Guest User

system log

a guest
Jul 25th, 2022
33
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 69.93 KB | None | 0 0
  1. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.000000] Linux version 5.4.188 (builder@buildhost) (gcc version 8.4.0 (OpenWrt GCC 8.4.0 r16554-1d4dea6d4f)) #0 Sat Apr 16 12:59:34 2022
  2. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] printk: bootconsole [early0] enabled
  3. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] CPU0 revision is: 00019750 (MIPS 74Kc)
  4. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] MIPS: machine is TP-Link Archer A7 v5
  5. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] SoC: Qualcomm Atheros QCA956X ver 1 rev 0
  6. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Initrd not found or empty - disabling initrd
  7. Mon Jul 25 11:39:53 2022 kern.warn kernel: [ 0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
  8. Mon Jul 25 11:39:53 2022 kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
  9. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Zone ranges:
  10. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Normal [mem 0x0000000000000000-0x0000000007ffffff]
  11. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Movable zone start for each node
  12. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Early memory node ranges
  13. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] node 0: [mem 0x0000000000000000-0x0000000007ffffff]
  14. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff]
  15. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768
  16. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 0.000000] Normal zone: 288 pages used for memmap
  17. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
  18. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7
  19. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
  20. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0
  21. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Built 1 zonelists, mobility grouping on. Total pages: 32480
  22. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.000000] Kernel command line: console=ttyS0,115200n8 rootfstype=squashfs,jffs2
  23. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes, linear)
  24. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes, linear)
  25. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Writing ErrCtl register=00000000
  26. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Readback ErrCtl register=00000000
  27. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
  28. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] Memory: 122180K/131072K available (5259K kernel code, 192K rwdata, 688K rodata, 1212K init, 205K bss, 8892K reserved, 0K cma-reserved)
  29. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
  30. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] NR_IRQS: 51
  31. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.000000] random: get_random_bytes called from 0x80661a28 with crng_init=0
  32. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] CPU clock: 775.000 MHz
  33. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 4932285024 ns
  34. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.000006] sched_clock: 32 bits at 387MHz, resolution 2ns, wraps every 5541893118ns
  35. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.008224] Calibrating delay loop... 385.02 BogoMIPS (lpj=770048)
  36. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.046713] pid_max: default: 32768 minimum: 301
  37. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.051716] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
  38. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.059431] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
  39. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.071725] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
  40. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.082016] futex hash table entries: 256 (order: -1, 3072 bytes, linear)
  41. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.089295] pinctrl core: initialized pinctrl subsystem
  42. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.097177] NET: Registered protocol family 16
  43. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.128348] clocksource: Switched to clocksource MIPS
  44. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.134614] thermal_sys: Registered thermal governor 'step_wise'
  45. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.134966] NET: Registered protocol family 2
  46. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.146075] IP idents hash table entries: 2048 (order: 2, 16384 bytes, linear)
  47. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.154422] tcp_listen_portaddr_hash hash table entries: 512 (order: 0, 4096 bytes, linear)
  48. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.163310] TCP established hash table entries: 1024 (order: 0, 4096 bytes, linear)
  49. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.171398] TCP bind hash table entries: 1024 (order: 0, 4096 bytes, linear)
  50. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.178842] TCP: Hash tables configured (established 1024 bind 1024)
  51. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.185668] UDP hash table entries: 256 (order: 0, 4096 bytes, linear)
  52. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.192608] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes, linear)
  53. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.200252] NET: Registered protocol family 1
  54. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.204906] PCI: CLS 0 bytes, default 32
  55. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.212661] workingset: timestamp_bits=14 max_order=15 bucket_order=1
  56. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.225765] squashfs: version 4.0 (2009/01/31) Phillip Lougher
  57. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.231959] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
  58. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.255237] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
  59. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.266519] pinctrl-single 1804002c.pinmux: 544 pins, size 68
  60. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.273112] gpio-export gpio-export: 1 gpio(s) exported
  61. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.279421] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
  62. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.288274] printk: console [ttyS0] disabled
  63. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.292864] 18020000.uart: ttyS0 at MMIO 0x18020000 (irq = 9, base_baud = 1562500) is a 16550A
  64. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.301972] printk: console [ttyS0] enabled
  65. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.311031] printk: bootconsole [early0] disabled
  66. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 0.340001] spi-nor spi0.0: w25q128 (16384 Kbytes)
  67. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.345025] 7 fixed-partitions partitions found on MTD device spi0.0
  68. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.351597] Creating 7 MTD partitions on "spi0.0":
  69. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.356574] 0x000000000000-0x000000020000 : "factory-uboot"
  70. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.363207] 0x000000020000-0x000000040000 : "u-boot"
  71. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.369206] 0x000000040000-0x000000f00000 : "firmware"
  72. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.377977] 2 uimage-fw partitions found on MTD device firmware
  73. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.384136] Creating 2 MTD partitions on "firmware":
  74. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.389285] 0x000000000000-0x0000001f47e8 : "kernel"
  75. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.395216] 0x0000001f47e8-0x000000ec0000 : "rootfs"
  76. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.401197] mtd: device 4 (rootfs) set to be root filesystem
  77. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.408856] 1 squashfs-split partitions found on MTD device rootfs
  78. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.415300] 0x0000005a0000-0x000000ec0000 : "rootfs_data"
  79. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.421727] 0x000000f40000-0x000000f60000 : "info"
  80. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.427554] 0x000000f60000-0x000000fb0000 : "config"
  81. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.433571] 0x000000fc0000-0x000000fd0000 : "partition-table"
  82. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 0.440485] 0x000000ff0000-0x000001000000 : "art"
  83. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.099786] switch0: Atheros AR8337 rev. 2 switch registered on mdio.0
  84. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 1.152341] random: fast init done
  85. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.687844] ag71xx 19000000.eth: connected to PHY at mdio.0:00 [uid=004dd036, driver=Atheros AR8216/AR8236/AR8316]
  86. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.699110] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode: sgmii
  87. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.705855] i2c /dev entries driver
  88. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.712451] NET: Registered protocol family 10
  89. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.723259] Segment Routing with IPv6
  90. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.727211] NET: Registered protocol family 17
  91. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.731886] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
  92. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.745278] 8021q: 802.1Q VLAN Support v1.8
  93. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.750423] PCI host bridge /ahb/pcie-controller@18250000 ranges:
  94. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.756792] MEM 0x0000000012000000..0x0000000013ffffff
  95. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.762204] IO 0x0000000000000000..0x0000000000000000
  96. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.767766] PCI host bridge to bus 0000:00
  97. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.772039] pci_bus 0000:00: root bus resource [mem 0x12000000-0x13ffffff]
  98. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.779145] pci_bus 0000:00: root bus resource [io 0x0000]
  99. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.784913] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
  100. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.791929] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
  101. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.800153] pci 0000:00:00.0: [168c:003c] type 00 class 0x028000
  102. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.806417] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
  103. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.813482] pci 0000:00:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
  104. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.820476] pci 0000:00:00.0: supports D1 D2
  105. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.825876] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
  106. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.832753] pci 0000:00:00.0: BAR 0: assigned [mem 0x12000000-0x121fffff 64bit]
  107. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.840328] pci 0000:00:00.0: BAR 6: assigned [mem 0x12200000-0x1220ffff pref]
  108. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.849268] hctosys: unable to open rtc device (rtc0)
  109. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.860719] VFS: Mounted root (squashfs filesystem) readonly on device 31:4.
  110. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.874680] Freeing unused kernel memory: 1212K
  111. Mon Jul 25 11:39:53 2022 kern.warn kernel: [ 1.879382] This architecture does not have kernel memory protection.
  112. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 1.886032] Run /sbin/init as init process
  113. Mon Jul 25 11:39:53 2022 user.info kernel: [ 2.449865] init: Console is alive
  114. Mon Jul 25 11:39:53 2022 user.info kernel: [ 2.453660] init: - watchdog -
  115. Mon Jul 25 11:39:53 2022 user.info kernel: [ 3.578092] kmodloader: loading kernel modules from /etc/modules-boot.d/*
  116. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.622599] usbcore: registered new interface driver usbfs
  117. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.628411] usbcore: registered new interface driver hub
  118. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.634000] usbcore: registered new device driver usb
  119. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.644958] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
  120. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.653232] ehci-fsl: Freescale EHCI Host controller driver
  121. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.660303] ehci-platform: EHCI generic platform driver
  122. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.665997] ehci-platform 1b000000.usb: EHCI Host Controller
  123. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.671907] ehci-platform 1b000000.usb: new USB bus registered, assigned bus number 1
  124. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.680117] ehci-platform 1b000000.usb: irq 13, io mem 0x1b000000
  125. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.700362] ehci-platform 1b000000.usb: USB 2.0 started, EHCI 1.00
  126. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.707544] hub 1-0:1.0: USB hub found
  127. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 3.711813] hub 1-0:1.0: 1 port detected
  128. Mon Jul 25 11:39:53 2022 user.info kernel: [ 3.718574] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
  129. Mon Jul 25 11:39:53 2022 user.info kernel: [ 3.727296] init: - preinit -
  130. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 5.071886] random: jshn: uninitialized urandom read (4 bytes read)
  131. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 5.356945] random: jshn: uninitialized urandom read (4 bytes read)
  132. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 5.586913] random: jshn: uninitialized urandom read (4 bytes read)
  133. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 6.879768] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 1 is up
  134. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 6.894572] eth0: link up (1000Mbps/Full duplex)
  135. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 6.907758] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  136. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 6.923767] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.1: link becomes ready
  137. Mon Jul 25 11:39:53 2022 kern.warn kernel: [ 6.948557] urandom_read: 4 callbacks suppressed
  138. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 6.948564] random: procd: uninitialized urandom read (4 bytes read)
  139. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 11.150590] jffs2: notice: (597) jffs2_build_xattr_subsystem: complete building xattr subsystem, 20 of xdatum (19 unchecked, 1 orphan) and 27 of xref (1 dead, 0 orphan) found.
  140. Mon Jul 25 11:39:53 2022 user.info kernel: [ 11.168633] mount_root: switching to jffs2 overlay
  141. Mon Jul 25 11:39:53 2022 kern.warn kernel: [ 11.179388] overlayfs: upper fs does not support tmpfile.
  142. Mon Jul 25 11:39:53 2022 user.warn kernel: [ 11.201480] urandom-seed: Seeding with /etc/urandom.seed
  143. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 11.283024] eth0: link down
  144. Mon Jul 25 11:39:53 2022 user.info kernel: [ 11.305786] procd: - early -
  145. Mon Jul 25 11:39:53 2022 user.info kernel: [ 11.308918] procd: - watchdog -
  146. Mon Jul 25 11:39:53 2022 user.info kernel: [ 11.896470] procd: - watchdog -
  147. Mon Jul 25 11:39:53 2022 user.info kernel: [ 11.901327] procd: - ubus -
  148. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 11.960896] random: ubusd: uninitialized urandom read (4 bytes read)
  149. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 11.969615] random: ubusd: uninitialized urandom read (4 bytes read)
  150. Mon Jul 25 11:39:53 2022 user.info kernel: [ 11.982332] procd: - init -
  151. Mon Jul 25 11:39:53 2022 user.info kernel: [ 12.788525] kmodloader: loading kernel modules from /etc/modules.d/*
  152. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 12.859090] Loading modules backported from Linux version v5.10.110-0-g3238bffaf992
  153. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 12.867062] Backport generated by backports.git v5.10.110-1-0-g1fbde860
  154. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 12.927423] xt_time: kernel timezone is -0000
  155. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 13.174745] PPP generic driver version 2.4.2
  156. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 13.189092] NET: Registered protocol family 24
  157. Mon Jul 25 11:39:53 2022 user.info kernel: [ 13.212248] urngd: v1.0.2 started.
  158. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 13.269254] ath10k_pci 0000:00:00.0: enabling device (0000 -> 0002)
  159. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 13.275942] ath10k_pci 0000:00:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
  160. Mon Jul 25 11:39:53 2022 kern.notice kernel: [ 13.421999] crng init done
  161. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 14.620144] ath10k_pci 0000:00:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
  162. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 14.629727] ath10k_pci 0000:00:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
  163. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 14.642758] ath10k_pci 0000:00:00.0: firmware ver 10.2.4-1.0-00047 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 35bd9258
  164. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 15.276582] ath10k_pci 0000:00:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
  165. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 16.470182] ath10k_pci 0000:00:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
  166. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.583882] ath: EEPROM regdomain: 0x0
  167. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.583888] ath: EEPROM indicates default country code should be used
  168. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.583891] ath: doing EEPROM country->regdmn map search
  169. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.583903] ath: country maps to regdmn code: 0x3a
  170. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.583908] ath: Country alpha2 being used: US
  171. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.583911] ath: Regpair used: 0x3a
  172. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.657530] ath: EEPROM regdomain: 0x0
  173. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.657537] ath: EEPROM indicates default country code should be used
  174. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.657540] ath: doing EEPROM country->regdmn map search
  175. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.657553] ath: country maps to regdmn code: 0x3a
  176. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.657557] ath: Country alpha2 being used: US
  177. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.657560] ath: Regpair used: 0x3a
  178. Mon Jul 25 11:39:53 2022 kern.debug kernel: [ 16.669158] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
  179. Mon Jul 25 11:39:53 2022 kern.info kernel: [ 16.671092] ieee80211 phy1: Atheros AR9561 Rev:0 mem=0xb8100000, irq=2
  180. Mon Jul 25 11:39:53 2022 user.info kernel: [ 16.712736] kmodloader: done loading kernel modules from /etc/modules.d/*
  181. Mon Jul 25 11:39:55 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  182. Mon Jul 25 11:39:55 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  183. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: Connected to system UBus
  184. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: started, version 2.85 cachesize 150
  185. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: DNS service limited to local subnets
  186. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
  187. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: UBus support enabled: connected to system bus
  188. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain test
  189. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain onion
  190. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain localhost
  191. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain local
  192. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain invalid
  193. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain bind
  194. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain lan
  195. Mon Jul 25 11:39:55 2022 daemon.warn dnsmasq[1276]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
  196. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: read /etc/hosts - 4 addresses
  197. Mon Jul 25 11:39:55 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
  198. Mon Jul 25 11:39:58 2022 daemon.notice wpa_supplicant[1430]: Successfully initialized wpa_supplicant
  199. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: bonding
  200. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: 8021ad
  201. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: 8021q
  202. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: macvlan
  203. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: veth
  204. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: bridge
  205. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: Network device
  206. Mon Jul 25 11:39:59 2022 user.notice : Added device handler type: tunnel
  207. Mon Jul 25 11:40:01 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
  208. Mon Jul 25 11:40:01 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
  209. Mon Jul 25 11:40:02 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
  210. Mon Jul 25 11:40:02 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
  211. Mon Jul 25 11:40:02 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
  212. Mon Jul 25 11:40:02 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
  213. Mon Jul 25 11:40:02 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
  214. Mon Jul 25 11:40:03 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
  215. Mon Jul 25 11:40:03 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
  216. Mon Jul 25 11:40:03 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
  217. Mon Jul 25 11:40:04 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN
  218. Mon Jul 25 11:40:04 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN1
  219. Mon Jul 25 11:40:04 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN2
  220. Mon Jul 25 11:40:04 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN3
  221. Mon Jul 25 11:40:04 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN4
  222. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.444637] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 2 is up
  223. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.464411] eth0: link up (1000Mbps/Full duplex)
  224. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.469698] br-lan: port 1(eth0.1) entered blocking state
  225. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.475341] br-lan: port 1(eth0.1) entered disabled state
  226. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.481204] device eth0.1 entered promiscuous mode
  227. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.486198] device eth0 entered promiscuous mode
  228. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.496416] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  229. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.531506] br-lan: port 1(eth0.1) entered blocking state
  230. Mon Jul 25 11:40:05 2022 kern.info kernel: [ 30.537132] br-lan: port 1(eth0.1) entered forwarding state
  231. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'lan' is enabled
  232. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'lan' is setting up now
  233. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'lan' is now up
  234. Mon Jul 25 11:40:05 2022 daemon.notice netifd: bridge 'br-lan' link is up
  235. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'lan' has link connectivity
  236. Mon Jul 25 11:40:05 2022 daemon.notice netifd: VLAN 'eth0.1' link is up
  237. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'loopback' is enabled
  238. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'loopback' is setting up now
  239. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'loopback' is now up
  240. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'wan' is enabled
  241. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Network device 'eth0' link is up
  242. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Network device 'lo' link is up
  243. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
  244. Mon Jul 25 11:40:05 2022 daemon.notice netifd: VLAN 'eth0.2' link is up
  245. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'wan' has link connectivity
  246. Mon Jul 25 11:40:05 2022 daemon.notice netifd: Interface 'wan' is setting up now
  247. Mon Jul 25 11:40:05 2022 daemon.err insmod: module is already loaded - slhc
  248. Mon Jul 25 11:40:05 2022 daemon.err insmod: module is already loaded - ppp_generic
  249. Mon Jul 25 11:40:06 2022 daemon.err insmod: module is already loaded - pppox
  250. Mon Jul 25 11:40:06 2022 daemon.err insmod: module is already loaded - pppoe
  251. Mon Jul 25 11:40:06 2022 kern.info kernel: [ 31.456465] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
  252. Mon Jul 25 11:40:06 2022 daemon.err odhcpd[1547]: Failed to send to ff02::1%lan@br-lan (Address not available)
  253. Mon Jul 25 11:40:06 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  254. Mon Jul 25 11:40:07 2022 daemon.info pppd[2096]: Plugin rp-pppoe.so loaded.
  255. Mon Jul 25 11:40:07 2022 daemon.info pppd[2096]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
  256. Mon Jul 25 11:40:07 2022 daemon.notice pppd[2096]: pppd 2.4.8 started by root, uid 0
  257. Mon Jul 25 11:40:07 2022 daemon.info pppd[2096]: PPP session is 21154
  258. Mon Jul 25 11:40:07 2022 daemon.warn pppd[2096]: Connected to b0:76:1b:09:db:a6 via interface eth0.2
  259. Mon Jul 25 11:40:07 2022 kern.info kernel: [ 32.795628] pppoe-wan: renamed from ppp0
  260. Mon Jul 25 11:40:07 2022 daemon.info pppd[2096]: Renamed interface ppp0 to pppoe-wan
  261. Mon Jul 25 11:40:07 2022 daemon.info pppd[2096]: Using interface pppoe-wan
  262. Mon Jul 25 11:40:07 2022 daemon.notice pppd[2096]: Connect: pppoe-wan <--> eth0.2
  263. Mon Jul 25 11:40:07 2022 daemon.info procd: - init complete -
  264. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983060] ath: EEPROM regdomain: 0x8114
  265. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983067] ath: EEPROM indicates we should expect a country code
  266. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983071] ath: doing EEPROM country->regdmn map search
  267. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983075] ath: country maps to regdmn code: 0x37
  268. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983080] ath: Country alpha2 being used: DE
  269. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983083] ath: Regpair used: 0x37
  270. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983089] ath: regdomain 0x8114 dynamically updated by user
  271. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983167] ath: EEPROM regdomain: 0x8114
  272. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983170] ath: EEPROM indicates we should expect a country code
  273. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983173] ath: doing EEPROM country->regdmn map search
  274. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983177] ath: country maps to regdmn code: 0x37
  275. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983180] ath: Country alpha2 being used: DE
  276. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983183] ath: Regpair used: 0x37
  277. Mon Jul 25 11:40:08 2022 kern.debug kernel: [ 33.983186] ath: regdomain 0x8114 dynamically updated by user
  278. Mon Jul 25 11:40:08 2022 authpriv.info dropbear[2362]: Not backgrounding
  279. Mon Jul 25 11:40:09 2022 daemon.info dnsmasq[1276]: read /etc/hosts - 4 addresses
  280. Mon Jul 25 11:40:09 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/odhcpd - 1 addresses
  281. Mon Jul 25 11:40:09 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
  282. Mon Jul 25 11:40:09 2022 daemon.info dnsmasq[1276]: read /etc/hosts - 4 addresses
  283. Mon Jul 25 11:40:09 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/odhcpd - 1 addresses
  284. Mon Jul 25 11:40:09 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
  285. Mon Jul 25 11:40:09 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0-1) --> new PHY
  286. Mon Jul 25 11:40:11 2022 kern.warn kernel: [ 36.496808] ath10k_pci 0000:00:00.0: pdev param 0 not supported by firmware
  287. Mon Jul 25 11:40:11 2022 kern.info kernel: [ 36.555244] br-lan: port 2(wlan0-1) entered blocking state
  288. Mon Jul 25 11:40:11 2022 kern.info kernel: [ 36.560965] br-lan: port 2(wlan0-1) entered disabled state
  289. Mon Jul 25 11:40:11 2022 kern.info kernel: [ 36.566929] device wlan0-1 entered promiscuous mode
  290. Mon Jul 25 11:40:11 2022 daemon.info pppd[2096]: Remote message: Authentication Success
  291. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: PAP authentication succeeded
  292. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: peer from calling number B0:76:1B:09:DB:A6 authorized
  293. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: local LL address fe80::ed1c:b8ee:df0c:55ae
  294. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: remote LL address fe80::b276:1bff:fe09:dba6
  295. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: local IP address 10.188.41.171
  296. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: remote IP address 10.188.0.1
  297. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: primary DNS address 202.83.30.162
  298. Mon Jul 25 11:40:11 2022 daemon.notice pppd[2096]: secondary DNS address 106.51.40.181
  299. Mon Jul 25 11:40:11 2022 kern.info kernel: [ 36.840623] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-1: link becomes ready
  300. Mon Jul 25 11:40:11 2022 kern.info kernel: [ 36.847603] br-lan: port 2(wlan0-1) entered blocking state
  301. Mon Jul 25 11:40:11 2022 kern.info kernel: [ 36.853314] br-lan: port 2(wlan0-1) entered forwarding state
  302. Mon Jul 25 11:40:11 2022 daemon.notice hostapd: wlan0-1: interface state UNINITIALIZED->ENABLED
  303. Mon Jul 25 11:40:11 2022 daemon.notice hostapd: wlan0-1: AP-ENABLED
  304. Mon Jul 25 11:40:11 2022 daemon.notice netifd: Network device 'pppoe-wan' link is up
  305. Mon Jul 25 11:40:11 2022 daemon.notice netifd: Interface 'wan' is now up
  306. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: reading /tmp/resolv.conf.d/resolv.conf.auto
  307. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain test
  308. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain onion
  309. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain localhost
  310. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain local
  311. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain invalid
  312. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain bind
  313. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain lan
  314. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using nameserver 202.83.30.162#53
  315. Mon Jul 25 11:40:11 2022 daemon.info dnsmasq[1276]: using nameserver 106.51.40.181#53
  316. Mon Jul 25 11:40:11 2022 daemon.notice netifd: Network alias 'pppoe-wan' link is up
  317. Mon Jul 25 11:40:11 2022 daemon.notice netifd: Interface 'wan_6' is enabled
  318. Mon Jul 25 11:40:11 2022 daemon.notice netifd: Interface 'wan_6' has link connectivity
  319. Mon Jul 25 11:40:11 2022 daemon.notice netifd: Interface 'wan_6' is setting up now
  320. Mon Jul 25 11:40:12 2022 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
  321. Mon Jul 25 11:40:12 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
  322. Mon Jul 25 11:40:12 2022 kern.info kernel: [ 37.782583] br-lan: port 3(wlan1) entered blocking state
  323. Mon Jul 25 11:40:12 2022 kern.info kernel: [ 37.788127] br-lan: port 3(wlan1) entered disabled state
  324. Mon Jul 25 11:40:12 2022 kern.info kernel: [ 37.793962] device wlan1 entered promiscuous mode
  325. Mon Jul 25 11:40:12 2022 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
  326. Mon Jul 25 11:40:12 2022 kern.info kernel: [ 38.083790] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
  327. Mon Jul 25 11:40:12 2022 kern.info kernel: [ 38.090606] br-lan: port 3(wlan1) entered blocking state
  328. Mon Jul 25 11:40:12 2022 kern.info kernel: [ 38.096140] br-lan: port 3(wlan1) entered forwarding state
  329. Mon Jul 25 11:40:12 2022 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
  330. Mon Jul 25 11:40:12 2022 daemon.notice hostapd: wlan1: AP-ENABLED
  331. Mon Jul 25 11:40:13 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (pppoe-wan)
  332. Mon Jul 25 11:40:13 2022 daemon.notice netifd: radio0 (2019): command failed: Link has been severed (-67)
  333. Mon Jul 25 11:40:13 2022 daemon.notice netifd: radio0 (2019): command failed: Link has been severed (-67)
  334. Mon Jul 25 11:40:13 2022 kern.info kernel: [ 38.720646] br-lan: port 2(wlan0-1) entered disabled state
  335. Mon Jul 25 11:40:13 2022 daemon.notice netifd: Wireless device 'radio0' is now up
  336. Mon Jul 25 11:40:13 2022 kern.info kernel: [ 38.801709] br-lan: port 4(wlan0) entered blocking state
  337. Mon Jul 25 11:40:13 2022 kern.info kernel: [ 38.807275] br-lan: port 4(wlan0) entered disabled state
  338. Mon Jul 25 11:40:13 2022 kern.info kernel: [ 38.813109] device wlan0 entered promiscuous mode
  339. Mon Jul 25 11:40:14 2022 daemon.notice netifd: Wireless device 'radio1' is now up
  340. Mon Jul 25 11:40:14 2022 daemon.notice netifd: Network device 'wlan1' link is up
  341. Mon Jul 25 11:40:14 2022 daemon.notice netifd: Interface 'wan_6' is now up
  342. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: reading /tmp/resolv.conf.d/resolv.conf.auto
  343. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain test
  344. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain onion
  345. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain localhost
  346. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain local
  347. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain invalid
  348. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain bind
  349. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using only locally-known addresses for domain lan
  350. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using nameserver 202.83.30.162#53
  351. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using nameserver 106.51.40.181#53
  352. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using nameserver 2406:7400:30::162#53
  353. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: using nameserver 2406:7400:40:1::5#53
  354. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: read /etc/hosts - 4 addresses
  355. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/dhcp.cfg01411c.2366 - 0 addresses
  356. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/odhcpd - 2 addresses
  357. Mon Jul 25 11:40:14 2022 daemon.info dnsmasq[1276]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
  358. Mon Jul 25 11:40:14 2022 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan)
  359. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[1276]: exiting on receipt of SIGTERM
  360. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: Connected to system UBus
  361. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: started, version 2.85 cachesize 150
  362. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: DNS service limited to local subnets
  363. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
  364. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: UBus support enabled: connected to system bus
  365. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq-dhcp[2859]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
  366. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain test
  367. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain onion
  368. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain localhost
  369. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain local
  370. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain invalid
  371. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain bind
  372. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain lan
  373. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: reading /tmp/resolv.conf.d/resolv.conf.auto
  374. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain test
  375. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain onion
  376. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain localhost
  377. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain local
  378. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain invalid
  379. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain bind
  380. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using only locally-known addresses for domain lan
  381. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using nameserver 202.83.30.162#53
  382. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using nameserver 106.51.40.181#53
  383. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using nameserver 2406:7400:30::162#53
  384. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: using nameserver 2406:7400:40:1::5#53
  385. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: read /etc/hosts - 4 addresses
  386. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: read /tmp/hosts/odhcpd - 2 addresses
  387. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
  388. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq-dhcp[2859]: read /etc/ethers - 0 addresses
  389. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: read /etc/hosts - 4 addresses
  390. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: read /tmp/hosts/odhcpd - 2 addresses
  391. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq[2859]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
  392. Mon Jul 25 11:40:15 2022 daemon.info dnsmasq-dhcp[2859]: read /etc/ethers - 0 addresses
  393. Mon Jul 25 11:40:52 2022 daemon.notice wpa_supplicant[1430]: wlan0: leaving mesh
  394. Mon Jul 25 11:40:52 2022 kern.info kernel: [ 41.677054] br-lan: port 4(wlan0) entered disabled state
  395. Mon Jul 25 11:40:53 2022 daemon.notice wpa_supplicant[1430]: nl80211: Failed to set interface into station mode
  396. Mon Jul 25 11:40:53 2022 daemon.err wpa_supplicant[1430]: wlan0: mesh leave error=-134
  397. Mon Jul 25 11:40:53 2022 daemon.notice wpa_supplicant[1430]: wlan0: interface state UNINITIALIZED->ENABLED
  398. Mon Jul 25 11:40:53 2022 daemon.notice wpa_supplicant[1430]: wlan0: AP-ENABLED
  399. Mon Jul 25 11:40:53 2022 daemon.notice wpa_supplicant[1430]: wlan0: joining mesh LINK
  400. Mon Jul 25 11:40:53 2022 daemon.notice netifd: Network device 'wlan0' link is up
  401. Mon Jul 25 11:40:53 2022 kern.info kernel: [ 42.711587] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  402. Mon Jul 25 11:40:53 2022 kern.info kernel: [ 42.718529] br-lan: port 4(wlan0) entered blocking state
  403. Mon Jul 25 11:40:53 2022 kern.info kernel: [ 42.724081] br-lan: port 4(wlan0) entered forwarding state
  404. Mon Jul 25 11:40:53 2022 daemon.notice wpa_supplicant[1430]: wlan0: CTRL-EVENT-CONNECTED - Connection to 00:00:00:00:00:00 completed [id=0 id_str=]
  405. Mon Jul 25 11:40:53 2022 daemon.notice wpa_supplicant[1430]: wlan0: MESH-GROUP-STARTED ssid="LINK" id=0
  406. Mon Jul 25 11:40:53 2022 kern.info kernel: [ 42.814394] br-lan: port 2(wlan0-1) entered blocking state
  407. Mon Jul 25 11:40:53 2022 kern.info kernel: [ 42.820132] br-lan: port 2(wlan0-1) entered forwarding state
  408. Mon Jul 25 11:40:53 2022 daemon.notice netifd: Network device 'wlan0-1' link is up
  409. Mon Jul 25 11:40:53 2022 daemon.notice wpa_supplicant[1430]: wlan0: new peer notification for 3c:84:6a:c9:1e:eb
  410. Mon Jul 25 11:40:54 2022 daemon.err wpa_supplicant[1430]: Mesh RSN: frame verification failed!
  411. Mon Jul 25 11:40:54 2022 daemon.notice wpa_supplicant[1430]: wlan0: new peer notification for 3c:84:6a:c9:1e:eb
  412. Mon Jul 25 11:40:54 2022 daemon.notice wpa_supplicant[1430]: wlan0: mesh plink with 3c:84:6a:c9:1e:eb established
  413. Mon Jul 25 11:40:54 2022 daemon.notice wpa_supplicant[1430]: wlan0: MESH-PEER-CONNECTED 3c:84:6a:c9:1e:eb
  414. Mon Jul 25 11:41:26 2022 user.info : luci: accepted login on /admin/system/leds for root from 192.168.0.183
  415. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[2859]: exiting on receipt of SIGTERM
  416. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: Connected to system UBus
  417. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: started, version 2.85 cachesize 150
  418. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: DNS service limited to local subnets
  419. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
  420. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: UBus support enabled: connected to system bus
  421. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq-dhcp[3289]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
  422. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain test
  423. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain onion
  424. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain localhost
  425. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain local
  426. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain invalid
  427. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain bind
  428. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain lan
  429. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: reading /tmp/resolv.conf.d/resolv.conf.auto
  430. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain test
  431. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain onion
  432. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain localhost
  433. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain local
  434. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain invalid
  435. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain bind
  436. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using only locally-known addresses for domain lan
  437. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using nameserver 202.83.30.162#53
  438. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using nameserver 106.51.40.181#53
  439. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using nameserver 2406:7400:30::162#53
  440. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: using nameserver 2406:7400:40:1::5#53
  441. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: read /etc/hosts - 4 addresses
  442. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: read /tmp/hosts/odhcpd - 2 addresses
  443. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
  444. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq-dhcp[3289]: read /etc/ethers - 0 addresses
  445. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: read /etc/hosts - 4 addresses
  446. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: read /tmp/hosts/odhcpd - 2 addresses
  447. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq[3289]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
  448. Mon Jul 25 11:42:07 2022 daemon.info dnsmasq-dhcp[3289]: read /etc/ethers - 0 addresses
  449. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPDISCOVER(br-lan) 1c:d1:07:ad:e3:65
  450. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPOFFER(br-lan) 192.168.0.187 1c:d1:07:ad:e3:65
  451. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPDISCOVER(br-lan) 1c:d1:07:ad:e3:65
  452. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPOFFER(br-lan) 192.168.0.187 1c:d1:07:ad:e3:65
  453. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPDISCOVER(br-lan) 1c:d1:07:ad:e3:65
  454. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPOFFER(br-lan) 192.168.0.187 1c:d1:07:ad:e3:65
  455. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPREQUEST(br-lan) 192.168.0.187 1c:d1:07:ad:e3:65
  456. Mon Jul 25 11:44:08 2022 daemon.info dnsmasq-dhcp[3289]: DHCPACK(br-lan) 192.168.0.187 1c:d1:07:ad:e3:65 realme-C11-2021
  457. Mon Jul 25 11:44:31 2022 daemon.info hostapd: wlan1: STA 1c:d1:07:ad:e3:65 IEEE 802.11: associated (aid 1)
  458. Mon Jul 25 11:44:40 2022 daemon.info hostapd: wlan1: STA 1c:d1:07:ad:e3:65 IEEE 802.11: deauthenticated due to local deauth request
  459. Mon Jul 25 11:45:04 2022 daemon.notice wpa_supplicant[1430]: wlan0: mesh plink with 3c:84:6a:c9:1e:eb closed with reason 55
  460. Mon Jul 25 11:45:04 2022 daemon.notice wpa_supplicant[1430]: wlan0: MESH-PEER-DISCONNECTED 3c:84:6a:c9:1e:eb
  461. Mon Jul 25 11:45:18 2022 daemon.notice wpa_supplicant[1430]: wlan0: new peer notification for 3c:84:6a:c9:1e:eb
  462. Mon Jul 25 11:45:18 2022 daemon.notice wpa_supplicant[1430]: wlan0: new peer notification for 3c:84:6a:c9:1e:eb
  463. Mon Jul 25 11:45:35 2022 daemon.notice wpa_supplicant[1430]: wlan0: MESH-SAE-AUTH-FAILURE addr=3c:84:6a:c9:1e:eb
  464. Mon Jul 25 11:45:50 2022 daemon.notice wpa_supplicant[1430]: wlan0: MESH-SAE-AUTH-FAILURE addr=3c:84:6a:c9:1e:eb
  465. Mon Jul 25 11:45:59 2022 kern.info kernel: [ 348.928113] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 3 is up
  466. Mon Jul 25 11:46:00 2022 kern.info kernel: [ 349.952390] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 3 is down
  467. Mon Jul 25 11:46:02 2022 kern.info kernel: [ 352.000077] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 3 is up
  468. Mon Jul 25 11:46:05 2022 daemon.notice wpa_supplicant[1430]: wlan0: MESH-SAE-AUTH-FAILURE addr=3c:84:6a:c9:1e:eb
  469. Mon Jul 25 11:46:06 2022 daemon.notice wpa_supplicant[1430]: wlan0: new peer notification for 3c:84:6a:c9:1e:eb
  470. Mon Jul 25 11:46:06 2022 daemon.notice wpa_supplicant[1430]: wlan0: new peer notification for 3c:84:6a:c9:1e:eb
  471. Mon Jul 25 11:46:10 2022 daemon.notice wpa_supplicant[1430]: wlan0: mesh plink with 3c:84:6a:c9:1e:eb established
  472. Mon Jul 25 11:46:10 2022 daemon.notice wpa_supplicant[1430]: wlan0: MESH-PEER-CONNECTED 3c:84:6a:c9:1e:eb
  473. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 361.987202] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  474. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 361.998271] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  475. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.009040] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  476. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.020477] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  477. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.031250] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  478. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.041952] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  479. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.053841] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  480. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.064613] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  481. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.075328] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  482. Mon Jul 25 11:46:12 2022 kern.warn kernel: [ 362.086564] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  483. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.071781] net_ratelimit: 3740 callbacks suppressed
  484. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.071793] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  485. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.088113] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  486. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.099529] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  487. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.111705] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  488. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.123063] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  489. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.135013] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  490. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.146232] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  491. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.157295] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  492. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.168993] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  493. Mon Jul 25 11:46:17 2022 kern.warn kernel: [ 367.180018] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  494. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.156377] net_ratelimit: 2005 callbacks suppressed
  495. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.156388] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  496. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.172480] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  497. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.184200] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  498. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.195014] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  499. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.206604] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  500. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.217554] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  501. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.228680] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  502. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.239542] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  503. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.250540] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  504. Mon Jul 25 11:46:22 2022 kern.warn kernel: [ 372.261338] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  505. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.771222] net_ratelimit: 2497 callbacks suppressed
  506. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.771233] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  507. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.786947] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  508. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.797477] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  509. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.807999] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  510. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.818526] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  511. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.829044] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  512. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.841347] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  513. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.851927] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  514. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.862452] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  515. Mon Jul 25 11:46:28 2022 kern.warn kernel: [ 377.873113] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  516. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.890416] net_ratelimit: 3799 callbacks suppressed
  517. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.890428] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  518. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.907290] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  519. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.918718] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  520. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.929470] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  521. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.940955] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  522. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.951788] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  523. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.962518] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  524. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.974159] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  525. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.984938] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  526. Mon Jul 25 11:46:33 2022 kern.warn kernel: [ 382.995680] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  527. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.218527] net_ratelimit: 2966 callbacks suppressed
  528. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.218538] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  529. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.234713] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  530. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.245783] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  531. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.256716] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  532. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.267746] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  533. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.278657] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  534. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.290283] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  535. Mon Jul 25 11:46:39 2022 kern.warn kernel: [ 389.301057] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  536. Mon Jul 25 11:46:40 2022 kern.warn kernel: [ 389.312267] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  537. Mon Jul 25 11:46:40 2022 kern.warn kernel: [ 389.323507] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  538. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.660963] net_ratelimit: 1860 callbacks suppressed
  539. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.660974] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  540. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.677419] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  541. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.688190] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  542. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.698901] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  543. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.711006] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  544. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.927044] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  545. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.938140] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  546. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.948895] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  547. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.960696] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  548. Mon Jul 25 11:46:45 2022 kern.warn kernel: [ 394.971458] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  549. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.679690] net_ratelimit: 707 callbacks suppressed
  550. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.679700] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  551. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.696111] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  552. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.707622] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  553. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.785357] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  554. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.798082] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  555. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.816273] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  556. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.830799] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  557. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.843401] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  558. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.937243] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  559. Mon Jul 25 11:46:50 2022 kern.warn kernel: [ 399.948243] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  560. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.741642] net_ratelimit: 9203 callbacks suppressed
  561. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.741654] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  562. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.758580] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  563. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.770105] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  564. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.785293] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  565. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.795934] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  566. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.807571] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  567. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.822362] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  568. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.833626] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  569. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.845092] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  570. Mon Jul 25 11:46:55 2022 kern.warn kernel: [ 404.857471] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  571. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.856613] net_ratelimit: 4157 callbacks suppressed
  572. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.856623] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  573. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.873727] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  574. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.885157] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  575. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.898013] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  576. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.909741] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  577. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.923453] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  578. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.935093] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  579. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.947105] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  580. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.958540] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  581. Mon Jul 25 11:47:00 2022 kern.warn kernel: [ 409.970770] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  582. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.651818] net_ratelimit: 2861 callbacks suppressed
  583. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.651830] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  584. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.672518] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  585. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.683122] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  586. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.693662] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  587. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.704189] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  588. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.714716] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  589. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.725244] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  590. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.735772] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  591. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.746300] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  592. Mon Jul 25 11:47:06 2022 kern.warn kernel: [ 415.757046] br-lan: received packet on wlan0 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  593. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.788884] net_ratelimit: 2618 callbacks suppressed
  594. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.788895] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  595. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.805327] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  596. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.816672] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  597. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.827990] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  598. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.839183] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  599. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.850691] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  600. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.863277] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  601. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.874700] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  602. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.886230] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  603. Mon Jul 25 11:47:13 2022 kern.warn kernel: [ 422.897521] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  604. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.858329] net_ratelimit: 3339 callbacks suppressed
  605. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.858341] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  606. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.875364] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  607. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.886756] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  608. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.898104] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  609. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.909182] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  610. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.920421] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  611. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.931535] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  612. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.943369] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  613. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.954112] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  614. Mon Jul 25 11:47:19 2022 kern.warn kernel: [ 428.964816] br-lan: received packet on eth0.1 with own address as source address (addr:00:5f:67:80:50:28, vlan:0)
  615. Mon Jul 25 11:47:22 2022 kern.info kernel: [ 431.872239] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 3 is down
  616. Mon Jul 25 11:47:37 2022 daemon.info dnsmasq-dhcp[3289]: DHCPREQUEST(br-lan) 192.168.0.187 1c:d1:07:ad:e3:65
  617. Mon Jul 25 11:47:37 2022 daemon.info dnsmasq-dhcp[3289]: DHCPACK(br-lan) 192.168.0.187 1c:d1:07:ad:e3:65 realme-C11-2021
  618. Mon Jul 25 11:49:39 2022 authpriv.info dropbear[3532]: Child connection from 192.168.0.183:37922
  619. Mon Jul 25 11:49:48 2022 authpriv.notice dropbear[3532]: Password auth succeeded for 'root' from 192.168.0.183:37922
  620. Mon Jul 25 11:49:48 2022 authpriv.info dropbear[3533]: Child connection from 192.168.0.183:37930
  621. Mon Jul 25 11:49:50 2022 authpriv.notice dropbear[3533]: Password auth succeeded for 'root' from 192.168.0.183:37930
Add Comment
Please, Sign In to add comment