Advertisement
Guest User

Untitled

a guest
Jan 17th, 2019
372
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 71.09 KB | None | 0 0
  1. login as: root
  2. root@10.0.0.1's password:
  3.  
  4.  
  5. BusyBox v1.28.3 () built-in shell (ash)
  6.  
  7. _______ ________ __
  8. | |.-----.-----.-----.| | | |.----.| |_
  9. | - || _ | -__| || | | || _|| _|
  10. |_______|| __|_____|__|__||________||__| |____|
  11. |__| W I R E L E S S F R E E D O M
  12. -----------------------------------------------------
  13. OpenWrt 18.06.1, r7258-5eb055306f
  14. -----------------------------------------------------
  15. root@SandmanRouter:~# logread
  16. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 0.000000] Linux version 4.9.120 (buildbot@builds-03.infra.lede-project.org) (gcc version 7.3.0 (OpenWrt GCC 7.3.0 r7102-3f3a2c9) ) #0 SMP Thu Aug 16 07:51:15 2018
  17. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] SoC: xRX200 rev 1.2
  18. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] bootconsole [early0] enabled
  19. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] CPU0 revision is: 00019556 (MIPS 34Kc)
  20. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] MIPS: machine is BT Home Hub 5A
  21. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Determined physical RAM map:
  22. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] memory: 08000000 @ 00000000 (usable)
  23. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Initrd not found or empty - disabling initrd
  24. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Detected 1 available secondary CPU(s)
  25. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.000000] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
  26. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
  27. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Zone ranges:
  28. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Normal [mem 0x0000000000000000-0x0000000007ffffff]
  29. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Movable zone start for each node
  30. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Early memory node ranges
  31. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] node 0: [mem 0x0000000000000000-0x0000000007ffffff]
  32. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff]
  33. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768
  34. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] free_area_init_node: node 0, pgdat 80542640, node_mem_map 81009560
  35. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] Normal zone: 256 pages used for memmap
  36. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
  37. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7
  38. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] percpu: Embedded 12 pages/cpu @8110c000 s17488 r8192 d23472 u49152
  39. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] pcpu-alloc: s17488 r8192 d23472 u49152 alloc=12*4096
  40. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0 [0] 1
  41. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512
  42. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 0.000000] Kernel command line: console=ttyLTQ0,115200
  43. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
  44. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
  45. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
  46. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Writing ErrCtl register=0000b200
  47. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Readback ErrCtl register=0000b200
  48. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Memory: 122860K/131072K available (4305K kernel code, 173K rwdata, 900K rodata, 1260K init, 244K bss, 8212K reserved, 0K cma-reserved)
  49. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
  50. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Hierarchical RCU implementation.
  51. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] NR_IRQS:256
  52. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Setting up vectored interrupts
  53. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Setting up IPI vectored interrupts
  54. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] CPU Clock: 500MHz
  55. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041786 ns
  56. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000011] sched_clock: 32 bits at 250MHz, resolution 4ns, wraps every 8589934590ns
  57. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.007884] Calibrating delay loop... 332.54 BogoMIPS (lpj=665088)
  58. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.042381] pid_max: default: 32768 minimum: 301
  59. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.047259] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
  60. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.053796] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
  61. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.065580] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
  62. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.065592] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
  63. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.065780] CPU1 revision is: 00019556 (MIPS 34Kc)
  64. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.116509] Synchronize counters for CPU 1:
  65. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.116511] done.
  66. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.123011] Brought up 2 CPUs
  67. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.130709] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
  68. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.140375] futex hash table entries: 512 (order: 2, 16384 bytes)
  69. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.146601] pinctrl core: initialized pinctrl subsystem
  70. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.153098] NET: Registered protocol family 16
  71. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.165993] pinctrl-xway 1e100b10.pinmux: Init done
  72. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.171978] dma-xway 1e104100.dma: Init done - hw rev: 7, ports: 7, channels: 28
  73. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.284736] dcdc-xrx200 1f106a00.dcdc: Core Voltage : 1016 mV
  74. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.290541] Can't analyze schedule() prologue at 8043158c
  75. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.317281] PCI host bridge /fpi@10000000/pci@E105400 ranges:
  76. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.322963] MEM 0x0000000018000000..0x0000000019ffffff
  77. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.328233] IO 0x000000001ae00000..0x000000001affffff
  78. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.451993] PCI host bridge /fpi@10000000/pcie@d900000 ranges:
  79. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 0.486086] random: fast init done
  80. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.486281] usbcore: registered new interface driver usbfs
  81. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.486413] usbcore: registered new interface driver hub
  82. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.486554] usbcore: registered new device driver usb
  83. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487035] PCI host bridge to bus 0000:00
  84. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487063] pci_bus 0000:00: root bus resource [mem 0x18000000-0x19ffffff]
  85. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487081] pci_bus 0000:00: root bus resource [io 0x1ae00000-0x1affffff]
  86. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487098] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
  87. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487116] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
  88. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.487217] pci 0000:00:0e.0: [168c:ff1d] type 00 class 0x020000
  89. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.487266] pci 0000:00:0e.0: reg 0x10: [mem 0x00000000-0x0000ffff]
  90. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.487765] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
  91. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487806] pci 0000:00:0e.0: BAR 0: assigned [mem 0x18000000-0x1800ffff]
  92. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488058] PCI host bridge to bus 0000:01
  93. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488082] pci_bus 0000:01: root bus resource [mem 0x1c000000-0x1cffffff]
  94. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488100] pci_bus 0000:01: root bus resource [io 0x1d800000-0x1d8fffff]
  95. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488116] pci_bus 0000:01: root bus resource [??? 0x00000000 flags 0x0]
  96. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488134] pci_bus 0000:01: No busn resource found for root bus, will use [bus 01-ff]
  97. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.488206] pci 0000:01:00.0: [1bef:0011] type 01 class 0x060000
  98. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488226] ifx_pcie_rc_class_early_fixup: fixed pcie host bridge to pci-pci bridge
  99. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.499810] pci 0000:01:00.0: PME# supported from D0 D3hot
  100. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.500214] pci 0000:01:00.0: bridge configuration invalid ([bus 02-00]), reconfiguring
  101. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500537] pci 0000:02:00.0: [168c:003c] type 00 class 0x028000
  102. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500608] pci 0000:02:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
  103. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500692] pci 0000:02:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
  104. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500855] pci 0000:02:00.0: supports D1 D2
  105. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.501203] pci_bus 0000:02: busn_res: [bus 02-ff] end is updated to 02
  106. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.501239] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 02
  107. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501297] pci 0000:01:00.0: BAR 8: assigned [mem 0x1c000000-0x1c1fffff]
