Jan  1 00:00:03 mto kernel: [    0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.000000] Linux version 5.10.36-v8 (valentic@cambria.valentic.net) (aarch64-buildroot-linux-gnu-gcc.br_real (Buildroot v1.11-dirty) 9.3.0, GNU ld (GNU Binutils) 2.35.2) #1 SMP PREEMPT Wed Apr 13 15:42:39 PDT 2022
Jan  1 00:00:03 mto kernel: [    0.000000] Machine model: Raspberry Pi 4 Model B Rev 1.5
Jan  1 00:00:03 mto kernel: [    0.000000] efi: UEFI not found.
Jan  1 00:00:03 mto kernel: [    0.000000] Reserved memory: created CMA memory pool at 0x000000002ac00000, size 64 MiB
Jan  1 00:00:03 mto kernel: [    0.000000] OF: reserved mem: initialized node linux,cma, compatible id shared-dma-pool
Jan  1 00:00:03 mto kernel: [    0.000000] Zone ranges:
Jan  1 00:00:03 mto kernel: [    0.000000]   DMA      [mem 0x0000000000000000-0x000000003fffffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   DMA32    [mem 0x0000000040000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   Normal   empty
Jan  1 00:00:03 mto kernel: [    0.000000] Movable zone start for each node
Jan  1 00:00:03 mto kernel: [    0.000000] Early memory node ranges
Jan  1 00:00:03 mto kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000039bfffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   node   0: [mem 0x0000000040000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000] percpu: Embedded 32 pages/cpu s91224 r8192 d31656 u131072
Jan  1 00:00:03 mto kernel: [    0.000000] Detected PIPT I-cache on CPU0
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: Spectre-v2
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: Spectre-v4
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: ARM errata 1165522, 1319367, or 1530923
Jan  1 00:00:03 mto kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 990864
Jan  1 00:00:03 mto kernel: [    0.000000] Kernel command line: coherent_pool=1M 8250.nr_uarts=0 snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 bcm2708_fb.fbwidth=0 bcm2708_fb.fbheight=0 bcm2708_fb.fbswap=1 smsc95xx.macaddr=E4:5F:01:D6:1F:7D vc_mem.mem_base=0x3ec00000 vc_mem.mem_size=0x40000000  root=/dev/mmcblk0p2 rootwait console=tty1 console=ttyAMA0,115200
Jan  1 00:00:03 mto kernel: [    0.000000] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.000000] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
Jan  1 00:00:03 mto kernel: [    0.000000] software IO TLB: mapped [mem 0x0000000035c00000-0x0000000039c00000] (64MB)
Jan  1 00:00:03 mto kernel: [    0.000000] Memory: 3792268K/4026368K available (11264K kernel code, 1928K rwdata, 3972K rodata, 3712K init, 1242K bss, 168564K reserved, 65536K cma-reserved)
Jan  1 00:00:03 mto kernel: [    0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Jan  1 00:00:03 mto kernel: [    0.000000] ftrace: allocating 36633 entries in 144 pages
Jan  1 00:00:03 mto kernel: [    0.000000] ftrace: allocated 144 pages with 2 groups
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: Preemptible hierarchical RCU implementation.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: 	RCU event tracing is enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: 	RCU restricting CPUs from NR_CPUS=256 to nr_cpu_ids=4.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Trampoline variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Rude variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Tracing variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
Jan  1 00:00:03 mto kernel: [    0.000000] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
Jan  1 00:00:03 mto kernel: [    0.000000] GIC: Using split EOI/Deactivate mode
Jan  1 00:00:03 mto kernel: [    0.000000] random: get_random_bytes called from start_kernel+0x3b8/0x578 with crng_init=0
Jan  1 00:00:03 mto kernel: [    0.000000] arch_timer: cp15 timer(s) running at 54.00MHz (phys).
Jan  1 00:00:03 mto kernel: [    0.000000] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0xc743ce346, max_idle_ns: 440795203123 ns
Jan  1 00:00:03 mto kernel: [    0.000006] sched_clock: 56 bits at 54MHz, resolution 18ns, wraps every 4398046511102ns
Jan  1 00:00:03 mto kernel: [    0.000257] Console: colour dummy device 80x25
Jan  1 00:00:03 mto kernel: [    0.000784] printk: console [tty1] enabled
Jan  1 00:00:03 mto kernel: [    0.000842] Calibrating delay loop (skipped), value calculated using timer frequency.. 108.00 BogoMIPS (lpj=216000)
Jan  1 00:00:03 mto kernel: [    0.000884] pid_max: default: 32768 minimum: 301
Jan  1 00:00:03 mto kernel: [    0.001038] LSM: Security Framework initializing
Jan  1 00:00:03 mto kernel: [    0.001276] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.001355] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.002749] Disabling memory control group subsystem
Jan  1 00:00:03 mto kernel: [    0.004982] rcu: Hierarchical SRCU implementation.
Jan  1 00:00:03 mto kernel: [    0.006024] EFI services will not be available.
Jan  1 00:00:03 mto kernel: [    0.006536] smp: Bringing up secondary CPUs ...
Jan  1 00:00:03 mto kernel: [    0.007520] Detected PIPT I-cache on CPU1
Jan  1 00:00:03 mto kernel: [    0.007597] CPU1: Booted secondary processor 0x0000000001 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.008763] Detected PIPT I-cache on CPU2
Jan  1 00:00:03 mto kernel: [    0.008810] CPU2: Booted secondary processor 0x0000000002 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.009895] Detected PIPT I-cache on CPU3
Jan  1 00:00:03 mto kernel: [    0.009941] CPU3: Booted secondary processor 0x0000000003 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.010089] smp: Brought up 1 node, 4 CPUs
Jan  1 00:00:03 mto kernel: [    0.010179] SMP: Total of 4 processors activated.
Jan  1 00:00:03 mto kernel: [    0.010203] CPU features: detected: 32-bit EL0 Support
Jan  1 00:00:03 mto kernel: [    0.010226] CPU features: detected: CRC32 instructions
Jan  1 00:00:03 mto kernel: [    0.010249] CPU features: detected: 32-bit EL1 Support
Jan  1 00:00:03 mto kernel: [    0.045710] CPU: All CPU(s) started at EL2
Jan  1 00:00:03 mto kernel: [    0.045794] alternatives: patching kernel code
Jan  1 00:00:03 mto kernel: [    0.047367] devtmpfs: initialized
Jan  1 00:00:03 mto kernel: [    0.057886] Enabled cp15_barrier support
Jan  1 00:00:03 mto kernel: [    0.057953] Enabled setend support
Jan  1 00:00:03 mto kernel: [    0.058169] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
Jan  1 00:00:03 mto kernel: [    0.058217] futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.060315] pinctrl core: initialized pinctrl subsystem
Jan  1 00:00:03 mto kernel: [    0.061136] DMI not present or invalid.
Jan  1 00:00:03 mto kernel: [    0.061529] NET: Registered protocol family 16
Jan  1 00:00:03 mto kernel: [    0.064662] DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.064941] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.065873] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.065983] audit: initializing netlink subsys (disabled)
Jan  1 00:00:03 mto kernel: [    0.066386] audit: type=2000 audit(0.064:1): state=initialized audit_enabled=0 res=1
Jan  1 00:00:03 mto kernel: [    0.066877] thermal_sys: Registered thermal governor 'step_wise'
Jan  1 00:00:03 mto kernel: [    0.067330] cpuidle: using governor menu
Jan  1 00:00:03 mto kernel: [    0.067653] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
Jan  1 00:00:03 mto kernel: [    0.067836] ASID allocator initialised with 65536 entries
Jan  1 00:00:03 mto kernel: [    0.067985] Serial: AMBA PL011 UART driver
Jan  1 00:00:03 mto kernel: [    0.096464] bcm2835-mbox fe00b880.mailbox: mailbox enabled
Jan  1 00:00:03 mto kernel: [    0.104317] raspberrypi-firmware soc:firmware: Attached to firmware from 2021-04-30T15:54:12, variant start
Jan  1 00:00:03 mto kernel: [    0.108311] raspberrypi-firmware soc:firmware: Firmware hash is 3e104c5ed69dc796755b7195973a8d00482d76dd
Jan  1 00:00:03 mto kernel: [    0.141970] bcm2835-dma fe007000.dma: DMA legacy API manager, dmachans=0x1
Jan  1 00:00:03 mto kernel: [    0.145934] vgaarb: loaded
Jan  1 00:00:03 mto kernel: [    0.146365] SCSI subsystem initialized
Jan  1 00:00:03 mto kernel: [    0.146587] usbcore: registered new interface driver usbfs
Jan  1 00:00:03 mto kernel: [    0.146663] usbcore: registered new interface driver hub
Jan  1 00:00:03 mto kernel: [    0.146742] usbcore: registered new device driver usb
Jan  1 00:00:03 mto kernel: [    0.147066] usb_phy_generic phy: supply vcc not found, using dummy regulator
Jan  1 00:00:03 mto kernel: [    0.148860] clocksource: Switched to clocksource arch_sys_counter
Jan  1 00:00:03 mto kernel: [    1.167642] VFS: Disk quotas dquot_6.6.0
Jan  1 00:00:03 mto kernel: [    1.167760] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jan  1 00:00:03 mto kernel: [    1.167932] FS-Cache: Loaded
Jan  1 00:00:03 mto kernel: [    1.168177] CacheFiles: Loaded
Jan  1 00:00:03 mto kernel: [    1.178616] NET: Registered protocol family 2
Jan  1 00:00:03 mto kernel: [    1.179796] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.179868] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.180105] TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.180556] TCP: Hash tables configured (established 32768 bind 32768)
Jan  1 00:00:03 mto kernel: [    1.180802] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.180961] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.181318] NET: Registered protocol family 1
Jan  1 00:00:03 mto kernel: [    1.182228] RPC: Registered named UNIX socket transport module.
Jan  1 00:00:03 mto kernel: [    1.182258] RPC: Registered udp transport module.
Jan  1 00:00:03 mto kernel: [    1.182279] RPC: Registered tcp transport module.
Jan  1 00:00:03 mto kernel: [    1.182299] RPC: Registered tcp NFSv4.1 backchannel transport module.
Jan  1 00:00:03 mto kernel: [    1.182331] PCI: CLS 0 bytes, default 64
Jan  1 00:00:03 mto kernel: [    1.184606] hw perfevents: enabled with armv8_cortex_a72 PMU driver, 7 counters available
Jan  1 00:00:03 mto kernel: [    1.184945] kvm [1]: IPA Size Limit: 44 bits
Jan  1 00:00:03 mto kernel: [    1.186134] kvm [1]: vgic interrupt IRQ9
Jan  1 00:00:03 mto kernel: [    1.186425] kvm [1]: Hyp mode initialized successfully
Jan  1 00:00:03 mto kernel: [    1.188577] Initialise system trusted keyrings
Jan  1 00:00:03 mto kernel: [    1.188960] workingset: timestamp_bits=46 max_order=20 bucket_order=0
Jan  1 00:00:03 mto kernel: [    1.195150] zbud: loaded
Jan  1 00:00:03 mto kernel: [    1.196964] FS-Cache: Netfs 'nfs' registered for caching
Jan  1 00:00:03 mto kernel: [    1.197629] NFS: Registering the id_resolver key type
Jan  1 00:00:03 mto kernel: [    1.197682] Key type id_resolver registered
Jan  1 00:00:03 mto kernel: [    1.197704] Key type id_legacy registered
Jan  1 00:00:03 mto kernel: [    1.197828] nfs4filelayout_init: NFSv4 File Layout Driver Registering...
Jan  1 00:00:03 mto kernel: [    1.197855] nfs4flexfilelayout_init: NFSv4 Flexfile Layout Driver Registering...
Jan  1 00:00:03 mto kernel: [    1.198996] Key type asymmetric registered
Jan  1 00:00:03 mto kernel: [    1.199024] Asymmetric key parser 'x509' registered
Jan  1 00:00:03 mto kernel: [    1.199083] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Jan  1 00:00:03 mto kernel: [    1.199332] io scheduler mq-deadline registered
Jan  1 00:00:03 mto kernel: [    1.199358] io scheduler kyber registered
Jan  1 00:00:03 mto kernel: [    1.203501] brcm-pcie fd500000.pcie: host bridge /scb/pcie@7d500000 ranges:
Jan  1 00:00:03 mto kernel: [    1.203549] brcm-pcie fd500000.pcie:   No bus range found for /scb/pcie@7d500000, using [bus 00-ff]
Jan  1 00:00:03 mto kernel: [    1.203637] brcm-pcie fd500000.pcie:      MEM 0x0600000000..0x063fffffff -> 0x00c0000000
Jan  1 00:00:03 mto kernel: [    1.203731] brcm-pcie fd500000.pcie:   IB MEM 0x0000000000..0x00ffffffff -> 0x0400000000
Jan  1 00:00:03 mto kernel: [    1.266956] brcm-pcie fd500000.pcie: link up, 5.0 GT/s PCIe x1 (SSC)
Jan  1 00:00:03 mto kernel: [    1.267341] brcm-pcie fd500000.pcie: PCI host bridge to bus 0000:00
Jan  1 00:00:03 mto kernel: [    1.267373] pci_bus 0000:00: root bus resource [bus 00-ff]
Jan  1 00:00:03 mto kernel: [    1.267410] pci_bus 0000:00: root bus resource [mem 0x600000000-0x63fffffff] (bus address [0xc0000000-0xffffffff])
Jan  1 00:00:03 mto kernel: [    1.267512] pci 0000:00:00.0: [14e4:2711] type 01 class 0x060400
Jan  1 00:00:03 mto kernel: [    1.267765] pci 0000:00:00.0: PME# supported from D0 D3hot
Jan  1 00:00:03 mto kernel: [    1.271401] pci 0000:00:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jan  1 00:00:03 mto kernel: [    1.271808] pci 0000:01:00.0: [1106:3483] type 00 class 0x0c0330
Jan  1 00:00:03 mto kernel: [    1.271942] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Jan  1 00:00:03 mto kernel: [    1.272372] pci 0000:01:00.0: PME# supported from D0 D3hot
Jan  1 00:00:03 mto kernel: [    1.284065] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01
Jan  1 00:00:03 mto kernel: [    1.284122] pci 0000:00:00.0: BAR 8: assigned [mem 0x600000000-0x6000fffff]
Jan  1 00:00:03 mto kernel: [    1.284156] pci 0000:01:00.0: BAR 0: assigned [mem 0x600000000-0x600000fff 64bit]
Jan  1 00:00:03 mto kernel: [    1.284207] pci 0000:00:00.0: PCI bridge to [bus 01]
Jan  1 00:00:03 mto kernel: [    1.284239] pci 0000:00:00.0:   bridge window [mem 0x600000000-0x6000fffff]
Jan  1 00:00:03 mto kernel: [    1.284881] bcm2708_fb soc:fb: Unable to determine number of FBs. Disabling driver.
Jan  1 00:00:03 mto kernel: [    1.284929] bcm2708_fb: probe of soc:fb failed with error -2
Jan  1 00:00:03 mto kernel: [    1.292017] iproc-rng200 fe104000.rng: hwrng registered
Jan  1 00:00:03 mto kernel: [    1.292369] vc-mem: phys_addr:0x00000000 mem_base=0x3ec00000 mem_size:0x40000000(1024 MiB)
Jan  1 00:00:03 mto kernel: [    1.293345] gpiomem-bcm2835 fe200000.gpiomem: Initialised: Registers at 0xfe200000
Jan  1 00:00:03 mto kernel: [    1.293768] cacheinfo: Unable to detect cache hierarchy for CPU 0
Jan  1 00:00:03 mto kernel: [    1.305066] brd: module loaded
Jan  1 00:00:03 mto kernel: [    1.317609] loop: module loaded
Jan  1 00:00:03 mto kernel: [    1.319205] Loading iSCSI transport class v2.0-870.
Jan  1 00:00:03 mto kernel: [    1.322423] libphy: Fixed MDIO Bus: probed
Jan  1 00:00:03 mto kernel: [    1.323953] bcmgenet fd580000.ethernet: GENET 5.0 EPHY: 0x0000
Jan  1 00:00:03 mto kernel: [    1.336879] libphy: bcmgenet MII bus: probed
Jan  1 00:00:03 mto kernel: [    1.384996] unimac-mdio unimac-mdio.-19: Broadcom UniMAC MDIO bus
Jan  1 00:00:03 mto kernel: [    1.386116] usbcore: registered new interface driver r8152
Jan  1 00:00:03 mto kernel: [    1.386196] usbcore: registered new interface driver lan78xx
Jan  1 00:00:03 mto kernel: [    1.386274] usbcore: registered new interface driver smsc95xx
Jan  1 00:00:03 mto kernel: [    1.433726] pci 0000:00:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:03 mto kernel: [    1.433958] xhci_hcd 0000:01:00.0: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.434013] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 1
Jan  1 00:00:03 mto kernel: [    1.434779] xhci_hcd 0000:01:00.0: hcc params 0x002841eb hci version 0x100 quirks 0x0000060000000890
Jan  1 00:00:03 mto kernel: [    1.436078] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10
Jan  1 00:00:03 mto kernel: [    1.436111] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jan  1 00:00:03 mto kernel: [    1.436138] usb usb1: Product: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.436161] usb usb1: Manufacturer: Linux 5.10.36-v8 xhci-hcd
Jan  1 00:00:03 mto kernel: [    1.436183] usb usb1: SerialNumber: 0000:01:00.0
Jan  1 00:00:03 mto kernel: [    1.436961] hub 1-0:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    1.437069] hub 1-0:1.0: 1 port detected
Jan  1 00:00:03 mto kernel: [    1.437704] xhci_hcd 0000:01:00.0: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.437739] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 2
Jan  1 00:00:03 mto kernel: [    1.437776] xhci_hcd 0000:01:00.0: Host supports USB 3.0 SuperSpeed
Jan  1 00:00:03 mto kernel: [    1.438188] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.10
Jan  1 00:00:03 mto kernel: [    1.438219] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jan  1 00:00:03 mto kernel: [    1.438245] usb usb2: Product: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.438268] usb usb2: Manufacturer: Linux 5.10.36-v8 xhci-hcd
Jan  1 00:00:03 mto kernel: [    1.438290] usb usb2: SerialNumber: 0000:01:00.0
Jan  1 00:00:03 mto kernel: [    1.438942] hub 2-0:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    1.439020] hub 2-0:1.0: 4 ports detected
Jan  1 00:00:03 mto kernel: [    1.440493] dwc_otg: version 3.00a 10-AUG-2012 (platform bus)
Jan  1 00:00:03 mto kernel: [    1.441366] usbcore: registered new interface driver uas
Jan  1 00:00:03 mto kernel: [    1.441475] usbcore: registered new interface driver usb-storage
Jan  1 00:00:03 mto kernel: [    1.441686] mousedev: PS/2 mouse device common for all mice
Jan  1 00:00:03 mto kernel: [    1.443540] bcm2835-wdt bcm2835-wdt: Broadcom BCM2835 watchdog timer
Jan  1 00:00:03 mto kernel: [    1.446835] sdhci: Secure Digital Host Controller Interface driver
Jan  1 00:00:03 mto kernel: [    1.446866] sdhci: Copyright(c) Pierre Ossman
Jan  1 00:00:03 mto kernel: [    1.447535] mmc-bcm2835 fe300000.mmcnr: could not get clk, deferring probe
Jan  1 00:00:03 mto kernel: [    1.448054] sdhci-pltfm: SDHCI platform and OF driver helper
Jan  1 00:00:03 mto kernel: [    1.450853] ledtrig-cpu: registered to indicate activity on CPUs
Jan  1 00:00:03 mto kernel: [    1.451195] hid: raw HID events driver (C) Jiri Kosina
Jan  1 00:00:03 mto kernel: [    1.451412] usbcore: registered new interface driver usbhid
Jan  1 00:00:03 mto kernel: [    1.451435] usbhid: USB HID core driver
Jan  1 00:00:03 mto kernel: [    1.459292] Initializing XFRM netlink socket
Jan  1 00:00:03 mto kernel: [    1.459361] NET: Registered protocol family 17
Jan  1 00:00:03 mto kernel: [    1.459488] Key type dns_resolver registered
Jan  1 00:00:03 mto kernel: [    1.460063] registered taskstats version 1
Jan  1 00:00:03 mto kernel: [    1.460103] Loading compiled-in X.509 certificates
Jan  1 00:00:03 mto kernel: [    1.460673] Key type ._fscrypt registered
Jan  1 00:00:03 mto kernel: [    1.460698] Key type .fscrypt registered
Jan  1 00:00:03 mto kernel: [    1.460718] Key type fscrypt-provisioning registered
Jan  1 00:00:03 mto kernel: [    1.472078] uart-pl011 fe201000.serial: there is not valid maps for state default
Jan  1 00:00:03 mto kernel: [    1.472392] uart-pl011 fe201000.serial: cts_event_workaround enabled
Jan  1 00:00:03 mto kernel: [    1.472519] fe201000.serial: ttyAMA0 at MMIO 0xfe201000 (irq = 21, base_baud = 0) is a PL011 rev2
Jan  1 00:00:03 mto kernel: [    2.740444] printk: console [ttyAMA0] enabled
Jan  1 00:00:03 mto kernel: [    2.751909] bcm2835-power bcm2835-power: Broadcom BCM2835 power domains driver
Jan  1 00:00:03 mto kernel: [    2.760140] mmc-bcm2835 fe300000.mmcnr: mmc_debug:0 mmc_debug2:0
Jan  1 00:00:03 mto kernel: [    2.766183] mmc-bcm2835 fe300000.mmcnr: DMA channel allocated
Jan  1 00:00:03 mto kernel: [    2.800642] of_cfs_init
Jan  1 00:00:03 mto kernel: [    2.803258] of_cfs_init: OK
Jan  1 00:00:03 mto kernel: [    2.807442] uart-pl011 fe201000.serial: no DMA platform data
Jan  1 00:00:03 mto kernel: [    2.830250] mmc1: queuing unknown CIS tuple 0x80 (2 bytes)
Jan  1 00:00:03 mto kernel: [    2.836350] mmc0: SDHCI controller on fe340000.emmc2 [fe340000.emmc2] using ADMA
Jan  1 00:00:03 mto kernel: [    2.846259] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.853726] Waiting for root device /dev/mmcblk0p2...
Jan  1 00:00:03 mto kernel: [    2.855131] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.871420] mmc1: queuing unknown CIS tuple 0x80 (7 bytes)
Jan  1 00:00:03 mto kernel: [    2.878576] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.915871] random: fast init done
Jan  1 00:00:03 mto kernel: [    2.952262] mmc1: new high speed SDIO card at address 0001
Jan  1 00:00:03 mto kernel: [    2.960408] mmc0: new ultra high speed DDR50 SDXC card at address 0001
Jan  1 00:00:03 mto kernel: [    2.967912] mmcblk0: mmc0:0001 BC2QT 59.6 GiB
Jan  1 00:00:03 mto kernel: [    2.974624]  mmcblk0: p1 p2
Jan  1 00:00:03 mto kernel: [    2.980915] usb 1-1: new high-speed USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.000813] EXT4-fs (mmcblk0p2): mounted filesystem with ordered data mode. Opts: (null)
Jan  1 00:00:03 mto kernel: [    3.009032] VFS: Mounted root (ext4 filesystem) readonly on device 179:2.
Jan  1 00:00:03 mto kernel: [    3.016665] devtmpfs: mounted
Jan  1 00:00:03 mto kernel: [    3.028993] Freeing unused kernel memory: 3712K
Jan  1 00:00:03 mto kernel: [    3.033732] Run /sbin/init as init process
Jan  1 00:00:03 mto kernel: [    3.135630] usb 1-1: New USB device found, idVendor=2109, idProduct=3431, bcdDevice= 4.21
Jan  1 00:00:03 mto kernel: [    3.143873] usb 1-1: New USB device strings: Mfr=0, Product=1, SerialNumber=0
Jan  1 00:00:03 mto kernel: [    3.151039] usb 1-1: Product: USB2.0 Hub
Jan  1 00:00:03 mto kernel: [    3.157059] hub 1-1:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    3.161164] hub 1-1:1.0: 4 ports detected
Jan  1 00:00:03 mto kernel: [    3.265344] usb 2-2: new SuperSpeed Gen 1 USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.290575] usb 2-2: New USB device found, idVendor=2357, idProduct=0601, bcdDevice=30.00
Jan  1 00:00:03 mto kernel: [    3.298882] usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jan  1 00:00:03 mto kernel: [    3.306123] usb 2-2: Product: USB 10/100/1000 LAN
Jan  1 00:00:03 mto kernel: [    3.310870] usb 2-2: Manufacturer: TP-Link
Jan  1 00:00:03 mto kernel: [    3.315064] usb 2-2: SerialNumber: 000001
Jan  1 00:00:03 mto kernel: [    3.388430] EXT4-fs (mmcblk0p2): re-mounted. Opts: (null)
Jan  1 00:00:03 mto kernel: [    3.457744] usb 2-2: reset SuperSpeed Gen 1 USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.497898] r8152 2-2:1.0: Direct firmware load for rtl_nic/rtl8153a-4.fw failed with error -2
Jan  1 00:00:03 mto kernel: [    3.506716] r8152 2-2:1.0: unable to load firmware patch rtl_nic/rtl8153a-4.fw (-2)
Jan  1 00:00:03 mto kernel: [    3.520832] PPP generic driver version 2.4.2
Jan  1 00:00:03 mto kernel: [    3.535944] PPP Deflate Compression module registered
Jan  1 00:00:03 mto kernel: [    3.546157] r8152 2-2:1.0 eth1: v1.12.11
Jan  1 00:00:03 mto kernel: [    3.568266] PPP BSD Compression module registered
Jan  1 00:00:03 mto kernel: [    3.576940] usb 1-1.4: new full-speed USB device number 3 using xhci_hcd
Jan  1 00:00:03 mto sysctl: * Applying /etc/sysctl.conf ...
Jan  1 00:00:03 mto sysctl: kernel.panic = 10
Jan  1 00:00:03 mto sysctl: kernel.panic_on_oops = 1
Jan  1 00:00:03 mto sysctl: kernel.printk = 4 4 1 7
Jan  1 00:00:03 mto kernel: [    3.701398] usb 1-1.4: New USB device found, idVendor=1546, idProduct=01a7, bcdDevice= 1.00
Jan  1 00:00:03 mto kernel: [    3.710085] usb 1-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jan  1 00:00:03 mto kernel: [    3.710104] usb 1-1.4: Product: u-blox 7 - GPS/GNSS Receiver
Jan  1 00:00:03 mto kernel: [    3.710119] usb 1-1.4: Manufacturer: u-blox AG - www.u-blox.com
Jan  1 00:00:04 mto kernel: [    4.033211] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.034644] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.034732] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.220761] rpivid-mem feb00000.hevc-decoder: rpivid-hevcmem initialised: Registers at 0xfeb00000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.221703] rpivid-mem feb10000.rpivid-local-intc: rpivid-intcmem initialised: Registers at 0xfeb10000 length 0x00001000
Jan  1 00:00:04 mto kernel: [    4.222262] rpivid-mem feb20000.h264-decoder: rpivid-h264mem initialised: Registers at 0xfeb20000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.222799] rpivid-mem feb30000.vp9-decoder: rpivid-vp9mem initialised: Registers at 0xfeb30000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.250600] vc_sm_cma: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.252273] bcm2835_vc_sm_cma_probe: Videocore shared memory driver
Jan  1 00:00:04 mto kernel: [    4.252299] [vc_sm_connected_init]: start
Jan  1 00:00:04 mto kernel: [    4.253795] [vc_sm_connected_init]: installed successfully
Jan  1 00:00:04 mto kernel: [    4.284661] mc: Linux media interface: v0.10
Jan  1 00:00:04 mto kernel: [    4.330304] videodev: Linux video capture interface: v2.00
Jan  1 00:00:04 mto kernel: [    4.334247] cdc_acm 1-1.4:1.0: ttyACM0: USB ACM device
Jan  1 00:00:04 mto kernel: [    4.337551] usbcore: registered new interface driver cdc_acm
Jan  1 00:00:04 mto kernel: [    4.337573] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Jan  1 00:00:04 mto kernel: [    4.396479] bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.405127] cfg80211: Loading compiled-in X.509 certificates for regulatory database
Jan  1 00:00:04 mto kernel: [    4.409995] bcm2835_v4l2: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.411090] bcm2835_isp: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.413927] bcm2835_codec: module is from the staging directory, the quality is unknown, you have been warned.
Apr  8 18:33:00 mto kernel: [    4.417219] rtc-pcf8523 1-0068: registered as rtc0
Apr  8 18:33:00 mto kernel: [    4.420776] rtc-pcf8523 1-0068: setting system clock to 2026-04-08T18:33:00 UTC (1775673180)
Apr  8 18:33:00 mto kernel: [    4.425603] bcm2835-codec bcm2835-codec: Device registered as /dev/video10
Apr  8 18:33:00 mto kernel: [    4.425670] bcm2835-codec bcm2835-codec: Loaded V4L2 decode
Apr  8 18:33:00 mto kernel: [    4.426473] bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video13
Apr  8 18:33:00 mto kernel: [    4.428323] bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video14
Apr  8 18:33:00 mto kernel: [    4.428834] bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video15
Apr  8 18:33:00 mto kernel: [    4.429584] bcm2835-codec bcm2835-codec: Device registered as /dev/video11
Apr  8 18:33:00 mto kernel: [    4.429633] bcm2835-codec bcm2835-codec: Loaded V4L2 encode
Apr  8 18:33:00 mto kernel: [    4.430488] bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video16
Apr  8 18:33:00 mto kernel: [    4.430520] bcm2835-isp bcm2835-isp: Register output node 0 with media controller
Apr  8 18:33:00 mto kernel: [    4.430541] bcm2835-isp bcm2835-isp: Register capture node 1 with media controller
Apr  8 18:33:00 mto kernel: [    4.430559] bcm2835-isp bcm2835-isp: Register capture node 2 with media controller
Apr  8 18:33:00 mto kernel: [    4.430576] bcm2835-isp bcm2835-isp: Register capture node 3 with media controller
Apr  8 18:33:00 mto kernel: [    4.430767] bcm2835-isp bcm2835-isp: Loaded V4L2 bcm2835-isp
Apr  8 18:33:00 mto kernel: [    4.435620] bcm2835-codec bcm2835-codec: Device registered as /dev/video12
Apr  8 18:33:00 mto kernel: [    4.435674] bcm2835-codec bcm2835-codec: Loaded V4L2 isp
Apr  8 18:33:00 mto gpsd.hotplug: add /dev/ttyACM0
Apr  8 18:33:00 mto gpsdctl: gpsd_control(action=add, arg=/dev/ttyACM0)
Apr  8 18:33:00 mto gpsdctl: launching gpsd -n -F /run/gpsd.sock
Apr  8 18:33:00 mto kernel: [    4.563834] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Apr  8 18:33:00 mto kernel: [    4.619832] NET: Registered protocol family 10
Apr  8 18:33:00 mto gpsd[190]: gpsd:ERROR: can't bind to IPv6 port 2947, Cannot assign requested address
Apr  8 18:33:00 mto kernel: [    4.625778] Segment Routing with IPv6
Apr  8 18:33:00 mto kernel: [    4.630085] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6
Apr  8 18:33:00 mto kernel: [    4.641578] usbcore: registered new interface driver brcmfmac
Apr  8 18:33:00 mto rsyslogd: [origin software="rsyslogd" swVersion="8.2010.0" x-pid="122" x-info="https://www.rsyslog.com"] start
Apr  8 18:33:00 mto kernel: [    4.819661] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6
Apr  8 18:33:00 mto kernel: [    4.828446] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available
Apr  8 18:33:00 mto kernel: [    4.840394] brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Mar  1 2015 07:29:38 version 7.45.18 (r538002) FWID 01-6a2c8ad4
Apr  8 18:33:00 mto kernel: [    5.054292] urandom_read: 5 callbacks suppressed
Apr  8 18:33:00 mto kernel: [    5.054306] random: dbus-uuidgen: uninitialized urandom read (12 bytes read)
Apr  8 18:33:00 mto kernel: [    5.054387] random: dbus-uuidgen: uninitialized urandom read (8 bytes read)
Apr  8 18:33:00 mto wpa_supplicant[230]: Successfully initialized wpa_supplicant
Apr  8 18:33:00 mto kernel: [    5.282730] brcmfmac: brcmf_cfg80211_set_power_mgmt: power save enabled
Apr  8 18:33:02 mto kernel: [    7.244913] random: crng init done
Apr  8 18:33:02 mto wpa_supplicant[233]: wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
Apr  8 18:33:02 mto kernel: [    7.551002] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Apr  8 18:33:02 mto kernel: [    7.551653] r8152 2-2:1.0 eth1: carrier on
Apr  8 18:33:03 mto ifplugd(eth0): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Apr  8 18:33:03 mto ifplugd(eth0): upping interface
Apr  8 18:33:03 mto ifplugd(eth0): using SIOCETHTOOL detection mode
Apr  8 18:33:03 mto ifplugd(eth0): interface exists
Apr  8 18:33:03 mto kernel: [    8.327637] bcmgenet fd580000.ethernet: configuring instance for external RGMII (RX delay)
Apr  8 18:33:03 mto ifplugd(eth0): link is down
Apr  8 18:33:03 mto kernel: [    8.328094] bcmgenet fd580000.ethernet eth0: Link is Down
Apr  8 18:33:03 mto ifplugd(wlan0): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Apr  8 18:33:03 mto ifplugd(wlan0): using wireless extension detection mode
Apr  8 18:33:03 mto ifplugd(wlan0): interface exists
Apr  8 18:33:03 mto ifplugd(wlan0): link is down
Apr  8 18:33:03 mto ifplugd(eth1): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Apr  8 18:33:03 mto ifplugd(eth1): using SIOCETHTOOL detection mode
Apr  8 18:33:03 mto ifplugd(eth1): interface exists
Apr  8 18:33:03 mto ifplugd(eth1): link is up
Apr  8 18:33:03 mto chronyd[323]: chronyd version 4.0 starting (+CMDMON +NTP +REFCLOCK +RTC -PRIVDROP -SCFILTER -SIGND +ASYNCDNS -NTS -SECHASH +IPV6 -DEBUG)
Apr  8 18:33:03 mto gpsd[327]: gpsd:ERROR: can't bind to IPv4 port 2947, Address already in use
Apr  8 18:33:03 mto gpsd[327]: gpsd:ERROR: maybe gpsd is already running!  Or systemd has the port?
Apr  8 18:33:03 mto gpsd[327]: gpsd:ERROR: SER: /dev/gps0 already opened by another process
Apr  8 18:33:03 mto sshd[337]: Server listening on 0.0.0.0 port 22.
Apr  8 18:33:03 mto sshd[337]: Server listening on :: port 22.
Apr  8 18:33:03 mto rpc.statd[351]: Version 2.3.3 starting
Apr  8 18:33:03 mto sm-notify[352]: Version 2.3.3 starting
Apr  8 18:33:03 mto rpc.statd[351]: Initializing NSM state
Apr  8 18:33:03 mto rpc.statd[351]: Running as root.  chown /run/nfs to choose different user
Apr  8 18:33:03 mto kernel: [    8.823550] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
Apr  8 18:33:04 mto kernel: [    9.963903] NFSD: Using UMH upcall client tracking operations.
Apr  8 18:33:04 mto kernel: [    9.963930] NFSD: starting 90-second grace period (net f0000081)
Apr  8 18:33:04 mto rpc.mountd[366]: Version 2.3.3 starting
Apr  8 18:33:05 mto su: + none root:news
Apr  8 18:33:07 mto ifplugd(eth0): link is up
Apr  8 18:33:07 mto ifplugd(eth0): executing '/etc/ifplugd/ifplugd.action eth0 up'
Apr  8 18:33:07 mto kernel: [   12.417209] bcmgenet fd580000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
Apr  8 18:33:07 mto kernel: [   12.417277] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Apr  8 18:33:07 mto udhcpc[452]: started, v1.33.0
Apr  8 18:33:07 mto udhcpc[452]: sending discover
Apr  8 18:33:07 mto : starting pid 464, tty '/dev/console': '/sbin/getty -L  console 0 vt100 '
Apr  8 18:33:07 mto : starting pid 465, tty '/dev/tty1': '/sbin/getty -L  tty1 0 vt100 '
Apr  8 18:33:10 mto udhcpc[452]: sending discover
Apr  8 18:33:10 mto udhcpc[452]: sending select for 192.168.1.166
Apr  8 18:33:10 mto udhcpc[452]: lease of 192.168.1.166 obtained, lease time 86400
Apr  8 18:33:10 mto ifplugd(eth0): exit code: 0
Apr  8 18:33:36 mto chronyd[323]: Selected source 162.159.200.1 (pool.ntp.org)
Apr  8 18:33:36 mto chronyd[323]: System clock wrong by 1.285482 seconds
Apr  8 18:33:37 mto chronyd[323]: System clock was stepped by 1.285482 seconds
Apr  8 19:00:01 mto relay-watchdog: Relay flag is still current
Apr  8 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  8 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  8 20:00:01 mto relay-watchdog: Relay flag is still current
Apr  8 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  8 21:00:01 mto relay-watchdog: Relay flag is still current
Apr  8 22:00:01 mto relay-watchdog: Relay flag is still current
Apr  8 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  8 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  8 23:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 00:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 01:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 02:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 02:59:21 mto kernel: [30385.803226] usb 1-1.3: new high-speed USB device number 4 using xhci_hcd
Apr  9 02:59:21 mto kernel: [30385.903613] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr  9 02:59:21 mto kernel: [30385.903636] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr  9 03:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 03:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 04:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 05:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 06:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 06:33:12 mto udhcpc[484]: sending renew to 192.168.1.1
Apr  9 06:33:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr  9 07:00:02 mto relay-watchdog: Relay flag is still current
Apr  9 07:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 08:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 09:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 10:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr  9 10:02:59 mto kernel: [55803.977895] usb 1-1.3: USB disconnect, device number 4
Apr  9 11:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 12:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 13:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 14:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 15:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 16:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 17:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 18:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 18:33:12 mto udhcpc[484]: sending renew to 192.168.1.1
Apr  9 18:33:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr  9 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 19:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 20:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 21:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr  9 22:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 23:00:01 mto relay-watchdog: Relay flag is still current
Apr  9 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 03:01:21 mto kernel: [116907.333058] usb 1-1.3: new high-speed USB device number 5 using xhci_hcd
Apr 10 03:01:21 mto kernel: [116907.433445] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 10 03:01:21 mto kernel: [116907.433467] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 10 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 10 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 10 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 10 06:33:12 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 10 06:33:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 10 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 10 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 10 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 10 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 10:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 10 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 10:02:58 mto kernel: [142204.660991] usb 1-1.3: USB disconnect, device number 5
Apr 10 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 15:00:02 mto relay-watchdog: Relay flag is still current
Apr 10 15:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 10 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 18:33:12 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 10 18:33:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 10 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 10 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 10 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 03:03:21 mto kernel: [203428.592203] usb 1-1.3: new high-speed USB device number 6 using xhci_hcd
Apr 11 03:03:21 mto kernel: [203428.692599] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 11 03:03:21 mto kernel: [203428.692622] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 11 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 11 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 11 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 11 06:33:12 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 11 06:33:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 11 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 11 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 11 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 11 09:58:58 mto kernel: [228365.929261] usb 1-1.3: USB disconnect, device number 6
Apr 11 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 15:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 11 15:00:02 mto relay-watchdog: Relay flag is still current
Apr 11 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 18:33:12 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 11 18:33:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 11 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 11 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 22:00:02 mto relay-watchdog: Relay flag is still current
Apr 11 22:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 11 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 11 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 03:05:21 mto kernel: [289950.125180] usb 1-1.3: new high-speed USB device number 7 using xhci_hcd
Apr 12 03:05:21 mto kernel: [289950.225565] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 12 03:05:21 mto kernel: [289950.225587] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 12 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 12 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 12 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 12 06:33:12 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 12 06:33:12 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 12 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 12 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 12 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 09:00:02 mto relay-watchdog: Relay flag is still current
Apr 12 09:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Apr 12 09:58:58 mto kernel: [314767.636835] usb 1-1.3: USB disconnect, device number 7
Apr 12 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 12:00:02 mto relay-watchdog: Relay flag is still current
Apr 12 12:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 12 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 18:33:13 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 12 18:33:13 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 12 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 12 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 12 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 01:00:02 mto relay-watchdog: Relay flag is still current
Apr 13 01:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 13 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 03:07:26 mto kernel: [376476.509874] usb 1-1.3: new high-speed USB device number 8 using xhci_hcd
Apr 13 03:07:26 mto kernel: [376476.610258] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 13 03:07:26 mto kernel: [376476.610283] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 13 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 13 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 13 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 13 06:33:13 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 13 06:33:13 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 13 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 13 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 13 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 13 09:54:59 mto kernel: [400929.681364] usb 1-1.3: USB disconnect, device number 8
Apr 13 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 18:33:13 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 13 18:33:13 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 13 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 13 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 13 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 03:09:31 mto kernel: [463002.912123] usb 1-1.3: new high-speed USB device number 9 using xhci_hcd
Apr 14 03:09:31 mto kernel: [463003.012494] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 14 03:09:31 mto kernel: [463003.012516] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 14 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 14 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 14 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 14 06:33:13 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 14 06:33:13 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 14 07:00:02 mto relay-watchdog: Relay flag is still current
Apr 14 07:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Apr 14 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 14 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 09:00:02 mto relay-watchdog: Relay flag is still current
Apr 14 09:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Apr 14 09:50:58 mto kernel: [487090.463007] usb 1-1.3: USB disconnect, device number 9
Apr 14 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 18:33:13 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 14 18:33:13 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 14 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 14 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 14 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 01:55:06 mto kernel: [544939.771573] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
Apr 15 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 03:11:36 mto kernel: [549529.299211] usb 1-1.3: new high-speed USB device number 10 using xhci_hcd
Apr 15 03:11:36 mto kernel: [549529.399597] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 15 03:11:36 mto kernel: [549529.399619] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 15 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 15 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 15 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 15 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 06:33:13 mto udhcpc[484]: sending renew to 192.168.1.1
Apr 15 06:33:13 mto udhcpc[484]: lease of 192.168.1.166 obtained, lease time 86400
Apr 15 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 15 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 15 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 15 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 09:50:59 mto kernel: [573492.670528] usb 1-1.3: USB disconnect, device number 10
Apr 15 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 15 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 15 18:30:01 mto cron.flagwatchdog: Reboot system flag detected
Apr 15 18:30:01 mto cron.flagwatchdog: Rebooting system
Apr 15 18:30:01 mto : starting pid 13537, tty '': '/etc/init.d/rcK'
Apr 15 18:30:17 mto su: + none root:news
Apr 15 18:30:42 mto rpc.mountd[366]: Caught signal 15, un-registering and exiting.
Apr 15 18:30:42 mto sshd[337]: Received signal 15; terminating.
Apr 15 18:30:42 mto chronyd[323]: chronyd exiting
Apr 15 18:30:42 mto ifplugd(eth0): exiting
Apr 15 18:30:42 mto ifplugd(wlan0): exiting
Apr 15 18:30:42 mto ifplugd(eth1): exiting
Apr 15 18:30:43 mto wpa_supplicant[233]: nl80211: deinit ifname=p2p-dev-wlan0 disabled_11b_rates=0
Apr 15 18:30:44 mto wpa_supplicant[233]: p2p-dev-wlan0: CTRL-EVENT-TERMINATING 
Apr 15 18:30:44 mto wpa_supplicant[233]: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
