找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 1347|回复: 0

断网日志,麻烦帮忙看看,谢谢大伙

[复制链接]
发表于 2019-7-1 14:55 | 显示全部楼层 |阅读模式
  1. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    0.000000] Linux version 4.14.127 (larry@larry-PC) (gcc version 7.4.0 (OpenWrt GCC 7.4.0 r1410-c3eb9166)) #0 SMP Fri Jun 28 15:34:11 2019
  2. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] SoC Type: MediaTek MT7621 ver:1 eco:3
  3. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] bootconsole [early0] enabled
  4. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] CPU0 revision is: 0001992f (MIPS 1004Kc)
  5. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] MIPS: machine is UBNT-ERX
  6. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Determined physical RAM map:
  7. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000]  memory: 10000000 [url=home.php?mod=space&uid=162986]@[/url] 00000000 (usable)
  8. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
  9. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] VPE topology {2,2} total 4
  10. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.000000] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
  11. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.000000] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
  12. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.000000] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
  13. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Zone ranges:
  14. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000]   Normal   [mem 0x0000000000000000-0x000000000fffffff]
  15. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000]   HighMem  empty
  16. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Movable zone start for each node
  17. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Early memory node ranges
  18. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x000000000fffffff]
  19. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x000000000fffffff]
  20. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.000000] On node 0 totalpages: 65536
  21. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.000000] free_area_init_node: node 0, pgdat 805ae160, node_mem_map 81003000
  22. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.000000]   Normal zone: 512 pages used for memmap
  23. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.000000]   Normal zone: 0 pages reserved
  24. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.000000]   Normal zone: 65536 pages, LIFO batch:15
  25. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    0.000000] random: get_random_bytes called from start_kernel+0x94/0x4a8 with crng_init=0
  26. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] percpu: Embedded 14 pages/cpu s26704 r8192 d22448 u57344
  27. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.000000] pcpu-alloc: s26704 r8192 d22448 u57344 alloc=14*4096
  28. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3
  29. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 65024
  30. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    0.000000] Kernel command line: console=ttyS0,57600 rootfstype=squashfs,jffs2
  31. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] PID hash table entries: 1024 (order: 0, 4096 bytes)
  32. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
  33. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
  34. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Writing ErrCtl register=0005bf00
  35. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Readback ErrCtl register=0005bf00
  36. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Memory: 253236K/262144K available (4575K kernel code, 228K rwdata, 1012K rodata, 252K init, 248K bss, 8908K reserved, 0K cma-reserved, 0K highmem)
  37. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
  38. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] Hierarchical RCU implementation.
  39. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] NR_IRQS: 256
  40. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] CPU Clock: 880MHz
  41. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] clocksource: GIC: mask: 0xffffffffffffffff max_cycles: 0xcaf478abb4, max_idle_ns: 440795247997 ns
  42. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 4343773742 ns
  43. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.000009] sched_clock: 32 bits at 440MHz, resolution 2ns, wraps every 4880645118ns
  44. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.015492] Calibrating delay loop... 586.13 BogoMIPS (lpj=2930688)
  45. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.087822] pid_max: default: 32768 minimum: 301
  46. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.097135] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
  47. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.110157] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
  48. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.125865] Hierarchical SRCU implementation.
  49. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.135318] smp: Bringing up secondary CPUs ...
  50. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.150001] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
  51. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.150010] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
  52. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.150021] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
  53. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.150155] CPU1 revision is: 0001992f (MIPS 1004Kc)
  54. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.204702] Synchronize counters for CPU 1: done.
  55. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.273793] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
  56. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.273802] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
  57. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.273810] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
  58. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.273879] CPU2 revision is: 0001992f (MIPS 1004Kc)
  59. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.325547] Synchronize counters for CPU 2: done.
  60. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.390852] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
  61. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.390860] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
  62. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.390868] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
  63. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.390948] CPU3 revision is: 0001992f (MIPS 1004Kc)
  64. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.445118] Synchronize counters for CPU 3: done.
  65. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.504724] smp: Brought up 1 node, 4 CPUs
  66. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.516269] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
  67. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.535738] futex hash table entries: 1024 (order: 3, 32768 bytes)
  68. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.548165] pinctrl core: initialized pinctrl subsystem
  69. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.559749] NET: Registered protocol family 16
  70. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.576512] FPU Affinity set after 11720 emulations
  71. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.586208] mt7621_gpio 1e000600.gpio: registering 32 gpios
  72. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.597508] mt7621_gpio 1e000600.gpio: registering 32 gpios
  73. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.608710] mt7621_gpio 1e000600.gpio: registering 32 gpios
  74. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.622335] clocksource: Switched to clocksource GIC
  75. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.633378] NET: Registered protocol family 2
  76. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.642901] TCP established hash table entries: 2048 (order: 1, 8192 bytes)
  77. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.656653] TCP bind hash table entries: 2048 (order: 2, 16384 bytes)
  78. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.669443] TCP: Hash tables configured (established 2048 bind 2048)
  79. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.682154] UDP hash table entries: 256 (order: 1, 8192 bytes)
  80. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.693661] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
  81. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.706320] NET: Registered protocol family 1
  82. Mon Jul  1 14:32:16 2019 kern.debug kernel: [    0.714881] PCI: CLS 0 bytes, default 32
  83. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.952279] 4 CPUs re-calibrate udelay(lpj = 2924544)
  84. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    0.963489] Crashlog allocated RAM at address 0x3f00000
  85. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.974006] workingset: timestamp_bits=30 max_order=16 bucket_order=0
  86. Mon Jul  1 14:32:16 2019 kern.info kernel: [    0.993634] squashfs: version 4.0 (2009/01/31) Phillip Lougher
  87. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.005117] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
  88. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.027202] random: fast init done
  89. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.034651] io scheduler noop registered
  90. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.042352] io scheduler deadline registered (default)
  91. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.053399] Serial: 8250/16550 driver, 3 ports, IRQ sharing disabled
  92. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.067294] console [ttyS0] disabled
  93. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.074352] 1e000c00.uartlite: ttyS0 at MMIO 0x1e000c00 (irq = 18, base_baud = 3125000) is a 16550A
  94. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.092335] console [ttyS0] enabled
  95. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.106068] bootconsole [early0] disabled
  96. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.122675] cacheinfo: Unable to detect cache hierarchy for CPU 0
  97. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.135537] MediaTek Nand driver init, version v2.1 Fix AHB virt2phys error
  98. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.149591] Enable NFI Clock
  99. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.155331] # MTK NAND # : Use HW ECC
  100. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.162643] Device not found, ID: c2da
  101. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.170084] Not Support this Device!
  102. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.177542] chip_mode=00000001
  103. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.183633] Support this Device in MTK table! c2da
  104. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.193523] [NAND]select ecc bit:4, sparesize :64 spare_per_sector=16
  105. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.206397] nand: device found, Manufacturer ID: 0xc2, Chip ID: 0xda
  106. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.219043] nand: Macronix NAND 256MiB 3,3V 8-bit
  107. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.228413] nand: 256 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
  108. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.243513] Scanning device for bad blocks
  109. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.263809] Bad eraseblock 49 at 0x000000620000
  110. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.383076] Bad eraseblock 500 at 0x000003e80000
  111. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.412464] Bad eraseblock 583 at 0x0000048e0000
  112. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.616590] Bad eraseblock 1380 at 0x00000ac80000
  113. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.789238] 6 fixed-partitions partitions found on MTD device MT7621-NAND
  114. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.802756] Creating 6 MTD partitions on "MT7621-NAND":
  115. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.813172] 0x000000000000-0x000000080000 : "u-boot"
  116. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.823961] 0x000000080000-0x0000000e0000 : "u-boot-env"
  117. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.835409] 0x0000000e0000-0x000000140000 : "factory"
  118. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.846310] 0x000000140000-0x000000440000 : "kernel1"
  119. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.857254] 0x000000440000-0x000000740000 : "kernel2"
  120. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    1.868228] 0x000000740000-0x00000ff00000 : "ubi"
  121. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.880380] [mtk_nand] probe successfully!
  122. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.889268] Signature matched and data read!
  123. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    1.897773] load_fact_bbt success 2047
  124. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.905846] libphy: Fixed MDIO Bus: probed
  125. Mon Jul  1 14:32:16 2019 kern.info kernel: [    1.984897] libphy: mdio: probed
  126. Mon Jul  1 14:32:16 2019 kern.info kernel: [    3.392323] mtk_soc_eth 1e100000.ethernet: loaded mt7530 driver
  127. Mon Jul  1 14:32:16 2019 kern.info kernel: [    3.404812] mtk_soc_eth 1e100000.ethernet eth0: mediatek frame engine at 0xbe100000, irq 19
  128. Mon Jul  1 14:32:16 2019 kern.info kernel: [    3.423742] NET: Registered protocol family 10
  129. Mon Jul  1 14:32:16 2019 kern.info kernel: [    3.434109] Segment Routing with IPv6
  130. Mon Jul  1 14:32:16 2019 kern.info kernel: [    3.441493] NET: Registered protocol family 17
  131. Mon Jul  1 14:32:16 2019 kern.info kernel: [    3.450419] 8021q: 802.1Q VLAN Support v1.8
  132. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    3.461551] UBI: auto-attach mtd5
  133. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    3.468202] ubi0: attaching mtd5
  134. Mon Jul  1 14:32:16 2019 kern.info kernel: [    4.525234] mtk_soc_eth 1e100000.ethernet eth0: port 0 link up
  135. Mon Jul  1 14:32:16 2019 kern.info kernel: [    5.067754] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  136. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.830242] ubi0: scanning is finished
  137. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.855407] ubi0: attached mtd5 (name "ubi", size 247 MiB)
  138. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.866378] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
  139. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.880064] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
  140. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.893581] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
  141. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.907440] ubi0: good PEBs: 1979, bad PEBs: 3, corrupted PEBs: 0
  142. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.919569] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128
  143. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.933956] ubi0: max/mean erase counter: 39/20, WL threshold: 4096, image sequence number: 1028287801
  144. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.952483] ubi0: available PEBs: 0, total reserved PEBs: 1979, PEBs reserved for bad PEB handling: 37
  145. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.971042] ubi0: background thread "ubi_bgt0d" started, PID 342
  146. Mon Jul  1 14:32:16 2019 kern.info kernel: [    5.973096] block ubiblock0_0: created from ubi0:0(rootfs)
  147. Mon Jul  1 14:32:16 2019 kern.notice kernel: [    5.993966] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
  148. Mon Jul  1 14:32:16 2019 kern.info kernel: [    6.007836] hctosys: unable to open rtc device (rtc0)
  149. Mon Jul  1 14:32:16 2019 kern.info kernel: [    6.025571] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
  150. Mon Jul  1 14:32:16 2019 kern.info kernel: [    6.040335] Freeing unused kernel memory: 252K
  151. Mon Jul  1 14:32:16 2019 kern.warn kernel: [    6.049204] This architecture does not have kernel memory protection.
  152. Mon Jul  1 14:32:16 2019 user.info kernel: [    6.499690] init: Console is alive
  153. Mon Jul  1 14:32:16 2019 user.info kernel: [    6.506772] init: - watchdog -
  154. Mon Jul  1 14:32:16 2019 user.info kernel: [    7.056905] kmodloader: loading kernel modules from /etc/modules-boot.d/*
  155. Mon Jul  1 14:32:16 2019 kern.info kernel: [    7.187170] usbcore: registered new interface driver usbfs
  156. Mon Jul  1 14:32:16 2019 kern.info kernel: [    7.198263] usbcore: registered new interface driver hub
  157. Mon Jul  1 14:32:16 2019 kern.info kernel: [    7.208998] usbcore: registered new device driver usb
  158. Mon Jul  1 14:32:16 2019 user.info kernel: [    7.222607] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
  159. Mon Jul  1 14:32:16 2019 user.info kernel: [    7.252719] init: - preinit -
  160. Mon Jul  1 14:32:16 2019 kern.info kernel: [    8.333742] mtk_soc_eth 1e100000.ethernet: PPE started
  161. Mon Jul  1 14:32:16 2019 user.info kernel: [   11.543320] mount_root: loading kmods from internal overlay
  162. Mon Jul  1 14:32:16 2019 user.info kernel: [   11.584444] kmodloader: loading kernel modules from //etc/modules-boot.d/*
  163. Mon Jul  1 14:32:16 2019 user.info kernel: [   11.599256] kmodloader: done loading kernel modules from //etc/modules-boot.d/*
  164. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.018263] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 417
  165. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.097838] random: procd: uninitialized urandom read (4 bytes read)
  166. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.217382] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
  167. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.233007] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
  168. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.252749] UBIFS (ubi0:1): FS size: 229699584 bytes (219 MiB, 1809 LEBs), journal size 11554816 bytes (11 MiB, 91 LEBs)
  169. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.274385] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
  170. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.287551] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 944E523D-B4A2-4A57-831D-CD1FE26A0EFA, small LPT model
  171. Mon Jul  1 14:32:16 2019 user.info kernel: [   12.311586] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
  172. Mon Jul  1 14:32:16 2019 user.err kernel: [   12.325659] block: unable to load configuration (fstab: Entry not found)
  173. Mon Jul  1 14:32:16 2019 user.info kernel: [   12.339105] block: attempting to load /tmp/ubifs_cfg/etc/config/fstab
  174. Mon Jul  1 14:32:16 2019 user.err kernel: [   12.352048] block: unable to load configuration (fstab: Entry not found)
  175. Mon Jul  1 14:32:16 2019 user.info kernel: [   12.365460] block: attempting to load /etc/config/fstab
  176. Mon Jul  1 14:32:16 2019 user.err kernel: [   12.378515] block: unable to load configuration (fstab: Entry not found)
  177. Mon Jul  1 14:32:16 2019 user.err kernel: [   12.391978] block: no usable configuration
  178. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.437297] UBIFS (ubi0:1): un-mount UBI device 0
  179. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.446712] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" stops
  180. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.465180] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 421
  181. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.651148] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
  182. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.666762] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
  183. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.686504] UBIFS (ubi0:1): FS size: 229699584 bytes (219 MiB, 1809 LEBs), journal size 11554816 bytes (11 MiB, 91 LEBs)
  184. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.708141] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
  185. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   12.721308] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 944E523D-B4A2-4A57-831D-CD1FE26A0EFA, small LPT model
  186. Mon Jul  1 14:32:16 2019 user.info kernel: [   12.990783] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
  187. Mon Jul  1 14:32:16 2019 user.err kernel: [   13.004800] block: unable to load configuration (fstab: Entry not found)
  188. Mon Jul  1 14:32:16 2019 user.info kernel: [   13.018232] block: attempting to load /tmp/ubifs_cfg/etc/config/fstab
  189. Mon Jul  1 14:32:16 2019 user.err kernel: [   13.031227] block: unable to load configuration (fstab: Entry not found)
  190. Mon Jul  1 14:32:16 2019 user.info kernel: [   13.044650] block: attempting to load /etc/config/fstab
  191. Mon Jul  1 14:32:16 2019 user.err kernel: [   13.055147] block: unable to load configuration (fstab: Entry not found)
  192. Mon Jul  1 14:32:16 2019 user.err kernel: [   13.068557] block: no usable configuration
  193. Mon Jul  1 14:32:16 2019 user.info kernel: [   13.123517] mount_root: overlay filesystem has not been fully initialized yet
  194. Mon Jul  1 14:32:16 2019 user.info kernel: [   13.139094] mount_root: switching to ubifs overlay
  195. Mon Jul  1 14:32:16 2019 user.warn kernel: [   13.329279] urandom-seed: Seed file not found (/etc/urandom.seed)
  196. Mon Jul  1 14:32:16 2019 kern.info kernel: [   13.421877] mtk_soc_eth 1e100000.ethernet: 0x100 = 0x6060000c, 0x10c = 0x80818
  197. Mon Jul  1 14:32:16 2019 user.info kernel: [   13.443771] procd: - early -
  198. Mon Jul  1 14:32:16 2019 user.info kernel: [   13.449602] procd: - watchdog -
  199. Mon Jul  1 14:32:16 2019 user.info kernel: [   14.102505] procd: - watchdog -
  200. Mon Jul  1 14:32:16 2019 user.info kernel: [   14.109060] procd: - ubus -
  201. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   14.209150] random: ubusd: uninitialized urandom read (4 bytes read)
  202. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   14.222842] random: ubusd: uninitialized urandom read (4 bytes read)
  203. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   14.235886] random: ubusd: uninitialized urandom read (4 bytes read)
  204. Mon Jul  1 14:32:16 2019 user.info kernel: [   14.249399] procd: - init -
  205. Mon Jul  1 14:32:16 2019 user.info kernel: [   14.748333] kmodloader: loading kernel modules from /etc/modules.d/*
  206. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.768494] zram: Added device: zram0
  207. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.778134] tun: Universal TUN/TAP device driver, 1.6
  208. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.794245] sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
  209. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.812821] gre: GRE over IPv4 demultiplexor driver
  210. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.824396] ip_gre: GRE over IPv4 tunneling driver
  211. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.841023] ip6_tables: (C) 2000-2006 Netfilter Core Team
  212. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.863841] nf_conntrack version 0.5.0 (4096 buckets, 16384 max)
  213. Mon Jul  1 14:32:16 2019 kern.info kernel: [   14.995407] Netfilter messages via NETLINK v0.30.
  214. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.007552] ip_set: protocol 6
  215. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.051639] u32 classifier
  216. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.057136]     input device check on
  217. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.064472]     Actions configured
  218. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.073535] Mirror/redirect action on
  219. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.092354] ip_tables: (C) 2000-2006 Netfilter Core Team
  220. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.160305] ctnetlink v0.93: registering with nfnetlink.
  221. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.245562] usbcore: registered new interface driver usblp
  222. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.295308] xt_time: kernel timezone is -0000
  223. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.319360] PPP generic driver version 2.4.2
  224. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.329373] PPP MPPE Compression module registered
  225. Mon Jul  1 14:32:16 2019 kern.info kernel: [   15.340196] NET: Registered protocol family 24
  226. Mon Jul  1 14:32:16 2019 user.info kernel: [   15.352138] kmodloader: done loading kernel modules from /etc/modules.d/*
  227. Mon Jul  1 14:32:16 2019 kern.warn kernel: [   16.688782] urandom_read: 5 callbacks suppressed
  228. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   16.688794] random: jshn: uninitialized urandom read (4 bytes read)
  229. Mon Jul  1 14:32:16 2019 kern.notice kernel: [   20.840110] random: crng init done
  230. Mon Jul  1 14:32:16 2019 daemon.debug zram_start: activating '/dev/zram0' for swapping (123 MegaBytes)
  231. Mon Jul  1 14:32:16 2019 daemon.notice procd: /etc/rc.d/S15zram: zram_start: activating '/dev/zram0' for swapping (123 MegaBytes)
  232. Mon Jul  1 14:32:16 2019 daemon.debug zram_reset: enforcing defaults via /sys/block/zram0/reset
  233. Mon Jul  1 14:32:16 2019 daemon.notice procd: /etc/rc.d/S15zram: zram_reset: enforcing defaults via /sys/block/zram0/reset
  234. Mon Jul  1 14:32:16 2019 daemon.debug zram_comp_streams: Set max compression streams to '4' for zram '/dev/zram0'
  235. Mon Jul  1 14:32:16 2019 daemon.notice procd: /etc/rc.d/S15zram: zram_comp_streams: Set max compression streams to '4' for zram '/dev/zram0'
  236. Mon Jul  1 14:32:16 2019 kern.info kernel: [   22.014734] zram0: detected capacity change from 0 to 128974848
  237. Mon Jul  1 14:32:16 2019 daemon.notice procd: /etc/rc.d/S15zram: Setting up swapspace version 1, size = 123 MiB (128970752 bytes)
  238. Mon Jul  1 14:32:16 2019 daemon.notice procd: /etc/rc.d/S15zram: no label, UUID=5870f01b-bc3d-4aaf-ac5a-cc1a39c5a126
  239. Mon Jul  1 14:32:16 2019 kern.info kernel: [   22.115549] Adding 125948k swap on /dev/zram0.  Priority:-2 extents:1 across:125948k SS
  240. Mon Jul  1 14:32:17 2019 authpriv.info dropbear[1636]: Not backgrounding
  241. Mon Jul  1 14:32:17 2019 kern.info kernel: [   23.082724] xt_FULLCONENAT: RFC3489 Full Cone NAT module
  242. Mon Jul  1 14:32:17 2019 kern.info kernel: [   23.082724] xt_FULLCONENAT: Copyright (C) 2018 Chion Tang <tech@chionlab.moe>
  243. Mon Jul  1 14:32:19 2019 user.notice : Added device handler type: 8021ad
  244. Mon Jul  1 14:32:19 2019 user.notice : Added device handler type: 8021q
  245. Mon Jul  1 14:32:19 2019 user.notice : Added device handler type: macvlan
  246. Mon Jul  1 14:32:19 2019 user.notice : Added device handler type: veth
  247. Mon Jul  1 14:32:19 2019 user.notice : Added device handler type: bridge
  248. Mon Jul  1 14:32:19 2019 user.notice : Added device handler type: Network device
  249. Mon Jul  1 14:32:19 2019 user.notice : Added device handler type: tunnel
  250. Mon Jul  1 14:32:20 2019 daemon.err block: No "mount.ubi" utility available
  251. Mon Jul  1 14:32:20 2019 daemon.err block: mounting /dev/mtdblock5 (ubi) as /mnt/mtdblock5 failed (2) - No such file or directory
  252. Mon Jul  1 14:32:20 2019 daemon.err block: /dev/ubiblock0_0 is already mounted on /rom
  253. Mon Jul  1 14:32:20 2019 daemon.err block: /dev/ubi0_1 is already mounted on /overlay
  254. Mon Jul  1 14:32:20 2019 daemon.notice procd: /etc/rc.d/S50autoreboot: Auto REBOOT has started.
  255. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.145165] mtk_soc_eth 1e100000.ethernet: PPE started
  256. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.164507] br-lan: port 1(eth0.1) entered blocking state
  257. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.175358] br-lan: port 1(eth0.1) entered disabled state
  258. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.187083] device eth0.1 entered promiscuous mode
  259. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.196687] device eth0 entered promiscuous mode
  260. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.209372] br-lan: port 1(eth0.1) entered blocking state
  261. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.220220] br-lan: port 1(eth0.1) entered forwarding state
  262. Mon Jul  1 14:32:20 2019 kern.info kernel: [   26.231849] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
  263. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'lan' is enabled
  264. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'lan' is setting up now
  265. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'lan' is now up
  266. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'loopback' is enabled
  267. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'loopback' is setting up now
  268. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'loopback' is now up
  269. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'wan' is enabled
  270. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'wan6' is enabled
  271. Mon Jul  1 14:32:20 2019 daemon.notice netifd: bridge 'br-lan' link is up
  272. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'lan' has link connectivity
  273. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Network device 'eth0' link is up
  274. Mon Jul  1 14:32:20 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
  275. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Network device 'lo' link is up
  276. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'loopback' has link connectivity
  277. Mon Jul  1 14:32:20 2019 daemon.notice netifd: VLAN 'eth0.2' link is up
  278. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'wan' has link connectivity
  279. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'wan' is setting up now
  280. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'wan6' has link connectivity
  281. Mon Jul  1 14:32:20 2019 daemon.notice netifd: Interface 'wan6' is setting up now
  282. Mon Jul  1 14:32:20 2019 cron.info crond[1827]: crond (busybox 1.30.0) started, log level 5
  283. Mon Jul  1 14:32:20 2019 daemon.notice netifd: wan (1861): udhcpc: started, v1.30.0
  284. Mon Jul  1 14:32:20 2019 daemon.err odhcp6c[1876]: Failed to send RS (Address not available)
  285. Mon Jul  1 14:32:21 2019 daemon.notice netifd: wan (1861): udhcpc: sending discover
  286. Mon Jul  1 14:32:21 2019 daemon.notice netifd: wan (1861): udhcpc: sending select for 192.168.29.4
  287. Mon Jul  1 14:32:21 2019 daemon.notice netifd: wan (1861): udhcpc: lease of 192.168.29.4 obtained, lease time 7200
  288. Mon Jul  1 14:32:21 2019 kern.info kernel: [   27.153217] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
  289. Mon Jul  1 14:32:21 2019 daemon.notice netifd: Interface 'wan' is now up
  290. Mon Jul  1 14:32:21 2019 daemon.err odhcp6c[1876]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
  291. Mon Jul  1 14:32:22 2019 daemon.notice procd: /etc/rc.d/S60dnsforwarder: luci for dnsforwarder
  292. Mon Jul  1 14:32:22 2019 daemon.notice procd: /etc/rc.d/S60dnsforwarder: dnsforwarder is not enabled
  293. Mon Jul  1 14:32:22 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: net.ipv4.tcp_congestion_control = cubic
  294. Mon Jul  1 14:32:22 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  295. Mon Jul  1 14:32:22 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  296. Mon Jul  1 14:32:22 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: udhcpc: started, v1.30.0
  297. Mon Jul  1 14:32:23 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: udhcpc: sending discover
  298. Mon Jul  1 14:32:23 2019 user.notice mwan3[1809]: Using firewall mask 0x3F00
  299. Mon Jul  1 14:32:23 2019 user.notice mwan3[1809]: Max interface count is 60
  300. Mon Jul  1 14:32:24 2019 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  301. Mon Jul  1 14:32:24 2019 daemon.err miniupnpd[2764]: could not open lease file: /var/upnp.leases
  302. Mon Jul  1 14:32:24 2019 daemon.notice miniupnpd[2764]: HTTP listening on port 5000
  303. Mon Jul  1 14:32:24 2019 daemon.notice miniupnpd[2764]: Listening for NAT-PMP/PCP traffic on port 5351
  304. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: udhcpc: no lease, failing
  305. Mon Jul  1 14:32:26 2019 user.info : dnscrypt-proxy - [fvz-anyone] does not support DNS Security Extensions
  306. Mon Jul  1 14:32:26 2019 user.info : dnscrypt-proxy + Provider supposedly doesn't keep logs
  307. Mon Jul  1 14:32:26 2019 daemon.notice dnscrypt-proxy[2984]: dnscrypt-proxy Starting dnscrypt-proxy 1.9.5
  308. Mon Jul  1 14:32:26 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Generating a new session key pair
  309. Mon Jul  1 14:32:26 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Done
  310. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: DNSMASQ change
  311. Mon Jul  1 14:32:26 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  312. Mon Jul  1 14:32:26 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  313. Mon Jul  1 14:32:26 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  314. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing IPv4 filter table
  315. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing IPv4 nat table
  316. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing IPv4 mangle table
  317. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing IPv4 raw table
  318. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing IPv6 filter table
  319. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing IPv6 nat table
  320. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing IPv6 mangle table
  321. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Flushing conntrack table ...
  322. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Populating IPv4 filter table
  323. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-DHCP-Renew'
  324. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-Ping'
  325. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-IGMP'
  326. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-IPSec-ESP'
  327. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-ISAKMP'
  328. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'adblock'
  329. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'kms'
  330. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Forward 'lan' -> 'wan'
  331. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'lan'
  332. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'wan'
  333. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Populating IPv4 nat table
  334. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'lan'
  335. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'wan'
  336. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: Warning: wan will enable FULLCONE-NAT
  337. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Populating IPv4 mangle table
  338. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'lan'
  339. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'wan'
  340. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Populating IPv4 raw table
  341. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'lan'
  342. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:      - Using automatic conntrack helper attachment
  343. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'wan'
  344. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Populating IPv6 filter table
  345. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-DHCPv6'
  346. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-MLD'
  347. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-ICMPv6-Input'
  348. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-ICMPv6-Forward'
  349. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-IPSec-ESP'
  350. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'Allow-ISAKMP'
  351. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'adblock'
  352. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Rule 'kms'
  353. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Forward 'lan' -> 'wan'
  354. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'lan'
  355. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'wan'
  356. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Populating IPv6 nat table
  357. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: Warning: fw3_ipt_rule_append(): Can't find target 'prerouting_lan_rule'
  358. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: Warning: fw3_ipt_rule_append(): Can't find target 'postrouting_lan_rule'
  359. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: Warning: fw3_ipt_rule_append(): Can't find target 'prerouting_wan_rule'
  360. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: Warning: fw3_ipt_rule_append(): Can't find target 'postrouting_wan_rule'
  361. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: Warning: fw3_ipt_rule_append(): Can't find target 'prerouting_rule'
  362. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload: Warning: fw3_ipt_rule_append(): Can't find target 'postrouting_rule'
  363. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'lan'
  364. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'wan'
  365. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Populating IPv6 mangle table
  366. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'lan'
  367. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    * Zone 'wan'
  368. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Set tcp_ecn to off
  369. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Set tcp_syncookies to on
  370. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Set tcp_window_scaling to on
  371. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Running script '/etc/firewall.user'
  372. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Running script '/etc/zerotier.start'
  373. Mon Jul  1 14:32:26 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Running script '/usr/share/miniupnpd/firewall.include'
  374. Mon Jul  1 14:32:27 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Running script '/usr/share/adbyby/firewall.include'
  375. Mon Jul  1 14:32:27 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:  * Running script '/var/etc/s-sr.include'
  376. Mon Jul  1 14:32:27 2019 daemon.notice procd: /etc/rc.d/S60flowoffload:    ! Skipping due to path error: No such file or directory
  377. Mon Jul  1 14:32:27 2019 user.notice mwan3[3003]: Execute ifup event on interface wan (eth0.2)
  378. Mon Jul  1 14:32:27 2019 cron.info crond[3209]: crond (busybox 1.30.0) started, log level 5
  379. Mon Jul  1 14:32:27 2019 daemon.notice procd: /etc/rc.d/S90kms: KMS Server has started.
  380. Mon Jul  1 14:32:27 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  381. Mon Jul  1 14:32:27 2019 daemon.notice procd: /etc/rc.d/S90zerotier: disabled in config
  382. Mon Jul  1 14:32:27 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  383. Mon Jul  1 14:32:27 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  384. Mon Jul  1 14:32:27 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  385. Mon Jul  1 14:32:28 2019 user.notice mwan3[3003]: Starting tracker on interface wan (eth0.2)
  386. Mon Jul  1 14:32:28 2019 daemon.notice procd: /etc/rc.d/S99adbyby: start mem mode
  387. Mon Jul  1 14:32:28 2019 daemon.notice procd: /etc/rc.d/S99adbyby: mount adbyby
  388. Mon Jul  1 14:32:28 2019 daemon.notice procd: /etc/rc.d/S99adbyby: add adbyby rules
  389. Mon Jul  1 14:32:29 2019 user.info mwan3[3003]: connection tracking not flushed on interface wan (eth0.2) ifup
  390. Mon Jul  1 14:32:29 2019 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
  391. Mon Jul  1 14:32:30 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  392. Mon Jul  1 14:32:31 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  393. Mon Jul  1 14:32:31 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  394. Mon Jul  1 14:32:31 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  395. Mon Jul  1 14:32:31 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  396. Mon Jul  1 14:32:31 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  397. Mon Jul  1 14:32:31 2019 daemon.notice procd: /etc/rc.d/S99adbyby: udhcpc: started, v1.30.0
  398. Mon Jul  1 14:32:31 2019 daemon.notice procd: /etc/rc.d/S99adbyby: udhcpc: sending discover
  399. Mon Jul  1 14:32:31 2019 user.notice ddns-scripts[3830]: myddns_ipv4: PID '3830' started at 2019-07-01 14:32
  400. Mon Jul  1 14:32:34 2019 user.warn ddns-scripts[3830]: myddns_ipv4: Service section disabled! - TERMINATE
  401. Mon Jul  1 14:32:34 2019 user.warn ddns-scripts[3830]: myddns_ipv4: PID '3830' exit WITH ERROR '1' at 2019-07-01 14:32
  402. Mon Jul  1 14:32:34 2019 daemon.notice procd: /etc/rc.d/S99adbyby: udhcpc: no lease, failing
  403. Mon Jul  1 14:32:35 2019 user.notice TTYD: Starting ttyd service
  404. Mon Jul  1 14:32:35 2019 daemon.notice procd: /etc/rc.d/S99unblockmusic: uci: Entry not found
  405. Mon Jul  1 14:32:35 2019 daemon.info procd: - init complete -
  406. Mon Jul  1 14:32:35 2019 daemon.info urandom_seed[5202]: Seed saved (/etc/urandom.seed)
  407. Mon Jul  1 14:32:37 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  408. Mon Jul  1 14:32:37 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  409. Mon Jul  1 14:32:37 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  410. Mon Jul  1 14:32:37 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  411. Mon Jul  1 14:41:38 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  412. Mon Jul  1 14:41:38 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  413. Mon Jul  1 14:41:38 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  414. Mon Jul  1 14:41:38 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  415. Mon Jul  1 14:41:44 2019 cron.info crond[5425]: crond (busybox 1.30.0) started, log level 5
  416. Mon Jul  1 14:41:45 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  417. Mon Jul  1 14:41:45 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  418. Mon Jul  1 14:41:47 2019 daemon.err uhttpd[2131]: luci: accepted login on / for root from 192.168.10.235
  419. Mon Jul  1 14:41:50 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  420. Mon Jul  1 14:41:50 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  421. Mon Jul  1 14:41:50 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  422. Mon Jul  1 14:41:50 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  423. Mon Jul  1 14:41:50 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  424. Mon Jul  1 14:41:50 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  425. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6093]: initializing ciphers... aes-256-cfb
  426. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6095]: initializing ciphers... aes-256-cfb
  427. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6097]: initializing ciphers... aes-256-cfb
  428. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6099]: initializing ciphers... aes-256-cfb
  429. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6099]: tcp port reuse enabled
  430. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6093]: tcp port reuse enabled
  431. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6099]: listening at 0.0.0.0:1234
  432. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6093]: listening at 0.0.0.0:1234
  433. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6099]: running from root user
  434. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6093]: running from root user
  435. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6097]: tcp port reuse enabled
  436. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6097]: listening at 0.0.0.0:1234
  437. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6097]: running from root user
  438. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6095]: tcp port reuse enabled
  439. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6095]: listening at 0.0.0.0:1234
  440. Mon Jul  1 14:41:52 2019 kern.info /usr/bin/S-S R-redir[6095]: running from root user
  441. Mon Jul  1 14:41:52 2019 daemon.info pdnsd[6118]: pdnsd-1.2.9b-par starting.
  442. Mon Jul  1 14:41:53 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  443. Mon Jul  1 14:41:53 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  444. Mon Jul  1 14:42:05 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  445. Mon Jul  1 14:42:05 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  446. Mon Jul  1 14:42:05 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  447. Mon Jul  1 14:42:05 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  448. Mon Jul  1 14:42:09 2019 cron.info crond[6609]: crond (busybox 1.30.0) started, log level 5
  449. Mon Jul  1 14:42:09 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  450. Mon Jul  1 14:42:09 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  451. Mon Jul  1 14:42:15 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  452. Mon Jul  1 14:42:15 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  453. Mon Jul  1 14:42:23 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  454. Mon Jul  1 14:42:24 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  455. Mon Jul  1 14:42:24 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  456. Mon Jul  1 14:42:24 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  457. Mon Jul  1 14:42:33 2019 user.notice root: adbyby mem mode rules updated!
  458. Mon Jul  1 14:42:43 2019 cron.info crond[7492]: crond (busybox 1.30.0) started, log level 5
  459. Mon Jul  1 14:42:44 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  460. Mon Jul  1 14:42:44 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  461. Mon Jul  1 14:42:45 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  462. Mon Jul  1 14:42:45 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  463. Mon Jul  1 14:42:45 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  464. Mon Jul  1 14:42:45 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  465. Mon Jul  1 14:42:47 2019 cron.info crond[7630]: crond (busybox 1.30.0) started, log level 5
  466. Mon Jul  1 14:42:47 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  467. Mon Jul  1 14:42:47 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  468. Mon Jul  1 14:42:50 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  469. Mon Jul  1 14:42:50 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  470. Mon Jul  1 14:42:51 2019 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  471. Mon Jul  1 14:42:51 2019 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  472. Mon Jul  1 14:43:09 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  473. Mon Jul  1 14:43:09 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  474. Mon Jul  1 14:43:09 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  475. Mon Jul  1 14:43:09 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  476. Mon Jul  1 14:43:17 2019 kern.info kernel: [  151.169339] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  477. Mon Jul  1 14:43:35 2019 kern.info kernel: [  169.381152] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  478. Mon Jul  1 14:43:36 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  479. Mon Jul  1 14:43:36 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  480. Mon Jul  1 14:43:36 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  481. Mon Jul  1 14:43:36 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  482. Mon Jul  1 14:43:52 2019 kern.info kernel: [  186.630334] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  483. Mon Jul  1 14:43:55 2019 kern.info kernel: [  189.707255] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  484. Mon Jul  1 14:44:01 2019 kern.info kernel: [  195.334057] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  485. Mon Jul  1 14:44:04 2019 kern.info kernel: [  198.219548] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  486. Mon Jul  1 14:44:04 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  487. Mon Jul  1 14:44:05 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  488. Mon Jul  1 14:44:06 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  489. Mon Jul  1 14:44:07 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  490. Mon Jul  1 14:44:07 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  491. Mon Jul  1 14:44:07 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  492. Mon Jul  1 14:44:40 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  493. Mon Jul  1 14:44:45 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  494. Mon Jul  1 14:44:45 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  495. Mon Jul  1 14:44:45 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  496. Mon Jul  1 14:45:21 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  497. Mon Jul  1 14:45:21 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  498. Mon Jul  1 14:45:21 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  499. Mon Jul  1 14:45:21 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  500. Mon Jul  1 14:46:00 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  501. Mon Jul  1 14:46:01 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  502. Mon Jul  1 14:46:01 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  503. Mon Jul  1 14:46:01 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  504. Mon Jul  1 14:46:43 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  505. Mon Jul  1 14:46:43 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  506. Mon Jul  1 14:46:43 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  507. Mon Jul  1 14:46:43 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  508. Mon Jul  1 14:46:58 2019 kern.err /usr/bin/S-S R-redir[6093]: server recv: Connection reset by peer
  509. Mon Jul  1 14:47:22 2019 kern.err /usr/bin/S-S R-redir[6099]: server recv: Connection reset by peer
  510. Mon Jul  1 14:47:28 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  511. Mon Jul  1 14:47:28 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  512. Mon Jul  1 14:47:28 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  513. Mon Jul  1 14:47:28 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  514. Mon Jul  1 14:47:54 2019 daemon.err uhttpd[2131]: luci: accepted login on / for root from 192.168.10.234
  515. Mon Jul  1 14:48:16 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  516. Mon Jul  1 14:48:16 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  517. Mon Jul  1 14:48:16 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  518. Mon Jul  1 14:48:16 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  519. Mon Jul  1 14:48:23 2019 user.info mwan3track[3357]: Check (ping) failed for target "114.114.115.115" on interface wan (eth0.2)
  520. Mon Jul  1 14:48:28 2019 user.info mwan3track[3357]: Lost 1 ping(s) on interface wan (eth0.2)
  521. Mon Jul  1 14:49:07 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  522. Mon Jul  1 14:49:08 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  523. Mon Jul  1 14:49:08 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  524. Mon Jul  1 14:49:08 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  525. Mon Jul  1 14:49:21 2019 kern.info kernel: [  515.145615] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  526. Mon Jul  1 14:49:24 2019 kern.info kernel: [  518.108036] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  527. Mon Jul  1 14:49:24 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  528. Mon Jul  1 14:49:25 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  529. Mon Jul  1 14:49:36 2019 kern.info kernel: [  530.110994] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  530. Mon Jul  1 14:49:39 2019 kern.info kernel: [  533.111925] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  531. Mon Jul  1 14:49:39 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  532. Mon Jul  1 14:49:40 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  533. Mon Jul  1 14:49:43 2019 kern.info kernel: [  536.941601] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  534. Mon Jul  1 14:49:45 2019 kern.info kernel: [  539.843858] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  535. Mon Jul  1 14:49:46 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  536. Mon Jul  1 14:49:47 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  537. Mon Jul  1 14:49:48 2019 kern.err /usr/bin/S-S R-redir[6097]: server recv: Connection reset by peer
  538. Mon Jul  1 14:50:01 2019 kern.info kernel: [  555.097604] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  539. Mon Jul  1 14:50:02 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  540. Mon Jul  1 14:50:02 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  541. Mon Jul  1 14:50:02 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  542. Mon Jul  1 14:50:02 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  543. Mon Jul  1 14:50:05 2019 kern.info kernel: [  559.822420] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  544. Mon Jul  1 14:50:06 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  545. Mon Jul  1 14:50:07 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  546. Mon Jul  1 14:50:07 2019 authpriv.info dropbear[10198]: Child connection from 192.168.10.234:2637
  547. Mon Jul  1 14:50:14 2019 authpriv.notice dropbear[10198]: Password auth succeeded for 'root' from 192.168.10.234:2637
  548. Mon Jul  1 14:50:15 2019 kern.info kernel: [  569.652559] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  549. Mon Jul  1 14:50:18 2019 kern.info kernel: [  572.594526] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  550. Mon Jul  1 14:50:19 2019 kern.info kernel: [  573.885920] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  551. Mon Jul  1 14:50:22 2019 kern.info kernel: [  576.846637] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  552. Mon Jul  1 14:50:24 2019 kern.info kernel: [  578.143263] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  553. Mon Jul  1 14:50:27 2019 kern.info kernel: [  581.124678] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  554. Mon Jul  1 14:50:28 2019 kern.info kernel: [  582.421168] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  555. Mon Jul  1 14:50:31 2019 kern.info kernel: [  585.363173] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  556. Mon Jul  1 14:50:31 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  557. Mon Jul  1 14:50:32 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  558. Mon Jul  1 14:50:34 2019 kern.err /usr/bin/S-S R-redir[6097]: server recv: Connection reset by peer
  559. Mon Jul  1 14:50:35 2019 kern.err /usr/bin/S-S R-redir[6095]: server recv: Connection reset by peer
  560. Mon Jul  1 14:50:40 2019 kern.info kernel: [  593.967831] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  561. Mon Jul  1 14:50:42 2019 kern.info kernel: [  596.850495] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  562. Mon Jul  1 14:50:43 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  563. Mon Jul  1 14:50:44 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  564. Mon Jul  1 14:50:46 2019 kern.info kernel: [  600.190070] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  565. Mon Jul  1 14:50:49 2019 kern.info kernel: [  603.093585] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  566. Mon Jul  1 14:50:49 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  567. Mon Jul  1 14:50:49 2019 kern.err /usr/bin/S-S R-redir[6099]: server recv: Connection reset by peer
  568. Mon Jul  1 14:50:50 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  569. Mon Jul  1 14:50:51 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  570. Mon Jul  1 14:50:53 2019 kern.info kernel: [  607.452987] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  571. Mon Jul  1 14:50:56 2019 kern.info kernel: [  610.355543] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  572. Mon Jul  1 14:50:57 2019 kern.info kernel: [  611.644312] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  573. Mon Jul  1 14:50:59 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  574. Mon Jul  1 14:50:59 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  575. Mon Jul  1 14:50:59 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  576. Mon Jul  1 14:50:59 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  577. Mon Jul  1 14:51:00 2019 kern.info kernel: [  614.666433] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  578. Mon Jul  1 14:51:00 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  579. Mon Jul  1 14:51:01 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  580. Mon Jul  1 14:51:09 2019 kern.info kernel: [  623.606768] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  581. Mon Jul  1 14:51:12 2019 kern.info kernel: [  626.608725] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  582. Mon Jul  1 14:51:14 2019 kern.info kernel: [  627.904063] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  583. Mon Jul  1 14:51:16 2019 kern.info kernel: [  630.846046] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  584. Mon Jul  1 14:51:17 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  585. Mon Jul  1 14:51:18 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  586. Mon Jul  1 14:51:21 2019 kern.info kernel: [  635.451501] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  587. Mon Jul  1 14:51:24 2019 kern.info kernel: [  638.354691] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  588. Mon Jul  1 14:51:26 2019 kern.info kernel: [  640.453811] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  589. Mon Jul  1 14:51:29 2019 kern.info kernel: [  643.356966] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  590. Mon Jul  1 14:51:29 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  591. Mon Jul  1 14:51:30 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  592. Mon Jul  1 14:51:31 2019 kern.info kernel: [  645.828471] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  593. Mon Jul  1 14:51:34 2019 kern.info kernel: [  648.731025] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  594. Mon Jul  1 14:51:34 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  595. Mon Jul  1 14:51:35 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  596. Mon Jul  1 14:51:38 2019 kern.info kernel: [  652.335603] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  597. Mon Jul  1 14:51:41 2019 kern.info kernel: [  655.218648] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  598. Mon Jul  1 14:51:41 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  599. Mon Jul  1 14:51:42 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  600. Mon Jul  1 14:51:44 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  601. Mon Jul  1 14:51:48 2019 kern.info kernel: [  661.916299] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  602. Mon Jul  1 14:51:50 2019 kern.info kernel: [  664.859131] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  603. Mon Jul  1 14:51:50 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  604. Mon Jul  1 14:51:51 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  605. Mon Jul  1 14:51:54 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  606. Mon Jul  1 14:51:57 2019 kern.info kernel: [  671.038307] mtk_soc_eth 1e100000.ethernet eth0: port 4 link down
  607. Mon Jul  1 14:51:59 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Refetching server certificates
  608. Mon Jul  1 14:52:00 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy Server certificate with serial #1561958277 received
  609. Mon Jul  1 14:52:00 2019 daemon.info dnscrypt-proxy[2984]: dnscrypt-proxy This certificate has expired
  610. Mon Jul  1 14:52:00 2019 daemon.err dnscrypt-proxy[2984]: dnscrypt-proxy No useable certificates found
  611. Mon Jul  1 14:52:00 2019 kern.info kernel: [  673.981379] mtk_soc_eth 1e100000.ethernet eth0: port 4 link up
  612. Mon Jul  1 14:52:00 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  613. Mon Jul  1 14:52:01 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  614. Mon Jul  1 14:52:01 2019 authpriv.info dropbear[10198]: Exit (root): Exited normally
  615. Mon Jul  1 14:52:03 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  616. Mon Jul  1 14:52:07 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  617. Mon Jul  1 14:52:15 2019 daemon.warn odhcpd[1757]: DHCPV6 SOLICIT IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  618. Mon Jul  1 14:52:22 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  619. Mon Jul  1 14:52:23 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
  620. Mon Jul  1 14:52:25 2019 daemon.warn odhcpd[1757]: DHCPV6 REQUEST IA_NA from 000100012370bd0320c9d0c4f49d on br-lan: ok fd8a:e201:e605::742/128
复制代码


我的恩山、我的无线 The best wifi forum is right here.
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-3-29 13:52

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com 举报电话:0519-86695797

快速回复 返回顶部 返回列表