  108. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501325] pci 0000:01:00.0: BAR 9: assigned [mem 0x1c200000-0x1c2fffff pref]
  109. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501357] pci 0000:02:00.0: BAR 0: assigned [mem 0x1c000000-0x1c1fffff 64bit]
  110. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501406] pci 0000:02:00.0: BAR 6: assigned [mem 0x1c200000-0x1c20ffff pref]
  111. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501422] pci 0000:01:00.0: PCI bridge to [bus 02]
  112. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501449] pci 0000:01:00.0: bridge window [mem 0x1c000000-0x1c1fffff]
  113. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501473] pci 0000:01:00.0: bridge window [mem 0x1c200000-0x1c2fffff pref]
  114. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501600] ifx_pcie_bios_map_irq port 0 dev 0000:01:00.0 slot 0 pin 1
  115. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501611] ifx_pcie_bios_map_irq dev 0000:01:00.0 irq 144 assigned
  116. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501653] ifx_pcie_bios_map_irq port 0 dev 0000:02:00.0 slot 0 pin 1
  117. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501662] ifx_pcie_bios_map_irq dev 0000:02:00.0 irq 144 assigned
  118. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.671391] clocksource: Switched to clocksource MIPS
  119. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.677748] NET: Registered protocol family 2
  120. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.683442] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
  121. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.690414] TCP bind hash table entries: 1024 (order: 1, 8192 bytes)
  122. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.696740] TCP: Hash tables configured (established 1024 bind 1024)
  123. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.703306] UDP hash table entries: 256 (order: 1, 8192 bytes)
  124. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.709087] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
  125. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.715708] NET: Registered protocol family 1
  126. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.720064] PCI: CLS 0 bytes, default 32
  127. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.721009] gptu: totally 6 16-bit timers/counters
  128. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.725991] gptu: misc_register on minor 63
  129. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.730143] gptu: succeeded to request irq 126
  130. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.734621] gptu: succeeded to request irq 127
  131. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.739215] gptu: succeeded to request irq 128
  132. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.743675] gptu: succeeded to request irq 129
  133. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.748165] gptu: succeeded to request irq 130
  134. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.752703] gptu: succeeded to request irq 131
  135. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.757562] phy-xrx200 gphy-xrx200: requesting lantiq/xrx200_phy11g_a22.bin
  136. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.765103] phy-xrx200 gphy-xrx200: booting GPHY0 firmware at 7E60000
  137. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.771454] phy-xrx200 gphy-xrx200: booting GPHY1 firmware at 7E60000
  138. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.879432] No VPEs reserved for AP/SP, not initialize VPE loader
  139. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.879432] Pass maxvpes=<n> argument as kernel argument
  140. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.890814] No TCs reserved for AP/SP, not initializing RTLX.
  141. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.890814] Pass maxtcs=<n> argument as kernel argument
  142. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.903648] Crashlog allocated RAM at address 0x3f00000
  143. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.909367] workingset: timestamp_bits=30 max_order=15 bucket_order=0
  144. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.932207] squashfs: version 4.0 (2009/01/31) Phillip Lougher
  145. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.937951] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
  146. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.953690] io scheduler noop registered
  147. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.957504] io scheduler deadline registered (default)
  148. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.964045] 1e100c00.serial: ttyLTQ0 at MMIO 0x1e100c00 (irq = 112, base_baud = 0) is a lantiq,asc
  149. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.972949] console [ttyLTQ0] enabled
  150. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.980286] bootconsole [early0] disabled
  151. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.991321] nand: device found, Manufacturer ID: 0x01, Chip ID: 0xf1
  152. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.996313] nand: AMD/Spansion S34ML01G1
  153. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.000206] nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
  154. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.008383] Bad block table found at page 65472, version 0x01
  155. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.014369] Bad block table found at page 65408, version 0x01
  156. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.019377] nand_read_bbt: bad block at 0x000004a20000
  157. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.024503] 4 fixed-partitions partitions found on MTD device 14000000.nand-parts
  158. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.031863] Creating 4 MTD partitions on "14000000.nand-parts":
  159. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.037800] 0x000000000000-0x0000000a0000 : "u-boot"
  160. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.045063] 0x0000000a0000-0x0000000c0000 : "uboot-env"
  161. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.051145] 0x0000000c0000-0x000000100000 : "unused"
  162. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.057033] 0x000000100000-0x000007f80000 : "ubi"
  163. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.067826] libphy: Fixed MDIO Bus: probed
  164. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.175303] libphy: lantiq,xrx200-mdio: probed
  165. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 1.183425] net-xrx200: invalid MAC, using random
  166. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.255857] Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6 0:00: attached PHY driver [Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6] (mii_bus:phy_addr=0:00, irq=-1)
  167. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.339834] Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6 0:01: attached PHY driver [Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6] (mii_bus:phy_addr=0:01, irq=-1)
  168. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.423818] Intel XWAY PHY11G (xRX v1.2 integrated) 0:11: attached PHY driver [Intel XWAY PHY11G (xRX v1.2 integrated)] (mii_bus:phy_addr=0:11, irq=-1)
  169. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.507818] Intel XWAY PHY11G (xRX v1.2 integrated) 0:13: attached PHY driver [Intel XWAY PHY11G (xRX v1.2 integrated)] (mii_bus:phy_addr=0:13, irq=-1)
  170. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.591835] Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6 0:05: attached PHY driver [Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6] (mii_bus:phy_addr=0:05, irq=-1)
  171. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.709434] ltq-cputemp cputemp@0: Current CPU die temperature: 67.0 °C
  172. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.715104] wdt 1f8803f0.watchdog: Init done
  173. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.725300] NET: Registered protocol family 10
  174. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.730537] NET: Registered protocol family 17
  175. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.733725] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
  176. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.746550] 8021q: 802.1Q VLAN Support v1.8
  177. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.754897] UBI: auto-attach mtd3
  178. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.756866] ubi0: attaching mtd3
  179. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.899956] ubi0: scanning is finished
  180. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.916707] ubi0: attached mtd3 (name "ubi", size 126 MiB)
  181. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.920820] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 129024 bytes
  182. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.927682] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 512
  183. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.934354] ubi0: VID header offset: 512 (aligned 512), data offset: 2048
  184. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.941151] ubi0: good PEBs: 1011, bad PEBs: 1, corrupted PEBs: 0
  185. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.947246] ubi0: user volume: 4, internal volumes: 1, max. volumes count: 128
  186. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.954484] ubi0: max/mean erase counter: 331/224, WL threshold: 4096, image sequence number: 1019015774
  187. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.963958] ubi0: available PEBs: 0, total reserved PEBs: 1011, PEBs reserved for bad PEB handling: 19
  188. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.973348] ubi0: background thread "ubi_bgt0d" started, PID 375
  189. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.981328] block ubiblock0_1: created from ubi0:1(rootfs)
  190. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.985441] ubiblock: device ubiblock0_1 (rootfs) set to be root filesystem
  191. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.998391] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
  192. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 2.008108] Freeing unused kernel memory: 1260K
  193. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 2.011239] This architecture does not have kernel memory protection.
