Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- login as: root
- root@10.0.0.1's password:
- BusyBox v1.28.3 () built-in shell (ash)
- _______ ________ __
- | |.-----.-----.-----.| | | |.----.| |_
- | - || _ | -__| || | | || _|| _|
- |_______|| __|_____|__|__||________||__| |____|
- |__| W I R E L E S S F R E E D O M
- -----------------------------------------------------
- OpenWrt 18.06.1, r7258-5eb055306f
- -----------------------------------------------------
- root@SandmanRouter:~# logread
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 0.000000] Linux version 4.9.120 (buildbot@builds-03.infra.lede-project.org) (gcc version 7.3.0 (OpenWrt GCC 7.3.0 r7102-3f3a2c9) ) #0 SMP Thu Aug 16 07:51:15 2018
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] SoC: xRX200 rev 1.2
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] bootconsole [early0] enabled
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] CPU0 revision is: 00019556 (MIPS 34Kc)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] MIPS: machine is BT Home Hub 5A
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Determined physical RAM map:
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] memory: 08000000 @ 00000000 (usable)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Initrd not found or empty - disabling initrd
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Detected 1 available secondary CPU(s)
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.000000] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Zone ranges:
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Normal [mem 0x0000000000000000-0x0000000007ffffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Movable zone start for each node
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Early memory node ranges
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] node 0: [mem 0x0000000000000000-0x0000000007ffffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff]
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] free_area_init_node: node 0, pgdat 80542640, node_mem_map 81009560
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] Normal zone: 256 pages used for memmap
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] percpu: Embedded 12 pages/cpu @8110c000 s17488 r8192 d23472 u49152
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] pcpu-alloc: s17488 r8192 d23472 u49152 alloc=12*4096
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0 [0] 1
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 0.000000] Kernel command line: console=ttyLTQ0,115200
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Writing ErrCtl register=0000b200
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Readback ErrCtl register=0000b200
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Memory: 122860K/131072K available (4305K kernel code, 173K rwdata, 900K rodata, 1260K init, 244K bss, 8212K reserved, 0K cma-reserved)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Hierarchical RCU implementation.
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] NR_IRQS:256
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Setting up vectored interrupts
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] Setting up IPI vectored interrupts
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] CPU Clock: 500MHz
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041786 ns
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.000011] sched_clock: 32 bits at 250MHz, resolution 4ns, wraps every 8589934590ns
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.007884] Calibrating delay loop... 332.54 BogoMIPS (lpj=665088)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.042381] pid_max: default: 32768 minimum: 301
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.047259] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.053796] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.065580] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.065592] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.065780] CPU1 revision is: 00019556 (MIPS 34Kc)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.116509] Synchronize counters for CPU 1:
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.116511] done.
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.123011] Brought up 2 CPUs
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.130709] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.140375] futex hash table entries: 512 (order: 2, 16384 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.146601] pinctrl core: initialized pinctrl subsystem
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.153098] NET: Registered protocol family 16
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.165993] pinctrl-xway 1e100b10.pinmux: Init done
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.171978] dma-xway 1e104100.dma: Init done - hw rev: 7, ports: 7, channels: 28
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.284736] dcdc-xrx200 1f106a00.dcdc: Core Voltage : 1016 mV
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.290541] Can't analyze schedule() prologue at 8043158c
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.317281] PCI host bridge /fpi@10000000/pci@E105400 ranges:
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.322963] MEM 0x0000000018000000..0x0000000019ffffff
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.328233] IO 0x000000001ae00000..0x000000001affffff
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.451993] PCI host bridge /fpi@10000000/pcie@d900000 ranges:
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 0.486086] random: fast init done
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.486281] usbcore: registered new interface driver usbfs
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.486413] usbcore: registered new interface driver hub
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.486554] usbcore: registered new device driver usb
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487035] PCI host bridge to bus 0000:00
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487063] pci_bus 0000:00: root bus resource [mem 0x18000000-0x19ffffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487081] pci_bus 0000:00: root bus resource [io 0x1ae00000-0x1affffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487098] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487116] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.487217] pci 0000:00:0e.0: [168c:ff1d] type 00 class 0x020000
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.487266] pci 0000:00:0e.0: reg 0x10: [mem 0x00000000-0x0000ffff]
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.487765] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.487806] pci 0000:00:0e.0: BAR 0: assigned [mem 0x18000000-0x1800ffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488058] PCI host bridge to bus 0000:01
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488082] pci_bus 0000:01: root bus resource [mem 0x1c000000-0x1cffffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488100] pci_bus 0000:01: root bus resource [io 0x1d800000-0x1d8fffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488116] pci_bus 0000:01: root bus resource [??? 0x00000000 flags 0x0]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488134] pci_bus 0000:01: No busn resource found for root bus, will use [bus 01-ff]
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.488206] pci 0000:01:00.0: [1bef:0011] type 01 class 0x060000
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.488226] ifx_pcie_rc_class_early_fixup: fixed pcie host bridge to pci-pci bridge
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.499810] pci 0000:01:00.0: PME# supported from D0 D3hot
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.500214] pci 0000:01:00.0: bridge configuration invalid ([bus 02-00]), reconfiguring
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500537] pci 0000:02:00.0: [168c:003c] type 00 class 0x028000
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500608] pci 0000:02:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500692] pci 0000:02:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.500855] pci 0000:02:00.0: supports D1 D2
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.501203] pci_bus 0000:02: busn_res: [bus 02-ff] end is updated to 02
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.501239] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 02
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501297] pci 0000:01:00.0: BAR 8: assigned [mem 0x1c000000-0x1c1fffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501325] pci 0000:01:00.0: BAR 9: assigned [mem 0x1c200000-0x1c2fffff pref]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501357] pci 0000:02:00.0: BAR 0: assigned [mem 0x1c000000-0x1c1fffff 64bit]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501406] pci 0000:02:00.0: BAR 6: assigned [mem 0x1c200000-0x1c20ffff pref]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501422] pci 0000:01:00.0: PCI bridge to [bus 02]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501449] pci 0000:01:00.0: bridge window [mem 0x1c000000-0x1c1fffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.501473] pci 0000:01:00.0: bridge window [mem 0x1c200000-0x1c2fffff pref]
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501600] ifx_pcie_bios_map_irq port 0 dev 0000:01:00.0 slot 0 pin 1
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501611] ifx_pcie_bios_map_irq dev 0000:01:00.0 irq 144 assigned
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501653] ifx_pcie_bios_map_irq port 0 dev 0000:02:00.0 slot 0 pin 1
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.501662] ifx_pcie_bios_map_irq dev 0000:02:00.0 irq 144 assigned
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.671391] clocksource: Switched to clocksource MIPS
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.677748] NET: Registered protocol family 2
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.683442] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.690414] TCP bind hash table entries: 1024 (order: 1, 8192 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.696740] TCP: Hash tables configured (established 1024 bind 1024)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.703306] UDP hash table entries: 256 (order: 1, 8192 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.709087] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.715708] NET: Registered protocol family 1
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 0.720064] PCI: CLS 0 bytes, default 32
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.721009] gptu: totally 6 16-bit timers/counters
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.725991] gptu: misc_register on minor 63
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.730143] gptu: succeeded to request irq 126
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.734621] gptu: succeeded to request irq 127
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.739215] gptu: succeeded to request irq 128
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.743675] gptu: succeeded to request irq 129
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.748165] gptu: succeeded to request irq 130
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.752703] gptu: succeeded to request irq 131
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.757562] phy-xrx200 gphy-xrx200: requesting lantiq/xrx200_phy11g_a22.bin
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.765103] phy-xrx200 gphy-xrx200: booting GPHY0 firmware at 7E60000
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.771454] phy-xrx200 gphy-xrx200: booting GPHY1 firmware at 7E60000
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.879432] No VPEs reserved for AP/SP, not initialize VPE loader
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.879432] Pass maxvpes=<n> argument as kernel argument
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.890814] No TCs reserved for AP/SP, not initializing RTLX.
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.890814] Pass maxtcs=<n> argument as kernel argument
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 0.903648] Crashlog allocated RAM at address 0x3f00000
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.909367] workingset: timestamp_bits=30 max_order=15 bucket_order=0
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.932207] squashfs: version 4.0 (2009/01/31) Phillip Lougher
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.937951] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.953690] io scheduler noop registered
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.957504] io scheduler deadline registered (default)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.964045] 1e100c00.serial: ttyLTQ0 at MMIO 0x1e100c00 (irq = 112, base_baud = 0) is a lantiq,asc
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.972949] console [ttyLTQ0] enabled
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.980286] bootconsole [early0] disabled
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.991321] nand: device found, Manufacturer ID: 0x01, Chip ID: 0xf1
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 0.996313] nand: AMD/Spansion S34ML01G1
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.000206] nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.008383] Bad block table found at page 65472, version 0x01
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.014369] Bad block table found at page 65408, version 0x01
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.019377] nand_read_bbt: bad block at 0x000004a20000
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.024503] 4 fixed-partitions partitions found on MTD device 14000000.nand-parts
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.031863] Creating 4 MTD partitions on "14000000.nand-parts":
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.037800] 0x000000000000-0x0000000a0000 : "u-boot"
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.045063] 0x0000000a0000-0x0000000c0000 : "uboot-env"
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.051145] 0x0000000c0000-0x000000100000 : "unused"
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.057033] 0x000000100000-0x000007f80000 : "ubi"
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.067826] libphy: Fixed MDIO Bus: probed
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.175303] libphy: lantiq,xrx200-mdio: probed
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 1.183425] net-xrx200: invalid MAC, using random
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.255857] Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6 0:00: attached PHY driver [Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6] (mii_bus:phy_addr=0:00, irq=-1)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.339834] Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6 0:01: attached PHY driver [Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6] (mii_bus:phy_addr=0:01, irq=-1)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.423818] Intel XWAY PHY11G (xRX v1.2 integrated) 0:11: attached PHY driver [Intel XWAY PHY11G (xRX v1.2 integrated)] (mii_bus:phy_addr=0:11, irq=-1)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.507818] Intel XWAY PHY11G (xRX v1.2 integrated) 0:13: attached PHY driver [Intel XWAY PHY11G (xRX v1.2 integrated)] (mii_bus:phy_addr=0:13, irq=-1)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.591835] Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6 0:05: attached PHY driver [Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6] (mii_bus:phy_addr=0:05, irq=-1)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.709434] ltq-cputemp cputemp@0: Current CPU die temperature: 67.0 °C
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.715104] wdt 1f8803f0.watchdog: Init done
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.725300] NET: Registered protocol family 10
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.730537] NET: Registered protocol family 17
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.733725] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.746550] 8021q: 802.1Q VLAN Support v1.8
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.754897] UBI: auto-attach mtd3
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.756866] ubi0: attaching mtd3
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.899956] ubi0: scanning is finished
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.916707] ubi0: attached mtd3 (name "ubi", size 126 MiB)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.920820] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 129024 bytes
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.927682] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 512
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.934354] ubi0: VID header offset: 512 (aligned 512), data offset: 2048
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.941151] ubi0: good PEBs: 1011, bad PEBs: 1, corrupted PEBs: 0
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.947246] ubi0: user volume: 4, internal volumes: 1, max. volumes count: 128
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.954484] ubi0: max/mean erase counter: 331/224, WL threshold: 4096, image sequence number: 1019015774
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.963958] ubi0: available PEBs: 0, total reserved PEBs: 1011, PEBs reserved for bad PEB handling: 19
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.973348] ubi0: background thread "ubi_bgt0d" started, PID 375
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.981328] block ubiblock0_1: created from ubi0:1(rootfs)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 1.985441] ubiblock: device ubiblock0_1 (rootfs) set to be root filesystem
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 1.998391] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 2.008108] Freeing unused kernel memory: 1260K
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 2.011239] This architecture does not have kernel memory protection.
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 2.608794] init: Console is alive
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 2.611098] init: - watchdog -
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 3.802067] kmodloader: loading kernel modules from /etc/modules-boot.d/*
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 3.920072] dwc2 1e101000.ifxhcd: requested GPIO 495
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.025663] dwc2 1e101000.ifxhcd: DWC OTG Controller
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.029292] dwc2 1e101000.ifxhcd: new USB bus registered, assigned bus number 1
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.036624] dwc2 1e101000.ifxhcd: irq 62, io mem 0x00000000
- Wed Jan 16 22:47:57 2019 kern.err kernel: [ 4.042142] dwc2 1e101000.ifxhcd: Hardware does not support descriptor DMA mode -
- Wed Jan 16 22:47:57 2019 kern.err kernel: [ 4.049548] dwc2 1e101000.ifxhcd: falling back to buffer DMA mode.
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.057259] hub 1-0:1.0: USB hub found
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.059777] hub 1-0:1.0: 1 port detected
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 4.065087] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 4.081476] init: - preinit -
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.563313] usb 1-1: new high-speed USB device number 2 using dwc2
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 4.670706] lantiq,xrx200-net 1e108000.eth eth0: port 4 got link
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 4.936134] random: procd: uninitialized urandom read (4 bytes read)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.370789] UBIFS (ubi0:2): background thread "ubifs_bgt0_2" started, PID 442
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.417108] UBIFS (ubi0:2): recovery needed
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.527969] UBIFS (ubi0:2): recovery completed
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.531117] UBIFS (ubi0:2): UBIFS: mounted UBI device 0, volume 2, name "rootfs_data"
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.538860] UBIFS (ubi0:2): LEB size: 129024 bytes (126 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.548772] UBIFS (ubi0:2): FS size: 120508416 bytes (114 MiB, 934 LEBs), journal size 6064128 bytes (5 MiB, 47 LEBs)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.559382] UBIFS (ubi0:2): reserved for root: 4952683 bytes (4836 KiB)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.566006] UBIFS (ubi0:2): media format: w4/r0 (latest is w4/r0), UUID 435DA3A2-D246-439B-B4CB-CBB2DF664757, small LPT model
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 8.580166] mount_root: loading kmods from internal overlay
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 8.634947] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 8.747841] SCSI subsystem initialized
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 8.770762] usb-storage 1-1:1.0: USB Mass Storage device detected
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 8.776430] scsi host0: usb-storage 1-1:1.0
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 8.780689] usbcore: registered new interface driver usb-storage
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 8.785966] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.007377] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.014684] block: extroot: not configured
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.032760] mount_root: switching to ubifs overlay
- Wed Jan 16 22:47:57 2019 user.warn kernel: [ 9.069345] urandom-seed: Seeding with /etc/urandom.seed
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.214143] procd: - early -
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.215846] procd: - watchdog -
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.800643] scsi 0:0:0:0: Direct-Access USB DISK 2.0 PMAP PQ: 0 ANSI: 0 CCS
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.884940] procd: - watchdog -
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.887277] procd: - ubus -
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.973986] random: ubusd: uninitialized urandom read (4 bytes read)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.981464] random: ubusd: uninitialized urandom read (4 bytes read)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 9.987031] random: ubusd: uninitialized urandom read (4 bytes read)
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 9.994634] procd: - init -
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.215358] lantiq,xrx200-net 1e108000.eth eth0: port 4 lost link
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.407732] sd 0:0:0:0: [sda] 7831552 512-byte logical blocks: (4.01 GB/3.73 GiB)
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.414604] sd 0:0:0:0: [sda] Write Protect is off
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.418717] sd 0:0:0:0: [sda] Mode Sense: 23 00 00 00
- Wed Jan 16 22:47:57 2019 kern.err kernel: [ 10.419592] sd 0:0:0:0: [sda] No Caching mode page found
- Wed Jan 16 22:47:57 2019 kern.err kernel: [ 10.423987] sd 0:0:0:0: [sda] Assuming drive cache: write through
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.437102] sda: sda1
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.442754] sd 0:0:0:0: [sda] Attached SCSI removable disk
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 10.583439] kmodloader: loading kernel modules from /etc/modules.d/*
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.595501] IFXOS, Version 1.5.19 (c) Copyright 2009, Lantiq Deutschland GmbH
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.606492] NET: Registered protocol family 8
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.609592] NET: Registered protocol family 20
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.624548] tun: Universal TUN/TAP device driver, 1.6
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.628273] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.641677] PPP generic driver version 2.4.2
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.655662] ip6_tables: (C) 2000-2006 Netfilter Core Team
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.687968] Lantiq (VRX) DSL CPE MEI driver, version 1.5.17.6, (c) 2007-2015 Lantiq Beteiligungs-GmbH & Co. KG
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.706628]
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.706628]
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.706628] Lantiq CPE API Driver version: DSL CPE API V4.17.18.6
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.714460]
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.714460] Predefined debug level: 3
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.729006] Loading modules backported from Linux version wt-2017-11-01-0-gfe248fc2c180
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.735732] Backport generated by backports.git v4.14-rc2-1-31-g86cf0e5d
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.746182] ip_tables: (C) 2000-2006 Netfilter Core Team
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.756608] Infineon Technologies DEU driver version 2.0.0
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.763538] IFX DEU DES initialized (multiblock).
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.768836] IFX DEU AES initialized (multiblock).
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.773483] IFX DEU ARC4 initialized (multiblock).
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.777688] IFX DEU SHA1 initialized.
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.781026] IFX DEU MD5 initialized.
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.784645] IFX DEU SHA1_HMAC initialized.
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 10.788693] IFX DEU MD5_HMAC initialized.
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.803788] nf_conntrack version 0.5.0 (2048 buckets, 8192 max)
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 10.869006] PCI: Enabling device 0000:00:0e.0 (0000 -> 0002)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.875733] owl-loader 0000:00:0e.0: fixup device configuration
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.882901] pci 0000:00:0e.0: [168c:002d] type 00 class 0x028000
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.882973] pci 0000:00:0e.0: reg 0x10: [mem 0x18000000-0x1800ffff]
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 10.883129] pci 0000:00:0e.0: PME# supported from D0 D3hot
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.883799] pci 0000:00:0e.0: BAR 0: assigned [mem 0x18000000-0x1800ffff]
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.896089] NET: Registered protocol family 24
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 10.918615] xt_time: kernel timezone is -0000
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.080088] PCI: Enabling device 0000:01:00.0 (0000 -> 0002)
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.084596] PCI: Enabling device 0000:02:00.0 (0000 -> 0002)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 11.090356] ath10k_pci 0000:02:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.335286] ath10k_pci 0000:02:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:02:00.0.bin failed with error -2
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 11.344693] ath10k_pci 0000:02:00.0: Falling back to user helper
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 11.456481] random: crng init done
- Wed Jan 16 22:47:57 2019 kern.notice kernel: [ 11.458423] random: 6 urandom warning(s) missed due to ratelimiting
- Wed Jan 16 22:47:57 2019 kern.err kernel: [ 12.617407] firmware ath10k!pre-cal-pci-0000:02:00.0.bin: firmware_loading_store: map pages failed
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 12.626792] ath10k_pci 0000:02:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/firmware-6.bin failed with error -2
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 12.636162] ath10k_pci 0000:02:00.0: Falling back to user helper
- Wed Jan 16 22:47:57 2019 kern.err kernel: [ 12.890723] firmware ath10k!QCA988X!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.143047] ath10k_pci 0000:02:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.150925] ath10k_pci 0000:02:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.166401] ath10k_pci 0000:02:00.0: firmware ver 10.2.4-1.0-00033 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 c41417d0
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 13.209935] ath10k_pci 0000:02:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 13.219029] ath10k_pci 0000:02:00.0: Falling back to user helper
- Wed Jan 16 22:47:57 2019 kern.err kernel: [ 13.350294] firmware ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 13.358431] ath10k_pci 0000:02:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 14.400125] ath10k_pci 0000:02:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512958] ath: EEPROM regdomain: 0x833a
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512969] ath: EEPROM indicates we should expect a country code
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512984] ath: doing EEPROM country->regdmn map search
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512992] ath: country maps to regdmn code: 0x37
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.512999] ath: Country alpha2 being used: GB
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.513004] ath: Regpair used: 0x37
- Wed Jan 16 22:47:57 2019 kern.warn kernel: [ 14.561033] PCI: Enabling device 0000:00:0e.0 (0000 -> 0002)
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 14.572195] ath: phy1: Ignoring endianness difference in EEPROM magic bytes.
