gargoyle-ispy 2016-May-08 20:43.torrent

Want to share your OpenWrt / Gargoyle knowledge? Implemented a new feature? Let us know here.

Moderator: Moderators

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

gargoyle-ispy 2016-May-08 20:43.torrent

Post by ispyisail »

USE AT YOUR OWN RISK

gargoyle-ispy 2016-May-08 20:43.torrent
https://goo.gl/m8wiYQ


magnet:?xt=urn:btih:16b778acda67948fc3def1a9625ad5dbc8b65dc5&dn=gargoyle-ispy%202016-May-08%2020_43.7z&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80&tr=udp%3a%2f%2fopen.demonii.com%3a1337&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969

Routers
https://goo.gl/4D7A3G

Properly restore time and date format from backup

Pass ipv6 = 0 to WAN interface. Fixes pppoe issues for some users.

meazz1
Posts: 65
Joined: Mon Dec 07, 2015 4:40 pm
Location: Auburn, GA. USA

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by meazz1 »

Installed on TP-WR1043 v3.0 and seems to be runninmg ok, I have it setup as an access point only to the main Asus AC56U running tomato.

lceron80
Posts: 113
Joined: Sun Jul 24, 2011 3:42 pm

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by lceron80 »

just installed on wndrmacv2 and same issue with dyndns is happening. if you set it up, it'll just hang loading. if you refresh it, it shows as added but it says never updated. i can access the router from outside network without issues. if you hit force update, it'll just hang loading until you refresh with no force update results.
1x wndr3700v4 exp. 1.9.x
1x wndr3800 exp. 1.9.x
1x wndr4300v1 exp. 1.9.x
1x wndrmacv2 exp. 1.9.x

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by ispyisail »

lceron80 wrote:just installed on wndrmacv2 and same issue with dyndns is happening. if you set it up, it'll just hang loading. if you refresh it, it shows as added but it says never updated. i can access the router from outside network without issues. if you hit force update, it'll just hang loading until you refresh with no force update results.
So its working?

But the GUI hangs to give the appearance of not working?

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by Lantis »

Please provide a logread after adding the config and pressing save and it "hangs".
Please provide another logread after issuing a force update and it "hangs".
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

daniel3x
Posts: 8
Joined: Fri Mar 25, 2016 11:13 am

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by daniel3x »

Flashed on mine TL-WR1043ND v1.10 with preserved settings and so far so good.

I only got a soft reboot after first boot (it already happen when I use preserve settings other times) but after that no more problems.

PS: Be aware if you have v1 of this router and you are comming from older builds before 22 april and you try to upgrade for later builds with preserved settings you may lead to a brick (you can recover your router by tftp)

Excelent work guys.

ektus
Posts: 243
Joined: Sun Aug 11, 2013 2:26 am
Location: Germany

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by ektus »

It seems I can't get this version to work properly on my Archer C5 V1.2 :(

Previous Version: Gargoyle Ispy March 06, 2016

First Attempt: Update with preservation of settings, results in wifi problems.

Second attempt: "firstboot" followed by "reboot" in SSH session: no effect, settings remain

Third attempt: re-install this version without preserving settings. Router is in working order, asks for new password. Setting up "DHCP (Wifi)" did work (okay, after setting regulatory domain to "DE"), but 5GHz is missing completely.

Wifi Scan from the connection page doesn't return.

Opening the connection page shows a lot of entries that belong to PPPoE, changing connection to wired and back to wireless puts the view back to normal.

uci set wireless.radio1.country=DE throws a parameter error

I'll stop for today, it's getting late (again) :(


Regards
Ektus.

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by Lantis »

I think the archers have a new wifi driver that hadn't been included.
ath10k_firmware_qca588x or something. I tried a test build for Tapper but it didn't work.
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

lceron80
Posts: 113
Joined: Sun Jul 24, 2011 3:42 pm

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by lceron80 »

ispyisail wrote:
lceron80 wrote:just installed on wndrmacv2 and same issue with dyndns is happening. if you set it up, it'll just hang loading. if you refresh it, it shows as added but it says never updated. i can access the router from outside network without issues. if you hit force update, it'll just hang loading until you refresh with no force update results.
So its working?