  194. Wed Jan 16 22:47:57 2019 user.info kernel: [ 2.608794] init: Console is alive
  195. Wed Jan 16 22:47:57 2019 user.info kernel: [ 2.611098] init: - watchdog -
  196. Wed Jan 16 22:47:57 2019 user.info kernel: [ 3.802067] kmodloader: loading kernel modules from /etc/modules-boot.d/*
  197. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 3.920072] dwc2 1e101000.ifxhcd: requested GPIO 495
  198. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.025663] dwc2 1e101000.ifxhcd: DWC OTG Controller
  199. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.029292] dwc2 1e101000.ifxhcd: new USB bus registered, assigned bus number 1
  200. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.036624] dwc2 1e101000.ifxhcd: irq 62, io mem 0x00000000
  201. Wed Jan 16 22:47:57 2019 kern.err kernel: [ 4.042142] dwc2 1e101000.ifxhcd: Hardware does not support descriptor DMA mode -
  202. Wed Jan 16 22:47:57 2019 kern.err kernel: [ 4.049548] dwc2 1e101000.ifxhcd: falling back to buffer DMA mode.
  203. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.057259] hub 1-0:1.0: USB hub found
  204. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.059777] hub 1-0:1.0: 1 port detected
  205. Wed Jan 16 22:47:57 2019 user.info kernel: [ 4.065087] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
  206. Wed Jan 16 22:47:57 2019 user.info kernel: [ 4.081476] init: - preinit -
  207. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.563313] usb 1-1: new high-speed USB device number 2 using dwc2
  208. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.670706] lantiq,xrx200-net 1e108000.eth eth0: port 4 got link
  209. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 4.936134] random: procd: uninitialized urandom read (4 bytes read)
  210. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.370789] UBIFS (ubi0:2): background thread "ubifs_bgt0_2" started, PID 442
  211. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.417108] UBIFS (ubi0:2): recovery needed
  212. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.527969] UBIFS (ubi0:2): recovery completed
  213. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.531117] UBIFS (ubi0:2): UBIFS: mounted UBI device 0, volume 2, name "rootfs_data"
  214. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.538860] UBIFS (ubi0:2): LEB size: 129024 bytes (126 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
  215. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.548772] UBIFS (ubi0:2): FS size: 120508416 bytes (114 MiB, 934 LEBs), journal size 6064128 bytes (5 MiB, 47 LEBs)
  216. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.559382] UBIFS (ubi0:2): reserved for root: 4952683 bytes (4836 KiB)
  217. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.566006] UBIFS (ubi0:2): media format: w4/r0 (latest is w4/r0), UUID 435DA3A2-D246-439B-B4CB-CBB2DF664757, small LPT model
  218. Wed Jan 16 22:47:57 2019 user.info kernel: [ 8.580166] mount_root: loading kmods from internal overlay
  219. Wed Jan 16 22:47:57 2019 user.info kernel: [ 8.634947] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
  220. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.747841] SCSI subsystem initialized
  221. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 8.770762] usb-storage 1-1:1.0: USB Mass Storage device detected
  222. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 8.776430] scsi host0: usb-storage 1-1:1.0
  223. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 8.780689] usbcore: registered new interface driver usb-storage
  224. Wed Jan 16 22:47:57 2019 user.info kernel: [ 8.785966] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
  225. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.007377] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
  226. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.014684] block: extroot: not configured
  227. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.032760] mount_root: switching to ubifs overlay
  228. Wed Jan 16 22:47:57 2019 user.warn kernel: [ 9.069345] urandom-seed: Seeding with /etc/urandom.seed
  229. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.214143] procd: - early -
  230. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.215846] procd: - watchdog -
  231. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.800643] scsi 0:0:0:0: Direct-Access USB DISK 2.0 PMAP PQ: 0 ANSI: 0 CCS
  232. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.884940] procd: - watchdog -
  233. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.887277] procd: - ubus -
  234. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.973986] random: ubusd: uninitialized urandom read (4 bytes read)
  235. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.981464] random: ubusd: uninitialized urandom read (4 bytes read)
  236. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.987031] random: ubusd: uninitialized urandom read (4 bytes read)
  237. Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.994634] procd: - init -
  238. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.215358] lantiq,xrx200-net 1e108000.eth eth0: port 4 lost link
  239. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.407732] sd 0:0:0:0: [sda] 7831552 512-byte logical blocks: (4.01 GB/3.73 GiB)
  240. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.414604] sd 0:0:0:0: [sda] Write Protect is off
  241. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.418717] sd 0:0:0:0: [sda] Mode Sense: 23 00 00 00
  242. Wed Jan 16 22:47:57 2019 kern.err kernel: [ 10.419592] sd 0:0:0:0: [sda] No Caching mode page found
  243. Wed Jan 16 22:47:57 2019 kern.err kernel: [ 10.423987] sd 0:0:0:0: [sda] Assuming drive cache: write through
  244. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.437102] sda: sda1
  245. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.442754] sd 0:0:0:0: [sda] Attached SCSI removable disk
  246. Wed Jan 16 22:47:57 2019 user.info kernel: [ 10.583439] kmodloader: loading kernel modules from /etc/modules.d/*
  247. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.595501] IFXOS, Version 1.5.19 (c) Copyright 2009, Lantiq Deutschland GmbH
  248. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.606492] NET: Registered protocol family 8
  249. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.609592] NET: Registered protocol family 20
  250. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.624548] tun: Universal TUN/TAP device driver, 1.6
  251. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.628273] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  252. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.641677] PPP generic driver version 2.4.2
  253. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.655662] ip6_tables: (C) 2000-2006 Netfilter Core Team
  254. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.687968] Lantiq (VRX) DSL CPE MEI driver, version 1.5.17.6, (c) 2007-2015 Lantiq Beteiligungs-GmbH & Co. KG
  255. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.706628]
  256. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.706628]
  257. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.706628] Lantiq CPE API Driver version: DSL CPE API V4.17.18.6
  258. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.714460]
  259. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.714460] Predefined debug level: 3
  260. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.729006] Loading modules backported from Linux version wt-2017-11-01-0-gfe248fc2c180
  261. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.735732] Backport generated by backports.git v4.14-rc2-1-31-g86cf0e5d
  262. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.746182] ip_tables: (C) 2000-2006 Netfilter Core Team
  263. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.756608] Infineon Technologies DEU driver version 2.0.0
  264. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.763538] IFX DEU DES initialized (multiblock).
  265. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.768836] IFX DEU AES initialized (multiblock).
  266. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.773483] IFX DEU ARC4 initialized (multiblock).
  267. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.777688] IFX DEU SHA1 initialized.
  268. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.781026] IFX DEU MD5 initialized.
  269. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.784645] IFX DEU SHA1_HMAC initialized.
  270. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.788693] IFX DEU MD5_HMAC initialized.
  271. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.803788] nf_conntrack version 0.5.0 (2048 buckets, 8192 max)
  272. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.869006] PCI: Enabling device 0000:00:0e.0 (0000 -> 0002)
  273. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.875733] owl-loader 0000:00:0e.0: fixup device configuration
  274. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.882901] pci 0000:00:0e.0: [168c:002d] type 00 class 0x028000
  275. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.882973] pci 0000:00:0e.0: reg 0x10: [mem 0x18000000-0x1800ffff]
  276. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.883129] pci 0000:00:0e.0: PME# supported from D0 D3hot
  277. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.883799] pci 0000:00:0e.0: BAR 0: assigned [mem 0x18000000-0x1800ffff]
  278. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.896089] NET: Registered protocol family 24
  279. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.918615] xt_time: kernel timezone is -0000
  280. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.080088] PCI: Enabling device 0000:01:00.0 (0000 -> 0002)
  281. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.084596] PCI: Enabling device 0000:02:00.0 (0000 -> 0002)
  282. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 11.090356] ath10k_pci 0000:02:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
  283. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.335286] ath10k_pci 0000:02:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:02:00.0.bin failed with error -2
  284. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.344693] ath10k_pci 0000:02:00.0: Falling back to user helper
  285. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 11.456481] random: crng init done
  286. Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 11.458423] random: 6 urandom warning(s) missed due to ratelimiting
  287. Wed Jan 16 22:47:57 2019 kern.err kernel: [ 12.617407] firmware ath10k!pre-cal-pci-0000:02:00.0.bin: firmware_loading_store: map pages failed
  288. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 12.626792] ath10k_pci 0000:02:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/firmware-6.bin failed with error -2
  289. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 12.636162] ath10k_pci 0000:02:00.0: Falling back to user helper
  290. Wed Jan 16 22:47:57 2019 kern.err kernel: [ 12.890723] firmware ath10k!QCA988X!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
  291. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.143047] ath10k_pci 0000:02:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
  292. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.150925] ath10k_pci 0000:02:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
  293. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.166401] ath10k_pci 0000:02:00.0: firmware ver 10.2.4-1.0-00033 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 c41417d0
  294. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 13.209935] ath10k_pci 0000:02:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
  295. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 13.219029] ath10k_pci 0000:02:00.0: Falling back to user helper
  296. Wed Jan 16 22:47:57 2019 kern.err kernel: [ 13.350294] firmware ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
  297. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.358431] ath10k_pci 0000:02:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
  298. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 14.400125] ath10k_pci 0000:02:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
  299. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512958] ath: EEPROM regdomain: 0x833a
  300. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512969] ath: EEPROM indicates we should expect a country code
  301. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512984] ath: doing EEPROM country->regdmn map search
  302. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512992] ath: country maps to regdmn code: 0x37
  303. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512999] ath: Country alpha2 being used: GB
  304. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.513004] ath: Regpair used: 0x37
  305. Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 14.561033] PCI: Enabling device 0000:00:0e.0 (0000 -> 0002)
  306. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 14.572195] ath: phy1: Ignoring endianness difference in EEPROM magic bytes.
  307. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579776] ath: EEPROM regdomain: 0x833a
  308. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579790] ath: EEPROM indicates we should expect a country code
  309. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579810] ath: doing EEPROM country->regdmn map search
  310. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579823] ath: country maps to regdmn code: 0x37
  311. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579834] ath: Country alpha2 being used: GB
  312. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579842] ath: Regpair used: 0x37
  313. Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.599458] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
  314. Wed Jan 16 22:47:57 2019 kern.info kernel: [ 14.605426] ieee80211 phy1: Atheros AR9287 Rev:2 mem=0xb8000000, irq=30
  315. Wed Jan 16 22:47:57 2019 user.info kernel: [ 14.613935] kmodloader: done loading kernel modules from /etc/modules.d/*
  316. Wed Jan 16 22:47:58 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  317. Wed Jan 16 22:47:58 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  318. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: started, version 2.80test3 cachesize 150
  319. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: DNS service limited to local subnets
  320. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  321. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain test
  322. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain onion
  323. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain localhost
  324. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain local
  325. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain invalid
  326. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain bind
  327. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain lan
  328. Wed Jan 16 22:47:59 2019 daemon.warn dnsmasq[1015]: no servers found in /tmp/resolv.conf.auto, will retry
  329. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: read /etc/hosts - 4 addresses
  330. Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
  331. Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: tunnel
  332. Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: Network device
  333. Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: bridge
  334. Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: veth
  335. Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: macvlan
  336. Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: 8021ad
  337. Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: 8021q
  338. Wed Jan 16 22:48:02 2019 daemon.err block: /dev/ubiblock0_1 is already mounted on /rom
  339. Wed Jan 16 22:48:02 2019 daemon.err block: /dev/ubi0_2 is already mounted on /overlay
  340. Wed Jan 16 22:48:02 2019 daemon.err block: /dev/sda1 is already mounted on /mnt/sda1
  341. Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.702712] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
  342. Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.714158] device eth0 entered promiscuous mode
  343. Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.720374] br-lan: port 1(eth0.1) entered blocking state
  344. Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.724505] br-lan: port 1(eth0.1) entered disabled state
  345. Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.730781] device eth0.1 entered promiscuous mode
  346. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'lan' is enabled
  347. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'lan' is setting up now
  348. Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.739287] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
  349. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'lan' is now up
  350. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' is enabled
  351. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' is setting up now
  352. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' is now up
  353. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Network device 'lo' link is up
  354. Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' has link connectivity
  355. Wed Jan 16 22:48:06 2019 daemon.notice procd: /etc/rc.d/S50dropbear: interface wan has no physdev or physdev has no suitable ip
  356. Wed Jan 16 22:48:06 2019 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  357. Wed Jan 16 22:48:07 2019 authpriv.warn dropbear[1413]: Failed listening on '22': Error listening: Address not available
  358. Wed Jan 16 22:48:07 2019 authpriv.info dropbear[1413]: Not backgrounding
  359. Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.786599] lantiq,xrx200-net 1e108000.eth eth0: port 4 got link
  360. Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.791782] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  361. Wed Jan 16 22:48:08 2019 daemon.notice netifd: Network device 'eth0' link is up
  362. Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.815290] br-lan: port 1(eth0.1) entered blocking state
  363. Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.819341] br-lan: port 1(eth0.1) entered forwarding state
  364. Wed Jan 16 22:48:08 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
  365. Wed Jan 16 22:48:08 2019 daemon.notice netifd: bridge 'br-lan' link is up
  366. Wed Jan 16 22:48:08 2019 daemon.notice netifd: Interface 'lan' has link connectivity
  367. Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.843544] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
  368. Wed Jan 16 22:48:09 2019 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  369. Wed Jan 16 22:48:09 2019 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
  370. Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
  371. Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
  372. Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
  373. Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
  374. Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
  375. Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
  376. Wed Jan 16 22:48:10 2019 kern.info kernel: [ 30.350152] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
  377. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.396143] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
  378. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.411545] br-lan: port 2(wlan0) entered blocking state
  379. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.415576] br-lan: port 2(wlan0) entered disabled state
  380. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.421842] device wlan0 entered promiscuous mode
  381. Wed Jan 16 22:48:11 2019 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
  382. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.448581] br-lan: port 3(wlan1) entered blocking state
  383. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.452527] br-lan: port 3(wlan1) entered disabled state
  384. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.458653] device wlan1 entered promiscuous mode
  385. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.462799] br-lan: port 3(wlan1) entered blocking state
  386. Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.467858] br-lan: port 3(wlan1) entered forwarding state
  387. Wed Jan 16 22:48:11 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
  388. Wed Jan 16 22:48:11 2019 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
  389. Wed Jan 16 22:48:11 2019 daemon.err hostapd: Using interface wlan1 with hwaddr 54:64:d9:20:1c:6a and ssid "Baymax"
  390. Wed Jan 16 22:48:11 2019 daemon.err hostapd: Using interface wlan0 with hwaddr 54:64:d9:20:1c:6b and ssid "Baymax"
  391. Wed Jan 16 22:48:11 2019 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
  392. Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.367567] br-lan: port 3(wlan1) entered disabled state
  393. Wed Jan 16 22:48:12 2019 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
  394. Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.748496] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
  395. Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.753950] br-lan: port 3(wlan1) entered blocking state
  396. Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.758825] br-lan: port 3(wlan1) entered forwarding state
  397. Wed Jan 16 22:48:12 2019 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
  398. Wed Jan 16 22:48:12 2019 daemon.notice hostapd: wlan1: AP-ENABLED
  399. Wed Jan 16 22:48:12 2019 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
  400. Wed Jan 16 22:48:12 2019 daemon.notice netifd: Network device 'wlan1' link is up
  401. Wed Jan 16 22:48:13 2019 kern.info kernel: [ 32.383614] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  402. Wed Jan 16 22:48:13 2019 kern.info kernel: [ 32.389215] br-lan: port 2(wlan0) entered blocking state
  403. Wed Jan 16 22:48:13 2019 kern.info kernel: [ 32.393972] br-lan: port 2(wlan0) entered forwarding state
  404. Wed Jan 16 22:48:13 2019 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
  405. Wed Jan 16 22:48:13 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
  406. Wed Jan 16 22:48:13 2019 daemon.notice hostapd: wlan0: AP-ENABLED
  407. Wed Jan 16 22:48:13 2019 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
  408. Wed Jan 16 22:48:13 2019 daemon.notice netifd: Network device 'wlan0' link is up
  409. Wed Jan 16 22:48:13 2019 daemon.notice procd: /etc/rc.d/S96led: setting up led wifi
  410. Wed Jan 16 22:48:13 2019 daemon.notice procd: /etc/rc.d/S96led: setting up led dsl
  411. Wed Jan 16 22:48:13 2019 daemon.notice procd: /etc/rc.d/S96led: setting up led dimmed
  412. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1015]: exiting on receipt of SIGTERM
  413. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: started, version 2.80test3 cachesize 150
  414. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: DNS service limited to local subnets
  415. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  416. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq-dhcp[1921]: DHCP, IP range 10.0.0.51 -- 10.0.0.200, lease time 2d
  417. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain test
  418. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain onion
  419. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain localhost
  420. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain local
  421. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain invalid
  422. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain bind
  423. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain lan
  424. Wed Jan 16 22:48:15 2019 daemon.warn dnsmasq[1921]: no servers found in /tmp/resolv.conf.auto, will retry
  425. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
  426. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  427. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
  428. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
  429. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  430. Wed Jan 16 22:48:15 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
  431. Wed Jan 16 22:48:16 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
  432. Wed Jan 16 22:48:16 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 1)
  433. Wed Jan 16 22:48:16 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:d6:aa:05:61:00
  434. Wed Jan 16 22:48:16 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
  435. Wed Jan 16 22:48:17 2019 daemon.info hostapd: wlan1: STA b8:e9:37:87:61:92 IEEE 802.11: authenticated
  436. Wed Jan 16 22:48:17 2019 daemon.info hostapd: wlan1: STA b8:e9:37:87:61:92 IEEE 802.11: associated (aid 1)
  437. Wed Jan 16 22:48:17 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED b8:e9:37:87:61:92
  438. Wed Jan 16 22:48:17 2019 daemon.info hostapd: wlan1: STA b8:e9:37:87:61:92 WPA: pairwise key handshake completed (RSN)
  439. Wed Jan 16 22:48:18 2019 daemon.info procd: - init complete -
  440. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 04:d6:aa:05:61:00
  441. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.181 04:d6:aa:05:61:00
  442. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
  443. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  444. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
  445. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 04:d6:aa:05:61:00
  446. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.181 04:d6:aa:05:61:00
  447. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 04:d6:aa:05:61:00
  448. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.181 04:d6:aa:05:61:00
  449. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.181 04:d6:aa:05:61:00
  450. Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.181 04:d6:aa:05:61:00 RicFlairWOOO
  451. Wed Jan 16 22:48:20 2019 daemon.notice netifd: Network device 'eth0' link is down
  452. Wed Jan 16 22:48:20 2019 kern.info kernel: [ 40.103512] lantiq,xrx200-net 1e108000.eth eth0: port 4 lost link
  453. Wed Jan 16 22:48:20 2019 kern.info kernel: [ 40.111045] br-lan: port 1(eth0.1) entered disabled state
  454. Wed Jan 16 22:48:20 2019 daemon.notice netifd: VLAN 'eth0.1' link is down
  455. Wed Jan 16 22:48:21 2019 daemon.notice netifd: Network device 'eth0' link is up
  456. Wed Jan 16 22:48:21 2019 kern.info kernel: [ 41.127758] lantiq,xrx200-net 1e108000.eth eth0: port 4 got link
  457. Wed Jan 16 22:48:21 2019 kern.info kernel: [ 41.134389] br-lan: port 1(eth0.1) entered blocking state
  458. Wed Jan 16 22:48:21 2019 kern.info kernel: [ 41.138450] br-lan: port 1(eth0.1) entered forwarding state
  459. Wed Jan 16 22:48:21 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
  460. Wed Jan 16 22:48:26 2019 daemon.info hostapd: wlan0: STA 88:71:e5:c9:16:fe IEEE 802.11: authenticated
  461. Wed Jan 16 22:48:26 2019 daemon.info hostapd: wlan0: STA 88:71:e5:c9:16:fe IEEE 802.11: associated (aid 2)
  462. Wed Jan 16 22:48:26 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 88:71:e5:c9:16:fe
  463. Wed Jan 16 22:48:26 2019 daemon.info hostapd: wlan0: STA 88:71:e5:c9:16:fe WPA: pairwise key handshake completed (RSN)
  464. Wed Jan 16 22:48:27 2019 daemon.notice dsl-notify: Switching to TC-Layer EFM/PTM
  465. Wed Jan 16 22:48:27 2019 kern.info kernel: [ 46.475773] PTM 1.0.27 PTM (E1) firmware version 0.30
  466. Wed Jan 16 22:48:27 2019 kern.warn kernel: [ 46.479963] ifxmips_ptm: PTM init succeed
  467. Wed Jan 16 22:48:27 2019 kern.info kernel: [ 46.481491] IPv6: ADDRCONF(NETDEV_UP): dsl0: link is not ready
  468. Wed Jan 16 22:48:27 2019 kern.info kernel: [ 46.488697] IPv6: ADDRCONF(NETDEV_UP): dsl0.101: link is not ready
  469. Wed Jan 16 22:48:27 2019 daemon.notice netifd: Interface 'wan' is enabled
  470. Wed Jan 16 22:48:29 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: authenticated
  471. Wed Jan 16 22:48:29 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: associated (aid 2)
  472. Wed Jan 16 22:48:29 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED fc:a1:83:75:57:b6
  473. Wed Jan 16 22:48:29 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 WPA: pairwise key handshake completed (RSN)
  474. Wed Jan 16 22:48:30 2019 daemon.info hostapd: wlan0: STA d8:6c:63:58:a6:b7 IEEE 802.11: authenticated
  475. Wed Jan 16 22:48:30 2019 daemon.info hostapd: wlan0: STA d8:6c:63:58:a6:b7 IEEE 802.11: associated (aid 3)
  476. Wed Jan 16 22:48:30 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED d8:6c:63:58:a6:b7
  477. Wed Jan 16 22:48:30 2019 daemon.info hostapd: wlan0: STA d8:6c:63:58:a6:b7 WPA: pairwise key handshake completed (RSN)
  478. Wed Jan 16 22:48:31 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 88:71:e5:c9:16:fe
  479. Wed Jan 16 22:48:31 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
  480. Wed Jan 16 22:48:34 2019 daemon.info hostapd: wlan0: STA 48:d6:d5:13:0c:5a IEEE 802.11: authenticated
  481. Wed Jan 16 22:48:34 2019 daemon.info hostapd: wlan0: STA 48:d6:d5:13:0c:5a IEEE 802.11: associated (aid 4)
  482. Wed Jan 16 22:48:34 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 48:d6:d5:13:0c:5a
  483. Wed Jan 16 22:48:34 2019 daemon.info hostapd: wlan0: STA 48:d6:d5:13:0c:5a WPA: pairwise key handshake completed (RSN)
  484. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
  485. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.193 fc:a1:83:75:57:b6
  486. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 88:71:e5:c9:16:fe
  487. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
  488. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.77 d8:6c:63:58:a6:b7
  489. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.77 d8:6c:63:58:a6:b7 Google-Home
  490. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
  491. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
  492. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
  493. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.193 fc:a1:83:75:57:b6
  494. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
  495. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
  496. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.193 48:d6:d5:13:0c:5a
  497. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.193 48:d6:d5:13:0c:5a Chromecast
  498. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.193 fc:a1:83:75:57:b6
  499. Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPNAK(br-lan) 10.0.0.193 fc:a1:83:75:57:b6 address in use
  500. Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
  501. Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.194 fc:a1:83:75:57:b6
  502. Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
  503. Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.194 fc:a1:83:75:57:b6
  504. Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.194 fc:a1:83:75:57:b6
  505. Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.194 fc:a1:83:75:57:b6 amazon-2b42aef46
  506. Wed Jan 16 22:48:51 2019 kern.warn kernel: [ 70.987037] enter showtime
  507. Wed Jan 16 22:48:51 2019 kern.info kernel: [ 70.988919] IPv6: ADDRCONF(NETDEV_CHANGE): dsl0: link becomes ready
  508. Wed Jan 16 22:48:51 2019 daemon.notice netifd: Network device 'dsl0' link is up
  509. Wed Jan 16 22:48:51 2019 daemon.notice netifd: VLAN 'dsl0.101' link is up
  510. Wed Jan 16 22:48:51 2019 daemon.notice netifd: Interface 'wan' has link connectivity
  511. Wed Jan 16 22:48:51 2019 daemon.notice netifd: Interface 'wan' is setting up now
  512. Wed Jan 16 22:48:51 2019 kern.info kernel: [ 70.999098] IPv6: ADDRCONF(NETDEV_CHANGE): dsl0.101: link becomes ready
  513. Wed Jan 16 22:48:51 2019 kern.warn kernel: [ 71.011801] enter showtime
  514. Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - slhc
  515. Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - ppp_generic
  516. Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - pppox
  517. Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - pppoe
  518. Wed Jan 16 22:48:52 2019 daemon.info pppd[2412]: Plugin rp-pppoe.so loaded.
  519. Wed Jan 16 22:48:52 2019 daemon.info pppd[2412]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
  520. Wed Jan 16 22:48:52 2019 daemon.notice pppd[2412]: pppd 2.4.7 started by root, uid 0
  521. Wed Jan 16 22:48:56 2019 daemon.err uhttpd[1603]: luci: accepted login on / for root from 10.0.0.181
  522. Wed Jan 16 22:49:02 2019 daemon.info hostapd: wlan0: STA 20:3c:ae:df:ad:ea IEEE 802.11: authenticated
  523. Wed Jan 16 22:49:02 2019 daemon.info hostapd: wlan0: STA 20:3c:ae:df:ad:ea IEEE 802.11: associated (aid 5)
  524. Wed Jan 16 22:49:02 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 20:3c:ae:df:ad:ea
  525. Wed Jan 16 22:49:02 2019 daemon.info hostapd: wlan0: STA 20:3c:ae:df:ad:ea WPA: pairwise key handshake completed (RSN)
  526. Wed Jan 16 22:49:02 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.185 20:3c:ae:df:ad:ea
  527. Wed Jan 16 22:49:02 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.185 20:3c:ae:df:ad:ea ClaireBariBlips
  528. Wed Jan 16 22:49:02 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 00010001229dd004203caedfadea on br-lan: ok fd30:403e:9505::ca3/128
  529. Wed Jan 16 22:49:03 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
  530. Wed Jan 16 22:49:03 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/odhcpd - 0 addresses
  531. Wed Jan 16 22:49:03 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  532. Wed Jan 16 22:49:03 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
  533. Wed Jan 16 22:49:03 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 00010001229dd004203caedfadea on br-lan: ok fd30:403e:9505::ca3/128
  534. Wed Jan 16 22:49:07 2019 daemon.warn pppd[2412]: Timeout waiting for PADO packets
  535. Wed Jan 16 22:49:07 2019 daemon.err pppd[2412]: Unable to complete PPPoE Discovery
  536. Wed Jan 16 22:49:07 2019 daemon.info pppd[2412]: Exit.
  537. Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is now down
  538. Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is disabled
  539. Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is enabled
  540. Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is setting up now
  541. Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - slhc
  542. Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - ppp_generic
  543. Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - pppox
  544. Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - pppoe
  545. Wed Jan 16 22:49:08 2019 daemon.info pppd[3248]: Plugin rp-pppoe.so loaded.
  546. Wed Jan 16 22:49:08 2019 daemon.info pppd[3248]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
  547. Wed Jan 16 22:49:08 2019 daemon.notice pppd[3248]: pppd 2.4.7 started by root, uid 0
  548. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  549. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  550. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  551. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  552. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  553. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  554. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  555. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  556. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  557. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  558. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  559. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  560. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  561. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  562. Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
  563. Wed Jan 16 22:49:23 2019 daemon.warn pppd[3248]: Timeout waiting for PADO packets
  564. Wed Jan 16 22:49:23 2019 daemon.err pppd[3248]: Unable to complete PPPoE Discovery
  565. Wed Jan 16 22:49:23 2019 daemon.info pppd[3248]: Exit.
  566. Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is now down
  567. Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is disabled
  568. Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is enabled
  569. Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is setting up now
  570. Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - slhc
  571. Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - ppp_generic
  572. Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - pppox
  573. Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - pppoe
  574. Wed Jan 16 22:49:23 2019 daemon.info pppd[4027]: Plugin rp-pppoe.so loaded.
  575. Wed Jan 16 22:49:23 2019 daemon.info pppd[4027]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
  576. Wed Jan 16 22:49:24 2019 daemon.notice pppd[4027]: pppd 2.4.7 started by root, uid 0
  577. Wed Jan 16 22:49:39 2019 daemon.info hostapd: wlan0: STA 18:af:61:d1:9e:7f IEEE 802.11: authenticated
  578. Wed Jan 16 22:49:39 2019 daemon.info hostapd: wlan0: STA 18:af:61:d1:9e:7f IEEE 802.11: associated (aid 6)
  579. Wed Jan 16 22:49:39 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 18:af:61:d1:9e:7f
  580. Wed Jan 16 22:49:39 2019 daemon.info hostapd: wlan0: STA 18:af:61:d1:9e:7f WPA: pairwise key handshake completed (RSN)
  581. Wed Jan 16 22:49:39 2019 daemon.warn pppd[4027]: Timeout waiting for PADO packets
  582. Wed Jan 16 22:49:39 2019 daemon.err pppd[4027]: Unable to complete PPPoE Discovery
  583. Wed Jan 16 22:49:39 2019 daemon.info pppd[4027]: Exit.
  584. Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is now down
  585. Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is disabled
  586. Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is enabled
  587. Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is setting up now
  588. Wed Jan 16 22:49:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.51 18:af:61:d1:9e:7f
  589. Wed Jan 16 22:49:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.51 18:af:61:d1:9e:7f ClaireBariBlips
  590. Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - slhc
  591. Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - ppp_generic
  592. Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - pppox
  593. Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - pppoe
  594. Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: Plugin rp-pppoe.so loaded.
  595. Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
  596. Wed Jan 16 22:49:39 2019 daemon.notice pppd[4192]: pppd 2.4.7 started by root, uid 0
  597. Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: PPP session is 4110
  598. Wed Jan 16 22:49:39 2019 daemon.warn pppd[4192]: Connected to 84:b5:9c:6d:2d:d3 via interface dsl0.101
  599. Wed Jan 16 22:49:39 2019 kern.info kernel: [ 119.160212] pppoe-wan: renamed from ppp0
  600. Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: Using interface pppoe-wan
  601. Wed Jan 16 22:49:39 2019 daemon.notice pppd[4192]: Connect: pppoe-wan <--> dsl0.101
  602. Wed Jan 16 22:49:40 2019 daemon.info pppd[4192]: CHAP authentication succeeded
  603. Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: CHAP authentication succeeded
  604. Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: peer from calling number 84:B5:9C:6D:2D:D3 authorized
  605. Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: local IP address 90.254.119.130
  606. Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: remote IP address 212.158.250.32
  607. Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: primary DNS address 90.255.255.90
  608. Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: secondary DNS address 90.255.255.255
  609. Wed Jan 16 22:49:40 2019 daemon.notice netifd: Network device 'pppoe-wan' link is up
  610. Wed Jan 16 22:49:40 2019 daemon.notice netifd: Interface 'wan6' is enabled
  611. Wed Jan 16 22:49:40 2019 daemon.notice netifd: Network alias 'pppoe-wan' link is up
  612. Wed Jan 16 22:49:40 2019 daemon.notice netifd: Interface 'wan6' has link connectivity
  613. Wed Jan 16 22:49:40 2019 daemon.notice netifd: Interface 'wan' is now up
  614. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: reading /tmp/resolv.conf.auto
  615. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain test
  616. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain onion
  617. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain localhost
  618. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain local
  619. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain invalid
  620. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain bind
  621. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain lan
  622. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using nameserver 90.255.255.90#53
  623. Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using nameserver 90.255.255.255#53
  624. Wed Jan 16 22:49:41 2019 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
  625. Wed Jan 16 22:49:41 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 000100011f97e95d18af61d19e7f on br-lan: ok fd30:403e:9505::fd0/128
  626. Wed Jan 16 22:49:42 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 000100011f97e95d18af61d19e7f on br-lan: ok fd30:403e:9505::fd0/128
  627. Wed Jan 16 22:49:42 2019 authpriv.info dropbear[4472]: Not backgrounding
  628. Wed Jan 16 22:49:44 2019 user.notice ddns-scripts[4422]: myddns_ipv4: PID '4422' started at 2019-01-16 22:49
  629. Thu Jan 17 20:10:40 2019 daemon.info pppd[4192]: System time change detected.
  630. Thu Jan 17 20:10:46 2019 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED fc:a1:83:75:57:b6
  631. Thu Jan 17 20:10:46 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: disassociated
  632. Thu Jan 17 20:10:47 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  633. Thu Jan 17 20:10:57 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
  634. Thu Jan 17 20:10:57 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 2)
  635. Thu Jan 17 20:10:57 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d6:aa:05:61:00
  636. Thu Jan 17 20:10:57 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
  637. Thu Jan 17 20:12:59 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
  638. Thu Jan 17 20:12:59 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 1)
  639. Thu Jan 17 20:12:59 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:d6:aa:05:61:00
  640. Thu Jan 17 20:12:59 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
  641. Thu Jan 17 20:14:13 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
  642. Thu Jan 17 20:14:13 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 2)
  643. Thu Jan 17 20:14:13 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d6:aa:05:61:00
  644. Thu Jan 17 20:14:13 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
  645. Thu Jan 17 20:16:52 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
  646. Thu Jan 17 20:16:52 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 1)
  647. Thu Jan 17 20:16:52 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:d6:aa:05:61:00
  648. Thu Jan 17 20:16:52 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
  649. Thu Jan 17 20:17:21 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
  650. Thu Jan 17 20:17:21 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 2)
  651. Thu Jan 17 20:17:21 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d6:aa:05:61:00
  652. Thu Jan 17 20:17:21 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
  653. Thu Jan 17 20:17:56 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: authenticated
  654. Thu Jan 17 20:17:56 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: associated (aid 3)
  655. Thu Jan 17 20:17:56 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d0:4f:7e:34:38:ae
  656. Thu Jan 17 20:17:56 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae WPA: pairwise key handshake completed (RSN)
  657. Thu Jan 17 20:17:56 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.176 d0:4f:7e:34:38:ae
  658. Thu Jan 17 20:17:56 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.176 d0:4f:7e:34:38:ae ClaireBearPad
  659. Thu Jan 17 20:17:57 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 000100011f97e954d04f7e3438ae on br-lan: ok fd30:403e:9505::c53/128
  660. Thu Jan 17 20:17:58 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 000100011f97e954d04f7e3438ae on br-lan: ok fd30:403e:9505::c53/128
  661. Thu Jan 17 20:22:57 2019 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 04:d6:aa:05:61:00
  662. Thu Jan 17 20:22:57 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: disassociated due to inactivity
  663. Thu Jan 17 20:22:58 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  664. Thu Jan 17 20:28:00 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 0001000120e7c79c90e6baf4594c on br-lan: ok fd30:403e:9505::7e2/128
  665. Thu Jan 17 20:28:00 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 0001000120e7c79c90e6baf4594c on br-lan: ok fd30:403e:9505::7e2/128
  666. Thu Jan 17 20:28:00 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
  667. Thu Jan 17 20:28:00 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/odhcpd - 1 addresses
  668. Thu Jan 17 20:28:00 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  669. Thu Jan 17 20:28:00 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
  670. Thu Jan 17 20:30:43 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: authenticated
  671. Thu Jan 17 20:30:43 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: associated (aid 1)
  672. Thu Jan 17 20:30:43 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED d0:4f:7e:34:38:ae
  673. Thu Jan 17 20:30:43 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae WPA: pairwise key handshake completed (RSN)
  674. Thu Jan 17 20:32:11 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: authenticated
  675. Thu Jan 17 20:32:11 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: associated (aid 3)
  676. Thu Jan 17 20:32:11 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d0:4f:7e:34:38:ae
  677. Thu Jan 17 20:32:11 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae WPA: pairwise key handshake completed (RSN)
  678. Thu Jan 17 20:40:40 2019 authpriv.info dropbear[31768]: Child connection from 10.0.0.2:50122
  679. Thu Jan 17 20:40:40 2019 authpriv.info dropbear[31768]: Exit before auth: Exited normally
  680. Thu Jan 17 20:40:53 2019 authpriv.info dropbear[31769]: Child connection from 10.0.0.2:50129
  681. Thu Jan 17 20:40:58 2019 authpriv.notice dropbear[31769]: Password auth succeeded for 'root' from 10.0.0.2:50129
  682. Thu Jan 17 20:40:58 2019 authpriv.info dropbear[31769]: Exit (root): Exited normally
  683. Thu Jan 17 20:41:11 2019 authpriv.info dropbear[31776]: Child connection from 10.0.0.2:50130
  684. Thu Jan 17 20:41:12 2019 authpriv.notice dropbear[31776]: Password auth succeeded for 'root' from 10.0.0.2:50130
  685. Thu Jan 17 20:41:13 2019 authpriv.info dropbear[31776]: Exit (root): Exited normally
  686. Thu Jan 17 20:41:46 2019 authpriv.info dropbear[31783]: Child connection from 10.0.0.2:50138
  687. Thu Jan 17 20:41:47 2019 authpriv.notice dropbear[31783]: Password auth succeeded for 'root' from 10.0.0.2:50138
  688. Thu Jan 17 20:41:48 2019 authpriv.info dropbear[31783]: Exit (root): Exited normally
  689. Thu Jan 17 20:41:58 2019 authpriv.info dropbear[31790]: Child connection from 10.0.0.2:50147
  690. Thu Jan 17 20:41:59 2019 authpriv.notice dropbear[31790]: Password auth succeeded for 'root' from 10.0.0.2:50147
  691. Thu Jan 17 20:42:00 2019 authpriv.info dropbear[31790]: Exit (root): Exited normally
  692. Thu Jan 17 20:43:06 2019 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED d0:4f:7e:34:38:ae
  693. Thu Jan 17 20:43:06 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: disassociated due to inactivity
  694. Thu Jan 17 20:43:07 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  695. Thu Jan 17 20:43:53 2019 authpriv.info dropbear[31805]: Child connection from 10.0.0.2:50239
  696. Thu Jan 17 20:43:57 2019 authpriv.notice dropbear[31805]: Password auth succeeded for 'root' from 10.0.0.2:50239
  697. Thu Jan 17 20:43:57 2019 authpriv.info dropbear[31805]: Exit (root): Exited normally
  698. Thu Jan 17 20:44:00 2019 authpriv.info dropbear[31807]: Child connection from 10.0.0.2:50240
  699. Thu Jan 17 20:44:01 2019 authpriv.notice dropbear[31807]: Password auth succeeded for 'root' from 10.0.0.2:50240
  700. Thu Jan 17 20:44:01 2019 authpriv.info dropbear[31807]: Exit (root): Exited normally
  701. Thu Jan 17 20:44:25 2019 daemon.err uhttpd[1603]: luci: accepted login on / for root from 10.0.0.2
  702. Thu Jan 17 20:52:42 2019 authpriv.info dropbear[32260]: Child connection from 10.0.0.2:50301
  703. Thu Jan 17 20:52:48 2019 authpriv.notice dropbear[32260]: Password auth succeeded for 'root' from 10.0.0.2:50301
  704. Thu Jan 17 21:00:13 2019 authpriv.info dropbear[32260]: Exit (root): Exited normally
  705. Thu Jan 17 21:00:32 2019 authpriv.info dropbear[32280]: Child connection from 10.0.0.2:50418
  706. Thu Jan 17 21:00:39 2019 authpriv.notice dropbear[32280]: Password auth succeeded for 'root' from 10.0.0.2:50418
  707. Thu Jan 17 21:05:41 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.121 30:d3:2d:1e:8b:41
  708. Thu Jan 17 21:05:41 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.121 30:d3:2d:1e:8b:41 dlanwireless
  709. Thu Jan 17 21:21:13 2019 authpriv.info dropbear[32280]: Exit (root): Exited normally
  710. Thu Jan 17 21:21:27 2019 authpriv.info dropbear[4923]: Child connection from 10.0.0.2:50557
  711. Thu Jan 17 21:21:33 2019 authpriv.notice dropbear[4923]: Password auth succeeded for 'root' from 10.0.0.2:50557
  712. root@SandmanRouter:~#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement