Guest User

Untitled

a guest
Jan 24th, 2022
20
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 75.02 KB | None | 0 0
  1. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057236] TCP: Hash tables configured (established 4096 bind 4096)
  2. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057336] UDP hash table entries: 256 (order: 1, 8192 bytes, linear)
  3. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057371] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes, linear)
  4. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057626] NET: Registered protocol family 1
  5. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.057687] PCI: CLS 0 bytes, default 64
  6. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.059078] workingset: timestamp_bits=14 max_order=17 bucket_order=3
  7. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.066152] squashfs: version 4.0 (2009/01/31) Phillip Lougher
  8. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.066167] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
  9. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.106320] qcom-pcie 1b500000.pci: 1b500000.pci supply vdda not found, using dummy regulator
  10. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.106475] qcom-pcie 1b500000.pci: 1b500000.pci supply vdda_phy not found, using dummy regulator
  11. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.106592] qcom-pcie 1b500000.pci: 1b500000.pci supply vdda_refclk not found, using dummy regulator
  12. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.106866] qcom-pcie 1b500000.pci: host bridge /soc/pci@1b500000 ranges:
  13. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.106892] qcom-pcie 1b500000.pci: Parsing ranges property...
  14. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.106941] qcom-pcie 1b500000.pci: IO 0x0fe00000..0x0fefffff -> 0x0fe00000
  15. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.106979] qcom-pcie 1b500000.pci: MEM 0x08000000..0x0fdfffff -> 0x08000000
  16. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328658] qcom-pcie 1b500000.pci: Link up
  17. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328828] qcom-pcie 1b500000.pci: PCI host bridge to bus 0000:00
  18. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328851] pci_bus 0000:00: root bus resource [bus 00-ff]
  19. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328871] pci_bus 0000:00: root bus resource [io 0x0000-0xfffff] (bus address [0xfe00000-0xfefffff])
  20. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328887] pci_bus 0000:00: root bus resource [mem 0x08000000-0x0fdfffff]
  21. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.328904] pci_bus 0000:00: scanning bus
  22. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.328952] pci 0000:00:00.0: [17cb:0101] type 01 class 0xff0000
  23. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.329125] pci 0000:00:00.0: supports D1
  24. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.329141] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
  25. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.329162] pci 0000:00:00.0: PME# disabled
  26. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.333386] pci_bus 0000:00: fixups for bus
  27. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.333409] PCI: bus0: Fast back to back transfers disabled
  28. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.333430] pci 0000:00:00.0: scanning [bus 01-ff] behind bridge, pass 0
  29. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.333580] pci_bus 0000:01: scanning bus
  30. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.333762] pci 0000:01:00.0: [168c:0046] type 00 class 0x028000
  31. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.334119] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
  32. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.335269] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold
  33. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.335317] pci 0000:01:00.0: PME# disabled
  34. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339551] pci_bus 0000:01: fixups for bus
  35. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339623] PCI: bus1: Fast back to back transfers disabled
  36. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339638] pci_bus 0000:01: bus scan returning with max=01
  37. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339657] pci 0000:00:00.0: scanning [bus 01-ff] behind bridge, pass 1
  38. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.339674] pci_bus 0000:00: bus scan returning with max=ff
  39. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339709] pci 0000:00:00.0: BAR 8: assigned [mem 0x08000000-0x081fffff]
  40. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339735] pci 0000:01:00.0: BAR 0: assigned [mem 0x08000000-0x081fffff 64bit]
  41. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339863] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
  42. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.339888] pci 0000:00:00.0: bridge window [mem 0x08000000-0x081fffff]
  43. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.340101] pcieport 0000:00:00.0: assign IRQ: got 35
  44. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.340881] pcieport 0000:00:00.0: AER: enabled with IRQ 36
  45. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.341493] qcom-pcie 1b700000.pci: 1b700000.pci supply vdda not found, using dummy regulator
  46. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.341625] qcom-pcie 1b700000.pci: 1b700000.pci supply vdda_phy not found, using dummy regulator
  47. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 0.341762] qcom-pcie 1b700000.pci: 1b700000.pci supply vdda_refclk not found, using dummy regulator
  48. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.342037] qcom-pcie 1b700000.pci: host bridge /soc/pci@1b700000 ranges:
  49. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.342062] qcom-pcie 1b700000.pci: Parsing ranges property...
  50. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.342102] qcom-pcie 1b700000.pci: IO 0x31e00000..0x31efffff -> 0x31e00000
  51. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.342138] qcom-pcie 1b700000.pci: MEM 0x2e000000..0x31dfffff -> 0x2e000000
  52. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570452] qcom-pcie 1b700000.pci: Link up
  53. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570611] qcom-pcie 1b700000.pci: PCI host bridge to bus 0001:00
  54. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570631] pci_bus 0001:00: root bus resource [bus 00-ff]
  55. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570648] pci_bus 0001:00: root bus resource [mem 0x2e000000-0x31dfffff]
  56. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.570663] pci_bus 0001:00: scanning bus
  57. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570707] pci 0001:00:00.0: [17cb:0101] type 01 class 0xff0000
  58. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570864] pci 0001:00:00.0: supports D1
  59. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.570878] pci 0001:00:00.0: PME# supported from D0 D1 D3hot
  60. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.570898] pci 0001:00:00.0: PME# disabled
  61. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.575057] pci_bus 0001:00: fixups for bus
  62. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.575078] PCI: bus0: Fast back to back transfers disabled
  63. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.575097] pci 0001:00:00.0: scanning [bus 01-ff] behind bridge, pass 0
  64. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.575247] pci_bus 0001:01: scanning bus
  65. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.575440] pci 0001:01:00.0: [168c:0046] type 00 class 0x028000
  66. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.575819] pci 0001:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
  67. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.577055] pci 0001:01:00.0: PME# supported from D0 D3hot D3cold
  68. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.577104] pci 0001:01:00.0: PME# disabled
  69. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.577360] pci 0001:01:00.0: 2.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s x1 link at 0001:00:00.0 (capable of 4.000 Gb/s with 5 GT/s x1 link)
  70. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581379] pci_bus 0001:01: fixups for bus
  71. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581457] PCI: bus1: Fast back to back transfers disabled
  72. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581472] pci_bus 0001:01: bus scan returning with max=01
  73. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581489] pci 0001:00:00.0: scanning [bus 01-ff] behind bridge, pass 1
  74. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581506] pci_bus 0001:00: bus scan returning with max=ff
  75. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581533] pci 0001:00:00.0: BAR 8: assigned [mem 0x2e000000-0x2e1fffff]
  76. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581557] pci 0001:01:00.0: BAR 0: assigned [mem 0x2e000000-0x2e1fffff 64bit]
  77. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581689] pci 0001:00:00.0: PCI bridge to [bus 01-ff]
  78. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.581709] pci 0001:00:00.0: bridge window [mem 0x2e000000-0x2e1fffff]
  79. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 0.581899] pcieport 0001:00:00.0: assign IRQ: got 37
  80. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.582644] pcieport 0001:00:00.0: AER: enabled with IRQ 38
  81. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585293] L2 @ QSB rate. Forcing new rate.
  82. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585510] L2 @ 384000 KHz
  83. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585695] CPU0 @ 800000 KHz
  84. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585707] CPU1 @ QSB rate. Forcing new rate.
  85. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.585838] CPU1 @ 384000 KHz
  86. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.589566] gsbi 16300000.gsbi: GSBI port protocol: 6 crci: 0
  87. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.591822] Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled
  88. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592629] msm_serial 16340000.serial: msm_serial: detected port #0
  89. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592690] msm_serial 16340000.serial: uartclk = 7372800
  90. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592761] 16340000.serial: ttyMSM0 at MMIO 0x16340000 (irq = 39, base_baud = 460800) is a MSM
  91. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 0.592799] msm_serial: console setup on port #0
  92. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.376942] printk: console [ttyMSM0] enabled
  93. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.381908] msm_serial: driver initialized
  94. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.391330] loop: module loaded
  95. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.393010] nand: device found, Manufacturer ID: 0x01, Chip ID: 0xa1
  96. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.393371] nand: AMD/Spansion S34MS01G2
  97. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.399880] nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
  98. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.403971] 8 fixed-partitions partitions found on MTD device qcom_nand.0
  99. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.411167] Creating 8 MTD partitions on "qcom_nand.0":
  100. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.418129] 0x000000000000-0x000000c80000 : "qcadata"
  101. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.428413] random: fast init done
  102. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.444984] 0x000000c80000-0x000001180000 : "APPSBL"
  103. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.454290] 0x000001180000-0x000001200000 : "APPSBLENV"
  104. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.456118] 0x000001200000-0x000001340000 : "art"
  105. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.461351] 0x000001340000-0x000001480000 : "artbak"
  106. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.466268] 0x000001480000-0x000001880000 : "kernel"
  107. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.475900] 0x000001880000-0x000007900000 : "ubi"
  108. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 1.638004] 0x000007900000-0x000008000000 : "reserve"
  109. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.652316] libphy: ipq8064_mdio_bus: probed
  110. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 1.667529] switch0: Atheros AR8337 rev. 2 switch registered on 37000000.mdio-mii
  111. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 2.509618] ar8327: qca,phy-rgmii-en is not specified
  112. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.510198] libphy: Fixed MDIO Bus: probed
  113. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.514531] ipq806x-gmac-dwmac 37200000.ethernet: IRQ eth_wake_irq not found
  114. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.517650] ipq806x-gmac-dwmac 37200000.ethernet: IRQ eth_lpi not found
  115. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 2.525706] ipq806x-gmac-dwmac 37200000.ethernet: PTP uses main clock
  116. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.531838] ipq806x-gmac-dwmac 37200000.ethernet: User ID: 0x10, Synopsys ID: 0x37
  117. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.537883] ipq806x-gmac-dwmac 37200000.ethernet: DWMAC1000
  118. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.545327] ipq806x-gmac-dwmac 37200000.ethernet: DMA HW capability register supported
  119. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.551070] ipq806x-gmac-dwmac 37200000.ethernet: RX Checksum Offload Engine supported
  120. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.558878] ipq806x-gmac-dwmac 37200000.ethernet: COE Type 2
  121. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.566750] ipq806x-gmac-dwmac 37200000.ethernet: TX Checksum insertion supported
  122. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.572508] ipq806x-gmac-dwmac 37200000.ethernet: Wake-Up On Lan supported
  123. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.579968] ipq806x-gmac-dwmac 37200000.ethernet: Enhanced/Alternate descriptors
  124. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.586745] ipq806x-gmac-dwmac 37200000.ethernet: Enabled extended descriptors
  125. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.594274] ipq806x-gmac-dwmac 37200000.ethernet: Ring mode enabled
  126. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.601240] ipq806x-gmac-dwmac 37200000.ethernet: Enable RX Mitigation via HW Watchdog Timer
  127. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.608408] ipq806x-gmac-dwmac 37400000.ethernet: IRQ eth_wake_irq not found
  128. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.616188] ipq806x-gmac-dwmac 37400000.ethernet: IRQ eth_lpi not found
  129. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 2.623369] ipq806x-gmac-dwmac 37400000.ethernet: PTP uses main clock
  130. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.629770] ipq806x-gmac-dwmac 37400000.ethernet: User ID: 0x10, Synopsys ID: 0x37
  131. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.636161] ipq806x-gmac-dwmac 37400000.ethernet: DWMAC1000
  132. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.643601] ipq806x-gmac-dwmac 37400000.ethernet: DMA HW capability register supported
  133. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.649332] ipq806x-gmac-dwmac 37400000.ethernet: RX Checksum Offload Engine supported
  134. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.657128] ipq806x-gmac-dwmac 37400000.ethernet: COE Type 2
  135. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.665031] ipq806x-gmac-dwmac 37400000.ethernet: TX Checksum insertion supported
  136. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.670771] ipq806x-gmac-dwmac 37400000.ethernet: Wake-Up On Lan supported
  137. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.678214] ipq806x-gmac-dwmac 37400000.ethernet: Enhanced/Alternate descriptors
  138. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.684994] ipq806x-gmac-dwmac 37400000.ethernet: Enabled extended descriptors
  139. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.692472] ipq806x-gmac-dwmac 37400000.ethernet: Ring mode enabled
  140. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.699584] ipq806x-gmac-dwmac 37400000.ethernet: Enable RX Mitigation via HW Watchdog Timer
  141. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.706745] i2c /dev entries driver
  142. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.716786] cpuidle: enable-method property 'qcom,kpss-acc-v1' found operations
  143. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.717672] cpuidle: enable-method property 'qcom,kpss-acc-v1' found operations
  144. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.725555] sdhci: Secure Digital Host Controller Interface driver
  145. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.732137] sdhci: Copyright(c) Pierre Ossman
  146. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.738476] sdhci-pltfm: SDHCI platform and OF driver helper
  147. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.745228] NET: Registered protocol family 10
  148. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.749943] Segment Routing with IPv6
  149. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.752887] NET: Registered protocol family 17
  150. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.756903] 8021q: 802.1Q VLAN Support v1.8
  151. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.760912] Registering SWP/SWPB emulation handler
  152. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.790960] qcom_rpm 108000.rpm: RPM firmware 3.0.16777364
  153. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.804946] s1a: Bringing 0uV into 1050000-1050000uV
  154. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.805231] s1a: supplied by regulator-dummy
  155. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.809125] s1b: Bringing 0uV into 1050000-1050000uV
  156. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.813548] s1b: supplied by regulator-dummy
  157. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.818312] s2a: Bringing 0uV into 775000-775000uV
  158. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.822659] s2a: supplied by regulator-dummy
  159. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.827245] s2b: Bringing 0uV into 775000-775000uV
  160. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 2.831674] s2b: supplied by regulator-dummy
  161. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.846438] UBI: auto-attach mtd6
  162. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.846460] ubi0: attaching mtd6
  163. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 2.910147] random: crng init done
  164. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.549012] ubi0: scanning is finished
  165. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.558649] ubi0: attached mtd6 (name "ubi", size 96 MiB)
  166. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.558668] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
  167. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.563016] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
  168. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.569862] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
  169. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.576700] ubi0: good PEBs: 772, bad PEBs: 0, corrupted PEBs: 0
  170. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.583489] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128
  171. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.589667] ubi0: max/mean erase counter: 21/13, WL threshold: 4096, image sequence number: 1635066095
  172. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.596754] ubi0: available PEBs: 0, total reserved PEBs: 772, PEBs reserved for bad PEB handling: 20
  173. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.606112] ubi0: background thread "ubi_bgt0d" started, PID 69
  174. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.606757] block ubiblock0_0: created from ubi0:0(rootfs)
  175. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 3.621001] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
  176. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.626621] hctosys: unable to open rtc device (rtc0)
  177. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.638654] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
  178. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.639798] Freeing unused kernel memory: 1024K
  179. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 3.673786] Run /sbin/init as init process
  180. Mon Jan 24 08:44:22 2022 user.info kernel: [ 4.018156] init: Console is alive
  181. Mon Jan 24 08:44:22 2022 user.info kernel: [ 4.018285] init: - watchdog -
  182. Mon Jan 24 08:44:22 2022 user.info kernel: [ 4.582418] kmodloader: loading kernel modules from /etc/modules-boot.d/*
  183. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.678892] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
  184. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 4.685377] SCSI subsystem initialized
  185. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 4.694164] libata version 3.00 loaded.
  186. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 4.698591] ahci 29000000.sata: 29000000.sata supply ahci not found, using dummy regulator
  187. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 4.698673] ahci 29000000.sata: 29000000.sata supply phy not found, using dummy regulator
  188. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 4.705869] ahci 29000000.sata: 29000000.sata supply target not found, using dummy regulator
  189. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.714454] ahci 29000000.sata: forcing port_map 0x0 -> 0x1
  190. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.722514] ahci 29000000.sata: AHCI 0001.0300 32 slots 1 ports 6 Gbps 0x1 impl platform mode
  191. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.727876] ahci 29000000.sata: flags: ncq sntf pm led clo only pmp pio slum part ccc apst
  192. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.737037] scsi host0: ahci
  193. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 4.744911] ata1: SATA max UDMA/133 mmio [mem 0x29000000-0x2900017f] port 0x100 irq 26
  194. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.076055] ata1: SATA link down (SStatus 0 SControl 300)
  195. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.081580] ehci-fsl: Freescale EHCI Host controller driver
  196. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.083814] ehci-platform: EHCI generic platform driver
  197. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.091362] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
  198. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.092070] ohci-platform: OHCI generic platform driver
  199. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.100057] dwc3-qcom 110f8800.usb3: IRQ hs_phy_irq not found
  200. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.102550] dwc3-qcom 110f8800.usb3: IRQ dp_hs_phy_irq not found
  201. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.108556] dwc3-qcom 110f8800.usb3: IRQ dm_hs_phy_irq not found
  202. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.114630] dwc3-qcom 110f8800.usb3: IRQ ss_phy_irq not found
  203. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.122747] dwc3-qcom 100f8800.usb3: IRQ hs_phy_irq not found
  204. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.126243] dwc3-qcom 100f8800.usb3: IRQ dp_hs_phy_irq not found
  205. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.131955] dwc3-qcom 100f8800.usb3: IRQ dm_hs_phy_irq not found
  206. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.138029] dwc3-qcom 100f8800.usb3: IRQ ss_phy_irq not found
  207. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.146890] dwc3 11000000.dwc3: Failed to get clk 'ref': -2
  208. Mon Jan 24 08:44:22 2022 kern.err kernel: [ 5.212839] dwc3 10000000.dwc3: Failed to get clk 'ref': -2
  209. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.281504] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
  210. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.281567] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1
  211. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.286217] xhci-hcd xhci-hcd.0.auto: hcc params 0x0228f065 hci version 0x100 quirks 0x0000000002010010
  212. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.293585] xhci-hcd xhci-hcd.0.auto: irq 43, io mem 0x11000000
  213. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.303108] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
  214. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.308805] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2
  215. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.314345] xhci-hcd xhci-hcd.0.auto: Host supports USB 3.0 SuperSpeed
  216. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.322496] hub 1-0:1.0: USB hub found
  217. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.328539] hub 1-0:1.0: 1 port detected
  218. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.332466] usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
  219. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.337355] hub 2-0:1.0: USB hub found
  220. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.344380] hub 2-0:1.0: 1 port detected
  221. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.348138] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
  222. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.351948] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 3
  223. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.357434] xhci-hcd xhci-hcd.1.auto: hcc params 0x0228f065 hci version 0x100 quirks 0x0000000002010010
  224. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.364883] xhci-hcd xhci-hcd.1.auto: irq 44, io mem 0x10000000
  225. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.374398] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
  226. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.380069] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 4
  227. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.385691] xhci-hcd xhci-hcd.1.auto: Host supports USB 3.0 SuperSpeed
  228. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.393663] hub 3-0:1.0: USB hub found
  229. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.399790] hub 3-0:1.0: 1 port detected
  230. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.403808] usb usb4: We don't know the algorithms for LPM for this host, disabling LPM.
  231. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.407912] hub 4-0:1.0: USB hub found
  232. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 5.417025] hub 4-0:1.0: 1 port detected
  233. Mon Jan 24 08:44:22 2022 user.info kernel: [ 5.420884] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
  234. Mon Jan 24 08:44:22 2022 user.info kernel: [ 5.429476] init: - preinit -
  235. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.038354] dwmac1000: Master AXI performs any burst length
  236. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.038392] ipq806x-gmac-dwmac 37400000.ethernet eth1: No Safety Features support found
  237. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.042741] ipq806x-gmac-dwmac 37400000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
  238. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.050957] ipq806x-gmac-dwmac 37400000.ethernet eth1: registered PTP clock
  239. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.059813] ipq806x-gmac-dwmac 37400000.ethernet eth1: configuring for fixed/sgmii link mode
  240. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.067577] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
  241. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 7.075412] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  242. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.221468] UBIFS (ubi0:1): Mounting in unauthenticated mode
  243. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.221620] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 158
  244. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.271266] UBIFS (ubi0:1): recovery needed
  245. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.373040] UBIFS (ubi0:1): recovery completed
  246. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.373131] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
  247. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.376476] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
  248. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.384349] UBIFS (ubi0:1): FS size: 86089728 bytes (82 MiB, 678 LEBs), journal size 4317184 bytes (4 MiB, 34 LEBs)
  249. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.394251] UBIFS (ubi0:1): reserved for root: 4066230 bytes (3970 KiB)
  250. Mon Jan 24 08:44:22 2022 kern.notice kernel: [ 10.404473] UBIFS (ubi0:1): media format: w5/r0 (latest is w5/r0), UUID FAF08BA9-0D26-4440-ABDA-A84284E8EE54, small LPT model
  251. Mon Jan 24 08:44:22 2022 user.info kernel: [ 10.417987] mount_root: switching to ubifs overlay
  252. Mon Jan 24 08:44:22 2022 user.warn kernel: [ 10.434494] urandom-seed: Seeding with /etc/urandom.seed
  253. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 10.479091] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Down
  254. Mon Jan 24 08:44:22 2022 user.info kernel: [ 10.519648] procd: - early -
  255. Mon Jan 24 08:44:22 2022 user.info kernel: [ 10.519761] procd: - watchdog -
  256. Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.063404] procd: - watchdog -
  257. Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.067261] procd: - ubus -
  258. Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.154094] procd: - init -
  259. Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.888093] urngd: v1.0.2 started.
  260. Mon Jan 24 08:44:22 2022 user.info kernel: [ 11.915628] kmodloader: loading kernel modules from /etc/modules.d/*
  261. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 11.951255] Loading modules backported from Linux version v5.10.68-0-g4d8524048a35
  262. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 11.951280] Backport generated by backports.git v5.10.68-1-0-ga4f9ba32
  263. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 11.966895] xt_time: kernel timezone is -0000
  264. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.014146] PPP generic driver version 2.4.2
  265. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.015040] NET: Registered protocol family 24
  266. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.019208] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
  267. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.021731] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
  268. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 12.113423] ath10k_pci 0000:01:00.0: assign IRQ: got 35
  269. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.113444] ath10k 5.10 driver, optimized for CT firmware, probing pci device: 0x46.
  270. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.113904] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142)
  271. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 12.120299] ath10k_pci 0000:01:00.0: enabling bus mastering
  272. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.120833] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
  273. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.859736] ath10k_pci 0000:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
  274. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.859770] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
  275. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 12.870296] ath10k_pci 0000:01:00.0: firmware ver 10.4b-ct-9984-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 7ea63dc5
  276. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 15.200850] ath10k_pci 0000:01:00.0: board_file api 2 bmi_id 0:1 crc32 85498734
  277. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 18.752311] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  278. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 18.752338] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
  279. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 18.834658] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  280. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 18.835506] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  281. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.123884] ath10k_pci 0000:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
  282. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215529] ath: EEPROM regdomain sanitized
  283. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215549] ath: EEPROM regdomain: 0x64
  284. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215559] ath: EEPROM indicates we should expect a direct regpair map
  285. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215584] ath: Country alpha2 being used: 00
  286. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.215594] ath: Regpair used: 0x64
  287. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.224898] ath10k_pci 0001:01:00.0: assign IRQ: got 37
  288. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.224930] ath10k 5.10 driver, optimized for CT firmware, probing pci device: 0x46.
  289. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.225952] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142)
  290. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 19.231844] ath10k_pci 0001:01:00.0: enabling bus mastering
  291. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.232543] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
  292. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.824122] ath10k_pci 0001:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
  293. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.824160] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
  294. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 19.835660] ath10k_pci 0001:01:00.0: firmware ver 10.4b-ct-9984-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 7ea63dc5
  295. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 22.191545] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id 0:2 crc32 85498734
  296. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 25.774920] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  297. Mon Jan 24 08:44:22 2022 kern.warn kernel: [ 25.774947] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
  298. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 25.859366] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  299. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 25.860250] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  300. Mon Jan 24 08:44:22 2022 kern.info kernel: [ 26.155076] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
  301. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245243] ath: EEPROM regdomain sanitized
  302. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245260] ath: EEPROM regdomain: 0x64
  303. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245270] ath: EEPROM indicates we should expect a direct regpair map
  304. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245292] ath: Country alpha2 being used: 00
  305. Mon Jan 24 08:44:22 2022 kern.debug kernel: [ 26.245302] ath: Regpair used: 0x64
  306. Mon Jan 24 08:44:22 2022 user.info kernel: [ 26.259732] kmodloader: done loading kernel modules from /etc/modules.d/*
  307. Mon Jan 24 08:44:23 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  308. Mon Jan 24 08:44:23 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  309. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: Connected to system UBus
  310. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: started, version 2.85 cachesize 150
  311. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: DNS service limited to local subnets
  312. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
  313. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: UBus support enabled: connected to system bus
  314. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain test
  315. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain onion
  316. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain localhost
  317. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain local
  318. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain invalid
  319. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain bind
  320. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: using only locally-known addresses for domain lan
  321. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: read /etc/hosts - 4 addresses
  322. Mon Jan 24 08:44:23 2022 daemon.info dnsmasq[913]: read /tmp/hosts/dhcp.cfg01411c - 10 addresses
  323. Mon Jan 24 08:44:23 2022 authpriv.info dropbear[975]: Not backgrounding
  324. Mon Jan 24 08:44:24 2022 daemon.notice wpa_supplicant[1124]: Successfully initialized wpa_supplicant
  325. Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: 8021ad
  326. Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: 8021q
  327. Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: macvlan
  328. Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: veth
  329. Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: bridge
  330. Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: Network device
  331. Mon Jan 24 08:44:25 2022 user.notice : Added device handler type: tunnel
  332. Mon Jan 24 08:44:26 2022 daemon.notice procd: /etc/rc.d/S50uhttpd: 4+0 records in
  333. Mon Jan 24 08:44:26 2022 daemon.notice procd: /etc/rc.d/S50uhttpd: 4+0 records out
  334. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.886383] dwmac1000: Master AXI performs any burst length
  335. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.886412] ipq806x-gmac-dwmac 37400000.ethernet eth1: No Safety Features support found
  336. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.890766] ipq806x-gmac-dwmac 37400000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
  337. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.899089] ipq806x-gmac-dwmac 37400000.ethernet eth1: registered PTP clock
  338. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.907874] ipq806x-gmac-dwmac 37400000.ethernet eth1: configuring for fixed/sgmii link mode
  339. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.918524] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
  340. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.923435] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  341. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.940025] br-guest: port 1(eth1.20) entered blocking state
  342. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.940048] br-guest: port 1(eth1.20) entered disabled state
  343. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.945330] device eth1.20 entered promiscuous mode
  344. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.950427] device eth1 entered promiscuous mode
  345. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.962181] br-guest: port 1(eth1.20) entered blocking state
  346. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 29.962206] br-guest: port 1(eth1.20) entered forwarding state
  347. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' is enabled
  348. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' is setting up now
  349. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' is now up
  350. Mon Jan 24 08:44:26 2022 daemon.notice netifd: bridge 'br-guest' link is up
  351. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'GUEST' has link connectivity
  352. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.071287] br-iot: port 1(eth1.21) entered blocking state
  353. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.071311] br-iot: port 1(eth1.21) entered disabled state
  354. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.075899] device eth1.21 entered promiscuous mode
  355. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.095667] br-iot: port 1(eth1.21) entered blocking state
  356. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.095691] br-iot: port 1(eth1.21) entered forwarding state
  357. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' is enabled
  358. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' is setting up now
  359. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' is now up
  360. Mon Jan 24 08:44:26 2022 daemon.notice netifd: bridge 'br-iot' link is up
  361. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'IOT' has link connectivity
  362. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.249564] br-lan: port 1(eth1.1) entered blocking state
  363. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.249590] br-lan: port 1(eth1.1) entered disabled state
  364. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.256243] device eth1.1 entered promiscuous mode
  365. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.262175] br-lan: port 1(eth1.1) entered blocking state
  366. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.264101] br-lan: port 1(eth1.1) entered forwarding state
  367. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' is enabled
  368. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' is setting up now
  369. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' is now up
  370. Mon Jan 24 08:44:26 2022 daemon.notice netifd: bridge 'br-lan' link is up
  371. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'lan' has link connectivity
  372. Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth1.1' link is up
  373. Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth1.20' link is up
  374. Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth1.21' link is up
  375. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' is enabled
  376. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' is setting up now
  377. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' is now up
  378. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.308139] dwmac1000: Master AXI performs any burst length
  379. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.308167] ipq806x-gmac-dwmac 37200000.ethernet eth0: No Safety Features support found
  380. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.312525] ipq806x-gmac-dwmac 37200000.ethernet eth0: IEEE 1588-2008 Advanced Timestamp supported
  381. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.320707] ipq806x-gmac-dwmac 37200000.ethernet eth0: registered PTP clock
  382. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.329609] ipq806x-gmac-dwmac 37200000.ethernet eth0: configuring for fixed/rgmii link mode
  383. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.337301] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
  384. Mon Jan 24 08:44:26 2022 kern.info kernel: [ 30.347875] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  385. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' is enabled
  386. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' is setting up now
  387. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' is now up
  388. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan6' is enabled
  389. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan6' is setting up now
  390. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wg_lan' is setting up now
  391. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Network device 'eth1' link is up
  392. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Network device 'lo' link is up
  393. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
  394. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Network device 'eth0' link is up
  395. Mon Jan 24 08:44:26 2022 daemon.notice netifd: VLAN 'eth0.2' link is up
  396. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan' has link connectivity
  397. Mon Jan 24 08:44:26 2022 daemon.notice netifd: Interface 'wan6' has link connectivity
  398. Mon Jan 24 08:44:26 2022 user.notice firewall: Reloading firewall due to ifup of GUEST (br-guest)
  399. Mon Jan 24 08:44:26 2022 daemon.err odhcp6c[1562]: Failed to send RS (Address not available)
  400. Mon Jan 24 08:44:27 2022 kern.info kernel: [ 31.014344] IPv6: ADDRCONF(NETDEV_CHANGE): br-guest: link becomes ready
  401. Mon Jan 24 08:44:27 2022 kern.info kernel: [ 31.033845] IPv6: br-lan: IPv6 duplicate address fda5:5b5f:9b3::1 used by b0:7f:b9:3e:35:3a detected!
  402. Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
  403. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.286669] ath: EEPROM regdomain: 0x8348
  404. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.286705] ath: EEPROM indicates we should expect a country code
  405. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.289664] ath: doing EEPROM country->regdmn map search
  406. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.295825] ath: country maps to regdmn code: 0x3a
  407. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.301222] ath: Country alpha2 being used: US
  408. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.305909] ath: Regpair used: 0x3a
  409. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.310167] ath: regdomain 0x8348 dynamically updated by user
  410. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.313635] ath: EEPROM regdomain: 0x8348
  411. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.319458] ath: EEPROM indicates we should expect a country code
  412. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.323510] ath: doing EEPROM country->regdmn map search
  413. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.329531] ath: country maps to regdmn code: 0x3a
  414. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.334978] ath: Country alpha2 being used: US
  415. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.339502] ath: Regpair used: 0x3a
  416. Mon Jan 24 08:44:27 2022 kern.debug kernel: [ 31.344018] ath: regdomain 0x8348 dynamically updated by user
  417. Mon Jan 24 08:44:27 2022 daemon.err odhcp6c[1562]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
  418. Mon Jan 24 08:44:27 2022 daemon.err odhcpd[1242]: Failed to send to ff02::1%IOT@br-iot (Address not available)
  419. Mon Jan 24 08:44:27 2022 daemon.err odhcpd[1242]: Failed to send to ff02::1%lan@br-lan (Address not available)
  420. Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
  421. Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
  422. Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
  423. Mon Jan 24 08:44:27 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
  424. Mon Jan 24 08:44:27 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of GUEST (br-guest)
  425. Mon Jan 24 08:44:28 2022 daemon.notice netifd: Interface 'wg_lan' is now up
  426. Mon Jan 24 08:44:28 2022 daemon.notice netifd: Network device 'wg_lan' link is up
  427. Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
  428. Mon Jan 24 08:44:28 2022 user.notice firewall: Reloading firewall due to ifup of IOT (br-iot)
  429. Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
  430. Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
  431. Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
  432. Mon Jan 24 08:44:28 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
  433. Mon Jan 24 08:44:29 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of IOT (br-iot)
  434. Mon Jan 24 08:44:29 2022 daemon.warn procd: Seccomp support for umdns::instance1 not available
  435. Mon Jan 24 08:44:29 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  436. Mon Jan 24 08:44:30 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
  437. Mon Jan 24 08:44:30 2022 daemon.notice procd: /etc/rc.d/S81dawn: Starting Service...
  438. Mon Jan 24 08:44:30 2022 daemon.notice procd: /etc/rc.d/S81dawn: UMDNS with port 1026
  439. Mon Jan 24 08:44:30 2022 daemon.notice procd: /etc/rc.d/S81dawn: Dawn instance started!
  440. Mon Jan 24 08:44:30 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of lan (br-lan)
  441. Mon Jan 24 08:44:31 2022 daemon.err dawn[2964]: Connection established
  442. Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led USB 1
  443. Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led USB 2
  444. Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN
  445. Mon Jan 24 08:44:31 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led eSATA
  446. Mon Jan 24 08:44:36 2022 kern.warn kernel: [ 40.151789] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  447. Mon Jan 24 08:44:36 2022 kern.warn kernel: [ 40.151817] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
  448. Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.235911] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  449. Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.236768] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  450. Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.625611] ath10k_pci 0001:01:00.0: rts threshold -1
  451. Mon Jan 24 08:44:36 2022 kern.warn kernel: [ 40.625820] ath10k_pci 0001:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
  452. Mon Jan 24 08:44:36 2022 daemon.notice netifd: Interface 'wan6' is now up
  453. Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.654259] br-iot: port 2(wlan1) entered blocking state
  454. Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.654283] br-iot: port 2(wlan1) entered disabled state
  455. Mon Jan 24 08:44:36 2022 kern.info kernel: [ 40.658876] device wlan1 entered promiscuous mode
  456. Mon Jan 24 08:44:36 2022 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
  457. Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /etc/hosts - 4 addresses
  458. Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /tmp/hosts/dhcp.cfg01411c.1889 - 11 addresses
  459. Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /tmp/hosts/odhcpd - 0 addresses
  460. Mon Jan 24 08:44:37 2022 daemon.info dnsmasq[913]: read /tmp/hosts/dhcp.cfg01411c - 10 addresses
  461. Mon Jan 24 08:44:37 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of loopback (lo)
  462. Mon Jan 24 08:44:37 2022 kern.info kernel: [ 40.964660] ath10k_pci 0001:01:00.0: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
  463. Mon Jan 24 08:44:37 2022 daemon.info procd: - init complete -
  464. Mon Jan 24 08:44:37 2022 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
  465. Mon Jan 24 08:44:37 2022 kern.info kernel: [ 41.259022] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
  466. Mon Jan 24 08:44:37 2022 kern.info kernel: [ 41.259210] br-iot: port 2(wlan1) entered blocking state
  467. Mon Jan 24 08:44:37 2022 kern.info kernel: [ 41.264517] br-iot: port 2(wlan1) entered forwarding state
  468. Mon Jan 24 08:44:37 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) --> new PHY
  469. Mon Jan 24 08:44:37 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wan (eth0.2)
  470. Mon Jan 24 08:44:38 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on IOT thus we don't announce a default route!
  471. Mon Jan 24 08:44:38 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  472. Mon Jan 24 08:44:38 2022 user.notice firewall: Reloading firewall due to ifup of wg_lan (wg_lan)
  473. Mon Jan 24 08:44:40 2022 daemon.err dawn[2964]: New connection
  474. Mon Jan 24 08:44:43 2022 kern.warn kernel: [ 47.188382] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  475. Mon Jan 24 08:44:43 2022 kern.warn kernel: [ 47.188457] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
  476. Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.270374] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  477. Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.271204] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
  478. Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.654107] ath10k_pci 0000:01:00.0: rts threshold -1
  479. Mon Jan 24 08:44:43 2022 kern.warn kernel: [ 47.654980] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
  480. Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.685088] br-lan: port 2(wlan0) entered blocking state
  481. Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.685113] br-lan: port 2(wlan0) entered disabled state
  482. Mon Jan 24 08:44:43 2022 kern.info kernel: [ 47.689716] device wlan0 entered promiscuous mode
  483. Mon Jan 24 08:44:43 2022 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
  484. Mon Jan 24 08:44:44 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wg_lan (wg_lan)
  485. Mon Jan 24 08:44:44 2022 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
  486. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.090241] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  487. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.090402] br-lan: port 2(wlan0) entered blocking state
  488. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.095734] br-lan: port 2(wlan0) entered forwarding state
  489. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.103718] br-guest: port 2(wlan0-1) entered blocking state
  490. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.106255] br-guest: port 2(wlan0-1) entered disabled state
  491. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.112249] device wlan0-1 entered promiscuous mode
  492. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.129844] ath10k_pci 0000:01:00.0: rts threshold -1
  493. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.133897] br-guest: port 2(wlan0-1) entered blocking state
  494. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.133923] br-guest: port 2(wlan0-1) entered forwarding state
  495. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.302310] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-1: link becomes ready
  496. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.304767] br-iot: port 3(wlan0-2) entered blocking state
  497. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.307789] br-iot: port 3(wlan0-2) entered disabled state
  498. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.313510] device wlan0-2 entered promiscuous mode
  499. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.325751] ath10k_pci 0000:01:00.0: rts threshold -1
  500. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.334181] br-iot: port 3(wlan0-2) entered blocking state
  501. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.334205] br-iot: port 3(wlan0-2) entered forwarding state
  502. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.437558] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-2: link becomes ready
  503. Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ENABLED
  504. Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan0: AP-ENABLED
  505. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.444681] br-lan: port 3(wlan1-1) entered blocking state
  506. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.444705] br-lan: port 3(wlan1-1) entered disabled state
  507. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.449368] device wlan1-1 entered promiscuous mode
  508. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.469554] ath10k_pci 0001:01:00.0: rts threshold -1
  509. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.471852] br-lan: port 3(wlan1-1) entered blocking state
  510. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.473646] br-lan: port 3(wlan1-1) entered forwarding state
  511. Mon Jan 24 08:44:44 2022 user.notice nlbwmon: Reloading nlbwmon due to ifup of wan6 (eth0.2)
  512. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.551197] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1-1: link becomes ready
  513. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.558633] br-guest: port 3(wlan1-2) entered blocking state
  514. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.558659] br-guest: port 3(wlan1-2) entered disabled state
  515. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.564471] device wlan1-2 entered promiscuous mode
  516. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.570839] ath10k_pci 0001:01:00.0: rts threshold -1
  517. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.576061] br-guest: port 3(wlan1-2) entered blocking state
  518. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.578811] br-guest: port 3(wlan1-2) entered forwarding state
  519. Mon Jan 24 08:44:44 2022 kern.info kernel: [ 48.660386] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1-2: link becomes ready
  520. Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
  521. Mon Jan 24 08:44:44 2022 daemon.notice hostapd: wlan1: AP-ENABLED
  522. Mon Jan 24 08:44:45 2022 daemon.notice netifd: Network device 'wlan0' link is up
  523. Mon Jan 24 08:44:45 2022 daemon.notice netifd: Network device 'wlan0-1' link is up
  524. Mon Jan 24 08:44:45 2022 daemon.notice netifd: Network device 'wlan0-2' link is up
  525. Mon Jan 24 08:44:46 2022 daemon.notice netifd: Network device 'wlan1' link is up
  526. Mon Jan 24 08:44:46 2022 daemon.notice netifd: Network device 'wlan1-1' link is up
  527. Mon Jan 24 08:44:46 2022 daemon.notice netifd: Network device 'wlan1-2' link is up
  528. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[913]: exiting on receipt of SIGTERM
  529. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: Connected to system UBus
  530. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: started, version 2.85 cachesize 150
  531. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: DNS service limited to local subnets
  532. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
  533. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: UBus support enabled: connected to system bus
  534. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCP, IP range 192.168.112.100 -- 192.168.112.249, lease time 12h
  535. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCP, IP range 192.168.113.100 -- 192.168.113.249, lease time 12h
  536. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCP, IP range 192.168.111.100 -- 192.168.111.249, lease time 12h
  537. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain test
  538. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain onion
  539. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain localhost
  540. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain local
  541. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain invalid
  542. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain bind
  543. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: using only locally-known addresses for domain lan
  544. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
  545. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 0 addresses
  546. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
  547. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
  548. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
  549. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 0 addresses
  550. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
  551. Mon Jan 24 08:44:47 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
  552. Mon Jan 24 08:44:50 2022 daemon.info hostapd: wlan1-1: STA 80:1f:02:ae:f9:e9 IEEE 802.11: authenticated
  553. Mon Jan 24 08:44:50 2022 daemon.info hostapd: wlan1-1: STA 80:1f:02:ae:f9:e9 IEEE 802.11: associated (aid 1)
  554. Mon Jan 24 08:44:50 2022 daemon.notice hostapd: wlan1-1: AP-STA-CONNECTED 80:1f:02:ae:f9:e9
  555. Mon Jan 24 08:44:50 2022 daemon.info hostapd: wlan1-1: STA 80:1f:02:ae:f9:e9 WPA: pairwise key handshake completed (RSN)
  556. Mon Jan 24 08:44:50 2022 kern.warn kernel: [ 54.429715] ath10k_pci 0001:01:00.0: Invalid peer id 1 or peer stats buffer, peer: 9be8cb55 sta: 00000000
  557. Mon Jan 24 08:44:50 2022 daemon.info dnsmasq-dhcp[4831]: DHCPREQUEST(br-lan) 192.168.111.159 80:1f:02:ae:f9:e9
  558. Mon Jan 24 08:44:50 2022 daemon.info dnsmasq-dhcp[4831]: DHCPACK(br-lan) 192.168.111.159 80:1f:02:ae:f9:e9 LUNA
  559. Mon Jan 24 08:44:50 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  560. Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
  561. Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
  562. Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 111.168.192.in-addr.arpa.
  563. Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
  564. Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
  565. Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 113.168.192.in-addr.arpa.
  566. Mon Jan 24 08:44:53 2022 daemon.warn unbound: [5174:0] warning: duplicate local-zone 112.168.192.in-addr.arpa.
  567. Mon Jan 24 08:44:53 2022 daemon.notice unbound: [5174:0] notice: init module 0: iterator
  568. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  569. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  570. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
  571. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  572. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  573. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
  574. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  575. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  576. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
  577. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:0] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
  578. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  579. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  580. Mon Jan 24 08:44:53 2022 daemon.info unbound: [5174:0] info: start of service (unbound 1.13.2).
  581. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
  582. Mon Jan 24 08:44:53 2022 daemon.err unbound: [5174:1] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
  583. Mon Jan 24 08:44:54 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on IOT thus we don't announce a default route!
  584. Mon Jan 24 08:44:54 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  585. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: service stopped (unbound 1.13.2).
  586. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 0: 2 queries, 0 answers from cache, 2 recursions, 0 prefetch, 0 rejected by ip ratelimiting
  587. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 0: requestlist max 1 avg 0.5 exceeded 0 jostled 0
  588. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 1: 4 queries, 0 answers from cache, 4 recursions, 0 prefetch, 0 rejected by ip ratelimiting
  589. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: server stats for thread 1: requestlist max 2 avg 0.75 exceeded 0 jostled 0
  590. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: average recursion processing time 0.171113 sec
  591. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: histogram of recursion processing times
  592. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: [25%]=0 median[50%]=0 [75%]=0
  593. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: lower(secs) upper(secs) recursions
  594. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: 0.065536 0.131072 1
  595. Mon Jan 24 08:44:54 2022 daemon.info unbound: [5174:0] info: 0.131072 0.262144 1
  596. Mon Jan 24 08:44:54 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  597. Mon Jan 24 08:44:58 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  598. Mon Jan 24 08:44:59 2022 authpriv.info dropbear[5489]: Child connection from 192.168.111.165:49508
  599. Mon Jan 24 08:45:00 2022 authpriv.notice dropbear[5489]: Password auth succeeded for 'root' from 192.168.111.165:49508
  600. Mon Jan 24 08:45:00 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
  601. Mon Jan 24 08:45:00 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 2 addresses
  602. Mon Jan 24 08:45:00 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
  603. Mon Jan 24 08:45:00 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
  604. Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
  605. Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
  606. Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 111.168.192.in-addr.arpa.
  607. Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
  608. Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
  609. Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 113.168.192.in-addr.arpa.
  610. Mon Jan 24 08:45:01 2022 daemon.warn unbound: [5530:0] warning: duplicate local-zone 112.168.192.in-addr.arpa.
  611. Mon Jan 24 08:45:01 2022 daemon.notice unbound: [5530:0] notice: init module 0: iterator
  612. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  613. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  614. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
  615. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  616. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  617. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
  618. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:0] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
  619. Mon Jan 24 08:45:01 2022 daemon.info unbound: [5530:0] info: start of service (unbound 1.13.2).
  620. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  621. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  622. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
  623. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  624. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  625. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
  626. Mon Jan 24 08:45:01 2022 daemon.err unbound: [5530:1] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
  627. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: service stopped (unbound 1.13.2).
  628. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 0: 19 queries, 3 answers from cache, 16 recursions, 0 prefetch, 0 rejected by ip ratelimiting
  629. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 0: requestlist max 10 avg 3 exceeded 0 jostled 0
  630. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: average recursion processing time 0.118306 sec
  631. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: histogram of recursion processing times
  632. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: [25%]=0.032768 median[50%]=0.098304 [75%]=0.209715
  633. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: lower(secs) upper(secs) recursions
  634. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.000512 0.001024 2
  635. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.001024 0.002048 1
  636. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.016384 0.032768 1
  637. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.032768 0.065536 3
  638. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.065536 0.131072 2
  639. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.131072 0.262144 5
  640. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.262144 0.524288 2
  641. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 1: 12 queries, 2 answers from cache, 10 recursions, 0 prefetch, 0 rejected by ip ratelimiting
  642. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: server stats for thread 1: requestlist max 8 avg 2.5 exceeded 0 jostled 0
  643. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: average recursion processing time 0.269782 sec
  644. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: histogram of recursion processing times
  645. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: [25%]=0.152917 median[50%]=0.262144 [75%]=0.393216
  646. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: lower(secs) upper(secs) recursions
  647. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.000512 0.001024 1
  648. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.065536 0.131072 1
  649. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.131072 0.262144 3
  650. Mon Jan 24 08:45:42 2022 daemon.info unbound: [5530:0] info: 0.262144 0.524288 5
  651. Mon Jan 24 08:45:42 2022 daemon.err uhttpd[1452]: luci: accepted login on /admin/network/network for root from 192.168.111.165
  652. Mon Jan 24 08:45:44 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  653. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPDISCOVER(br-lan) 58:24:29:6e:c4:b2
  654. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPOFFER(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
  655. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPDISCOVER(br-lan) 58:24:29:6e:c4:b2
  656. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPOFFER(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
  657. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPDISCOVER(br-lan) 58:24:29:6e:c4:b2
  658. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPOFFER(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
  659. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPREQUEST(br-lan) 192.168.111.169 58:24:29:6e:c4:b2
  660. Mon Jan 24 08:45:47 2022 daemon.info dnsmasq-dhcp[4831]: DHCPACK(br-lan) 192.168.111.169 58:24:29:6e:c4:b2 Pixel-4a
  661. Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
  662. Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
  663. Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 111.168.192.in-addr.arpa.
  664. Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa.
  665. Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa.
  666. Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 113.168.192.in-addr.arpa.
  667. Mon Jan 24 08:45:48 2022 daemon.warn unbound: [6003:0] warning: duplicate local-zone 112.168.192.in-addr.arpa.
  668. Mon Jan 24 08:45:48 2022 daemon.notice unbound: [6003:0] notice: init module 0: iterator
  669. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  670. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  671. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
  672. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  673. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  674. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
  675. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:0] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
  676. Mon Jan 24 08:45:48 2022 daemon.info unbound: [6003:0] info: start of service (unbound 1.13.2).
  677. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 0.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  678. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 8.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  679. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 111.168.192.in-addr.arpa. ignored.
  680. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 1.0.0.0.3.b.9.0.f.5.b.5.5.a.d.f.ip6.arpa. ignored.
  681. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 9.0.0.0.1.b.9.9.6.3.d.e.a.e.d.f.ip6.arpa. ignored.
  682. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 113.168.192.in-addr.arpa. ignored.
  683. Mon Jan 24 08:45:48 2022 daemon.err unbound: [6003:1] error: duplicate forward zone 112.168.192.in-addr.arpa. ignored.
  684. Mon Jan 24 08:48:06 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  685. Mon Jan 24 08:48:06 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on IOT thus we don't announce a default route!
  686. Mon Jan 24 08:48:29 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
  687. Mon Jan 24 08:48:29 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 2 addresses
  688. Mon Jan 24 08:48:29 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
  689. Mon Jan 24 08:48:29 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
  690. Mon Jan 24 08:52:40 2022 daemon.warn odhcpd[1242]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  691. Mon Jan 24 08:52:59 2022 daemon.info dnsmasq[4831]: read /etc/hosts - 4 addresses
  692. Mon Jan 24 08:52:59 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/odhcpd - 4 addresses
  693. Mon Jan 24 08:52:59 2022 daemon.info dnsmasq[4831]: read /tmp/hosts/dhcp.cfg01411c - 13 addresses
  694. Mon Jan 24 08:52:59 2022 daemon.info dnsmasq-dhcp[4831]: read /etc/ethers - 0 addresses
Add Comment
Please, Sign In to add comment