Trillien

GL-AR300M NAND System log (without issue)

Feb 1st, 2022 (edited)
67
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 46.58 KB | None | 0 0
  1. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.000000] Linux version 4.14.241 (glinet@ubuntu) (gcc version 7.5.0 (OpenWrt GCC 7.5.0 r11257-5090152ae3)) #0 Thu Jul 29 19:50:28 2021
  2. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] bootconsole [early0] enabled
  3. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] CPU0 revision is: 00019374 (MIPS 24Kc)
  4. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] MIPS: machine is GL.iNet GL-AR300M (NAND)
  5. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] SoC: Qualcomm Atheros QCA9533 ver 2 rev 0
  6. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Determined physical RAM map:
  7. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] memory: 08000000 @ 00000000 (usable)
  8. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Initrd not found or empty - disabling initrd
  9. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
  10. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
  11. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Zone ranges:
  12. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Normal [mem 0x0000000000000000-0x0000000007ffffff]
  13. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Movable zone start for each node
  14. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Early memory node ranges
  15. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] node 0: [mem 0x0000000000000000-0x0000000007ffffff]
  16. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffffff]
  17. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768
  18. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.000000] free_area_init_node: node 0, pgdat 805e7ca0, node_mem_map 81007b80
  19. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.000000] Normal zone: 256 pages used for memmap
  20. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
  21. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7
  22. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.000000] random: get_random_bytes called from start_kernel+0x98/0x494 with crng_init=0
  23. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
  24. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0
  25. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Built 1 zonelists, mobility grouping on. Total pages: 32512
  26. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.000000] Kernel command line: console=ttyS0,115200n8 rootfstype=squashfs,jffs2
  27. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
  28. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
  29. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
  30. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Writing ErrCtl register=00000000
  31. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Readback ErrCtl register=00000000
  32. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] Memory: 122340K/131072K available (4485K kernel code, 155K rwdata, 1016K rodata, 1244K init, 218K bss, 8732K reserved, 0K cma-reserved)
  33. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
  34. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] NR_IRQS: 51
  35. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] CPU clock: 650.000 MHz
  36. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 5880801374 ns
  37. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.000009] sched_clock: 32 bits at 325MHz, resolution 3ns, wraps every 6607641598ns
  38. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.008256] Calibrating delay loop... 432.53 BogoMIPS (lpj=2162688)
  39. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.074862] pid_max: default: 32768 minimum: 301
  40. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.079938] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
  41. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.086910] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
  42. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.098708] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
  43. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.109127] futex hash table entries: 256 (order: -1, 3072 bytes)
  44. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.115657] pinctrl core: initialized pinctrl subsystem
  45. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.122410] NET: Registered protocol family 16
  46. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.134882] PCI host bridge /ahb/pcie-controller@180c0000 ranges:
  47. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.141375] MEM 0x0000000010000000..0x0000000013ffffff
  48. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.146874] IO 0x0000000000000000..0x0000000000000000
  49. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 0.152389] ar724x-pci 180c0000.pcie-controller: PCIe link is down
  50. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.176129] PCI host bridge to bus 0000:00
  51. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.180466] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff]
  52. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.187768] pci_bus 0000:00: root bus resource [io 0x0000]
  53. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.193635] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
  54. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.200794] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
  55. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.209158] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
  56. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.211855] clocksource: Switched to clocksource MIPS
  57. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.218244] NET: Registered protocol family 2
  58. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.223110] IP idents hash table entries: 2048 (order: 2, 16384 bytes)
  59. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.230682] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
  60. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.238101] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
  61. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.244824] TCP: Hash tables configured (established 1024 bind 1024)
  62. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.251680] UDP hash table entries: 256 (order: 0, 4096 bytes)
  63. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.257897] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
  64. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.264809] NET: Registered protocol family 1
  65. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 0.269429] PCI: CLS 0 bytes, default 32
  66. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 0.272500] Crashlog allocated RAM at address 0x3f00000
  67. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.279353] workingset: timestamp_bits=30 max_order=15 bucket_order=0
  68. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.291326] squashfs: version 4.0 (2009/01/31) Phillip Lougher
  69. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.297525] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
  70. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.318787] io scheduler noop registered
  71. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.322979] io scheduler deadline registered (default)
  72. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.330550] pinctrl-single 1804002c.pinmux: 576 pins at pa b804002c size 72
  73. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.338470] gpio-export gpio-export: 1 gpio(s) exported
  74. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.344744] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
  75. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.353870] console [ttyS0] disabled
  76. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.357676] 18020000.uart: ttyS0 at MMIO 0x18020000 (irq = 9, base_baud = 1562500) is a 16550A
  77. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.366824] console [ttyS0] enabled
  78. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.374377] bootconsole [early0] disabled
  79. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.401452] m25p80 spi0.0: w25q128 (16384 Kbytes)
  80. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.406412] 4 fixed-partitions partitions found on MTD device spi0.0
  81. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.412992] Creating 4 MTD partitions on "spi0.0":
  82. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.417951] 0x000000000000-0x000000040000 : "u-boot"
  83. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.423914] 0x000000040000-0x000000050000 : "u-boot-env"
  84. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.430169] 0x000000050000-0x000000ff0000 : "reserved"
  85. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.436336] 0x000000ff0000-0x000001000000 : "art"
  86. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.445057] spi-nand: Giga SPI NAND was found.
  87. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.449660] spi-nand: 128 MiB, block size: 128 KiB, page size: 2048, OOB size: 128
  88. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.457648] 2 fixed-partitions partitions found on MTD device spi0.1
  89. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.464235] Creating 2 MTD partitions on "spi0.1":
  90. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.469192] 0x000000000000-0x000000400000 : "kernel"
  91. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 0.482300] 0x000000400000-0x000008000000 : "ubi"
  92. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 0.933084] found bad block 7fe0000
  93. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 0.937425] libphy: Fixed MDIO Bus: probed
  94. Mon Jan 31 11:23:07 2022 kern.err kernel: [ 1.282963] ag71xx 19000000.eth: Could not connect to PHY device. Deferring probe.
  95. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 1.962249] libphy: ag71xx_mdio: probed
  96. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.252323] mdio-bus.0:1f: Found an AR934X built-in switch
  97. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.258170] libphy: ar7240sw_mdio: probed
  98. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.319504] ag71xx 1a000000.eth: connected to PHY at fixed-0:00 [uid=00000000, driver=Generic PHY]
  99. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.329428] eth1: Atheros AG71xx at 0xba000000, irq 5, mode: gmii
  100. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.337797] NET: Registered protocol family 10
  101. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.347157] Segment Routing with IPv6
  102. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.351042] NET: Registered protocol family 17
  103. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.355745] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
  104. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.369149] 8021q: 802.1Q VLAN Support v1.8
  105. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 2.561854] random: fast init done
  106. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.714045] ag71xx 19000000.eth: connected to PHY at mdio-bus.0:1f:04 [uid=004dd042, driver=Generic PHY]
  107. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 2.724748] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode: mii
  108. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 2.734479] UBI: auto-attach mtd5
  109. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 2.737939] ubi0: attaching mtd5
  110. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 6.922610] ubi0: scanning is finished
  111. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 6.973708] ubi0 warning: ubi_eba_init: cannot reserve enough PEBs for bad PEB handling, reserved 3, need 19
  112. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 6.985169] ubi0: attached mtd5 (name "ubi", size 124 MiB)
  113. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 6.990845] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
  114. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 6.997994] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
  115. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 7.005011] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
  116. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 7.012204] ubi0: good PEBs: 991, bad PEBs: 1, corrupted PEBs: 0
  117. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 7.018403] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128
  118. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 7.025874] ubi0: max/mean erase counter: 3/1, WL threshold: 4096, image sequence number: 556058055
  119. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 7.035229] ubi0: available PEBs: 0, total reserved PEBs: 991, PEBs reserved for bad PEB handling: 3
  120. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 7.044754] ubi0: background thread "ubi_bgt0d" started, PID 327
  121. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 7.054288] block ubiblock0_0: created from ubi0:0(rootfs)
  122. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 7.059963] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
  123. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 7.085819] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
  124. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 7.100825] Freeing unused kernel memory: 1244K
  125. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 7.105548] This architecture does not have kernel memory protection.
  126. Mon Jan 31 11:23:07 2022 user.info kernel: [ 8.047860] init: Console is alive
  127. Mon Jan 31 11:23:07 2022 user.info kernel: [ 8.051621] init: - watchdog -
  128. Mon Jan 31 11:23:07 2022 user.info kernel: [ 11.442765] kmodloader: loading kernel modules from /etc/modules-boot.d/*
  129. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.672987] usbcore: registered new interface driver usbfs
  130. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.678719] usbcore: registered new interface driver hub
  131. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.684357] usbcore: registered new device driver usb
  132. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.699884] exFAT: Version 1.2.9
  133. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.739764] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
  134. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 11.756805] SCSI subsystem initialized
  135. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.766545] ehci-platform: EHCI generic platform driver
  136. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.772276] ehci-platform 1b000000.usb: EHCI Host Controller
  137. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.778150] ehci-platform 1b000000.usb: new USB bus registered, assigned bus number 1
  138. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.786382] ehci-platform 1b000000.usb: irq 3, io mem 0x1b000000
  139. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.821906] ehci-platform 1b000000.usb: USB 2.0 started, EHCI 1.00
  140. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.829180] hub 1-0:1.0: USB hub found
  141. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.833492] hub 1-0:1.0: 1 port detected
  142. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.841293] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
  143. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.849872] ohci-platform: OHCI generic platform driver
  144. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 11.858040] uhci_hcd: USB Universal Host Controller Interface driver
  145. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 12.158055] usbcore: registered new interface driver usb-storage
  146. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 12.166840] usbcore: registered new interface driver uas
  147. Mon Jan 31 11:23:07 2022 user.info kernel: [ 12.173223] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
  148. Mon Jan 31 11:23:07 2022 user.info kernel: [ 12.191185] init: - preinit -
  149. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 13.603130] random: jshn: uninitialized urandom read (4 bytes read)
  150. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 13.837099] random: jshn: uninitialized urandom read (4 bytes read)
  151. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 13.896381] random: jshn: uninitialized urandom read (4 bytes read)
  152. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 14.720532] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
  153. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 15.783053] eth1: link up (1000Mbps/Full duplex)
  154. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 15.787863] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  155. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 18.082268] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 471
  156. Mon Jan 31 11:23:07 2022 kern.warn kernel: [ 18.144293] urandom_read: 4 callbacks suppressed
  157. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 18.144301] random: procd: uninitialized urandom read (4 bytes read)
  158. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 18.352933] UBIFS (ubi0:1): recovery needed
  159. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 19.028551] UBIFS (ubi0:1): recovery completed
  160. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 19.033289] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
  161. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 19.041372] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
  162. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 19.051637] UBIFS (ubi0:1): FS size: 110596096 bytes (105 MiB, 871 LEBs), journal size 5586944 bytes (5 MiB, 44 LEBs)
  163. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 19.062600] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
  164. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 19.069430] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID CCE6ADF5-2782-482E-B4A7-61F995A33AA9, small LPT model
  165. Mon Jan 31 11:23:07 2022 user.info kernel: [ 19.143844] mount_root: switching to ubifs overlay
  166. Mon Jan 31 11:23:07 2022 user.warn kernel: [ 19.283635] urandom-seed: Seeding with /etc/urandom.seed
  167. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 19.562997] eth1: link down
  168. Mon Jan 31 11:23:07 2022 user.info kernel: [ 19.578647] procd: - early -
  169. Mon Jan 31 11:23:07 2022 user.info kernel: [ 19.581739] procd: - watchdog -
  170. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 20.258408] random: jshn: uninitialized urandom read (4 bytes read)
  171. Mon Jan 31 11:23:07 2022 user.info kernel: [ 20.336377] procd: - watchdog -
  172. Mon Jan 31 11:23:07 2022 user.info kernel: [ 20.339956] procd: - ubus -
  173. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 20.602073] random: ubusd: uninitialized urandom read (4 bytes read)
  174. Mon Jan 31 11:23:07 2022 user.info kernel: [ 20.753393] procd: - init -
  175. Mon Jan 31 11:23:07 2022 user.info kernel: [ 23.822921] kmodloader: loading kernel modules from /etc/modules.d/*
  176. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 23.874969] ntfs: driver 2.1.32 [Flags: R/O MODULE].
  177. Mon Jan 31 11:23:07 2022 user.info kernel: [ 23.915063] urngd: v1.0.2 started.
  178. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 23.936115] tun: Universal TUN/TAP device driver, 1.6
  179. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 23.994975] ip6_tables: (C) 2000-2006 Netfilter Core Team
  180. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.035546] nf_conntrack version 0.5.0 (2048 buckets, 8192 max)
  181. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.336065] Netfilter messages via NETLINK v0.30.
  182. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.363961] ip_set: protocol 6
  183. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.477634] Mirror/redirect action on
  184. Mon Jan 31 11:23:07 2022 kern.notice kernel: [ 24.489291] random: crng init done
  185. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.524988] u32 classifier
  186. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.527800] input device check on
  187. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.531578] Actions configured
  188. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.602493] GACT probability on
  189. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.634886] Simple TC action Loaded
  190. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 24.722303] fuse init (API version 7.26)
  191. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.146432] usbcore: registered new interface driver cdc_acm
  192. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.152354] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
  193. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.197901] usbcore: registered new interface driver cdc_wdm
  194. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.234034] Loading modules backported from Linux version v4.19.193-0-g1722257b8ece
  195. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.242031] Backport generated by backports.git v4.19.193-1-0-gaa2cc8ea
  196. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.303921] Ebtables v2.0 registered
  197. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.319198] ip_tables: (C) 2000-2006 Netfilter Core Team
  198. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.344061] usbcore: registered new interface driver ipheth
  199. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 25.635290] ctnetlink v0.93: registering with nfnetlink.
  200. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.089378] usbcore: registered new interface driver usbserial
  201. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.095565] usbcore: registered new interface driver usbserial_generic
  202. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.102453] usbserial: USB Serial support registered for generic
  203. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.158551] wireguard: WireGuard 1.0.20200611 loaded. See www.wireguard.com for information.
  204. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.167337] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
  205. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.364825] xt_time: kernel timezone is -0000
  206. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.390023] usbcore: registered new interface driver cdc_ether
  207. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.426826] usbcore: registered new interface driver cdc_ncm
  208. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.603816] usbcore: registered new interface driver cp210x
  209. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.609640] usbserial: USB Serial support registered for cp210x
  210. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.712295] usbcore: registered new interface driver huawei_cdc_ncm
  211. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.972774] PPP generic driver version 2.4.2
  212. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 26.997597] PPP MPPE Compression module registered
  213. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.036626] NET: Registered protocol family 24
  214. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.073895] usbcore: registered new interface driver qmi_wwan
  215. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.103658] usbcore: registered new interface driver rndis_host
  216. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.187259] usbcore: registered new interface driver sierra
  217. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.193165] usbserial: USB Serial support registered for Sierra USB modem
  218. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.238636] usbcore: registered new interface driver sierra_net
  219. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.663547] usbcore: registered new interface driver option
  220. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.669387] usbserial: USB Serial support registered for GSM modem (1-port)
  221. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.788032] usbcore: registered new interface driver rt2800usb
  222. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 27.849735] ath: EEPROM regdomain: 0x0
  223. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 27.849745] ath: EEPROM indicates default country code should be used
  224. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 27.849749] ath: doing EEPROM country->regdmn map search
  225. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 27.849765] ath: country maps to regdmn code: 0x3a
  226. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 27.849770] ath: Country alpha2 being used: US
  227. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 27.849773] ath: Regpair used: 0x3a
  228. Mon Jan 31 11:23:07 2022 kern.debug kernel: [ 27.863230] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
  229. Mon Jan 31 11:23:07 2022 kern.info kernel: [ 27.865059] ieee80211 phy0: Atheros AR9531 Rev:2 mem=0xb8100000, irq=13
  230. Mon Jan 31 11:23:07 2022 user.info kernel: [ 27.962450] kmodloader: done loading kernel modules from /etc/modules.d/*
  231. Mon Jan 31 11:23:10 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  232. Mon Jan 31 11:23:10 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  233. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: started, version 2.80 cachesize 150
  234. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: DNS service limited to local subnets
  235. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth nettlehash DNSSEC no-ID loop-detect inotify dumpfile
  236. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: using local addresses only for domain test
  237. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: using local addresses only for domain onion
  238. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: using local addresses only for domain localhost
  239. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: using local addresses only for domain local
  240. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: using local addresses only for domain invalid
  241. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: using local addresses only for domain bind
  242. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: using local addresses only for domain lan
  243. Mon Jan 31 11:23:10 2022 daemon.warn dnsmasq[1335]: no servers found in /tmp/resolv.conf.auto, will retry
  244. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: read /etc/hosts - 4 addresses
  245. Mon Jan 31 11:23:10 2022 daemon.info dnsmasq[1335]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
  246. Mon Jan 31 11:23:14 2022 user.notice : Added device handler type: 8021ad
  247. Mon Jan 31 11:23:14 2022 user.notice : Added device handler type: 8021q
  248. Mon Jan 31 11:23:14 2022 user.notice : Added device handler type: macvlan
  249. Mon Jan 31 11:23:14 2022 user.notice : Added device handler type: veth
  250. Mon Jan 31 11:23:14 2022 user.notice : Added device handler type: bridge
  251. Mon Jan 31 11:23:14 2022 user.notice : Added device handler type: Network device
  252. Mon Jan 31 11:23:14 2022 user.notice : Added device handler type: tunnel
  253. Mon Jan 31 11:23:15 2022 daemon.notice procd: /etc/rc.d/S30gl_ssids: uci: Entry not found
  254. Mon Jan 31 11:23:15 2022 daemon.notice procd: /etc/init.d/gl_ssids: uci: Entry not found
  255. Mon Jan 31 11:23:16 2022 daemon.notice procd: /etc/rc.d/S36gl_route_policy: uci: Entry not found
  256. Mon Jan 31 11:23:22 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
  257. Mon Jan 31 11:23:22 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
  258. Mon Jan 31 11:23:22 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
  259. Mon Jan 31 11:23:22 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
  260. Mon Jan 31 11:23:22 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
  261. Mon Jan 31 11:23:22 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
  262. Mon Jan 31 11:23:23 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
  263. Mon Jan 31 11:23:23 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
  264. Mon Jan 31 11:23:23 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
  265. Mon Jan 31 11:23:23 2022 kern.info kernel: [ 47.180540] IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready
  266. Mon Jan 31 11:23:23 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
  267. Mon Jan 31 11:23:23 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
  268. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.612319] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
  269. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.652291] br-lan: port 1(eth0) entered blocking state
  270. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.657701] br-lan: port 1(eth0) entered disabled state
  271. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.663477] device eth0 entered promiscuous mode
  272. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Interface 'lan' is enabled
  273. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.723415] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
  274. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.732580] eth1: link up (1000Mbps/Full duplex)
  275. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.774379] br-lan: port 2(eth1) entered blocking state
  276. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.779790] br-lan: port 2(eth1) entered disabled state
  277. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.785587] device eth1 entered promiscuous mode
  278. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.790459] br-lan: port 2(eth1) entered blocking state
  279. Mon Jan 31 11:23:25 2022 kern.info kernel: [ 48.795906] br-lan: port 2(eth1) entered forwarding state
  280. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Interface 'loopback' is enabled
  281. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Interface 'loopback' is setting up now
  282. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Interface 'loopback' is now up
  283. Mon Jan 31 11:23:25 2022 daemon.notice netifd: bridge 'br-lan' link is up
  284. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Interface 'lan' has link connectivity
  285. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Interface 'lan' is setting up now
  286. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Network device 'eth1' link is up
  287. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Network device 'lo' link is up
  288. Mon Jan 31 11:23:25 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
  289. Mon Jan 31 11:23:26 2022 daemon.notice procd: /etc/rc.d/S90vpn-service: cat: can't open '/etc/openvpn/ovpn/server.ovpn': No such file or directory
  290. Mon Jan 31 11:23:26 2022 daemon.notice netifd: lan (1920): udhcpc: started, v1.30.1
  291. Mon Jan 31 11:23:26 2022 daemon.notice netifd: lan (1920): udhcpc: sending discover
  292. Mon Jan 31 11:23:26 2022 daemon.notice netifd: lan (1920): udhcpc: performing DHCP renew
  293. Mon Jan 31 11:23:26 2022 daemon.notice netifd: lan (1920): udhcpc: sending discover
  294. Mon Jan 31 11:23:27 2022 kern.info kernel: [ 50.745013] eth0: link up (100Mbps/Full duplex)
  295. Mon Jan 31 11:23:27 2022 kern.info kernel: [ 50.749742] br-lan: port 1(eth0) entered blocking state
  296. Mon Jan 31 11:23:27 2022 kern.info kernel: [ 50.755191] br-lan: port 1(eth0) entered forwarding state
  297. Mon Jan 31 11:23:27 2022 daemon.notice netifd: Network device 'eth0' link is up
  298. Mon Jan 31 11:23:29 2022 kern.debug kernel: [ 52.775978] ath: EEPROM regdomain: 0x80fa
  299. Mon Jan 31 11:23:29 2022 kern.debug kernel: [ 52.780131] ath: EEPROM indicates we should expect a country code
  300. Mon Jan 31 11:23:29 2022 kern.debug kernel: [ 52.786478] ath: doing EEPROM country->regdmn map search
  301. Mon Jan 31 11:23:29 2022 kern.debug kernel: [ 52.791964] ath: country maps to regdmn code: 0x37
  302. Mon Jan 31 11:23:29 2022 kern.debug kernel: [ 52.796912] ath: Country alpha2 being used: FR
  303. Mon Jan 31 11:23:29 2022 kern.debug kernel: [ 52.801497] ath: Regpair used: 0x37
  304. Mon Jan 31 11:23:29 2022 kern.debug kernel: [ 52.805113] ath: regdomain 0x80fa dynamically updated by user
  305. Mon Jan 31 11:23:29 2022 daemon.notice procd: /etc/rc.d/S95done: killall: uqmi: no process killed
  306. Mon Jan 31 11:23:29 2022 daemon.notice netifd: lan (1920): udhcpc: sending discover
  307. Mon Jan 31 11:23:29 2022 daemon.notice netifd: lan (1920): udhcpc: sending select for 192.168.0.50
  308. Mon Jan 31 11:23:29 2022 daemon.notice netifd: lan (1920): udhcpc: lease of 192.168.0.50 obtained, lease time 864000
  309. Mon Jan 31 11:23:29 2022 daemon.notice procd: /etc/rc.d/S95done: uci: Entry not found
  310. Mon Jan 31 11:23:30 2022 daemon.err usbmuxd[2069]: [11:23:30.069][3] usbmuxd v1.1.1 starting up
  311. Mon Jan 31 11:23:30 2022 daemon.err usbmuxd[2069]: [11:23:30.072][3] Using libusb 1.0.22
  312. Mon Jan 31 11:23:30 2022 daemon.err usbmuxd[2069]: [11:23:30.075][3] Initialization complete
  313. Mon Jan 31 11:23:30 2022 daemon.err usbmuxd[2069]: [11:23:30.082][3] Enabled exit on SIGUSR1 if no devices are attached. Start a new instance with "--exit" to trigger.
  314. Mon Jan 31 11:23:30 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env_main.c(219)test fw printenv
  315. Mon Jan 31 11:23:30 2022 daemon.notice netifd: Interface 'lan' is now up
  316. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: reading /tmp/resolv.conf.auto
  317. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using local addresses only for domain test
  318. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using local addresses only for domain onion
  319. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using local addresses only for domain localhost
  320. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using local addresses only for domain local
  321. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using local addresses only for domain invalid
  322. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using local addresses only for domain bind
  323. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using local addresses only for domain lan
  324. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using nameserver 212.27.40.241#53
  325. Mon Jan 31 11:23:30 2022 daemon.info dnsmasq[1335]: using nameserver 212.27.40.240#53
  326. Mon Jan 31 11:23:30 2022 daemon.notice procd: /etc/rc.d/S95done: Warning: Bad CRC, using default environment
  327. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(750)=== fw env set
  328. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1515)=== env open
  329. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1535)have_redund_env = 1
  330. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1335)=== flash read buf
  331. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1559)crc0 = -1499398668, crc = 1369626779
  332. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1563)crc0 ok = 0
  333. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1335)=== flash read buf
  334. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1644)=== === ===> use default env
  335. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1702)Selected env in /dev/mtd1
  336. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(547)want to write env, name = bootcount, val = 0
  337. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(524)write env to flash
  338. Mon Jan 31 11:23:31 2022 daemon.notice procd: /etc/rc.d/S95done: tools/env/fw_env.c(1722)=== env close
  339. Mon Jan 31 11:23:32 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led PHY0
  340. Mon Jan 31 11:23:32 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led SYSTEM
  341. Mon Jan 31 11:23:32 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN
  342. Mon Jan 31 11:23:32 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN
  343. Mon Jan 31 11:23:33 2022 authpriv.info dropbear[2386]: Not backgrounding
  344. Mon Jan 31 11:23:34 2022 user.info mwan3rtmon[2120]: Detect rtchange event.
  345. Mon Jan 31 11:23:35 2022 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  346. Mon Jan 31 11:23:35 2022 daemon.notice netifd: radio0 (1869): sh: /usr/bin/ovs-vsctl: not found
  347. Mon Jan 31 11:23:35 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  348. Mon Jan 31 11:23:35 2022 daemon.notice netifd: radio0 (1869): sh: /usr/bin/ovs-vsctl: not found
  349. Mon Jan 31 11:23:35 2022 kern.info kernel: [ 58.713385] br-lan: port 3(wlan0) entered blocking state
  350. Mon Jan 31 11:23:35 2022 kern.info kernel: [ 58.718947] br-lan: port 3(wlan0) entered disabled state
  351. Mon Jan 31 11:23:35 2022 kern.info kernel: [ 58.724876] device wlan0 entered promiscuous mode
  352. Mon Jan 31 11:23:35 2022 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
  353. Mon Jan 31 11:23:35 2022 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
  354. Mon Jan 31 11:23:35 2022 user.info : Function:main Line:22
  355. Mon Jan 31 11:32:18 2022 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=8 sec=4 based on overlapping BSSes
  356. Mon Jan 31 11:32:18 2022 daemon.err hostapd: Using interface wlan0 with hwaddr 94:83:c4:07:df:01 and ssid "freebox_******"
  357. Mon Jan 31 11:32:19 2022 daemon.notice procd: /etc/rc.d/S99gl_tertf: killall: gltraffic: no process killed
  358. Mon Jan 31 11:32:20 2022 kern.info kernel: [ 62.193430] br-lan: port 3(wlan0) entered blocking state
  359. Mon Jan 31 11:32:20 2022 kern.info kernel: [ 62.198932] br-lan: port 3(wlan0) entered forwarding state
  360. Mon Jan 31 11:32:20 2022 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
  361. Mon Jan 31 11:32:20 2022 daemon.notice hostapd: wlan0: AP-ENABLED
  362. Mon Jan 31 11:32:20 2022 daemon.notice procd: /etc/rc.d/S99lighttpd: netstat: showing only processes with your user ID
  363. Mon Jan 31 11:32:20 2022 daemon.notice netifd: Network device 'wlan0' link is up
  364. Mon Jan 31 11:32:21 2022 daemon.notice netifd: lan (1920): udhcpc: performing DHCP renew
  365. Mon Jan 31 11:32:21 2022 daemon.notice netifd: lan (1920): udhcpc: sending renew to 192.168.0.254
  366. Mon Jan 31 11:32:21 2022 daemon.notice netifd: lan (1920): udhcpc: lease of 192.168.0.50 obtained, lease time 864000
  367. Mon Jan 31 11:32:24 2022 user.notice wireguard: wireguard client start
  368. Mon Jan 31 11:32:24 2022 daemon.info procd: - init complete -
  369. Mon Jan 31 11:32:41 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f IEEE 802.11: authenticated
  370. Mon Jan 31 11:32:42 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f IEEE 802.11: associated (aid 1)
  371. Mon Jan 31 11:32:42 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED c4:18:e9:29:58:0f
  372. Mon Jan 31 11:32:42 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f RADIUS: starting accounting session 977DC30726CACFAF
  373. Mon Jan 31 11:32:42 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f WPA: pairwise key handshake completed (RSN)
  374. Mon Jan 31 11:32:50 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec IEEE 802.11: authenticated
  375. Mon Jan 31 11:32:50 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec IEEE 802.11: associated (aid 2)
  376. Mon Jan 31 11:32:51 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 3c:28:6d:11:a5:ec
  377. Mon Jan 31 11:32:51 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec RADIUS: starting accounting session 12C6CF2568791F56
  378. Mon Jan 31 11:32:51 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec WPA: pairwise key handshake completed (RSN)
  379. Mon Jan 31 11:33:03 2022 daemon.info hostapd: wlan0: STA 6c:94:66:21:56:dd IEEE 802.11: authenticated
  380. Mon Jan 31 11:33:03 2022 daemon.info hostapd: wlan0: STA 6c:94:66:21:56:dd IEEE 802.11: associated (aid 3)
  381. Mon Jan 31 11:33:03 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 6c:94:66:21:56:dd
  382. Mon Jan 31 11:33:03 2022 daemon.info hostapd: wlan0: STA 6c:94:66:21:56:dd RADIUS: starting accounting session E8F33EB8975AD779
  383. Mon Jan 31 11:33:03 2022 daemon.info hostapd: wlan0: STA 6c:94:66:21:56:dd WPA: pairwise key handshake completed (RSN)
  384. Mon Jan 31 11:33:37 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e IEEE 802.11: authenticated
  385. Mon Jan 31 11:33:37 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e IEEE 802.11: associated (aid 4)
  386. Mon Jan 31 11:33:37 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a8:6d:aa:a3:f8:0e
  387. Mon Jan 31 11:33:37 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e RADIUS: starting accounting session 0CF2A27CBED074B2
  388. Mon Jan 31 11:33:37 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e WPA: pairwise key handshake completed (RSN)
  389. Mon Jan 31 11:33:57 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 IEEE 802.11: associated (aid 5)
  390. Mon Jan 31 11:33:57 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED ac:6c:90:ed:2c:85
  391. Mon Jan 31 11:33:57 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 RADIUS: starting accounting session 5D4CCB532119B110
  392. Mon Jan 31 11:33:57 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 WPA: pairwise key handshake completed (RSN)
  393. Mon Jan 31 11:40:21 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: associated (aid 6)
  394. Mon Jan 31 11:40:21 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 88:54:1f:21:c6:2c
  395. Mon Jan 31 11:40:21 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c RADIUS: starting accounting session AB31159B067BA4C3
  396. Mon Jan 31 11:40:21 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c WPA: pairwise key handshake completed (RSN)
  397. Mon Jan 31 12:56:53 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED a8:6d:aa:a3:f8:0e
  398. Mon Jan 31 13:47:01 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 IEEE 802.11: authenticated
  399. Mon Jan 31 13:47:02 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 IEEE 802.11: authenticated
  400. Mon Jan 31 13:47:02 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 IEEE 802.11: associated (aid 5)
  401. Mon Jan 31 13:47:02 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 RADIUS: starting accounting session 5D4CCB532119B110
  402. Mon Jan 31 13:47:02 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 WPA: pairwise key handshake completed (RSN)
  403. Mon Jan 31 13:47:53 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e IEEE 802.11: authenticated
  404. Mon Jan 31 13:47:53 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e IEEE 802.11: associated (aid 4)
  405. Mon Jan 31 13:47:53 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a8:6d:aa:a3:f8:0e
  406. Mon Jan 31 13:47:53 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e RADIUS: starting accounting session E6D7FA9F8CBD6EC0
  407. Mon Jan 31 13:47:53 2022 daemon.info hostapd: wlan0: STA a8:6d:aa:a3:f8:0e WPA: pairwise key handshake completed (RSN)
  408. Mon Jan 31 14:01:07 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED ac:6c:90:ed:2c:85
  409. Mon Jan 31 14:01:07 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 IEEE 802.11: disassociated due to inactivity
  410. Mon Jan 31 14:01:08 2022 daemon.info hostapd: wlan0: STA ac:6c:90:ed:2c:85 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  411. Mon Jan 31 14:32:12 2022 user.notice glautoupdater: wait 86400 seconds to check again
  412. Mon Jan 31 17:05:28 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED a8:6d:aa:a3:f8:0e
  413. Mon Jan 31 17:24:50 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 88:54:1f:21:c6:2c
  414. Mon Jan 31 17:24:50 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: disassociated due to inactivity
  415. Mon Jan 31 17:24:51 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  416. Mon Jan 31 17:47:48 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: associated (aid 4)
  417. Mon Jan 31 17:47:48 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 88:54:1f:21:c6:2c
  418. Mon Jan 31 17:47:48 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c RADIUS: starting accounting session 5D4791DB16E660BC
  419. Mon Jan 31 17:47:48 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c WPA: pairwise key handshake completed (RSN)
  420. Mon Jan 31 20:07:33 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 6c:94:66:21:56:dd
  421. Mon Jan 31 20:07:33 2022 daemon.info hostapd: wlan0: STA 6c:94:66:21:56:dd IEEE 802.11: disassociated due to inactivity
  422. Mon Jan 31 20:07:34 2022 daemon.info hostapd: wlan0: STA 6c:94:66:21:56:dd IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  423. Mon Jan 31 21:17:55 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 3c:28:6d:11:a5:ec
  424. Mon Jan 31 23:33:34 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED c4:18:e9:29:58:0f
  425. Mon Jan 31 23:33:34 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f IEEE 802.11: disassociated
  426. Mon Jan 31 23:33:34 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f IEEE 802.11: associated (aid 1)
  427. Mon Jan 31 23:33:34 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED c4:18:e9:29:58:0f
  428. Mon Jan 31 23:33:34 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f RADIUS: starting accounting session 977DC30726CACFAF
  429. Mon Jan 31 23:33:34 2022 daemon.info hostapd: wlan0: STA c4:18:e9:29:58:0f WPA: pairwise key handshake completed (RSN)
  430. Tue Feb 1 05:47:49 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 88:54:1f:21:c6:2c
  431. Tue Feb 1 05:47:49 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: disassociated
  432. Tue Feb 1 05:47:50 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: associated (aid 4)
  433. Tue Feb 1 05:47:50 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 88:54:1f:21:c6:2c
  434. Tue Feb 1 05:47:50 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c RADIUS: starting accounting session 5D4791DB16E660BC
  435. Tue Feb 1 05:47:50 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c WPA: pairwise key handshake completed (RSN)
  436. Tue Feb 1 08:09:35 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec IEEE 802.11: authenticated
  437. Tue Feb 1 08:09:35 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec IEEE 802.11: associated (aid 2)
  438. Tue Feb 1 08:09:35 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 3c:28:6d:11:a5:ec
  439. Tue Feb 1 08:09:35 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec RADIUS: starting accounting session B812EF1F7EDB9282
  440. Tue Feb 1 08:09:35 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec WPA: pairwise key handshake completed (RSN)
  441. Tue Feb 1 08:17:42 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 88:54:1f:21:c6:2c
  442. Tue Feb 1 08:17:42 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: disassociated due to inactivity
  443. Tue Feb 1 08:17:43 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  444. Tue Feb 1 08:32:54 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c IEEE 802.11: associated (aid 3)
  445. Tue Feb 1 08:32:54 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 88:54:1f:21:c6:2c
  446. Tue Feb 1 08:32:54 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c RADIUS: starting accounting session 13C3EC06BFFAB031
  447. Tue Feb 1 08:32:54 2022 daemon.info hostapd: wlan0: STA 88:54:1f:21:c6:2c WPA: pairwise key handshake completed (RSN)
  448. Tue Feb 1 08:33:21 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 3c:28:6d:11:a5:ec
  449. Tue Feb 1 08:33:21 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec IEEE 802.11: disassociated due to inactivity
  450. Tue Feb 1 08:33:22 2022 daemon.info hostapd: wlan0: STA 3c:28:6d:11:a5:ec IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Add Comment
Please, Sign In to add comment