Guest User

Untitled

a guest
Feb 1st, 2014
121
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.88 KB | None | 0 0
  1. Jan 1 00:00:07 syslogd started: BusyBox v1.17.4
  2. Jan 1 00:00:07 kernel: klogd started: BusyBox v1.17.4 (2013-08-06 19:33:59 CST)
  3. Jan 1 00:00:07 kernel: Linux version 2.6.22.19 (root@asus) (gcc version 4.2.4) #1 Tue Aug 6 19:37:06 CST 2013
  4. Jan 1 00:00:07 kernel: CPU revision is: 00019749
  5. Jan 1 00:00:07 kernel: Found an ST compatible serial flash with 128 64KB blocks; total size 8MB
  6. Jan 1 00:00:07 kernel: Determined physical RAM map:
  7. Jan 1 00:00:07 kernel: memory: 02000000 @ 00000000 (usable)
  8. Jan 1 00:00:07 kernel: Built 1 zonelists. Total pages: 8128
  9. Jan 1 00:00:07 kernel: Kernel command line: root=/dev/mtdblock2 noinitrd console=ttyS0,115200
  10. Jan 1 00:00:07 kernel: Primary instruction cache 32kB, physically tagged, 4-way, linesize 32 bytes.
  11. Jan 1 00:00:07 kernel: Primary data cache 32kB, 4-way, linesize 32 bytes.
  12. Jan 1 00:00:07 kernel: PID hash table entries: 128 (order: 7, 512 bytes)
  13. Jan 1 00:00:07 kernel: CPU: BCM53572 rev 1 pkg 8 at 300 MHz
  14. Jan 1 00:00:07 kernel: Using 150.000 MHz high precision timer.
  15. Jan 1 00:00:07 kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)
  16. Jan 1 00:00:07 kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)
  17. Jan 1 00:00:07 kernel: Mount-cache hash table entries: 512
  18. Jan 1 00:00:07 kernel: PCI: no core
  19. Jan 1 00:00:07 kernel: PCI: no core
  20. Jan 1 00:00:07 kernel: PCI: Fixing up bus 0
  21. Jan 1 00:00:07 kernel: IP route cache hash table entries: 1024 (order: 0, 4096 bytes)
  22. Jan 1 00:00:07 kernel: TCP established hash table entries: 1024 (order: 1, 8192 bytes)
  23. Jan 1 00:00:07 kernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
  24. Jan 1 00:00:07 kernel: pflash: found no supported devices
  25. Jan 1 00:00:07 kernel: Creating 5 MTD partitions on "sflash":
  26. Jan 1 00:00:07 kernel: 0x00000000-0x00020000 : "pmon"
  27. Jan 1 00:00:07 kernel: 0x00020000-0x007f0000 : "linux"
  28. Jan 1 00:00:07 kernel: 0x0014855c-0x005e0000 : "rootfs"
  29. Jan 1 00:00:07 kernel: 0x007f0000-0x00800000 : "nvram"
  30. Jan 1 00:00:07 kernel: 0x007a0000-0x007f0000 : "jffs2"
  31. Jan 1 00:00:07 kernel: dev_nvram_init: _nvram_init
  32. Jan 1 00:00:07 kernel: _nvram_init: allocat header: 2151579648, size= 32768
  33. Jan 1 00:00:07 kernel: u32 classifier
  34. Jan 1 00:00:07 kernel: OLD policer on
  35. Jan 1 00:00:07 kernel: Netfilter messages via NETLINK v0.30.
  36. Jan 1 00:00:07 kernel: nf_conntrack version 0.5.0 (512 buckets, 4096 max)
  37. Jan 1 00:00:07 kernel: ipt_time loading
  38. Jan 1 00:00:07 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
  39. Jan 1 00:00:07 kernel: net/ipv4/netfilter/tomato_ct.c [Aug 6 2013 19:36:11]
  40. Jan 1 00:00:07 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
  41. Jan 1 00:00:07 kernel: VFS: Mounted root (squashfs filesystem) readonly.
  42. Jan 1 00:00:07 kernel: Warning: unable to open an initial console.
  43. Jan 1 00:00:07 kernel: ctf: module license 'Proprietary' taints kernel.
  44. Jan 1 00:00:07 kernel: et_module_init: passivemode set to 0x0
  45. Jan 1 00:00:07 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 5.110.27.20012
  46. Jan 1 00:00:07 kernel: wl_module_init: passivemode set to 0x0
  47. Jan 1 00:00:07 kernel: eth1: Broadcom BCM4347 802.11 Wireless Controller 5.110.27.20012
  48. Jan 1 00:00:07 kernel: Algorithmics/MIPS FPU Emulator v1.5
  49. Jan 1 00:00:09 stop_nat_rules: apply the redirect_rules!
  50. Jan 1 00:00:09 WAN Connection: Fail to connect with some issues.
  51. Jan 1 00:00:10 RT-N12: start httpd
  52. Jan 1 00:00:10 miniupnpd[209]: HTTP listening on port 36030
  53. Jan 1 00:00:10 miniupnpd[209]: Listening for NAT-PMP traffic on port 5351
  54. Jan 1 00:00:20 pppd[215]: warning: quoted word runs to end of file (/tmp/ppp/options.wan...)
  55. Jan 1 00:00:20 pppd[216]: pppd 2.4.5 started by admin, uid 0
  56. Jan 1 00:00:21 pppoe-relay[210]: PADO packet from 00:25:84:af:71:10 on interface eth0 does not have Relay-Session-Id tag
  57. Jan 1 00:00:21 pppoe-relay[210]: PADO packet from 88:43:e1:50:db:00 on interface eth0 does not have Relay-Session-Id tag
  58. Jan 1 00:00:21 pppoe-relay[210]: PADO packet from 88:43:e1:50:db:12 on interface eth0 does not have Relay-Session-Id tag
  59. Jan 1 00:00:21 pppoe-relay[210]: PADO packet from 88:43:e1:50:db:13 on interface eth0 does not have Relay-Session-Id tag
  60. Jan 1 00:00:21 pppoe-relay[210]: PADO packet from 54:75:d0:72:e3:10 on interface eth0 does not have Relay-Session-Id tag
  61. Jan 1 00:00:21 pppoe-relay[210]: PADO packet from a4:93:4c:48:a9:10 on interface eth0 does not have Relay-Session-Id tag
  62. Jan 1 00:00:21 pppoe-relay[210]: PADS packet from 00:25:84:af:71:10 on interface eth0 does not have Relay-Session-Id tag
  63. Jan 1 00:00:21 pppd[216]: Connected to 00:25:84:af:71:10 via interface eth0
  64. Jan 1 00:00:21 pppd[216]: Connect: ppp0 <--> eth0
  65. Jan 1 00:00:21 pppd[216]: CHAP authentication succeeded
  66. Jan 1 00:00:21 pppd[216]: peer from calling number 00:25:84:AF:71:10 authorized
  67. Jan 1 00:00:21 pppd[216]: local IP address 92.55.27.205
  68. Jan 1 00:00:21 pppd[216]: remote IP address 217.14.207.51
Advertisement
Add Comment
Please, Sign In to add comment