root@OpenWrt:~# logread
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] Booting Linux on physical CPU 0x0
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.000000] Linux version 5.4.188 (builder@buildhost) (gcc version 8.4.0 (OpenWrt GCC 8.4.0 r16554-1d4dea6d4f)) #0 Sat Apr 16 12:59:34 2022
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] CPU: Feroceon 88FR131 [56251311] revision 1 (ARMv5TE), cr=0005397f
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] CPU: VIVT data cache, VIVT instruction cache
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] OF: fdt: Machine model: ZyXEL NSA310b
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] Memory policy: Data cache writeback
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 0.000000] On node 0 totalpages: 65536
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 0.000000] Normal zone: 576 pages used for memmap
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 0.000000] Normal zone: 65536 pages, LIFO batch:15
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] Built 1 zonelists, mobility grouping on. Total pages: 64960
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.000000] Kernel command line: console=ttyS0,115200
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] Dentry cache hash table entries: 32768 (order: 5, 131072 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] Inode-cache hash table entries: 16384 (order: 4, 65536 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] Memory: 250944K/262144K available (5165K kernel code, 179K rwdata, 832K rodata, 1024K init, 210K bss, 11200K reserved, 0K cma-reserved)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] NR_IRQS: 16, nr_irqs: 16, preallocated irqs: 16
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.000000] random: get_random_bytes called from 0xc0800b9c with crng_init=0
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000000] clocksource: orion_clocksource: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 9556302233 ns
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000008] sched_clock: 32 bits at 200MHz, resolution 5ns, wraps every 10737418237ns
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000035] Switching to timer-based delay loop, resolution 5ns
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000117] Calibrating delay loop (skipped), value calculated using timer frequency.. 400.00 BogoMIPS (lpj=2000000)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000136] pid_max: default: 32768 minimum: 301
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000328] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.000348] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.001206] CPU: Testing write buffer coherency: ok
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.002063] Setting up static identity map for 0x100000 - 0x10003c
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.002315] mvebu-soc-id: MVEBU SoC ID=0x6281, Rev=0x3
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.005519] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.005543] futex hash table entries: 256 (order: -1, 3072 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.005659] pinctrl core: initialized pinctrl subsystem
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.006744] NET: Registered protocol family 16
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.007094] DMA: preallocated 256 KiB pool for atomic coherent allocations
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.008012] cpuidle: using governor ladder
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.008341] Feroceon L2: Enabling L2
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.008383] Feroceon L2: Cache support initialised.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.012081] No ATAGs?
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.029927] SCSI subsystem initialized
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 0.030716] libata version 3.00 loaded.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.030933] usbcore: registered new interface driver usbfs
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.030990] usbcore: registered new interface driver hub
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.031037] usbcore: registered new device driver usb
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.033670] clocksource: Switched to clocksource orion_clocksource
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.034323] thermal_sys: Registered thermal governor 'step_wise'
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.034550] NET: Registered protocol family 2
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.034686] IP idents hash table entries: 4096 (order: 3, 32768 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035268] tcp_listen_portaddr_hash hash table entries: 512 (order: 0, 4096 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035298] TCP established hash table entries: 2048 (order: 1, 8192 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035329] TCP bind hash table entries: 2048 (order: 1, 8192 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035356] TCP: Hash tables configured (established 2048 bind 2048)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035431] UDP hash table entries: 256 (order: 0, 4096 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035454] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes, linear)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035598] NET: Registered protocol family 1
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.035626] PCI: CLS 0 bytes, default 32
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.037881] workingset: timestamp_bits=14 max_order=16 bucket_order=2
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.043136] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.043147] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.047411] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.052323] kirkwood-pinctrl f1010000.pin-controller: registered pinctrl driver
Thu Jun 9 17:53:33 2022 kern.err kernel: [ 0.053206] mvebu-gpio f1010140.gpio: IRQ index 3 not found
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.053586] mvebu-pcie mbus@f1000000:pcie@82000000: PCI host bridge to bus 0000:00
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.053603] pci_bus 0000:00: root bus resource [bus 00-ff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.053614] pci_bus 0000:00: root bus resource [mem 0xe0000000-0xefffffff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.053623] pci_bus 0000:00: root bus resource [io 0x1000-0xeffff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.053775] pci 0000:00:01.0: [11ab:6281] type 01 class 0x060400
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.053808] pci 0000:00:01.0: reg 0x38: [mem 0x00000000-0x000007ff pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.054986] PCI: bus0: Fast back to back transfers disabled
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055001] pci 0000:00:01.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055124] pci 0000:01:00.0: [10ec:8168] type 00 class 0x020000
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055159] pci 0000:01:00.0: reg 0x10: [io 0x0000-0x00ff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055184] pci 0000:01:00.0: reg 0x18: [mem 0x00000000-0x00000fff 64bit pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055203] pci 0000:01:00.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055217] pci 0000:01:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055301] pci 0000:01:00.0: supports D1 D2
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.055311] pci 0000:01:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056465] PCI: bus1: Fast back to back transfers disabled
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056481] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056669] pci 0000:00:01.0: BAR 8: assigned [mem 0xe0000000-0xe00fffff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056682] pci 0000:00:01.0: BAR 7: assigned [io 0x10000-0x10fff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056694] pci 0000:00:01.0: BAR 6: assigned [mem 0xe0100000-0xe01007ff pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056708] pci 0000:01:00.0: BAR 6: assigned [mem 0xe0000000-0xe000ffff pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056720] pci 0000:01:00.0: BAR 4: assigned [mem 0xe0010000-0xe0013fff 64bit pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056739] pci 0000:01:00.0: BAR 2: assigned [mem 0xe0014000-0xe0014fff 64bit pref]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056757] pci 0000:01:00.0: BAR 0: assigned [io 0x10000-0x100ff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056770] pci 0000:00:01.0: PCI bridge to [bus 01]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056780] pci 0000:00:01.0: bridge window [io 0x10000-0x10fff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.056792] pci 0000:00:01.0: bridge window [mem 0xe0000000-0xe00fffff]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.057208] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.058858] printk: console [ttyS0] disabled
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.058930] f1012000.serial: ttyS0 at MMIO 0xf1012000 (irq = 26, base_baud = 12500000) is a 16550A
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.621188] printk: console [ttyS0] enabled
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.625947] Loading iSCSI transport class v2.0-870.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.632694] nand: device found, Manufacturer ID: 0xec, Chip ID: 0xf1
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.639113] nand: Samsung NAND 128MiB 3,3V 8-bit
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.643771] nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.651383] Scanning device for bad blocks
Thu Jun 9 17:53:33 2022 kern.warn kernel: [ 0.692285] Bad eraseblock 384 at 0x000003000000
Thu Jun 9 17:53:33 2022 kern.warn kernel: [ 0.699079] Bad eraseblock 407 at 0x0000032e0000
Thu Jun 9 17:53:33 2022 kern.warn kernel: [ 0.729227] Bad eraseblock 674 at 0x000005440000
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.767288] 3 fixed-partitions partitions found on MTD device orion_nand
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.774032] Creating 3 MTD partitions on "orion_nand":
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.779196] 0x000000000000-0x0000000c0000 : "uboot"
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.784747] 0x0000000c0000-0x000000140000 : "uboot_env"
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.790547] 0x000000140000-0x000008000000 : "ubi"
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.797699] rtc-mv f1010300.rtc: registered as rtc0
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.802668] i2c /dev entries driver
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.807285] orion_wdt: Initial timeout 21 sec
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.821350] marvell-cesa f1030000.crypto: CESA device successfully registered
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.829487] NET: Registered protocol family 10
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.835702] Segment Routing with IPv6
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.839452] NET: Registered protocol family 17
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.843983] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 0.857145] 8021q: 802.1Q VLAN Support v1.8
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.864256] UBI: auto-attach mtd2
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 0.867591] ubi0: attaching mtd2
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.043655] ubi0: scanning is finished
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.058862] ubi0: attached mtd2 (name "ubi", size 126 MiB)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.064401] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 129024 bytes
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.071301] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 512
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.078044] ubi0: VID header offset: 512 (aligned 512), data offset: 2048
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.084874] ubi0: good PEBs: 1011, bad PEBs: 3, corrupted PEBs: 0
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.090991] ubi0: user volume: 3, internal volumes: 1, max. volumes count: 128
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.098252] ubi0: max/mean erase counter: 2/1, WL threshold: 4096, image sequence number: 1650113974
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.107433] ubi0: available PEBs: 0, total reserved PEBs: 1011, PEBs reserved for bad PEB handling: 17
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.117433] block ubiblock0_1: created from ubi0:1(rootfs)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.122942] ubiblock: device ubiblock0_1 (rootfs) set to be root filesystem
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.129989] rtc-mv f1010300.rtc: setting system clock to 2022-06-09T17:53:21 UTC (1654797201)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 1.138909] ubi0: background thread "ubi_bgt0d" started, PID 480
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.148788] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.158873] Freeing unused kernel memory: 1024K
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.163516] Run /sbin/init as init process
Thu Jun 9 17:53:33 2022 user.info kernel: [ 1.458480] init: Console is alive
Thu Jun 9 17:53:33 2022 user.info kernel: [ 1.462044] init: - watchdog -
Thu Jun 9 17:53:33 2022 user.info kernel: [ 1.774589] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.896315] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.906163] ehci-fsl: Freescale EHCI Host controller driver
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.914669] ehci-orion: EHCI orion driver
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.918869] orion-ehci f1050000.ehci: EHCI Host Controller
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.924442] orion-ehci f1050000.ehci: new USB bus registered, assigned bus number 1
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.932268] orion-ehci f1050000.ehci: irq 30, io mem 0xf1050000
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.963695] orion-ehci f1050000.ehci: USB 2.0 started, EHCI 1.00
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.970333] hub 1-0:1.0: USB hub found
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.974326] hub 1-0:1.0: 1 port detected
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.981598] ehci-platform: EHCI generic platform driver
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 1.993860] sata_mv f1080000.sata: version 1.28
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 1.994081] sata_mv f1080000.sata: slots 32 ports 2
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.002068] scsi host0: sata_mv
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.006122] scsi host1: sata_mv
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.009447] ata1: SATA max UDMA/133 irq 32
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.013560] ata2: SATA max UDMA/133 irq 32
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 2.143670] random: fast init done
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.263685] usb 1-1: new high-speed USB device number 2 using orion-ehci
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.465750] hub 1-1:1.0: USB hub found
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.469893] hub 1-1:1.0: 4 ports detected
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.513697] ata1: SATA link up 3.0 Gbps (SStatus 123 SControl F300)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.524515] ata1.00: ATA-8: WDC WD5000AAKX-003CA0, 15.01H15, max UDMA/133
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.531348] ata1.00: 976773168 sectors, multi 0: LBA48 NCQ (depth 31/32)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.542714] ata1.00: configured for UDMA/133
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 2.547346] scsi 0:0:0:0: Direct-Access ATA WDC WD5000AAKX-0 1H15 PQ: 0 ANSI: 5
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 2.556701] sd 0:0:0:0: [sda] 976773168 512-byte logical blocks: (500 GB/466 GiB)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 2.564718] sd 0:0:0:0: [sda] Write Protect is off
Thu Jun 9 17:53:33 2022 kern.debug kernel: [ 2.569548] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 2.569694] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.594623] sda: sda1
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 2.597951] sd 0:0:0:0: [sda] Attached SCSI disk
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 2.894604] ata2: SATA link down (SStatus 0 SControl F300)
Thu Jun 9 17:53:33 2022 user.info kernel: [ 2.900329] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Thu Jun 9 17:53:33 2022 user.info kernel: [ 2.920085] init: - preinit -
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 3.510277] random: jshn: uninitialized urandom read (4 bytes read)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 3.551919] random: jshn: uninitialized urandom read (4 bytes read)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 3.772144] random: jshn: uninitialized urandom read (4 bytes read)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.023736] UBIFS (ubi0:2): Mounting in unauthenticated mode
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.055390] UBIFS (ubi0:2): background thread "ubifs_bgt0_2" started, PID 665
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.088983] UBIFS (ubi0:2): recovery needed
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.174295] UBIFS (ubi0:2): recovery completed
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.178842] UBIFS (ubi0:2): UBIFS: mounted UBI device 0, volume 2, name "rootfs_data"
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.186731] UBIFS (ubi0:2): LEB size: 129024 bytes (126 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.196701] UBIFS (ubi0:2): FS size: 121282560 bytes (115 MiB, 940 LEBs), journal size 6064128 bytes (5 MiB, 47 LEBs)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.207370] UBIFS (ubi0:2): reserved for root: 4952683 bytes (4836 KiB)
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 8.214037] UBIFS (ubi0:2): media format: w5/r0 (latest is w5/r0), UUID 1ADB3292-B16A-4E88-B49F-DDAB9547483C, small LPT model
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.230703] mount_root: loading kmods from internal overlay
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.368224] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.412232] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.536931] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.545524] block: extroot: not configured
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.550736] mount_root: switching to ubifs overlay
Thu Jun 9 17:53:33 2022 user.warn kernel: [ 8.564152] urandom-seed: Seeding with /etc/urandom.seed
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.599388] procd: - early -
Thu Jun 9 17:53:33 2022 user.info kernel: [ 8.602347] procd: - watchdog -
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 8.968691] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts:
Thu Jun 9 17:53:33 2022 user.info kernel: [ 9.192578] procd: - watchdog -
Thu Jun 9 17:53:33 2022 user.info kernel: [ 9.196775] procd: - ubus -
Thu Jun 9 17:53:33 2022 user.info kernel: [ 9.278152] procd: - init -
Thu Jun 9 17:53:33 2022 user.info kernel: [ 9.831818] kmodloader: loading kernel modules from /etc/modules.d/*
Thu Jun 9 17:53:33 2022 user.info kernel: [ 10.085161] urngd: v1.0.2 started.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.174078] RPC: Registered named UNIX socket transport module.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.180030] RPC: Registered udp transport module.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.184772] RPC: Registered tcp transport module.
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.189490] RPC: Registered tcp NFSv4.1 backchannel transport module.
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 10.271003] crng init done
Thu Jun 9 17:53:33 2022 kern.notice kernel: [ 10.273763] random: 7 urandom warning(s) missed due to ratelimiting
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.543760] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.620825] hwmon_vid: Unknown VRM version of your CPU
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.656697] pci 0000:00:01.0: enabling device (0140 -> 0143)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.662407] r8169 0000:01:00.0: enabling device (0140 -> 0143)
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.700821] r8169 0000:01:00.0 eth0: RTL8168d/8111d, 00:00:00:00:00:30, XID 283, IRQ 36
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.708913] r8169 0000:01:00.0 eth0: jumbo features [frames: 9200 bytes, tx checksumming: ko]
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 10.825086] xt_time: kernel timezone is -0000
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 11.009510] PPP generic driver version 2.4.2
Thu Jun 9 17:53:33 2022 kern.info kernel: [ 11.034535] NET: Registered protocol family 24
Thu Jun 9 17:53:33 2022 user.info kernel: [ 11.073931] kmodloader: done loading kernel modules from /etc/modules.d/*
Thu Jun 9 17:53:34 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Jun 9 17:53:34 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Jun 9 17:53:34 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: Connected to system UBus
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: started, version 2.85 cachesize 150
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: DNS service limited to local subnets
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: UBus support enabled: connected to system bus
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain test
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain onion
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain localhost
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain local
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain invalid
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain bind
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain lan
Thu Jun 9 17:53:35 2022 daemon.warn dnsmasq[1344]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: read /etc/hosts - 4 addresses
Thu Jun 9 17:53:35 2022 daemon.info dnsmasq[1344]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Thu Jun 9 17:53:35 2022 authpriv.info dropbear[1406]: Not backgrounding
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: bonding
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: 8021ad
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: 8021q
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: macvlan
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: veth
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: bridge
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: Network device
Thu Jun 9 17:53:36 2022 user.notice : Added device handler type: tunnel
Thu Jun 9 17:53:36 2022 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Thu Jun 9 17:53:37 2022 kern.info kernel: [ 16.516025] RTL8211B Gigabit Ethernet r8169-0-100:00: attached PHY driver [RTL8211B Gigabit Ethernet] (mii_bus:phy_addr=r8169-0-100:00, irq=IGNORE)
Thu Jun 9 17:53:37 2022 daemon.notice procd: /etc/rc.d/S50netserver: Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC
Thu Jun 9 17:53:37 2022 kern.info kernel: [ 16.876007] r8169 0000:01:00.0 eth0: Link is Down
Thu Jun 9 17:53:37 2022 kern.info kernel: [ 16.880983] br-lan: port 1(eth0) entered blocking state
Thu Jun 9 17:53:37 2022 kern.info kernel: [ 16.886277] br-lan: port 1(eth0) entered disabled state
Thu Jun 9 17:53:37 2022 kern.info kernel: [ 16.891772] device eth0 entered promiscuous mode
Thu Jun 9 17:53:37 2022 kern.info kernel: [ 16.917027] br-lan: port 1(eth0) entered blocking state
Thu Jun 9 17:53:37 2022 kern.info kernel: [ 16.922286] br-lan: port 1(eth0) entered forwarding state
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'lan' is enabled
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'lan6' is enabled
Thu Jun 9 17:53:37 2022 daemon.notice netifd: bridge 'br-lan' link is up
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'lan' has link connectivity
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'lan' is setting up now
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'lan6' has link connectivity
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'lan6' is setting up now
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'loopback' is enabled
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'loopback' is setting up now
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'loopback' is now up
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Network device 'lo' link is up
Thu Jun 9 17:53:37 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
Thu Jun 9 17:53:37 2022 daemon.notice netifd: lan (1732): udhcpc: started, v1.33.2
Thu Jun 9 17:53:37 2022 daemon.err odhcp6c[1733]: Failed to send RS (Permission denied)
Thu Jun 9 17:53:38 2022 daemon.notice netifd: bridge 'br-lan' link is down
Thu Jun 9 17:53:38 2022 daemon.notice netifd: Interface 'lan' has link connectivity loss
Thu Jun 9 17:53:38 2022 daemon.notice netifd: Interface 'lan6' has link connectivity loss
Thu Jun 9 17:53:38 2022 kern.info kernel: [ 17.555090] br-lan: port 1(eth0) entered disabled state
Thu Jun 9 17:53:38 2022 daemon.notice netifd: lan6 (1733): Command failed: Permission denied
Thu Jun 9 17:53:38 2022 daemon.notice netifd: lan (1732): udhcpc: sending discover
Thu Jun 9 17:53:38 2022 daemon.notice netifd: lan (1732): udhcpc: received SIGTERM
Thu Jun 9 17:53:38 2022 daemon.notice netifd: lan (1732): udhcpc: entering released state
Thu Jun 9 17:53:38 2022 daemon.err odhcp6c[1733]: Failed to send SOLICIT message to ff02::1:2 (Permission denied)
Thu Jun 9 17:53:38 2022 daemon.err odhcp6c[1733]: Failed to send RS (Permission denied)
Thu Jun 9 17:53:38 2022 daemon.notice netifd: Interface 'lan6' is now down
Thu Jun 9 17:53:38 2022 daemon.notice netifd: lan (1732): Command failed: Permission denied
Thu Jun 9 17:53:38 2022 daemon.notice netifd: Interface 'lan' is now down
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534).
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Successfully dropped root privileges.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: avahi-daemon 0.8 starting up.
Thu Jun 9 17:53:39 2022 daemon.warn avahi-daemon[1916]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: No service file found in /etc/avahi/services.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Joining mDNS multicast group on interface lo.IPv6 with address ::1.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: New relevant interface lo.IPv6 for mDNS.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: New relevant interface lo.IPv4 for mDNS.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Network interface enumeration completed.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Registering new address record for ::1 on lo.*.
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Registering new address record for 127.0.0.1 on lo.IPv4.
Thu Jun 9 17:53:39 2022 kern.info kernel: [ 19.399109] r8169 0000:01:00.0 eth0: Link is Up - 1Gbps/Full - flow control rx/tx
Thu Jun 9 17:53:39 2022 daemon.info avahi-daemon[1916]: Registering HINFO record with values 'ARMV5TEL'/'LINUX'.
Thu Jun 9 17:53:39 2022 kern.info kernel: [ 19.427045] br-lan: port 1(eth0) entered blocking state
Thu Jun 9 17:53:39 2022 kern.info kernel: [ 19.432329] br-lan: port 1(eth0) entered forwarding state
Thu Jun 9 17:53:39 2022 daemon.notice netifd: Network device 'eth0' link is up
Thu Jun 9 17:53:39 2022 daemon.notice netifd: bridge 'br-lan' link is up
Thu Jun 9 17:53:39 2022 daemon.notice netifd: Interface 'lan' has link connectivity
Thu Jun 9 17:53:39 2022 daemon.notice netifd: Interface 'lan' is setting up now
Thu Jun 9 17:53:39 2022 daemon.notice netifd: Interface 'lan6' has link connectivity
Thu Jun 9 17:53:39 2022 daemon.notice netifd: Interface 'lan6' is setting up now
Thu Jun 9 17:53:39 2022 kern.info kernel: [ 19.469902] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Thu Jun 9 17:53:40 2022 daemon.notice netifd: lan (2022): udhcpc: started, v1.33.2
Thu Jun 9 17:53:40 2022 daemon.err odhcp6c[2025]: Failed to send RS (Address not available)
Thu Jun 9 17:53:40 2022 daemon.notice netifd: lan (2022): udhcpc: sending discover
Thu Jun 9 17:53:40 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Thu Jun 9 17:53:40 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Thu Jun 9 17:53:40 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Thu Jun 9 17:53:40 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Thu Jun 9 17:53:40 2022 daemon.info avahi-daemon[1916]: Server startup complete. Host name is OpenWrt.local. Local service cookie is 2326031095.
Thu Jun 9 17:53:40 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Thu Jun 9 17:53:40 2022 daemon.info dnsmasq[1344]: read /etc/hosts - 4 addresses
Thu Jun 9 17:53:40 2022 daemon.info dnsmasq[1344]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Thu Jun 9 17:53:40 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Thu Jun 9 17:53:41 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Thu Jun 9 17:53:41 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Thu Jun 9 17:53:41 2022 daemon.err odhcp6c[2025]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
Thu Jun 9 17:53:41 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Thu Jun 9 17:53:41 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Thu Jun 9 17:53:41 2022 daemon.info avahi-daemon[1916]: Joining mDNS multicast group on interface br-lan.IPv6 with address fe80::200:ff:fe00:30.
Thu Jun 9 17:53:41 2022 daemon.info avahi-daemon[1916]: New relevant interface br-lan.IPv6 for mDNS.
Thu Jun 9 17:53:41 2022 daemon.info avahi-daemon[1916]: Registering new address record for fe80::200:ff:fe00:30 on br-lan.*.
Thu Jun 9 17:53:42 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 17:53:42 2022 daemon.notice netifd: lan (2022): udhcpc: sending discover
Thu Jun 9 17:53:42 2022 daemon.notice netifd: lan (2022): udhcpc: sending select for 192.168.1.10
Thu Jun 9 17:53:42 2022 daemon.notice netifd: lan (2022): udhcpc: lease of 192.168.1.10 obtained, lease time 86400
Thu Jun 9 17:53:42 2022 daemon.info avahi-daemon[1916]: Joining mDNS multicast group on interface br-lan.IPv4 with address 192.168.1.10.
Thu Jun 9 17:53:42 2022 daemon.info avahi-daemon[1916]: New relevant interface br-lan.IPv4 for mDNS.
Thu Jun 9 17:53:42 2022 daemon.info avahi-daemon[1916]: Registering new address record for 192.168.1.10 on br-lan.IPv4.
Thu Jun 9 17:53:42 2022 daemon.notice netifd: Interface 'lan' is now up
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain test
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain onion
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain localhost
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain local
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain invalid
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain bind
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using only locally-known addresses for domain lan
Thu Jun 9 17:53:42 2022 daemon.info dnsmasq[1344]: using nameserver 192.168.1.1#53
Thu Jun 9 17:53:43 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Thu Jun 9 17:53:44 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 17:53:44 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 17:53:45 2022 daemon.info dnsmasq[1344]: read /etc/hosts - 4 addresses
Thu Jun 9 17:53:45 2022 daemon.info dnsmasq[1344]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Thu Jun 9 17:53:48 2022 daemon.err wsdd2: samba36/4 or ksmbd is not running, can't start wsdd2!
Thu Jun 9 17:53:48 2022 daemon.info procd: - init complete -
Thu Jun 9 17:54:26 2022 authpriv.info dropbear[2990]: Child connection from 192.168.1.4:50476
Thu Jun 9 17:54:33 2022 authpriv.notice dropbear[2990]: Password auth succeeded for 'root' from 192.168.1.4:50476
Thu Jun 9 17:56:04 2022 user.info : luci: failed login on /admin/services/ksmbd for root from 192.168.1.4
Thu Jun 9 17:56:10 2022 user.info : luci: accepted login on /admin/services/ksmbd for root from 192.168.1.4
Thu Jun 9 17:56:48 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 17:56:48 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 17:59:38 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 17:59:38 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 18:03:47 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 18:03:47 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 18:04:22 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 18:04:22 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 18:04:42 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 18:04:43 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 18:05:49 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 18:06:13 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 18:07:52 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 18:08:24 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 18:08:31 2022 daemon.notice ksmbd: Stopping Ksmbd userspace service.
Thu Jun 9 18:08:35 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Thu Jun 9 18:16:02 2022 authpriv.info dropbear[2990]: Exit (root) from <192.168.1.4:50476>: Exited normally
Thu Jun 9 18:22:12 2022 daemon.err uhttpd[1823]: PHP Fatal error: Uncaught Error: Call to undefined function session_start() in /www/rutorrent/plugins/check_port/action.php:75
Thu Jun 9 18:22:12 2022 daemon.err uhttpd[1823]: Stack trace:
Thu Jun 9 18:22:12 2022 daemon.err uhttpd[1823]: #0 {main}
Thu Jun 9 18:22:12 2022 daemon.err uhttpd[1823]: thrown in /www/rutorrent/plugins/check_port/action.php on line 75
Thu Jun 9 18:30:49 2022 authpriv.info dropbear[4390]: Child connection from 192.168.1.4:50943
Thu Jun 9 18:30:53 2022 authpriv.notice dropbear[4390]: Password auth succeeded for 'root' from 192.168.1.4:50943
Thu Jun 9 18:39:46 2022 daemon.err uhttpd[1823]: PHP Fatal error: Uncaught Error: Call to undefined function session_start() in /www/rutorrent/plugins/check_port/action.php:75
Thu Jun 9 18:39:46 2022 daemon.err uhttpd[1823]: Stack trace:
Thu Jun 9 18:39:46 2022 daemon.err uhttpd[1823]: #0 {main}
Thu Jun 9 18:39:46 2022 daemon.err uhttpd[1823]: thrown in /www/rutorrent/plugins/check_port/action.php on line 75
Thu Jun 9 18:53:38 2022 authpriv.info dropbear[4390]: Exit (root) from <192.168.1.4:50943>: Exited normally
Thu Jun 9 19:07:23 2022 user.info : luci: failed login on / for rogal from 89.77.118.138
Thu Jun 9 19:17:12 2022 authpriv.info dropbear[6376]: Child connection from 5.184.104.223:30882
Thu Jun 9 19:17:13 2022 authpriv.notice dropbear[6376]: Password auth succeeded for 'root' from 5.184.104.223:30882
Thu Jun 9 19:17:13 2022 authpriv.info dropbear[6376]: Exit (root) from <5.184.104.223:30882>: Exited normally
Thu Jun 9 19:17:13 2022 authpriv.info dropbear[6379]: Child connection from 5.184.104.223:13406
Thu Jun 9 19:17:14 2022 authpriv.notice dropbear[6379]: Password auth succeeded for 'root' from 5.184.104.223:13406
Thu Jun 9 19:17:38 2022 authpriv.info dropbear[6379]: Exit (root) from <5.184.104.223:13406>: Error reading: Connection reset by peer
Thu Jun 9 19:18:02 2022 authpriv.info dropbear[6425]: Child connection from 89.77.118.138:13874
Thu Jun 9 19:18:09 2022 authpriv.warn dropbear[6425]: User 'rogal' has invalid shell, rejected
Thu Jun 9 19:18:10 2022 authpriv.info dropbear[6425]: Exit before auth from <89.77.118.138:13874>: (user 'rogal', 1 fails): Exited normally
Thu Jun 9 19:18:28 2022 authpriv.info dropbear[6447]: Child connection from 89.77.118.138:13876
Thu Jun 9 19:18:28 2022 authpriv.notice dropbear[6447]: Password auth succeeded for 'root' from 89.77.118.138:13876
Thu Jun 9 19:19:42 2022 authpriv.info dropbear[6447]: Exit (root) from <89.77.118.138:13876>: Exited normally
Thu Jun 9 19:19:44 2022 authpriv.info dropbear[6514]: Child connection from 89.77.118.138:13881
Thu Jun 9 19:19:45 2022 authpriv.notice dropbear[6514]: Password auth succeeded for 'root' from 89.77.118.138:13881
Thu Jun 9 19:19:48 2022 authpriv.info dropbear[6514]: Exit (root) from <89.77.118.138:13881>: Exited normally
Thu Jun 9 19:21:24 2022 user.info : luci: accepted login on / for root from 192.168.1.4
Thu Jun 9 19:32:00 2022 authpriv.info dropbear[6793]: Child connection from 141.98.10.175:47898
Thu Jun 9 19:32:00 2022 authpriv.info dropbear[6793]: Exit before auth from <141.98.10.175:47898>: Exited normally
Thu Jun 9 19:35:35 2022 authpriv.info dropbear[6830]: Child connection from 5.184.104.223:15729
Thu Jun 9 19:35:36 2022 authpriv.notice dropbear[6830]: Password auth succeeded for 'root' from 5.184.104.223:15729
Thu Jun 9 19:35:37 2022 authpriv.info dropbear[6830]: Exit (root) from <5.184.104.223:15729>: Exited normally
Thu Jun 9 19:35:38 2022 authpriv.info dropbear[6832]: Child connection from 5.184.104.223:15423
Thu Jun 9 19:35:39 2022 authpriv.notice dropbear[6832]: Password auth succeeded for 'root' from 5.184.104.223:15423
Thu Jun 9 19:35:46 2022 authpriv.info dropbear[6832]: Exit (root) from <5.184.104.223:15423>: Exited normally
Thu Jun 9 19:37:41 2022 authpriv.info dropbear[6852]: Child connection from 192.168.1.4:51706
Thu Jun 9 19:37:45 2022 authpriv.notice dropbear[6852]: Password auth succeeded for 'root' from 192.168.1.4:51706
Thu Jun 9 19:38:01 2022 authpriv.info dropbear[6852]: Exit (root) from <192.168.1.4:51706>: Exited normally
Thu Jun 9 19:38:09 2022 authpriv.info dropbear[6867]: Child connection from 192.168.1.4:51707
Thu Jun 9 19:38:16 2022 authpriv.notice dropbear[6867]: Password auth succeeded for 'root' from 192.168.1.4:51707
root@OpenWrt:~#
Wersja ze strony openwrt.