What's new

Kamoj Kamoj Add-on 5.1 Beta testing poll

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Do you want to beta test Kamoj add-on v5.1b1?

  • No, I don't trust 3rd party software

    Votes: 0 0.0%
  • No, I don't use the Voxel firmware

    Votes: 0 0.0%
  • No, I don't like your add-on

    Votes: 0 0.0%

  • Total voters
    207
I used to have similar issues, but haven't experienced since the upgrade to v103.3 of AdGuardHome.
Also I don't know if every time the CPU usage / temperature would go up. Usually if I noticed DNS failures, then I quickly disabled and enabled AdGuardHome again.

Also think the issue happened only (but is has been some while, so don't remember for sure) when using AdGuardHome with its default settings, i.e. when using remote (Quad9 ?? ) upstream dns-servers.

I now use it with pointing AdGuardHome to 192.168.1.1 (i.e. doing the resolving via local dnsmasq instance) and thus not having the DoH/DoT encryptedDNS, but only adblocking.

During such issues, AdGuardHome log would usually show lines like these:
Code:
SafeBrowsing: failed: couldn't initialize HTTP client or transport, cause: couldn't do a POST request to 'https://dns-family.adguard.com:443/dns-query', cause: Get "https://dns-family.adguard.com:443/dns-query?dns=olEBAAABAAAAAAAACGlwdjRvbmx5BGFycGEAAAEAAQ": context deadline exceeded
2020/06/17 21:20:45 [info] SafeBrowsing: failed: couldn't initialize HTTP client or transport, cause: timeout exceeded: 17626 ms
2020/06/17 21:20:45 [info] SafeBrowsing: failed: couldn't initialize HTTP client or transport, cause: timeout exceeded: 17627 ms
2020/06/17 21:20:45 [info] SafeBrowsing: failed: couldn't initialize HTTP client or transport, cause: timeout exceeded: 17629 ms
2020/06/17 21:20:46 [info] SafeBrowsing: failed: couldn't initialize HTTP client or transport, cause: timeout exceeded: 11796 ms

i think the issue in exactly how you explained. however after wipe kamoj config + adguard config and reflash b26 i didn't notice any other issues. i would wait to new Voxel release before doing the same with router settings so to start with fresh configuration. i'm still doing some tests and in case.. i'll keep here posted. appreciated
 
Hello,

5.3b26 is still running pretty good for me - only 1 restart of net-lan and or a reboot in the past 2 days! The extended logging not starting after erasing and the ongoing detection of DNS failures are the only issues I see. I do however have a question and feature request if it is practical...

On my other network, I have been running DNSCrypt on the same devices as my Pi-Holes. The Pi-Holes are set up much like AdGuard Home is on the Kamoj add-on, and they function in much the same way. But instead of pointing the Pi-Holes to a DNS resolver like 1.1.1.1, I have them set to use DNSCrypt running over port 53000 on the same device. DNSCrypt is set to do the DNS lookups using their anonymous relay (kind of like using TOR) and Pi-Hole does the adblocking and provides DNS statistics and logging. This setup has been very reliable and I have not seen any noticeable lag doing that - even with my high latency internet connection.

I know that AdGuard Home can use DNSCrypt servers and in fact that is what I am using right now. However, I have not been able to find a way to easily use the DNSCrypt anonymous relays within AdGuard Home. Is there a way to do that? And if not...

I know that the add-on FAQ says that AdGuard Home and DNSCrypt cannot be used together. But could the add-on be changed so DNSCrypt could run in the background on a different port and then be used by AdGuard - like I do on my other network? Its probably not a high value request at this time, but looking into the add-on I think its possible???

Thanks,
BL
 
in theory: if DNScrypt and AdGuardHome are enabled at the same time, and AdGuardHome is configured to only use upstream dns server 192.168.1.1 (assuming your router has this IP) then it would work.

But isn't DNScrypt just doing DoH to some servers?
If you'd configure AdGuardHome to use those same upstream servers that you have configured in DNScrypt, then wouldn't you have the same situation??
(unlike Pihole, AdGuardHome does support DoH/DoT out of the box)
 
It's good you have and share you ideas! :)
But now have limited time and will only try to get forward with some unfinished things like
USB partitions and the supervision thing.
Hello,

5.3b26 is still running pretty good for me - only 1 restart of net-lan and or a reboot in the past 2 days! The extended logging not starting after erasing and the ongoing detection of DNS failures are the only issues I see. I do however have a question and feature request if it is practical...

On my other network, I have been running DNSCrypt on the same devices as my Pi-Holes. The Pi-Holes are set up much like AdGuard Home is on the Kamoj add-on, and they function in much the same way. But instead of pointing the Pi-Holes to a DNS resolver like 1.1.1.1, I have them set to use DNSCrypt running over port 53000 on the same device. DNSCrypt is set to do the DNS lookups using their anonymous relay (kind of like using TOR) and Pi-Hole does the adblocking and provides DNS statistics and logging. This setup has been very reliable and I have not seen any noticeable lag doing that - even with my high latency internet connection.

I know that AdGuard Home can use DNSCrypt servers and in fact that is what I am using right now. However, I have not been able to find a way to easily use the DNSCrypt anonymous relays within AdGuard Home. Is there a way to do that? And if not...

I know that the add-on FAQ says that AdGuard Home and DNSCrypt cannot be used together. But could the add-on be changed so DNSCrypt could run in the background on a different port and then be used by AdGuard - like I do on my other network? Its probably not a high value request at this time, but looking into the add-on I think its possible???

Thanks,
BL
 
  • Like
Reactions: KW.
in theory: if DNScrypt and AdGuardHome are enabled at the same time, and AdGuardHome is configured to only use upstream dns server 192.168.1.1 (assuming your router has this IP) then it would work.

But isn't DNScrypt just doing DoH to some servers?
If you'd configure AdGuardHome to use those same upstream servers that you have configured in DNScrypt, then wouldn't you have the same situation??
(unlike Pihole, AdGuardHome does support DoH/DoT out of the box)

Hello,

Thank for the info...I'm thinking it would likely work too. I am not well versed on this, but as far as I know DNSCrypt-Proxy-2 does support DOH but not DOT? I am using both DNSCrypt and DOH resolvers.

I prefer the DNSCrypt protocol over DOH and DOT as I feel it provides slightly better privacy and performance. However, I also use the DNSCrypt relay servers to anonymize my DNS traffic and I do not think you can do that in AdGuard. So I was thinking that perhaps the add-on could run both DNSCrypt-Proxy-2 and AdGuard so you can get the benefit of both like I do with DNSCrypt/Pi-Hole.

BL
 
It's good you have and share you ideas! :)
But now have limited time and will only try to get forward with some unfinished things like
USB partitions and the supervision thing.

I completely understand and I hesitated to even bring it up. I am amazed by what you and others are able to accomplish with little available time and I sincerely thank you!

BL
 
Hello,

issue has showed again:

Mem: 437744K used, 45780K free, 0K shrd, 23288K buff, 173432K cached
Load average: 7.17 5.78 4.94
_PID USER _ _ STATUS _ RSS _PPID %CPU %MEM COMMAND
3577 root _ _ S _ _ _62512 _ _ 1 84.4 12.9 AdGuardHome
14879 root _ _ S _ _ _ _316 _ _ 1 _2.4 _0.0 busybox
_ 32 root _ _ SW _ _ _ _ 0 _ _ 2 _1.4 _0.0 kworker/0:1
5740 root _ _ R _ _ _ _412 _5505 _0.4 _0.0 top
5127 root _ _ S _ _ _ _248 _ _ 1 _0.4 _0.0 traffic_meter
32197 root _ _ RW _ _ _ _ 0 _ _ 2 _0.4 _0.0 kworker/u:3
14781 root _ _ S _ _ _14892 _ _ 1 _0.0 _3.0 minidlna
15654 root _ _ S _ _ _ 1748 _ _ 1 _0.0 _0.3 access-patrol
2857 root _ _ S _ _ _ 1464 _5574 _0.0 _0.3 smbd
15626 root _ _ S _ _ _ 1216 15624 _0.0 _0.2 php-cgi
5505 root _ _ S _ _ _ 1208 _5455 _0.0 _0.2 kamoj.sh
15641 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15639 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15640 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15638 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
4488 root _ _ S _ _ _ 1168 _4473 _0.0 _0.2 xagent
6293 root _ _ S _ _ _ _976 _ _ 1 _0.0 _0.2 hostapd
7989 root _ _ S _ _ _ _960 _ _ 1 _0.0 _0.1 hostapd
15650 root _ _ S _ _ _ _780 15647 _0.0 _0.1 kwilt-index
1839 root _ _ S _ _ _ _780 _ _ 1 _0.0 _0.1 haveged
3011 guest _ _S _ _ _ _672 _ _ 1 _0.0 _0.1 dnsmasq
_460 root _ _ S _ _ _ _632 _ _ 1 _0.0 _0.1 nmbd
7446 root _ _ S _ _ _ _624 _ _ 1 _0.0 _0.1 avahi-daemon
5574 root _ _ S _ _ _ _536 _ _ 1 _0.0 _0.1 smbd
6806 root _ _ S _ _ _ _520 _ _ 1 _0.0 _0.1 addon_info_upda
6804 root _ _ S _ _ _ _516 _ _ 1 _0.0 _0.1 addon_info_upda
4477 root _ _ S _ _ _ _516 _ _ 1 _0.0 _0.1 uhttpd
5455 root _ _ S _ _ _ _488 _4477 _0.0 _0.1 kamoj.cgi
6805 root _ _ S _ _ _ _480 _ _ 1 _0.0 _0.0 addon_info_upda
6807 root _ _ S _ _ _ _468 _ _ 1 _0.0 _0.0 addon_info_upda
8857 root _ _ S _ _ _ _468 _ _ 1 _0.0 _0.0 aws-iot
_813 root _ _ S _ _ _ _412 _ _ 1 _0.0 _0.0 afpd
15624 root _ _ S _ _ _ _400 _ _ 1 _0.0 _0.0 lighttpd
1346 root _ _ S _ _ _ _384 _ _ 1 _0.0 _0.0 datalib
13834 root _ _ S _ _ _ _380 _ _ 1 _0.0 _0.0 addons.sh
15193 root _ _ S _ _ _ _376 15192 _0.0 _0.0 ld-uClibc.so.0
8240 root _ _ S _ _ _ _364 _ _ 1 _0.0 _0.0 lbd
2289 root _ _ S _ _ _ _344 _ _ 1 _0.0 _0.0 udhcpd
18738 root _ _ S _ _ _ _344 _ _ 1 _0.0 _0.0 crond
1613 root _ _ S _ _ _ _336 _ _ 1 _0.0 _0.0 hotplug2
4030 root _ _ S _ _ _ _316 _ _ 1 _0.0 _0.0 net-scan
15647 root _ _ S _ _ _ _312 _ _ 1 _0.0 _0.0 kwilt-index
18699 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
18725 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
18675 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
28991 root _ _ S _ _ _ _308 _8790 _0.0 _0.0 sleep
5454 root _ _ S _ _ _ _308 _6805 _0.0 _0.0 sleep
31902 root _ _ S _ _ _ _308 _5509 _0.0 _0.0 sleep
4697 root _ _ S _ _ _ _308 _6807 _0.0 _0.0 sleep
5450 root _ _ S _ _ _ _308 _5066 _0.0 _0.0 sleep
4255 root _ _ S _ _ _ _308 _6804 _0.0 _0.0 sleep
15192 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 ld-uClibc.so.0
5073 root _ _ S _ _ _ _308 _6806 _0.0 _0.0 sleep
_689 root _ _ S _ _ _ _308 13834 _0.0 _0.0 sleep
5163 root _ _ S _ _ _ _300 _ _ 1 _0.0 _0.0 KC_BONJOUR
5052 root _ _ S _ _ _ _296 _ _ 1 _0.0 _0.0 crond
5066 root _ _ S _ _ _ _292 _ _ 1 _0.0 _0.0 netconn.sh
5741 root _ _ S _ _ _ _292 _5505 _0.0 _0.0 usleep
18717 root _ _ S _ _ _ _288 _ _ 1 _0.0 _0.0 crond
18746 root _ _ S _ _ _ _288 _ _ 1 _0.0 _0.0 crond
5509 root _ _ S _ _ _ _284 _ _ 1 _0.0 _0.0 check_status.sh
8790 root _ _ S _ _ _ _276 _ _ 1 _0.0 _0.0 check_time_mach
4489 root _ _ S _ _ _ _268 _ _ 1 _0.0 _0.0 acld
32051 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 miniupnpd
7997 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 hostapd_cli
6303 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 hostapd_cli
11932 root _ _ S _ _ _ _252 _ _ 1 _0.0 _0.0 traffic_meter
5164 root _ _ S _ _ _ _248 _ _ 1 _0.0 _0.0 KC_PRINT
4967 root _ _ S _ _ _ _236 _ _ 1 _0.0 _0.0 syslogd
4473 root _ _ S _ _ _ _228 _ _ 1 _0.0 _0.0 xagent
8967 root _ _ S _ _ _ _200 _ _ 1 _0.0 _0.0 icqm
4466 root _ _ S _ _ _ _184 _ _ 1 _0.0 _0.0 uhttpd
4480 root _ _ S _ _ _ _180 _ _ 1 _0.0 _0.0 inetd
1321 root _ _ S _ _ _ _176 _1318 _0.0 _0.0 logger
7094 root _ _ S _ _ _ _176 _ _ 1 _0.0 _0.0 dbus-daemon
1343 root _ _ S _ _ _ _168 _ _ 1 _0.0 _0.0 klogd
4034 root _ _ S _ _ _ _164 _ _ 1 _0.0 _0.0 lld2d
2008 root _ _ S _ _ _ _160 _ _ 1 _0.0 _0.0 detcable
_ _1 root _ _ S _ _ _ _148 _ _ 0 _0.0 _0.0 init
5004 root _ _ S _ _ _ _148 _ _ 1 _0.0 _0.0 ntgrddns
1318 root _ _ S _ _ _ _144 _ _ 1 _0.0 _0.0 rcS
15611 root _ _ S _ _ _ _112 _ _ 1 _0.0 _0.0 klogd
6070 root _ _ S _ _ _ _112 14879 _0.0 _0.0 sleep
1378 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 watchdog
1836 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 ubusd
5566 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 dropbear
4514 root _ _ S _ _ _ _ 96 _ _ 1 _0.0 _0.0 ntpclient
1325 root _ _ S _ _ _ _ 88 _ _ 1 _0.0 _0.0 init
6990 root _ _ S _ _ _ _ 84 _ _ 1 _0.0 _0.0 utelnetd
4490 root _ _ S _ _ _ _ 80 _ _ 1 _0.0 _0.0 aclhijackdns
5496 root _ _ S _ _ _ _ 60 _ _ 1 _0.0 _0.0 telnetenable
5065 root _ _ S _ _ _ _ 60 _ _ 1 _0.0 _0.0 potval
_111 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 irq/202-msmdata
1586 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 usb-storage
_ _3 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ksoftirqd/0
19684 root _ _ RW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:0
20434 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:1
_ _9 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ksoftirqd/1
_ _6 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 migration/0
_474 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kswapd0
_ _7 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 migration/1
20928 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:4
_613 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock6
_605 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/1:1
3712 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ufsd_sda1
_ _4 root _ _ DW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/0:0
5162 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 NU UDP
5158 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 _acktelnetDBGD
5159 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 checkSBusTimeou
_280 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 sync_supers
_307 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 khubd
_519 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 fsnotify_mark
1287 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ubifs_bgt0_5
_786 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 iewq
5157 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 _telnetDBGD
1431 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 coredump_wait
_807 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 deferwq
1461 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 bond0
_787 root _ _ DW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kinteractiveup
_456 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 nmea
_800 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 rq_stats
1407 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 cifsiod
3950 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 flush-8:0
1424 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 gmac_workqueue
1430 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 nss_freq_queue
5161 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 NU TCP
_ _2 root _ _ SW _ _ _ _ 0 _ _ 0 _0.0 _0.0 kthreadd
1585 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 scsi_eh_1
_ 10 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 khelper
3951 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 flush-ubifs_0_5
3615 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/1:2
_700 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock17
_709 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock18
_718 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock19
_766 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 usbnet
_289 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ata_sff
_293 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 spi_qsd.5
_296 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 msm-spi-thread
_796 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 msm-cpufreq
_399 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 modem_notifier
_401 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smd_channel_clo
_402 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smsm_cb_wq
_427 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 qmi
13511 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/0:3
_458 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 rpcrouter
2000 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ecm_nss_ipv4_wo
_283 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 crypto
_284 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 kblockd
_548 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_notify_wq
_549 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_tx_wq
_550 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_rx_wq
_551 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_loopback_w
_567 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 scsi_eh_0
_582 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock0
_587 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock1
_592 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock2
_597 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock3
_602 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock4
_282 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 bdi-default
_608 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock5
2001 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ecm_nss_ipv6_wo
_618 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock7
_623 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock8
_628 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock9
_633 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock10
_638 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock11
_643 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock12
_653 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock13
_666 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ubi_bgt0d
_673 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock14
_682 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock15
_691 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock16

during long sleep period, if you go back to your pc and want to navigate, it is taking up to 5 minutes to get connection back.
 
I suggest you post in Adguard forum to get help. Or why you think it is an add-on problem?
Hello,

issue has showed again:

Mem: 437744K used, 45780K free, 0K shrd, 23288K buff, 173432K cached
Load average: 7.17 5.78 4.94
_PID USER _ _ STATUS _ RSS _PPID %CPU %MEM COMMAND
3577 root _ _ S _ _ _62512 _ _ 1 84.4 12.9 AdGuardHome
14879 root _ _ S _ _ _ _316 _ _ 1 _2.4 _0.0 busybox
_ 32 root _ _ SW _ _ _ _ 0 _ _ 2 _1.4 _0.0 kworker/0:1
5740 root _ _ R _ _ _ _412 _5505 _0.4 _0.0 top
5127 root _ _ S _ _ _ _248 _ _ 1 _0.4 _0.0 traffic_meter
32197 root _ _ RW _ _ _ _ 0 _ _ 2 _0.4 _0.0 kworker/u:3
14781 root _ _ S _ _ _14892 _ _ 1 _0.0 _3.0 minidlna
15654 root _ _ S _ _ _ 1748 _ _ 1 _0.0 _0.3 access-patrol
2857 root _ _ S _ _ _ 1464 _5574 _0.0 _0.3 smbd
15626 root _ _ S _ _ _ 1216 15624 _0.0 _0.2 php-cgi
5505 root _ _ S _ _ _ 1208 _5455 _0.0 _0.2 kamoj.sh
15641 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15639 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15640 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15638 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
4488 root _ _ S _ _ _ 1168 _4473 _0.0 _0.2 xagent
6293 root _ _ S _ _ _ _976 _ _ 1 _0.0 _0.2 hostapd
7989 root _ _ S _ _ _ _960 _ _ 1 _0.0 _0.1 hostapd
15650 root _ _ S _ _ _ _780 15647 _0.0 _0.1 kwilt-index
1839 root _ _ S _ _ _ _780 _ _ 1 _0.0 _0.1 haveged
3011 guest _ _S _ _ _ _672 _ _ 1 _0.0 _0.1 dnsmasq
_460 root _ _ S _ _ _ _632 _ _ 1 _0.0 _0.1 nmbd
7446 root _ _ S _ _ _ _624 _ _ 1 _0.0 _0.1 avahi-daemon
5574 root _ _ S _ _ _ _536 _ _ 1 _0.0 _0.1 smbd
6806 root _ _ S _ _ _ _520 _ _ 1 _0.0 _0.1 addon_info_upda
6804 root _ _ S _ _ _ _516 _ _ 1 _0.0 _0.1 addon_info_upda
4477 root _ _ S _ _ _ _516 _ _ 1 _0.0 _0.1 uhttpd
5455 root _ _ S _ _ _ _488 _4477 _0.0 _0.1 kamoj.cgi
6805 root _ _ S _ _ _ _480 _ _ 1 _0.0 _0.0 addon_info_upda
6807 root _ _ S _ _ _ _468 _ _ 1 _0.0 _0.0 addon_info_upda
8857 root _ _ S _ _ _ _468 _ _ 1 _0.0 _0.0 aws-iot
_813 root _ _ S _ _ _ _412 _ _ 1 _0.0 _0.0 afpd
15624 root _ _ S _ _ _ _400 _ _ 1 _0.0 _0.0 lighttpd
1346 root _ _ S _ _ _ _384 _ _ 1 _0.0 _0.0 datalib
13834 root _ _ S _ _ _ _380 _ _ 1 _0.0 _0.0 addons.sh
15193 root _ _ S _ _ _ _376 15192 _0.0 _0.0 ld-uClibc.so.0
8240 root _ _ S _ _ _ _364 _ _ 1 _0.0 _0.0 lbd
2289 root _ _ S _ _ _ _344 _ _ 1 _0.0 _0.0 udhcpd
18738 root _ _ S _ _ _ _344 _ _ 1 _0.0 _0.0 crond
1613 root _ _ S _ _ _ _336 _ _ 1 _0.0 _0.0 hotplug2
4030 root _ _ S _ _ _ _316 _ _ 1 _0.0 _0.0 net-scan
15647 root _ _ S _ _ _ _312 _ _ 1 _0.0 _0.0 kwilt-index
18699 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
18725 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
18675 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
28991 root _ _ S _ _ _ _308 _8790 _0.0 _0.0 sleep
5454 root _ _ S _ _ _ _308 _6805 _0.0 _0.0 sleep
31902 root _ _ S _ _ _ _308 _5509 _0.0 _0.0 sleep
4697 root _ _ S _ _ _ _308 _6807 _0.0 _0.0 sleep
5450 root _ _ S _ _ _ _308 _5066 _0.0 _0.0 sleep
4255 root _ _ S _ _ _ _308 _6804 _0.0 _0.0 sleep
15192 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 ld-uClibc.so.0
5073 root _ _ S _ _ _ _308 _6806 _0.0 _0.0 sleep
_689 root _ _ S _ _ _ _308 13834 _0.0 _0.0 sleep
5163 root _ _ S _ _ _ _300 _ _ 1 _0.0 _0.0 KC_BONJOUR
5052 root _ _ S _ _ _ _296 _ _ 1 _0.0 _0.0 crond
5066 root _ _ S _ _ _ _292 _ _ 1 _0.0 _0.0 netconn.sh
5741 root _ _ S _ _ _ _292 _5505 _0.0 _0.0 usleep
18717 root _ _ S _ _ _ _288 _ _ 1 _0.0 _0.0 crond
18746 root _ _ S _ _ _ _288 _ _ 1 _0.0 _0.0 crond
5509 root _ _ S _ _ _ _284 _ _ 1 _0.0 _0.0 check_status.sh
8790 root _ _ S _ _ _ _276 _ _ 1 _0.0 _0.0 check_time_mach
4489 root _ _ S _ _ _ _268 _ _ 1 _0.0 _0.0 acld
32051 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 miniupnpd
7997 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 hostapd_cli
6303 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 hostapd_cli
11932 root _ _ S _ _ _ _252 _ _ 1 _0.0 _0.0 traffic_meter
5164 root _ _ S _ _ _ _248 _ _ 1 _0.0 _0.0 KC_PRINT
4967 root _ _ S _ _ _ _236 _ _ 1 _0.0 _0.0 syslogd
4473 root _ _ S _ _ _ _228 _ _ 1 _0.0 _0.0 xagent
8967 root _ _ S _ _ _ _200 _ _ 1 _0.0 _0.0 icqm
4466 root _ _ S _ _ _ _184 _ _ 1 _0.0 _0.0 uhttpd
4480 root _ _ S _ _ _ _180 _ _ 1 _0.0 _0.0 inetd
1321 root _ _ S _ _ _ _176 _1318 _0.0 _0.0 logger
7094 root _ _ S _ _ _ _176 _ _ 1 _0.0 _0.0 dbus-daemon
1343 root _ _ S _ _ _ _168 _ _ 1 _0.0 _0.0 klogd
4034 root _ _ S _ _ _ _164 _ _ 1 _0.0 _0.0 lld2d
2008 root _ _ S _ _ _ _160 _ _ 1 _0.0 _0.0 detcable
_ _1 root _ _ S _ _ _ _148 _ _ 0 _0.0 _0.0 init
5004 root _ _ S _ _ _ _148 _ _ 1 _0.0 _0.0 ntgrddns
1318 root _ _ S _ _ _ _144 _ _ 1 _0.0 _0.0 rcS
15611 root _ _ S _ _ _ _112 _ _ 1 _0.0 _0.0 klogd
6070 root _ _ S _ _ _ _112 14879 _0.0 _0.0 sleep
1378 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 watchdog
1836 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 ubusd
5566 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 dropbear
4514 root _ _ S _ _ _ _ 96 _ _ 1 _0.0 _0.0 ntpclient
1325 root _ _ S _ _ _ _ 88 _ _ 1 _0.0 _0.0 init
6990 root _ _ S _ _ _ _ 84 _ _ 1 _0.0 _0.0 utelnetd
4490 root _ _ S _ _ _ _ 80 _ _ 1 _0.0 _0.0 aclhijackdns
5496 root _ _ S _ _ _ _ 60 _ _ 1 _0.0 _0.0 telnetenable
5065 root _ _ S _ _ _ _ 60 _ _ 1 _0.0 _0.0 potval
_111 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 irq/202-msmdata
1586 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 usb-storage
_ _3 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ksoftirqd/0
19684 root _ _ RW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:0
20434 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:1
_ _9 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ksoftirqd/1
_ _6 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 migration/0
_474 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kswapd0
_ _7 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 migration/1
20928 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:4
_613 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock6
_605 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/1:1
3712 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ufsd_sda1
_ _4 root _ _ DW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/0:0
5162 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 NU UDP
5158 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 _acktelnetDBGD
5159 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 checkSBusTimeou
_280 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 sync_supers
_307 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 khubd
_519 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 fsnotify_mark
1287 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ubifs_bgt0_5
_786 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 iewq
5157 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 _telnetDBGD
1431 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 coredump_wait
_807 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 deferwq
1461 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 bond0
_787 root _ _ DW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kinteractiveup
_456 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 nmea
_800 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 rq_stats
1407 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 cifsiod
3950 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 flush-8:0
1424 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 gmac_workqueue
1430 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 nss_freq_queue
5161 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 NU TCP
_ _2 root _ _ SW _ _ _ _ 0 _ _ 0 _0.0 _0.0 kthreadd
1585 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 scsi_eh_1
_ 10 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 khelper
3951 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 flush-ubifs_0_5
3615 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/1:2
_700 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock17
_709 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock18
_718 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock19
_766 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 usbnet
_289 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ata_sff
_293 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 spi_qsd.5
_296 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 msm-spi-thread
_796 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 msm-cpufreq
_399 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 modem_notifier
_401 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smd_channel_clo
_402 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smsm_cb_wq
_427 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 qmi
13511 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/0:3
_458 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 rpcrouter
2000 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ecm_nss_ipv4_wo
_283 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 crypto
_284 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 kblockd
_548 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_notify_wq
_549 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_tx_wq
_550 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_rx_wq
_551 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_loopback_w
_567 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 scsi_eh_0
_582 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock0
_587 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock1
_592 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock2
_597 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock3
_602 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock4
_282 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 bdi-default
_608 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock5
2001 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ecm_nss_ipv6_wo
_618 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock7
_623 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock8
_628 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock9
_633 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock10
_638 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock11
_643 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock12
_653 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock13
_666 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ubi_bgt0d
_673 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock14
_682 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock15
_691 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock16

during long sleep period, if you go back to your pc and want to navigate, it is taking up to 5 minutes to get connection back.
 
Changes in kamoj-addon beta version 5.3b27
--------------------------------------------------
- General: Handle USB devices with multiple partitions, e.g.:
Router Information,
ssh_keys_install.sh
Settings: Router Internals: Router Information: USB info: Show
- Settings: Router Internals: Router Information: USB info: Show: Added UUID
- Settings: Router Internals: Router Information: Supervision: moved to top
- DNS Privacy/Ad-Blocking: Updated: DNS Speed / Latency and Test Tools
- DNS Privacy/Ad-Blocking: Dnsmasq: Extended logging, and Show/Clear log
- DNS Privacy/Ad-Blocking: Connection Supervision: Fixed: Log started again after Erase
- DNS Privacy/Ad-Blocking: Connection Supervision: Changed to cron job (@R. Gerrits)
- DNS Privacy/Ad-Blocking: Connection Supervision: Changed:
Intermediate changes for next step of supervision
Bugs fixed
Added "traceroute" and "curl" and "dnscrypt-proxy-2 -resolve" to test connections
Added 16 ip + name addresses for connection tests
These will all be cycled and tested before a failure is acknowledged.
To use your own ip/name address, e.g.:
(separate ip/name address by at least one blank/space)
nvram set kamoj_ping_www=www.google.com amazon.com"
nvram set kamoj_ping_ip="8.8.8.8 1.1.1.1"
nvram commit
To let the add-on use all it's own ip/name addresses:
nvram unset kamoj_ping_www;nvram unset kamoj_ping_ip;nvram commit
- DNS Privacy/Ad-Blocking: Connection Supervision: Added: Success logging
- Minor fixes
 
Changes in kamoj-addon beta version 5.3b28
--------------------------------------------------
- Guest Network: Fixed: Guest WiFi have no DNS when "Allow guests to see each other and access my local network" is unselected and AdGuardHome is enabled.(@R. Gerrits)
- Guest Network: Fixed: Allow DNS over tcp when "Allow guests to see each other and access my local network" is unselected. (@R. Gerrits)
 
Last edited:
Changes in kamoj-addon beta version 5.3b28
--------------------------------------------------
- Guest Network: Fixed: Guest WiFi have no DNS when "Allow guests to see each other and access my local network" is unselected. (@R. Gerrits)
- DNS general: Fixed: Allow DNS over tcp. (@R. Gerrits)
good and fast work again from you.
One remark though, the change log isn't 100% accurate.
Correct text would be:
- Guest Network: Fixed: Guest WiFi have no DNS when "Allow guests to see each other and access my local network" is unselected and AdGuardHome is enabled.
-Guest Network: Fixed: Allow DNS over tcp when "Allow guests to see each other and access my local network" is unselected.
 
Hello,

I installed 5.3b28. The two partitions on my USB drive show correctly so I think that change is working well - thank you!

I did have some problems with AdGuard Home again. Looking at it more closely I am thinking it may be related to the multi-partition USB drive I am using. I could not get my backup config to load so I had to redo the config. I then saved a backup - which is now on the 2nd partition that is for my Acronis backups. I wonder if it was looking there instead of the main partition where the backup was saved the first time? (Looking at both partitions, I now have the AdGuardHome folder on both). I tried to look at the log files saved on the USB but these seem messed up as I have log files on both partitions as well.

However, everything seems to be running well so far. Its only been online for 11 hours, but once I completed the AdGuard Home setup and rebooted I have had no issues as no errors/restarts of DNSMasq or AdGuard.

Thanks
BL
 
  • Like
Reactions: KW.
Hello,

5.3b28 is running great... I have seen one or two ping / lookup failures for Cloudflare (due to high latency internet I'm sure). I have shown the error message from the current supervisor log below...the rest of the log is filled solely with the success messages as shown below the error.

[ADDONS] 2020-08-18 07:17:11 4594.43 restart_supervision.sh 28068: ping:1.1.1.1: Failed
[ADDONS] 2020-08-18 07:17:20 4603.43 restart_supervision.sh 28068: traceroute:1.1.1.1: Ok
[ADDONS] 2020-08-18 07:17:20 4603.44 restart_supervision.sh 28068: check_tunnels
[ADDONS] 2020-08-18 07:17:20 4603.52 restart_supervision.sh 28068: openvpn_is_running: Ok
[ADDONS] 2020-08-18 07:17:20 4603.56 restart_supervision.sh 28068: check_dns
[ADDONS] 2020-08-18 07:17:20 4603.60 restart_supervision.sh 28068: adguard_is_running: Ok
[ADDONS] 2020-08-18 07:17:28 4611.50 restart_supervision.sh 28068: nslookup:cloudflare.com Failed
[ADDONS] 2020-08-18 07:17:37 4620.51 restart_supervision.sh 28068: traceroute:cloudflare.com: Ok
[ADDONS] 2020-08-18 07:17:37 4620.52 restart_supervision.sh 28068: ---------------------------------------------------------------------------
[ADDONS] 2020-08-18 07:18:02 4645.13 restart_supervision.sh 8014: ping:1.1.1.1: Ok
[ADDONS] 2020-08-18 07:18:02 4645.13 restart_supervision.sh 8014: check_tunnels
[ADDONS] 2020-08-18 07:18:02 4645.20 restart_supervision.sh 8014: openvpn_is_running: Ok
[ADDONS] 2020-08-18 07:18:02 4645.24 restart_supervision.sh 8014: check_dns
[ADDONS] 2020-08-18 07:18:02 4645.27 restart_supervision.sh 8014: adguard_is_running: Ok
[ADDONS] 2020-08-18 07:18:05 4647.63 restart_supervision.sh 8014: nslookup:cloudflare.com Failed
[ADDONS] 2020-08-18 07:18:14 4656.64 restart_supervision.sh 8014: traceroute:cloudflare.com: Ok
[ADDONS] 2020-08-18 07:18:14 4656.65 restart_supervision.sh 8014: ---------------------------------------------------------------------------

Question: Does the add-on only use the other addresses if ping, lookup and traceroute all fail?

I am not getting any DNSMasq failure messages with this version either:
2020-07-24 08:06:00 [DNSMASQ] 33.55 rc.common 8036: start
2020-07-24 08:06:00 [DNSMASQ] 33.57 rc.common 8036: Copying /etc/dnsmasq-resolv.conf to /tmp/dnsmasq.conf
2020-07-24 08:06:00 [DNSMASQ] 33.61 rc.common 8036: Resolvers: 192.168.11.1 192.168.11.10 192.168.11.135
2020-07-24 08:06:00 [DNSMASQ] 33.62 rc.common 8036: Options:

Fantastic! Thanks,
BL
 
Hello,

issue has showed again:

Mem: 437744K used, 45780K free, 0K shrd, 23288K buff, 173432K cached
Load average: 7.17 5.78 4.94
_PID USER _ _ STATUS _ RSS _PPID %CPU %MEM COMMAND
3577 root _ _ S _ _ _62512 _ _ 1 84.4 12.9 AdGuardHome
14879 root _ _ S _ _ _ _316 _ _ 1 _2.4 _0.0 busybox
_ 32 root _ _ SW _ _ _ _ 0 _ _ 2 _1.4 _0.0 kworker/0:1
5740 root _ _ R _ _ _ _412 _5505 _0.4 _0.0 top
5127 root _ _ S _ _ _ _248 _ _ 1 _0.4 _0.0 traffic_meter
32197 root _ _ RW _ _ _ _ 0 _ _ 2 _0.4 _0.0 kworker/u:3
14781 root _ _ S _ _ _14892 _ _ 1 _0.0 _3.0 minidlna
15654 root _ _ S _ _ _ 1748 _ _ 1 _0.0 _0.3 access-patrol
2857 root _ _ S _ _ _ 1464 _5574 _0.0 _0.3 smbd
15626 root _ _ S _ _ _ 1216 15624 _0.0 _0.2 php-cgi
5505 root _ _ S _ _ _ 1208 _5455 _0.0 _0.2 kamoj.sh
15641 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15639 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15640 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
15638 root _ _ S _ _ _ 1176 15626 _0.0 _0.2 php-cgi
4488 root _ _ S _ _ _ 1168 _4473 _0.0 _0.2 xagent
6293 root _ _ S _ _ _ _976 _ _ 1 _0.0 _0.2 hostapd
7989 root _ _ S _ _ _ _960 _ _ 1 _0.0 _0.1 hostapd
15650 root _ _ S _ _ _ _780 15647 _0.0 _0.1 kwilt-index
1839 root _ _ S _ _ _ _780 _ _ 1 _0.0 _0.1 haveged
3011 guest _ _S _ _ _ _672 _ _ 1 _0.0 _0.1 dnsmasq
_460 root _ _ S _ _ _ _632 _ _ 1 _0.0 _0.1 nmbd
7446 root _ _ S _ _ _ _624 _ _ 1 _0.0 _0.1 avahi-daemon
5574 root _ _ S _ _ _ _536 _ _ 1 _0.0 _0.1 smbd
6806 root _ _ S _ _ _ _520 _ _ 1 _0.0 _0.1 addon_info_upda
6804 root _ _ S _ _ _ _516 _ _ 1 _0.0 _0.1 addon_info_upda
4477 root _ _ S _ _ _ _516 _ _ 1 _0.0 _0.1 uhttpd
5455 root _ _ S _ _ _ _488 _4477 _0.0 _0.1 kamoj.cgi
6805 root _ _ S _ _ _ _480 _ _ 1 _0.0 _0.0 addon_info_upda
6807 root _ _ S _ _ _ _468 _ _ 1 _0.0 _0.0 addon_info_upda
8857 root _ _ S _ _ _ _468 _ _ 1 _0.0 _0.0 aws-iot
_813 root _ _ S _ _ _ _412 _ _ 1 _0.0 _0.0 afpd
15624 root _ _ S _ _ _ _400 _ _ 1 _0.0 _0.0 lighttpd
1346 root _ _ S _ _ _ _384 _ _ 1 _0.0 _0.0 datalib
13834 root _ _ S _ _ _ _380 _ _ 1 _0.0 _0.0 addons.sh
15193 root _ _ S _ _ _ _376 15192 _0.0 _0.0 ld-uClibc.so.0
8240 root _ _ S _ _ _ _364 _ _ 1 _0.0 _0.0 lbd
2289 root _ _ S _ _ _ _344 _ _ 1 _0.0 _0.0 udhcpd
18738 root _ _ S _ _ _ _344 _ _ 1 _0.0 _0.0 crond
1613 root _ _ S _ _ _ _336 _ _ 1 _0.0 _0.0 hotplug2
4030 root _ _ S _ _ _ _316 _ _ 1 _0.0 _0.0 net-scan
15647 root _ _ S _ _ _ _312 _ _ 1 _0.0 _0.0 kwilt-index
18699 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
18725 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
18675 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 crond
28991 root _ _ S _ _ _ _308 _8790 _0.0 _0.0 sleep
5454 root _ _ S _ _ _ _308 _6805 _0.0 _0.0 sleep
31902 root _ _ S _ _ _ _308 _5509 _0.0 _0.0 sleep
4697 root _ _ S _ _ _ _308 _6807 _0.0 _0.0 sleep
5450 root _ _ S _ _ _ _308 _5066 _0.0 _0.0 sleep
4255 root _ _ S _ _ _ _308 _6804 _0.0 _0.0 sleep
15192 root _ _ S _ _ _ _308 _ _ 1 _0.0 _0.0 ld-uClibc.so.0
5073 root _ _ S _ _ _ _308 _6806 _0.0 _0.0 sleep
_689 root _ _ S _ _ _ _308 13834 _0.0 _0.0 sleep
5163 root _ _ S _ _ _ _300 _ _ 1 _0.0 _0.0 KC_BONJOUR
5052 root _ _ S _ _ _ _296 _ _ 1 _0.0 _0.0 crond
5066 root _ _ S _ _ _ _292 _ _ 1 _0.0 _0.0 netconn.sh
5741 root _ _ S _ _ _ _292 _5505 _0.0 _0.0 usleep
18717 root _ _ S _ _ _ _288 _ _ 1 _0.0 _0.0 crond
18746 root _ _ S _ _ _ _288 _ _ 1 _0.0 _0.0 crond
5509 root _ _ S _ _ _ _284 _ _ 1 _0.0 _0.0 check_status.sh
8790 root _ _ S _ _ _ _276 _ _ 1 _0.0 _0.0 check_time_mach
4489 root _ _ S _ _ _ _268 _ _ 1 _0.0 _0.0 acld
32051 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 miniupnpd
7997 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 hostapd_cli
6303 root _ _ S _ _ _ _256 _ _ 1 _0.0 _0.0 hostapd_cli
11932 root _ _ S _ _ _ _252 _ _ 1 _0.0 _0.0 traffic_meter
5164 root _ _ S _ _ _ _248 _ _ 1 _0.0 _0.0 KC_PRINT
4967 root _ _ S _ _ _ _236 _ _ 1 _0.0 _0.0 syslogd
4473 root _ _ S _ _ _ _228 _ _ 1 _0.0 _0.0 xagent
8967 root _ _ S _ _ _ _200 _ _ 1 _0.0 _0.0 icqm
4466 root _ _ S _ _ _ _184 _ _ 1 _0.0 _0.0 uhttpd
4480 root _ _ S _ _ _ _180 _ _ 1 _0.0 _0.0 inetd
1321 root _ _ S _ _ _ _176 _1318 _0.0 _0.0 logger
7094 root _ _ S _ _ _ _176 _ _ 1 _0.0 _0.0 dbus-daemon
1343 root _ _ S _ _ _ _168 _ _ 1 _0.0 _0.0 klogd
4034 root _ _ S _ _ _ _164 _ _ 1 _0.0 _0.0 lld2d
2008 root _ _ S _ _ _ _160 _ _ 1 _0.0 _0.0 detcable
_ _1 root _ _ S _ _ _ _148 _ _ 0 _0.0 _0.0 init
5004 root _ _ S _ _ _ _148 _ _ 1 _0.0 _0.0 ntgrddns
1318 root _ _ S _ _ _ _144 _ _ 1 _0.0 _0.0 rcS
15611 root _ _ S _ _ _ _112 _ _ 1 _0.0 _0.0 klogd
6070 root _ _ S _ _ _ _112 14879 _0.0 _0.0 sleep
1378 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 watchdog
1836 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 ubusd
5566 root _ _ S _ _ _ _104 _ _ 1 _0.0 _0.0 dropbear
4514 root _ _ S _ _ _ _ 96 _ _ 1 _0.0 _0.0 ntpclient
1325 root _ _ S _ _ _ _ 88 _ _ 1 _0.0 _0.0 init
6990 root _ _ S _ _ _ _ 84 _ _ 1 _0.0 _0.0 utelnetd
4490 root _ _ S _ _ _ _ 80 _ _ 1 _0.0 _0.0 aclhijackdns
5496 root _ _ S _ _ _ _ 60 _ _ 1 _0.0 _0.0 telnetenable
5065 root _ _ S _ _ _ _ 60 _ _ 1 _0.0 _0.0 potval
_111 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 irq/202-msmdata
1586 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 usb-storage
_ _3 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ksoftirqd/0
19684 root _ _ RW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:0
20434 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:1
_ _9 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ksoftirqd/1
_ _6 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 migration/0
_474 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kswapd0
_ _7 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 migration/1
20928 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/u:4
_613 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock6
_605 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/1:1
3712 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ufsd_sda1
_ _4 root _ _ DW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/0:0
5162 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 NU UDP
5158 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 _acktelnetDBGD
5159 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 checkSBusTimeou
_280 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 sync_supers
_307 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 khubd
_519 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 fsnotify_mark
1287 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ubifs_bgt0_5
_786 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 iewq
5157 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 _telnetDBGD
1431 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 coredump_wait
_807 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 deferwq
1461 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 bond0
_787 root _ _ DW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kinteractiveup
_456 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 nmea
_800 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 rq_stats
1407 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 cifsiod
3950 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 flush-8:0
1424 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 gmac_workqueue
1430 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 nss_freq_queue
5161 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 NU TCP
_ _2 root _ _ SW _ _ _ _ 0 _ _ 0 _0.0 _0.0 kthreadd
1585 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 scsi_eh_1
_ 10 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 khelper
3951 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 flush-ubifs_0_5
3615 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/1:2
_700 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock17
_709 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock18
_718 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock19
_766 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 usbnet
_289 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ata_sff
_293 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 spi_qsd.5
_296 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 msm-spi-thread
_796 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 msm-cpufreq
_399 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 modem_notifier
_401 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smd_channel_clo
_402 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smsm_cb_wq
_427 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 qmi
13511 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 kworker/0:3
_458 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 rpcrouter
2000 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ecm_nss_ipv4_wo
_283 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 crypto
_284 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 kblockd
_548 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_notify_wq
_549 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_tx_wq
_550 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_rx_wq
_551 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 smux_loopback_w
_567 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 scsi_eh_0
_582 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock0
_587 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock1
_592 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock2
_597 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock3
_602 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock4
_282 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 bdi-default
_608 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock5
2001 root _ _ SW< _ _ _ _0 _ _ 2 _0.0 _0.0 ecm_nss_ipv6_wo
_618 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock7
_623 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock8
_628 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock9
_633 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock10
_638 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock11
_643 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock12
_653 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock13
_666 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 ubi_bgt0d
_673 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock14
_682 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock15
_691 root _ _ SW _ _ _ _ 0 _ _ 2 _0.0 _0.0 mtdblock16

during long sleep period, if you go back to your pc and want to navigate, it is taking up to 5 minutes to get connection back.
I haven't noticed the same thing on my R9000 with AdGuard. I am not using the default AdGuard Home config. Mine is set to use several DNSCrypt servers only along with a whitelist - otherwise its using the standard settings. I will pay more attention to it and see if I notice anything unusual. I've attached my Top log file for comparison,,

BL
 

Attachments

  • R9000_top.txt
    12.7 KB · Views: 85
Hello,

One other thing I forgot to mention...

I did do a factory reset and reinstall of the Voxel firmware and erasure of the add-on settings as I had said I would do to check 5.3b25. It didn't make a difference and it looks like the changes to 5.3b28 corrected the connection/restart issues I was having. The only real issue I have had with 5.3b28 is the one I mentioned with the AdGuard Home install (config) and logs getting put to both USB partitions.

However, I have a question about where the VPN Bypassing gets its device list. You see, when I first installed the beta add-on I had a (device name) typo in my DHCP static address list on the Netgear LAN Setup page. That typo showed up in the Add-on's VPN Bypass list. The incorrect device name remained in the VPN Bypass list even after I corrected it on the LAN Setup page. I assumed that the factory reset and purging the add-on settings (as noted in the FAQ) would correct the typo showing up in the Bypass list...but it didn't. Not a big deal but now I am curious...Is there something else I should do to fix this?

Thanks,
BL
 
I'm away and have phone to write reply only.
Addon use partition labelled optware. Else random due to hot plug code.
Hello,

I installed 5.3b28. The two partitions on my USB drive show correctly so I think that change is working well - thank you!

I did have some problems with AdGuard Home again. Looking at it more closely I am thinking it may be related to the multi-partition USB drive I am using. I could not get my backup config to load so I had to redo the config. I then saved a backup - which is now on the 2nd partition that is for my Acronis backups. I wonder if it was looking there instead of the main partition where the backup was saved the first time? (Looking at both partitions, I now have the AdGuardHome folder on both). I tried to look at the log files saved on the USB but these seem messed up as I have log files on both partitions as well.

However, everything seems to be running well so far. Its only been online for 11 hours, but once I completed the AdGuard Home setup and rebooted I have had no issues as no errors/restarts of DNSMasq or AdGuard.

Thanks
BL
 
Last edited:
Good it work better for you.[yes next ip/address used only if first fail.
Hello,

5.3b28 is running great... I have seen one or two ping / lookup failures for Cloudflare (due to high latency internet I'm sure). I have shown the error message from the current supervisor log below...the rest of the log is filled solely with the success messages as shown below the error.

[ADDONS] 2020-08-18 07:17:11 4594.43 restart_supervision.sh 28068: ping:1.1.1.1: Failed
[ADDONS] 2020-08-18 07:17:20 4603.43 restart_supervision.sh 28068: traceroute:1.1.1.1: Ok
[ADDONS] 2020-08-18 07:17:20 4603.44 restart_supervision.sh 28068: check_tunnels
[ADDONS] 2020-08-18 07:17:20 4603.52 restart_supervision.sh 28068: openvpn_is_running: Ok
[ADDONS] 2020-08-18 07:17:20 4603.56 restart_supervision.sh 28068: check_dns
[ADDONS] 2020-08-18 07:17:20 4603.60 restart_supervision.sh 28068: adguard_is_running: Ok
[ADDONS] 2020-08-18 07:17:28 4611.50 restart_supervision.sh 28068: nslookup:cloudflare.com Failed
[ADDONS] 2020-08-18 07:17:37 4620.51 restart_supervision.sh 28068: traceroute:cloudflare.com: Ok
[ADDONS] 2020-08-18 07:17:37 4620.52 restart_supervision.sh 28068: ---------------------------------------------------------------------------
[ADDONS] 2020-08-18 07:18:02 4645.13 restart_supervision.sh 8014: ping:1.1.1.1: Ok
[ADDONS] 2020-08-18 07:18:02 4645.13 restart_supervision.sh 8014: check_tunnels
[ADDONS] 2020-08-18 07:18:02 4645.20 restart_supervision.sh 8014: openvpn_is_running: Ok
[ADDONS] 2020-08-18 07:18:02 4645.24 restart_supervision.sh 8014: check_dns
[ADDONS] 2020-08-18 07:18:02 4645.27 restart_supervision.sh 8014: adguard_is_running: Ok
[ADDONS] 2020-08-18 07:18:05 4647.63 restart_supervision.sh 8014: nslookup:cloudflare.com Failed
[ADDONS] 2020-08-18 07:18:14 4656.64 restart_supervision.sh 8014: traceroute:cloudflare.com: Ok
[ADDONS] 2020-08-18 07:18:14 4656.65 restart_supervision.sh 8014: ---------------------------------------------------------------------------

Question: Does the add-on only use the other addresses if ping, lookup and traceroute all fail?

I am not getting any DNSMasq failure messages with this version either:
2020-07-24 08:06:00 [DNSMASQ] 33.55 rc.common 8036: start
2020-07-24 08:06:00 [DNSMASQ] 33.57 rc.common 8036: Copying /etc/dnsmasq-resolv.conf to /tmp/dnsmasq.conf
2020-07-24 08:06:00 [DNSMASQ] 33.61 rc.common 8036: Resolvers: 192.168.11.1 192.168.11.10 192.168.11.135
2020-07-24 08:06:00 [DNSMASQ] 33.62 rc.common 8036: Options:

Fantastic! Thanks,
BL
 
Last edited:
There are several tricks to find a device identity, I don't remember.
Remind me please in a week or two when I back home.
And thank you for all report.
Things getting better because you advanced user! :cool:
Hello,

One other thing I forgot to mention...

I did do a factory reset and reinstall of the Voxel firmware and erasure of the add-on settings as I had said I would do to check 5.3b25. It didn't make a difference and it looks like the changes to 5.3b28 corrected the connection/restart issues I was having. The only real issue I have had with 5.3b28 is the one I mentioned with the AdGuard Home install (config) and logs getting put to both USB partitions.

However, I have a question about where the VPN Bypassing gets its device list. You see, when I first installed the beta add-on I had a (device name) typo in my DHCP static address list on the Netgear LAN Setup page. That typo showed up in the Add-on's VPN Bypass list. The incorrect device name remained in the VPN Bypass list even after I corrected it on the LAN Setup page. I assumed that the factory reset and purging the add-on settings (as noted in the FAQ) would correct the typo showing up in the Bypass list...but it didn't. Not a big deal but now I am curious...Is there something else I should do to fix this?

Thanks,
BL
 
  • Like
Reactions: KW.

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top