6e:24:66:d3:a2 IEEE 802.11: disassociated
Dec  1 08:32:03 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind F2:6E:24:66:D3:A2, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-51
Dec  1 13:32:04 kernel: wl1: random key value: 01490DA025C0795906FA03C7409533F0D8359ECA42E3018124FE2F2C706486B3
Dec  1 08:32:04 wlceventd: wlceventd_proc_event(508): eth6: Disassoc F2:6E:24:66:D3:A2, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:32:04 hostapd: eth6: STA f2:6e:24:66:d3:a2 IEEE 802.11: disassociated
Dec  1 08:32:06 wlceventd: wlceventd_proc_event(527): eth5: Auth DA:C9:70:CD:D2:39, status: Successful (0), rssi:0
Dec  1 08:32:06 hostapd: eth5: STA da:c9:70:cd:d2:39 IEEE 802.11: associated
Dec  1 08:32:06 wlceventd: wlceventd_proc_event(556): eth5: Assoc DA:C9:70:CD:D2:39, status: Successful (0), rssi:-47
Dec  1 08:32:06 hostapd: eth5: STA da:c9:70:cd:d2:39 RADIUS: starting accounting session 8D90791C93AE5B6F
Dec  1 08:32:06 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: pairwise key handshake completed (RSN)
Dec  1 08:32:06 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.202 da:c9:70:cd:d2:39
Dec  1 08:32:06 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.202 da:c9:70:cd:d2:39 OnePlus-8T
Dec  1 13:46:03 kernel: httpds (802): drop_caches: 1
Dec  1 08:46:52 wlceventd: wlceventd_proc_event(527): eth5: Auth E0:F6:B5:9A:36:72, status: Successful (0), rssi:0
Dec  1 08:46:52 hostapd: eth5: STA e0:f6:b5:9a:36:72 IEEE 802.11: associated
Dec  1 08:46:52 wlceventd: wlceventd_proc_event(556): eth5: Assoc E0:F6:B5:9A:36:72, status: Successful (0), rssi:-52
Dec  1 08:46:52 hostapd: eth5: STA e0:f6:b5:9a:36:72 RADIUS: starting accounting session 647D98E25E7C1231
Dec  1 08:46:52 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: pairwise key handshake completed (RSN)
Dec  1 08:46:56 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) e0:f6:b5:9a:36:72
Dec  1 08:46:56 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.39 e0:f6:b5:9a:36:72
Dec  1 08:46:56 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) e0:f6:b5:9a:36:72
Dec  1 08:46:56 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.39 e0:f6:b5:9a:36:72
Dec  1 08:46:56 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.39 e0:f6:b5:9a:36:72
Dec  1 08:46:56 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.39 e0:f6:b5:9a:36:72
Dec  1 13:47:02 kernel: wl0: random key value: 417D609E781C9BBD20EC00AAA4504EFBEA7E1BE5116D005BD0950DB9C48798CC
Dec  1 08:47:02 hostapd: eth5: STA e0:f6:b5:9a:36:72 IEEE 802.11: disassociated
Dec  1 08:47:02 wlceventd: wlceventd_proc_event(508): eth5: Disassoc E0:F6:B5:9A:36:72, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:47:02 wlceventd: wlceventd_proc_event(508): eth5: Disassoc E0:F6:B5:9A:36:72, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:47:02 hostapd: eth5: STA e0:f6:b5:9a:36:72 IEEE 802.11: disassociated
Dec  1 13:53:25 kernel: wl0: random key value: 2569E1C95130ECC8601803756D87D41128D9F67C257F0F842E477492D105F642
Dec  1 08:53:25 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:53:25 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 08:53:25 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 08:53:25 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 08:53:28 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 08:53:28 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-54
Dec  1 08:53:28 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 08:53:28 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 2537C035C0A3ED59
Dec  1 08:53:28 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 08:53:28 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 08:53:28 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 08:53:30 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 08:53:30 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 09:00:47 disk_monitor: Got SIGALRM...
Dec  1 09:13:59 wlceventd: wlceventd_proc_event(527): eth5: Auth E0:F6:B5:9A:36:72, status: Successful (0), rssi:0
Dec  1 09:13:59 hostapd: eth5: STA e0:f6:b5:9a:36:72 IEEE 802.11: associated
Dec  1 09:13:59 wlceventd: wlceventd_proc_event(556): eth5: Assoc E0:F6:B5:9A:36:72, status: Successful (0), rssi:-56
Dec  1 09:13:59 hostapd: eth5: STA e0:f6:b5:9a:36:72 RADIUS: starting accounting session E2B9E5BC10677550
Dec  1 09:13:59 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: pairwise key handshake completed (RSN)
Dec  1 09:13:59 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) e0:f6:b5:9a:36:72
Dec  1 09:13:59 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.39 e0:f6:b5:9a:36:72
Dec  1 09:13:59 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.39 e0:f6:b5:9a:36:72
Dec  1 09:13:59 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.39 e0:f6:b5:9a:36:72
Dec  1 09:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 09:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 09:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 09:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 09:14:27 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 09:14:28 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 14:44:25 kernel: wl0: random key value: 35C18953980C54215B29028C1925F0BA8F73E25641EA0A0DFEF47A6FFF53B191
Dec  1 09:44:25 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:44:25 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:44:25 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:44:25 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:44:28 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 09:44:28 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-54
Dec  1 09:44:28 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 09:44:28 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session ABA6B8276EA5FC4E
Dec  1 09:44:28 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 09:44:29 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 09:44:29 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 14:45:22 kernel: wl0: random key value: E55EC48AB0B26E385663022CA8AA2B3DA4CF6C9E38B60C35D4FD6E1FD7160337
Dec  1 09:45:22 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:45:22 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:45:22 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:45:22 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:45:26 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 09:45:26 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 09:45:26 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-56
Dec  1 09:45:26 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 15F35366065E20F0
Dec  1 09:45:26 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 09:45:26 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 09:45:26 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 14:47:05 kernel: wl0: random key value: BB0EB129A4ED3E470B7E002C742242659ED216C7FC730CAAA03422308F741728
Dec  1 09:47:05 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:47:05 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:47:05 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:47:05 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:47:08 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 09:47:08 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 09:47:08 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-56
Dec  1 09:47:08 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 4454C51DEFBB74F2
Dec  1 09:47:08 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 09:47:09 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 09:47:09 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 14:58:28 kernel: wl0: random key value: F5A4781F7374D48C3BB903A51B06BD5268E47CE549F70EC394881FAF069A0B51
Dec  1 09:58:28 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:58:28 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 09:58:28 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:58:28 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 09:58:31 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 09:58:31 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 09:58:31 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-56
Dec  1 09:58:31 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 5249704BFFA6AB3C
Dec  1 09:58:31 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 09:58:31 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 09:58:31 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 15:04:05 kernel: wl0: random key value: 65FEEEF9BD8C68B1567F030726F23A985930BA632010034C1D15F885BDA2C3F6
Dec  1 10:04:05 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:04:05 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:04:05 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:04:05 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:04:08 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 10:04:08 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 10:04:08 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-60
Dec  1 10:04:08 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 14344FB22C8393EF
Dec  1 10:04:08 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 10:04:08 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:04:08 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 10:14:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 10:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 10:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 10:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 10:14:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 10:46:55 wlceventd: wlceventd_proc_event(527): eth6: Auth 14:7D:DA:DB:A4:53, status: Successful (0), rssi:0
Dec  1 15:49:17 kernel: wl0: random key value: 1673D4DA8CA39F66370903FD591B2FA98DF2BCCAFC9B0B67AB3B846F7D122685
Dec  1 10:49:17 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:49:17 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:49:17 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:49:17 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:49:21 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 10:49:21 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-48
Dec  1 10:49:21 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 10:49:21 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 2D871F4616865E09
Dec  1 10:49:21 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 10:49:21 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:49:21 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:49:41 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 14:7D:DA:DB:A4:53, status: 0, reason: Unspecified reason (1), rssi:0
Dec  1 10:49:41 wlceventd: wlceventd_proc_event(527): eth6: Auth 14:7D:DA:DB:A4:53, status: Successful (0), rssi:0
Dec  1 10:50:48 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 14:7D:DA:DB:A4:53, status: 0, reason: Unspecified reason (1), rssi:0
Dec  1 10:50:48 wlceventd: wlceventd_proc_event(527): eth6: Auth 14:7D:DA:DB:A4:53, status: Successful (0), rssi:0
Dec  1 15:51:56 kernel: wl0: random key value: 0B1FA88249EF1B8C0AFE0239695006DF366D62E8EAEC005D4003964E1F39129F
Dec  1 10:51:56 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:51:56 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:51:56 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:51:56 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:51:59 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 10:51:59 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-49
Dec  1 10:51:59 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 10:51:59 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 83B9537A9A1D2A26
Dec  1 10:51:59 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 10:51:59 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:51:59 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:52:01 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:52:01 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 15:52:45 kernel: wl0: random key value: 1A06EF2A834B72392C4101AAA54B1BB1D57EC0D1B4B00AC5847F820DFDE1154D
Dec  1 10:52:45 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:52:45 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:52:45 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 10:52:45 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 10:52:46 wlceventd: wlceventd_proc_event(527): eth5: Auth 14:7D:DA:DB:A4:53, status: Successful (0), rssi:0
Dec  1 10:52:46 hostapd: eth5: STA 14:7d:da:db:a4:53 IEEE 802.11: associated
Dec  1 10:52:46 wlceventd: wlceventd_proc_event(556): eth5: Assoc 14:7D:DA:DB:A4:53, status: Successful (0), rssi:-43
Dec  1 10:52:46 hostapd: eth5: STA 14:7d:da:db:a4:53 RADIUS: starting accounting session 4DC6028828E86FC9
Dec  1 10:52:46 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: pairwise key handshake completed (RSN)
Dec  1 10:52:49 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 10:52:49 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-46
Dec  1 10:52:49 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 10:52:49 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session F0C8854F40581B25
Dec  1 10:52:49 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 10:52:49 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) 14:7d:da:db:a4:53
Dec  1 10:52:49 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.219 14:7d:da:db:a4:53
Dec  1 10:52:49 dnsmasq-dhcp[787]: DHCPDISCOVER(br0) 14:7d:da:db:a4:53
Dec  1 10:52:49 dnsmasq-dhcp[787]: DHCPOFFER(br0) 192.168.50.219 14:7d:da:db:a4:53
Dec  1 10:52:49 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:52:49 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:52:50 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.219 14:7d:da:db:a4:53
Dec  1 10:52:50 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.219 14:7d:da:db:a4:53 cindyguan-mbp
Dec  1 10:52:51 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 10:52:51 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 11:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 11:14:27 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: group key handshake completed (RSN)
Dec  1 11:14:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 11:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 11:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 11:14:27 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 16:20:33 kernel: wl0: random key value: AF697BE5572B3B6F651A00B2EFD6B98DE6B2F6C16E140D16E80B1A5B7C1012AA
Dec  1 11:20:33 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 11:20:33 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 11:20:33 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 11:20:33 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 11:20:36 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 11:20:36 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 11:20:36 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-48
Dec  1 11:20:36 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 2DC3A3B670757C25
Dec  1 11:20:36 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 11:20:36 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:20:36 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:20:38 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:20:38 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 16:43:23 kernel: wl0: random key value: F27C3F2DD5FB45F5760601E2C60FA3279F86379140B107B36AD2D5A2E4ADDF85
Dec  1 11:43:23 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 11:43:23 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 11:43:23 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 11:43:23 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 11:43:27 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 11:43:27 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 3E:5B:98:88:52:87, status: 0, reason: Unspecified reason (1), rssi:0
Dec  1 11:43:27 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 11:43:27 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 11:43:27 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-44
Dec  1 11:43:27 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 95236B544853FB46
Dec  1 11:43:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 11:43:27 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:43:27 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:43:28 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:43:28 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 11:51:19 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 14:7D:DA:DB:A4:53, status: 0, reason: Disassociated due to inactivity (4), rssi:0
Dec  1 11:51:19 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 14:7D:DA:DB:A4:53, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 11:51:19 hostapd: eth6: STA 14:7d:da:db:a4:53 IEEE 802.11: disassociated
Dec  1 11:51:19 hostapd: eth6: STA 14:7d:da:db:a4:53 IEEE 802.11: disassociated
Dec  1 17:04:36 kernel: wl0: random key value: 260F0C6E836F9FBB1D33027DF1F404D271FEE959317806CB6C865AC584265E2A
Dec  1 12:04:36 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:04:36 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:04:36 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:04:36 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:04:40 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 12:04:40 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 12:04:40 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-42
Dec  1 12:04:40 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 3FE6A5A2D0A743BA
Dec  1 12:04:40 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 12:04:40 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:04:40 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 17:07:34 kernel: wl0: random key value: 90DEC70416B66CAC79780314F38D9AA0A2DDF47A491F0E1C009A40F6EAE57FF5
Dec  1 12:07:34 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:07:34 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:07:34 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:07:34 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:07:38 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 12:07:38 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-49
Dec  1 12:07:38 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 12:07:38 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session F40597A264D1BF47
Dec  1 12:07:38 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 12:07:38 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:07:38 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:07:39 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:07:39 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 17:09:04 kernel: wl0: random key value: 28308BE7F49B7D3D4FEE01FFD9A83D3080747D97FF5D04C6716CC03E60B7D64F
Dec  1 12:09:04 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:09:04 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:09:04 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:09:04 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:09:07 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 12:09:07 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-46
Dec  1 12:09:07 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 12:09:07 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session B2CC5D8E20B1775D
Dec  1 12:09:07 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 12:09:07 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:09:07 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:09:08 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:09:08 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 17:09:40 kernel: wl0: random key value: 92CE2BC06E4095522F990389240BD766FA8F1373115605827E95EDAD7F798E30
Dec  1 12:09:40 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:09:40 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:09:40 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:09:40 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:09:43 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 12:09:43 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 12:09:43 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-47
Dec  1 12:09:43 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session E9C7349371A33578
Dec  1 12:09:43 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 12:09:43 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:09:43 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:09:45 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:09:45 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 17:12:29 kernel: wl0: random key value: FCDDDE1E6C80F13A314C0206BC82BC601F3D2F2423840355426E444F540D32E3
Dec  1 12:12:29 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:12:29 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:12:29 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:12:29 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:12:33 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 12:12:33 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 12:12:33 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-47
Dec  1 12:12:33 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 34B82F5D3EC885A5
Dec  1 12:12:33 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 12:12:33 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:12:33 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:12:34 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:12:34 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 17:13:27 kernel: wl0: random key value: C4CE7E6C58AA12E8665202E81D87BEC1912AF1E67C98096B2DA72F52ECFD7D11
Dec  1 12:13:27 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:13:27 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:13:27 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: disassociated
Dec  1 12:13:27 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 3E:5B:98:88:52:87, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Dec  1 12:13:27 wlceventd: wlceventd_proc_event(527): eth5: Auth 3E:5B:98:88:52:87, status: Successful (0), rssi:0
Dec  1 12:13:27 wlceventd: wlceventd_proc_event(556): eth5: Assoc 3E:5B:98:88:52:87, status: Successful (0), rssi:-44
Dec  1 12:13:27 hostapd: eth5: STA 3e:5b:98:88:52:87 IEEE 802.11: associated
Dec  1 12:13:27 hostapd: eth5: STA 3e:5b:98:88:52:87 RADIUS: starting accounting session 3A978119B54D5C6A
Dec  1 12:13:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: pairwise key handshake completed (RSN)
Dec  1 12:13:28 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:13:28 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.250 3e:5b:98:88:52:87
Dec  1 12:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 12:14:27 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: group key handshake completed (RSN)
Dec  1 12:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 12:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 12:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 12:14:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 12:14:29 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 13:14:27 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: group key handshake completed (RSN)
Dec  1 13:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 13:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 13:14:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 13:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 13:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 13:14:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 13:25:30 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.214 2c:aa:8e:df:b6:1b
Dec  1 13:25:30 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.214 2c:aa:8e:df:b6:1b
Dec  1 19:11:26 kernel: httpds (802): drop_caches: 1
Dec  1 14:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 14:14:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 14:14:27 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: group key handshake completed (RSN)
Dec  1 14:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 14:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 14:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 14:14:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 14:25:18 acsd: eth6: selected_chspec is 0xe29b (157/80)
Dec  1 14:25:18 acsd: eth6: Adjusted channel spec: 0xe29b (157/80)
Dec  1 14:25:18 acsd: eth6: selected channel spec: 0xe29b (157/80)
Dec  1 14:25:18 acsd: eth6 Performing CSA on chspec 0xe29b
Dec  1 15:14:27 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: group key handshake completed (RSN)
Dec  1 15:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 15:14:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 15:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 15:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 15:14:27 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 15:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 16:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 16:14:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 16:14:27 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: group key handshake completed (RSN)
Dec  1 16:14:27 hostapd: eth5: STA da:c9:70:cd:d2:39 WPA: group key handshake completed (RSN)
Dec  1 16:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 16:14:28 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 16:14:28 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 21:58:04 kernel: wl0: random key value: 0B04D106D2C0124A1B670242F060D87AAC17A3C5E2660AEBF6F37F460709D14E
Dec  1 16:58:04 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind DA:C9:70:CD:D2:39, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:0
Dec  1 16:58:04 hostapd: eth5: STA da:c9:70:cd:d2:39 IEEE 802.11: disassociated
Dec  1 17:14:27 hostapd: eth5: STA 90:3c:92:cb:5e:d8 WPA: group key handshake completed (RSN)
Dec  1 17:14:27 hostapd: eth5: STA 14:7d:da:db:a4:53 WPA: group key handshake completed (RSN)
Dec  1 17:14:27 hostapd: eth5: STA e0:f6:b5:9a:36:72 WPA: group key handshake completed (RSN)
Dec  1 17:14:27 hostapd: eth5: STA 3e:5b:98:88:52:87 WPA: group key handshake completed (RSN)
Dec  1 17:14:27 hostapd: eth5: STA 2c:aa:8e:df:b6:1b WPA: group key handshake completed (RSN)
Dec  1 17:14:27 hostapd: eth5: STA 5a:7b:9b:39:38:b3 WPA: group key handshake completed (RSN)
Dec  1 17:17:29 wlceventd: wlceventd_proc_event(527): eth6: Auth 26:3A:CA:76:BA:92, status: Successful (0), rssi:0
Dec  1 17:17:30 hostapd: eth6: STA 26:3a:ca:76:ba:92 IEEE 802.11: associated
Dec  1 17:17:30 wlceventd: wlceventd_proc_event(556): eth6: Assoc 26:3A:CA:76:BA:92, status: Successful (0), rssi:-50
Dec  1 17:17:30 hostapd: eth6: STA 26:3a:ca:76:ba:92 RADIUS: starting accounting session 093E40D7B15B27C2
Dec  1 17:17:30 hostapd: eth6: STA 26:3a:ca:76:ba:92 WPA: pairwise key handshake completed (RSN)
Dec  1 17:17:30 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 17:17:30 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.69 26:3a:ca:76:ba:92
Dec  1 17:23:22 wlceventd: wlceventd_proc_event(527): eth5: Auth A2:E2:AA:4D:DB:80, status: Successful (0), rssi:0
Dec  1 17:23:22 wlceventd: wlceventd_proc_event(556): eth5: Assoc A2:E2:AA:4D:DB:80, status: Successful (0), rssi:-38
Dec  1 17:23:22 hostapd: eth5: STA a2:e2:aa:4d:db:80 IEEE 802.11: associated
Dec  1 17:23:23 hostapd: eth5: STA a2:e2:aa:4d:db:80 RADIUS: starting accounting session 6B24C95CA8D855E3
Dec  1 17:23:23 hostapd: eth5: STA a2:e2:aa:4d:db:80 WPA: pairwise key handshake completed (RSN)
Dec  1 17:23:23 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Dec  1 17:23:23 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Dec  1 17:23:26 dnsmasq-dhcp[787]: DHCPREQUEST(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Dec  1 17:23:26 dnsmasq-dhcp[787]: DHCPACK(br0) 192.168.50.44 a2:e2:aa:4d:db:80
Dec  1 22:23:30 kernel: httpd (803): drop_caches: 1


632

主题

6223

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16981

RT-AC88URT-AX68U

发表于 2021-12-2 09:38:48 | 显示全部楼层
yangren13 发表于 2021-12-2 01:47
从描述上看我和这个贴主的问题有点儿像
https://52asus.com/thread-16572-1-1.html

那位用户没有跟进回复,不大好收敛问题点。

你留意一下你的客户端,问题是只集中在无线客户端,还是有线客户端也会发生。若有线客户端正常的话,有线客户端出网正不正常。

7

主题

36

回帖

287

积分

中级会员

Rank: 3Rank: 3

积分
287
 楼主| 发表于 2021-12-2 12:58:58 | 显示全部楼层
Master 发表于 2021-12-2 09:38
那位用户没有跟进回复,不大好收敛问题点。

你留意一下你的客户端,问题是只集中在无线客户端,还是有线 ...

今天试了有线客户端,跟无线客户端一样有出网问题。
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

快速回复 返回列表 搜索 官方QQ群
×

秒后自动关闭

小黑屋|手机版|Archiver|华硕网络产品技术交流平台 ( 苏ICP备16010857号-1 )苏公网安备 32050502000499号

GMT+8, 2024-6-17 20:10 , Processed in 0.060838 second(s), 31 queries .

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表