kernellogs-part2
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 26.690759] ath: EEPROM regdomain sanitized
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 26.690767] ath: EEPROM regdomain: 0x64
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 26.690772] ath: EEPROM indicates we should expect a direct regpair map
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 26.690785] ath: Country alpha2 being used: 00
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 26.690790] ath: Regpair used: 0x64
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 26.694674] ath10k_pci 0001:01:00.0: assign IRQ: got 41
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 26.694716] ath10k 5.8 driver, optimized for CT firmware, probing pci device: 0x40.
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 26.696033] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142)
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 26.701421] ath10k_pci 0001:01:00.0: enabling bus mastering
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 26.702159] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 27.373854] ath10k_pci 0001:01:00.0: qca99x0 hw2.0 target 0x01000000 chip_id 0x003b01ff sub 168c:0002
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 27.373900] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 27.385413] ath10k_pci 0001:01:00.0: firmware ver 10.4b-ct-9980-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 b36a12bf
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 27.456375] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id 1:1 crc32 08fa09f2
Wed Feb 3 03:34:13 2021 kern.warn kernel: [ 28.610079] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
Wed Feb 3 03:34:13 2021 kern.warn kernel: [ 28.610108] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 28.686661] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 28.686949] ath10k_pci 0001:01:00.0: wmi print 'free: 31080 iram: 23028 sram: 9596'
Wed Feb 3 03:34:13 2021 kern.info kernel: [ 28.955979] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 29.051162] ath: EEPROM regdomain sanitized
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 29.051178] ath: EEPROM regdomain: 0x64
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 29.051189] ath: EEPROM indicates we should expect a direct regpair map
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 29.051214] ath: Country alpha2 being used: 00
Wed Feb 3 03:34:13 2021 kern.debug kernel: [ 29.051224] ath: Regpair used: 0x64
Wed Feb 3 03:34:15 2021 authpriv.info dropbear[1203]: Not backgrounding
Wed Feb 3 03:34:16 2021 daemon.notice procd: /etc/rc.d/S19qca-nss-ecm: Failed to find shortcut-fe. Maybe it is a built in module ?
Wed Feb 3 03:34:16 2021 daemon.notice procd: /etc/rc.d/S19qca-nss-ecm: Failed to find shortcut-fe-ipv6. Maybe it is a built in module ?
Wed Feb 3 03:34:16 2021 daemon.notice procd: /etc/rc.d/S19qca-nss-ecm: Failed to find shortcut-fe-drv. Maybe it is a built in module ?
Wed Feb 3 03:34:16 2021 kern.info kernel: [ 32.292150] ECM init
Wed Feb 3 03:34:16 2021 kern.info kernel: [ 32.292202] ECM database jhash random seed: 0xaf2f136f
Wed Feb 3 03:34:16 2021 kern.info kernel: [ 32.294702] ECM init complete
Wed Feb 3 03:34:16 2021 daemon.notice procd: /etc/rc.d/S19qca-nss-ecm: net.bridge.bridge-nf-call-ip6tables = 1
Wed Feb 3 03:34:16 2021 daemon.notice procd: /etc/rc.d/S19qca-nss-ecm: net.bridge.bridge-nf-call-iptables = 1
Wed Feb 3 03:34:16 2021 daemon.notice procd: /etc/rc.d/S19qca-nss-ecm: dev.nss.general.redirect = 1
Wed Feb 3 03:34:19 2021 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Wed Feb 3 03:34:19 2021 kern.info kernel: [ 35.497668] ipq8064-mdio 37000000.mdio eth1: 1000 Mbps Full Duplex
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.582453] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.584524] device eth1 entered promiscuous mode
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.588117] br-lan: port 1(eth1.1) entered blocking state
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.592501] br-lan: port 1(eth1.1) entered disabled state
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.598226] device eth1.1 entered promiscuous mode
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.605008] br-lan: port 1(eth1.1) entered blocking state
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.607776] br-lan: port 1(eth1.1) entered forwarding state
Wed Feb 3 03:34:20 2021 daemon.notice netifd: Interface 'lan' is enabled
Wed Feb 3 03:34:20 2021 daemon.notice netifd: Interface 'lan' is setting up now
Wed Feb 3 03:34:20 2021 daemon.notice netifd: Interface 'lan' is now up
Wed Feb 3 03:34:20 2021 daemon.notice netifd: bridge 'br-lan' link is up
Wed Feb 3 03:34:20 2021 daemon.notice netifd: Interface 'lan' has link connectivity
Wed Feb 3 03:34:20 2021 daemon.notice netifd: VLAN 'eth1.1' link is up
Wed Feb 3 03:34:20 2021 daemon.notice netifd: Interface 'loopback' is enabled
Wed Feb 3 03:34:20 2021 daemon.notice netifd: Interface 'loopback' is setting up now
Wed Feb 3 03:34:20 2021 daemon.notice netifd: Interface 'loopback' is now up
Wed Feb 3 03:34:20 2021 kern.info kernel: [ 36.620864] ipq8064-mdio 37000000.mdio eth0: 1000 Mbps Full Duplex
Wed Feb 3 03:34:21 2021 daemon.notice netifd: Interface 'wan' is enabled
Wed Feb 3 03:34:21 2021 daemon.notice netifd: Network device 'eth1' link is up
Wed Feb 3 03:34:21 2021 kern.info kernel: [ 37.692534] device eth0 entered promiscuous mode
Wed Feb 3 03:34:21 2021 kern.info kernel: [ 37.694208] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Wed Feb 3 03:34:21 2021 daemon.notice netifd: Network device 'lo' link is up
Wed Feb 3 03:34:21 2021 daemon.notice netifd: Interface 'loopback' has link connectivity
Wed Feb 3 03:34:21 2021 daemon.notice netifd: Network device 'eth0' link is up
Wed Feb 3 03:34:21 2021 daemon.notice netifd: VLAN 'eth0.2' link is up
Wed Feb 3 03:34:21 2021 daemon.notice netifd: Interface 'wan' has link connectivity
Wed Feb 3 03:34:21 2021 daemon.notice netifd: Interface 'wan' is setting up now
Wed Feb 3 03:34:22 2021 daemon.err insmod: module is already loaded - slhc
Wed Feb 3 03:34:22 2021 daemon.err insmod: module is already loaded - ppp_generic
Wed Feb 3 03:34:22 2021 daemon.err insmod: module is already loaded - pppox
Wed Feb 3 03:34:22 2021 daemon.err insmod: module is already loaded - pppoe
Wed Feb 3 03:34:22 2021 daemon.info pppd[1764]: Plugin rp-pppoe.so loaded.
Wed Feb 3 03:34:22 2021 daemon.info pppd[1764]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Wed Feb 3 03:34:22 2021 daemon.notice pppd[1764]: pppd 2.4.8 started by root, uid 0
Wed Feb 3 03:34:22 2021 daemon.info pppd[1764]: PPP session is 1
Wed Feb 3 03:34:22 2021 daemon.warn pppd[1764]: Connected to 00:d0:f6:cb:e6:c6 via interface eth0.2
Wed Feb 3 03:34:22 2021 kern.warn kernel: [ 38.285735] print_req_error: 224 callbacks suppressed
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.285744] blk_update_request: I/O error, dev mtdblock0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.290783] blk_update_request: I/O error, dev mtdblock0, sector 8 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.301390] blk_update_request: I/O error, dev mtdblock0, sector 16 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.312238] blk_update_request: I/O error, dev mtdblock0, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.322785] blk_update_request: I/O error, dev mtdblock0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
Wed Feb 3 03:34:22 2021 kern.warn kernel: [ 38.332556] buffer_io_error: 26 callbacks suppressed
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.332562] Buffer I/O error on dev mtdblock0, logical block 0, async page read
Wed Feb 3 03:34:22 2021 kern.info kernel: [ 38.349483] pppoe-wan: renamed from ppp0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.360062] blk_update_request: I/O error, dev mtdblock0, sector 32 op 0x0:(READ) flags 0x80700 phys_seg 8 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.361197] blk_update_request: I/O error, dev mtdblock0, sector 40 op 0x0:(READ) flags 0x80700 phys_seg 7 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.370907] blk_update_request: I/O error, dev mtdblock0, sector 48 op 0x0:(READ) flags 0x80700 phys_seg 6 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.381669] blk_update_request: I/O error, dev mtdblock0, sector 56 op 0x0:(READ) flags 0x80700 phys_seg 5 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.392407] blk_update_request: I/O error, dev mtdblock0, sector 64 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 0
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.406380] Buffer I/O error on dev mtdblock0, logical block 1, async page read
Wed Feb 3 03:34:22 2021 daemon.info pppd[1764]: Renamed interface ppp0 to pppoe-wan
Wed Feb 3 03:34:22 2021 daemon.info pppd[1764]: Using interface pppoe-wan
Wed Feb 3 03:34:22 2021 daemon.notice pppd[1764]: Connect: pppoe-wan <--> eth0.2
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.420537] Buffer I/O error on dev mtdblock1, logical block 0, async page read
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.429360] Buffer I/O error on dev mtdblock1, logical block 1, async page read
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.772385] Buffer I/O error on dev mtdblock2, logical block 0, async page read
Wed Feb 3 03:34:22 2021 kern.err kernel: [ 38.782989] Buffer I/O error on dev mtdblock2, logical block 1, async page read
Wed Feb 3 03:34:23 2021 kern.err kernel: [ 38.791445] Buffer I/O error on dev mtdblock3, logical block 0, async page read
Wed Feb 3 03:34:23 2021 kern.err kernel: [ 38.795209] Buffer I/O error on dev mtdblock3, logical block 0, async page read
Wed Feb 3 03:34:23 2021 kern.err kernel: [ 38.803352] Buffer I/O error on dev mtdblock4, logical block 0, async page read
Wed Feb 3 03:34:23 2021 kern.err kernel: [ 38.819043] Buffer I/O error on dev mtdblock4, logical block 0, async page read
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862461] ath: EEPROM regdomain: 0x8348
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862468] ath: EEPROM indicates we should expect a country code
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862473] ath: doing EEPROM country->regdmn map search
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862479] ath: country maps to regdmn code: 0x3a
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862487] ath: Country alpha2 being used: US
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862494] ath: Regpair used: 0x3a
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862519] ath: EEPROM regdomain: 0x8348
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862524] ath: EEPROM indicates we should expect a country code
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862529] ath: doing EEPROM country->regdmn map search
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862535] ath: country maps to regdmn code: 0x3a
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862540] ath: Country alpha2 being used: US
Wed Feb 3 03:34:23 2021 kern.debug kernel: [ 38.862545] ath: Regpair used: 0x3a
Wed Feb 3 03:34:26 2021 kern.warn kernel: [ 42.221156] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
Wed Feb 3 03:34:26 2021 kern.warn kernel: [ 42.221186] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
Wed Feb 3 03:34:26 2021 kern.info kernel: [ 42.298640] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
Wed Feb 3 03:34:26 2021 kern.info kernel: [ 42.299381] ath10k_pci 0000:01:00.0: wmi print 'free: 31080 iram: 23028 sram: 9596'
Wed Feb 3 03:34:26 2021 daemon.err procd: Got unexpected signal 1
Wed Feb 3 03:34:26 2021 kern.info kernel: [ 42.669394] ath10k_pci 0000:01:00.0: rts threshold -1
Wed Feb 3 03:34:26 2021 kern.warn kernel: [ 42.669714] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Wed Feb 3 03:34:26 2021 kern.info kernel: [ 42.674109] wlan0: Created a NSS virtual interface
Wed Feb 3 03:34:26 2021 kern.info kernel: [ 42.708745] br-lan: port 2(wlan0) entered blocking state
Wed Feb 3 03:34:26 2021 kern.info kernel: [ 42.708773] br-lan: port 2(wlan0) entered disabled state
Wed Feb 3 03:34:26 2021 kern.info kernel: [ 42.713410] device wlan0 entered promiscuous mode
Wed Feb 3 03:34:26 2021 daemon.info pppd[1764]: Remote message: Login ok
Wed Feb 3 03:34:26 2021 daemon.notice pppd[1764]: PAP authentication succeeded
Wed Feb 3 03:34:26 2021 daemon.notice pppd[1764]: peer from calling number 00:D0:F6:CB:E6:C6 authorized
Wed Feb 3 03:34:27 2021 daemon.err pppd[1764]: sif6addr: ioctl(SIOCSIFADDR): Permission denied (line 2848)
Wed Feb 3 03:34:27 2021 daemon.warn pppd[1764]: cif6addr: ioctl(SIOCDIFADDR): No such address
Wed Feb 3 03:34:27 2021 daemon.notice pppd[1764]: local IP address 125.114.50.50
Wed Feb 3 03:34:27 2021 daemon.notice pppd[1764]: remote IP address 60.178.196.1
Wed Feb 3 03:34:27 2021 daemon.notice pppd[1764]: primary DNS address 61.153.81.74
Wed Feb 3 03:34:27 2021 daemon.notice pppd[1764]: secondary DNS address 202.96.104.28
Wed Feb 3 03:34:27 2021 kern.info kernel: [ 42.930003] ath10k_pci 0000:01:00.0: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
Wed Feb 3 03:34:27 2021 daemon.notice netifd: Network device 'pppoe-wan' link is up
Wed Feb 3 03:34:27 2021 kern.info kernel: [ 43.285143] br-lan: port 2(wlan0) entered blocking state
Wed Feb 3 03:34:27 2021 kern.info kernel: [ 43.285174] br-lan: port 2(wlan0) entered forwarding state
Wed Feb 3 03:34:27 2021 daemon.notice netifd: Interface 'wan' is now up
Wed Feb 3 03:34:27 2021 kern.warn kernel: [ 43.366042] ath10k_pci 0000:01:00.0: wmi: fixing invalid VHT TX rate code 0xff
Wed Feb 3 03:34:28 2021 kern.warn kernel: [ 44.561388] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
Wed Feb 3 03:34:28 2021 kern.warn kernel: [ 44.561420] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
Wed Feb 3 03:34:28 2021 kern.info kernel: [ 44.637868] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
Wed Feb 3 03:34:28 2021 kern.info kernel: [ 44.638274] ath10k_pci 0001:01:00.0: wmi print 'free: 31080 iram: 23028 sram: 9596'
Wed Feb 3 03:34:29 2021 kern.info kernel: [ 44.995613] ath10k_pci 0001:01:00.0: rts threshold -1
Wed Feb 3 03:34:29 2021 kern.warn kernel: [ 44.996496] ath10k_pci 0001:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Wed Feb 3 03:34:29 2021 kern.err kernel: [ 45.000180] debugfs: File 'virt_if' in directory 'stats' already present!
Wed Feb 3 03:34:29 2021 kern.info kernel: [ 45.011597] wlan1: Created a NSS virtual interface
Wed Feb 3 03:34:29 2021 kern.info kernel: [ 45.020986] br-lan: port 3(wlan1) entered blocking state
Wed Feb 3 03:34:29 2021 kern.info kernel: [ 45.022172] br-lan: port 3(wlan1) entered disabled state
Wed Feb 3 03:34:29 2021 kern.info kernel: [ 45.027880] device wlan1 entered promiscuous mode
Wed Feb 3 03:34:29 2021 kern.info kernel: [ 45.732682] br-lan: port 3(wlan1) entered blocking state
Wed Feb 3 03:34:29 2021 kern.info kernel: [ 45.732734] br-lan: port 3(wlan1) entered forwarding state
Wed Feb 3 03:34:30 2021 daemon.notice netifd: Network device 'wlan0' link is up
Wed Feb 3 03:34:30 2021 daemon.notice netifd: Network device 'wlan1' link is up
Wed Feb 3 03:34:34 2021 daemon.warn procd: Seccomp support for umdns::instance1 not available
Wed Feb 3 03:34:40 2021 daemon.warn procd: Seccomp support for umdns::instance1 not available
Wed Feb 3 03:35:05 2021 daemon.notice procd: /etc/rc.d/S80umdns: Command failed: Request timed out
Wed Feb 3 03:35:05 2021 daemon.notice procd: /etc/rc.d/S81dawn: Starting Service...
Wed Feb 3 03:35:05 2021 daemon.notice procd: /etc/rc.d/S81dawn: UMDNS with port 1026
Wed Feb 3 03:35:05 2021 daemon.notice procd: /etc/rc.d/S81dawn: Dawn instance started!
Wed Feb 3 03:35:06 2021 daemon.notice procd: /etc/rc.d/S90vlmcsd: KMS Server has started.
Wed Feb 3 03:35:06 2021 kern.err kernel: [ 82.446689] debugfs: File 'virt_if' in directory 'stats' already present!
Wed Feb 3 03:35:06 2021 kern.info kernel: [ 82.447034] Created a NSS virtual interface for dev [nssifb]
Wed Feb 3 03:35:06 2021 kern.info kernel: [ 82.452552] NSS IFB data callback registered
Wed Feb 3 03:35:06 2021 kern.info kernel: [ 82.458177] NSS IFB transmit callback registered
Wed Feb 3 03:35:06 2021 kern.info kernel: [ 82.463040] NSS IFB module loaded.
Wed Feb 3 03:35:06 2021 kern.info kernel: [ 82.469883] a881f3fc: Found net device [eth0]
Wed Feb 3 03:35:06 2021 kern.info kernel: [ 82.470246] a881f3fc: Net device [eth0] has NSS intf_num [1]
Wed Feb 3 03:35:06 2021 kern.info kernel: [ 82.474759] Nexthop successfully set for [eth0] to [nssifb]
Wed Feb 3 03:35:06 2021 kern.err kernel: [ 82.497813] nss_qdisc_init[2181]:Qdisc 808aede6 (type 5): interface unknown to nss driver eth0.2
Wed Feb 3 03:35:06 2021 kern.warn kernel: [ 82.497845] nss_qdisc_destroy[1798]:Qdisc 808aede6 (type 5): destroy not ready, state: -1
Wed Feb 3 03:35:06 2021 daemon.notice procd: /etc/rc.d/S95done: RTNETLINK answers: Invalid argument
Wed Feb 3 03:35:06 2021 daemon.notice procd: /etc/rc.d/S95done: RTNETLINK answers: No such file or directory
Wed Feb 3 03:35:07 2021 daemon.notice procd: /etc/rc.d/S99bootcount: Boot count sucessfully reset to zero.
Wed Feb 3 03:35:07 2021 daemon.info procd: - init complete -
Wed Feb 3 08:52:41 2021 daemon.err uhttpd[2375]: luci: accepted login on / for root from 192.168.11.116