RedMaligator
Occasional Visitor
I like to thank Eric for the help getting registered.
I bought an RT-AX88U and had a lot of issue with firmware, accepted packets, AIMesh and random codes in logs, so I returned the 2nd AX88U I purchased. Since then I been having weird connectivity issues with 2g cameras, to get a reliable connection I had to disable: Roaming assistant and Enable IGMP Snooping then had to require Protected Management Frames. Cameras finally stay connected for the until it modulates, then reconnects.
I'm not very good at understanding logs so I found this site and I asking for help understanding. Thank you for all your help.
Random code:
Apr 30 10:22:02 kernel: jffs2: warning: (1934) jffs2_sum_write_data: Summary too big (-32 data, -1568 pad) in eraseblock at 001c0000
Apr 30 10:22:02 rc_service: watchdog 1934:notify_rc stop_obd
Apr 30 10:22:02 kernel: wfd_unregisterdevice Successfully unregistered ifidx 1 wfd_idx 0
Apr 30 10:22:02 kernel: wfd_unregisterdevice Successfully unregistered ifidx 1 wfd_idx 1
Apr 30 10:22:03 kernel: netdev path : eth6.0 -> eth6
Apr 30 10:22:03 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:03 kernel: netdev path : eth6.501 -> eth6
Apr 30 10:22:03 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:03 kernel: netdev path : eth7.0 -> eth7
Apr 30 10:22:03 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:03 kernel: netdev path : eth7.501 -> eth7
Apr 30 10:22:03 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:04 kernel: netdev path : eth6.502 -> eth6
Apr 30 10:22:04 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:04 kernel: netdev path : eth7.502 -> eth7
Apr 30 10:22:04 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:08 wlceventd: main(961): wlceventd Start...
Apr 30 10:22:18 roamast: ROAMING Start...
Apr 30 10:22:22 kernel: wfd_registerdevice Successfully registered dev wl0.1 ifidx 1 wfd_idx 0
Apr 30 10:22:22 kernel: Register interface [wl0.1] MAC: 7c:10:c9:04:40:b9
Apr 30 10:22:22 kernel: wfd_registerdevice Successfully registered dev wl1.1 ifidx 1 wfd_idx 1
Apr 30 10:22:22 kernel: Register interface [wl1.1] MAC: 7c:10:c9:04:40:bd
Apr 30 10:22:22 kernel: IGMP Query send failed
Apr 30 10:22:22 rc_service: watchdog 1934:notify_rc stop_obd
Apr 30 10:22:27 kernel: ^[[0;33;41m[ERROR vlan] bcmVlan_devHardStartXmit,536: Internal Error: Could not find Real Device eth6 on Transmission^[[0m
Apr 30 10:22:27 kernel: jffs2: warning: (1934) jffs2_sum_write_data: Summary too big (-32 data, -1568 pad) in eraseblock at 001a0000
Apr 30 10:22:27 kernel: FPM Pool 0: invalid token 0x00d90000 freed
Apr 30 10:22:27 kernel: FPM Pool 1: invalid token 0x20c20000 freed
Apr 30 10:22:27 kernel: netdev path : eth6.0 -> eth6
Apr 30 10:22:27 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth6.501 -> eth6
Apr 30 10:22:27 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth7.0 -> eth7
Apr 30 10:22:27 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth7.501 -> eth7
Apr 30 10:22:27 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth6.502 -> eth6
Apr 30 10:22:27 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth7.502 -> eth7
Apr 30 10:22:27 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:28 kernel: FPM Pool 0: invalid token 0x00f30000 freed
Apr 30 10:22:28 kernel: FPM Pool 1: invalid token 0x20d98000 freed
Apr 30 10:22:29 wlceventd: main(961): wlceventd Start...
Apr 30 10:22:29 acsd: eth6: Selecting 2g band ACS policy
Apr 30 10:22:32 acsd: eth6: selected channel spec: 0x1007 (7)
Apr 30 10:22:32 acsd: eth6: Adjusted channel spec: 0x1007 (7)
Apr 30 10:22:32 acsd: eth6: selected channel spec: 0x1007 (7)
Apr 30 10:22:32 acsd: acs_set_chspec: 0x1007 (7) for reason APCS_INIT
Firmware:
May 2 02:00:05 disk_monitor: Got SIGALRM...
May 2 02:27:59 kernel: ACCEPT IN=eth0 OUT= MAC=12:69:ec:c4:d1:00:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=47.134.27.40 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7714)]fimrware update check first time
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7745)]no need to upgrade firmware
May 2 02:53:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:53:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:53:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7719)]fimrware update check once
May 2 02:54:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:54:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:54:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7719)]fimrware update check once
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7714)]fimrware update check first time
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7745)]no need to upgrade firmware
Packets:
May 2 14:28:00 kernel: ACCEPT IN=eth0 OUT= MAC=12:69:ec:c4:d1:00:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=47.134.27.40 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:05:19 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.101.11 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:05:19 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.101.11 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:07:11 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:07:11 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
I bought an RT-AX88U and had a lot of issue with firmware, accepted packets, AIMesh and random codes in logs, so I returned the 2nd AX88U I purchased. Since then I been having weird connectivity issues with 2g cameras, to get a reliable connection I had to disable: Roaming assistant and Enable IGMP Snooping then had to require Protected Management Frames. Cameras finally stay connected for the until it modulates, then reconnects.
I'm not very good at understanding logs so I found this site and I asking for help understanding. Thank you for all your help.
Random code:
Apr 30 10:22:02 kernel: jffs2: warning: (1934) jffs2_sum_write_data: Summary too big (-32 data, -1568 pad) in eraseblock at 001c0000
Apr 30 10:22:02 rc_service: watchdog 1934:notify_rc stop_obd
Apr 30 10:22:02 kernel: wfd_unregisterdevice Successfully unregistered ifidx 1 wfd_idx 0
Apr 30 10:22:02 kernel: wfd_unregisterdevice Successfully unregistered ifidx 1 wfd_idx 1
Apr 30 10:22:03 kernel: netdev path : eth6.0 -> eth6
Apr 30 10:22:03 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:03 kernel: netdev path : eth6.501 -> eth6
Apr 30 10:22:03 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:03 kernel: netdev path : eth7.0 -> eth7
Apr 30 10:22:03 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:03 kernel: netdev path : eth7.501 -> eth7
Apr 30 10:22:03 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:04 kernel: netdev path : eth6.502 -> eth6
Apr 30 10:22:04 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:04 kernel: netdev path : eth7.502 -> eth7
Apr 30 10:22:04 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:08 wlceventd: main(961): wlceventd Start...
Apr 30 10:22:18 roamast: ROAMING Start...
Apr 30 10:22:22 kernel: wfd_registerdevice Successfully registered dev wl0.1 ifidx 1 wfd_idx 0
Apr 30 10:22:22 kernel: Register interface [wl0.1] MAC: 7c:10:c9:04:40:b9
Apr 30 10:22:22 kernel: wfd_registerdevice Successfully registered dev wl1.1 ifidx 1 wfd_idx 1
Apr 30 10:22:22 kernel: Register interface [wl1.1] MAC: 7c:10:c9:04:40:bd
Apr 30 10:22:22 kernel: IGMP Query send failed
Apr 30 10:22:22 rc_service: watchdog 1934:notify_rc stop_obd
Apr 30 10:22:27 kernel: ^[[0;33;41m[ERROR vlan] bcmVlan_devHardStartXmit,536: Internal Error: Could not find Real Device eth6 on Transmission^[[0m
Apr 30 10:22:27 kernel: jffs2: warning: (1934) jffs2_sum_write_data: Summary too big (-32 data, -1568 pad) in eraseblock at 001a0000
Apr 30 10:22:27 kernel: FPM Pool 0: invalid token 0x00d90000 freed
Apr 30 10:22:27 kernel: FPM Pool 1: invalid token 0x20c20000 freed
Apr 30 10:22:27 kernel: netdev path : eth6.0 -> eth6
Apr 30 10:22:27 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth6.501 -> eth6
Apr 30 10:22:27 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth7.0 -> eth7
Apr 30 10:22:27 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth7.501 -> eth7
Apr 30 10:22:27 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth6.502 -> eth6
Apr 30 10:22:27 kernel: BCMVLAN : eth6 mode was set to RG
Apr 30 10:22:27 kernel: netdev path : eth7.502 -> eth7
Apr 30 10:22:27 kernel: BCMVLAN : eth7 mode was set to RG
Apr 30 10:22:28 kernel: FPM Pool 0: invalid token 0x00f30000 freed
Apr 30 10:22:28 kernel: FPM Pool 1: invalid token 0x20d98000 freed
Apr 30 10:22:29 wlceventd: main(961): wlceventd Start...
Apr 30 10:22:29 acsd: eth6: Selecting 2g band ACS policy
Apr 30 10:22:32 acsd: eth6: selected channel spec: 0x1007 (7)
Apr 30 10:22:32 acsd: eth6: Adjusted channel spec: 0x1007 (7)
Apr 30 10:22:32 acsd: eth6: selected channel spec: 0x1007 (7)
Apr 30 10:22:32 acsd: acs_set_chspec: 0x1007 (7) for reason APCS_INIT
Firmware:
May 2 02:00:05 disk_monitor: Got SIGALRM...
May 2 02:27:59 kernel: ACCEPT IN=eth0 OUT= MAC=12:69:ec:c4:d1:00:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=47.134.27.40 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7714)]fimrware update check first time
May 2 02:53:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7745)]no need to upgrade firmware
May 2 02:53:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:53:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:53:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7719)]fimrware update check once
May 2 02:54:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:54:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:54:26 WATCHDOG: [FAUPGRADE][auto_firmware_check7719)]fimrware update check once
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7681)]do webs_update
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7699)]retrieve firmware information
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7714)]fimrware update check first time
May 2 02:54:56 WATCHDOG: [FAUPGRADE][auto_firmware_check7745)]no need to upgrade firmware
Packets:
May 2 14:28:00 kernel: ACCEPT IN=eth0 OUT= MAC=12:69:ec:c4:d1:00:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=47.134.27.40 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:05:19 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.101.11 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:05:19 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.101.11 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:07:11 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000
May 2 16:07:11 kernel: ACCEPT IN=eth0 OUT= MAC=ff:ff:ff:ff:ff:ff:00:17:10:95:6d:11:08:00 SRC=150.181.100.23 DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 PROTO=UDP SPT=67 DPT=68 LEN=308 MARK=0x8000000