login as: root DD-WRT v3.0-r43502 big (c) 2020 NewMedia-NET GmbH Release: 06/23/20 Board: Asus RT-N66U root@XXX.XXX.XXX.1's password: ========================================================== ___ ___ _ _____ ______ ____ ___ / _ \/ _ \___| | /| / / _ \/_ __/ _ __|_ / / _ \ / // / // /___/ |/ |/ / , _/ / / | |/ //_ <_/ // / /____/____/ |__/|__/_/|_| /_/ |___/____(_)___/ DD-WRT v3.0 http://www.dd-wrt.com ========================================================== BusyBox v1.31.1 (2020-06-23 15:30:27 +04) built-in shell (ash) root@RT-N66R:~# dmesg Dentry cache hash table entries: 16384 (order: 4, 65536 bytes) Inode-cache hash table entries: 8192 (order: 3, 32768 bytes) Writing ErrCtl register=80000fb0 Readback ErrCtl register=80000fb0 Cache parity protection enabled Memory: 122328K/131068K available (5469K kernel code, 452K rwdata, 996K rodata, 240K init, 372K bss, 8740K reserved, 0K cma-reserved, 0K highmem) SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 NR_IRQS:128 CPU: BCM5300 rev 1 at 600 MHz clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6370868154 ns sched_clock: 32 bits at 300MHz, resolution 3ns, wraps every 7158278654ns console [ttyS0] enabled Calibrating delay loop... 299.82 BogoMIPS (lpj=1499136) pid_max: default: 32768 minimum: 301 Mount-cache hash table entries: 1024 (order: 0, 4096 bytes) Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes) BRCM Errata: Disable CPU_WAIT clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns futex hash table entries: 256 (order: -1, 3072 bytes) NET: Registered protocol family 16 enable BCMA BUS Errata boardflags are 110 PCI: Initializing host PCI: Reset RC boardflags are 110 PCI: Initializing host PCI: Reset RC PCI: scanning bus 0 PCI host bridge to bus 0000:00 pci_bus 0000:00: root bus resource [io 0x0000-0xffff] pci_bus 0000:00: root bus resource [mem 0x00000000-0xffffffff] pci_bus 0000:00: root bus resource [bus 00-ff] pci 0000:00:00.0: [14e4:0800] type 00 class 0x050100 PCI: Fixing up bridge pci 0000:00:00.0: reg 0x10: [mem 0x18000000-0x18000fff] pci 0000:00:00.0: reg 0x30: [mem 0x00000000-0x000007ff pref] pci 0000:00:01.0: [14e4:4715] type 00 class 0x020000 pci 0000:00:01.0: reg 0x10: [mem 0x18002000-0x18002fff] pci 0000:00:01.0: reg 0x30: [mem 0x00000000-0x000007ff pref] pci 0000:00:04.0: [14e4:471a] type 00 class 0x0c0310 pci 0000:00:04.0: reg 0x10: [mem 0x18009000-0x18009fff] pci 0000:00:04.0: reg 0x30: [mem 0x00000000-0x000007ff pref] pci 0000:00:04.1: [14e4:471a] type 00 class 0x0c0320 pci 0000:00:04.1: reg 0x10: [mem 0x18004000-0x18004fff] pci 0000:00:04.1: reg 0x30: [mem 0x00000000-0x000007ff pref] pci 0000:00:05.0: [14e4:0820] type 01 class 0x060400 pci 0000:00:05.0: reg 0x10: [mem 0x18005000-0x18005fff] pci 0000:00:05.0: reg 0x38: [mem 0x00000000-0x000007ff pref] pci 0000:00:06.0: [14e4:0820] type 01 class 0x060400 pci 0000:00:06.0: reg 0x10: [mem 0x1800e000-0x1800efff] pci 0000:00:06.0: reg 0x38: [mem 0x00000000-0x000007ff pref] pci 0000:00:07.0: [14e4:052e] type 00 class 0xffffff pci 0000:00:07.0: reg 0x10: [mem 0x18006000-0x18006fff] pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x000007ff pref] pci 0000:00:08.0: [14e4:080e] type 00 class 0x050000 pci 0000:00:08.0: reg 0x10: [mem 0x18007000-0x18007fff] pci 0000:00:08.0: reg 0x30: [mem 0x00000000-0x000007ff pref] pci 0000:00:09.0: [14e4:0534] type 00 class 0xffffff pci 0000:00:09.0: reg 0x10: [mem 0x18008000-0x18008fff] pci 0000:00:09.0: reg 0x30: [mem 0x00000000-0x000007ff pref] PCI: Fixing up bus 0 pci 0000:00:05.0: bridge configuration invalid ([bus 00-00]), reconfiguring pci 0000:00:06.0: bridge configuration invalid ([bus 00-00]), reconfiguring PCI/PCIe coreunit 0 is set to bus 1. pci 0000:01:00.0: [14e4:5300] type 00 class 0x060000 pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] pci 0000:01:00.0: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] pci 0000:01:00.0: supports D1 D2 pci 0000:01:00.1: [14e4:0000] type 00 class 0x060000 pci 0000:01:00.1: reg 0x10: [mem 0x00000000-0x00003fff 64bit] pci 0000:01:00.1: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] pci 0000:01:00.1: supports D1 D2 pci 0000:01:01.0: [14e4:4331] type 00 class 0x028000 pci 0000:01:01.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] pci 0000:01:01.0: supports D1 D2 PCI: Fixing up bus 1 pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01 PCI/PCIe coreunit 1 is set to bus 2. pci 0000:02:00.0: [14e4:5300] type 00 class 0x060000 pci 0000:02:00.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] pci 0000:02:00.0: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] pci 0000:02:00.0: supports D1 D2 pci 0000:02:00.1: [14e4:0000] type 00 class 0x060000 pci 0000:02:00.1: reg 0x10: [mem 0x00000000-0x00003fff 64bit] pci 0000:02:00.1: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] pci 0000:02:00.1: supports D1 D2 pci 0000:02:01.0: [14e4:4331] type 00 class 0x028000 pci 0000:02:01.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] pci 0000:02:01.0: supports D1 D2 PCI: Fixing up bus 2 pci_bus 0000:02: busn_res: [bus 02-ff] end is updated to 02 clocksource: Switched to clocksource MIPS NET: Registered protocol family 2 TCP established hash table entries: 1024 (order: 0, 4096 bytes) TCP bind hash table entries: 1024 (order: 0, 4096 bytes) TCP: Hash tables configured (established 1024 bind 1024) UDP hash table entries: 256 (order: 0, 4096 bytes) UDP-Lite hash table entries: 256 (order: 0, 4096 bytes) NET: Registered protocol family 1 PCI: CLS 0 bytes, default 32 Asus-RT-AC66U init Asus-RT-N66U init squashfs: version 4.0 (2009/01/31) Phillip Lougher io scheduler noop registered (default) HDLC line discipline maxframe=4096 N_HDLC line discipline registered. serial8250_init Serial: 8250/16550 driver, 4 ports, IRQ sharing disabled serial8250: ttyS0 at MMIO 0x0 (irq = 8, base_baud = 1562500) is a U6_16550A serial8250: ttyS1 at MMIO 0x0 (irq = 8, base_baud = 1562500) is a U6_16550A brd: module loaded Physically mapped flash: Found 1 x16 devices at 0x0 in 16-bit bank. Manufacturer ID 0x0000c2 Chip ID 0x00227e Amd/Fujitsu Extended Query Table at 0x0040 Amd/Fujitsu Extended Query version 1.3. number of CFI chips: 1 Flash device: 0x2000000 at 0x1c000000 try to find cfe size up to 33554432 bootloader size: 262144 nvram size: 65536 Physically mapped flash: Filesystem type: squashfs, size=0x16880ce partition size = 23654400 Creating 5 MTD partitions on "Physically mapped flash": 0x000000000000-0x000000040000 : "cfe" 0x000000040000-0x000001fe0000 : "linux" 0x000000251000-0x0000018e0000 : "rootfs" mtd: partition "rootfs" must either start or end on erase block boundary or be smaller than an erase block -- forcing read-only mtd: partition "rootfs" set to be root filesystem 0x000001fe0000-0x000002000000 : "nvram" 0x0000018e0000-0x000001fe0000 : "ddwrt" ERROR: Unknown flash, device_id:0x00 bcmsflash: found no supported devices No NAND flash type found brcmnand: found no supported devices No NAND flash type found nflash: found no supported devices et_module_init: passivemode set to 0x0 et_module_init: txworkq set to 0x0 et_module_init: et_txq_thresh set to 0xce4 et_module_init: et_rxlazy_timeout set to 0x3e8 et_module_init: et_rxlazy_framecnt set to 0x20 et_module_init: et_rxlazy_dyn_thresh set to 0 ET Corerev -2147483648 bcm_robo_enable_switch: EEE is disabled eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.89.21 (r524987) PPP generic driver version 2.4.2 PPP BSD Compression module registered PPP Deflate Compression module registered PPP MPPE Compression module registered NET: Registered protocol family 24 cmd 2 new_cmd 0 PCI: Enabling device 0000:01:01.0 (0000 -> 0002) cmd 2 new_cmd 0 PCI: Enabling device 0000:02:01.0 (0000 -> 0002) Broadcom Watchdog Timer: 0.07 initialized. u32 classifier Performance counters on Actions configured Netfilter messages via NETLINK v0.30. nf_conntrack version 0.5.0 (1911 buckets, 7644 max) nf_conntrack_rtsp v0.7 loading xt_time: kernel timezone is -0000 ip_set: protocol 6 gre: GRE over IPv4 demultiplexor driver nf_nat_rtsp v0.7 loading ip_tables: (C) 2000-2006 Netfilter Core Team NET: Registered protocol family 17 bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this. Bridge firewalling registered 8021q: 802.1Q VLAN Support v1.8 startup nvram driver found nvram max nvram space = 65536 VFS: Mounted root (squashfs filesystem) readonly on device 31:2. Freeing unused kernel memory: 240K roboswitch: Probing device 'eth0' roboswitch: trying a 53125! at eth0 roboswitch: found a 53125! at eth0 device br0 entered promiscuous mode device vlan1 entered promiscuous mode device eth0 entered promiscuous mode device eth1 entered promiscuous mode device eth2 entered promiscuous mode br0: port 3(eth2) entered forwarding state br0: port 3(eth2) entered forwarding state br0: port 2(eth1) entered forwarding state br0: port 2(eth1) entered forwarding state br0: port 1(vlan1) entered forwarding state br0: port 1(vlan1) entered forwarding state device br0 left promiscuous mode device br0 entered promiscuous mode device br0 left promiscuous mode device vlan2 entered promiscuous mode fast-classifier (PBR safe v2.1.6b): starting up fast-classifier: registered device vlan2 left promiscuous mode random: nonblocking pool is initialized br0: port 3(eth2) entered forwarding state br0: port 2(eth1) entered forwarding state br0: port 1(vlan1) entered forwarding state br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead. br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address br0: received packet on eth1 with own address as source address root@RT-N66R:~# root@RT-N66R:~# root@RT-N66R:~# root@RT-N66R:~# root@RT-N66R:~# root@RT-N66R:~# root@RT-N66R:~# cat /tmp/var/log/messages Dec 31 18:00:08 RT-N66R syslog.info syslogd started: BusyBox v1.31.1 Dec 31 18:00:08 RT-N66R user.info : klogd : daemon successfully started Dec 31 18:00:08 RT-N66R kern.notice kernel: klogd started: BusyBox v1.31.1 (2020-06-23 15:30:27 +04) Dec 31 18:00:08 RT-N66R kern.notice kernel: Linux version 4.4.228 (root@linux) (gcc version 10.1.0 (OpenWrt GCC 10.1.0 r13225-bc0288b768) ) #1930 Tue Jun 23 15:32:22 +04 2020 Dec 31 18:00:08 RT-N66R kern.info kernel: prom_init:194 Dec 31 18:00:08 RT-N66R kern.info kernel: CPU0 revision is: 00019749 (MIPS 74Kc) Dec 31 18:00:08 RT-N66R kern.notice kernel: found nvram at 1FF0000 Dec 31 18:00:08 RT-N66R kern.info kernel: something wrong here. do not remap Dec 31 18:00:08 RT-N66R kern.info kernel: Using bcma bus Dec 31 18:00:08 RT-N66R kern.info kernel: Determined physical RAM map: Dec 31 18:00:08 RT-N66R kern.info kernel: memory: 07fff000 @ 00000000 (usable) Dec 31 18:00:08 RT-N66R kern.warn kernel: Primary instruction cache 32kB, 4-way, VIPT, I-cache aliases, linesize 32 bytes. Dec 31 18:00:08 RT-N66R kern.warn kernel: Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes Dec 31 18:00:08 RT-N66R kern.info kernel: Zone ranges: Dec 31 18:00:08 RT-N66R kern.info kernel: Normal [mem 0x0000000000000000-0x0000000007ffefff] Dec 31 18:00:08 RT-N66R kern.info kernel: HighMem empty Dec 31 18:00:08 RT-N66R kern.info kernel: Movable zone start for each node Dec 31 18:00:08 RT-N66R kern.info kernel: Early memory node ranges Dec 31 18:00:08 RT-N66R kern.info kernel: node 0: [mem 0x0000000000000000-0x0000000007ffefff] Dec 31 18:00:08 RT-N66R kern.info kernel: Initmem setup node 0 [mem 0x0000000000000000-0x0000000007ffefff] Dec 31 18:00:08 RT-N66R kern.debug kernel: On node 0 totalpages: 32767 Dec 31 18:00:08 RT-N66R kern.debug kernel: free_area_init_node: node 0, pgdat 8065de50, node_mem_map 81007000 Dec 31 18:00:08 RT-N66R kern.debug kernel: Normal zone: 256 pages used for memmap Dec 31 18:00:08 RT-N66R kern.debug kernel: Normal zone: 0 pages reserved Dec 31 18:00:08 RT-N66R kern.debug kernel: Normal zone: 32767 pages, LIFO batch:7 Dec 31 18:00:08 RT-N66R kern.debug kernel: pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768 Dec 31 18:00:08 RT-N66R kern.debug kernel: pcpu-alloc: [0] 0 Dec 31 18:00:08 RT-N66R kern.info kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32511 Dec 31 18:00:08 RT-N66R kern.notice kernel: Kernel command line: console=ttyS0,115200 root=1f02 rootfstype=squashfs noinitrd init=/bin/sh Dec 31 18:00:08 RT-N66R kern.info kernel: PID hash table entries: 512 (order: -1, 2048 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: Dentry cache hash table entries: 16384 (order: 4, 65536 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: Inode-cache hash table entries: 8192 (order: 3, 32768 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: Writing ErrCtl register=80000fb0 Dec 31 18:00:08 RT-N66R kern.info kernel: Readback ErrCtl register=80000fb0 Dec 31 18:00:08 RT-N66R kern.info kernel: Cache parity protection enabled Dec 31 18:00:08 RT-N66R kern.info kernel: Memory: 122328K/131068K available (5469K kernel code, 452K rwdata, 996K rodata, 240K init, 372K bss, 8740K reserved, 0K cma-reserved, 0K highmem) Dec 31 18:00:08 RT-N66R kern.info kernel: SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 Dec 31 18:00:08 RT-N66R kern.info kernel: NR_IRQS:128 Dec 31 18:00:08 RT-N66R kern.info kernel: CPU: BCM5300 rev 1 at 600 MHz Dec 31 18:00:08 RT-N66R kern.info kernel: clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6370868154 ns Dec 31 18:00:08 RT-N66R kern.info kernel: sched_clock: 32 bits at 300MHz, resolution 3ns, wraps every 7158278654ns Dec 31 18:00:08 RT-N66R kern.info kernel: console [ttyS0] enabled Dec 31 18:00:08 RT-N66R kern.info kernel: Calibrating delay loop... 299.82 BogoMIPS (lpj=1499136) Dec 31 18:00:08 RT-N66R kern.info kernel: pid_max: default: 32768 minimum: 301 Dec 31 18:00:08 RT-N66R kern.info kernel: Mount-cache hash table entries: 1024 (order: 0, 4096 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: BRCM Errata: Disable CPU_WAIT Dec 31 18:00:08 RT-N66R kern.info kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns Dec 31 18:00:08 RT-N66R kern.info kernel: futex hash table entries: 256 (order: -1, 3072 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: NET: Registered protocol family 16 Dec 31 18:00:08 RT-N66R kern.info kernel: enable BCMA BUS Errata Dec 31 18:00:08 RT-N66R kern.warn kernel: boardflags are 110 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Initializing host Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Reset RC Dec 31 18:00:08 RT-N66R kern.warn kernel: boardflags are 110 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Initializing host Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Reset RC Dec 31 18:00:08 RT-N66R kern.info kernel: PCI: scanning bus 0 Dec 31 18:00:08 RT-N66R kern.info kernel: PCI host bridge to bus 0000:00 Dec 31 18:00:08 RT-N66R kern.info kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff] Dec 31 18:00:08 RT-N66R kern.info kernel: pci_bus 0000:00: root bus resource [mem 0x00000000-0xffffffff] Dec 31 18:00:08 RT-N66R kern.info kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:00.0: [14e4:0800] type 00 class 0x050100 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Fixing up bridge Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:00.0: reg 0x10: [mem 0x18000000-0x18000fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:00.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:01.0: [14e4:4715] type 00 class 0x020000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:01.0: reg 0x10: [mem 0x18002000-0x18002fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:01.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:04.0: [14e4:471a] type 00 class 0x0c0310 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:04.0: reg 0x10: [mem 0x18009000-0x18009fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:04.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:04.1: [14e4:471a] type 00 class 0x0c0320 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:04.1: reg 0x10: [mem 0x18004000-0x18004fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:04.1: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:05.0: [14e4:0820] type 01 class 0x060400 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:05.0: reg 0x10: [mem 0x18005000-0x18005fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:05.0: reg 0x38: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:06.0: [14e4:0820] type 01 class 0x060400 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:06.0: reg 0x10: [mem 0x1800e000-0x1800efff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:06.0: reg 0x38: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:07.0: [14e4:052e] type 00 class 0xffffff Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:07.0: reg 0x10: [mem 0x18006000-0x18006fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:08.0: [14e4:080e] type 00 class 0x050000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:08.0: reg 0x10: [mem 0x18007000-0x18007fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:08.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:09.0: [14e4:0534] type 00 class 0xffffff Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:09.0: reg 0x10: [mem 0x18008000-0x18008fff] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:00:09.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Fixing up bus 0 Dec 31 18:00:08 RT-N66R kern.info kernel: pci 0000:00:05.0: bridge configuration invalid ([bus 00-00]), reconfiguring Dec 31 18:00:08 RT-N66R kern.info kernel: pci 0000:00:06.0: bridge configuration invalid ([bus 00-00]), reconfiguring Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI/PCIe coreunit 0 is set to bus 1. Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.0: [14e4:5300] type 00 class 0x060000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.0: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.0: supports D1 D2 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.1: [14e4:0000] type 00 class 0x060000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.1: reg 0x10: [mem 0x00000000-0x00003fff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.1: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:00.1: supports D1 D2 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:01.0: [14e4:4331] type 00 class 0x028000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:01.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:01:01.0: supports D1 D2 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Fixing up bus 1 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI/PCIe coreunit 1 is set to bus 2. Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.0: [14e4:5300] type 00 class 0x060000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.0: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.0: supports D1 D2 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.1: [14e4:0000] type 00 class 0x060000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.1: reg 0x10: [mem 0x00000000-0x00003fff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.1: reg 0x18: [mem 0x00000000-0x07ffffff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:00.1: supports D1 D2 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:01.0: [14e4:4331] type 00 class 0x028000 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:01.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit] Dec 31 18:00:08 RT-N66R kern.debug kernel: pci 0000:02:01.0: supports D1 D2 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Fixing up bus 2 Dec 31 18:00:08 RT-N66R kern.debug kernel: pci_bus 0000:02: busn_res: [bus 02-ff] end is updated to 02 Dec 31 18:00:08 RT-N66R kern.info kernel: clocksource: Switched to clocksource MIPS Dec 31 18:00:08 RT-N66R kern.info kernel: NET: Registered protocol family 2 Dec 31 18:00:08 RT-N66R kern.info kernel: TCP established hash table entries: 1024 (order: 0, 4096 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: TCP: Hash tables configured (established 1024 bind 1024) Dec 31 18:00:08 RT-N66R kern.info kernel: UDP hash table entries: 256 (order: 0, 4096 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: UDP-Lite hash table entries: 256 (order: 0, 4096 bytes) Dec 31 18:00:08 RT-N66R kern.info kernel: NET: Registered protocol family 1 Dec 31 18:00:08 RT-N66R kern.debug kernel: PCI: CLS 0 bytes, default 32 Dec 31 18:00:08 RT-N66R kern.emerg kernel: Asus-RT-AC66U init Dec 31 18:00:08 RT-N66R kern.emerg kernel: Asus-RT-N66U init Dec 31 18:00:08 RT-N66R kern.info kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 31 18:00:08 RT-N66R kern.info kernel: io scheduler noop registered (default) Dec 31 18:00:08 RT-N66R kern.info kernel: HDLC line discipline maxframe=4096 Dec 31 18:00:08 RT-N66R kern.info kernel: N_HDLC line discipline registered. Dec 31 18:00:08 RT-N66R kern.info kernel: serial8250_init Dec 31 18:00:08 RT-N66R kern.info kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing disabled Dec 31 18:00:08 RT-N66R kern.info kernel: serial8250: ttyS0 at MMIO 0x0 (irq = 8, base_baud = 1562500) is a U6_16550A Dec 31 18:00:08 RT-N66R kern.info kernel: serial8250: ttyS1 at MMIO 0x0 (irq = 8, base_baud = 1562500) is a U6_16550A Dec 31 18:00:08 RT-N66R kern.info kernel: brd: module loaded Dec 31 18:00:08 RT-N66R kern.info kernel: Physically mapped flash: Found 1 x16 devices at 0x0 in 16-bit bank. Manufacturer ID 0x0000c2 Chip ID 0x00227e Dec 31 18:00:08 RT-N66R kern.info kernel: Amd/Fujitsu Extended Query Table at 0x0040 Dec 31 18:00:08 RT-N66R kern.info kernel: Amd/Fujitsu Extended Query version 1.3. Dec 31 18:00:08 RT-N66R kern.notice kernel: number of CFI chips: 1 Dec 31 18:00:08 RT-N66R kern.notice kernel: Flash device: 0x2000000 at 0x1c000000 Dec 31 18:00:08 RT-N66R kern.info kernel: try to find cfe size up to 33554432 Dec 31 18:00:08 RT-N66R kern.emerg kernel: bootloader size: 262144 Dec 31 18:00:08 RT-N66R kern.emerg kernel: nvram size: 65536 Dec 31 18:00:08 RT-N66R kern.emerg kernel: Physically mapped flash: Filesystem type: squashfs, size=0x16880ce Dec 31 18:00:08 RT-N66R kern.emerg kernel: partition size = 23654400 Dec 31 18:00:08 RT-N66R kern.notice kernel: Creating 5 MTD partitions on "Physically mapped flash": Dec 31 18:00:08 RT-N66R kern.notice kernel: 0x000000000000-0x000000040000 : "cfe" Dec 31 18:00:08 RT-N66R kern.notice kernel: 0x000000040000-0x000001fe0000 : "linux" Dec 31 18:00:08 RT-N66R kern.notice kernel: 0x000000251000-0x0000018e0000 : "rootfs" Dec 31 18:00:08 RT-N66R kern.warn kernel: mtd: partition "rootfs" must either start or end on erase block boundary or be smaller than an erase block -- forcing read-only Dec 31 18:00:08 RT-N66R kern.notice kernel: mtd: partition "rootfs" set to be root filesystem Dec 31 18:00:08 RT-N66R kern.notice kernel: 0x000001fe0000-0x000002000000 : "nvram" Dec 31 18:00:08 RT-N66R kern.notice kernel: 0x0000018e0000-0x000001fe0000 : "ddwrt" Dec 31 18:00:08 RT-N66R kern.warn kernel: ERROR: Unknown flash, device_id:0x00 Dec 31 18:00:08 RT-N66R kern.err kernel: bcmsflash: found no supported devices Dec 31 18:00:08 RT-N66R kern.warn kernel: No NAND flash type found Dec 31 18:00:08 RT-N66R kern.err kernel: brcmnand: found no supported devices Dec 31 18:00:08 RT-N66R kern.warn kernel: No NAND flash type found Dec 31 18:00:08 RT-N66R kern.err kernel: nflash: found no supported devices Dec 31 18:00:08 RT-N66R kern.warn kernel: et_module_init: passivemode set to 0x0 Dec 31 18:00:08 RT-N66R kern.warn kernel: et_module_init: txworkq set to 0x0 Dec 31 18:00:08 RT-N66R kern.warn kernel: et_module_init: et_txq_thresh set to 0xce4 Dec 31 18:00:08 RT-N66R kern.warn kernel: et_module_init: et_rxlazy_timeout set to 0x3e8 Dec 31 18:00:08 RT-N66R kern.warn kernel: et_module_init: et_rxlazy_framecnt set to 0x20 Dec 31 18:00:08 RT-N66R kern.warn kernel: et_module_init: et_rxlazy_dyn_thresh set to 0 Dec 31 18:00:08 RT-N66R kern.info kernel: ET Corerev -2147483648 Dec 31 18:00:08 RT-N66R kern.warn kernel: bcm_robo_enable_switch: EEE is disabled Dec 31 18:00:08 RT-N66R kern.warn kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.89.21 (r524987) Dec 31 18:00:08 RT-N66R kern.info kernel: PPP generic driver version 2.4.2 Dec 31 18:00:08 RT-N66R kern.info kernel: PPP BSD Compression module registered Dec 31 18:00:08 RT-N66R kern.info kernel: PPP Deflate Compression module registered Dec 31 18:00:08 RT-N66R kern.info kernel: PPP MPPE Compression module registered Dec 31 18:00:08 RT-N66R kern.info kernel: NET: Registered protocol family 24 Dec 31 18:00:08 RT-N66R kern.emerg kernel: cmd 2 new_cmd 0 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Enabling device 0000:01:01.0 (0000 -> 0002) Dec 31 18:00:08 RT-N66R kern.emerg kernel: cmd 2 new_cmd 0 Dec 31 18:00:08 RT-N66R kern.warn kernel: PCI: Enabling device 0000:02:01.0 (0000 -> 0002) Dec 31 18:00:08 RT-N66R kern.info kernel: Broadcom Watchdog Timer: 0.07 initialized. Dec 31 18:00:08 RT-N66R kern.info kernel: u32 classifier Dec 31 18:00:08 RT-N66R kern.info kernel: Performance counters on Dec 31 18:00:08 RT-N66R kern.info kernel: Actions configured Dec 31 18:00:08 RT-N66R kern.info kernel: Netfilter messages via NETLINK v0.30. Dec 31 18:00:08 RT-N66R kern.info kernel: nf_conntrack version 0.5.0 (1911 buckets, 7644 max) Dec 31 18:00:08 RT-N66R kern.warn kernel: nf_conntrack_rtsp v0.7 loading Dec 31 18:00:08 RT-N66R kern.info kernel: xt_time: kernel timezone is -0000 Dec 31 18:00:08 RT-N66R kern.info kernel: ip_set: protocol 6 Dec 31 18:00:08 RT-N66R kern.info kernel: gre: GRE over IPv4 demultiplexor driver Dec 31 18:00:08 RT-N66R kern.warn kernel: nf_nat_rtsp v0.7 loading Dec 31 18:00:08 RT-N66R kern.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team Dec 31 18:00:08 RT-N66R kern.info kernel: NET: Registered protocol family 17 Dec 31 18:00:08 RT-N66R kern.info kernel: bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this. Dec 31 18:00:08 RT-N66R kern.notice kernel: Bridge firewalling registered Dec 31 18:00:08 RT-N66R kern.info kernel: 8021q: 802.1Q VLAN Support v1.8 Dec 31 18:00:08 RT-N66R kern.info kernel: startup nvram driver Dec 31 18:00:08 RT-N66R kern.emerg kernel: found nvram Dec 31 18:00:08 RT-N66R kern.info kernel: max nvram space = 65536 Dec 31 18:00:08 RT-N66R kern.info kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:2. Dec 31 18:00:08 RT-N66R kern.info kernel: Freeing unused kernel memory: 240K Dec 31 18:00:08 RT-N66R kern.info kernel: roboswitch: Probing device 'eth0' Dec 31 18:00:08 RT-N66R kern.info kernel: roboswitch: trying a 53125! at eth0 Dec 31 18:00:08 RT-N66R kern.info kernel: roboswitch: found a 53125! at eth0 Dec 31 18:00:08 RT-N66R user.info : resetbutton : resetbutton daemon successfully started Dec 31 18:00:09 RT-N66R user.info : bridge : bridge br0 successfully added Dec 31 18:00:09 RT-N66R kern.info kernel: device br0 entered promiscuous mode Dec 31 18:00:09 RT-N66R user.info : bridge : interface vlan1 successfully added to bridge br0 Dec 31 18:00:09 RT-N66R kern.info kernel: device vlan1 entered promiscuous mode Dec 31 18:00:09 RT-N66R kern.info kernel: device eth0 entered promiscuous mode Dec 31 18:00:10 RT-N66R user.info : bridge : interface eth1 successfully added to bridge br0 Dec 31 18:00:10 RT-N66R kern.info kernel: device eth1 entered promiscuous mode Dec 31 18:00:11 RT-N66R user.info : bridge : interface eth2 successfully added to bridge br0 Dec 31 18:00:11 RT-N66R kern.info kernel: device eth2 entered promiscuous mode Dec 31 18:00:11 RT-N66R kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 18:00:11 RT-N66R kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 18:00:11 RT-N66R kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 18:00:11 RT-N66R kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 18:00:11 RT-N66R kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 18:00:11 RT-N66R kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 18:00:11 RT-N66R kern.info kernel: device br0 left promiscuous mode Dec 31 18:00:11 RT-N66R kern.info kernel: device br0 entered promiscuous mode Dec 31 18:00:11 RT-N66R kern.info kernel: device br0 left promiscuous mode Dec 31 18:00:11 RT-N66R user.info : wland : daemon successfully started Dec 31 18:00:11 RT-N66R kern.info kernel: device vlan2 entered promiscuous mode Dec 31 18:00:12 RT-N66R user.info : telnetd : daemon successfully started Dec 31 18:00:12 RT-N66R cron.info cron[1244]: (CRON) STARTUP (fork ok) Dec 31 18:00:12 RT-N66R user.info : cron : daemon successfully started Dec 31 18:00:12 RT-N66R kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Dec 31 18:00:12 RT-N66R kern.alert kernel: fast-classifier: registered Dec 31 18:00:12 RT-N66R user.info : sfe : shortcut forwarding engine successfully started Dec 31 18:00:13 RT-N66R user.info : dnsmasq : daemon successfully started Dec 31 18:00:14 RT-N66R user.notice root: Download blocking hosts file and restart dnsmasq ... Dec 31 18:00:14 RT-N66R kern.info kernel: device vlan2 left promiscuous mode Dec 31 18:00:14 RT-N66R user.info : ttraff : traffic counter daemon successfully started Dec 31 18:00:15 RT-N66R user.info : dnsmasq : daemon successfully stopped Dec 31 18:00:16 RT-N66R daemon.info httpd[1271]: httpd : httpd server started at port 80 Dec 31 18:00:16 RT-N66R user.info : httpd : http daemon successfully started Dec 31 18:00:17 RT-N66R user.info : nas : wait for network init Dec 31 18:00:18 RT-N66R user.info : dnsmasq : daemon hanging, send SIGKILL Dec 31 18:00:18 RT-N66R user.info : dnsmasq : daemon successfully started Dec 31 18:00:18 RT-N66R user.info : wland : daemon successfully stopped Dec 31 18:00:18 RT-N66R user.info : wland : daemon successfully started Dec 31 18:00:18 RT-N66R user.info : wan : WAN is up. IP: 74.133.71.186 Dec 31 18:00:20 RT-N66R user.notice root: Download blocking hosts file and restart dnsmasq ... Dec 31 18:00:20 RT-N66R user.info : sfe : shortcut forwarding engine successfully started Dec 31 18:00:20 RT-N66R user.info : process_monitor : successfully started Dec 31 18:00:20 RT-N66R daemon.err process_monitor[1535]: cyclic NTP Update failed (servers ) Dec 31 18:00:20 RT-N66R daemon.err process_monitor[1535]: Last update failed, we need to re-update after 30 seconds Dec 31 18:00:20 RT-N66R daemon.debug process_monitor[1535]: We need to re-update after 3600 seconds Dec 31 18:00:20 RT-N66R daemon.info process_monitor[1535]: process_monitor : set timer: 3600 seconds, callback: ntp_main() Dec 31 18:00:21 RT-N66R kern.notice kernel: random: nonblocking pool is initialized Dec 31 18:00:21 RT-N66R user.info : dropbear : ssh daemon successfully started Dec 31 18:00:21 RT-N66R authpriv.info dropbear[1552]: Running in background Dec 31 18:00:23 RT-N66R user.notice root: Downloading https://winhelp2002.mvps.org/hosts.txt ... Dec 31 18:00:26 RT-N66R kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 18:00:26 RT-N66R kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 18:00:26 RT-N66R kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 18:00:27 RT-N66R user.info : nas : start nas lan Dec 31 18:00:27 RT-N66R user.info : nas : start nas for wl0 Dec 31 18:00:27 RT-N66R user.info : nas : NAS lan (wl0 interface) successfully started Dec 31 18:00:27 RT-N66R user.info : nas : start nas lan Dec 31 18:00:27 RT-N66R user.info : nas : start nas for wl1 Dec 31 18:00:27 RT-N66R user.info : nas : NAS lan (wl1 interface) successfully started Dec 31 18:00:28 RT-N66R user.info : nas : daemon successfully stopped Dec 31 18:00:31 RT-N66R user.info : nas : daemon hanging, send SIGKILL Dec 31 18:00:31 RT-N66R user.info : nas : start nas lan Dec 31 18:00:31 RT-N66R user.info : nas : start nas for wl0 Dec 31 18:00:31 RT-N66R user.info : nas : NAS lan (wl0 interface) successfully started Dec 31 18:00:31 RT-N66R user.info : nas : start nas lan Dec 31 18:00:31 RT-N66R user.info : nas : start nas for wl1 Dec 31 18:00:31 RT-N66R user.info : nas : NAS lan (wl1 interface) successfully started Dec 31 18:00:31 RT-N66R user.info : httpd : daemon successfully stopped Dec 31 18:00:31 RT-N66R daemon.info httpd[1400]: httpd : httpd server shutdown Dec 31 18:00:31 RT-N66R daemon.info httpd[1608]: httpd : httpd server started at port 80 Dec 31 18:00:31 RT-N66R user.info : httpd : http daemon successfully started Dec 31 18:00:31 RT-N66R user.info : resetbutton : daemon successfully stopped Dec 31 18:00:31 RT-N66R user.info : resetbutton : resetbutton daemon successfully started Dec 31 18:00:50 RT-N66R daemon.debug ntpclient[1764]: Connecting to pool.ntp.org [64.22.253.155] ... Jun 23 21:05:53 RT-N66R daemon.info ntpclient[1764]: Time set from pool.ntp.org [64.22.253.155]. Jun 23 21:05:53 RT-N66R daemon.info process_monitor[1535]: cyclic NTP Update success (servers pool.ntp.org) Jun 23 21:05:53 RT-N66R daemon.debug process_monitor[1535]: Restarting cron (time sync change) Jun 23 21:05:53 RT-N66R user.info : cron : daemon successfully stopped Jun 23 21:05:54 RT-N66R user.info : cron : daemon successfully started Jun 23 21:05:54 RT-N66R cron.info cron[1854]: (CRON) STARTUP (fork ok) Jun 23 21:05:54 RT-N66R user.info : process_monitor : daemon successfully stopped Jun 23 21:05:54 RT-N66R daemon.info process_monitor[1535]: process_monitor : cleanup timers Jun 23 21:05:54 RT-N66R user.info : process_monitor : successfully started Jun 23 21:05:54 RT-N66R daemon.debug process_monitor[1856]: We need to re-update after 3600 seconds Jun 23 21:05:54 RT-N66R daemon.info process_monitor[1856]: process_monitor : set timer: 3600 seconds, callback: ntp_main() Jun 23 21:06:02 RT-N66R user.debug : ttraff: data collection started Jun 23 21:07:25 RT-N66R user.notice root: Downloading https://someonewhocares.org/hosts/zero/hosts ... Jun 23 21:08:07 RT-N66R user.notice root: Downloading https://hosts-file.net/ad_servers.txt ... Jun 23 21:09:02 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 23 21:10:08 RT-N66R user.notice root: Downloading https://hosts-file.net/emd.txt ... Jun 23 21:12:08 RT-N66R user.notice root: Downloading https://hosts-file.net/exp.txt ... Jun 23 21:14:08 RT-N66R user.notice root: Downloading https://hosts-file.net/fsa.txt ... Jun 23 21:16:08 RT-N66R user.notice root: Downloading https://hosts-file.net/grm.txt ... Jun 23 21:18:09 RT-N66R user.notice root: Downloading https://hosts-file.net/hfs.txt ... Jun 23 21:20:10 RT-N66R user.notice root: Downloading https://hosts-file.net/hjk.txt ... Jun 23 21:22:10 RT-N66R user.notice root: Downloading https://hosts-file.net/mmt.txt ... Jun 23 21:24:10 RT-N66R user.notice root: Downloading https://hosts-file.net/pha.txt ... Jun 23 21:26:10 RT-N66R user.notice root: Downloading https://hosts-file.net/psh.txt ... Jun 23 21:28:10 RT-N66R user.notice root: Downloading https://pgl.yoyo.org/as/serverlist.php?hostformat=hosts;showintro=0 ... Jun 23 21:28:21 RT-N66R user.notice root: Restarting dnsmasq with additional hosts file(s) ... Jun 23 21:54:57 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 23 21:58:57 RT-N66R kern.info kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead. Jun 23 22:05:54 RT-N66R daemon.debug ntpclient[3606]: Connecting to pool.ntp.org [72.87.88.203] ... Jun 23 22:05:57 RT-N66R daemon.debug ntpclient[3606]: Timed out waiting for pool.ntp.org [72.87.88.203]. Jun 23 22:05:57 RT-N66R daemon.err process_monitor[1856]: cyclic NTP Update failed (servers pool.ntp.org) Jun 23 22:50:47 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 23 23:05:57 RT-N66R daemon.debug ntpclient[3875]: Connecting to pool.ntp.org [45.76.244.193] ... Jun 23 23:05:57 RT-N66R daemon.info ntpclient[3875]: Time set from pool.ntp.org [45.76.244.193]. Jun 23 23:05:57 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 23 23:18:54 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 23 23:59:08 RT-N66R user.debug : ttraff: data for 23-6-2020 commited to nvram Jun 24 00:05:57 RT-N66R daemon.debug ntpclient[4703]: Connecting to pool.ntp.org [198.60.22.240] ... Jun 24 00:05:57 RT-N66R daemon.info ntpclient[4703]: Time set from pool.ntp.org [198.60.22.240]. Jun 24 00:05:57 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 01:05:58 RT-N66R daemon.debug ntpclient[5021]: Connecting to pool.ntp.org [194.25.134.196] ... Jun 24 01:05:58 RT-N66R daemon.info ntpclient[5021]: Time set from pool.ntp.org [194.25.134.196]. Jun 24 01:05:58 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 02:05:59 RT-N66R daemon.debug ntpclient[5359]: Connecting to pool.ntp.org [128.10.252.6] ... Jun 24 02:05:59 RT-N66R daemon.info ntpclient[5359]: Time set from pool.ntp.org [128.10.252.6]. Jun 24 02:05:59 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 03:05:59 RT-N66R daemon.debug ntpclient[5682]: Connecting to pool.ntp.org [23.152.160.126] ... Jun 24 03:05:59 RT-N66R daemon.info ntpclient[5682]: Time set from pool.ntp.org [23.152.160.126]. Jun 24 03:05:59 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 03:22:07 RT-N66R user.notice root: Downloading https://winhelp2002.mvps.org/hosts.txt ... Jun 24 03:24:08 RT-N66R user.notice root: Downloading https://someonewhocares.org/hosts/zero/hosts ... Jun 24 03:24:50 RT-N66R user.notice root: Downloading https://hosts-file.net/ad_servers.txt ... Jun 24 03:26:50 RT-N66R user.notice root: Downloading https://hosts-file.net/emd.txt ... Jun 24 03:28:50 RT-N66R user.notice root: Downloading https://hosts-file.net/exp.txt ... Jun 24 03:30:50 RT-N66R user.notice root: Downloading https://hosts-file.net/fsa.txt ... Jun 24 03:32:50 RT-N66R user.notice root: Downloading https://hosts-file.net/grm.txt ... Jun 24 03:34:51 RT-N66R user.notice root: Downloading https://hosts-file.net/hfs.txt ... Jun 24 03:36:51 RT-N66R user.notice root: Downloading https://hosts-file.net/hjk.txt ... Jun 24 03:38:52 RT-N66R user.notice root: Downloading https://hosts-file.net/mmt.txt ... Jun 24 03:40:53 RT-N66R user.notice root: Downloading https://hosts-file.net/pha.txt ... Jun 24 03:42:54 RT-N66R user.notice root: Downloading https://hosts-file.net/psh.txt ... Jun 24 03:44:54 RT-N66R user.notice root: Downloading https://pgl.yoyo.org/as/serverlist.php?hostformat=hosts;showintro=0 ... Jun 24 03:45:04 RT-N66R user.notice root: Restarting dnsmasq with additional hosts file(s) ... Jun 24 04:06:00 RT-N66R daemon.debug ntpclient[6397]: Connecting to pool.ntp.org [201.217.3.85] ... Jun 24 04:06:00 RT-N66R daemon.info ntpclient[6397]: Time set from pool.ntp.org [201.217.3.85]. Jun 24 04:06:00 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 04:06:47 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 05:06:01 RT-N66R daemon.debug ntpclient[6734]: Connecting to pool.ntp.org [64.22.253.155] ... Jun 24 05:06:01 RT-N66R daemon.info ntpclient[6734]: Time set from pool.ntp.org [64.22.253.155]. Jun 24 05:06:01 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 06:06:02 RT-N66R daemon.debug ntpclient[7058]: Connecting to pool.ntp.org [159.203.158.197] ... Jun 24 06:06:02 RT-N66R daemon.info ntpclient[7058]: Time set from pool.ntp.org [159.203.158.197]. Jun 24 06:06:02 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 06:36:37 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 07:06:02 RT-N66R daemon.debug ntpclient[7378]: Connecting to pool.ntp.org [185.103.216.7] ... Jun 24 07:06:02 RT-N66R daemon.info ntpclient[7378]: Time set from pool.ntp.org [185.103.216.7]. Jun 24 07:06:02 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 07:13:32 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 07:21:17 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 07:29:32 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 08:06:03 RT-N66R daemon.debug ntpclient[7699]: Connecting to pool.ntp.org [208.67.72.50] ... Jun 24 08:06:03 RT-N66R daemon.info ntpclient[7699]: Time set from pool.ntp.org [208.67.72.50]. Jun 24 08:06:03 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 09:06:04 RT-N66R daemon.debug ntpclient[8027]: Connecting to pool.ntp.org [45.79.13.206] ... Jun 24 09:06:04 RT-N66R daemon.info ntpclient[8027]: Time set from pool.ntp.org [45.79.13.206]. Jun 24 09:06:04 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 10:06:04 RT-N66R daemon.debug ntpclient[8350]: Connecting to pool.ntp.org [193.106.144.6] ... Jun 24 10:06:04 RT-N66R daemon.info ntpclient[8350]: Time set from pool.ntp.org [193.106.144.6]. Jun 24 10:06:04 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 11:06:05 RT-N66R daemon.debug ntpclient[8688]: Connecting to pool.ntp.org [162.159.200.123] ... Jun 24 11:06:05 RT-N66R daemon.info ntpclient[8688]: Time set from pool.ntp.org [162.159.200.123]. Jun 24 11:06:05 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 12:06:05 RT-N66R daemon.debug ntpclient[9011]: Connecting to pool.ntp.org [193.30.35.11] ... Jun 24 12:06:06 RT-N66R daemon.info ntpclient[9011]: Time set from pool.ntp.org [193.30.35.11]. Jun 24 12:06:06 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 13:06:06 RT-N66R daemon.debug ntpclient[9329]: Connecting to pool.ntp.org [162.159.200.1] ... Jun 24 13:06:06 RT-N66R daemon.info ntpclient[9329]: Time set from pool.ntp.org [162.159.200.1]. Jun 24 13:06:06 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 14:06:07 RT-N66R daemon.debug ntpclient[9652]: Connecting to pool.ntp.org [85.91.1.180] ... Jun 24 14:06:07 RT-N66R daemon.info ntpclient[9652]: Time set from pool.ntp.org [85.91.1.180]. Jun 24 14:06:07 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 15:06:07 RT-N66R daemon.debug ntpclient[9980]: Connecting to pool.ntp.org [45.63.54.13] ... Jun 24 15:06:07 RT-N66R daemon.info ntpclient[9980]: Time set from pool.ntp.org [45.63.54.13]. Jun 24 15:06:07 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 16:06:08 RT-N66R daemon.debug ntpclient[10303]: Connecting to pool.ntp.org [69.164.198.192] ... Jun 24 16:06:08 RT-N66R daemon.info ntpclient[10303]: Time set from pool.ntp.org [69.164.198.192]. Jun 24 16:06:08 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 17:04:20 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 17:06:09 RT-N66R daemon.debug ntpclient[10621]: Connecting to pool.ntp.org [195.21.137.209] ... Jun 24 17:06:09 RT-N66R daemon.info ntpclient[10621]: Time set from pool.ntp.org [195.21.137.209]. Jun 24 17:06:09 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 17:28:52 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 18:06:09 RT-N66R daemon.debug ntpclient[10959]: Connecting to pool.ntp.org [216.126.233.109] ... Jun 24 18:06:09 RT-N66R daemon.info ntpclient[10959]: Time set from pool.ntp.org [216.126.233.109]. Jun 24 18:06:09 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 18:50:48 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 19:06:10 RT-N66R daemon.debug ntpclient[11300]: Connecting to pool.ntp.org [184.105.182.16] ... Jun 24 19:06:10 RT-N66R daemon.info ntpclient[11300]: Time set from pool.ntp.org [184.105.182.16]. Jun 24 19:06:10 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 19:35:43 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 20:06:10 RT-N66R daemon.debug ntpclient[11623]: Connecting to pool.ntp.org [99.104.170.138] ... Jun 24 20:06:10 RT-N66R daemon.info ntpclient[11623]: Time set from pool.ntp.org [99.104.170.138]. Jun 24 20:06:10 RT-N66R daemon.info process_monitor[1856]: cyclic NTP Update success (servers pool.ntp.org) Jun 24 20:08:06 RT-N66R daemon.info httpd[1616]: httpd : Authentication fail Jun 24 20:08:06 RT-N66R daemon.err httpd[1616]: httpd : Request Error Code 401: Authorization required. please note that the default username is "root" in all newer releases Jun 24 20:33:10 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 20:48:29 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 20:51:05 RT-N66R kern.warn kernel: br0: received packet on eth1 with own address as source address Jun 24 20:51:41 RT-N66R authpriv.info dropbear[12574]: Child connection from XXX.XXX.XXX.5:54238 Jun 24 20:51:52 RT-N66R authpriv.notice dropbear[12574]: Password auth succeeded for 'root' from XXX.XXX.XXX.5:54238 root@RT-N66R:~#