But the GUI hangs to give the appearance of not working?
this log is before the force update

Mon May 9 13:51:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:01:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:31:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:41:07 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:51:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:51:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:01:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:31:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:41:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:51:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:51:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:01:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 IEEE 802.11: authenticated
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 IEEE 802.11: associated (aid 3)
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 RADIUS: starting accounting session 5730B413-00000002
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: pairwise key handshake completed (RSN)
Mon May 9 16:05:44 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.191 dc:86:d8:a9:93:73
Mon May 9 16:05:44 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.191 dc:86:d8:a9:93:73 iPhone
Mon May 9 16:09:00 2016 daemon.err miniupnpd[2851]: PCP MAP: added mapping UDP 5353->172.30.42.121:5353 'PCP MAP 2369064b386a787b526e7a9c'
Mon May 9 16:09:00 2016 daemon.err miniupnpd[2851]: PCP MAP: added mapping UDP 5353->172.30.42.121:5353 'PCP MAP a96c70f64cd99b187446b605'
Mon May 9 16:11:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:21:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:31:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:31:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:41:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:41:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:51:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:51:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:51:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:01:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:01:07 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:11:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:21:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000000
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000001
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPDISCOVER(br-lan) 172.30.42.196 00:21:6a:a6:3a:98
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPOFFER(br-lan) 172.30.42.197 00:21:6a:a6:3a:98
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.197 00:21:6a:a6:3a:98
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.197 00:21:6a:a6:3a:98 precm4400
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 IEEE 802.11: authenticated
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 IEEE 802.11: associated (aid 2)
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 RADIUS: starting accounting session 5730B413-00000002
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:26:35 2016 daemon.info dnsmasq-dhcp[2745]: DHCPDISCOVER(br-lan) 1c:c6:3c:38:a8:e2
Mon May 9 17:26:35 2016 daemon.info dnsmasq-dhcp[2745]: DHCPOFFER(br-lan) 172.30.42.236 1c:c6:3c:38:a8:e2
Mon May 9 17:26:36 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.236 1c:c6:3c:38:a8:e2
Mon May 9 17:26:36 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.236 1c:c6:3c:38:a8:e2
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 IEEE 802.11: authenticated
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 IEEE 802.11: associated (aid 3)
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 RADIUS: starting accounting session 5730B413-00000003
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:27:14 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.105 00:15:00:5b:4e:a8
Mon May 9 17:27:14 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.105 00:15:00:5b:4e:a8 insp1545
Mon May 9 17:30:58 2016 daemon.notice miniupnpd[2851]: shutting down MiniUPnPd
Mon May 9 17:30:59 2016 local5.notice qosmon[4923]: terminated sigterm=15, sel_err=-1
Mon May 9 17:31:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:31:09 2016 kern.info kernel: [30636.880000] IMQ driver unloaded successfully.
Mon May 9 17:31:09 2016 kern.info kernel: [30636.900000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:31:09 2016 kern.info kernel: [30636.900000] Hooked IMQ after mangle on INPUT
Mon May 9 17:31:09 2016 kern.info kernel: [30636.910000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:31:09 2016 kern.info kernel: [30636.910000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:31:09 2016 kern.info kernel: [30636.920000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:31:09 2016 kern.info kernel: [30636.930000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:31:12 2016 local5.info qosmon[8874]: starting socketfd = 5, statusfd = 4
Mon May 9 17:31:12 2016 daemon.notice miniupnpd[8899]: HTTP listening on port 5000
Mon May 9 17:31:12 2016 daemon.notice miniupnpd[8899]: Listening for NAT-PMP/PCP traffic on port 5351
Mon May 9 17:32:37 2016 local5.notice qosmon[8874]: terminated sigterm=15, sel_err=-1
Mon May 9 17:32:37 2016 kern.info kernel: [30725.250000] IMQ driver unloaded successfully.
Mon May 9 17:32:37 2016 kern.info kernel: [30725.270000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:32:37 2016 kern.info kernel: [30725.280000] Hooked IMQ after mangle on INPUT
Mon May 9 17:32:37 2016 kern.info kernel: [30725.280000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:32:37 2016 kern.info kernel: [30725.290000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:32:37 2016 kern.info kernel: [30725.300000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:32:37 2016 kern.info kernel: [30725.300000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:32:40 2016 local5.info qosmon[11881]: starting socketfd = 5, statusfd = 4
Mon May 9 17:33:10 2016 daemon.notice miniupnpd[8899]: shutting down MiniUPnPd
Mon May 9 17:33:11 2016 local5.notice qosmon[11881]: terminated sigterm=15, sel_err=-1
Mon May 9 17:33:15 2016 kern.info kernel: [30763.670000] IMQ driver unloaded successfully.
Mon May 9 17:33:15 2016 kern.info kernel: [30763.700000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:33:15 2016 kern.info kernel: [30763.700000] Hooked IMQ after mangle on INPUT
Mon May 9 17:33:15 2016 kern.info kernel: [30763.710000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:33:15 2016 kern.info kernel: [30763.710000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:33:15 2016 kern.info kernel: [30763.720000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:33:15 2016 kern.info kernel: [30763.730000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:33:18 2016 local5.info qosmon[14649]: starting socketfd = 5, statusfd = 4
Mon May 9 17:33:18 2016 daemon.err miniupnpd[14674]: could not open lease file: /var/upnp.leases
Mon May 9 17:33:18 2016 daemon.notice miniupnpd[14674]: HTTP listening on port 5000
Mon May 9 17:33:18 2016 daemon.notice miniupnpd[14674]: Listening for NAT-PMP/PCP traffic on port 5351
Mon May 9 17:36:30 2016 daemon.notice miniupnpd[14674]: shutting down MiniUPnPd
Mon May 9 17:36:31 2016 local5.notice qosmon[14649]: terminated sigterm=15, sel_err=-1
Mon May 9 17:36:36 2016 kern.info kernel: [30964.070000] IMQ driver unloaded successfully.
Mon May 9 17:36:36 2016 kern.info kernel: [30964.100000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:36:36 2016 kern.info kernel: [30964.100000] Hooked IMQ after mangle on INPUT
Mon May 9 17:36:36 2016 kern.info kernel: [30964.110000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:36:36 2016 kern.info kernel: [30964.110000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:36:36 2016 kern.info kernel: [30964.120000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:36:36 2016 kern.info kernel: [30964.130000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:36:38 2016 local5.info qosmon[16988]: starting socketfd = 5, statusfd = 4
Mon May 9 17:36:38 2016 daemon.err miniupnpd[17013]: could not open lease file: /var/upnp.leases
Mon May 9 17:36:38 2016 daemon.notice miniupnpd[17013]: HTTP listening on port 5000
Mon May 9 17:36:38 2016 daemon.notice miniupnpd[17013]: Listening for NAT-PMP/PCP traffic on port 5351
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000004
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000005
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:38:23 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.197 00:21:6a:a6:3a:98
Mon May 9 17:38:23 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.197 00:21:6a:a6:3a:98 precm4400
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 WPA: group key handshake completed (RSN)
Success

this log is after the force update
Mon May 9 14:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:01:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:31:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:41:07 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 14:51:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 14:51:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:01:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:31:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:41:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 15:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:51:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 15:51:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:01:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 IEEE 802.11: authenticated
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 IEEE 802.11: associated (aid 3)
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 RADIUS: starting accounting session 5730B413-00000002
Mon May 9 16:05:43 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: pairwise key handshake completed (RSN)
Mon May 9 16:05:44 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.191 dc:86:d8:a9:93:73
Mon May 9 16:05:44 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.191 dc:86:d8:a9:93:73 iPhone
Mon May 9 16:09:00 2016 daemon.err miniupnpd[2851]: PCP MAP: added mapping UDP 5353->172.30.42.121:5353 'PCP MAP 2369064b386a787b526e7a9c'
Mon May 9 16:09:00 2016 daemon.err miniupnpd[2851]: PCP MAP: added mapping UDP 5353->172.30.42.121:5353 'PCP MAP a96c70f64cd99b187446b605'
Mon May 9 16:11:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:21:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:31:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:31:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:41:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:41:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 16:51:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 16:51:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 16:51:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:01:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:01:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:01:07 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:11:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:11:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:11:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:21:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:21:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:21:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000000
Mon May 9 17:22:34 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000001
Mon May 9 17:22:35 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPDISCOVER(br-lan) 172.30.42.196 00:21:6a:a6:3a:98
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPOFFER(br-lan) 172.30.42.197 00:21:6a:a6:3a:98
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.197 00:21:6a:a6:3a:98
Mon May 9 17:22:40 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.197 00:21:6a:a6:3a:98 precm4400
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 IEEE 802.11: authenticated
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 IEEE 802.11: associated (aid 2)
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 RADIUS: starting accounting session 5730B413-00000002
Mon May 9 17:26:31 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:26:35 2016 daemon.info dnsmasq-dhcp[2745]: DHCPDISCOVER(br-lan) 1c:c6:3c:38:a8:e2
Mon May 9 17:26:35 2016 daemon.info dnsmasq-dhcp[2745]: DHCPOFFER(br-lan) 172.30.42.236 1c:c6:3c:38:a8:e2
Mon May 9 17:26:36 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.236 1c:c6:3c:38:a8:e2
Mon May 9 17:26:36 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.236 1c:c6:3c:38:a8:e2
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 IEEE 802.11: authenticated
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 IEEE 802.11: associated (aid 3)
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 RADIUS: starting accounting session 5730B413-00000003
Mon May 9 17:27:14 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:27:14 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.105 00:15:00:5b:4e:a8
Mon May 9 17:27:14 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.105 00:15:00:5b:4e:a8 insp1545
Mon May 9 17:30:58 2016 daemon.notice miniupnpd[2851]: shutting down MiniUPnPd
Mon May 9 17:30:59 2016 local5.notice qosmon[4923]: terminated sigterm=15, sel_err=-1
Mon May 9 17:31:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:31:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: group key handshake completed (RSN)
Mon May 9 17:31:07 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:31:09 2016 kern.info kernel: [30636.880000] IMQ driver unloaded successfully.
Mon May 9 17:31:09 2016 kern.info kernel: [30636.900000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:31:09 2016 kern.info kernel: [30636.900000] Hooked IMQ after mangle on INPUT
Mon May 9 17:31:09 2016 kern.info kernel: [30636.910000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:31:09 2016 kern.info kernel: [30636.910000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:31:09 2016 kern.info kernel: [30636.920000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:31:09 2016 kern.info kernel: [30636.930000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:31:09 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:31:12 2016 local5.info qosmon[8874]: starting socketfd = 5, statusfd = 4
Mon May 9 17:31:12 2016 daemon.notice miniupnpd[8899]: HTTP listening on port 5000
Mon May 9 17:31:12 2016 daemon.notice miniupnpd[8899]: Listening for NAT-PMP/PCP traffic on port 5351
Mon May 9 17:32:37 2016 local5.notice qosmon[8874]: terminated sigterm=15, sel_err=-1
Mon May 9 17:32:37 2016 kern.info kernel: [30725.250000] IMQ driver unloaded successfully.
Mon May 9 17:32:37 2016 kern.info kernel: [30725.270000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:32:37 2016 kern.info kernel: [30725.280000] Hooked IMQ after mangle on INPUT
Mon May 9 17:32:37 2016 kern.info kernel: [30725.280000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:32:37 2016 kern.info kernel: [30725.290000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:32:37 2016 kern.info kernel: [30725.300000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:32:37 2016 kern.info kernel: [30725.300000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:32:37 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:32:40 2016 local5.info qosmon[11881]: starting socketfd = 5, statusfd = 4
Mon May 9 17:33:10 2016 daemon.notice miniupnpd[8899]: shutting down MiniUPnPd
Mon May 9 17:33:11 2016 local5.notice qosmon[11881]: terminated sigterm=15, sel_err=-1
Mon May 9 17:33:15 2016 kern.info kernel: [30763.670000] IMQ driver unloaded successfully.
Mon May 9 17:33:15 2016 kern.info kernel: [30763.700000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:33:15 2016 kern.info kernel: [30763.700000] Hooked IMQ after mangle on INPUT
Mon May 9 17:33:15 2016 kern.info kernel: [30763.710000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:33:15 2016 kern.info kernel: [30763.710000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:33:15 2016 kern.info kernel: [30763.720000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:33:15 2016 kern.info kernel: [30763.730000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:33:15 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:33:18 2016 local5.info qosmon[14649]: starting socketfd = 5, statusfd = 4
Mon May 9 17:33:18 2016 daemon.err miniupnpd[14674]: could not open lease file: /var/upnp.leases
Mon May 9 17:33:18 2016 daemon.notice miniupnpd[14674]: HTTP listening on port 5000
Mon May 9 17:33:18 2016 daemon.notice miniupnpd[14674]: Listening for NAT-PMP/PCP traffic on port 5351
Mon May 9 17:36:30 2016 daemon.notice miniupnpd[14674]: shutting down MiniUPnPd
Mon May 9 17:36:31 2016 local5.notice qosmon[14649]: terminated sigterm=15, sel_err=-1
Mon May 9 17:36:36 2016 kern.info kernel: [30964.070000] IMQ driver unloaded successfully.
Mon May 9 17:36:36 2016 kern.info kernel: [30964.100000] IMQ: No specify the numqueues. Use the cores number 1 as numqueuues
Mon May 9 17:36:36 2016 kern.info kernel: [30964.100000] Hooked IMQ after mangle on INPUT
Mon May 9 17:36:36 2016 kern.info kernel: [30964.110000] Hooked IMQ after mangle on FORWARD
Mon May 9 17:36:36 2016 kern.info kernel: [30964.110000] IMQ driver loaded successfully. (numdevs = 1, numqueues = 1, imq_dev_accurate_stats = 1)
Mon May 9 17:36:36 2016 kern.info kernel: [30964.120000] Hooking IMQ before NAT on PREROUTING.
Mon May 9 17:36:36 2016 kern.info kernel: [30964.130000] Hooking IMQ after NAT on POSTROUTING.
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - cls_fw
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - cls_flow
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - sch_hfsc
Mon May 9 17:36:36 2016 daemon.err insmod: module is already loaded - sch_sfq
Mon May 9 17:36:38 2016 local5.info qosmon[16988]: starting socketfd = 5, statusfd = 4
Mon May 9 17:36:38 2016 daemon.err miniupnpd[17013]: could not open lease file: /var/upnp.leases
Mon May 9 17:36:38 2016 daemon.notice miniupnpd[17013]: HTTP listening on port 5000
Mon May 9 17:36:38 2016 daemon.notice miniupnpd[17013]: Listening for NAT-PMP/PCP traffic on port 5351
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000004
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: authenticated
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 IEEE 802.11: associated (aid 1)
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 RADIUS: starting accounting session 5730B413-00000005
Mon May 9 17:38:20 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: pairwise key handshake completed (RSN)
Mon May 9 17:38:23 2016 daemon.info dnsmasq-dhcp[2745]: DHCPREQUEST(br-lan) 172.30.42.197 00:21:6a:a6:3a:98
Mon May 9 17:38:23 2016 daemon.info dnsmasq-dhcp[2745]: DHCPACK(br-lan) 172.30.42.197 00:21:6a:a6:3a:98 precm4400
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan0: STA 00:90:a9:69:63:55 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan0: STA 8c:58:77:e0:25:93 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan0: STA dc:86:d8:a9:93:73 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan1: STA 00:21:6a:a6:3a:98 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan1: STA 00:15:00:5b:4e:a8 WPA: group key handshake completed (RSN)
Mon May 9 17:41:06 2016 daemon.info hostapd: wlan1: STA 1c:c6:3c:38:a8:e2 WPA: group key handshake completed (RSN)
Mon May 9 17:44:29 2016 daemon.notice netifd: wan (1934): Sending renew...
Mon May 9 17:44:30 2016 daemon.notice netifd: wan (1934): Lease of 172.91.2.131 obtained, lease time 86002
Success

this link has a video of the hanging
https://mega.nz/#!eYtG1RYL!nJbzVDW4sFs3 ... EkDLxYj-hY
1x wndr3700v4 exp. 1.9.x
1x wndr3800 exp. 1.9.x
1x wndr4300v1 exp. 1.9.x
1x wndrmacv2 exp. 1.9.x

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: gargoyle-ispy 2016-May-08 20:43.torrent

Post by Lantis »

Those logs show nothing... :/
I'm not sure why that would be the case.
How quickly forcing update did you retrieve he log?
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

Post Reply