Netgear r7800 keeps restarting every 2 hours

i installed openwrt on my netgear r7800 , every 2 hours , it restarts , can anyone please tell me what to do ? thanks here is the log

Fri Nov 17 08:55:46 2023 kern.warn kernel: [   40.311106] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
Fri Nov 17 08:55:46 2023 kern.warn kernel: [   40.311140] ath10k_pci 0000:01:00.0: msdu-desc: 2500  skid: 32
Fri Nov 17 08:55:46 2023 kern.info kernel: [   40.393685] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
Fri Nov 17 08:55:46 2023 kern.info kernel: [   40.394529] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
Fri Nov 17 08:55:46 2023 kern.info kernel: [   40.777882] ath10k_pci 0000:01:00.0: rts threshold -1
Fri Nov 17 08:55:46 2023 kern.warn kernel: [   40.778814] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Fri Nov 17 08:55:46 2023 kern.info kernel: [   40.782645] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Fri Nov 17 08:55:46 2023 kern.info kernel: [   40.796923] br-lan: port 2(wlan0) entered blocking state
Fri Nov 17 08:55:46 2023 kern.info kernel: [   40.799444] br-lan: port 2(wlan0) entered disabled state
Fri Nov 17 08:55:46 2023 kern.info kernel: [   40.805332] device wlan0 entered promiscuous mode
Fri Nov 17 08:55:46 2023 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->HT_SCAN
Fri Nov 17 08:55:47 2023 kern.info kernel: [   40.981814] ath10k_pci 0000:01:00.0: NOTE:  Firmware DBGLOG output disabled in debug_mask: 0x10000000
Fri Nov 17 08:55:47 2023 kern.info kernel: [   41.534484] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Fri Nov 17 08:55:47 2023 kern.info kernel: [   41.534693] br-lan: port 2(wlan0) entered blocking state
Fri Nov 17 08:55:47 2023 kern.info kernel: [   41.539928] br-lan: port 2(wlan0) entered forwarding state
Fri Nov 17 08:55:47 2023 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Fri Nov 17 08:55:47 2023 daemon.notice hostapd: wlan0: AP-ENABLED
Fri Nov 17 08:55:47 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Fri Nov 17 08:55:47 2023 daemon.notice netifd: Network device 'wlan0' link is up
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: started, version 2.86 cachesize 150
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: DNS service limited to local subnets
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using nameserver 192.168.0.1#53
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Fri Nov 17 08:55:50 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses

the log is from the boot, earlier log entries are lost during restart.

thanks for your reply , i didnt know that , is there anything i could do that my device wont restart and work normally ?

without additional info, no really.

post the output of ubus call system board to start with.

i am not sure where to find this section in my router , can you please tell me where to find it ?

you need to run the command ssh:ing to the router.

try ssh root@<IP.of.the.router> from a command prompt, password is the same as for the webUI.
or DL putty, is user friendlier.

{
        "kernel": "5.10.176",
        "hostname": "OpenWrt",
        "system": "ARMv7 Processor rev 0 (v7l)",
        "model": "Netgear Nighthawk X4S R7800",
        "board_name": "netgear,r7800",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "22.03.4",
                "revision": "r20123-38ccc47687",
                "target": "ipq806x/generic",
                "description": "OpenWrt 22.03.4 r20123-38ccc47687"
        }
}

1 Like

I'd probably start by upgrading to 22.03.5, or 23.05.2, and resetting in the process.

once done, ssh to the router again, and run logread -f, and keep the command running, hopefully it'll catch something before a restart.

Support for ramoops has been added to the latest OpenWRT release: Link

cat /sys/fs/pstore/dmesg-ramoops-0
cat /sys/fs/pstore/console-ramoops-0

sorry for asking , but what is ramoops?

i am using v2rayA on my netgear , i heard it has problem using latest version of firmware , thats why i am using this firmware , do have any idea if its true or not?

stop using it for a while, and you'll know.