Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057236] TCP: Hash tables configured (established 4096 bind 4096)
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057336] UDP hash table entries: 256 (order: 1, 8192 bytes, linear)
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057371] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes, linear)
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057626] NET: Registered protocol family 1
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057687] PCI: CLS 0 bytes, default 64
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.059078] workingset: timestamp_bits=14 max_order=17 bucket_order=3
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.066152] squashfs: version 4.0 (2009/01/31) Phillip Lougher
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.066167] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.106320] qcom-pcie 1b500000.pci: 1b500000.pci supply vdda not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.106475] qcom-pcie 1b500000.pci: 1b500000.pci supply vdda_phy not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.106592] qcom-pcie 1b500000.pci: 1b500000.pci supply vdda_refclk not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.106866] qcom-pcie 1b500000.pci: host bridge /soc/pci@1b500000 ranges:
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.106892] qcom-pcie 1b500000.pci: Parsing ranges property...
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.106941] qcom-pcie 1b500000.pci: IO 0x0fe00000..0x0fefffff -> 0x0fe00000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.106979] qcom-pcie 1b500000.pci: MEM 0x08000000..0x0fdfffff -> 0x08000000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328658] qcom-pcie 1b500000.pci: Link up
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328828] qcom-pcie 1b500000.pci: PCI host bridge to bus 0000:00
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328851] pci_bus 0000:00: root bus resource [bus 00-ff]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328871] pci_bus 0000:00: root bus resource [io 0x0000-0xfffff] (bus address [0xfe00000-0xfefffff])
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328887] pci_bus 0000:00: root bus resource [mem 0x08000000-0x0fdfffff]
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.328904] pci_bus 0000:00: scanning bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328952] pci 0000:00:00.0: [17cb:0101] type 01 class 0xff0000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.329125] pci 0000:00:00.0: supports D1
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.329141] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.329162] pci 0000:00:00.0: PME# disabled
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.333386] pci_bus 0000:00: fixups for bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.333409] PCI: bus0: Fast back to back transfers disabled
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.333430] pci 0000:00:00.0: scanning [bus 01-ff] behind bridge, pass 0
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.333580] pci_bus 0000:01: scanning bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.333762] pci 0000:01:00.0: [168c:0046] type 00 class 0x028000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.334119] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.335269] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.335317] pci 0000:01:00.0: PME# disabled
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339551] pci_bus 0000:01: fixups for bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339623] PCI: bus1: Fast back to back transfers disabled
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339638] pci_bus 0000:01: bus scan returning with max=01
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339657] pci 0000:00:00.0: scanning [bus 01-ff] behind bridge, pass 1
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339674] pci_bus 0000:00: bus scan returning with max=ff
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339709] pci 0000:00:00.0: BAR 8: assigned [mem 0x08000000-0x081fffff]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339735] pci 0000:01:00.0: BAR 0: assigned [mem 0x08000000-0x081fffff 64bit]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339863] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339888] pci 0000:00:00.0: bridge window [mem 0x08000000-0x081fffff]
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.340101] pcieport 0000:00:00.0: assign IRQ: got 35
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.340881] pcieport 0000:00:00.0: AER: enabled with IRQ 36
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.341493] qcom-pcie 1b700000.pci: 1b700000.pci supply vdda not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.341625] qcom-pcie 1b700000.pci: 1b700000.pci supply vdda_phy not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.341762] qcom-pcie 1b700000.pci: 1b700000.pci supply vdda_refclk not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.342037] qcom-pcie 1b700000.pci: host bridge /soc/pci@1b700000 ranges:
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.342062] qcom-pcie 1b700000.pci: Parsing ranges property...
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.342102] qcom-pcie 1b700000.pci: IO 0x31e00000..0x31efffff -> 0x31e00000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.342138] qcom-pcie 1b700000.pci: MEM 0x2e000000..0x31dfffff -> 0x2e000000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570452] qcom-pcie 1b700000.pci: Link up
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570611] qcom-pcie 1b700000.pci: PCI host bridge to bus 0001:00
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570631] pci_bus 0001:00: root bus resource [bus 00-ff]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570648] pci_bus 0001:00: root bus resource [mem 0x2e000000-0x31dfffff]
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.570663] pci_bus 0001:00: scanning bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570707] pci 0001:00:00.0: [17cb:0101] type 01 class 0xff0000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570864] pci 0001:00:00.0: supports D1
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570878] pci 0001:00:00.0: PME# supported from D0 D1 D3hot
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.570898] pci 0001:00:00.0: PME# disabled
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.575057] pci_bus 0001:00: fixups for bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.575078] PCI: bus0: Fast back to back transfers disabled
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.575097] pci 0001:00:00.0: scanning [bus 01-ff] behind bridge, pass 0
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.575247] pci_bus 0001:01: scanning bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.575440] pci 0001:01:00.0: [168c:0046] type 00 class 0x028000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.575819] pci 0001:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.577055] pci 0001:01:00.0: PME# supported from D0 D3hot D3cold
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.577104] pci 0001:01:00.0: PME# disabled
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.577360] pci 0001:01:00.0: 2.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s x1 link at 0001:00:00.0 (capable of 4.000 Gb/s with 5 GT/s x1 link)
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581379] pci_bus 0001:01: fixups for bus
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581457] PCI: bus1: Fast back to back transfers disabled
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581472] pci_bus 0001:01: bus scan returning with max=01
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581489] pci 0001:00:00.0: scanning [bus 01-ff] behind bridge, pass 1
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581506] pci_bus 0001:00: bus scan returning with max=ff
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581533] pci 0001:00:00.0: BAR 8: assigned [mem 0x2e000000-0x2e1fffff]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581557] pci 0001:01:00.0: BAR 0: assigned [mem 0x2e000000-0x2e1fffff 64bit]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581689] pci 0001:00:00.0: PCI bridge to [bus 01-ff]
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581709] pci 0001:00:00.0: bridge window [mem 0x2e000000-0x2e1fffff]
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581899] pcieport 0001:00:00.0: assign IRQ: got 37
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.582644] pcieport 0001:00:00.0: AER: enabled with IRQ 38
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585293] L2 @ QSB rate. Forcing new rate.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585510] L2 @ 384000 KHz
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585695] CPU0 @ 800000 KHz
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585707] CPU1 @ QSB rate. Forcing new rate.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585838] CPU1 @ 384000 KHz
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.589566] gsbi 16300000.gsbi: GSBI port protocol: 6 crci: 0
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.591822] Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592629] msm_serial 16340000.serial: msm_serial: detected port #0
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592690] msm_serial 16340000.serial: uartclk = 7372800
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592761] 16340000.serial: ttyMSM0 at MMIO 0x16340000 (irq = 39, base_baud = 460800) is a MSM
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592799] msm_serial: console setup on port #0
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.376942] printk: console [ttyMSM0] enabled
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.381908] msm_serial: driver initialized
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.391330] loop: module loaded
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.393010] nand: device found, Manufacturer ID: 0x01, Chip ID: 0xa1
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.393371] nand: AMD/Spansion S34MS01G2
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.399880] nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.403971] 8 fixed-partitions partitions found on MTD device qcom_nand.0
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.411167] Creating 8 MTD partitions on "qcom_nand.0":
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.418129] 0x000000000000-0x000000c80000 : "qcadata"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.428413] random: fast init done
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.444984] 0x000000c80000-0x000001180000 : "APPSBL"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.454290] 0x000001180000-0x000001200000 : "APPSBLENV"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.456118] 0x000001200000-0x000001340000 : "art"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.461351] 0x000001340000-0x000001480000 : "artbak"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.466268] 0x000001480000-0x000001880000 : "kernel"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.475900] 0x000001880000-0x000007900000 : "ubi"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.638004] 0x000007900000-0x000008000000 : "reserve"
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.652316] libphy: ipq8064_mdio_bus: probed
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.667529] switch0: Atheros AR8337 rev. 2 switch registered on 37000000.mdio-mii
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 2.509618] ar8327: qca,phy-rgmii-en is not specified
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.510198] libphy: Fixed MDIO Bus: probed
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.514531] ipq806x-gmac-dwmac 37200000.ethernet: IRQ eth_wake_irq not found
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.517650] ipq806x-gmac-dwmac 37200000.ethernet: IRQ eth_lpi not found
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 2.525706] ipq806x-gmac-dwmac 37200000.ethernet: PTP uses main clock
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.531838] ipq806x-gmac-dwmac 37200000.ethernet: User ID: 0x10, Synopsys ID: 0x37
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.537883] ipq806x-gmac-dwmac 37200000.ethernet: DWMAC1000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.545327] ipq806x-gmac-dwmac 37200000.ethernet: DMA HW capability register supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.551070] ipq806x-gmac-dwmac 37200000.ethernet: RX Checksum Offload Engine supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.558878] ipq806x-gmac-dwmac 37200000.ethernet: COE Type 2
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.566750] ipq806x-gmac-dwmac 37200000.ethernet: TX Checksum insertion supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.572508] ipq806x-gmac-dwmac 37200000.ethernet: Wake-Up On Lan supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.579968] ipq806x-gmac-dwmac 37200000.ethernet: Enhanced/Alternate descriptors
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.586745] ipq806x-gmac-dwmac 37200000.ethernet: Enabled extended descriptors
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.594274] ipq806x-gmac-dwmac 37200000.ethernet: Ring mode enabled
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.601240] ipq806x-gmac-dwmac 37200000.ethernet: Enable RX Mitigation via HW Watchdog Timer
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.608408] ipq806x-gmac-dwmac 37400000.ethernet: IRQ eth_wake_irq not found
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.616188] ipq806x-gmac-dwmac 37400000.ethernet: IRQ eth_lpi not found
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 2.623369] ipq806x-gmac-dwmac 37400000.ethernet: PTP uses main clock
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.629770] ipq806x-gmac-dwmac 37400000.ethernet: User ID: 0x10, Synopsys ID: 0x37
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.636161] ipq806x-gmac-dwmac 37400000.ethernet: DWMAC1000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.643601] ipq806x-gmac-dwmac 37400000.ethernet: DMA HW capability register supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.649332] ipq806x-gmac-dwmac 37400000.ethernet: RX Checksum Offload Engine supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.657128] ipq806x-gmac-dwmac 37400000.ethernet: COE Type 2
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.665031] ipq806x-gmac-dwmac 37400000.ethernet: TX Checksum insertion supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.670771] ipq806x-gmac-dwmac 37400000.ethernet: Wake-Up On Lan supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.678214] ipq806x-gmac-dwmac 37400000.ethernet: Enhanced/Alternate descriptors
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.684994] ipq806x-gmac-dwmac 37400000.ethernet: Enabled extended descriptors
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.692472] ipq806x-gmac-dwmac 37400000.ethernet: Ring mode enabled
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.699584] ipq806x-gmac-dwmac 37400000.ethernet: Enable RX Mitigation via HW Watchdog Timer
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.706745] i2c /dev entries driver
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.716786] cpuidle: enable-method property 'qcom,kpss-acc-v1' found operations
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.717672] cpuidle: enable-method property 'qcom,kpss-acc-v1' found operations
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.725555] sdhci: Secure Digital Host Controller Interface driver
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.732137] sdhci: Copyright(c) Pierre Ossman
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.738476] sdhci-pltfm: SDHCI platform and OF driver helper
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.745228] NET: Registered protocol family 10
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.749943] Segment Routing with IPv6
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.752887] NET: Registered protocol family 17
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.756903] 8021q: 802.1Q VLAN Support v1.8
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.760912] Registering SWP/SWPB emulation handler
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.790960] qcom_rpm 108000.rpm: RPM firmware 3.0.16777364
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.804946] s1a: Bringing 0uV into 1050000-1050000uV
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.805231] s1a: supplied by regulator-dummy
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.809125] s1b: Bringing 0uV into 1050000-1050000uV
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.813548] s1b: supplied by regulator-dummy
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.818312] s2a: Bringing 0uV into 775000-775000uV
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.822659] s2a: supplied by regulator-dummy
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.827245] s2b: Bringing 0uV into 775000-775000uV
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.831674] s2b: supplied by regulator-dummy
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.846438] UBI: auto-attach mtd6
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.846460] ubi0: attaching mtd6
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.910147] random: crng init done
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.549012] ubi0: scanning is finished
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.558649] ubi0: attached mtd6 (name "ubi", size 96 MiB)
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.558668] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.563016] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.569862] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.576700] ubi0: good PEBs: 772, bad PEBs: 0, corrupted PEBs: 0
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.583489] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.589667] ubi0: max/mean erase counter: 21/13, WL threshold: 4096, image sequence number: 1635066095
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.596754] ubi0: available PEBs: 0, total reserved PEBs: 772, PEBs reserved for bad PEB handling: 20
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.606112] ubi0: background thread "ubi_bgt0d" started, PID 69
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.606757] block ubiblock0_0: created from ubi0:0(rootfs)
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.621001] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.626621] hctosys: unable to open rtc device (rtc0)
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.638654] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.639798] Freeing unused kernel memory: 1024K
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.673786] Run /sbin/init as init process
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 4.018156] init: Console is alive
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 4.018285] init: - watchdog -
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 4.582418] kmodloader: loading kernel modules from /etc/modules-boot.d/*
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.678892] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 4.685377] SCSI subsystem initialized
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 4.694164] libata version 3.00 loaded.
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 4.698591] ahci 29000000.sata: 29000000.sata supply ahci not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 4.698673] ahci 29000000.sata: 29000000.sata supply phy not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 4.705869] ahci 29000000.sata: 29000000.sata supply target not found, using dummy regulator
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.714454] ahci 29000000.sata: forcing port_map 0x0 -> 0x1
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.722514] ahci 29000000.sata: AHCI 0001.0300 32 slots 1 ports 6 Gbps 0x1 impl platform mode
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.727876] ahci 29000000.sata: flags: ncq sntf pm led clo only pmp pio slum part ccc apst
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.737037] scsi host0: ahci
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.744911] ata1: SATA max UDMA/133 mmio [mem 0x29000000-0x2900017f] port 0x100 irq 26
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.076055] ata1: SATA link down (SStatus 0 SControl 300)
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.081580] ehci-fsl: Freescale EHCI Host controller driver
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.083814] ehci-platform: EHCI generic platform driver
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.091362] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.092070] ohci-platform: OHCI generic platform driver
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.100057] dwc3-qcom 110f8800.usb3: IRQ hs_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.102550] dwc3-qcom 110f8800.usb3: IRQ dp_hs_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.108556] dwc3-qcom 110f8800.usb3: IRQ dm_hs_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.114630] dwc3-qcom 110f8800.usb3: IRQ ss_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.122747] dwc3-qcom 100f8800.usb3: IRQ hs_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.126243] dwc3-qcom 100f8800.usb3: IRQ dp_hs_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.131955] dwc3-qcom 100f8800.usb3: IRQ dm_hs_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.138029] dwc3-qcom 100f8800.usb3: IRQ ss_phy_irq not found
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.146890] dwc3 11000000.dwc3: Failed to get clk 'ref': -2
- Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.212839] dwc3 10000000.dwc3: Failed to get clk 'ref': -2
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.281504] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.281567] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.286217] xhci-hcd xhci-hcd.0.auto: hcc params 0x0228f065 hci version 0x100 quirks 0x0000000002010010
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.293585] xhci-hcd xhci-hcd.0.auto: irq 43, io mem 0x11000000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.303108] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.308805] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.314345] xhci-hcd xhci-hcd.0.auto: Host supports USB 3.0 SuperSpeed
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.322496] hub 1-0:1.0: USB hub found
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.328539] hub 1-0:1.0: 1 port detected
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.332466] usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.337355] hub 2-0:1.0: USB hub found
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.344380] hub 2-0:1.0: 1 port detected
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.348138] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.351948] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 3
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.357434] xhci-hcd xhci-hcd.1.auto: hcc params 0x0228f065 hci version 0x100 quirks 0x0000000002010010
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.364883] xhci-hcd xhci-hcd.1.auto: irq 44, io mem 0x10000000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.374398] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.380069] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 4
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.385691] xhci-hcd xhci-hcd.1.auto: Host supports USB 3.0 SuperSpeed
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.393663] hub 3-0:1.0: USB hub found
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.399790] hub 3-0:1.0: 1 port detected
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.403808] usb usb4: We don't know the algorithms for LPM for this host, disabling LPM.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.407912] hub 4-0:1.0: USB hub found
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.417025] hub 4-0:1.0: 1 port detected
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 5.420884] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 5.429476] init: - preinit -
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.038354] dwmac1000: Master AXI performs any burst length
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.038392] ipq806x-gmac-dwmac 37400000.ethernet eth1: No Safety Features support found
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.042741] ipq806x-gmac-dwmac 37400000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.050957] ipq806x-gmac-dwmac 37400000.ethernet eth1: registered PTP clock
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.059813] ipq806x-gmac-dwmac 37400000.ethernet eth1: configuring for fixed/sgmii link mode
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.067577] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.075412] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.221468] UBIFS (ubi0:1): Mounting in unauthenticated mode
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.221620] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 158
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.271266] UBIFS (ubi0:1): recovery needed
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.373040] UBIFS (ubi0:1): recovery completed
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.373131] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.376476] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.384349] UBIFS (ubi0:1): FS size: 86089728 bytes (82 MiB, 678 LEBs), journal size 4317184 bytes (4 MiB, 34 LEBs)
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.394251] UBIFS (ubi0:1): reserved for root: 4066230 bytes (3970 KiB)
- Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.404473] UBIFS (ubi0:1): media format: w5/r0 (latest is w5/r0), UUID FAF08BA9-0D26-4440-ABDA-A84284E8EE54, small LPT model
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 10.417987] mount_root: switching to ubifs overlay
- Mon Jan 24 08:44:22 2022 user.warn kernel: [ 10.434494] urandom-seed: Seeding with /etc/urandom.seed
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 10.479091] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Down
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 10.519648] procd: - early -
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 10.519761] procd: - watchdog -
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.063404] procd: - watchdog -
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.067261] procd: - ubus -
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.154094] procd: - init -
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.888093] urngd: v1.0.2 started.
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.915628] kmodloader: loading kernel modules from /etc/modules.d/*
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 11.951255] Loading modules backported from Linux version v5.10.68-0-g4d8524048a35
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 11.951280] Backport generated by backports.git v5.10.68-1-0-ga4f9ba32
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 11.966895] xt_time: kernel timezone is -0000
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.014146] PPP generic driver version 2.4.2
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.015040] NET: Registered protocol family 24
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.019208] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.021731] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 12.113423] ath10k_pci 0000:01:00.0: assign IRQ: got 35
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.113444] ath10k 5.10 driver, optimized for CT firmware, probing pci device: 0x46.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.113904] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142)
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 12.120299] ath10k_pci 0000:01:00.0: enabling bus mastering
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.120833] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.859736] ath10k_pci 0000:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.859770] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.870296] ath10k_pci 0000:01:00.0: firmware ver 10.4b-ct-9984-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 7ea63dc5
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 15.200850] ath10k_pci 0000:01:00.0: board_file api 2 bmi_id 0:1 crc32 85498734
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 18.752311] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 18.752338] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 18.834658] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 18.835506] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.123884] ath10k_pci 0000:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215529] ath: EEPROM regdomain sanitized
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215549] ath: EEPROM regdomain: 0x64
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215559] ath: EEPROM indicates we should expect a direct regpair map
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215584] ath: Country alpha2 being used: 00
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215594] ath: Regpair used: 0x64
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.224898] ath10k_pci 0001:01:00.0: assign IRQ: got 37
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.224930] ath10k 5.10 driver, optimized for CT firmware, probing pci device: 0x46.
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.225952] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142)
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.231844] ath10k_pci 0001:01:00.0: enabling bus mastering
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.232543] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.824122] ath10k_pci 0001:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.824160] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.835660] ath10k_pci 0001:01:00.0: firmware ver 10.4b-ct-9984-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 7ea63dc5
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 22.191545] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id 0:2 crc32 85498734
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 25.774920] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
- Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 25.774947] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 25.859366] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 25.860250] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
- Mon Jan 24 08:44:22 2022 kern.info kernel: [ 26.155076] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245243] ath: EEPROM regdomain sanitized
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245260] ath: EEPROM regdomain: 0x64
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245270] ath: EEPROM indicates we should expect a direct regpair map
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245292] ath: Country alpha2 being used: 00
- Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245302] ath: Regpair used: 0x64
- Mon Jan 24 08:44:22 2022 user.info kernel: [ 26.259732] kmodloader: done loading kernel modules from /etc/modules.d/*
- Mon Jan 24 08:44:23 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Mon Jan 24 08:44:23 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: Connected to system UBus
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: started, version 2.85 cachesize 150
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: DNS service limited to local subnets
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: UBus support enabled: connected to system bus
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain test
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain onion
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain localhost
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain local
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain invalid
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain bind
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain lan
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: read /etc/hosts - 4 addresses
- Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: read /tmp/hosts/dhcp.cfg01411c - 10 addresses
- Mon Jan 24 08:44:23 2022 authpriv.info dropbear[975]: Not backgrounding
- Mon Jan 24 08:44:24 2022 daemon.notice wpa_supplicant[1124]: Successfully initialized wpa_supplicant
- Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: 8021ad
- Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: 8021q
- Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: macvlan
- Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: veth
- Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: bridge
- Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: Network device
- Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: tunnel
- Mon Jan 24 08:44:26 2022 daemon.notice procd: /etc/rc.d/S50uhttpd: 4+0 records in
- Mon Jan 24 08:44:26 2022 daemon.notice procd: /etc/rc.d/S50uhttpd: 4+0 records out
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.886383] dwmac1000: Master AXI performs any burst length
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.886412] ipq806x-gmac-dwmac 37400000.ethernet eth1: No Safety Features support found
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.890766] ipq806x-gmac-dwmac 37400000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.899089] ipq806x-gmac-dwmac 37400000.ethernet eth1: registered PTP clock
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.907874] ipq806x-gmac-dwmac 37400000.ethernet eth1: configuring for fixed/sgmii link mode
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.918524] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.923435] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.940025] br-guest: port 1(eth1.20) entered blocking state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.940048] br-guest: port 1(eth1.20) entered disabled state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.945330] device eth1.20 entered promiscuous mode
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.950427] device eth1 entered promiscuous mode
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.962181] br-guest: port 1(eth1.20) entered blocking state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.962206] br-guest: port 1(eth1.20) entered forwarding state
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' is enabled
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' is setting up now
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' is now up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: bridge 'br-guest' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' has link connectivity
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.071287] br-iot: port 1(eth1.21) entered blocking state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.071311] br-iot: port 1(eth1.21) entered disabled state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.075899] device eth1.21 entered promiscuous mode
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.095667] br-iot: port 1(eth1.21) entered blocking state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.095691] br-iot: port 1(eth1.21) entered forwarding state
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' is enabled
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' is setting up now
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' is now up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: bridge 'br-iot' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' has link connectivity
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.249564] br-lan: port 1(eth1.1) entered blocking state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.249590] br-lan: port 1(eth1.1) entered disabled state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.256243] device eth1.1 entered promiscuous mode
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.262175] br-lan: port 1(eth1.1) entered blocking state
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.264101] br-lan: port 1(eth1.1) entered forwarding state
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' is enabled
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' is setting up now
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' is now up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: bridge 'br-lan' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' has link connectivity
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth1.1' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth1.20' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth1.21' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' is enabled
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' is setting up now
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' is now up
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.308139] dwmac1000: Master AXI performs any burst length
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.308167] ipq806x-gmac-dwmac 37200000.ethernet eth0: No Safety Features support found
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.312525] ipq806x-gmac-dwmac 37200000.ethernet eth0: IEEE 1588-2008 Advanced Timestamp supported
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.320707] ipq806x-gmac-dwmac 37200000.ethernet eth0: registered PTP clock
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.329609] ipq806x-gmac-dwmac 37200000.ethernet eth0: configuring for fixed/rgmii link mode
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.337301] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
- Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.347875] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' is enabled
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' is setting up now
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' is now up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan6' is enabled
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan6' is setting up now
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wg_lan' is setting up now
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Network device 'eth1' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Network device 'lo' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Network device 'eth0' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth0.2' link is up
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' has link connectivity
- Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan6' has link connectivity
- Mon Jan 24 08:44:26 2022 user.notice firewall: Reloading firewall due to ifup of GUEST (br-guest)
- Mon Jan 24 08:44:26 2022 daemon.err odhcp6c[1562]: Failed to send RS (Address not available)
- Mon Jan 24 08:44:27 2022 kern.info kernel: [ 31.014344] IPv6: ADDRCONF(NETDEV_CHANGE): br-guest: link becomes ready
- Mon Jan 24 08:44:27 2022 kern.info kernel: [ 31.033845] IPv6: br-lan: IPv6 duplicate address fda5:5b5f:9b3::1 used by b0:7f:b9:3e:35:3a detected!
- Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.286669] ath: EEPROM regdomain: 0x8348
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.286705] ath: EEPROM indicates we should expect a country code
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.289664] ath: doing EEPROM country->regdmn map search
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.295825] ath: country maps to regdmn code: 0x3a
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.301222] ath: Country alpha2 being used: US
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.305909] ath: Regpair used: 0x3a
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.310167] ath: regdomain 0x8348 dynamically updated by user
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.313635] ath: EEPROM regdomain: 0x8348
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.319458] ath: EEPROM indicates we should expect a country code
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.323510] ath: doing EEPROM country->regdmn map search
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.329531] ath: country maps to regdmn code: 0x3a
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.334978] ath: Country alpha2 being used: US
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.339502] ath: Regpair used: 0x3a
- Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.344018] ath: regdomain 0x8348 dynamically updated by user
- Mon Jan 24 08:44:27 2022 daemon.err odhcp6c[1562]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
- Mon Jan 24 08:44:27 2022 daemon.err odhcpd[1242]: Failed to send to ff02::1%IOT@br-iot (Address not available)
- Mon Jan 24 08:44:27 2022 daemon.err odhcpd[1242]: Failed to send to ff02::1%lan@br-lan (Address not available)
- Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
- Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
- Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
- Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
- Mon Jan 24 08:44:27 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of GUEST (br-guest)
- Mon Jan 24 08:44:28 2022 daemon.notice netifd: Interface 'wg_lan' is now up
- Mon Jan 24 08:44:28 2022 daemon.notice netifd: Network device 'wg_lan' link is up
- Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
- Mon Jan 24 08:44:28 2022 user.notice firewall: Reloading firewall due to ifup of IOT (br-iot)
- Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
- Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
- Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
- Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
- Mon Jan 24 08:44:29 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of IOT (br-iot)
- Mon Jan 24 08:44:29 2022 daemon.warn procd: Seccomp support for umdns::instance1 not available
- Mon Jan 24 08:44:29 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
- Mon Jan 24 08:44:30 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
- Mon Jan 24 08:44:30 2022 daemon.notice procd: /etc/rc.d/S81dawn: Starting Service...
- Mon Jan 24 08:44:30 2022 daemon.notice procd: /etc/rc.d/S81dawn: UMDNS with port 1026
- Mon Jan 24 08:44:30 2022 daemon.notice procd: /etc/rc.d/S81dawn: Dawn instance started!
- Mon Jan 24 08:44:30 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of lan (br-lan)
- Mon Jan 24 08:44:31 2022 daemon.err dawn[2964]: Connection established
- Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led USB 1
- Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led USB 2
- Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN
- Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led eSATA
- Mon Jan 24 08:44:36 2022 kern.warn kernel: [ 40.151789] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
- Mon Jan 24 08:44:36 2022 kern.warn kernel: [ 40.151817] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
- Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.235911] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
- Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.236768] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
- Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.625611] ath10k_pci 0001:01:00.0: rts threshold -1
- Mon Jan 24 08:44:36 2022 kern.warn kernel: [ 40.625820] ath10k_pci 0001:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
- Mon Jan 24 08:44:36 2022 daemon.notice netifd: Interface 'wan6' is now up
- Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.654259] br-iot: port 2(wlan1) entered blocking state
- Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.654283] br-iot: port 2(wlan1) entered disabled state
- Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.658876] device wlan1 entered promiscuous mode
- Mon Jan 24 08:44:36 2022 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
- Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /etc/hosts - 4 addresses
- Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /tmp/hosts/dhcp.cfg01411c.1889 - 11 addresses
- Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /tmp/hosts/odhcpd - 0 addresses
- Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /tmp/hosts/dhcp.cfg01411c - 10 addresses
- Mon Jan 24 08:44:37 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of loopback (lo)
- Mon Jan 24 08:44:37 2022 kern.info kernel: [ 40.964660] ath10k_pci 0001:01:00.0: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
- Mon Jan 24 08:44:37 2022 daemon.info procd: - init complete -
- Mon Jan 24 08:44:37 2022 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
- Mon Jan 24 08:44:37 2022 kern.info kernel: [ 41.259022] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
- Mon Jan 24 08:44:37 2022 kern.info kernel: [ 41.259210] br-iot: port 2(wlan1) entered blocking state
- Mon Jan 24 08:44:37 2022 kern.info kernel: [ 41.264517] br-iot: port 2(wlan1) entered forwarding state
- Mon Jan 24 08:44:37 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) --> new PHY
- Mon Jan 24 08:44:37 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wan (eth0.2)
- Mon Jan 24 08:44:38 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on IOT thus we don't announce a default route!
- Mon Jan 24 08:44:38 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:44:38 2022 user.notice firewall: Reloading firewall due to ifup of wg_lan (wg_lan)
- Mon Jan 24 08:44:40 2022 daemon.err dawn[2964]: New connection
- Mon Jan 24 08:44:43 2022 kern.warn kernel: [ 47.188382] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
- Mon Jan 24 08:44:43 2022 kern.warn kernel: [ 47.188457] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
- Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.270374] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
- Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.271204] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
- Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.654107] ath10k_pci 0000:01:00.0: rts threshold -1
- Mon Jan 24 08:44:43 2022 kern.warn kernel: [ 47.654980] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
- Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.685088] br-lan: port 2(wlan0) entered blocking state
- Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.685113] br-lan: port 2(wlan0) entered disabled state
- Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.689716] device wlan0 entered promiscuous mode
- Mon Jan 24 08:44:43 2022 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
- Mon Jan 24 08:44:44 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wg_lan (wg_lan)
- Mon Jan 24 08:44:44 2022 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.090241] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.090402] br-lan: port 2(wlan0) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.095734] br-lan: port 2(wlan0) entered forwarding state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.103718] br-guest: port 2(wlan0-1) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.106255] br-guest: port 2(wlan0-1) entered disabled state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.112249] device wlan0-1 entered promiscuous mode
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.129844] ath10k_pci 0000:01:00.0: rts threshold -1
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.133897] br-guest: port 2(wlan0-1) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.133923] br-guest: port 2(wlan0-1) entered forwarding state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.302310] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-1: link becomes ready
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.304767] br-iot: port 3(wlan0-2) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.307789] br-iot: port 3(wlan0-2) entered disabled state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.313510] device wlan0-2 entered promiscuous mode
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.325751] ath10k_pci 0000:01:00.0: rts threshold -1
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.334181] br-iot: port 3(wlan0-2) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.334205] br-iot: port 3(wlan0-2) entered forwarding state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.437558] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-2: link becomes ready
- Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ENABLED
- Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan0: AP-ENABLED
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.444681] br-lan: port 3(wlan1-1) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.444705] br-lan: port 3(wlan1-1) entered disabled state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.449368] device wlan1-1 entered promiscuous mode
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.469554] ath10k_pci 0001:01:00.0: rts threshold -1
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.471852] br-lan: port 3(wlan1-1) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.473646] br-lan: port 3(wlan1-1) entered forwarding state
- Mon Jan 24 08:44:44 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wan6 (eth0.2)
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.551197] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1-1: link becomes ready
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.558633] br-guest: port 3(wlan1-2) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.558659] br-guest: port 3(wlan1-2) entered disabled state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.564471] device wlan1-2 entered promiscuous mode
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.570839] ath10k_pci 0001:01:00.0: rts threshold -1
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.576061] br-guest: port 3(wlan1-2) entered blocking state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.578811] br-guest: port 3(wlan1-2) entered forwarding state
- Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.660386] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1-2: link becomes ready
- Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
- Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan1: AP-ENABLED
- Mon Jan 24 08:44:45 2022 daemon.notice netifd: Network device 'wlan0' link is up
- Mon Jan 24 08:44:45 2022 daemon.notice netifd: Network device 'wlan0-1' link is up
- Mon Jan 24 08:44:45 2022 daemon.notice netifd: Network device 'wlan0-2' link is up
- Mon Jan 24 08:44:46 2022 daemon.notice netifd: Network device 'wlan1' link is up
- Mon Jan 24 08:44:46 2022 daemon.notice netifd: Network device 'wlan1-1' link is up
- Mon Jan 24 08:44:46 2022 daemon.notice netifd: Network device 'wlan1-2' link is up
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[913]: exiting on receipt of SIGTERM
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: Connected to system UBus
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: started, version 2.85 cachesize 150
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: DNS service limited to local subnets
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: UBus support enabled: connected to system bus
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCP, IP range 192.168.112.100 -- 192.168.112.249, lease time 12h
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCP, IP range 192.168.113.100 -- 192.168.113.249, lease time 12h
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCP, IP range 192.168.111.100 -- 192.168.111.249, lease time 12h
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain test
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain onion
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain localhost
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain local
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain invalid
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain bind
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain lan
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 0 addresses
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 0 addresses
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
- Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
- Mon Jan 24 08:44:50 2022 daemon.info hostapd: wlan1-1: STA 80:1f:02:ae:f9:e9 IEEE 802.11: authenticated
- Mon Jan 24 08:44:50 2022 daemon.info hostapd: wlan1-1: STA 80:1f:02:ae:f9:e9 IEEE 802.11: associated (aid 1)
- Mon Jan 24 08:44:50 2022 daemon.notice hostapd: wlan1-1: AP-STA-CONNECTED 80:1f:02:ae:f9:e9
- Mon Jan 24 08:44:50 2022 daemon.info hostapd: wlan1-1: STA 80:1f:02:ae:f9:e9 WPA: pairwise key handshake completed (RSN)
- Mon Jan 24 08:44:50 2022 kern.warn kernel: [ 54.429715] ath10k_pci 0001:01:00.0: Invalid peer id 1 or peer stats buffer, peer: 9be8cb55 sta: 00000000
- Mon Jan 24 08:44:50 2022 daemon.info dnsmasq-dhcp[4831]: DHCPREQUEST(br-lan) 192.168.111.159 80:1f:02:ae:f9:e9
- Mon Jan 24 08:44:50 2022 daemon.info dnsmasq-dhcp[4831]: DHCPACK(br-lan) 192.168.111.159 80:1f:02:ae:f9:e9 LUNA
- Mon Jan 24 08:44:50 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
- Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
- Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 111.168.192.in-addr.arpa.
- Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
- Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
- Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 113.168.192.in-addr.arpa.
- Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 112.168.192.in-addr.arpa.
- Mon Jan 24 08:44:53 2022 daemon.notice unbound: [5174:0] notice: init module 0: iterator
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.info unbound: [5174:0] info: start of service (unbound 1.13.2).
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:44:54 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on IOT thus we don't announce a default route!
- Mon Jan 24 08:44:54 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: service stopped (unbound 1.13.2).
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 0: 2 queries, 0 answers from cache, 2 recursions, 0 prefetch, 0 rejected by ip ratelimiting
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 0: requestlist max 1 avg 0.5 exceeded 0 jostled 0
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 1: 4 queries, 0 answers from cache, 4 recursions, 0 prefetch, 0 rejected by ip ratelimiting
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 1: requestlist max 2 avg 0.75 exceeded 0 jostled 0
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: average recursion processing time 0.171113 sec
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: histogram of recursion processing times
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: [25%]=0 median[50%]=0 [75%]=0
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: lower(secs) upper(secs) recursions
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: 0.065536 0.131072 1
- Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: 0.131072 0.262144 1
- Mon Jan 24 08:44:54 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:44:58 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:44:59 2022 authpriv.info dropbear[5489]: Child connection from 192.168.111.165:49508
- Mon Jan 24 08:45:00 2022 authpriv.notice dropbear[5489]: Password auth succeeded for 'root' from 192.168.111.165:49508
- Mon Jan 24 08:45:00 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
- Mon Jan 24 08:45:00 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 2 addresses
- Mon Jan 24 08:45:00 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
- Mon Jan 24 08:45:00 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
- Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
- Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
- Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 111.168.192.in-addr.arpa.
- Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
- Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
- Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 113.168.192.in-addr.arpa.
- Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 112.168.192.in-addr.arpa.
- Mon Jan 24 08:45:01 2022 daemon.notice unbound: [5530:0] notice: init module 0: iterator
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.info unbound: [5530:0] info: start of service (unbound 1.13.2).
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: service stopped (unbound 1.13.2).
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 0: 19 queries, 3 answers from cache, 16 recursions, 0 prefetch, 0 rejected by ip ratelimiting
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 0: requestlist max 10 avg 3 exceeded 0 jostled 0
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: average recursion processing time 0.118306 sec
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: histogram of recursion processing times
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: [25%]=0.032768 median[50%]=0.098304 [75%]=0.209715
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: lower(secs) upper(secs) recursions
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.000512 0.001024 2
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.001024 0.002048 1
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.016384 0.032768 1
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.032768 0.065536 3
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.065536 0.131072 2
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.131072 0.262144 5
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.262144 0.524288 2
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 1: 12 queries, 2 answers from cache, 10 recursions, 0 prefetch, 0 rejected by ip ratelimiting
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 1: requestlist max 8 avg 2.5 exceeded 0 jostled 0
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: average recursion processing time 0.269782 sec
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: histogram of recursion processing times
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: [25%]=0.152917 median[50%]=0.262144 [75%]=0.393216
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: lower(secs) upper(secs) recursions
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.000512 0.001024 1
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.065536 0.131072 1
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.131072 0.262144 3
- Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.262144 0.524288 5
- Mon Jan 24 08:45:42 2022 daemon.err uhttpd[1452]: luci: accepted login on /admin/network/network for root from 192.168.111.165
- Mon Jan 24 08:45:44 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPDISCOVER(br-lan) 58:24:29:6e:c4:b2
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPOFFER(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPDISCOVER(br-lan) 58:24:29:6e:c4:b2
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPOFFER(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPDISCOVER(br-lan) 58:24:29:6e:c4:b2
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPOFFER(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPREQUEST(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
- Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPACK(br-lan) 192.168.111.169 58:24:29:6e:c4:b2 Pixel-4a
- Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
- Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
- Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 111.168.192.in-addr.arpa.
- Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
- Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
- Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 113.168.192.in-addr.arpa.
- Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 112.168.192.in-addr.arpa.
- Mon Jan 24 08:45:48 2022 daemon.notice unbound: [6003:0] notice: init module 0: iterator
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.info unbound: [6003:0] info: start of service (unbound 1.13.2).
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
- Mon Jan 24 08:48:06 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:48:06 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on IOT thus we don't announce a default route!
- Mon Jan 24 08:48:29 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
- Mon Jan 24 08:48:29 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 2 addresses
- Mon Jan 24 08:48:29 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
- Mon Jan 24 08:48:29 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
- Mon Jan 24 08:52:40 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Mon Jan 24 08:52:59 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
- Mon Jan 24 08:52:59 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 4 addresses
- Mon Jan 24 08:52:59 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
- Mon Jan 24 08:52:59 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
Add Comment
Please, Sign In to add comment