New Build 36079 (BS): 06-01-2018-r36079

Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Broadcom SoC based Hardware
Goto page 1, 2, 3, 4  Next
Author Message
jwh7
DD-WRT Guru


Joined: 25 Oct 2013
Posts: 2613
Location: Indy

PostPosted: Fri Jun 01, 2018 16:37    Post subject: New Build 36079 (BS): 06-01-2018-r36079 Reply with quote
Downloads at:
https://download1.dd-wrt.com/dd-wrtv2/downloads/betas/2018/06-01-2018-r36079/
ftp://ftp.dd-wrt.com/betas/2018/06-01-2018-r36079/
Also: alternate DD-WRT website link.

Changelogs:
SVN Changelog: Since last build: 36006
Summary: (deprecated after 29739)

Notes:
1. SFE accelerated NAT is in 33006+ builds but only in kernel 3.10 and newer
2. krack fixes for Broadcom were completed in r33678, including k26 (33655) & k24 (33656); use build 33772 or later.

Tickets closed as 'fixed' (Broadcom-related and general):

Issues, observations, and/or workarounds reported:
1. (egc) Policy-Based Routing broken if SFE enabled: http://svn.dd-wrt.com/ticket/5900
quarkysg's PBR+SFE fix: http://svn.dd-wrt.com/ticket/5986
2. Trendnet 81*DRU models are missing factory-to-flash, and 811/812v2 are too big to flash: http://svn.dd-wrt.com/ticket/6144
3. DNScrypt is mostly only using v2 protocols now, but requires Golang that DD can't use:
http://svn.dd-wrt.com/ticket/6246
4. Reports of nas module crashes (used by the bcm driver):
https://svn.dd-wrt.com/ticket/6310

Important: if any issues are found, please provide log info (GUI syslog, `dmesg`, `cat /var/log/messages`).
Or put in SVN ticket. For firewall issues, also provide "iptables" info (`iptables -L`, `iptables -t nat -L`, & the /tmp/.ipt file).

Template to copy (after "Code:") for posting a reply, be sure to include the mode in use (gateway, AP, CB, etc.):
Code:
[b]Router/Version: [/b]
[b]Firmware: [/b]
[b]Kernel: [/b]
[b]Mode: [/b]
[b]Status: [/b]

WARNING: This build thread is for reporting success and/or problems with loading this experimental test build.
This is important info for developers and users. Always state your hardware model, version, mode (e.g. Repeater) and SPECIFIC build (e.g. 33555_NEWD-2_K3.x_mega-nv64k.bin). Create a new thread to discuss specific problems or questions, and refrain to respond as this thread is for reporting, not support. Posts not meeting this criteria may be deleted or moved to keep this thread manageable and useful. If you don't understand the risks or what to flash and how, with a means of recovery if it bricks, do NOT flash this experimental test build.

_________________
# NAT/SFE/CTF: limited speed w/ DD # Repeater issues # DD-WRT info: FAQ, Builds, Types, Modes, Changes, Demo #
x64 OPNsense 20.7.6|FT2020.6: EA6900v1.1@1GHz, F7D8302@532|DD 45036: DIR-810L, WNDR4500v2 & 4000@533,
R6300v1, RT-N66U@663, E1500@353, WRT54G{Lv1.1,Sv6}@250
|OpenWRT 19.7.5: RT-ACRH13, R6220, WNDR3700v4
Sponsor
wicket
DD-WRT Novice


Joined: 18 Jul 2017
Posts: 45
Location: Wisconsin, USA

PostPosted: Fri Jun 01, 2018 17:41    Post subject: Reply with quote
Router/Version: Linksys EA6500 v1
Firmware: DD-WRT v3.0-r36079 giga ( 06/01/18 )
Kernel: Linux 3.10.108-d2 #19444 Fri Jun 1 13:06:35 CEST 2018 mips
Previous: DD-WRT v3.0-r36006 giga ( 05/23/18 )
Mode/Status: Gateway/AP
Setup: Using IPv6 via DNSMasq, DDNS, & Port Range Forward.
Reset: No
Issues/Errors: None so far

Will continue to test.

_________________
Valeriy_tc
DD-WRT User


Joined: 03 Sep 2016
Posts: 66
Location: Ukraine

PostPosted: Fri Jun 01, 2018 18:18    Post subject: Linksys EA6400 Reply with quote
Router/Version: Linksys EA6400
Firmware: DD-WRT v3.0-r36079 std (06/01/18)
Kernel: Linux 4.4.134 #3155 SMP Thu May 31 10:03:20 CEST 2018 armv7l
Previous: DD-WRT v3.0-r36006 std (05/23/18)
Mode/Status: Gateway/Router/Port Forwarding
Reset: No
Issues/Errors: None so far.
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 8368
Location: Texas, USA

PostPosted: Fri Jun 01, 2018 18:27    Post subject: Linksys E4200v1 Reply with quote
Router/Version:  Linksys E4200 v1
Firmware:  DD-WRT v3.0-r36079 mega ( 06/01/18 )
Kernel:  Linux 3.10.108-d2 #19460 Fri Jun 1 13:23:21 CEST 2018 mips
Previous:DD-WRT v3.0-r36006 mega ( 05/23/18 )
Firmware file used:dd-wrt.v24-36079_NEWD-2_K3.x_mega-e4200.bin
Reset;No
Mode: Gateway/AP
Status: OK
Issues/Errors: None so far, except wireless settings for mode and channel were a little screwy couldn't select anything but auto on 5GHz in NA-Mixed mode, and Mixed only allowed 2.4GHz channel selects (I suspect because I didn't do a soft reset!), will continue to test and check syslog. Figured out my previous problems thanks to jwh7. Intel wireless adapter advanced settings on Win10v1803 were as much culprit as anything else. I guess I didn't find or read anything about that in my previous research, but if anyone has a question, let me know.
flyzipper
DD-WRT User


Joined: 21 Feb 2016
Posts: 468

PostPosted: Fri Jun 01, 2018 18:56    Post subject: Reply with quote
Router/Version: Netgear R7000
Firmware: DD-WRT v3.0-r36079 std ( 06/01/18 )
Kernel: Linux 4.4.134 #3155 SMP Thu May 31 10:03:20 CEST 2018 armv7l
Previous: r36006
Mode/Status: Gateway / working
Reset: no
Issues/Errors: None so far, but the paint's still wet.

Uptime: 39m
Temperatures: CPU 65.8 °C / WL0 46.5 °C / WL1 50.0 °C

jwh7
DD-WRT Guru


Joined: 25 Oct 2013
Posts: 2613
Location: Indy

PostPosted: Fri Jun 01, 2018 19:17    Post subject: Reply with quote
Router/Version: Netgear WNDR4000
Firmware: DD-WRT v3.0-r36079 mega ( 06/01/18 )
Kernel: Linux 3.10.108-d2 #19460 Fri Jun 1 13:23:21 CEST 2018 mips
Mode: 2.4 GHz CB to 5 GHz AP + guest VAP
Status: Working fine

Router/Version: Linksys WRT54GSv6
Firmware: DD-WRT v3.0-r36079 micro ( 06/01/18 )
Kernel: Linux 2.4.37 #49626 Fri Jun 1 06:33:33 CEST 2018 mips
Mode: CB
Status: Working fine

Got overzealous and tried to wget/mtd update the 4500v2 since it's in use as a CB for the back yard...it no likey. Sad

_________________
# NAT/SFE/CTF: limited speed w/ DD # Repeater issues # DD-WRT info: FAQ, Builds, Types, Modes, Changes, Demo #
x64 OPNsense 20.7.6|FT2020.6: EA6900v1.1@1GHz, F7D8302@532|DD 45036: DIR-810L, WNDR4500v2 & 4000@533,
R6300v1, RT-N66U@663, E1500@353, WRT54G{Lv1.1,Sv6}@250
|OpenWRT 19.7.5: RT-ACRH13, R6220, WNDR3700v4
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 8368
Location: Texas, USA

PostPosted: Fri Jun 01, 2018 19:35    Post subject: Reply with quote
jwh7 wrote:
Got overzealous and tried to wget/mtd update the 4500v2 since it's in use as a CB for the back yard...it no likey. Sad

....

Whoops.
adasch
DD-WRT User


Joined: 02 Jan 2015
Posts: 69
Location: Gdansk, Poland

PostPosted: Fri Jun 01, 2018 22:07    Post subject: Reply with quote
sorry for lame question but i don't have success with update thru web gui interfacie on EA6900 (it's normal? I alway must make update thru recovery mode...)

how to make it thru telnet?
Brimmy
DD-WRT User


Joined: 29 Mar 2015
Posts: 381

PostPosted: Fri Jun 01, 2018 23:21    Post subject: Reply with quote
Router/Version: Buffalo WZR-1750DHP/DHPD
Firmware: DD-WRT v3.0-r36079 std (06/01/18
Kernel: Linux 4.4.134 #3155 SMP Thu May 31 10:03:20 CEST 2018 armv7l
Previous: BSr34760
Mode/Status: Gateway / WIFI = AP / Seems ok
CPU overclocked to 1200mhz from default 800mhz via r33006
Reset: yes via webGUI and via telnet erase nvram
Issues/Errors: DNSCrypt V1 kills internet connection only if i use a resolver that is not IPV6, no overclocking support and NTP does not load only if i use a DNSCrypt resolver that is not IPV6 and unit must be power cycled after flash or the Buffalo logo would blink 3 times every ten seconds or so indicating bad/corrupt flash

Know that all IP and or MAC addresses do coinside with my network but i will change of leave out any IP/MAC addresses for the following requested data. From running dmesg i found out that my router is a prostitute because it states "device br0 entered promiscuous mode"......filing divorce papers soon.

1) cat/var/log/messages
sh: eval: line 1: cat/var/log/messages: not found <-----please correct me if i did the code wrongly

2) dmesg
pci 0000:00:0a.0: [14e4:0510] type 00 class 0xffffff
pci 0000:00:0a.0: reg 0x10: [mem 0x1800b000-0x1800bfff]
pci 0000:00:0a.0: reg 0x14: [mem 0x1800c000-0x1800cfff]
pci 0000:00:0a.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:0b.0: [14e4:471a] type 00 class 0x0c0310
pci 0000:00:0b.0: reg 0x10: [mem 0x18022000-0x18022fff]
pci 0000:00:0b.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:0b.1: [14e4:471a] type 00 class 0x0c0320
pci 0000:00:0b.1: reg 0x10: [mem 0x18021000-0x18021fff]
pci 0000:00:0b.1: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:0c.0: [14e4:472a] type 00 class 0x0c0330
pci 0000:00:0c.0: reg 0x10: [mem 0x18023000-0x18023fff]
pci 0000:00:0c.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:0d.0: [14e4:0503] type 00 class 0xffffff
pci 0000:00:0d.0: reg 0x10: [mem 0x18020000-0x18020fff]
pci 0000:00:0d.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:0e.0: [14e4:0506] type 00 class 0xffffff
pci 0000:00:0e.0: reg 0x10: [mem 0x18210000-0x1821ffff]
pci 0000:00:0e.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:0f.0: [14e4:0507] type 00 class 0xffffff
pci 0000:00:0f.0: reg 0x10: [mem 0x18010000-0x18010fff]
pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:10.0: [14e4:0508] type 00 class 0xffffff
pci 0000:00:10.0: [Firmware Bug]: reg 0x10: invalid BAR (can't size)
pci 0000:00:10.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:11.0: [14e4:0509] type 00 class 0xffffff
pci 0000:00:11.0: reg 0x10: [mem 0x18028000-0x18028fff]
pci 0000:00:11.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
pci 0000:00:12.0: [14e4:050a] type 00 class 0xffffff
pci 0000:00:12.0: reg 0x10: [mem 0x18029000-0x18029fff]
pci 0000:00:12.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
PCI: Fixing up bus 0 domain 0
PCIE1 link=1
PCIE1 switching to GEN2
PCIE1 link=1
PCI host bridge to bus 0001:00
pci_bus 0001:00: root bus resource [mem 0x08000000-0x0fffffff]
pci_bus 0001:00: No busn resource found for root bus, will use [bus 00-ff]
pci 0001:00:00.0: [14e4:8011] type 01 class 0x060400
pci 0001:00:00.0: PME# supported from D0 D3hot D3cold
PCI: Fixing up bus 0 domain 1
PCI: bus0: Fast back to back transfers disabled
pci 0001:01:00.0: [14e4:4360] type 00 class 0x028000
pci 0001:01:00.0: reg 0x10: [mem 0x08000000-0x08007fff 64bit]
pci 0001:01:00.0: Max Payload Size set to 512 (was 128, max 512)
pci 0001:01:00.0: supports D1 D2
PCI: Fixing up bus 1 domain 1
PCI: bus1: Fast back to back transfers disabled
pci_bus 0001:01: busn_res: [bus 01-ff] end is updated to 01
pci_bus 0001:00: busn_res: [bus 00-ff] end is updated to 01
pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff]
pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit]
pci 0001:00:00.0: PCI bridge to [bus 01]
pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff]
PCIE2 link=1
PCIE2 switching to GEN2
PCIE2 link=1
PCI host bridge to bus 0002:00
pci_bus 0002:00: root bus resource [mem 0x40000000-0x47ffffff]
pci_bus 0002:00: No busn resource found for root bus, will use [bus 00-ff]
pci 0002:00:00.0: [14e4:8011] type 01 class 0x060400
pci 0002:00:00.0: PME# supported from D0 D3hot D3cold
PCI: Fixing up bus 0 domain 2
PCI: bus0: Fast back to back transfers disabled
pci 0002:01:00.0: [14e4:4331] type 00 class 0x028000
pci 0002:01:00.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit]
pci 0002:01:00.0: can't set Max Payload Size to 512; if necessary, use "pci=pcie_bus_safe" and report a bug
pci 0002:01:00.0: supports D1 D2
PCI: Fixing up bus 1 domain 2
PCI: bus1: Fast back to back transfers disabled
pci_bus 0002:01: busn_res: [bus 01-ff] end is updated to 01
pci_bus 0002:00: busn_res: [bus 00-ff] end is updated to 01
pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff]
pci 0002:01:00.0: BAR 0: assigned [mem 0x40000000-0x40003fff 64bit]
pci 0002:00:00.0: PCI bridge to [bus 01]
pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff]
PCIE3 link=0
squashfs: version 4.0 (2009/01/31) Phillip Lougher
io scheduler noop registered (default)
io scheduler cfq registered
serial8250_init
Serial: 8250/16550 driver, 3 ports, IRQ sharing disabled
console [ttyS0] disabled
serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117, base_baud = 6250000) is a 16550
console [ttyS0] enabled
serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117, base_baud = 6250000) is a 16550
brd: module loaded
loop: module loaded
Boot partition size = 2097152(0x200000)
Creating 3 MTD partitions on "bcmsflash":
0x000000000000-0x000000200000 : "boot"
mtd: partition "boot" extends beyond the end of device "bcmsflash" -- size truncated to 0x100000
0x0000000f0000-0x000000100000 : "nvram_cfe"
0x0000000e0000-0x0000000f0000 : "nvram"
Found a Esmt NAND flash:
Total size: 128MB
Block size: 128KB
Page Size: 2048B
OOB Size: 64B
Sector size: 512B
Spare size: 16B
ECC level: 8 (8-bit)
Device ID: 0x92 0xf1 0x80 0x95 0x40 0x7f
lookup_nflash_rootfs_offset: offset = 0x0 size = 0x2000000, 0x20000
found TRX Header on nflash!
nflash: squash filesystem with lzma found at block 13
Creating 2 MTD partitions on "nflash":
0x000000000000-0x000002000000 : "linux"
0x0000001a0000-0x000002000000 : "rootfs"
tun: Universal TUN/TAP device driver, 1.6
tun: (C) 1999-2004 Max Krasnyansky
PPP generic driver version 2.4.2
PPP BSD Compression module registered
PPP Deflate Compression module registered
PPP MPPE Compression module registered
NET: Registered protocol family 24
GACT probability NOT on
Mirror/redirect action on
Simple TC action Loaded
netem: version 1.3
u32 classifier
Performance counters on
input device check on
Actions configured
Netfilter messages via NETLINK v0.30.
nf_conntrack version 0.5.0 (8036 buckets, 32144 max)
nf_conntrack_rtsp v0.7 loading
xt_time: kernel timezone is -0000
ip_set: protocol 6
gre: GRE over IPv4 demultiplexor driver
nf_nat_rtsp v0.7 loading
ip_tables: (C) 2000-2006 Netfilter Core Team
NET: Registered protocol family 17
bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Bridge firewalling registered
8021q: 802.1Q VLAN Support v1.8
Registering SWP/SWPB emulation handler
found cfe nvram
check if nvram copy is required CFE Size is 65536
nvram copy magic is 48534C46
max nvram space = 131072
read 65536 bytes to offset 0
Key type encrypted registered
Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012
nand: device found, Manufacturer ID: 0x92, Chip ID: 0xf1
nand: Eon NAND 128MiB 3,3V 8-bit
nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
Spare area=64 eccbytes 56, ecc bytes located at:
2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Available 7 bytes at (off,len):
(1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0)
Scanning device for bad blocks
Bad eraseblock 1023 at 0x000007fe0000
Options: NO_SUBPAGE_WRITE,
Creating 1 MTD partitions on "brcmnand":
0x000002000000-0x000008000000 : "ddwrt"
VFS: Mounted root (squashfs filesystem) readonly on device 31:4.
Freeing unused kernel memory: 344K
et: module license 'Proprietary' taints kernel.
Disabling lock debugging due to kernel taint
et_module_init: passivemode set to 0x0
et_module_init: txworkq set to 0x0
et_module_init: et_txq_thresh set to 0x400
et_module_init: et_rxlazy_timeout set to 0x3e8
et_module_init: et_rxlazy_framecnt set to 0x20
et_module_init: et_rxlazy_dyn_thresh set to 0
ET Corerev 5
eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.89.21 (r524987)
roboswitch: Probing device 'eth0'
roboswitch: trying a 53011! at eth0
detected CPU Port is 5
roboswitch: found a 53011! at eth0
detected CPU Port is 5
wl_module_init: passivemode set to 0x0
wl_module_init: txworkq set to 0x0
eth1: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987)
PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
eth2: Broadcom BCM4331 802.11 Wireless Controller 7.14.89.21 (r524987)
eth0: mixed HW and IP checksum settings.
device br0 entered promiscuous mode
device vlan1 entered promiscuous mode
device eth0 entered promiscuous mode
br0: port 1(vlan1) entered forwarding state
br0: port 1(vlan1) entered forwarding state
device eth1 entered promiscuous mode
br0: port 2(eth1) entered forwarding state
br0: port 2(eth1) entered forwarding state
device eth2 entered promiscuous mode
br0: port 3(eth2) entered forwarding state
br0: port 3(eth2) entered forwarding state
device br0 left promiscuous mode
device br0 entered promiscuous mode
device br0 left promiscuous mode
device vlan2 entered promiscuous mode
IMQ: use 2 as queue number
IMQ driver loaded successfully. (numdevs = 2, numqueues = 2, imq_dev_accurate_stats = 1)
Hooking IMQ before NAT on PREROUTING.
Hooking IMQ after NAT on POSTROUTING.
random: dnsmasq: uninitialized urandom read (128 bytes read, 58 bits of entropy available)
random: dnsmasq: uninitialized urandom read (48 bytes read, 58 bits of entropy available)
device vlan2 left promiscuous mode
random: dnsmasq: uninitialized urandom read (128 bytes read, 66 bits of entropy available)
random: dnsmasq: uninitialized urandom read (48 bytes read, 66 bits of entropy available)
random: httpd: uninitialized urandom read (32 bytes read, 71 bits of entropy available)
IMQ driver unloaded successfully.
IMQ: use 2 as queue number
IMQ driver loaded successfully. (numdevs = 2, numqueues = 2, imq_dev_accurate_stats = 1)
Hooking IMQ before NAT on PREROUTING.
Hooking IMQ after NAT on POSTROUTING.
random: scc: uninitialized urandom read (127 bytes read, 83 bits of entropy available)
random: scc: uninitialized urandom read (1024 bytes read, 83 bits of entropy available)
random: scc: uninitialized urandom read (127 bytes read, 89 bits of entropy available)
random: scc: uninitialized urandom read (1024 bytes read, 89 bits of entropy available)
random: nas: uninitialized urandom read (16 bytes read, 101 bits of entropy available)
random: nonblocking pool is initialized
br0: port 1(vlan1) entered forwarding state
br0: port 2(eth1) entered forwarding state
br0: port 3(eth2) entered forwarding state

3) iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP 0 -- 333.333.3.3/33 333.313.222.244
DROP 0 -f anywhere anywhere
DROP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
DROP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
ACCEPT 0 -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
DROP udp -- anywhere anywhere udp dpt:route
ACCEPT udp -- anywhere anywhere udp dpt:route
ACCEPT udp -- anywhere anywhere udp dpt:route
ACCEPT 0 -- anywhere anywhere
DROP icmp -- anywhere anywhere
DROP igmp -- anywhere anywhere
ACCEPT 0 -- anywhere anywhere state NEW
ACCEPT 0 -- anywhere anywhere state NEW
DROP 0 -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere tcp dpt:http limit: avg 25/min burst 100
ACCEPT tcp -- anywhere anywhere tcp flags:RST/RST limit: avg 2/sec burst 2
DROP 0 -- anywhere anywhere recent: CHECK seconds: 8640 name: portscan side: source

Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:54680
ACCEPT 0 -- anywhere anywhere state RELATED,ESTABLISHED
lan2wan 0 -- anywhere anywhere
ACCEPT 0 -- anywhere anywhere
ACCEPT 0 -- anywhere anywhere
DROP tcp -- anywhere anywhere tcp dpt:1723
DROP udp -- anywhere anywhere udp dpt:l2f
DROP udp -- anywhere anywhere udp dpt:isakmp
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:27200
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:27200
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:27050
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:1500
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3005
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3101
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:4380
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:27030
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:28960
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3074
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:3074
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3074
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:27050
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:27030
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:1150
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:1150
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:28910
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:5165
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:27901
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:27050
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:27015
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:27030
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:4380
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:27200
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:27200
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpts:27014:27050
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:1500
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3005
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3101
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpts:3478:4380
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpts:27000:27030
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:28960
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3074
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:3074
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:3074
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpts:27014:27050
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpts:27000:27030
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpts:1116:1150
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpts:1116:1150
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpt:28910
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:5165
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpts:27900:27901
ACCEPT tcp -- anywhere PortaL.flowtrinidad.com tcp dpts:27014:27050
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpts:27000:27015
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpts:27015:27030
ACCEPT udp -- anywhere PortaL.flowtrinidad.com udp dpt:4380
TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
trigger_out 0 -- anywhere anywhere
ACCEPT 0 -- anywhere anywhere state NEW
DROP 0 -- anywhere anywhere

Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT 0 -- anywhere anywhere

Chain advgrp_1 (0 references)
target prot opt source destination

Chain advgrp_10 (0 references)
target prot opt source destination

Chain advgrp_2 (0 references)
target prot opt source destination

Chain advgrp_3 (0 references)
target prot opt source destination

Chain advgrp_4 (0 references)
target prot opt source destination

Chain advgrp_5 (0 references)
target prot opt source destination

Chain advgrp_6 (0 references)
target prot opt source destination

Chain advgrp_7 (0 references)
target prot opt source destination

Chain advgrp_8 (0 references)
target prot opt source destination

Chain advgrp_9 (0 references)
target prot opt source destination

Chain grp_1 (0 references)
target prot opt source destination

Chain grp_10 (0 references)
target prot opt source destination

Chain grp_2 (0 references)
target prot opt source destination

Chain grp_3 (0 references)
target prot opt source destination

Chain grp_4 (0 references)
target prot opt source destination

Chain grp_5 (0 references)
target prot opt source destination

Chain grp_6 (0 references)
target prot opt source destination

Chain grp_7 (0 references)
target prot opt source destination

Chain grp_8 (0 references)
target prot opt source destination

Chain grp_9 (0 references)
target prot opt source destination

Chain lan2wan (1 references)
target prot opt source destination

Chain logaccept (0 references)
target prot opt source destination
LOG 0 -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `ACCEPT '
ACCEPT 0 -- anywhere anywhere

Chain logdrop (0 references)
target prot opt source destination
LOG 0 -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
LOG 0 -- anywhere anywhere state INVALID LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
DROP 0 -- anywhere anywhere

Chain logreject (0 references)
target prot opt source destination
LOG 0 -- anywhere anywhere LOG level warning tcp-sequence tcp-options ip-options prefix `WEBDROP '
REJECT tcp -- anywhere anywhere reject-with tcp-reset

Chain trigger_out (1 references)
target prot opt source destination
TRIGGER tcp -- anywhere anywhere tcp dpt:27200 TRIGGER type:out match:27200 relate:27200
TRIGGER udp -- anywhere anywhere udp dpt:27200 TRIGGER type:out match:27200 relate:27200
TRIGGER tcp -- anywhere anywhere tcp dpts:27014:27050 TRIGGER type:out tcp match:27014-27050 relate:27014-27050
TRIGGER udp -- anywhere anywhere udp dpt:1500 TRIGGER type:out udp match:1500 relate:1500
TRIGGER udp -- anywhere anywhere udp dpt:3005 TRIGGER type:out udp match:3005 relate:3005
TRIGGER udp -- anywhere anywhere udp dpt:3101 TRIGGER type:out udp match:3101 relate:3101
TRIGGER udp -- anywhere anywhere udp dpts:3478:4380 TRIGGER type:out udp match:3478-4380 relate:3478-4380
TRIGGER udp -- anywhere anywhere udp dpts:27000:27030 TRIGGER type:out udp match:27000-27030 relate:27000-27030
TRIGGER udp -- anywhere anywhere udp dpt:28960 TRIGGER type:out udp match:28960 relate:28960
TRIGGER udp -- anywhere anywhere udp dpt:3074 TRIGGER type:out udp match:3074 relate:3074
TRIGGER tcp -- anywhere anywhere tcp dpt:3074 TRIGGER type:out match:3074 relate:3074
TRIGGER udp -- anywhere anywhere udp dpt:3074 TRIGGER type:out match:3074 relate:3074
TRIGGER tcp -- anywhere anywhere tcp dpts:27014:27050 TRIGGER type:out tcp match:27014-27050 relate:27014-27050
TRIGGER udp -- anywhere anywhere udp dpts:27000:27030 TRIGGER type:out udp match:27000-27030 relate:27000-27030
TRIGGER tcp -- anywhere anywhere tcp dpts:1116:1150 TRIGGER type:out match:1116-1150 relate:1116-1150
TRIGGER udp -- anywhere anywhere udp dpts:1116:1150 TRIGGER type:out match:1116-1150 relate:1116-1150
TRIGGER tcp -- anywhere anywhere tcp dpt:28910 TRIGGER type:out tcp match:28910 relate:28910
TRIGGER udp -- anywhere anywhere udp dpt:5165 TRIGGER type:out udp match:5165 relate:5165
TRIGGER udp -- anywhere anywhere udp dpts:27900:27901 TRIGGER type:out udp match:27900-27901 relate:27900-27901
TRIGGER tcp -- anywhere anywhere tcp dpts:27014:27050 TRIGGER type:out tcp match:27014-27050 relate:27014-27050
TRIGGER udp -- anywhere anywhere udp dpts:27000:27015 TRIGGER type:out udp match:27000-27015 relate:27000-27015
TRIGGER udp -- anywhere anywhere udp dpts:27015:27030 TRIGGER type:out udp match:27015-27030 relate:27015-27030
TRIGGER udp -- anywhere anywhere udp dpt:4380 TRIGGER type:out udp match:4380 relate:4380


4) iptables -t nat -L
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
DNAT udp -- anywhere 333.313.222.244 udp dpt:54680 to:333.131.6.3:54680
DNAT icmp -- anywhere 333.313.222.244 to:333.313.222.3
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:27200 to:333.131.6.3:27200
DNAT udp -- anywhere 333.313.222.244 udp dpt:27200 to:333.131.6.3:27200
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:27014 to:333.131.6.3:27050
DNAT udp -- anywhere 333.313.222.244 udp dpt:1500 to:333.131.6.3:1500
DNAT udp -- anywhere 333.313.222.244 udp dpt:3005 to:333.131.6.3:3005
DNAT udp -- anywhere 333.313.222.244 udp dpt:3101 to:333.131.6.3:3101
DNAT udp -- anywhere 333.313.222.244 udp dpt:3478 to:333.131.6.3:4380
DNAT udp -- anywhere 333.313.222.244 udp dpt:27000 to:333.131.6.3:27030
DNAT udp -- anywhere 333.313.222.244 udp dpt:28960 to:333.131.6.3:28960
DNAT udp -- anywhere 333.313.222.244 udp dpt:3074 to:333.131.6.3:3074
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:3074 to:333.131.6.3:3074
DNAT udp -- anywhere 333.313.222.244 udp dpt:3074 to:333.131.6.3:3074
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:27014 to:333.131.6.3:27050
DNAT udp -- anywhere 333.313.222.244 udp dpt:27000 to:333.131.6.3:27030
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:1116 to:1333.131.6.3:1150
DNAT udp -- anywhere 333.313.222.244 udp dpt:1116 to:333.131.6.3:1150
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:28910 to:333.131.6.3:28910
DNAT udp -- anywhere 333.313.222.244 udp dpt:5165 to:333.131.6.3:5165
DNAT udp -- anywhere 333.313.222.244 udp dpt:27900 to:333.131.6.3:27901
DNAT tcp -- anywhere 333.313.222.2442 tcp dpt:27014 to:333.131.6.3:27050
DNAT udp -- anywhere 333.313.222.244 udp dpt:27000 to:333.131.6.3:27015
DNAT udp -- anywhere 333.313.222.244 udp dpt:27015 to:333.131.6.3:27030
DNAT udp -- anywhere 333.313.222.244 udp dpt:4380 to:333.131.6.3:4380
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:27200 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:27200 to:1333.131.6.3
DNAT tcp -- anywhere 333.313.222.244 tcp dpts:27014:27050 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:1500 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:3005 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:3101 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpts:3478:4380 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpts:27000:27030 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:28960 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:3074 to:333.131.6.3
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:3074 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:3074 to:333.131.6.3
DNAT tcp -- anywhere 333.313.222.244 tcp dpts:27014:27050 to:1333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpts:27000:27030 to:333.131.6.3
DNAT tcp -- anywhere 333.313.222.244 tcp dpts:1116:1150 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpts:1116:1150 to:333.131.6.3
DNAT tcp -- anywhere 333.313.222.244 tcp dpt:28910 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:5165 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpts:27900:27901 to:333.131.6.3
DNAT tcp -- anywhere 333.313.222.244 tcp dpts:27014:27050 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpts:27000:27015 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpts:27015:27030 to:333.131.6.3
DNAT udp -- anywhere 333.313.222.244 udp dpt:4380 to:333.131.6.3
TRIGGER 0 -- anywhere 333.313.222.244 TRIGGER type:dnat match:0 relate:0

Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
SNAT 0 -- 333.333.3.3/33 anywhere to:333.313.222.244
MASQUERADE 0 -- anywhere anywhere mark match 0x80000000/0x80000000
MASQUERADE 0 -- anywhere anywhere mark match 0xd001
sierratango
DD-WRT Novice


Joined: 22 Jul 2014
Posts: 48

PostPosted: Sat Jun 02, 2018 1:30    Post subject: Reply with quote
Router/Version: Dlink-DIR880L
Firmware: DD-WRT v3.0-r36079 std (06/01/18)
Kernel: Linux 4.4.134 #3155 SMP Thu May 31 10:03:20 CEST 2018 armv7l
Previous: DD-WRT v3.0-r34311 std
Mode/Status: Gateway/Router
Reset: No
Issues/Errors: 2.4GHz wireless SSID not being broadcasted


Router/Version: Dlink-DIR868L
Firmware: DD-WRT v3.0-r36079 std (06/01/18)
Kernel: Linux 4.4.134 #3155 SMP Thu May 31 10:03:20 CEST 2018 armv7l
Previous: DD-WRT v3.0-r34311 std
Mode/Status: Router
Reset: No
Issues/Errors: None


Last edited by sierratango on Sat Jun 02, 2018 2:40; edited 2 times in total
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 8368
Location: Texas, USA

PostPosted: Sat Jun 02, 2018 1:35    Post subject: Reply with quote
Brimmy wrote:
From running dmesg i found out that my router is a prostitute because it states "device br0 entered promiscuous mode"......filing divorce papers soon.


^ That. Is. Hilarious.

Brimmy wrote:
1) cat/var/log/messages
sh: eval: line 1: cat/var/log/messages: not found <-----please correct me if i did the code wrongly


'cat /var/log/messages'... a space should be between cat and /.
Brimmy
DD-WRT User


Joined: 29 Mar 2015
Posts: 381

PostPosted: Sat Jun 02, 2018 2:34    Post subject: Reply with quote
kernel-panic69 wrote:
Brimmy wrote:
From running dmesg i found out that my router is a prostitute because it states "device br0 entered promiscuous mode"......filing divorce papers soon.


^ That. Is. Hilarious.

Brimmy wrote:
1) cat/var/log/messages
sh: eval: line 1: cat/var/log/messages: not found <-----please correct me if i did the code wrongly


'cat /var/log/messages'... a space should be between cat and /.


Thanks man!

1) cat /var/log/messages
Jan 1 01:00:12 ThePort syslog.info syslogd started: BusyBox v1.28.4
Jan 1 00:00:12 ThePort user.info : syslogd : syslog daemon successfully started
Jan 1 00:00:12 ThePort user.info : klogd : klog daemon successfully started
Jan 1 00:00:12 ThePort kern.notice kernel: klogd started: BusyBox v1.28.4 (2018-06-01 07:46:54 CEST)
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:04.0: reg 0x10: [mem 0x18025000-0x18025fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:04.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:05.0: [14e4:4715] type 00 class 0x020000
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:05.0: reg 0x10: [mem 0x18026000-0x18026fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:05.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:06.0: [14e4:4715] type 00 class 0x020000
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:06.0: reg 0x10: [mem 0x18027000-0x18027fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:06.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:07.0: [14e4:0501] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:07.0: reg 0x10: [mem 0x18012000-0x18012fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:08.0: [14e4:0501] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:08.0: reg 0x10: [mem 0x18013000-0x18013fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:08.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:09.0: [14e4:0501] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:09.0: reg 0x10: [mem 0x18014000-0x18014fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:09.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0a.0: [14e4:0510] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0a.0: reg 0x10: [mem 0x1800b000-0x1800bfff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0a.0: reg 0x14: [mem 0x1800c000-0x1800cfff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0a.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0b.0: [14e4:471a] type 00 class 0x0c0310
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0b.0: reg 0x10: [mem 0x18022000-0x18022fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0b.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0b.1: [14e4:471a] type 00 class 0x0c0320
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0b.1: reg 0x10: [mem 0x18021000-0x18021fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0b.1: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0c.0: [14e4:472a] type 00 class 0x0c0330
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0c.0: reg 0x10: [mem 0x18023000-0x18023fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0c.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0d.0: [14e4:0503] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0d.0: reg 0x10: [mem 0x18020000-0x18020fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0d.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0e.0: [14e4:0506] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0e.0: reg 0x10: [mem 0x18210000-0x1821ffff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0e.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0f.0: [14e4:0507] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0f.0: reg 0x10: [mem 0x18010000-0x18010fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:10.0: [14e4:0508] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.info kernel: pci 0000:00:10.0: [Firmware Bug]: reg 0x10: invalid BAR (can't size)
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:10.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:11.0: [14e4:0509] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:11.0: reg 0x10: [mem 0x18028000-0x18028fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:11.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:12.0: [14e4:050a] type 00 class 0xffffff
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:12.0: reg 0x10: [mem 0x18029000-0x18029fff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0000:00:12.0: reg 0x30: [mem 0x00000000-0x000007ff pref]
Jan 1 00:00:12 ThePort kern.warn kernel: PCI: Fixing up bus 0 domain 0
Jan 1 00:00:12 ThePort kern.info kernel: PCIE1 link=1
Jan 1 00:00:12 ThePort kern.info kernel: PCIE1 switching to GEN2
Jan 1 00:00:12 ThePort kern.info kernel: PCIE1 link=1
Jan 1 00:00:12 ThePort kern.info kernel: PCI host bridge to bus 0001:00
Jan 1 00:00:12 ThePort kern.info kernel: pci_bus 0001:00: root bus resource [mem 0x08000000-0x0fffffff]
Jan 1 00:00:12 ThePort kern.info kernel: pci_bus 0001:00: No busn resource found for root bus, will use [bus 00-ff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0001:00:00.0: [14e4:8011] type 01 class 0x060400
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0001:00:00.0: PME# supported from D0 D3hot D3cold
Jan 1 00:00:12 ThePort kern.warn kernel: PCI: Fixing up bus 0 domain 1
Jan 1 00:00:12 ThePort kern.info kernel: PCI: bus0: Fast back to back transfers disabled
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0001:01:00.0: [14e4:4360] type 00 class 0x028000
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0001:01:00.0: reg 0x10: [mem 0x08000000-0x08007fff 64bit]
Jan 1 00:00:12 ThePort kern.info kernel: pci 0001:01:00.0: Max Payload Size set to 512 (was 128, max 512)
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0001:01:00.0: supports D1 D2
Jan 1 00:00:12 ThePort kern.warn kernel: PCI: Fixing up bus 1 domain 1
Jan 1 00:00:12 ThePort kern.info kernel: PCI: bus1: Fast back to back transfers disabled
Jan 1 00:00:12 ThePort kern.debug kernel: pci_bus 0001:01: busn_res: [bus 01-ff] end is updated to 01
Jan 1 00:00:12 ThePort kern.debug kernel: pci_bus 0001:00: busn_res: [bus 00-ff] end is updated to 01
Jan 1 00:00:12 ThePort kern.info kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff]
Jan 1 00:00:12 ThePort kern.info kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit]
Jan 1 00:00:12 ThePort kern.info kernel: pci 0001:00:00.0: PCI bridge to [bus 01]
Jan 1 00:00:12 ThePort kern.info kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff]
Jan 1 00:00:12 ThePort kern.info kernel: PCIE2 link=1
Jan 1 00:00:12 ThePort kern.info kernel: PCIE2 switching to GEN2
Jan 1 00:00:12 ThePort kern.info kernel: PCIE2 link=1
Jan 1 00:00:12 ThePort kern.info kernel: PCI host bridge to bus 0002:00
Jan 1 00:00:12 ThePort kern.info kernel: pci_bus 0002:00: root bus resource [mem 0x40000000-0x47ffffff]
Jan 1 00:00:12 ThePort kern.info kernel: pci_bus 0002:00: No busn resource found for root bus, will use [bus 00-ff]
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0002:00:00.0: [14e4:8011] type 01 class 0x060400
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0002:00:00.0: PME# supported from D0 D3hot D3cold
Jan 1 00:00:12 ThePort kern.warn kernel: PCI: Fixing up bus 0 domain 2
Jan 1 00:00:12 ThePort kern.info kernel: PCI: bus0: Fast back to back transfers disabled
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0002:01:00.0: [14e4:4331] type 00 class 0x028000
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0002:01:00.0: reg 0x10: [mem 0x00000000-0x00003fff 64bit]
Jan 1 00:00:12 ThePort kern.warn kernel: pci 0002:01:00.0: can't set Max Payload Size to 512; if necessary, use "pci=pcie_bus_safe" and report a bug
Jan 1 00:00:12 ThePort kern.debug kernel: pci 0002:01:00.0: supports D1 D2
Jan 1 00:00:12 ThePort kern.warn kernel: PCI: Fixing up bus 1 domain 2
Jan 1 00:00:12 ThePort kern.info kernel: PCI: bus1: Fast back to back transfers disabled
Jan 1 00:00:12 ThePort kern.debug kernel: pci_bus 0002:01: busn_res: [bus 01-ff] end is updated to 01
Jan 1 00:00:12 ThePort kern.debug kernel: pci_bus 0002:00: busn_res: [bus 00-ff] end is updated to 01
Jan 1 00:00:12 ThePort kern.info kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff]
Jan 1 00:00:12 ThePort kern.info kernel: pci 0002:01:00.0: BAR 0: assigned [mem 0x40000000-0x40003fff 64bit]
Jan 1 00:00:12 ThePort kern.info kernel: pci 0002:00:00.0: PCI bridge to [bus 01]
Jan 1 00:00:12 ThePort kern.info kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff]
Jan 1 00:00:12 ThePort kern.info kernel: PCIE3 link=0
Jan 1 00:00:12 ThePort kern.info kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
Jan 1 00:00:12 ThePort kern.info kernel: io scheduler noop registered (default)
Jan 1 00:00:12 ThePort kern.info kernel: io scheduler cfq registered
Jan 1 00:00:12 ThePort kern.info kernel: serial8250_init
Jan 1 00:00:12 ThePort kern.info kernel: Serial: 8250/16550 driver, 3 ports, IRQ sharing disabled
Jan 1 00:00:12 ThePort kern.info kernel: console [ttyS0] disabled
Jan 1 00:00:12 ThePort kern.info kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117, base_baud = 6250000) is a 16550
Jan 1 00:00:12 ThePort kern.info kernel: console [ttyS0] enabled
Jan 1 00:00:12 ThePort kern.info kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117, base_baud = 6250000) is a 16550
Jan 1 00:00:12 ThePort kern.info kernel: brd: module loaded
Jan 1 00:00:12 ThePort kern.info kernel: loop: module loaded
Jan 1 00:00:12 ThePort kern.warn kernel: Boot partition size = 2097152(0x200000)
Jan 1 00:00:12 ThePort kern.notice kernel: Creating 3 MTD partitions on "bcmsflash":
Jan 1 00:00:12 ThePort kern.notice kernel: 0x000000000000-0x000000200000 : "boot"
Jan 1 00:00:12 ThePort kern.warn kernel: mtd: partition "boot" extends beyond the end of device "bcmsflash" -- size truncated to 0x100000
Jan 1 00:00:12 ThePort kern.notice kernel: 0x0000000f0000-0x000000100000 : "nvram_cfe"
Jan 1 00:00:12 ThePort kern.notice kernel: 0x0000000e0000-0x0000000f0000 : "nvram"
Jan 1 00:00:12 ThePort kern.warn kernel: Found a Esmt NAND flash:
Jan 1 00:00:12 ThePort kern.warn kernel: Total size: 128MB
Jan 1 00:00:12 ThePort kern.warn kernel: Block size: 128KB
Jan 1 00:00:12 ThePort kern.warn kernel: Page Size: 2048B
Jan 1 00:00:12 ThePort kern.warn kernel: OOB Size: 64B
Jan 1 00:00:12 ThePort kern.warn kernel: Sector size: 512B
Jan 1 00:00:12 ThePort kern.warn kernel: Spare size: 16B
Jan 1 00:00:12 ThePort kern.warn kernel: ECC level: 8 (8-bit)
Jan 1 00:00:12 ThePort kern.warn kernel: Device ID: 0x92 0xf1 0x80 0x95 0x40 0x7f
Jan 1 00:00:12 ThePort kern.warn kernel: lookup_nflash_rootfs_offset: offset = 0x0 size = 0x2000000, 0x20000
Jan 1 00:00:12 ThePort kern.info kernel: found TRX Header on nflash!
Jan 1 00:00:12 ThePort kern.notice kernel: nflash: squash filesystem with lzma found at block 13
Jan 1 00:00:12 ThePort kern.notice kernel: Creating 2 MTD partitions on "nflash":
Jan 1 00:00:12 ThePort kern.notice kernel: 0x000000000000-0x000002000000 : "linux"
Jan 1 00:00:12 ThePort kern.notice kernel: 0x0000001a0000-0x000002000000 : "rootfs"
Jan 1 00:00:12 ThePort kern.info kernel: tun: Universal TUN/TAP device driver, 1.6
Jan 1 00:00:12 ThePort kern.info kernel: tun: (C) 1999-2004 Max Krasnyansky
Jan 1 00:00:12 ThePort kern.info kernel: PPP generic driver version 2.4.2
Jan 1 00:00:12 ThePort kern.info kernel: PPP BSD Compression module registered
Jan 1 00:00:12 ThePort kern.info kernel: PPP Deflate Compression module registered
Jan 1 00:00:12 ThePort kern.info kernel: PPP MPPE Compression module registered
Jan 1 00:00:12 ThePort kern.info kernel: NET: Registered protocol family 24
Jan 1 00:00:12 ThePort kern.info kernel: GACT probability NOT on
Jan 1 00:00:12 ThePort kern.info kernel: Mirror/redirect action on
Jan 1 00:00:12 ThePort kern.info kernel: Simple TC action Loaded
Jan 1 00:00:12 ThePort kern.info kernel: netem: version 1.3
Jan 1 00:00:12 ThePort kern.info kernel: u32 classifier
Jan 1 00:00:12 ThePort kern.info kernel: Performance counters on
Jan 1 00:00:12 ThePort kern.info kernel: input device check on
Jan 1 00:00:12 ThePort kern.info kernel: Actions configured
Jan 1 00:00:12 ThePort kern.info kernel: Netfilter messages via NETLINK v0.30.
Jan 1 00:00:12 ThePort kern.info kernel: nf_conntrack version 0.5.0 (8036 buckets, 32144 max)
Jan 1 00:00:12 ThePort kern.warn kernel: nf_conntrack_rtsp v0.7 loading
Jan 1 00:00:12 ThePort kern.info kernel: xt_time: kernel timezone is -0000
Jan 1 00:00:12 ThePort kern.info kernel: ip_set: protocol 6
Jan 1 00:00:12 ThePort kern.info kernel: gre: GRE over IPv4 demultiplexor driver
Jan 1 00:00:12 ThePort kern.warn kernel: nf_nat_rtsp v0.7 loading
Jan 1 00:00:12 ThePort kern.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:12 ThePort kern.info kernel: NET: Registered protocol family 17
Jan 1 00:00:12 ThePort kern.info kernel: bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Jan 1 00:00:12 ThePort kern.notice kernel: Bridge firewalling registered
Jan 1 00:00:12 ThePort kern.info kernel: 8021q: 802.1Q VLAN Support v1.8
Jan 1 00:00:12 ThePort kern.notice kernel: Registering SWP/SWPB emulation handler
Jan 1 00:00:12 ThePort kern.emerg kernel: found cfe nvram
Jan 1 00:00:12 ThePort kern.info kernel: check if nvram copy is required CFE Size is 65536
Jan 1 00:00:12 ThePort kern.info kernel: nvram copy magic is 48534C46
Jan 1 00:00:12 ThePort kern.info kernel: max nvram space = 131072
Jan 1 00:00:12 ThePort kern.info kernel: read 65536 bytes to offset 0
Jan 1 00:00:12 ThePort kern.notice kernel: Key type encrypted registered
Jan 1 00:00:12 ThePort kern.info kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012
Jan 1 00:00:12 ThePort kern.info kernel: nand: device found, Manufacturer ID: 0x92, Chip ID: 0xf1
Jan 1 00:00:12 ThePort kern.info kernel: nand: Eon NAND 128MiB 3,3V 8-bit
Jan 1 00:00:12 ThePort kern.info kernel: nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
Jan 1 00:00:12 ThePort kern.warn kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Jan 1 00:00:12 ThePort kern.warn kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Jan 1 00:00:12 ThePort kern.warn kernel: Available 7 bytes at (off,len):
Jan 1 00:00:12 ThePort kern.warn kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0)
Jan 1 00:00:12 ThePort kern.info kernel: Scanning device for bad blocks
Jan 1 00:00:12 ThePort kern.warn kernel: Bad eraseblock 1023 at 0x000007fe0000
Jan 1 00:00:12 ThePort kern.warn kernel: Options: NO_SUBPAGE_WRITE,
Jan 1 00:00:12 ThePort kern.notice kernel: Creating 1 MTD partitions on "brcmnand":
Jan 1 00:00:12 ThePort kern.notice kernel: 0x000002000000-0x000008000000 : "ddwrt"
Jan 1 00:00:12 ThePort kern.info kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:4.
Jan 1 00:00:12 ThePort kern.info kernel: Freeing unused kernel memory: 344K
Jan 1 00:00:12 ThePort kern.warn kernel: et: module license 'Proprietary' taints kernel.
Jan 1 00:00:12 ThePort kern.warn kernel: Disabling lock debugging due to kernel taint
Jan 1 00:00:12 ThePort kern.warn kernel: et_module_init: passivemode set to 0x0
Jan 1 00:00:12 ThePort kern.warn kernel: et_module_init: txworkq set to 0x0
Jan 1 00:00:12 ThePort kern.warn kernel: et_module_init: et_txq_thresh set to 0x400
Jan 1 00:00:12 ThePort kern.warn kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Jan 1 00:00:12 ThePort kern.warn kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Jan 1 00:00:12 ThePort kern.warn kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Jan 1 00:00:12 ThePort kern.info kernel: ET Corerev 5
Jan 1 00:00:12 ThePort kern.warn kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.89.21 (r524987)
Jan 1 00:00:12 ThePort kern.info kernel: roboswitch: Probing device 'eth0'
Jan 1 00:00:12 ThePort kern.info kernel: roboswitch: trying a 53011! at eth0
Jan 1 00:00:12 ThePort kern.info kernel: detected CPU Port is 5
Jan 1 00:00:12 ThePort kern.info kernel: roboswitch: found a 53011! at eth0
Jan 1 00:00:12 ThePort kern.info kernel: detected CPU Port is 5
Jan 1 00:00:12 ThePort kern.warn kernel: wl_module_init: passivemode set to 0x0
Jan 1 00:00:12 ThePort kern.warn kernel: wl_module_init: txworkq set to 0x0
Jan 1 00:00:12 ThePort kern.warn kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987)
Jan 1 00:00:12 ThePort kern.warn kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Jan 1 00:00:12 ThePort kern.warn kernel: eth2: Broadcom BCM4331 802.11 Wireless Controller 7.14.89.21 (r524987)
Jan 1 00:00:12 ThePort kern.warn kernel: eth0: mixed HW and IP checksum settings.
Jan 1 00:00:12 ThePort kern.info kernel: device br0 entered promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: device vlan1 entered promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:12 ThePort kern.info kernel: br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:12 ThePort kern.info kernel: device eth1 entered promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: br0: port 2(eth1) entered forwarding state
Jan 1 00:00:12 ThePort kern.info kernel: br0: port 2(eth1) entered forwarding state
Jan 1 00:00:12 ThePort kern.info kernel: device eth2 entered promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: br0: port 3(eth2) entered forwarding state
Jan 1 00:00:12 ThePort kern.info kernel: br0: port 3(eth2) entered forwarding state
Jan 1 00:00:12 ThePort kern.info kernel: device br0 left promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: device br0 entered promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: device br0 left promiscuous mode
Jan 1 00:00:12 ThePort kern.info kernel: IMQ: use 2 as queue number
Jan 1 00:00:12 ThePort kern.info kernel: IMQ driver loaded successfully. (numdevs = 2, numqueues = 2, imq_dev_accurate_stats = 1)
Jan 1 00:00:12 ThePort kern.info kernel: Hooking IMQ before NAT on PREROUTING.
Jan 1 00:00:12 ThePort kern.info kernel: Hooking IMQ after NAT on POSTROUTING.
Jan 1 00:00:12 ThePort user.info : cron : cron daemon successfully started
Jan 1 00:00:12 ThePort cron.info cron[891]: (CRON) STARTUP (fork ok)
Jan 1 00:00:12 ThePort kern.info kernel: device vlan2 entered promiscuous mode
Jan 1 00:00:12 ThePort user.info : upnp : upnp daemon successfully started
Jan 1 00:00:12 ThePort kern.notice kernel: random: dnsmasq: uninitialized urandom read (128 bytes read, 59 bits of entropy available)
Jan 1 00:00:12 ThePort kern.notice kernel: random: dnsmasq: uninitialized urandom read (48 bytes read, 59 bits of entropy available)
Jan 1 00:00:12 ThePort user.info : dnsmasq : dnsmasq daemon successfully started
Jan 1 00:00:13 ThePort kern.info kernel: device vlan2 left promiscuous mode
Jan 1 00:00:13 ThePort user.info : ttraff : traffic counter daemon successfully started
Jan 1 00:00:13 ThePort user.info : dnsmasq : dnsmasq daemon successfully stopped
Jan 1 00:00:13 ThePort kern.notice kernel: random: dnsmasq: uninitialized urandom read (128 bytes read, 67 bits of entropy available)
Jan 1 00:00:13 ThePort kern.notice kernel: random: dnsmasq: uninitialized urandom read (48 bytes read, 67 bits of entropy available)
Jan 1 00:00:13 ThePort user.info : dnsmasq : dnsmasq daemon successfully started
Jan 1 00:00:14 ThePort user.info : vpn modules : vpn modules successfully unloaded
Jan 1 00:00:14 ThePort daemon.info httpd[1223]: httpd server started at port 80
Jan 1 00:00:14 ThePort daemon.info httpd[1298]: httpd server (ssl support) started at port 443
Jan 1 00:00:14 ThePort user.info : process_monitor successfully started
Jan 1 00:00:14 ThePort user.info : speedchecker : client started
Jan 1 00:00:14 ThePort user.info : upnp : upnp daemon successfully stopped
Jan 1 00:00:15 ThePort kern.notice kernel: random: httpd: uninitialized urandom read (32 bytes read, 71 bits of entropy available)
Jan 1 00:00:15 ThePort user.info : httpd : https daemon successfully started
Jan 1 00:00:15 ThePort user.info : vpn modules : vpn modules successfully unloaded
Jan 1 00:00:16 ThePort kern.info kernel: IMQ driver unloaded successfully.
Jan 1 00:00:16 ThePort user.info : upnp : upnp daemon successfully started
Jan 1 00:00:16 ThePort user.info : wland : WLAN daemon successfully stopped
Jan 1 00:00:16 ThePort kern.info kernel: IMQ: use 2 as queue number
Jan 1 00:00:16 ThePort kern.info kernel: IMQ driver loaded successfully. (numdevs = 2, numqueues = 2, imq_dev_accurate_stats = 1)
Jan 1 00:00:16 ThePort kern.info kernel: Hooking IMQ before NAT on PREROUTING.
Jan 1 00:00:16 ThePort kern.info kernel: Hooking IMQ after NAT on POSTROUTING.
Jan 1 00:00:16 ThePort kern.notice kernel: random: scc: uninitialized urandom read (127 bytes read, 82 bits of entropy available)
Jan 1 00:00:16 ThePort kern.notice kernel: random: scc: uninitialized urandom read (1024 bytes read, 82 bits of entropy available)
Jan 1 00:00:17 ThePort user.info : wland : WLAN daemon successfully started
Jan 1 00:00:17 ThePort user.info : WAN is up. IP: 190.213.234.252
Jan 1 00:00:17 ThePort user.info : scc : speedchecker successfully stopped
Jan 1 00:00:17 ThePort user.info : speedchecker : client started
Jan 1 00:00:17 ThePort daemon.debug ntpclient[1335]: Connecting to 2.pool.ntp.org [4.53.160.75] ...
Jun 1 23:25:04 ThePort daemon.info ntpclient[1335]: Time set from 2.pool.ntp.org [4.53.160.75].
Jun 1 23:25:04 ThePort daemon.info process_monitor[1332]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 1 23:25:04 ThePort daemon.debug process_monitor[1332]: Restarting cron (time sync change)
Jun 1 23:25:04 ThePort user.info : cron : cron daemon successfully stopped
Jun 1 23:25:04 ThePort user.info : process_monitor : Process Monitor successfully stopped
Jun 1 23:25:04 ThePort user.info : cron : cron daemon successfully started
Jun 1 23:25:04 ThePort cron.info cron[1742]: (CRON) STARTUP (fork ok)
Jun 1 23:25:04 ThePort user.info : process_monitor successfully started
Jun 1 23:25:04 ThePort daemon.debug process_monitor[1743]: We need to re-update after 3600 seconds
Jun 1 23:25:04 ThePort daemon.info process_monitor[1743]: set timer: 3600 seconds, callback: ntp_main()
Jun 1 23:25:04 ThePort kern.notice kernel: random: scc: uninitialized urandom read (127 bytes read, 91 bits of entropy available)
Jun 1 23:25:04 ThePort kern.notice kernel: random: scc: uninitialized urandom read (1024 bytes read, 91 bits of entropy available)
Jun 1 23:25:10 ThePort user.info : NAS : NAS lan (wl0 interface) successfully started
Jun 1 23:25:10 ThePort user.info : NAS : NAS lan (wl1 interface) successfully started
Jun 1 23:25:10 ThePort user.info : klogd : kernel log daemon successfully stopped
Jun 1 23:25:10 ThePort kern.notice kernel: klogd: exiting
Jun 1 23:25:10 ThePort user.info : syslogd : syslog daemon successfully stopped
Jun 2 01:25:10 ThePort syslog.info syslogd exiting
Jun 2 01:25:10 ThePort syslog.info syslogd started: BusyBox v1.28.4
Jun 1 23:25:10 ThePort user.info : klogd : klog daemon successfully started
Jun 1 23:25:10 ThePort kern.notice kernel: klogd started: BusyBox v1.28.4 (2018-06-01 07:46:54 CEST)
Jun 1 23:25:10 ThePort user.info : httpd : http daemon successfully stopped
Jun 1 23:25:10 ThePort daemon.info httpd[1360]: httpd server shutdown
Jun 1 23:25:10 ThePort daemon.info httpd[1297]: httpd server shutdown
Jun 1 23:25:10 ThePort daemon.info httpd[1767]: httpd server started at port 80
Jun 1 23:25:10 ThePort daemon.info httpd[1772]: httpd server (ssl support) started at port 443
Jun 1 23:25:10 ThePort kern.notice kernel: random: nas: uninitialized urandom read (16 bytes read, 100 bits of entropy available)
Jun 1 23:25:10 ThePort user.info : httpd : https daemon successfully started
Jun 1 23:25:10 ThePort user.info : resetbutton : resetbutton daemon successfully stopped
Jun 1 23:25:10 ThePort user.info : resetbutton : resetbutton daemon successfully started
Jun 1 23:25:11 ThePort kern.notice kernel: random: nonblocking pool is initialized
Jun 1 23:25:12 ThePort kern.info kernel: br0: port 1(vlan1) entered forwarding state
Jun 1 23:25:13 ThePort kern.info kernel: br0: port 2(eth1) entered forwarding state
Jun 1 23:25:13 ThePort kern.info kernel: br0: port 3(eth2) entered forwarding state
Jun 1 23:25:14 ThePort daemon.err httpd[1773]: Request Error Code 404: File favicon.ico not found.
Jun 1 23:25:14 ThePort user.debug : ttraff: data collection started
Jun 2 00:25:04 ThePort daemon.debug ntpclient[2228]: Connecting to 2.pool.ntp.org [129.250.35.251] ...
Jun 2 00:25:04 ThePort daemon.info ntpclient[2228]: Time set from 2.pool.ntp.org [129.250.35.251].
Jun 2 00:25:04 ThePort daemon.info process_monitor[1743]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 2 01:25:04 ThePort daemon.debug ntpclient[2455]: Connecting to 2.pool.ntp.org [208.88.126.235] ...
Jun 2 01:25:04 ThePort daemon.info ntpclient[2455]: Time set from 2.pool.ntp.org [208.88.126.235].
Jun 2 01:25:04 ThePort daemon.info process_monitor[1743]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 2 02:11:47 ThePort kern.info kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Jun 2 02:25:04 ThePort daemon.debug ntpclient[2685]: Connecting to 2.pool.ntp.org [128.138.141.172] ...
Jun 2 02:25:05 ThePort daemon.info ntpclient[2685]: Time set from 2.pool.ntp.org [128.138.141.172].
Jun 2 02:25:05 ThePort daemon.info process_monitor[1743]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 2 02:30:28 ThePort daemon.info httpd[1773]: Authentication fail
Jun 2 02:30:28 ThePort daemon.err httpd[1773]: Request Error Code 401: Authorization required. please note that the default username is "root" in all newer releases
jwh7
DD-WRT Guru


Joined: 25 Oct 2013
Posts: 2613
Location: Indy

PostPosted: Sat Jun 02, 2018 3:01    Post subject: Reply with quote
kernel-panic69 wrote:
jwh7 wrote:
Got overzealous and tried to wget/mtd update the 4500v2 since it's in use as a CB for the back yard...it no likey. Sad
....
Whoops.
Well, all part of the fun...see below Razz
adasch wrote:
sorry for lame question but i don't have success with update thru web gui interfacie on EA6900 (it's normal? I alway must make update thru recovery mode...)

how to make it thru telnet?
Did you update to the XVortex CFE? Read and search for 'mtd' here.
I'd suggest using `mtd unlock linux` prior to the mtd write command.
Brimmy wrote:
From running dmesg i found out that my router is a prostitute because it states "device br0 entered promiscuous mode"......filing divorce papers soon.
C'mon now, just cuz your router is promiscuous doesn't make it a prostitute. Unless it is selling itself to other modems...in which case your ISP will be hella pissed. Or maybe your router identifies as Nelly Furtado and/or Timbaland?

Router/Version: Netgear WNDR4500v2
Firmware: DD-WRT v3.0-r36079 giga ( 06/01/18 )
Kernel: Linux 3.10.108-d2 #19444 Fri Jun 1 13:06:35 CEST 2018 mips
Mode: 2.4 GHz CB to 5 GHz AP + guest VAP
Status: Reset? Um, ya. After the aforementioned `mtd` fail and subsequent numerous reset and TFTP attempts... I remembered how much I love the simplicity of Netgear case design, and had serial hooked up and flashed back to latest OEM in 5 minutes. Then, eff it, after all this I'll try flashing straight to latest K3X...no problem diggity.

Then, I did a `erase nvram` (backing up and copying the parameters off before and after for later review if needed), and noticed it rebooted twice (and I'll reiterate how effing slow this thing is to boot, thanks to it's NAND CRC check at boot*), but still came back fine and got it set back up as before. That's the last time (maybe...) I try `mtd write` w/o a valid `mtd unlock linux` response (just `write {file} linux` works though). Note to self: if the latter fails, use the device node directly, i.e. `mtd unlock /dev/mtd1` !!!
*PuTTY wrote:
Found a Samsung NAND flash with 2048B pages or 128KB blocks; total size 128MB
et0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 5.100.138
CPU type 0x19749: 600MHz
Tot mem: 131072 KBytes

Device eth0: hwaddr C4-04-15-52-78-A2, ipaddr 192.168.1.1, mask 255.255.255.0
gateway not set, nameserver not set
Checking crc...
And then wait a several minutes. Neutral
_________________
# NAT/SFE/CTF: limited speed w/ DD # Repeater issues # DD-WRT info: FAQ, Builds, Types, Modes, Changes, Demo #
x64 OPNsense 20.7.6|FT2020.6: EA6900v1.1@1GHz, F7D8302@532|DD 45036: DIR-810L, WNDR4500v2 & 4000@533,
R6300v1, RT-N66U@663, E1500@353, WRT54G{Lv1.1,Sv6}@250
|OpenWRT 19.7.5: RT-ACRH13, R6220, WNDR3700v4


Last edited by jwh7 on Wed Nov 28, 2018 15:50; edited 1 time in total
Brimmy
DD-WRT User


Joined: 29 Mar 2015
Posts: 381

PostPosted: Sat Jun 02, 2018 4:21    Post subject: Reply with quote
I have noticed that erase nvram gives a different result via telnet than in the WebGUI, in the GUI it just clears most settings and reboots but the overclock stays intact while via telnet, it erases everything, including the overclock, i don't like that.
Mile-Lile
DD-WRT Guru


Joined: 24 Feb 2013
Posts: 1521
Location: Belgrade

PostPosted: Sat Jun 02, 2018 4:56    Post subject: Reply with quote
Router Model Netgear R6250
Firmware Version DD-WRT v3.0-r36079 std (06/01/1Cool
Kernel Version Linux 4.4.134 #3155 SMP Thu May 31 10:03:20 CEST 2018

Mode: Gateway(PPPoE), AP(2,4 & 5)
Status: OK

Thx BS!!!
Goto page 1, 2, 3, 4  Next Display posts from previous:    Page 1 of 4
Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Broadcom SoC based Hardware All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum