Jan  1 00:00:03 mto kernel: [    0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.000000] Linux version 5.10.36-v8 (valentic@cambria.valentic.net) (aarch64-buildroot-linux-gnu-gcc.br_real (Buildroot v1.11-dirty) 9.3.0, GNU ld (GNU Binutils) 2.35.2) #1 SMP PREEMPT Wed Apr 13 15:42:39 PDT 2022
Jan  1 00:00:03 mto kernel: [    0.000000] Machine model: Raspberry Pi 4 Model B Rev 1.5
Jan  1 00:00:03 mto kernel: [    0.000000] efi: UEFI not found.
Jan  1 00:00:03 mto kernel: [    0.000000] Reserved memory: created CMA memory pool at 0x000000002ac00000, size 64 MiB
Jan  1 00:00:03 mto kernel: [    0.000000] OF: reserved mem: initialized node linux,cma, compatible id shared-dma-pool
Jan  1 00:00:03 mto kernel: [    0.000000] Zone ranges:
Jan  1 00:00:03 mto kernel: [    0.000000]   DMA      [mem 0x0000000000000000-0x000000003fffffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   DMA32    [mem 0x0000000040000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   Normal   empty
Jan  1 00:00:03 mto kernel: [    0.000000] Movable zone start for each node
Jan  1 00:00:03 mto kernel: [    0.000000] Early memory node ranges
Jan  1 00:00:03 mto kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000039bfffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   node   0: [mem 0x0000000040000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000] percpu: Embedded 32 pages/cpu s91224 r8192 d31656 u131072
Jan  1 00:00:03 mto kernel: [    0.000000] Detected PIPT I-cache on CPU0
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: Spectre-v2
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: Spectre-v4
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: ARM errata 1165522, 1319367, or 1530923
Jan  1 00:00:03 mto kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 990864
Jan  1 00:00:03 mto kernel: [    0.000000] Kernel command line: coherent_pool=1M 8250.nr_uarts=0 snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 bcm2708_fb.fbwidth=0 bcm2708_fb.fbheight=0 bcm2708_fb.fbswap=1 smsc95xx.macaddr=E4:5F:01:D6:1F:7D vc_mem.mem_base=0x3ec00000 vc_mem.mem_size=0x40000000  root=/dev/mmcblk0p2 rootwait console=tty1 console=ttyAMA0,115200
Jan  1 00:00:03 mto kernel: [    0.000000] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.000000] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
Jan  1 00:00:03 mto kernel: [    0.000000] software IO TLB: mapped [mem 0x0000000035c00000-0x0000000039c00000] (64MB)
Jan  1 00:00:03 mto kernel: [    0.000000] Memory: 3792268K/4026368K available (11264K kernel code, 1928K rwdata, 3972K rodata, 3712K init, 1242K bss, 168564K reserved, 65536K cma-reserved)
Jan  1 00:00:03 mto kernel: [    0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Jan  1 00:00:03 mto kernel: [    0.000000] ftrace: allocating 36633 entries in 144 pages
Jan  1 00:00:03 mto kernel: [    0.000000] ftrace: allocated 144 pages with 2 groups
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: Preemptible hierarchical RCU implementation.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: 	RCU event tracing is enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: 	RCU restricting CPUs from NR_CPUS=256 to nr_cpu_ids=4.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Trampoline variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Rude variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Tracing variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
Jan  1 00:00:03 mto kernel: [    0.000000] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
Jan  1 00:00:03 mto kernel: [    0.000000] GIC: Using split EOI/Deactivate mode
Jan  1 00:00:03 mto kernel: [    0.000000] random: get_random_bytes called from start_kernel+0x3b8/0x578 with crng_init=0
Jan  1 00:00:03 mto kernel: [    0.000000] arch_timer: cp15 timer(s) running at 54.00MHz (phys).
Jan  1 00:00:03 mto kernel: [    0.000000] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0xc743ce346, max_idle_ns: 440795203123 ns
Jan  1 00:00:03 mto kernel: [    0.000006] sched_clock: 56 bits at 54MHz, resolution 18ns, wraps every 4398046511102ns
Jan  1 00:00:03 mto kernel: [    0.000256] Console: colour dummy device 80x25
Jan  1 00:00:03 mto kernel: [    0.000781] printk: console [tty1] enabled
Jan  1 00:00:03 mto kernel: [    0.000840] Calibrating delay loop (skipped), value calculated using timer frequency.. 108.00 BogoMIPS (lpj=216000)
Jan  1 00:00:03 mto kernel: [    0.000882] pid_max: default: 32768 minimum: 301
Jan  1 00:00:03 mto kernel: [    0.001034] LSM: Security Framework initializing
Jan  1 00:00:03 mto kernel: [    0.001272] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.001351] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.002753] Disabling memory control group subsystem
Jan  1 00:00:03 mto kernel: [    0.004990] rcu: Hierarchical SRCU implementation.
Jan  1 00:00:03 mto kernel: [    0.006028] EFI services will not be available.
Jan  1 00:00:03 mto kernel: [    0.006542] smp: Bringing up secondary CPUs ...
Jan  1 00:00:03 mto kernel: [    0.007523] Detected PIPT I-cache on CPU1
Jan  1 00:00:03 mto kernel: [    0.007601] CPU1: Booted secondary processor 0x0000000001 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.008771] Detected PIPT I-cache on CPU2
Jan  1 00:00:03 mto kernel: [    0.008818] CPU2: Booted secondary processor 0x0000000002 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.009903] Detected PIPT I-cache on CPU3
Jan  1 00:00:03 mto kernel: [    0.009948] CPU3: Booted secondary processor 0x0000000003 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.010096] smp: Brought up 1 node, 4 CPUs
Jan  1 00:00:03 mto kernel: [    0.010186] SMP: Total of 4 processors activated.
Jan  1 00:00:03 mto kernel: [    0.010210] CPU features: detected: 32-bit EL0 Support
Jan  1 00:00:03 mto kernel: [    0.010233] CPU features: detected: CRC32 instructions
Jan  1 00:00:03 mto kernel: [    0.010256] CPU features: detected: 32-bit EL1 Support
Jan  1 00:00:03 mto kernel: [    0.045636] CPU: All CPU(s) started at EL2
Jan  1 00:00:03 mto kernel: [    0.045718] alternatives: patching kernel code
Jan  1 00:00:03 mto kernel: [    0.047300] devtmpfs: initialized
Jan  1 00:00:03 mto kernel: [    0.057783] Enabled cp15_barrier support
Jan  1 00:00:03 mto kernel: [    0.057849] Enabled setend support
Jan  1 00:00:03 mto kernel: [    0.058065] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
Jan  1 00:00:03 mto kernel: [    0.058112] futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.060215] pinctrl core: initialized pinctrl subsystem
Jan  1 00:00:03 mto kernel: [    0.061048] DMI not present or invalid.
Jan  1 00:00:03 mto kernel: [    0.061436] NET: Registered protocol family 16
Jan  1 00:00:03 mto kernel: [    0.064543] DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.064825] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.065758] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.065869] audit: initializing netlink subsys (disabled)
Jan  1 00:00:03 mto kernel: [    0.066272] audit: type=2000 audit(0.064:1): state=initialized audit_enabled=0 res=1
Jan  1 00:00:03 mto kernel: [    0.066770] thermal_sys: Registered thermal governor 'step_wise'
Jan  1 00:00:03 mto kernel: [    0.067228] cpuidle: using governor menu
Jan  1 00:00:03 mto kernel: [    0.067555] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
Jan  1 00:00:03 mto kernel: [    0.067739] ASID allocator initialised with 65536 entries
Jan  1 00:00:03 mto kernel: [    0.067888] Serial: AMBA PL011 UART driver
Jan  1 00:00:03 mto kernel: [    0.096438] bcm2835-mbox fe00b880.mailbox: mailbox enabled
Jan  1 00:00:03 mto kernel: [    0.104323] raspberrypi-firmware soc:firmware: Attached to firmware from 2021-04-30T15:54:12, variant start
Jan  1 00:00:03 mto kernel: [    0.108318] raspberrypi-firmware soc:firmware: Firmware hash is 3e104c5ed69dc796755b7195973a8d00482d76dd
Jan  1 00:00:03 mto kernel: [    0.141961] bcm2835-dma fe007000.dma: DMA legacy API manager, dmachans=0x1
Jan  1 00:00:03 mto kernel: [    0.145867] vgaarb: loaded
Jan  1 00:00:03 mto kernel: [    0.146298] SCSI subsystem initialized
Jan  1 00:00:03 mto kernel: [    0.146521] usbcore: registered new interface driver usbfs
Jan  1 00:00:03 mto kernel: [    0.146597] usbcore: registered new interface driver hub
Jan  1 00:00:03 mto kernel: [    0.146675] usbcore: registered new device driver usb
Jan  1 00:00:03 mto kernel: [    0.146992] usb_phy_generic phy: supply vcc not found, using dummy regulator
Jan  1 00:00:03 mto kernel: [    0.148805] clocksource: Switched to clocksource arch_sys_counter
Jan  1 00:00:03 mto kernel: [    1.167344] VFS: Disk quotas dquot_6.6.0
Jan  1 00:00:03 mto kernel: [    1.167461] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jan  1 00:00:03 mto kernel: [    1.167634] FS-Cache: Loaded
Jan  1 00:00:03 mto kernel: [    1.167880] CacheFiles: Loaded
Jan  1 00:00:03 mto kernel: [    1.178331] NET: Registered protocol family 2
Jan  1 00:00:03 mto kernel: [    1.179537] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.179609] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.179846] TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.180299] TCP: Hash tables configured (established 32768 bind 32768)
Jan  1 00:00:03 mto kernel: [    1.180542] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.180629] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.181042] NET: Registered protocol family 1
Jan  1 00:00:03 mto kernel: [    1.181987] RPC: Registered named UNIX socket transport module.
Jan  1 00:00:03 mto kernel: [    1.182015] RPC: Registered udp transport module.
Jan  1 00:00:03 mto kernel: [    1.182035] RPC: Registered tcp transport module.
Jan  1 00:00:03 mto kernel: [    1.182055] RPC: Registered tcp NFSv4.1 backchannel transport module.
Jan  1 00:00:03 mto kernel: [    1.182087] PCI: CLS 0 bytes, default 64
Jan  1 00:00:03 mto kernel: [    1.184367] hw perfevents: enabled with armv8_cortex_a72 PMU driver, 7 counters available
Jan  1 00:00:03 mto kernel: [    1.184666] kvm [1]: IPA Size Limit: 44 bits
Jan  1 00:00:03 mto kernel: [    1.185890] kvm [1]: vgic interrupt IRQ9
Jan  1 00:00:03 mto kernel: [    1.186183] kvm [1]: Hyp mode initialized successfully
Jan  1 00:00:03 mto kernel: [    1.188341] Initialise system trusted keyrings
Jan  1 00:00:03 mto kernel: [    1.188705] workingset: timestamp_bits=46 max_order=20 bucket_order=0
Jan  1 00:00:03 mto kernel: [    1.194924] zbud: loaded
Jan  1 00:00:03 mto kernel: [    1.196646] FS-Cache: Netfs 'nfs' registered for caching
Jan  1 00:00:03 mto kernel: [    1.197341] NFS: Registering the id_resolver key type
Jan  1 00:00:03 mto kernel: [    1.197409] Key type id_resolver registered
Jan  1 00:00:03 mto kernel: [    1.197431] Key type id_legacy registered
Jan  1 00:00:03 mto kernel: [    1.197556] nfs4filelayout_init: NFSv4 File Layout Driver Registering...
Jan  1 00:00:03 mto kernel: [    1.197582] nfs4flexfilelayout_init: NFSv4 Flexfile Layout Driver Registering...
Jan  1 00:00:03 mto kernel: [    1.198722] Key type asymmetric registered
Jan  1 00:00:03 mto kernel: [    1.198749] Asymmetric key parser 'x509' registered
Jan  1 00:00:03 mto kernel: [    1.198807] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Jan  1 00:00:03 mto kernel: [    1.199059] io scheduler mq-deadline registered
Jan  1 00:00:03 mto kernel: [    1.199085] io scheduler kyber registered
Jan  1 00:00:03 mto kernel: [    1.203290] brcm-pcie fd500000.pcie: host bridge /scb/pcie@7d500000 ranges:
Jan  1 00:00:03 mto kernel: [    1.203339] brcm-pcie fd500000.pcie:   No bus range found for /scb/pcie@7d500000, using [bus 00-ff]
Jan  1 00:00:03 mto kernel: [    1.203426] brcm-pcie fd500000.pcie:      MEM 0x0600000000..0x063fffffff -> 0x00c0000000
Jan  1 00:00:03 mto kernel: [    1.203521] brcm-pcie fd500000.pcie:   IB MEM 0x0000000000..0x00ffffffff -> 0x0400000000
Jan  1 00:00:03 mto kernel: [    1.266901] brcm-pcie fd500000.pcie: link up, 5.0 GT/s PCIe x1 (SSC)
Jan  1 00:00:03 mto kernel: [    1.267283] brcm-pcie fd500000.pcie: PCI host bridge to bus 0000:00
Jan  1 00:00:03 mto kernel: [    1.267315] pci_bus 0000:00: root bus resource [bus 00-ff]
Jan  1 00:00:03 mto kernel: [    1.267351] pci_bus 0000:00: root bus resource [mem 0x600000000-0x63fffffff] (bus address [0xc0000000-0xffffffff])
Jan  1 00:00:03 mto kernel: [    1.267454] pci 0000:00:00.0: [14e4:2711] type 01 class 0x060400
Jan  1 00:00:03 mto kernel: [    1.267706] pci 0000:00:00.0: PME# supported from D0 D3hot
Jan  1 00:00:03 mto kernel: [    1.271328] pci 0000:00:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jan  1 00:00:03 mto kernel: [    1.271734] pci 0000:01:00.0: [1106:3483] type 00 class 0x0c0330
Jan  1 00:00:03 mto kernel: [    1.271868] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Jan  1 00:00:03 mto kernel: [    1.272302] pci 0000:01:00.0: PME# supported from D0 D3hot
Jan  1 00:00:03 mto kernel: [    1.284012] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01
Jan  1 00:00:03 mto kernel: [    1.284069] pci 0000:00:00.0: BAR 8: assigned [mem 0x600000000-0x6000fffff]
Jan  1 00:00:03 mto kernel: [    1.284102] pci 0000:01:00.0: BAR 0: assigned [mem 0x600000000-0x600000fff 64bit]
Jan  1 00:00:03 mto kernel: [    1.284154] pci 0000:00:00.0: PCI bridge to [bus 01]
Jan  1 00:00:03 mto kernel: [    1.284186] pci 0000:00:00.0:   bridge window [mem 0x600000000-0x6000fffff]
Jan  1 00:00:03 mto kernel: [    1.284829] bcm2708_fb soc:fb: Unable to determine number of FBs. Disabling driver.
Jan  1 00:00:03 mto kernel: [    1.284877] bcm2708_fb: probe of soc:fb failed with error -2
Jan  1 00:00:03 mto kernel: [    1.291959] iproc-rng200 fe104000.rng: hwrng registered
Jan  1 00:00:03 mto kernel: [    1.292314] vc-mem: phys_addr:0x00000000 mem_base=0x3ec00000 mem_size:0x40000000(1024 MiB)
Jan  1 00:00:03 mto kernel: [    1.293292] gpiomem-bcm2835 fe200000.gpiomem: Initialised: Registers at 0xfe200000
Jan  1 00:00:03 mto kernel: [    1.293715] cacheinfo: Unable to detect cache hierarchy for CPU 0
Jan  1 00:00:03 mto kernel: [    1.305175] brd: module loaded
Jan  1 00:00:03 mto kernel: [    1.317791] loop: module loaded
Jan  1 00:00:03 mto kernel: [    1.319400] Loading iSCSI transport class v2.0-870.
Jan  1 00:00:03 mto kernel: [    1.322664] libphy: Fixed MDIO Bus: probed
Jan  1 00:00:03 mto kernel: [    1.324211] bcmgenet fd580000.ethernet: GENET 5.0 EPHY: 0x0000
Jan  1 00:00:03 mto kernel: [    1.336830] libphy: bcmgenet MII bus: probed
Jan  1 00:00:03 mto kernel: [    1.388931] unimac-mdio unimac-mdio.-19: Broadcom UniMAC MDIO bus
Jan  1 00:00:03 mto kernel: [    1.390049] usbcore: registered new interface driver r8152
Jan  1 00:00:03 mto kernel: [    1.390130] usbcore: registered new interface driver lan78xx
Jan  1 00:00:03 mto kernel: [    1.390206] usbcore: registered new interface driver smsc95xx
Jan  1 00:00:03 mto kernel: [    1.437693] pci 0000:00:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:03 mto kernel: [    1.437907] xhci_hcd 0000:01:00.0: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.437960] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 1
Jan  1 00:00:03 mto kernel: [    1.438721] xhci_hcd 0000:01:00.0: hcc params 0x002841eb hci version 0x100 quirks 0x0000060000000890
Jan  1 00:00:03 mto kernel: [    1.440022] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10
Jan  1 00:00:03 mto kernel: [    1.440056] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jan  1 00:00:03 mto kernel: [    1.440083] usb usb1: Product: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.440107] usb usb1: Manufacturer: Linux 5.10.36-v8 xhci-hcd
Jan  1 00:00:03 mto kernel: [    1.440130] usb usb1: SerialNumber: 0000:01:00.0
Jan  1 00:00:03 mto kernel: [    1.440920] hub 1-0:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    1.441029] hub 1-0:1.0: 1 port detected
Jan  1 00:00:03 mto kernel: [    1.441671] xhci_hcd 0000:01:00.0: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.441707] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 2
Jan  1 00:00:03 mto kernel: [    1.441745] xhci_hcd 0000:01:00.0: Host supports USB 3.0 SuperSpeed
Jan  1 00:00:03 mto kernel: [    1.442160] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.10
Jan  1 00:00:03 mto kernel: [    1.442191] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jan  1 00:00:03 mto kernel: [    1.442218] usb usb2: Product: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.442241] usb usb2: Manufacturer: Linux 5.10.36-v8 xhci-hcd
Jan  1 00:00:03 mto kernel: [    1.442264] usb usb2: SerialNumber: 0000:01:00.0
Jan  1 00:00:03 mto kernel: [    1.442921] hub 2-0:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    1.443002] hub 2-0:1.0: 4 ports detected
Jan  1 00:00:03 mto kernel: [    1.444490] dwc_otg: version 3.00a 10-AUG-2012 (platform bus)
Jan  1 00:00:03 mto kernel: [    1.445365] usbcore: registered new interface driver uas
Jan  1 00:00:03 mto kernel: [    1.445479] usbcore: registered new interface driver usb-storage
Jan  1 00:00:03 mto kernel: [    1.445689] mousedev: PS/2 mouse device common for all mice
Jan  1 00:00:03 mto kernel: [    1.447568] bcm2835-wdt bcm2835-wdt: Broadcom BCM2835 watchdog timer
Jan  1 00:00:03 mto kernel: [    1.450860] sdhci: Secure Digital Host Controller Interface driver
Jan  1 00:00:03 mto kernel: [    1.450891] sdhci: Copyright(c) Pierre Ossman
Jan  1 00:00:03 mto kernel: [    1.451559] mmc-bcm2835 fe300000.mmcnr: could not get clk, deferring probe
Jan  1 00:00:03 mto kernel: [    1.452089] sdhci-pltfm: SDHCI platform and OF driver helper
Jan  1 00:00:03 mto kernel: [    1.455492] ledtrig-cpu: registered to indicate activity on CPUs
Jan  1 00:00:03 mto kernel: [    1.455843] hid: raw HID events driver (C) Jiri Kosina
Jan  1 00:00:03 mto kernel: [    1.456054] usbcore: registered new interface driver usbhid
Jan  1 00:00:03 mto kernel: [    1.456078] usbhid: USB HID core driver
Jan  1 00:00:03 mto kernel: [    1.463902] Initializing XFRM netlink socket
Jan  1 00:00:03 mto kernel: [    1.463971] NET: Registered protocol family 17
Jan  1 00:00:03 mto kernel: [    1.464109] Key type dns_resolver registered
Jan  1 00:00:03 mto kernel: [    1.464683] registered taskstats version 1
Jan  1 00:00:03 mto kernel: [    1.464723] Loading compiled-in X.509 certificates
Jan  1 00:00:03 mto kernel: [    1.465354] Key type ._fscrypt registered
Jan  1 00:00:03 mto kernel: [    1.465382] Key type .fscrypt registered
Jan  1 00:00:03 mto kernel: [    1.465402] Key type fscrypt-provisioning registered
Jan  1 00:00:03 mto kernel: [    1.476734] uart-pl011 fe201000.serial: there is not valid maps for state default
Jan  1 00:00:03 mto kernel: [    1.477084] uart-pl011 fe201000.serial: cts_event_workaround enabled
Jan  1 00:00:03 mto kernel: [    1.477208] fe201000.serial: ttyAMA0 at MMIO 0xfe201000 (irq = 21, base_baud = 0) is a PL011 rev2
Jan  1 00:00:03 mto kernel: [    2.745165] printk: console [ttyAMA0] enabled
Jan  1 00:00:03 mto kernel: [    2.756614] bcm2835-power bcm2835-power: Broadcom BCM2835 power domains driver
Jan  1 00:00:03 mto kernel: [    2.764871] mmc-bcm2835 fe300000.mmcnr: mmc_debug:0 mmc_debug2:0
Jan  1 00:00:03 mto kernel: [    2.770909] mmc-bcm2835 fe300000.mmcnr: DMA channel allocated
Jan  1 00:00:03 mto kernel: [    2.807408] of_cfs_init
Jan  1 00:00:03 mto kernel: [    2.810035] of_cfs_init: OK
Jan  1 00:00:03 mto kernel: [    2.814058] uart-pl011 fe201000.serial: no DMA platform data
Jan  1 00:00:03 mto kernel: [    2.826348] mmc1: queuing unknown CIS tuple 0x80 (2 bytes)
Jan  1 00:00:03 mto kernel: [    2.833709] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.843538] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.851664] mmc0: SDHCI controller on fe340000.emmc2 [fe340000.emmc2] using ADMA
Jan  1 00:00:03 mto kernel: [    2.863185] Waiting for root device /dev/mmcblk0p2...
Jan  1 00:00:03 mto kernel: [    2.872345] mmc1: queuing unknown CIS tuple 0x80 (7 bytes)
Jan  1 00:00:03 mto kernel: [    2.881809] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.920077] random: fast init done
Jan  1 00:00:03 mto kernel: [    2.970130] mmc1: new high speed SDIO card at address 0001
Jan  1 00:00:03 mto kernel: [    2.989054] usb 2-2: new SuperSpeed Gen 1 USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    2.999026] mmc0: new ultra high speed DDR50 SDXC card at address 0001
Jan  1 00:00:03 mto kernel: [    3.008387] mmcblk0: mmc0:0001 BC2QT 59.6 GiB
Jan  1 00:00:03 mto kernel: [    3.017064]  mmcblk0: p1 p2
Jan  1 00:00:03 mto kernel: [    3.023096] usb 2-2: New USB device found, idVendor=2357, idProduct=0601, bcdDevice=30.00
Jan  1 00:00:03 mto kernel: [    3.034409] usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jan  1 00:00:03 mto kernel: [    3.043369] usb 2-2: Product: USB 10/100/1000 LAN
Jan  1 00:00:03 mto kernel: [    3.050146] usb 2-2: Manufacturer: TP-Link
Jan  1 00:00:03 mto kernel: [    3.056299] usb 2-2: SerialNumber: 000001
Jan  1 00:00:03 mto kernel: [    3.056809] EXT4-fs (mmcblk0p2): mounted filesystem with ordered data mode. Opts: (null)
Jan  1 00:00:03 mto kernel: [    3.072734] VFS: Mounted root (ext4 filesystem) readonly on device 179:2.
Jan  1 00:00:03 mto kernel: [    3.082376] devtmpfs: mounted
Jan  1 00:00:03 mto kernel: [    3.096645] Freeing unused kernel memory: 3712K
Jan  1 00:00:03 mto kernel: [    3.104970] Run /sbin/init as init process
Jan  1 00:00:03 mto kernel: [    3.148855] usb 1-1: new high-speed USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.303470] usb 1-1: New USB device found, idVendor=2109, idProduct=3431, bcdDevice= 4.21
Jan  1 00:00:03 mto kernel: [    3.311724] usb 1-1: New USB device strings: Mfr=0, Product=1, SerialNumber=0
Jan  1 00:00:03 mto kernel: [    3.318896] usb 1-1: Product: USB2.0 Hub
Jan  1 00:00:03 mto kernel: [    3.326790] hub 1-1:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    3.330953] hub 1-1:1.0: 4 ports detected
Jan  1 00:00:03 mto kernel: [    3.429719] usb 2-2: reset SuperSpeed Gen 1 USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.455153] EXT4-fs (mmcblk0p2): re-mounted. Opts: (null)
Jan  1 00:00:03 mto kernel: [    3.466859] r8152 2-2:1.0: Direct firmware load for rtl_nic/rtl8153a-4.fw failed with error -2
Jan  1 00:00:03 mto kernel: [    3.475668] r8152 2-2:1.0: unable to load firmware patch rtl_nic/rtl8153a-4.fw (-2)
Jan  1 00:00:03 mto kernel: [    3.514011] r8152 2-2:1.0 eth1: v1.12.11
Jan  1 00:00:03 mto kernel: [    3.583397] PPP generic driver version 2.4.2
Jan  1 00:00:03 mto kernel: [    3.598763] PPP Deflate Compression module registered
Jan  1 00:00:03 mto kernel: [    3.631555] PPP BSD Compression module registered
Jan  1 00:00:03 mto kernel: [    3.636850] usb 1-1.4: new full-speed USB device number 3 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.749387] usb 1-1.4: New USB device found, idVendor=1546, idProduct=01a7, bcdDevice= 1.00
Jan  1 00:00:03 mto kernel: [    3.757833] usb 1-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jan  1 00:00:03 mto kernel: [    3.765180] usb 1-1.4: Product: u-blox 7 - GPS/GNSS Receiver
Jan  1 00:00:03 mto kernel: [    3.772249] usb 1-1.4: Manufacturer: u-blox AG - www.u-blox.com
Jan  1 00:00:03 mto sysctl: * Applying /etc/sysctl.conf ...
Jan  1 00:00:03 mto sysctl: kernel.panic = 10
Jan  1 00:00:03 mto sysctl: kernel.panic_on_oops = 1
Jan  1 00:00:03 mto sysctl: kernel.printk = 4 4 1 7
Jan  1 00:00:04 mto kernel: [    4.127369] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.128845] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.128940] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.326830] rpivid-mem feb00000.hevc-decoder: rpivid-hevcmem initialised: Registers at 0xfeb00000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.327401] rpivid-mem feb10000.rpivid-local-intc: rpivid-intcmem initialised: Registers at 0xfeb10000 length 0x00001000
Jan  1 00:00:04 mto kernel: [    4.327879] rpivid-mem feb20000.h264-decoder: rpivid-h264mem initialised: Registers at 0xfeb20000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.328383] rpivid-mem feb30000.vp9-decoder: rpivid-vp9mem initialised: Registers at 0xfeb30000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.351992] vc_sm_cma: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.353995] bcm2835_vc_sm_cma_probe: Videocore shared memory driver
Jan  1 00:00:04 mto kernel: [    4.354022] [vc_sm_connected_init]: start
Jan  1 00:00:04 mto kernel: [    4.359326] [vc_sm_connected_init]: installed successfully
Jan  1 00:00:04 mto kernel: [    4.370724] mc: Linux media interface: v0.10
Jan  1 00:00:04 mto kernel: [    4.422786] videodev: Linux video capture interface: v2.00
Jan  1 00:00:04 mto kernel: [    4.448073] cdc_acm 1-1.4:1.0: ttyACM0: USB ACM device
Jan  1 00:00:04 mto kernel: [    4.451250] usbcore: registered new interface driver cdc_acm
Jan  1 00:00:04 mto kernel: [    4.451272] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Jan  1 00:00:04 mto kernel: [    4.486642] bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.491635] bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.494541] bcm2835_isp: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.498136] bcm2835_v4l2: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.511914] bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video13
Jan  1 00:00:04 mto kernel: [    4.512433] bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video14
Jan  1 00:00:04 mto kernel: [    4.512941] bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video15
Jan  1 00:00:04 mto kernel: [    4.513437] bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video16
Jan  1 00:00:04 mto kernel: [    4.513469] bcm2835-isp bcm2835-isp: Register output node 0 with media controller
Jan  1 00:00:04 mto kernel: [    4.513505] bcm2835-isp bcm2835-isp: Register capture node 1 with media controller
Jan  1 00:00:04 mto kernel: [    4.513523] bcm2835-isp bcm2835-isp: Register capture node 2 with media controller
Jan  1 00:00:04 mto kernel: [    4.513540] bcm2835-isp bcm2835-isp: Register capture node 3 with media controller
Jan  1 00:00:04 mto kernel: [    4.513755] bcm2835-isp bcm2835-isp: Loaded V4L2 bcm2835-isp
Jan  1 00:00:04 mto kernel: [    4.522027] cfg80211: Loading compiled-in X.509 certificates for regulatory database
Jan  1 00:00:04 mto kernel: [    4.527186] bcm2835_codec: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.528512] rtc-pcf8523 1-0068: registered as rtc0
Mar 11 18:41:00 mto kernel: [    4.535446] rtc-pcf8523 1-0068: setting system clock to 2026-03-11T18:41:00 UTC (1773254460)
Mar 11 18:41:00 mto kernel: [    4.537680] bcm2835-codec bcm2835-codec: Device registered as /dev/video10
Mar 11 18:41:00 mto kernel: [    4.537743] bcm2835-codec bcm2835-codec: Loaded V4L2 decode
Mar 11 18:41:00 mto gpsd.hotplug: add /dev/ttyACM0
Mar 11 18:41:00 mto kernel: [    4.546270] bcm2835-codec bcm2835-codec: Device registered as /dev/video11
Mar 11 18:41:00 mto kernel: [    4.546328] bcm2835-codec bcm2835-codec: Loaded V4L2 encode
Mar 11 18:41:00 mto kernel: [    4.555656] bcm2835-codec bcm2835-codec: Device registered as /dev/video12
Mar 11 18:41:00 mto kernel: [    4.555708] bcm2835-codec bcm2835-codec: Loaded V4L2 isp
Mar 11 18:41:00 mto gpsdctl: gpsd_control(action=add, arg=/dev/ttyACM0)
Mar 11 18:41:00 mto gpsdctl: launching gpsd -n -F /run/gpsd.sock
Mar 11 18:41:00 mto kernel: [    4.689252] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Mar 11 18:41:00 mto kernel: [    4.696104] NET: Registered protocol family 10
Mar 11 18:41:00 mto gpsd[189]: gpsd:ERROR: can't bind to IPv6 port 2947, Cannot assign requested address
Mar 11 18:41:00 mto kernel: [    4.698123] Segment Routing with IPv6
Mar 11 18:41:00 mto rsyslogd: [origin software="rsyslogd" swVersion="8.2010.0" x-pid="121" x-info="https://www.rsyslog.com"] start
Mar 11 18:41:00 mto kernel: [    4.734715] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6
Mar 11 18:41:00 mto kernel: [    4.744398] usbcore: registered new interface driver brcmfmac
Mar 11 18:41:00 mto kernel: [    4.923949] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6
Mar 11 18:41:00 mto kernel: [    4.933458] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available
Mar 11 18:41:00 mto kernel: [    4.945470] brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Mar  1 2015 07:29:38 version 7.45.18 (r538002) FWID 01-6a2c8ad4
Mar 11 18:41:01 mto kernel: [    5.143404] urandom_read: 5 callbacks suppressed
Mar 11 18:41:01 mto kernel: [    5.143418] random: dbus-uuidgen: uninitialized urandom read (12 bytes read)
Mar 11 18:41:01 mto kernel: [    5.143497] random: dbus-uuidgen: uninitialized urandom read (8 bytes read)
Mar 11 18:41:01 mto wpa_supplicant[229]: Successfully initialized wpa_supplicant
Mar 11 18:41:01 mto kernel: [    5.372020] brcmfmac: brcmf_cfg80211_set_power_mgmt: power save enabled
Mar 11 18:41:03 mto kernel: [    7.316856] random: crng init done
Mar 11 18:41:03 mto wpa_supplicant[233]: wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
Mar 11 18:41:03 mto kernel: [    7.622964] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Mar 11 18:41:03 mto kernel: [    7.623601] r8152 2-2:1.0 eth1: carrier on
Mar 11 18:41:04 mto ifplugd(eth0): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Mar 11 18:41:04 mto ifplugd(eth0): upping interface
Mar 11 18:41:04 mto ifplugd(eth0): using SIOCETHTOOL detection mode
Mar 11 18:41:04 mto ifplugd(eth0): interface exists
Mar 11 18:41:04 mto ifplugd(eth0): link is down
Mar 11 18:41:04 mto kernel: [    8.401274] bcmgenet fd580000.ethernet: configuring instance for external RGMII (RX delay)
Mar 11 18:41:04 mto kernel: [    8.401630] bcmgenet fd580000.ethernet eth0: Link is Down
Mar 11 18:41:04 mto ifplugd(wlan0): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Mar 11 18:41:04 mto ifplugd(wlan0): using wireless extension detection mode
Mar 11 18:41:04 mto ifplugd(wlan0): interface exists
Mar 11 18:41:04 mto ifplugd(wlan0): link is down
Mar 11 18:41:04 mto ifplugd(eth1): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Mar 11 18:41:04 mto ifplugd(eth1): using SIOCETHTOOL detection mode
Mar 11 18:41:04 mto ifplugd(eth1): interface exists
Mar 11 18:41:04 mto ifplugd(eth1): link is up
Mar 11 18:41:04 mto chronyd[323]: chronyd version 4.0 starting (+CMDMON +NTP +REFCLOCK +RTC -PRIVDROP -SCFILTER -SIGND +ASYNCDNS -NTS -SECHASH +IPV6 -DEBUG)
Mar 11 18:41:04 mto gpsd[327]: gpsd:ERROR: can't bind to IPv4 port 2947, Address already in use
Mar 11 18:41:04 mto gpsd[327]: gpsd:ERROR: maybe gpsd is already running!  Or systemd has the port?
Mar 11 18:41:04 mto gpsd[327]: gpsd:ERROR: SER: /dev/gps0 already opened by another process
Mar 11 18:41:04 mto sshd[337]: Server listening on 0.0.0.0 port 22.
Mar 11 18:41:04 mto sshd[337]: Server listening on :: port 22.
Mar 11 18:41:04 mto rpc.statd[351]: Version 2.3.3 starting
Mar 11 18:41:04 mto sm-notify[352]: Version 2.3.3 starting
Mar 11 18:41:04 mto rpc.statd[351]: Initializing NSM state
Mar 11 18:41:04 mto rpc.statd[351]: Running as root.  chown /run/nfs to choose different user
Mar 11 18:41:04 mto kernel: [    8.915596] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
Mar 11 18:41:05 mto kernel: [   10.055855] NFSD: Using UMH upcall client tracking operations.
Mar 11 18:41:05 mto kernel: [   10.055883] NFSD: starting 90-second grace period (net f0000081)
Mar 11 18:41:05 mto rpc.mountd[366]: Version 2.3.3 starting
Mar 11 18:41:06 mto su: + none root:news
Mar 11 18:41:08 mto ifplugd(eth0): link is up
Mar 11 18:41:08 mto ifplugd(eth0): executing '/etc/ifplugd/ifplugd.action eth0 up'
Mar 11 18:41:08 mto kernel: [   12.477092] bcmgenet fd580000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
Mar 11 18:41:08 mto kernel: [   12.477162] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Mar 11 18:41:08 mto udhcpc[452]: started, v1.33.0
Mar 11 18:41:08 mto udhcpc[452]: sending discover
Mar 11 18:41:08 mto : starting pid 464, tty '/dev/console': '/sbin/getty -L  console 0 vt100 '
Mar 11 18:41:08 mto : starting pid 465, tty '/dev/tty1': '/sbin/getty -L  tty1 0 vt100 '
Mar 11 18:41:11 mto udhcpc[452]: sending discover
Mar 11 18:41:11 mto udhcpc[452]: sending select for 192.168.1.166
Mar 11 18:41:11 mto udhcpc[452]: lease of 192.168.1.166 obtained, lease time 86400
Mar 11 18:41:12 mto ifplugd(eth0): exit code: 0
Mar 11 18:41:37 mto chronyd[323]: Selected source 67.217.246.204 (pool.ntp.org)
Mar 11 18:41:39 mto chronyd[323]: Selected source 162.159.200.123 (pool.ntp.org)
Mar 11 18:42:43 mto chronyd[323]: Selected source 51.81.226.229 (pool.ntp.org)
Mar 11 18:43:48 mto chronyd[323]: Selected source 162.159.200.123 (pool.ntp.org)
Mar 11 19:00:01 mto relay-watchdog: Relay flag is still current
Mar 11 19:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 11 20:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 11 20:00:01 mto relay-watchdog: Relay flag is still current
Mar 11 20:56:04 mto sshd[11957]: Accepted publickey for ops from 127.0.0.1 port 42308 ssh2: ED25519 SHA256:qdld6QQlQaMOIJ7XSmiizKBe4GbTK/LPOOw0lvI+hXc
Mar 11 21:00:01 mto relay-watchdog: Relay flag is still current
Mar 11 21:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 11 22:00:01 mto relay-watchdog: Relay flag is still current
Mar 11 22:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 11 22:06:35 mto sshd[11959]: Received disconnect from 127.0.0.1 port 42308:11: disconnected by user
Mar 11 22:06:35 mto sshd[11959]: Disconnected from user ops 127.0.0.1 port 42308
Mar 11 23:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 11 23:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 00:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 00:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 01:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 01:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 02:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 02:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 02:09:31 mto kernel: [26915.893454] usb 1-1.3: new high-speed USB device number 4 using xhci_hcd
Mar 12 02:09:31 mto kernel: [26915.993857] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Mar 12 02:09:31 mto kernel: [26915.993882] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Mar 12 03:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 03:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 04:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 05:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 06:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 06:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 12 06:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 12 07:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 08:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 09:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 10:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 11:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 11:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 12 11:10:59 mto kernel: [59404.302430] usb 1-1.3: USB disconnect, device number 4
Mar 12 11:47:49 mto kernel: [61614.432882] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
Mar 12 11:48:06 mto sshd[23347]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 11:48:06 mto sshd[23347]: Connection closed by 192.168.1.1 port 45014
Mar 12 11:58:12 mto sshd[24163]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 11:58:12 mto sshd[24163]: Connection closed by 192.168.1.1 port 52960
Mar 12 12:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 12:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 12:10:25 mto sshd[25157]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 12:10:25 mto sshd[25157]: Connection closed by 192.168.1.1 port 50310
Mar 12 12:29:39 mto sshd[26802]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 12:29:39 mto sshd[26802]: Connection closed by 192.168.1.1 port 37220
Mar 12 12:43:26 mto sshd[27937]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 12:43:26 mto sshd[27937]: Connection closed by 192.168.1.1 port 35994
Mar 12 12:57:17 mto sshd[29078]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 12:57:17 mto sshd[29078]: Connection closed by 192.168.1.1 port 51324
Mar 12 13:00:02 mto relay-watchdog: Relay flag is still current
Mar 12 13:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 12 13:22:30 mto sshd[31240]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 13:22:30 mto sshd[31240]: Connection closed by 192.168.1.1 port 55490
Mar 12 13:34:33 mto sshd[32227]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 13:34:33 mto sshd[32227]: Connection closed by 192.168.1.1 port 36626
Mar 12 13:44:55 mto sshd[641]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 13:44:55 mto sshd[641]: Connection closed by 192.168.1.1 port 38232
Mar 12 14:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 14:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 14:04:16 mto sshd[2328]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 14:04:16 mto sshd[2328]: Connection closed by 192.168.1.1 port 38186
Mar 12 14:34:17 mto sshd[4858]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 14:34:17 mto sshd[4858]: Connection closed by 192.168.1.1 port 56676
Mar 12 14:47:01 mto sshd[5912]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 14:47:01 mto sshd[5912]: Connection closed by 192.168.1.1 port 59176
Mar 12 14:56:25 mto sshd[6713]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 14:56:25 mto sshd[6713]: Connection closed by 192.168.1.1 port 40448
Mar 12 15:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 15:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 15:05:29 mto sshd[7499]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 15:05:29 mto sshd[7499]: Connection closed by 192.168.1.1 port 43900
Mar 12 15:20:59 mto sshd[8757]: error: kex_exchange_identification: Connection closed by remote host
Mar 12 15:20:59 mto sshd[8757]: Connection closed by 192.168.1.1 port 46936
Mar 12 16:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 16:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 17:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 17:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 18:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 18:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 18:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 12 18:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 12 19:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 19:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 20:00:02 mto relay-watchdog: Relay flag is still current
Mar 12 20:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 12 21:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 21:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 22:00:01 mto relay-watchdog: Relay flag is still current
Mar 12 22:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 12 23:00:02 mto relay-watchdog: Relay flag is still current
Mar 12 23:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 13 00:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 00:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 01:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 01:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 02:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 02:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 02:11:06 mto kernel: [113412.351729] usb 1-1.3: new high-speed USB device number 5 using xhci_hcd
Mar 13 02:11:06 mto kernel: [113412.452134] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Mar 13 02:11:06 mto kernel: [113412.452159] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Mar 13 03:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 03:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 04:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 05:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 06:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 06:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 13 06:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 13 07:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 08:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 08:44:15 mto sshd[32244]: error: kex_exchange_identification: Connection closed by remote host
Mar 13 08:44:15 mto sshd[32244]: Connection closed by 192.168.1.1 port 39962
Mar 13 08:56:32 mto sshd[803]: error: kex_exchange_identification: Connection closed by remote host
Mar 13 08:56:32 mto sshd[803]: Connection closed by 192.168.1.1 port 48864
Mar 13 09:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 09:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 09:08:22 mto sshd[1741]: error: kex_exchange_identification: Connection closed by remote host
Mar 13 09:08:22 mto sshd[1741]: Connection closed by 192.168.1.1 port 36690
Mar 13 09:19:32 mto sshd[2687]: error: kex_exchange_identification: Connection closed by remote host
Mar 13 09:19:32 mto sshd[2687]: Connection closed by 192.168.1.1 port 41938
Mar 13 10:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 11:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 11:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 13 11:06:59 mto kernel: [145565.861570] usb 1-1.3: USB disconnect, device number 5
Mar 13 12:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 12:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 13:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 13:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 14:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 14:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 15:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 15:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 16:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 16:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 17:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 17:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 18:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 18:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 18:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 13 18:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 13 19:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 19:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 19:47:25 mto sshd[22704]: error: kex_exchange_identification: Connection closed by remote host
Mar 13 19:47:25 mto sshd[22704]: Connection closed by 192.168.1.1 port 56732
Mar 13 19:52:36 mto sshd[23141]: error: kex_exchange_identification: Connection closed by remote host
Mar 13 19:52:36 mto sshd[23141]: Connection closed by 192.168.1.1 port 33486
Mar 13 20:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 20:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 21:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 21:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 22:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 22:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 13 23:00:01 mto relay-watchdog: Relay flag is still current
Mar 13 23:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 00:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 00:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 01:00:02 mto relay-watchdog: Relay flag is still current
Mar 14 01:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 14 02:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 02:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 02:12:46 mto kernel: [199914.185728] usb 1-1.3: new high-speed USB device number 6 using xhci_hcd
Mar 14 02:12:46 mto kernel: [199914.286092] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Mar 14 02:12:46 mto kernel: [199914.286114] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Mar 14 03:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 03:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 04:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 05:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 06:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 06:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 14 06:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 14 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 07:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 08:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 09:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 10:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 11:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 14 11:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 11:06:58 mto kernel: [231966.572109] usb 1-1.3: USB disconnect, device number 6
Mar 14 12:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 12:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 13:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 13:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 14:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 14:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 15:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 15:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 16:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 16:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 17:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 17:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 18:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 18:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 18:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 14 18:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 14 19:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 19:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 20:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 20:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 21:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 21:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 22:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 22:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 14 23:00:01 mto relay-watchdog: Relay flag is still current
Mar 14 23:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 00:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 00:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 01:00:02 mto relay-watchdog: Relay flag is still current
Mar 15 01:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 15 02:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 02:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 02:14:21 mto kernel: [286410.658163] usb 1-1.3: new high-speed USB device number 7 using xhci_hcd
Mar 15 02:14:21 mto kernel: [286410.758553] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Mar 15 02:14:21 mto kernel: [286410.758576] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Mar 15 03:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 03:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 04:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 05:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 06:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 06:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 15 06:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 15 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 07:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 08:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 09:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 10:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 11:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 11:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 15 11:02:58 mto kernel: [318128.405444] usb 1-1.3: USB disconnect, device number 7
Mar 15 12:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 12:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 13:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 13:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 14:00:02 mto relay-watchdog: Relay flag is still current
Mar 15 14:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 15 15:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 15 15:00:02 mto relay-watchdog: Relay flag is still current
Mar 15 16:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 16:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 17:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 17:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 18:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 18:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 18:41:11 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 15 18:41:11 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 15 19:00:02 mto relay-watchdog: Relay flag is still current
Mar 15 19:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 15 20:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 15 20:00:02 mto relay-watchdog: Relay flag is still current
Mar 15 21:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 21:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 22:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 22:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 15 23:00:01 mto relay-watchdog: Relay flag is still current
Mar 15 23:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 00:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 00:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 01:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 01:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 02:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 02:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 02:16:01 mto kernel: [372912.522422] usb 1-1.3: new high-speed USB device number 8 using xhci_hcd
Mar 16 02:16:01 mto kernel: [372912.622803] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Mar 16 02:16:01 mto kernel: [372912.622825] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Mar 16 03:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 03:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 04:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 05:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 06:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 06:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 06:41:12 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 16 06:41:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 16 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 07:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 08:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 09:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 10:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 11:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 11:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 16 11:02:58 mto kernel: [404529.910877] usb 1-1.3: USB disconnect, device number 8
Mar 16 12:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 12:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 13:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 13:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 14:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 14:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 15:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 15:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 16:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 16:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 17:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 17:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 18:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 18:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 18:41:12 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 16 18:41:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 16 19:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 19:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 20:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 20:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 21:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 16 21:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 22:00:02 mto relay-watchdog: Relay flag is still current
Mar 16 22:00:02 mto exchange-watchdog: Exchange flag is still current
Mar 16 23:00:01 mto relay-watchdog: Relay flag is still current
Mar 16 23:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 00:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 00:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 01:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 01:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 02:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 02:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 02:17:41 mto kernel: [459414.130106] usb 1-1.3: new high-speed USB device number 9 using xhci_hcd
Mar 17 02:17:41 mto kernel: [459414.230490] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Mar 17 02:17:41 mto kernel: [459414.230513] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Mar 17 03:00:02 mto relay-watchdog: Relay flag is still current
Mar 17 03:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 04:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 05:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 06:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 06:41:12 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 17 06:41:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 17 07:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 08:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 09:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 10:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 17 10:58:58 mto kernel: [490691.751840] usb 1-1.3: USB disconnect, device number 9
Mar 17 11:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 11:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 12:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 12:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 13:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 13:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 14:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 14:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 15:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 15:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 16:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 16:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 17:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 17:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 18:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 18:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 18:41:12 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 17 18:41:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 17 19:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 19:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 20:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 20:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 21:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 21:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 22:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 22:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 17 23:00:01 mto relay-watchdog: Relay flag is still current
Mar 17 23:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 00:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 00:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 01:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 01:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 02:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 02:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 02:19:21 mto kernel: [545915.739923] usb 1-1.3: new high-speed USB device number 10 using xhci_hcd
Mar 18 02:19:21 mto kernel: [545915.840312] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Mar 18 02:19:21 mto kernel: [545915.840334] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Mar 18 03:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 03:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 04:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 05:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 06:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 06:41:12 mto udhcpc[484]: sending renew to 192.168.1.1
Mar 18 06:41:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Mar 18 07:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 07:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 08:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 09:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 10:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Mar 18 10:58:59 mto kernel: [577094.257804] usb 1-1.3: USB disconnect, device number 10
Mar 18 11:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 11:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 12:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 12:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 13:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 13:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 14:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 14:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 15:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 15:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 16:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 16:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 17:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 17:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 18:00:01 mto exchange-watchdog: Exchange flag is still current
Mar 18 18:00:01 mto relay-watchdog: Relay flag is still current
Mar 18 18:38:01 mto cron.flagwatchdog: Reboot system flag detected
Mar 18 18:38:01 mto cron.flagwatchdog: Rebooting system
Mar 18 18:38:01 mto : starting pid 6944, tty '': '/etc/init.d/rcK'
Mar 18 18:38:17 mto su: + none root:news
Mar 18 18:38:42 mto rpc.mountd[366]: Caught signal 15, un-registering and exiting.
Mar 18 18:38:42 mto sshd[337]: Received signal 15; terminating.
Mar 18 18:38:43 mto chronyd[323]: chronyd exiting
Mar 18 18:38:43 mto ifplugd(eth0): exiting
Mar 18 18:38:43 mto ifplugd(wlan0): exiting
Mar 18 18:38:43 mto ifplugd(eth1): exiting
Mar 18 18:38:44 mto wpa_supplicant[233]: nl80211: deinit ifname=p2p-dev-wlan0 disabled_11b_rates=0
Mar 18 18:38:44 mto wpa_supplicant[233]: p2p-dev-wlan0: CTRL-EVENT-TERMINATING 
Mar 18 18:38:44 mto wpa_supplicant[233]: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
