Guest User

Untitled

a guest
Jan 29th, 2024
20
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 67.89 KB | None | 0 0
  1. # logread
  2. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 10.577311] ath10k_pci 0000:01:00.0: enabling bus mastering
  3. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 10.577684] qcom-pcie 1b500000.pci: msi#1 address_hi 0x0 address_lo 0x4323ba98
  4. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 10.577799] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
  5. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 11.199009] ath10k_pci 0000:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
  6. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 11.199056] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
  7. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 11.209555] ath10k_pci 0000:01:00.0: firmware ver 10.4b-ct-9984-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 7ea63dc5
  8. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 13.545210] ath10k_pci 0000:01:00.0: Loading BDF type 0
  9. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 13.552959] ath10k_pci 0000:01:00.0: board_file api 2 bmi_id 0:1 crc32 0bfe5c35
  10. Tue Nov 14 13:48:34 2023 kern.warn kernel: [ 17.110506] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  11. Tue Nov 14 13:48:34 2023 kern.warn kernel: [ 17.110548] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
  12. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 17.192593] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  13. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 17.193423] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  14. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 17.483150] ath10k_pci 0000:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-nvmem max-sta 32 raw 0 hwcrypto 1
  15. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.568503] ath: EEPROM regdomain: 0x0
  16. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.568512] ath: EEPROM indicates default country code should be used
  17. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.568516] ath: doing EEPROM country->regdmn map search
  18. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.568521] ath: country maps to regdmn code: 0x3a
  19. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.568526] ath: Country alpha2 being used: US
  20. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.568530] ath: Regpair used: 0x3a
  21. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.570186] ath10k_pci 0001:01:00.0: assign IRQ: got 45
  22. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 17.570210] ath10k 5.15 driver, optimized for CT firmware, probing pci device: 0x46.
  23. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 17.570747] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142)
  24. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.577149] ath10k_pci 0001:01:00.0: enabling bus mastering
  25. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 17.577593] qcom-pcie 1b700000.pci: msi#1 address_hi 0x0 address_lo 0x4322f698
  26. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 17.577729] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
  27. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 18.099287] ath10k_pci 0001:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
  28. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 18.099329] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
  29. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 18.110023] ath10k_pci 0001:01:00.0: firmware ver 10.4b-ct-9984-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 7ea63dc5
  30. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 20.433789] ath10k_pci 0001:01:00.0: Loading BDF type 0
  31. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 20.434577] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id 0:2 crc32 0bfe5c35
  32. Tue Nov 14 13:48:34 2023 kern.warn kernel: [ 23.989410] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  33. Tue Nov 14 13:48:34 2023 kern.warn kernel: [ 23.989485] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
  34. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 24.073504] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  35. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 24.074365] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  36. Tue Nov 14 13:48:34 2023 kern.info kernel: [ 24.457324] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-nvmem max-sta 32 raw 0 hwcrypto 1
  37. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 24.538127] ath: EEPROM regdomain: 0x0
  38. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 24.538136] ath: EEPROM indicates default country code should be used
  39. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 24.538139] ath: doing EEPROM country->regdmn map search
  40. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 24.538144] ath: country maps to regdmn code: 0x3a
  41. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 24.538149] ath: Country alpha2 being used: US
  42. Tue Nov 14 13:48:34 2023 kern.debug kernel: [ 24.538152] ath: Regpair used: 0x3a
  43. Tue Nov 14 13:48:34 2023 user.info kernel: [ 24.542425] kmodloader: done loading kernel modules from /etc/modules.d/*
  44. Tue Nov 14 13:48:35 2023 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  45. Tue Nov 14 13:48:35 2023 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  46. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: started, version 2.89 cachesize 1000
  47. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: DNS service limited to local subnets
  48. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
  49. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
  50. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
  51. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
  52. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
  53. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
  54. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
  55. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
  56. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
  57. Tue Nov 14 13:48:35 2023 daemon.warn dnsmasq[1]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
  58. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
  59. Tue Nov 14 13:48:35 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 0 names
  60. Tue Nov 14 13:48:35 2023 authpriv.info dropbear[921]: Not backgrounding
  61. Tue Nov 14 13:48:36 2023 daemon.notice wpa_supplicant[1044]: Successfully initialized wpa_supplicant
  62. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: bonding
  63. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: 8021ad
  64. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: 8021q
  65. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: macvlan
  66. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: veth
  67. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: bridge
  68. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: Network device
  69. Tue Nov 14 13:48:37 2023 user.notice : Added device handler type: tunnel
  70. Tue Nov 14 13:48:37 2023 daemon.notice procd: /etc/rc.d/S25packet_steering: uci: Entry not found
  71. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/network
  72. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/wireless
  73. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/luci-splash reload dependency on /etc/config/firewall
  74. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/qos reload dependency on /etc/config/firewall
  75. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/miniupnpd reload dependency on /etc/config/firewall
  76. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/odhcpd reload dependency on /etc/config/dhcp
  77. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.446631] ipq806x-gmac-dwmac 37400000.ethernet eth1: Register MEM_TYPE_PAGE_POOL RxQ-0
  78. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.447318] dwmac1000: Master AXI performs any burst length
  79. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.453793] ipq806x-gmac-dwmac 37400000.ethernet eth1: No Safety Features support found
  80. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.469180] ipq806x-gmac-dwmac 37400000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
  81. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.469323] ipq806x-gmac-dwmac 37400000.ethernet eth1: registered PTP clock
  82. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.477106] ipq806x-gmac-dwmac 37400000.ethernet eth1: configuring for fixed/sgmii link mode
  83. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.485592] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
  84. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.492641] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  85. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
  86. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.506864] br-lan: port 1(eth1.1) entered blocking state
  87. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.507454] br-lan: port 1(eth1.1) entered disabled state
  88. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.513190] device eth1.1 entered promiscuous mode
  89. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.518438] device eth1 entered promiscuous mode
  90. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'lan' is enabled
  91. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'lan' is setting up now
  92. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.526186] br-lan: port 1(eth1.1) entered blocking state
  93. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.527830] br-lan: port 1(eth1.1) entered forwarding state
  94. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'lan' is now up
  95. Tue Nov 14 13:48:38 2023 daemon.notice netifd: bridge 'br-lan' link is up
  96. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'lan' has link connectivity
  97. Tue Nov 14 13:48:38 2023 daemon.notice netifd: VLAN 'eth1.1' link is up
  98. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'loopback' is enabled
  99. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'loopback' is setting up now
  100. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'loopback' is now up
  101. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.544759] ipq806x-gmac-dwmac 37200000.ethernet eth0: Register MEM_TYPE_PAGE_POOL RxQ-0
  102. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.545520] dwmac1000: Master AXI performs any burst length
  103. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.551917] ipq806x-gmac-dwmac 37200000.ethernet eth0: No Safety Features support found
  104. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.567305] ipq806x-gmac-dwmac 37200000.ethernet eth0: IEEE 1588-2008 Advanced Timestamp supported
  105. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.567457] ipq806x-gmac-dwmac 37200000.ethernet eth0: registered PTP clock
  106. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.598217] ipq806x-gmac-dwmac 37200000.ethernet eth0: configuring for fixed/rgmii link mode
  107. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.598503] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
  108. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
  109. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'wan' is enabled
  110. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'wan6' is enabled
  111. Tue Nov 14 13:48:38 2023 kern.info kernel: [ 28.609983] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  112. Tue Nov 14 13:48:38 2023 daemon.notice netifd: bridge 'br-lan' link is down
  113. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'lan' has link connectivity loss
  114. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Network device 'eth1' link is up
  115. Tue Nov 14 13:48:38 2023 daemon.notice netifd: VLAN 'eth1.1' link is down
  116. Tue Nov 14 13:48:38 2023 daemon.notice netifd: VLAN 'eth1.1' link is up
  117. Tue Nov 14 13:48:38 2023 daemon.notice netifd: bridge 'br-lan' link is up
  118. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'lan' has link connectivity
  119. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Network device 'lo' link is up
  120. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'loopback' has link connectivity
  121. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Network device 'eth0' link is up
  122. Tue Nov 14 13:48:38 2023 daemon.notice netifd: VLAN 'eth0.2' link is up
  123. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'wan' has link connectivity
  124. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'wan' is setting up now
  125. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'wan6' has link connectivity
  126. Tue Nov 14 13:48:38 2023 daemon.notice netifd: Interface 'wan6' is setting up now
  127. Tue Nov 14 13:48:38 2023 daemon.notice netifd: radio0 (1510): WARNING: Variable 'data' does not exist or is not an array/object
  128. Tue Nov 14 13:48:38 2023 daemon.err odhcp6c[1542]: Failed to send RS (Address not available)
  129. Tue Nov 14 13:48:38 2023 daemon.notice netifd: radio1 (1511): WARNING: Variable 'data' does not exist or is not an array/object
  130. Tue Nov 14 13:48:38 2023 daemon.notice netifd: wan (1558): udhcpc: started, v1.36.1
  131. Tue Nov 14 13:48:38 2023 daemon.notice hostapd: Set new config for phy phy1:
  132. Tue Nov 14 13:48:38 2023 daemon.notice wpa_supplicant[1044]: Set new config for phy phy1
  133. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/luci_statistics reload dependency on /etc/config/system
  134. Tue Nov 14 13:48:38 2023 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/system
  135. Tue Nov 14 13:48:38 2023 daemon.notice netifd: wan (1558): udhcpc: broadcasting discover
  136. Tue Nov 14 13:48:38 2023 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  137. Tue Nov 14 13:48:38 2023 daemon.notice hostapd: Set new config for phy phy0:
  138. Tue Nov 14 13:48:38 2023 daemon.notice wpa_supplicant[1044]: Set new config for phy phy0
  139. Tue Nov 14 13:48:39 2023 daemon.err odhcp6c[1542]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
  140. Tue Nov 14 13:48:39 2023 kern.info kernel: [ 29.515188] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
  141. Tue Nov 14 13:48:39 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led USB 1
  142. Tue Nov 14 13:48:39 2023 daemon.notice wpa_supplicant[1044]: Set new config for phy phy0
  143. Tue Nov 14 13:48:39 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led USB 2
  144. Tue Nov 14 13:48:39 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN
  145. Tue Nov 14 13:48:39 2023 daemon.notice wpa_supplicant[1044]: Set new config for phy phy1
  146. Tue Nov 14 13:48:39 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led eSATA
  147. Tue Nov 14 13:48:39 2023 daemon.notice procd: /etc/rc.d/S96led: Skipping trigger 'disk-activity' for led 'eSATA' due to missing kernel module
  148. Tue Nov 14 13:48:39 2023 daemon.notice hostapd: Set new config for phy phy0: /var/run/hostapd-phy0.conf
  149. Tue Nov 14 13:48:39 2023 daemon.notice hostapd: Restart interface for phy phy0
  150. Tue Nov 14 13:48:39 2023 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 hw_mode=a beacon_int=100 chanlist=36 tx_queue_data2_burst=2.0 #num_global_macaddr=1 ieee80211n=1 ht_coex=0 ht_capab=[HT40+][LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935][DSSS_CCK-40] ieee80211ac=1 vht_oper_chwidth=1 vht_oper_centr_freq_seg0_idx=42 vht_capab=[RXLDPC][SHORT-GI-80][SHORT-GI-160][TX-STBC-2BY1][SU-BEAMFORMER][SU-BEAMFORMEE][MU-BEAMFORMER][MU-BEAMFORMEE][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][SOUNDING-DIMENSION-4][BF-ANTENNA-4][VHT160-80PLUS80][MAX-MPDU-11454][MAX-A-MPDU-LEN-EXP7] channel=36 interface=phy0-ap0 bssid=bc:a5:11:b9:43:3a ctrl_interface=/var/run/hostapd ap_isolate=1 bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity_poll=0 preamble=1 wmm_enabled=1 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 sae_require_mfp=1 sae_pwe=2 wpa_passphrase=z9LFF
  151. Tue Nov 14 13:48:39 2023 daemon.info procd: - init complete -
  152. Tue Nov 14 13:48:40 2023 daemon.err odhcp6c[1542]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
  153. Tue Nov 14 13:48:42 2023 daemon.err odhcp6c[1542]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
  154. Tue Nov 14 13:48:42 2023 daemon.err odhcp6c[1542]: Failed to send RS (Address not available)
  155. Tue Nov 14 13:48:45 2023 kern.warn kernel: [ 35.622307] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  156. Tue Nov 14 13:48:45 2023 kern.warn kernel: [ 35.622348] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
  157. Tue Nov 14 13:48:45 2023 kern.info kernel: [ 35.704385] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  158. Tue Nov 14 13:48:45 2023 kern.info kernel: [ 35.705216] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  159. Tue Nov 14 13:48:45 2023 daemon.notice netifd: wan (1558): udhcpc: broadcasting discover
  160. Tue Nov 14 13:48:45 2023 daemon.notice netifd: wan (1558): udhcpc: broadcasting discover
  161. Tue Nov 14 13:48:45 2023 kern.info kernel: [ 36.106692] ath10k_pci 0000:01:00.0: rts threshold -1
  162. Tue Nov 14 13:48:45 2023 kern.warn kernel: [ 36.106912] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
  163. Tue Nov 14 13:48:45 2023 kern.info kernel: [ 36.113421] br-lan: port 2(phy0-ap0) entered blocking state
  164. Tue Nov 14 13:48:45 2023 kern.info kernel: [ 36.121750] br-lan: port 2(phy0-ap0) entered disabled state
  165. Tue Nov 14 13:48:45 2023 daemon.notice hostapd: phy0-ap0: interface state UNINITIALIZED->HT_SCAN
  166. Tue Nov 14 13:48:45 2023 kern.info kernel: [ 36.127362] device phy0-ap0 entered promiscuous mode
  167. Tue Nov 14 13:48:45 2023 daemon.notice hostapd: Set new config for phy phy1: /var/run/hostapd-phy1.conf
  168. Tue Nov 14 13:48:45 2023 daemon.notice hostapd: Restart interface for phy phy1
  169. Tue Nov 14 13:48:46 2023 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 hw_mode=g supported_rates=60 90 120 180 240 360 480 540 basic_rates=60 120 240 beacon_int=100 chanlist=1 #num_global_macaddr=1 ieee80211n=1 ht_coex=0 ht_capab=[LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935][DSSS_CCK-40] channel=1 interface=phy1-ap0 bssid=bc:a5:11:b9:43:3b ctrl_interface=/var/run/hostapd ap_isolate=1 bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity_poll=0 preamble=1 wmm_enabled=1 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 auth_algs=1 wpa=0 ssid=OpenWrt bridge=br-lan wds_bridge= snoop_iface=br-lan qos_map_set=0,0,2,16,1,1,255,255,18,22,24,38,40,40,44,46,48,56 #default_macaddr nas_identifier=bca511b9433b bss=phy1-ap1 bssid=be:a5:11:b9:43:3b ctrl_interface=/var/run/hostapd bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity
  170. Tue Nov 14 13:48:46 2023 kern.info kernel: [ 36.292243] ath10k_pci 0000:01:00.0: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
  171. Tue Nov 14 13:48:46 2023 kern.warn kernel: [ 37.051292] ath10k_pci 0000:01:00.0: mac-vif-chan had error in htt_rx_h_vdev_channel, peer-id: 0 vdev-id: 0 peer-addr: bc:a5:11:b9:43:3a.
  172. Tue Nov 14 13:48:49 2023 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
  173. Tue Nov 14 13:48:51 2023 kern.warn kernel: [ 42.092290] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  174. Tue Nov 14 13:48:51 2023 kern.warn kernel: [ 42.092332] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
  175. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.176408] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  176. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.177272] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  177. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.627785] ath10k_pci 0001:01:00.0: rts threshold -1
  178. Tue Nov 14 13:48:52 2023 kern.warn kernel: [ 42.628248] ath10k_pci 0001:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
  179. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.633007] br-lan: port 3(phy1-ap0) entered blocking state
  180. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.642875] br-lan: port 3(phy1-ap0) entered disabled state
  181. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.648471] device phy1-ap0 entered promiscuous mode
  182. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.653883] br-lan: port 3(phy1-ap0) entered blocking state
  183. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.659058] br-lan: port 3(phy1-ap0) entered forwarding state
  184. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.664658] br-lan: port 3(phy1-ap0) entered disabled state
  185. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: started, version 2.89 cachesize 1000
  186. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: DNS service limited to local subnets
  187. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
  188. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
  189. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
  190. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
  191. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
  192. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
  193. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
  194. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
  195. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
  196. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
  197. Tue Nov 14 13:48:52 2023 daemon.warn dnsmasq[1]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
  198. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
  199. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
  200. Tue Nov 14 13:48:52 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
  201. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.965917] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap0: link becomes ready
  202. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.966107] br-lan: port 3(phy1-ap0) entered blocking state
  203. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.971349] br-lan: port 3(phy1-ap0) entered forwarding state
  204. Tue Nov 14 13:48:52 2023 daemon.notice netifd: Network device 'phy1-ap0' link is up
  205. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 42.983349] ath10k_pci 0001:01:00.0: rts threshold -1
  206. Tue Nov 14 13:48:52 2023 kern.info kernel: [ 43.021488] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap1: link becomes ready
  207. Tue Nov 14 13:48:52 2023 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->ENABLED
  208. Tue Nov 14 13:48:52 2023 daemon.notice hostapd: phy1-ap0: AP-ENABLED
  209. Tue Nov 14 13:48:53 2023 daemon.notice netifd: Wireless device 'radio0' is now up
  210. Tue Nov 14 13:48:53 2023 kern.info kernel: [ 43.467667] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap0: link becomes ready
  211. Tue Nov 14 13:48:53 2023 kern.info kernel: [ 43.467817] br-lan: port 2(phy0-ap0) entered blocking state
  212. Tue Nov 14 13:48:53 2023 kern.info kernel: [ 43.473089] br-lan: port 2(phy0-ap0) entered forwarding state
  213. Tue Nov 14 13:48:53 2023 daemon.notice netifd: Network device 'phy0-ap0' link is up
  214. Tue Nov 14 13:48:53 2023 daemon.notice hostapd: phy0-ap0: interface state HT_SCAN->ENABLED
  215. Tue Nov 14 13:48:53 2023 daemon.notice hostapd: phy0-ap0: AP-ENABLED
  216. Tue Nov 14 13:48:53 2023 daemon.notice netifd: Wireless device 'radio1' is now up
  217. Tue Nov 14 13:49:24 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: authenticated
  218. Tue Nov 14 13:49:24 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: associated (aid 1)
  219. Tue Nov 14 13:49:24 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8c:70:5a:37:9f:4a auth_alg=open
  220. Tue Nov 14 13:49:24 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a WPA: pairwise key handshake completed (RSN)
  221. Tue Nov 14 13:49:24 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8c:70:5a:37:9f:4a
  222. Tue Nov 14 13:49:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 8c:70:5a:37:9f:4a
  223. Tue Nov 14 13:49:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a
  224. Tue Nov 14 13:49:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 8c:70:5a:37:9f:4a
  225. Tue Nov 14 13:49:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a
  226. Tue Nov 14 13:49:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a
  227. Tue Nov 14 13:49:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a renoir
  228. Tue Nov 14 13:49:36 2023 daemon.err uhttpd[1324]: [info] luci: accepted login on / for root from 192.168.1.190
  229. Tue Nov 14 13:50:30 2023 kern.info kernel: [ 141.076005] device phy1-ap0 left promiscuous mode
  230. Tue Nov 14 13:50:30 2023 kern.info kernel: [ 141.076123] br-lan: port 3(phy1-ap0) entered disabled state
  231. Tue Nov 14 13:50:31 2023 daemon.notice wpa_supplicant[1044]: Set new config for phy phy1
  232. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: Set new config for phy phy1: /var/run/hostapd-phy1.conf
  233. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: Remove bss 'phy1-ap0' on phy 'phy1'
  234. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: phy1-ap0: AP-DISABLED
  235. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: phy1-ap0: CTRL-EVENT-TERMINATING
  236. Tue Nov 14 13:50:32 2023 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
  237. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: nl80211: Failed to remove interface phy1-ap0 from bridge br-lan: Invalid argument
  238. Tue Nov 14 13:50:32 2023 kern.warn kernel: [ 142.225376] ath10k_pci 0001:01:00.0: peer-unmap-event: unknown peer id 0
  239. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: Rename bss phy1-ap1 to phy1-ap0
  240. Tue Nov 14 13:50:32 2023 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
  241. Tue Nov 14 13:50:32 2023 kern.info kernel: [ 142.325654] ath10k_pci 0001:01:00.0 phy1-ap0: renamed from phy1-ap1 (while UP)
  242. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: Update config data files for bss phy1-ap0
  243. Tue Nov 14 13:50:32 2023 daemon.notice hostapd: Reloaded settings for phy phy1
  244. Tue Nov 14 13:50:32 2023 daemon.notice netifd: Wireless device 'radio1' is now up
  245. Tue Nov 14 13:50:33 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
  246. Tue Nov 14 13:50:33 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
  247. Tue Nov 14 13:50:33 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
  248. Tue Nov 14 13:50:34 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  249. Tue Nov 14 13:50:34 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
  250. Tue Nov 14 13:50:34 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
  251. Tue Nov 14 13:50:34 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
  252. Tue Nov 14 13:50:34 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
  253. Tue Nov 14 13:50:50 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  254. Tue Nov 14 13:51:03 2023 daemon.info hostapd: phy0-ap0: STA 98:54:1b:1d:bf:19 IEEE 802.11: associated (aid 2)
  255. Tue Nov 14 13:51:03 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 98:54:1b:1d:bf:19 auth_alg=sae
  256. Tue Nov 14 13:51:03 2023 daemon.info hostapd: phy0-ap0: STA 98:54:1b:1d:bf:19 WPA: pairwise key handshake completed (RSN)
  257. Tue Nov 14 13:51:03 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 98:54:1b:1d:bf:19
  258. Tue Nov 14 13:51:04 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.200 98:54:1b:1d:bf:19
  259. Tue Nov 14 13:51:04 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.200 98:54:1b:1d:bf:19 degas
  260. Tue Nov 14 13:51:05 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  261. Tue Nov 14 13:51:05 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
  262. Tue Nov 14 13:51:05 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
  263. Tue Nov 14 13:51:05 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 4 names
  264. Tue Nov 14 13:51:05 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
  265. Tue Nov 14 13:51:06 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  266. Tue Nov 14 13:55:09 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  267. Tue Nov 14 13:56:04 2023 daemon.err uhttpd[1324]: [info] luci: accepted login on / for root from fde3:e1b4:968a:0:105a:9a65:c1fd:1267
  268. Tue Nov 14 13:56:21 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 98:54:1b:1d:bf:19
  269. Tue Nov 14 13:56:21 2023 kern.info kernel: [ 491.865143] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  270. Tue Nov 14 14:00:06 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  271. Tue Nov 14 14:07:57 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  272. Tue Nov 14 14:08:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.106 d4:be:d9:2c:6e:95
  273. Tue Nov 14 14:08:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.106 d4:be:d9:2c:6e:95 renoir
  274. Tue Nov 14 14:08:58 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  275. Tue Nov 14 14:08:58 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
  276. Tue Nov 14 14:08:58 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
  277. Tue Nov 14 14:08:58 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 6 names
  278. Tue Nov 14 14:08:58 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
  279. Tue Nov 14 14:09:07 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 8c:70:5a:37:9f:4a
  280. Tue Nov 14 14:09:07 2023 kern.info kernel: [ 1257.465137] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  281. Tue Nov 14 14:10:37 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.106 d4:be:d9:2c:6e:95
  282. Tue Nov 14 14:10:37 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.106 d4:be:d9:2c:6e:95 renoir
  283. Tue Nov 14 14:10:38 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  284. Tue Nov 14 14:15:34 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  285. Tue Nov 14 14:20:18 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  286. Tue Nov 14 14:24:39 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  287. Tue Nov 14 14:34:12 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  288. Tue Nov 14 14:43:11 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  289. Tue Nov 14 14:47:20 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  290. Tue Nov 14 14:55:06 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  291. Tue Nov 14 15:04:46 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  292. Tue Nov 14 15:14:13 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  293. Tue Nov 14 15:20:50 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  294. Tue Nov 14 15:25:52 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  295. Tue Nov 14 15:32:13 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  296. Tue Nov 14 15:40:03 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  297. Tue Nov 14 15:44:06 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  298. Tue Nov 14 15:47:31 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  299. Tue Nov 14 15:54:33 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  300. Tue Nov 14 16:03:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  301. Tue Nov 14 16:09:24 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  302. Tue Nov 14 16:17:12 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  303. Tue Nov 14 16:26:27 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  304. Tue Nov 14 16:33:29 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  305. Tue Nov 14 16:41:16 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  306. Tue Nov 14 16:49:03 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: authenticated
  307. Tue Nov 14 16:49:03 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: associated (aid 1)
  308. Tue Nov 14 16:49:03 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8c:70:5a:37:9f:4a auth_alg=open
  309. Tue Nov 14 16:49:03 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a WPA: pairwise key handshake completed (RSN)
  310. Tue Nov 14 16:49:03 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8c:70:5a:37:9f:4a
  311. Tue Nov 14 16:49:03 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a
  312. Tue Nov 14 16:49:03 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a renoir
  313. Tue Nov 14 16:49:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  314. Tue Nov 14 16:49:35 2023 daemon.err uhttpd[1324]: [info] luci: accepted login on / for root from fde3:e1b4:968a:0:a9fa:2eaa:1a86:44c7
  315. Tue Nov 14 16:50:47 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  316. Tue Nov 14 16:52:44 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: authenticated
  317. Tue Nov 14 16:52:44 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: associated (aid 2)
  318. Tue Nov 14 16:52:44 2023 daemon.notice hostapd: phy0-ap0: AP-STA-POSSIBLE-PSK-MISMATCH 9c:d2:1e:91:71:89
  319. Tue Nov 14 16:52:45 2023 daemon.notice hostapd: phy0-ap0: AP-STA-POSSIBLE-PSK-MISMATCH 9c:d2:1e:91:71:89
  320. Tue Nov 14 16:52:46 2023 daemon.notice hostapd: phy0-ap0: AP-STA-POSSIBLE-PSK-MISMATCH 9c:d2:1e:91:71:89
  321. Tue Nov 14 16:52:47 2023 kern.info kernel: [11077.935131] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  322. Tue Nov 14 16:52:52 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: deauthenticated due to local deauth request
  323. Tue Nov 14 16:53:23 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: authenticated
  324. Tue Nov 14 16:53:23 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: associated (aid 2)
  325. Tue Nov 14 16:53:23 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 9c:d2:1e:91:71:89 auth_alg=open
  326. Tue Nov 14 16:53:23 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 WPA: pairwise key handshake completed (RSN)
  327. Tue Nov 14 16:53:23 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 9c:d2:1e:91:71:89
  328. Tue Nov 14 16:53:24 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  329. Tue Nov 14 16:53:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 9c:d2:1e:91:71:89
  330. Tue Nov 14 16:53:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  331. Tue Nov 14 16:53:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  332. Tue Nov 14 16:53:27 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  333. Tue Nov 14 16:54:06 2023 daemon.err uhttpd[1324]: [info] luci: accepted login on / for root from 192.168.1.141
  334. Tue Nov 14 16:55:22 2023 daemon.info hostapd: phy0-ap0: STA 98:54:1b:1d:bf:19 IEEE 802.11: associated (aid 3)
  335. Tue Nov 14 16:55:22 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 98:54:1b:1d:bf:19 auth_alg=sae
  336. Tue Nov 14 16:55:22 2023 daemon.info hostapd: phy0-ap0: STA 98:54:1b:1d:bf:19 WPA: pairwise key handshake completed (RSN)
  337. Tue Nov 14 16:55:22 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 98:54:1b:1d:bf:19
  338. Tue Nov 14 16:55:23 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.200 98:54:1b:1d:bf:19
  339. Tue Nov 14 16:55:23 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.200 98:54:1b:1d:bf:19 degas
  340. Tue Nov 14 16:55:24 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  341. Tue Nov 14 17:00:22 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  342. Tue Nov 14 17:03:55 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  343. Tue Nov 14 17:06:12 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 8c:70:5a:37:9f:4a
  344. Tue Nov 14 17:06:12 2023 kern.info kernel: [11882.895131] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  345. Tue Nov 14 17:08:24 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 9c:d2:1e:91:71:89
  346. Tue Nov 14 17:08:24 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: disassociated due to inactivity
  347. Tue Nov 14 17:08:25 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  348. Tue Nov 14 17:08:25 2023 kern.info kernel: [12015.715136] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  349. Tue Nov 14 17:09:11 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  350. Tue Nov 14 17:14:18 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  351. Tue Nov 14 17:15:28 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 98:54:1b:1d:bf:19
  352. Tue Nov 14 17:15:28 2023 kern.info kernel: [12438.405179] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  353. Tue Nov 14 17:22:39 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  354. Tue Nov 14 17:30:02 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  355. Tue Nov 14 17:33:25 2023 daemon.info hostapd: phy0-ap0: STA 98:54:1b:1d:bf:19 IEEE 802.11: associated (aid 1)
  356. Tue Nov 14 17:33:25 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 98:54:1b:1d:bf:19 auth_alg=sae
  357. Tue Nov 14 17:33:25 2023 daemon.info hostapd: phy0-ap0: STA 98:54:1b:1d:bf:19 WPA: pairwise key handshake completed (RSN)
  358. Tue Nov 14 17:33:25 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 98:54:1b:1d:bf:19
  359. Tue Nov 14 17:33:25 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.200 98:54:1b:1d:bf:19
  360. Tue Nov 14 17:33:25 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.200 98:54:1b:1d:bf:19 degas
  361. Tue Nov 14 17:33:27 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  362. Tue Nov 14 17:33:46 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: authenticated
  363. Tue Nov 14 17:33:46 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: associated (aid 2)
  364. Tue Nov 14 17:33:46 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8c:70:5a:37:9f:4a auth_alg=open
  365. Tue Nov 14 17:33:46 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a WPA: pairwise key handshake completed (RSN)
  366. Tue Nov 14 17:33:46 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8c:70:5a:37:9f:4a
  367. Tue Nov 14 17:33:46 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a
  368. Tue Nov 14 17:33:46 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a renoir
  369. Tue Nov 14 17:33:48 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  370. Tue Nov 14 17:34:20 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  371. Tue Nov 14 17:42:08 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  372. Tue Nov 14 17:47:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  373. Tue Nov 14 17:49:31 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 8c:70:5a:37:9f:4a
  374. Tue Nov 14 17:49:31 2023 kern.info kernel: [14481.895151] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  375. Tue Nov 14 17:50:41 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 98:54:1b:1d:bf:19
  376. Tue Nov 14 17:50:41 2023 kern.info kernel: [14551.725112] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  377. Tue Nov 14 17:51:48 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  378. Tue Nov 14 18:00:14 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  379. Tue Nov 14 18:09:05 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  380. Tue Nov 14 18:10:24 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: authenticated
  381. Tue Nov 14 18:10:24 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: associated (aid 1)
  382. Tue Nov 14 18:10:25 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8c:70:5a:37:9f:4a auth_alg=open
  383. Tue Nov 14 18:10:25 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a WPA: pairwise key handshake completed (RSN)
  384. Tue Nov 14 18:10:25 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8c:70:5a:37:9f:4a
  385. Tue Nov 14 18:10:25 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a
  386. Tue Nov 14 18:10:25 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a renoir
  387. Tue Nov 14 18:10:26 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  388. Tue Nov 14 18:11:00 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: authenticated
  389. Tue Nov 14 18:11:01 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: associated (aid 2)
  390. Tue Nov 14 18:11:01 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 9c:d2:1e:91:71:89 auth_alg=open
  391. Tue Nov 14 18:11:01 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 WPA: pairwise key handshake completed (RSN)
  392. Tue Nov 14 18:11:01 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 9c:d2:1e:91:71:89
  393. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  394. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  395. Tue Nov 14 18:11:12 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  396. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  397. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  398. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 9c:d2:1e:91:71:89
  399. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  400. Tue Nov 14 18:11:12 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  401. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 9c:d2:1e:91:71:89
  402. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  403. Tue Nov 14 18:11:12 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  404. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  405. Tue Nov 14 18:11:12 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  406. Tue Nov 14 18:11:27 2023 daemon.err uhttpd[1324]: [info] luci: accepted login on / for root from 192.168.1.141
  407. Tue Nov 14 18:16:16 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  408. Tue Nov 14 18:23:53 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  409. Tue Nov 14 18:25:39 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 9c:d2:1e:91:71:89
  410. Tue Nov 14 18:25:39 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: disassociated due to inactivity
  411. Tue Nov 14 18:25:40 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  412. Tue Nov 14 18:25:40 2023 kern.info kernel: [16650.215122] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  413. Tue Nov 14 18:28:25 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  414. Tue Nov 14 18:31:28 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 8c:70:5a:37:9f:4a
  415. Tue Nov 14 18:31:28 2023 kern.info kernel: [16998.785166] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  416. Tue Nov 14 18:35:21 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  417. Tue Nov 14 18:43:29 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  418. Tue Nov 14 18:51:35 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  419. Tue Nov 14 18:56:20 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  420. Tue Nov 14 19:05:34 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  421. Tue Nov 14 19:08:02 2023 kern.warn kernel: [19192.230521] ath10k_pci 0001:01:00.0: wmi: fixing invalid VHT TX rate code 0xff
  422. Tue Nov 14 19:10:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  423. Tue Nov 14 19:14:18 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  424. Tue Nov 14 19:19:44 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  425. Tue Nov 14 19:24:01 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  426. Tue Nov 14 19:30:47 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  427. Tue Nov 14 19:40:27 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  428. Tue Nov 14 19:43:47 2023 daemon.info hostapd: phy1-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: authenticated
  429. Tue Nov 14 19:43:47 2023 daemon.info hostapd: phy1-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: associated (aid 1)
  430. Tue Nov 14 19:43:47 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 9c:d2:1e:91:71:89 auth_alg=open
  431. Tue Nov 14 19:43:47 2023 daemon.info hostapd: phy1-ap0: STA 9c:d2:1e:91:71:89 WPA: pairwise key handshake completed (RSN)
  432. Tue Nov 14 19:43:47 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 9c:d2:1e:91:71:89
  433. Tue Nov 14 19:44:04 2023 kern.warn kernel: [21354.961299] ath10k_pci 0001:01:00.0: Invalid peer id 1 or peer stats buffer, peer: 5a23de2f sta: 00000000
  434. Tue Nov 14 19:44:17 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 9c:d2:1e:91:71:89
  435. Tue Nov 14 19:44:17 2023 kern.info kernel: [21367.985164] ath10k_pci 0001:01:00.0: mac flush vdev 1 drop 0 queues 0x2 ar->paused: 0x0 arvif->paused: 0x0
  436. Tue Nov 14 19:44:21 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: authenticated
  437. Tue Nov 14 19:44:21 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: associated (aid 1)
  438. Tue Nov 14 19:44:22 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 9c:d2:1e:91:71:89 auth_alg=open
  439. Tue Nov 14 19:44:22 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 WPA: pairwise key handshake completed (RSN)
  440. Tue Nov 14 19:44:22 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 9c:d2:1e:91:71:89
  441. Tue Nov 14 19:44:22 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 9c:d2:1e:91:71:89
  442. Tue Nov 14 19:44:22 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  443. Tue Nov 14 19:44:22 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  444. Tue Nov 14 19:44:22 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  445. Tue Nov 14 19:44:23 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  446. Tue Nov 14 19:46:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  447. Tue Nov 14 19:51:33 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  448. Tue Nov 14 19:57:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  449. Tue Nov 14 19:57:51 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 9c:d2:1e:91:71:89
  450. Tue Nov 14 19:57:51 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: disassociated due to inactivity
  451. Tue Nov 14 19:57:52 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  452. Tue Nov 14 19:57:52 2023 kern.info kernel: [22183.125118] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  453. Tue Nov 14 20:01:06 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  454. Tue Nov 14 20:07:27 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  455. Tue Nov 14 20:12:18 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  456. Tue Nov 14 20:20:13 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  457. Tue Nov 14 20:25:57 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  458. Tue Nov 14 20:30:26 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  459. Tue Nov 14 20:37:30 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  460. Tue Nov 14 20:45:58 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  461. Tue Nov 14 20:49:44 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  462. Tue Nov 14 20:55:55 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  463. Tue Nov 14 21:03:12 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  464. Tue Nov 14 21:06:43 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  465. Tue Nov 14 21:14:42 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  466. Tue Nov 14 21:22:39 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  467. Tue Nov 14 21:26:42 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  468. Tue Nov 14 21:30:22 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  469. Tue Nov 14 21:39:32 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  470. Tue Nov 14 21:43:15 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  471. Tue Nov 14 21:50:17 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  472. Tue Nov 14 21:59:50 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  473. Tue Nov 14 22:08:42 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  474. Tue Nov 14 22:13:02 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  475. Tue Nov 14 22:17:39 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  476. Tue Nov 14 22:27:33 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  477. Tue Nov 14 22:36:25 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  478. Tue Nov 14 22:44:49 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  479. Tue Nov 14 22:50:30 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  480. Tue Nov 14 22:55:56 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  481. Tue Nov 14 23:02:14 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  482. Tue Nov 14 23:05:51 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  483. Tue Nov 14 23:13:13 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  484. Tue Nov 14 23:19:24 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  485. Tue Nov 14 23:25:09 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  486. Tue Nov 14 23:29:48 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  487. Tue Nov 14 23:38:07 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  488. Tue Nov 14 23:44:08 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  489. Tue Nov 14 23:50:41 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  490. Tue Nov 14 23:57:09 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  491. Wed Nov 15 00:03:02 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  492. Wed Nov 15 00:08:44 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  493. Wed Nov 15 00:12:53 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  494. Wed Nov 15 00:21:32 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  495. Wed Nov 15 00:27:45 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  496. Wed Nov 15 00:37:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  497. Wed Nov 15 00:46:12 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  498. Wed Nov 15 00:53:47 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  499. Wed Nov 15 00:59:07 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  500. Wed Nov 15 01:03:19 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  501. Wed Nov 15 01:06:46 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  502. Wed Nov 15 01:16:35 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  503. Wed Nov 15 01:24:08 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  504. Wed Nov 15 01:29:11 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  505. Wed Nov 15 01:38:38 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  506. Wed Nov 15 01:43:47 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  507. Wed Nov 15 01:49:07 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  508. Wed Nov 15 01:56:17 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  509. Wed Nov 15 02:01:08 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  510. Wed Nov 15 02:11:03 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  511. Wed Nov 15 02:20:54 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  512. Wed Nov 15 02:25:50 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  513. Wed Nov 15 02:29:40 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  514. Wed Nov 15 02:38:06 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  515. Wed Nov 15 02:44:44 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  516. Wed Nov 15 02:45:24 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: authenticated
  517. Wed Nov 15 02:45:24 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: associated (aid 1)
  518. Wed Nov 15 02:45:24 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 9c:d2:1e:91:71:89 auth_alg=open
  519. Wed Nov 15 02:45:24 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 WPA: pairwise key handshake completed (RSN)
  520. Wed Nov 15 02:45:24 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 9c:d2:1e:91:71:89
  521. Wed Nov 15 02:50:43 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 9c:d2:1e:91:71:89
  522. Wed Nov 15 02:50:43 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: disassociated due to inactivity
  523. Wed Nov 15 02:50:44 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  524. Wed Nov 15 02:50:44 2023 kern.info kernel: [46954.305145] ath10k_pci 0000:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
  525. Wed Nov 15 02:53:03 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  526. Wed Nov 15 02:58:09 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  527. Wed Nov 15 03:05:25 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  528. Wed Nov 15 03:10:15 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  529. Wed Nov 15 03:16:09 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  530. Wed Nov 15 03:24:51 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  531. Wed Nov 15 03:31:18 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  532. Wed Nov 15 03:37:29 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  533. Wed Nov 15 03:42:57 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  534. Wed Nov 15 03:49:57 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  535. Wed Nov 15 03:55:19 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  536. Wed Nov 15 04:00:44 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  537. Wed Nov 15 04:05:20 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  538. Wed Nov 15 04:15:07 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  539. Wed Nov 15 04:24:26 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  540. Wed Nov 15 04:33:07 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  541. Wed Nov 15 04:42:25 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  542. Wed Nov 15 04:46:15 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  543. Wed Nov 15 04:49:59 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  544. Wed Nov 15 04:54:58 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  545. Wed Nov 15 04:59:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  546. Wed Nov 15 05:08:37 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  547. Wed Nov 15 05:15:46 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  548. Wed Nov 15 05:24:41 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  549. Wed Nov 15 05:33:57 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  550. Wed Nov 15 05:39:46 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  551. Wed Nov 15 05:44:23 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  552. Wed Nov 15 05:50:50 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  553. Wed Nov 15 05:59:21 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  554. Wed Nov 15 06:05:21 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  555. Wed Nov 15 06:10:35 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  556. Wed Nov 15 06:16:22 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  557. Wed Nov 15 06:21:03 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  558. Wed Nov 15 06:26:23 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  559. Wed Nov 15 06:34:29 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  560. Wed Nov 15 06:41:50 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  561. Wed Nov 15 06:47:24 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  562. Wed Nov 15 06:53:54 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  563. Wed Nov 15 06:57:35 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  564. Wed Nov 15 07:04:06 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  565. Wed Nov 15 07:11:58 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  566. Wed Nov 15 07:20:59 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  567. Wed Nov 15 07:26:54 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  568. Wed Nov 15 07:35:36 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  569. Wed Nov 15 07:39:19 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  570. Wed Nov 15 07:47:33 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  571. Wed Nov 15 07:56:27 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  572. Wed Nov 15 08:00:39 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  573. Wed Nov 15 08:08:47 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  574. Wed Nov 15 08:14:47 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  575. Wed Nov 15 08:18:46 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  576. Wed Nov 15 08:27:37 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  577. Wed Nov 15 08:34:54 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  578. Wed Nov 15 08:42:59 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  579. Wed Nov 15 08:46:56 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  580. Wed Nov 15 08:56:35 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  581. Wed Nov 15 09:05:01 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  582. Wed Nov 15 09:11:02 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  583. Wed Nov 15 09:18:32 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  584. Wed Nov 15 09:25:30 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  585. Wed Nov 15 09:29:34 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  586. Wed Nov 15 09:37:04 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  587. Wed Nov 15 09:46:27 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  588. Wed Nov 15 09:52:10 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  589. Wed Nov 15 10:01:44 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  590. Wed Nov 15 10:09:10 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  591. Wed Nov 15 10:13:40 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  592. Wed Nov 15 10:17:18 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  593. Wed Nov 15 10:23:47 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  594. Wed Nov 15 10:27:33 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  595. Wed Nov 15 10:31:20 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  596. Wed Nov 15 10:36:51 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  597. Wed Nov 15 10:44:27 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  598. Wed Nov 15 10:52:22 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  599. Wed Nov 15 10:55:48 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: authenticated
  600. Wed Nov 15 10:55:49 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a IEEE 802.11: associated (aid 1)
  601. Wed Nov 15 10:55:49 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8c:70:5a:37:9f:4a auth_alg=open
  602. Wed Nov 15 10:55:49 2023 daemon.info hostapd: phy0-ap0: STA 8c:70:5a:37:9f:4a WPA: pairwise key handshake completed (RSN)
  603. Wed Nov 15 10:55:49 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8c:70:5a:37:9f:4a
  604. Wed Nov 15 10:55:49 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a
  605. Wed Nov 15 10:55:49 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.190 8c:70:5a:37:9f:4a renoir
  606. Wed Nov 15 10:55:51 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  607. Wed Nov 15 10:55:51 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
  608. Wed Nov 15 10:55:51 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
  609. Wed Nov 15 10:55:51 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
  610. Wed Nov 15 10:55:51 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
  611. Wed Nov 15 10:56:14 2023 daemon.err uhttpd[1324]: [info] luci: accepted login on / for root from 192.168.1.190
  612. Wed Nov 15 10:56:57 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: authenticated
  613. Wed Nov 15 10:56:57 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 IEEE 802.11: associated (aid 2)
  614. Wed Nov 15 10:56:57 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 9c:d2:1e:91:71:89 auth_alg=open
  615. Wed Nov 15 10:56:57 2023 daemon.info hostapd: phy0-ap0: STA 9c:d2:1e:91:71:89 WPA: pairwise key handshake completed (RSN)
  616. Wed Nov 15 10:56:57 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 9c:d2:1e:91:71:89
  617. Wed Nov 15 10:56:59 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  618. Wed Nov 15 10:57:01 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 9c:d2:1e:91:71:89
  619. Wed Nov 15 10:57:01 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  620. Wed Nov 15 10:57:01 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  621. Wed Nov 15 10:57:01 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.141 9c:d2:1e:91:71:89
  622. Wed Nov 15 10:57:09 2023 daemon.err uhttpd[1324]: [info] luci: accepted login on / for root from 192.168.1.141
  623. Wed Nov 15 10:58:14 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
  624. Wed Nov 15 10:59:50 2023 authpriv.info dropbear[4573]: Child connection from fde3:e1b4:968a:0:c60c:f304:676:2a23:48222
  625. Wed Nov 15 10:59:50 2023 authpriv.info dropbear[4573]: Exit before auth from <fde3:e1b4:968a:0:c60c:f304:676:2a23:48222>: Exited normally
  626. Wed Nov 15 11:00:02 2023 authpriv.info dropbear[4574]: Child connection from fde3:e1b4:968a:0:c60c:f304:676:2a23:33044
  627. Wed Nov 15 11:00:10 2023 authpriv.info dropbear[4574]: Exit before auth from <fde3:e1b4:968a:0:c60c:f304:676:2a23:33044>: Exited normally
  628. Wed Nov 15 11:00:32 2023 authpriv.info dropbear[4575]: Child connection from fde3:e1b4:968a:0:c60c:f304:676:2a23:58832
  629. Wed Nov 15 11:00:38 2023 authpriv.notice dropbear[4575]: Password auth succeeded for 'root' from fde3:e1b4:968a:0:c60c:f304:676:2a23:58832
  630. Wed Nov 15 11:02:05 2023 authpriv.info dropbear[4590]: Child connection from fde3:e1b4:968a:0:c60c:f304:676:2a23:37294
  631. Wed Nov 15 11:02:08 2023 authpriv.notice dropbear[4590]: Password auth succeeded for 'root' from fde3:e1b4:968a:0:c60c:f304:676:2a23:37294
  632. Wed Nov 15 11:02:08 2023 authpriv.info dropbear[4590]: Exit (root) from <fde3:e1b4:968a:0:c60c:f304:676:2a23:37294>: Disconnect received
  633. Wed Nov 15 11:03:48 2023 daemon.warn odhcpd[1208]: No default route present, overriding ra_lifetime!
Add Comment
Please, Sign In to add comment