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579776] ath: EEPROM regdomain: 0x833a
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579790] ath: EEPROM indicates we should expect a country code
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579810] ath: doing EEPROM country->regdmn map search
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579823] ath: country maps to regdmn code: 0x37
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579834] ath: Country alpha2 being used: GB
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.579842] ath: Regpair used: 0x37
- Wed Jan 16 22:47:57 2019 kern.debug kernel: [ 14.599458] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
- Wed Jan 16 22:47:57 2019 kern.info kernel: [ 14.605426] ieee80211 phy1: Atheros AR9287 Rev:2 mem=0xb8000000, irq=30
- Wed Jan 16 22:47:57 2019 user.info kernel: [ 14.613935] kmodloader: done loading kernel modules from /etc/modules.d/*
- Wed Jan 16 22:47:58 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Jan 16 22:47:58 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: started, version 2.80test3 cachesize 150
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: DNS service limited to local subnets
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain test
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain onion
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain localhost
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain local
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain invalid
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain bind
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: using local addresses only for domain lan
- Wed Jan 16 22:47:59 2019 daemon.warn dnsmasq[1015]: no servers found in /tmp/resolv.conf.auto, will retry
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: read /etc/hosts - 4 addresses
- Wed Jan 16 22:47:59 2019 daemon.info dnsmasq[1015]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
- Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: tunnel
- Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: Network device
- Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: bridge
- Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: veth
- Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: macvlan
- Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: 8021ad
- Wed Jan 16 22:48:01 2019 user.notice : Added device handler type: 8021q
- Wed Jan 16 22:48:02 2019 daemon.err block: /dev/ubiblock0_1 is already mounted on /rom
- Wed Jan 16 22:48:02 2019 daemon.err block: /dev/ubi0_2 is already mounted on /overlay
- Wed Jan 16 22:48:02 2019 daemon.err block: /dev/sda1 is already mounted on /mnt/sda1
- Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.702712] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
- Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.714158] device eth0 entered promiscuous mode
- Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.720374] br-lan: port 1(eth0.1) entered blocking state
- Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.724505] br-lan: port 1(eth0.1) entered disabled state
- Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.730781] device eth0.1 entered promiscuous mode
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'lan' is enabled
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'lan' is setting up now
- Wed Jan 16 22:48:05 2019 kern.info kernel: [ 24.739287] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'lan' is now up
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' is enabled
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' is setting up now
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' is now up
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Network device 'lo' link is up
- Wed Jan 16 22:48:05 2019 daemon.notice netifd: Interface 'loopback' has link connectivity
- Wed Jan 16 22:48:06 2019 daemon.notice procd: /etc/rc.d/S50dropbear: interface wan has no physdev or physdev has no suitable ip
- Wed Jan 16 22:48:06 2019 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
- Wed Jan 16 22:48:07 2019 authpriv.warn dropbear[1413]: Failed listening on '22': Error listening: Address not available
- Wed Jan 16 22:48:07 2019 authpriv.info dropbear[1413]: Not backgrounding
- Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.786599] lantiq,xrx200-net 1e108000.eth eth0: port 4 got link
- Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.791782] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
- Wed Jan 16 22:48:08 2019 daemon.notice netifd: Network device 'eth0' link is up
- Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.815290] br-lan: port 1(eth0.1) entered blocking state
- Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.819341] br-lan: port 1(eth0.1) entered forwarding state
- Wed Jan 16 22:48:08 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
- Wed Jan 16 22:48:08 2019 daemon.notice netifd: bridge 'br-lan' link is up
- Wed Jan 16 22:48:08 2019 daemon.notice netifd: Interface 'lan' has link connectivity
- Wed Jan 16 22:48:08 2019 kern.info kernel: [ 27.843544] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
- Wed Jan 16 22:48:09 2019 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
- Wed Jan 16 22:48:09 2019 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
- Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
- Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
- Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
- Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
- Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
- Wed Jan 16 22:48:10 2019 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
- Wed Jan 16 22:48:10 2019 kern.info kernel: [ 30.350152] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.396143] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.411545] br-lan: port 2(wlan0) entered blocking state
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.415576] br-lan: port 2(wlan0) entered disabled state
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.421842] device wlan0 entered promiscuous mode
- Wed Jan 16 22:48:11 2019 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.448581] br-lan: port 3(wlan1) entered blocking state
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.452527] br-lan: port 3(wlan1) entered disabled state
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.458653] device wlan1 entered promiscuous mode
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.462799] br-lan: port 3(wlan1) entered blocking state
- Wed Jan 16 22:48:11 2019 kern.info kernel: [ 30.467858] br-lan: port 3(wlan1) entered forwarding state
- Wed Jan 16 22:48:11 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
- Wed Jan 16 22:48:11 2019 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
- Wed Jan 16 22:48:11 2019 daemon.err hostapd: Using interface wlan1 with hwaddr 54:64:d9:20:1c:6a and ssid "Baymax"
- Wed Jan 16 22:48:11 2019 daemon.err hostapd: Using interface wlan0 with hwaddr 54:64:d9:20:1c:6b and ssid "Baymax"
- Wed Jan 16 22:48:11 2019 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
- Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.367567] br-lan: port 3(wlan1) entered disabled state
- Wed Jan 16 22:48:12 2019 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
- Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.748496] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
- Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.753950] br-lan: port 3(wlan1) entered blocking state
- Wed Jan 16 22:48:12 2019 kern.info kernel: [ 31.758825] br-lan: port 3(wlan1) entered forwarding state
- Wed Jan 16 22:48:12 2019 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
- Wed Jan 16 22:48:12 2019 daemon.notice hostapd: wlan1: AP-ENABLED
- Wed Jan 16 22:48:12 2019 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
- Wed Jan 16 22:48:12 2019 daemon.notice netifd: Network device 'wlan1' link is up
- Wed Jan 16 22:48:13 2019 kern.info kernel: [ 32.383614] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
- Wed Jan 16 22:48:13 2019 kern.info kernel: [ 32.389215] br-lan: port 2(wlan0) entered blocking state
- Wed Jan 16 22:48:13 2019 kern.info kernel: [ 32.393972] br-lan: port 2(wlan0) entered forwarding state
- Wed Jan 16 22:48:13 2019 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
- Wed Jan 16 22:48:13 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
- Wed Jan 16 22:48:13 2019 daemon.notice hostapd: wlan0: AP-ENABLED
- Wed Jan 16 22:48:13 2019 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
- Wed Jan 16 22:48:13 2019 daemon.notice netifd: Network device 'wlan0' link is up
- Wed Jan 16 22:48:13 2019 daemon.notice procd: /etc/rc.d/S96led: setting up led wifi
- Wed Jan 16 22:48:13 2019 daemon.notice procd: /etc/rc.d/S96led: setting up led dsl
- Wed Jan 16 22:48:13 2019 daemon.notice procd: /etc/rc.d/S96led: setting up led dimmed
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1015]: exiting on receipt of SIGTERM
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: started, version 2.80test3 cachesize 150
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: DNS service limited to local subnets
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq-dhcp[1921]: DHCP, IP range 10.0.0.51 -- 10.0.0.200, lease time 2d
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain test
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain onion
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain localhost
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain local
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain invalid
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain bind
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: using local addresses only for domain lan
- Wed Jan 16 22:48:15 2019 daemon.warn dnsmasq[1921]: no servers found in /tmp/resolv.conf.auto, will retry
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
- Wed Jan 16 22:48:15 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
- Wed Jan 16 22:48:16 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
- Wed Jan 16 22:48:16 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 1)
- Wed Jan 16 22:48:16 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:d6:aa:05:61:00
- Wed Jan 16 22:48:16 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:48:17 2019 daemon.info hostapd: wlan1: STA b8:e9:37:87:61:92 IEEE 802.11: authenticated
- Wed Jan 16 22:48:17 2019 daemon.info hostapd: wlan1: STA b8:e9:37:87:61:92 IEEE 802.11: associated (aid 1)
- Wed Jan 16 22:48:17 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED b8:e9:37:87:61:92
- Wed Jan 16 22:48:17 2019 daemon.info hostapd: wlan1: STA b8:e9:37:87:61:92 WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:48:18 2019 daemon.info procd: - init complete -
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 04:d6:aa:05:61:00
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.181 04:d6:aa:05:61:00
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 04:d6:aa:05:61:00
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.181 04:d6:aa:05:61:00
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 04:d6:aa:05:61:00
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.181 04:d6:aa:05:61:00
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.181 04:d6:aa:05:61:00
- Wed Jan 16 22:48:20 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.181 04:d6:aa:05:61:00 RicFlairWOOO
- Wed Jan 16 22:48:20 2019 daemon.notice netifd: Network device 'eth0' link is down
- Wed Jan 16 22:48:20 2019 kern.info kernel: [ 40.103512] lantiq,xrx200-net 1e108000.eth eth0: port 4 lost link
- Wed Jan 16 22:48:20 2019 kern.info kernel: [ 40.111045] br-lan: port 1(eth0.1) entered disabled state
- Wed Jan 16 22:48:20 2019 daemon.notice netifd: VLAN 'eth0.1' link is down
- Wed Jan 16 22:48:21 2019 daemon.notice netifd: Network device 'eth0' link is up
- Wed Jan 16 22:48:21 2019 kern.info kernel: [ 41.127758] lantiq,xrx200-net 1e108000.eth eth0: port 4 got link
- Wed Jan 16 22:48:21 2019 kern.info kernel: [ 41.134389] br-lan: port 1(eth0.1) entered blocking state
- Wed Jan 16 22:48:21 2019 kern.info kernel: [ 41.138450] br-lan: port 1(eth0.1) entered forwarding state
- Wed Jan 16 22:48:21 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
- Wed Jan 16 22:48:26 2019 daemon.info hostapd: wlan0: STA 88:71:e5:c9:16:fe IEEE 802.11: authenticated
- Wed Jan 16 22:48:26 2019 daemon.info hostapd: wlan0: STA 88:71:e5:c9:16:fe IEEE 802.11: associated (aid 2)
- Wed Jan 16 22:48:26 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:26 2019 daemon.info hostapd: wlan0: STA 88:71:e5:c9:16:fe WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:48:27 2019 daemon.notice dsl-notify: Switching to TC-Layer EFM/PTM
- Wed Jan 16 22:48:27 2019 kern.info kernel: [ 46.475773] PTM 1.0.27 PTM (E1) firmware version 0.30
- Wed Jan 16 22:48:27 2019 kern.warn kernel: [ 46.479963] ifxmips_ptm: PTM init succeed
- Wed Jan 16 22:48:27 2019 kern.info kernel: [ 46.481491] IPv6: ADDRCONF(NETDEV_UP): dsl0: link is not ready
- Wed Jan 16 22:48:27 2019 kern.info kernel: [ 46.488697] IPv6: ADDRCONF(NETDEV_UP): dsl0.101: link is not ready
- Wed Jan 16 22:48:27 2019 daemon.notice netifd: Interface 'wan' is enabled
- Wed Jan 16 22:48:29 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: authenticated
- Wed Jan 16 22:48:29 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: associated (aid 2)
- Wed Jan 16 22:48:29 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED fc:a1:83:75:57:b6
- Wed Jan 16 22:48:29 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:48:30 2019 daemon.info hostapd: wlan0: STA d8:6c:63:58:a6:b7 IEEE 802.11: authenticated
- Wed Jan 16 22:48:30 2019 daemon.info hostapd: wlan0: STA d8:6c:63:58:a6:b7 IEEE 802.11: associated (aid 3)
- Wed Jan 16 22:48:30 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED d8:6c:63:58:a6:b7
- Wed Jan 16 22:48:30 2019 daemon.info hostapd: wlan0: STA d8:6c:63:58:a6:b7 WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:48:31 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:31 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:34 2019 daemon.info hostapd: wlan0: STA 48:d6:d5:13:0c:5a IEEE 802.11: authenticated
- Wed Jan 16 22:48:34 2019 daemon.info hostapd: wlan0: STA 48:d6:d5:13:0c:5a IEEE 802.11: associated (aid 4)
- Wed Jan 16 22:48:34 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 48:d6:d5:13:0c:5a
- Wed Jan 16 22:48:34 2019 daemon.info hostapd: wlan0: STA 48:d6:d5:13:0c:5a WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.193 fc:a1:83:75:57:b6
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.77 d8:6c:63:58:a6:b7
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.77 d8:6c:63:58:a6:b7 Google-Home
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.193 fc:a1:83:75:57:b6
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.164 88:71:e5:c9:16:fe
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.193 48:d6:d5:13:0c:5a
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.193 48:d6:d5:13:0c:5a Chromecast
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.193 fc:a1:83:75:57:b6
- Wed Jan 16 22:48:35 2019 daemon.info dnsmasq-dhcp[1921]: DHCPNAK(br-lan) 10.0.0.193 fc:a1:83:75:57:b6 address in use
- Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
- Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.194 fc:a1:83:75:57:b6
- Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPDISCOVER(br-lan) fc:a1:83:75:57:b6
- Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPOFFER(br-lan) 10.0.0.194 fc:a1:83:75:57:b6
- Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.194 fc:a1:83:75:57:b6
- Wed Jan 16 22:48:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.194 fc:a1:83:75:57:b6 amazon-2b42aef46
- Wed Jan 16 22:48:51 2019 kern.warn kernel: [ 70.987037] enter showtime
- Wed Jan 16 22:48:51 2019 kern.info kernel: [ 70.988919] IPv6: ADDRCONF(NETDEV_CHANGE): dsl0: link becomes ready
- Wed Jan 16 22:48:51 2019 daemon.notice netifd: Network device 'dsl0' link is up
- Wed Jan 16 22:48:51 2019 daemon.notice netifd: VLAN 'dsl0.101' link is up
- Wed Jan 16 22:48:51 2019 daemon.notice netifd: Interface 'wan' has link connectivity
- Wed Jan 16 22:48:51 2019 daemon.notice netifd: Interface 'wan' is setting up now
- Wed Jan 16 22:48:51 2019 kern.info kernel: [ 70.999098] IPv6: ADDRCONF(NETDEV_CHANGE): dsl0.101: link becomes ready
- Wed Jan 16 22:48:51 2019 kern.warn kernel: [ 71.011801] enter showtime
- Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - slhc
- Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - ppp_generic
- Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - pppox
- Wed Jan 16 22:48:51 2019 daemon.err insmod: module is already loaded - pppoe
- Wed Jan 16 22:48:52 2019 daemon.info pppd[2412]: Plugin rp-pppoe.so loaded.
- Wed Jan 16 22:48:52 2019 daemon.info pppd[2412]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
- Wed Jan 16 22:48:52 2019 daemon.notice pppd[2412]: pppd 2.4.7 started by root, uid 0
- Wed Jan 16 22:48:56 2019 daemon.err uhttpd[1603]: luci: accepted login on / for root from 10.0.0.181
- Wed Jan 16 22:49:02 2019 daemon.info hostapd: wlan0: STA 20:3c:ae:df:ad:ea IEEE 802.11: authenticated
- Wed Jan 16 22:49:02 2019 daemon.info hostapd: wlan0: STA 20:3c:ae:df:ad:ea IEEE 802.11: associated (aid 5)
- Wed Jan 16 22:49:02 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 20:3c:ae:df:ad:ea
- Wed Jan 16 22:49:02 2019 daemon.info hostapd: wlan0: STA 20:3c:ae:df:ad:ea WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:49:02 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.185 20:3c:ae:df:ad:ea
- Wed Jan 16 22:49:02 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.185 20:3c:ae:df:ad:ea ClaireBariBlips
- Wed Jan 16 22:49:02 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 00010001229dd004203caedfadea on br-lan: ok fd30:403e:9505::ca3/128
- Wed Jan 16 22:49:03 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
- Wed Jan 16 22:49:03 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/odhcpd - 0 addresses
- Wed Jan 16 22:49:03 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
- Wed Jan 16 22:49:03 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
- Wed Jan 16 22:49:03 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 00010001229dd004203caedfadea on br-lan: ok fd30:403e:9505::ca3/128
- Wed Jan 16 22:49:07 2019 daemon.warn pppd[2412]: Timeout waiting for PADO packets
- Wed Jan 16 22:49:07 2019 daemon.err pppd[2412]: Unable to complete PPPoE Discovery
- Wed Jan 16 22:49:07 2019 daemon.info pppd[2412]: Exit.
- Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is now down
- Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is disabled
- Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is enabled
- Wed Jan 16 22:49:07 2019 daemon.notice netifd: Interface 'wan' is setting up now
- Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - slhc
- Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - ppp_generic
- Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - pppox
- Wed Jan 16 22:49:07 2019 daemon.err insmod: module is already loaded - pppoe
- Wed Jan 16 22:49:08 2019 daemon.info pppd[3248]: Plugin rp-pppoe.so loaded.
- Wed Jan 16 22:49:08 2019 daemon.info pppd[3248]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
- Wed Jan 16 22:49:08 2019 daemon.notice pppd[3248]: pppd 2.4.7 started by root, uid 0
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:16 2019 daemon.err uhttpd[1603]: sh: write error: Broken pipe
- Wed Jan 16 22:49:23 2019 daemon.warn pppd[3248]: Timeout waiting for PADO packets
- Wed Jan 16 22:49:23 2019 daemon.err pppd[3248]: Unable to complete PPPoE Discovery
- Wed Jan 16 22:49:23 2019 daemon.info pppd[3248]: Exit.
- Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is now down
- Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is disabled
- Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is enabled
- Wed Jan 16 22:49:23 2019 daemon.notice netifd: Interface 'wan' is setting up now
- Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - slhc
- Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - ppp_generic
- Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - pppox
- Wed Jan 16 22:49:23 2019 daemon.err insmod: module is already loaded - pppoe
- Wed Jan 16 22:49:23 2019 daemon.info pppd[4027]: Plugin rp-pppoe.so loaded.
- Wed Jan 16 22:49:23 2019 daemon.info pppd[4027]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
- Wed Jan 16 22:49:24 2019 daemon.notice pppd[4027]: pppd 2.4.7 started by root, uid 0
- Wed Jan 16 22:49:39 2019 daemon.info hostapd: wlan0: STA 18:af:61:d1:9e:7f IEEE 802.11: authenticated
- Wed Jan 16 22:49:39 2019 daemon.info hostapd: wlan0: STA 18:af:61:d1:9e:7f IEEE 802.11: associated (aid 6)
- Wed Jan 16 22:49:39 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 18:af:61:d1:9e:7f
- Wed Jan 16 22:49:39 2019 daemon.info hostapd: wlan0: STA 18:af:61:d1:9e:7f WPA: pairwise key handshake completed (RSN)
- Wed Jan 16 22:49:39 2019 daemon.warn pppd[4027]: Timeout waiting for PADO packets
- Wed Jan 16 22:49:39 2019 daemon.err pppd[4027]: Unable to complete PPPoE Discovery
- Wed Jan 16 22:49:39 2019 daemon.info pppd[4027]: Exit.
- Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is now down
- Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is disabled
- Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is enabled
- Wed Jan 16 22:49:39 2019 daemon.notice netifd: Interface 'wan' is setting up now
- Wed Jan 16 22:49:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.51 18:af:61:d1:9e:7f
- Wed Jan 16 22:49:39 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.51 18:af:61:d1:9e:7f ClaireBariBlips
- Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - slhc
- Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - ppp_generic
- Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - pppox
- Wed Jan 16 22:49:39 2019 daemon.err insmod: module is already loaded - pppoe
- Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: Plugin rp-pppoe.so loaded.
- Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
- Wed Jan 16 22:49:39 2019 daemon.notice pppd[4192]: pppd 2.4.7 started by root, uid 0
- Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: PPP session is 4110
- Wed Jan 16 22:49:39 2019 daemon.warn pppd[4192]: Connected to 84:b5:9c:6d:2d:d3 via interface dsl0.101
- Wed Jan 16 22:49:39 2019 kern.info kernel: [ 119.160212] pppoe-wan: renamed from ppp0
- Wed Jan 16 22:49:39 2019 daemon.info pppd[4192]: Using interface pppoe-wan
- Wed Jan 16 22:49:39 2019 daemon.notice pppd[4192]: Connect: pppoe-wan <--> dsl0.101
- Wed Jan 16 22:49:40 2019 daemon.info pppd[4192]: CHAP authentication succeeded
- Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: CHAP authentication succeeded
- Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: peer from calling number 84:B5:9C:6D:2D:D3 authorized
- Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: local IP address 90.254.119.130
- Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: remote IP address 212.158.250.32
- Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: primary DNS address 90.255.255.90
- Wed Jan 16 22:49:40 2019 daemon.notice pppd[4192]: secondary DNS address 90.255.255.255
- Wed Jan 16 22:49:40 2019 daemon.notice netifd: Network device 'pppoe-wan' link is up
- Wed Jan 16 22:49:40 2019 daemon.notice netifd: Interface 'wan6' is enabled
- Wed Jan 16 22:49:40 2019 daemon.notice netifd: Network alias 'pppoe-wan' link is up
- Wed Jan 16 22:49:40 2019 daemon.notice netifd: Interface 'wan6' has link connectivity
- Wed Jan 16 22:49:40 2019 daemon.notice netifd: Interface 'wan' is now up
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: reading /tmp/resolv.conf.auto
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain test
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain onion
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain localhost
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain local
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain invalid
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain bind
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using local addresses only for domain lan
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using nameserver 90.255.255.90#53
- Wed Jan 16 22:49:40 2019 daemon.info dnsmasq[1921]: using nameserver 90.255.255.255#53
- Wed Jan 16 22:49:41 2019 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
- Wed Jan 16 22:49:41 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 000100011f97e95d18af61d19e7f on br-lan: ok fd30:403e:9505::fd0/128
- Wed Jan 16 22:49:42 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 000100011f97e95d18af61d19e7f on br-lan: ok fd30:403e:9505::fd0/128
- Wed Jan 16 22:49:42 2019 authpriv.info dropbear[4472]: Not backgrounding
- Wed Jan 16 22:49:44 2019 user.notice ddns-scripts[4422]: myddns_ipv4: PID '4422' started at 2019-01-16 22:49
- Thu Jan 17 20:10:40 2019 daemon.info pppd[4192]: System time change detected.
- Thu Jan 17 20:10:46 2019 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED fc:a1:83:75:57:b6
- Thu Jan 17 20:10:46 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: disassociated
- Thu Jan 17 20:10:47 2019 daemon.info hostapd: wlan1: STA fc:a1:83:75:57:b6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
- Thu Jan 17 20:10:57 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
- Thu Jan 17 20:10:57 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 2)
- Thu Jan 17 20:10:57 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d6:aa:05:61:00
- Thu Jan 17 20:10:57 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:12:59 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
- Thu Jan 17 20:12:59 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 1)
- Thu Jan 17 20:12:59 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:d6:aa:05:61:00
- Thu Jan 17 20:12:59 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:14:13 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
- Thu Jan 17 20:14:13 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 2)
- Thu Jan 17 20:14:13 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d6:aa:05:61:00
- Thu Jan 17 20:14:13 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:16:52 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
- Thu Jan 17 20:16:52 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 1)
- Thu Jan 17 20:16:52 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:d6:aa:05:61:00
- Thu Jan 17 20:16:52 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:17:21 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: authenticated
- Thu Jan 17 20:17:21 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 IEEE 802.11: associated (aid 2)
- Thu Jan 17 20:17:21 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d6:aa:05:61:00
- Thu Jan 17 20:17:21 2019 daemon.info hostapd: wlan1: STA 04:d6:aa:05:61:00 WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:17:56 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: authenticated
- Thu Jan 17 20:17:56 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: associated (aid 3)
- Thu Jan 17 20:17:56 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d0:4f:7e:34:38:ae
- Thu Jan 17 20:17:56 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:17:56 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.176 d0:4f:7e:34:38:ae
- Thu Jan 17 20:17:56 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.176 d0:4f:7e:34:38:ae ClaireBearPad
- Thu Jan 17 20:17:57 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 000100011f97e954d04f7e3438ae on br-lan: ok fd30:403e:9505::c53/128
- Thu Jan 17 20:17:58 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 000100011f97e954d04f7e3438ae on br-lan: ok fd30:403e:9505::c53/128
- Thu Jan 17 20:22:57 2019 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 04:d6:aa:05:61:00
- Thu Jan 17 20:22:57 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: disassociated due to inactivity
- Thu Jan 17 20:22:58 2019 daemon.info hostapd: wlan0: STA 04:d6:aa:05:61:00 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
- Thu Jan 17 20:28:00 2019 daemon.warn odhcpd[1111]: DHCPV6 SOLICIT IA_NA from 0001000120e7c79c90e6baf4594c on br-lan: ok fd30:403e:9505::7e2/128
- Thu Jan 17 20:28:00 2019 daemon.warn odhcpd[1111]: DHCPV6 REQUEST IA_NA from 0001000120e7c79c90e6baf4594c on br-lan: ok fd30:403e:9505::7e2/128
- Thu Jan 17 20:28:00 2019 daemon.info dnsmasq[1921]: read /etc/hosts - 4 addresses
- Thu Jan 17 20:28:00 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/odhcpd - 1 addresses
- Thu Jan 17 20:28:00 2019 daemon.info dnsmasq[1921]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
- Thu Jan 17 20:28:00 2019 daemon.info dnsmasq-dhcp[1921]: read /etc/ethers - 0 addresses
- Thu Jan 17 20:30:43 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: authenticated
- Thu Jan 17 20:30:43 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: associated (aid 1)
- Thu Jan 17 20:30:43 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED d0:4f:7e:34:38:ae
- Thu Jan 17 20:30:43 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:32:11 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: authenticated
- Thu Jan 17 20:32:11 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae IEEE 802.11: associated (aid 3)
- Thu Jan 17 20:32:11 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d0:4f:7e:34:38:ae
- Thu Jan 17 20:32:11 2019 daemon.info hostapd: wlan1: STA d0:4f:7e:34:38:ae WPA: pairwise key handshake completed (RSN)
- Thu Jan 17 20:40:40 2019 authpriv.info dropbear[31768]: Child connection from 10.0.0.2:50122
- Thu Jan 17 20:40:40 2019 authpriv.info dropbear[31768]: Exit before auth: Exited normally
- Thu Jan 17 20:40:53 2019 authpriv.info dropbear[31769]: Child connection from 10.0.0.2:50129
- Thu Jan 17 20:40:58 2019 authpriv.notice dropbear[31769]: Password auth succeeded for 'root' from 10.0.0.2:50129
- Thu Jan 17 20:40:58 2019 authpriv.info dropbear[31769]: Exit (root): Exited normally
- Thu Jan 17 20:41:11 2019 authpriv.info dropbear[31776]: Child connection from 10.0.0.2:50130
- Thu Jan 17 20:41:12 2019 authpriv.notice dropbear[31776]: Password auth succeeded for 'root' from 10.0.0.2:50130
- Thu Jan 17 20:41:13 2019 authpriv.info dropbear[31776]: Exit (root): Exited normally
- Thu Jan 17 20:41:46 2019 authpriv.info dropbear[31783]: Child connection from 10.0.0.2:50138
- Thu Jan 17 20:41:47 2019 authpriv.notice dropbear[31783]: Password auth succeeded for 'root' from 10.0.0.2:50138
- Thu Jan 17 20:41:48 2019 authpriv.info dropbear[31783]: Exit (root): Exited normally
- Thu Jan 17 20:41:58 2019 authpriv.info dropbear[31790]: Child connection from 10.0.0.2:50147
- Thu Jan 17 20:41:59 2019 authpriv.notice dropbear[31790]: Password auth succeeded for 'root' from 10.0.0.2:50147
- Thu Jan 17 20:42:00 2019 authpriv.info dropbear[31790]: Exit (root): Exited normally
- Thu Jan 17 20:43:06 2019 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED d0:4f:7e:34:38:ae
- Thu Jan 17 20:43:06 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: disassociated due to inactivity
- Thu Jan 17 20:43:07 2019 daemon.info hostapd: wlan0: STA d0:4f:7e:34:38:ae IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
- Thu Jan 17 20:43:53 2019 authpriv.info dropbear[31805]: Child connection from 10.0.0.2:50239
- Thu Jan 17 20:43:57 2019 authpriv.notice dropbear[31805]: Password auth succeeded for 'root' from 10.0.0.2:50239
- Thu Jan 17 20:43:57 2019 authpriv.info dropbear[31805]: Exit (root): Exited normally
- Thu Jan 17 20:44:00 2019 authpriv.info dropbear[31807]: Child connection from 10.0.0.2:50240
- Thu Jan 17 20:44:01 2019 authpriv.notice dropbear[31807]: Password auth succeeded for 'root' from 10.0.0.2:50240
- Thu Jan 17 20:44:01 2019 authpriv.info dropbear[31807]: Exit (root): Exited normally
- Thu Jan 17 20:44:25 2019 daemon.err uhttpd[1603]: luci: accepted login on / for root from 10.0.0.2
- Thu Jan 17 20:52:42 2019 authpriv.info dropbear[32260]: Child connection from 10.0.0.2:50301
- Thu Jan 17 20:52:48 2019 authpriv.notice dropbear[32260]: Password auth succeeded for 'root' from 10.0.0.2:50301
- Thu Jan 17 21:00:13 2019 authpriv.info dropbear[32260]: Exit (root): Exited normally
- Thu Jan 17 21:00:32 2019 authpriv.info dropbear[32280]: Child connection from 10.0.0.2:50418
- Thu Jan 17 21:00:39 2019 authpriv.notice dropbear[32280]: Password auth succeeded for 'root' from 10.0.0.2:50418
- Thu Jan 17 21:05:41 2019 daemon.info dnsmasq-dhcp[1921]: DHCPREQUEST(br-lan) 10.0.0.121 30:d3:2d:1e:8b:41
- Thu Jan 17 21:05:41 2019 daemon.info dnsmasq-dhcp[1921]: DHCPACK(br-lan) 10.0.0.121 30:d3:2d:1e:8b:41 dlanwireless
- Thu Jan 17 21:21:13 2019 authpriv.info dropbear[32280]: Exit (root): Exited normally
- Thu Jan 17 21:21:27 2019 authpriv.info dropbear[4923]: Child connection from 10.0.0.2:50557
- Thu Jan 17 21:21:33 2019 authpriv.notice dropbear[4923]: Password auth succeeded for 'root' from 10.0.0.2:50557
- root@SandmanRouter:~#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement