Jan  1 00:00:03 mto kernel: [    0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.000000] Linux version 5.10.36-v8 (valentic@cambria.valentic.net) (aarch64-buildroot-linux-gnu-gcc.br_real (Buildroot v1.11-dirty) 9.3.0, GNU ld (GNU Binutils) 2.35.2) #1 SMP PREEMPT Wed Apr 13 15:42:39 PDT 2022
Jan  1 00:00:03 mto kernel: [    0.000000] Machine model: Raspberry Pi 4 Model B Rev 1.5
Jan  1 00:00:03 mto kernel: [    0.000000] efi: UEFI not found.
Jan  1 00:00:03 mto kernel: [    0.000000] Reserved memory: created CMA memory pool at 0x000000002ac00000, size 64 MiB
Jan  1 00:00:03 mto kernel: [    0.000000] OF: reserved mem: initialized node linux,cma, compatible id shared-dma-pool
Jan  1 00:00:03 mto kernel: [    0.000000] Zone ranges:
Jan  1 00:00:03 mto kernel: [    0.000000]   DMA      [mem 0x0000000000000000-0x000000003fffffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   DMA32    [mem 0x0000000040000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   Normal   empty
Jan  1 00:00:03 mto kernel: [    0.000000] Movable zone start for each node
Jan  1 00:00:03 mto kernel: [    0.000000] Early memory node ranges
Jan  1 00:00:03 mto kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000039bfffff]
Jan  1 00:00:03 mto kernel: [    0.000000]   node   0: [mem 0x0000000040000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x00000000fbffffff]
Jan  1 00:00:03 mto kernel: [    0.000000] percpu: Embedded 32 pages/cpu s91224 r8192 d31656 u131072
Jan  1 00:00:03 mto kernel: [    0.000000] Detected PIPT I-cache on CPU0
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: Spectre-v2
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: Spectre-v4
Jan  1 00:00:03 mto kernel: [    0.000000] CPU features: detected: ARM errata 1165522, 1319367, or 1530923
Jan  1 00:00:03 mto kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 990864
Jan  1 00:00:03 mto kernel: [    0.000000] Kernel command line: coherent_pool=1M 8250.nr_uarts=0 snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 bcm2708_fb.fbwidth=0 bcm2708_fb.fbheight=0 bcm2708_fb.fbswap=1 smsc95xx.macaddr=E4:5F:01:D6:1F:7D vc_mem.mem_base=0x3ec00000 vc_mem.mem_size=0x40000000  root=/dev/mmcblk0p2 rootwait console=tty1 console=ttyAMA0,115200
Jan  1 00:00:03 mto kernel: [    0.000000] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.000000] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
Jan  1 00:00:03 mto kernel: [    0.000000] software IO TLB: mapped [mem 0x0000000035c00000-0x0000000039c00000] (64MB)
Jan  1 00:00:03 mto kernel: [    0.000000] Memory: 3792268K/4026368K available (11264K kernel code, 1928K rwdata, 3972K rodata, 3712K init, 1242K bss, 168564K reserved, 65536K cma-reserved)
Jan  1 00:00:03 mto kernel: [    0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Jan  1 00:00:03 mto kernel: [    0.000000] ftrace: allocating 36633 entries in 144 pages
Jan  1 00:00:03 mto kernel: [    0.000000] ftrace: allocated 144 pages with 2 groups
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: Preemptible hierarchical RCU implementation.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: 	RCU event tracing is enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: 	RCU restricting CPUs from NR_CPUS=256 to nr_cpu_ids=4.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Trampoline variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Rude variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] 	Tracing variant of Tasks RCU enabled.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies.
Jan  1 00:00:03 mto kernel: [    0.000000] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
Jan  1 00:00:03 mto kernel: [    0.000000] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
Jan  1 00:00:03 mto kernel: [    0.000000] GIC: Using split EOI/Deactivate mode
Jan  1 00:00:03 mto kernel: [    0.000000] random: get_random_bytes called from start_kernel+0x3b8/0x578 with crng_init=0
Jan  1 00:00:03 mto kernel: [    0.000000] arch_timer: cp15 timer(s) running at 54.00MHz (phys).
Jan  1 00:00:03 mto kernel: [    0.000000] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0xc743ce346, max_idle_ns: 440795203123 ns
Jan  1 00:00:03 mto kernel: [    0.000006] sched_clock: 56 bits at 54MHz, resolution 18ns, wraps every 4398046511102ns
Jan  1 00:00:03 mto kernel: [    0.000259] Console: colour dummy device 80x25
Jan  1 00:00:03 mto kernel: [    0.000782] printk: console [tty1] enabled
Jan  1 00:00:03 mto kernel: [    0.000841] Calibrating delay loop (skipped), value calculated using timer frequency.. 108.00 BogoMIPS (lpj=216000)
Jan  1 00:00:03 mto kernel: [    0.000883] pid_max: default: 32768 minimum: 301
Jan  1 00:00:03 mto kernel: [    0.001034] LSM: Security Framework initializing
Jan  1 00:00:03 mto kernel: [    0.001273] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.001354] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.002754] Disabling memory control group subsystem
Jan  1 00:00:03 mto kernel: [    0.005003] rcu: Hierarchical SRCU implementation.
Jan  1 00:00:03 mto kernel: [    0.006050] EFI services will not be available.
Jan  1 00:00:03 mto kernel: [    0.006565] smp: Bringing up secondary CPUs ...
Jan  1 00:00:03 mto kernel: [    0.007551] Detected PIPT I-cache on CPU1
Jan  1 00:00:03 mto kernel: [    0.007628] CPU1: Booted secondary processor 0x0000000001 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.008799] Detected PIPT I-cache on CPU2
Jan  1 00:00:03 mto kernel: [    0.008846] CPU2: Booted secondary processor 0x0000000002 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.009935] Detected PIPT I-cache on CPU3
Jan  1 00:00:03 mto kernel: [    0.009981] CPU3: Booted secondary processor 0x0000000003 [0x410fd083]
Jan  1 00:00:03 mto kernel: [    0.010130] smp: Brought up 1 node, 4 CPUs
Jan  1 00:00:03 mto kernel: [    0.010221] SMP: Total of 4 processors activated.
Jan  1 00:00:03 mto kernel: [    0.010245] CPU features: detected: 32-bit EL0 Support
Jan  1 00:00:03 mto kernel: [    0.010268] CPU features: detected: CRC32 instructions
Jan  1 00:00:03 mto kernel: [    0.010292] CPU features: detected: 32-bit EL1 Support
Jan  1 00:00:03 mto kernel: [    0.045706] CPU: All CPU(s) started at EL2
Jan  1 00:00:03 mto kernel: [    0.045788] alternatives: patching kernel code
Jan  1 00:00:03 mto kernel: [    0.047366] devtmpfs: initialized
Jan  1 00:00:03 mto kernel: [    0.057861] Enabled cp15_barrier support
Jan  1 00:00:03 mto kernel: [    0.057929] Enabled setend support
Jan  1 00:00:03 mto kernel: [    0.058143] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
Jan  1 00:00:03 mto kernel: [    0.058192] futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    0.060291] pinctrl core: initialized pinctrl subsystem
Jan  1 00:00:03 mto kernel: [    0.061118] DMI not present or invalid.
Jan  1 00:00:03 mto kernel: [    0.061505] NET: Registered protocol family 16
Jan  1 00:00:03 mto kernel: [    0.064634] DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.064913] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.065842] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Jan  1 00:00:03 mto kernel: [    0.065954] audit: initializing netlink subsys (disabled)
Jan  1 00:00:03 mto kernel: [    0.066351] audit: type=2000 audit(0.064:1): state=initialized audit_enabled=0 res=1
Jan  1 00:00:03 mto kernel: [    0.066851] thermal_sys: Registered thermal governor 'step_wise'
Jan  1 00:00:03 mto kernel: [    0.067309] cpuidle: using governor menu
Jan  1 00:00:03 mto kernel: [    0.067632] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
Jan  1 00:00:03 mto kernel: [    0.067829] ASID allocator initialised with 65536 entries
Jan  1 00:00:03 mto kernel: [    0.067980] Serial: AMBA PL011 UART driver
Jan  1 00:00:03 mto kernel: [    0.096475] bcm2835-mbox fe00b880.mailbox: mailbox enabled
Jan  1 00:00:03 mto kernel: [    0.104324] raspberrypi-firmware soc:firmware: Attached to firmware from 2021-04-30T15:54:12, variant start
Jan  1 00:00:03 mto kernel: [    0.108318] raspberrypi-firmware soc:firmware: Firmware hash is 3e104c5ed69dc796755b7195973a8d00482d76dd
Jan  1 00:00:03 mto kernel: [    0.141856] bcm2835-dma fe007000.dma: DMA legacy API manager, dmachans=0x1
Jan  1 00:00:03 mto kernel: [    0.145754] vgaarb: loaded
Jan  1 00:00:03 mto kernel: [    0.146183] SCSI subsystem initialized
Jan  1 00:00:03 mto kernel: [    0.146403] usbcore: registered new interface driver usbfs
Jan  1 00:00:03 mto kernel: [    0.146480] usbcore: registered new interface driver hub
Jan  1 00:00:03 mto kernel: [    0.146557] usbcore: registered new device driver usb
Jan  1 00:00:03 mto kernel: [    0.146874] usb_phy_generic phy: supply vcc not found, using dummy regulator
Jan  1 00:00:03 mto kernel: [    0.148671] clocksource: Switched to clocksource arch_sys_counter
Jan  1 00:00:03 mto kernel: [    1.166789] VFS: Disk quotas dquot_6.6.0
Jan  1 00:00:03 mto kernel: [    1.166908] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jan  1 00:00:03 mto kernel: [    1.167082] FS-Cache: Loaded
Jan  1 00:00:03 mto kernel: [    1.167329] CacheFiles: Loaded
Jan  1 00:00:03 mto kernel: [    1.177761] NET: Registered protocol family 2
Jan  1 00:00:03 mto kernel: [    1.178960] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.179032] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.179279] TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.179734] TCP: Hash tables configured (established 32768 bind 32768)
Jan  1 00:00:03 mto kernel: [    1.179982] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.180070] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Jan  1 00:00:03 mto kernel: [    1.180418] NET: Registered protocol family 1
Jan  1 00:00:03 mto kernel: [    1.181411] RPC: Registered named UNIX socket transport module.
Jan  1 00:00:03 mto kernel: [    1.181441] RPC: Registered udp transport module.
Jan  1 00:00:03 mto kernel: [    1.181461] RPC: Registered tcp transport module.
Jan  1 00:00:03 mto kernel: [    1.181481] RPC: Registered tcp NFSv4.1 backchannel transport module.
Jan  1 00:00:03 mto kernel: [    1.181513] PCI: CLS 0 bytes, default 64
Jan  1 00:00:03 mto kernel: [    1.183805] hw perfevents: enabled with armv8_cortex_a72 PMU driver, 7 counters available
Jan  1 00:00:03 mto kernel: [    1.184107] kvm [1]: IPA Size Limit: 44 bits
Jan  1 00:00:03 mto kernel: [    1.185330] kvm [1]: vgic interrupt IRQ9
Jan  1 00:00:03 mto kernel: [    1.185622] kvm [1]: Hyp mode initialized successfully
Jan  1 00:00:03 mto kernel: [    1.187763] Initialise system trusted keyrings
Jan  1 00:00:03 mto kernel: [    1.188135] workingset: timestamp_bits=46 max_order=20 bucket_order=0
Jan  1 00:00:03 mto kernel: [    1.194350] zbud: loaded
Jan  1 00:00:03 mto kernel: [    1.196074] FS-Cache: Netfs 'nfs' registered for caching
Jan  1 00:00:03 mto kernel: [    1.196775] NFS: Registering the id_resolver key type
Jan  1 00:00:03 mto kernel: [    1.196833] Key type id_resolver registered
Jan  1 00:00:03 mto kernel: [    1.196855] Key type id_legacy registered
Jan  1 00:00:03 mto kernel: [    1.196978] nfs4filelayout_init: NFSv4 File Layout Driver Registering...
Jan  1 00:00:03 mto kernel: [    1.197005] nfs4flexfilelayout_init: NFSv4 Flexfile Layout Driver Registering...
Jan  1 00:00:03 mto kernel: [    1.198144] Key type asymmetric registered
Jan  1 00:00:03 mto kernel: [    1.198172] Asymmetric key parser 'x509' registered
Jan  1 00:00:03 mto kernel: [    1.198229] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Jan  1 00:00:03 mto kernel: [    1.198483] io scheduler mq-deadline registered
Jan  1 00:00:03 mto kernel: [    1.198508] io scheduler kyber registered
Jan  1 00:00:03 mto kernel: [    1.202642] brcm-pcie fd500000.pcie: host bridge /scb/pcie@7d500000 ranges:
Jan  1 00:00:03 mto kernel: [    1.202689] brcm-pcie fd500000.pcie:   No bus range found for /scb/pcie@7d500000, using [bus 00-ff]
Jan  1 00:00:03 mto kernel: [    1.202777] brcm-pcie fd500000.pcie:      MEM 0x0600000000..0x063fffffff -> 0x00c0000000
Jan  1 00:00:03 mto kernel: [    1.202872] brcm-pcie fd500000.pcie:   IB MEM 0x0000000000..0x00ffffffff -> 0x0400000000
Jan  1 00:00:03 mto kernel: [    1.266768] brcm-pcie fd500000.pcie: link up, 5.0 GT/s PCIe x1 (SSC)
Jan  1 00:00:03 mto kernel: [    1.267154] brcm-pcie fd500000.pcie: PCI host bridge to bus 0000:00
Jan  1 00:00:03 mto kernel: [    1.267186] pci_bus 0000:00: root bus resource [bus 00-ff]
Jan  1 00:00:03 mto kernel: [    1.267222] pci_bus 0000:00: root bus resource [mem 0x600000000-0x63fffffff] (bus address [0xc0000000-0xffffffff])
Jan  1 00:00:03 mto kernel: [    1.267325] pci 0000:00:00.0: [14e4:2711] type 01 class 0x060400
Jan  1 00:00:03 mto kernel: [    1.267578] pci 0000:00:00.0: PME# supported from D0 D3hot
Jan  1 00:00:03 mto kernel: [    1.271208] pci 0000:00:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jan  1 00:00:03 mto kernel: [    1.271610] pci 0000:01:00.0: [1106:3483] type 00 class 0x0c0330
Jan  1 00:00:03 mto kernel: [    1.271744] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Jan  1 00:00:03 mto kernel: [    1.272177] pci 0000:01:00.0: PME# supported from D0 D3hot
Jan  1 00:00:03 mto kernel: [    1.275842] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01
Jan  1 00:00:03 mto kernel: [    1.275898] pci 0000:00:00.0: BAR 8: assigned [mem 0x600000000-0x6000fffff]
Jan  1 00:00:03 mto kernel: [    1.275932] pci 0000:01:00.0: BAR 0: assigned [mem 0x600000000-0x600000fff 64bit]
Jan  1 00:00:03 mto kernel: [    1.275983] pci 0000:00:00.0: PCI bridge to [bus 01]
Jan  1 00:00:03 mto kernel: [    1.276015] pci 0000:00:00.0:   bridge window [mem 0x600000000-0x6000fffff]
Jan  1 00:00:03 mto kernel: [    1.276746] bcm2708_fb soc:fb: Unable to determine number of FBs. Disabling driver.
Jan  1 00:00:03 mto kernel: [    1.276795] bcm2708_fb: probe of soc:fb failed with error -2
Jan  1 00:00:03 mto kernel: [    1.283816] iproc-rng200 fe104000.rng: hwrng registered
Jan  1 00:00:03 mto kernel: [    1.284164] vc-mem: phys_addr:0x00000000 mem_base=0x3ec00000 mem_size:0x40000000(1024 MiB)
Jan  1 00:00:03 mto kernel: [    1.285141] gpiomem-bcm2835 fe200000.gpiomem: Initialised: Registers at 0xfe200000
Jan  1 00:00:03 mto kernel: [    1.285571] cacheinfo: Unable to detect cache hierarchy for CPU 0
Jan  1 00:00:03 mto kernel: [    1.296929] brd: module loaded
Jan  1 00:00:03 mto kernel: [    1.309450] loop: module loaded
Jan  1 00:00:03 mto kernel: [    1.311047] Loading iSCSI transport class v2.0-870.
Jan  1 00:00:03 mto kernel: [    1.314265] libphy: Fixed MDIO Bus: probed
Jan  1 00:00:03 mto kernel: [    1.315803] bcmgenet fd580000.ethernet: GENET 5.0 EPHY: 0x0000
Jan  1 00:00:03 mto kernel: [    1.328691] libphy: bcmgenet MII bus: probed
Jan  1 00:00:03 mto kernel: [    1.380815] unimac-mdio unimac-mdio.-19: Broadcom UniMAC MDIO bus
Jan  1 00:00:03 mto kernel: [    1.381929] usbcore: registered new interface driver r8152
Jan  1 00:00:03 mto kernel: [    1.382008] usbcore: registered new interface driver lan78xx
Jan  1 00:00:03 mto kernel: [    1.382085] usbcore: registered new interface driver smsc95xx
Jan  1 00:00:03 mto kernel: [    1.429618] pci 0000:00:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:03 mto kernel: [    1.429830] xhci_hcd 0000:01:00.0: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.429884] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 1
Jan  1 00:00:03 mto kernel: [    1.430637] xhci_hcd 0000:01:00.0: hcc params 0x002841eb hci version 0x100 quirks 0x0000060000000890
Jan  1 00:00:03 mto kernel: [    1.431933] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10
Jan  1 00:00:03 mto kernel: [    1.431966] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jan  1 00:00:03 mto kernel: [    1.431993] usb usb1: Product: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.432016] usb usb1: Manufacturer: Linux 5.10.36-v8 xhci-hcd
Jan  1 00:00:03 mto kernel: [    1.432038] usb usb1: SerialNumber: 0000:01:00.0
Jan  1 00:00:03 mto kernel: [    1.432820] hub 1-0:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    1.432928] hub 1-0:1.0: 1 port detected
Jan  1 00:00:03 mto kernel: [    1.433565] xhci_hcd 0000:01:00.0: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.433600] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 2
Jan  1 00:00:03 mto kernel: [    1.433638] xhci_hcd 0000:01:00.0: Host supports USB 3.0 SuperSpeed
Jan  1 00:00:03 mto kernel: [    1.434049] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.10
Jan  1 00:00:03 mto kernel: [    1.434080] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jan  1 00:00:03 mto kernel: [    1.434106] usb usb2: Product: xHCI Host Controller
Jan  1 00:00:03 mto kernel: [    1.434128] usb usb2: Manufacturer: Linux 5.10.36-v8 xhci-hcd
Jan  1 00:00:03 mto kernel: [    1.434151] usb usb2: SerialNumber: 0000:01:00.0
Jan  1 00:00:03 mto kernel: [    1.434804] hub 2-0:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    1.434884] hub 2-0:1.0: 4 ports detected
Jan  1 00:00:03 mto kernel: [    1.436351] dwc_otg: version 3.00a 10-AUG-2012 (platform bus)
Jan  1 00:00:03 mto kernel: [    1.437217] usbcore: registered new interface driver uas
Jan  1 00:00:03 mto kernel: [    1.437328] usbcore: registered new interface driver usb-storage
Jan  1 00:00:03 mto kernel: [    1.437539] mousedev: PS/2 mouse device common for all mice
Jan  1 00:00:03 mto kernel: [    1.439386] bcm2835-wdt bcm2835-wdt: Broadcom BCM2835 watchdog timer
Jan  1 00:00:03 mto kernel: [    1.442650] sdhci: Secure Digital Host Controller Interface driver
Jan  1 00:00:03 mto kernel: [    1.442682] sdhci: Copyright(c) Pierre Ossman
Jan  1 00:00:03 mto kernel: [    1.443350] mmc-bcm2835 fe300000.mmcnr: could not get clk, deferring probe
Jan  1 00:00:03 mto kernel: [    1.443867] sdhci-pltfm: SDHCI platform and OF driver helper
Jan  1 00:00:03 mto kernel: [    1.447320] ledtrig-cpu: registered to indicate activity on CPUs
Jan  1 00:00:03 mto kernel: [    1.447608] hid: raw HID events driver (C) Jiri Kosina
Jan  1 00:00:03 mto kernel: [    1.447777] usbcore: registered new interface driver usbhid
Jan  1 00:00:03 mto kernel: [    1.447800] usbhid: USB HID core driver
Jan  1 00:00:03 mto kernel: [    1.455674] Initializing XFRM netlink socket
Jan  1 00:00:03 mto kernel: [    1.455741] NET: Registered protocol family 17
Jan  1 00:00:03 mto kernel: [    1.455878] Key type dns_resolver registered
Jan  1 00:00:03 mto kernel: [    1.456452] registered taskstats version 1
Jan  1 00:00:03 mto kernel: [    1.456493] Loading compiled-in X.509 certificates
Jan  1 00:00:03 mto kernel: [    1.457118] Key type ._fscrypt registered
Jan  1 00:00:03 mto kernel: [    1.457145] Key type .fscrypt registered
Jan  1 00:00:03 mto kernel: [    1.457165] Key type fscrypt-provisioning registered
Jan  1 00:00:03 mto kernel: [    1.468561] uart-pl011 fe201000.serial: there is not valid maps for state default
Jan  1 00:00:03 mto kernel: [    1.468914] uart-pl011 fe201000.serial: cts_event_workaround enabled
Jan  1 00:00:03 mto kernel: [    1.469033] fe201000.serial: ttyAMA0 at MMIO 0xfe201000 (irq = 21, base_baud = 0) is a PL011 rev2
Jan  1 00:00:03 mto kernel: [    2.736937] printk: console [ttyAMA0] enabled
Jan  1 00:00:03 mto kernel: [    2.748423] bcm2835-power bcm2835-power: Broadcom BCM2835 power domains driver
Jan  1 00:00:03 mto kernel: [    2.756680] mmc-bcm2835 fe300000.mmcnr: mmc_debug:0 mmc_debug2:0
Jan  1 00:00:03 mto kernel: [    2.762718] mmc-bcm2835 fe300000.mmcnr: DMA channel allocated
Jan  1 00:00:03 mto kernel: [    2.798448] of_cfs_init
Jan  1 00:00:03 mto kernel: [    2.801070] of_cfs_init: OK
Jan  1 00:00:03 mto kernel: [    2.805176] uart-pl011 fe201000.serial: no DMA platform data
Jan  1 00:00:03 mto kernel: [    2.818988] mmc1: queuing unknown CIS tuple 0x80 (2 bytes)
Jan  1 00:00:03 mto kernel: [    2.826379] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.835658] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.843781] mmc0: SDHCI controller on fe340000.emmc2 [fe340000.emmc2] using ADMA
Jan  1 00:00:03 mto kernel: [    2.855933] Waiting for root device /dev/mmcblk0p2...
Jan  1 00:00:03 mto kernel: [    2.857779] mmc1: queuing unknown CIS tuple 0x80 (7 bytes)
Jan  1 00:00:03 mto kernel: [    2.871906] mmc1: queuing unknown CIS tuple 0x80 (3 bytes)
Jan  1 00:00:03 mto kernel: [    2.918034] random: fast init done
Jan  1 00:00:03 mto kernel: [    2.957148] mmc1: new high speed SDIO card at address 0001
Jan  1 00:00:03 mto kernel: [    2.977952] mmc0: new ultra high speed DDR50 SDXC card at address 0001
Jan  1 00:00:03 mto kernel: [    2.984784] usb 2-2: new SuperSpeed Gen 1 USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    2.992736] mmcblk0: mmc0:0001 BC2QT 59.6 GiB
Jan  1 00:00:03 mto kernel: [    2.999377]  mmcblk0: p1 p2
Jan  1 00:00:03 mto kernel: [    3.014260] usb 2-2: New USB device found, idVendor=2357, idProduct=0601, bcdDevice=30.00
Jan  1 00:00:03 mto kernel: [    3.016900] EXT4-fs (mmcblk0p2): mounted filesystem with ordered data mode. Opts: (null)
Jan  1 00:00:03 mto kernel: [    3.022502] usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jan  1 00:00:03 mto kernel: [    3.030706] VFS: Mounted root (ext4 filesystem) readonly on device 179:2.
Jan  1 00:00:03 mto kernel: [    3.037778] usb 2-2: Product: USB 10/100/1000 LAN
Jan  1 00:00:03 mto kernel: [    3.037789] usb 2-2: Manufacturer: TP-Link
Jan  1 00:00:03 mto kernel: [    3.045359] devtmpfs: mounted
Jan  1 00:00:03 mto kernel: [    3.049303] usb 2-2: SerialNumber: 000001
Jan  1 00:00:03 mto kernel: [    3.070090] Freeing unused kernel memory: 3712K
Jan  1 00:00:03 mto kernel: [    3.080967] Run /sbin/init as init process
Jan  1 00:00:03 mto kernel: [    3.140717] usb 1-1: new high-speed USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.295439] usb 1-1: New USB device found, idVendor=2109, idProduct=3431, bcdDevice= 4.21
Jan  1 00:00:03 mto kernel: [    3.303924] usb 1-1: New USB device strings: Mfr=0, Product=1, SerialNumber=0
Jan  1 00:00:03 mto kernel: [    3.311220] usb 1-1: Product: USB2.0 Hub
Jan  1 00:00:03 mto kernel: [    3.316919] hub 1-1:1.0: USB hub found
Jan  1 00:00:03 mto kernel: [    3.321049] hub 1-1:1.0: 4 ports detected
Jan  1 00:00:03 mto kernel: [    3.421600] usb 2-2: reset SuperSpeed Gen 1 USB device number 2 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.438665] EXT4-fs (mmcblk0p2): re-mounted. Opts: (null)
Jan  1 00:00:03 mto kernel: [    3.463502] r8152 2-2:1.0: Direct firmware load for rtl_nic/rtl8153a-4.fw failed with error -2
Jan  1 00:00:03 mto kernel: [    3.472204] r8152 2-2:1.0: unable to load firmware patch rtl_nic/rtl8153a-4.fw (-2)
Jan  1 00:00:03 mto kernel: [    3.513907] r8152 2-2:1.0 eth1: v1.12.11
Jan  1 00:00:03 mto kernel: [    3.567454] PPP generic driver version 2.4.2
Jan  1 00:00:03 mto kernel: [    3.582653] PPP Deflate Compression module registered
Jan  1 00:00:03 mto kernel: [    3.615038] PPP BSD Compression module registered
Jan  1 00:00:03 mto kernel: [    3.620735] usb 1-1.4: new full-speed USB device number 3 using xhci_hcd
Jan  1 00:00:03 mto kernel: [    3.737308] usb 1-1.4: New USB device found, idVendor=1546, idProduct=01a7, bcdDevice= 1.00
Jan  1 00:00:03 mto kernel: [    3.745871] usb 1-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jan  1 00:00:03 mto sysctl: * Applying /etc/sysctl.conf ...
Jan  1 00:00:03 mto kernel: [    3.753515] usb 1-1.4: Product: u-blox 7 - GPS/GNSS Receiver
Jan  1 00:00:03 mto sysctl: kernel.panic = 10
Jan  1 00:00:03 mto sysctl: kernel.panic_on_oops = 1
Jan  1 00:00:03 mto sysctl: kernel.printk = 4 4 1 7
Jan  1 00:00:03 mto kernel: [    3.759493] usb 1-1.4: Manufacturer: u-blox AG - www.u-blox.com
Jan  1 00:00:04 mto kernel: [    4.084328] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.085799] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.085888] random: udevd: uninitialized urandom read (16 bytes read)
Jan  1 00:00:04 mto kernel: [    4.283405] rpivid-mem feb00000.hevc-decoder: rpivid-hevcmem initialised: Registers at 0xfeb00000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.283948] rpivid-mem feb10000.rpivid-local-intc: rpivid-intcmem initialised: Registers at 0xfeb10000 length 0x00001000
Jan  1 00:00:04 mto kernel: [    4.285512] rpivid-mem feb20000.h264-decoder: rpivid-h264mem initialised: Registers at 0xfeb20000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.286085] rpivid-mem feb30000.vp9-decoder: rpivid-vp9mem initialised: Registers at 0xfeb30000 length 0x00010000
Jan  1 00:00:04 mto kernel: [    4.301020] mc: Linux media interface: v0.10
Jan  1 00:00:04 mto kernel: [    4.301716] vc_sm_cma: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.309061] bcm2835_vc_sm_cma_probe: Videocore shared memory driver
Jan  1 00:00:04 mto kernel: [    4.309092] [vc_sm_connected_init]: start
Jan  1 00:00:04 mto kernel: [    4.317812] [vc_sm_connected_init]: installed successfully
Jan  1 00:00:04 mto kernel: [    4.341865] videodev: Linux video capture interface: v2.00
Jan  1 00:00:04 mto kernel: [    4.391422] bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.391430] bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.400378] bcm2835_isp: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.405436] bcm2835_v4l2: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.413875] bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video13
Jan  1 00:00:04 mto kernel: [    4.417986] bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video14
Jan  1 00:00:04 mto kernel: [    4.418468] bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video15
Jan  1 00:00:04 mto kernel: [    4.418836] bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video16
Jan  1 00:00:04 mto kernel: [    4.418869] bcm2835-isp bcm2835-isp: Register output node 0 with media controller
Jan  1 00:00:04 mto kernel: [    4.418893] bcm2835-isp bcm2835-isp: Register capture node 1 with media controller
Jan  1 00:00:04 mto kernel: [    4.418910] bcm2835-isp bcm2835-isp: Register capture node 2 with media controller
Jan  1 00:00:04 mto kernel: [    4.418927] bcm2835-isp bcm2835-isp: Register capture node 3 with media controller
Jan  1 00:00:04 mto kernel: [    4.419139] bcm2835-isp bcm2835-isp: Loaded V4L2 bcm2835-isp
Jan  1 00:00:04 mto kernel: [    4.430504] bcm2835_codec: module is from the staging directory, the quality is unknown, you have been warned.
Jan  1 00:00:04 mto kernel: [    4.437763] bcm2835-codec bcm2835-codec: Device registered as /dev/video10
Jan  1 00:00:04 mto kernel: [    4.437816] bcm2835-codec bcm2835-codec: Loaded V4L2 decode
Jan  1 00:00:04 mto kernel: [    4.441348] bcm2835-codec bcm2835-codec: Device registered as /dev/video11
Jan  1 00:00:04 mto kernel: [    4.441398] bcm2835-codec bcm2835-codec: Loaded V4L2 encode
Jan  1 00:00:04 mto kernel: [    4.456923] bcm2835-codec bcm2835-codec: Device registered as /dev/video12
Jan  1 00:00:04 mto kernel: [    4.456978] bcm2835-codec bcm2835-codec: Loaded V4L2 isp
Jan  1 00:00:04 mto kernel: [    4.460991] cdc_acm 1-1.4:1.0: ttyACM0: USB ACM device
Jan  1 00:00:04 mto kernel: [    4.463746] usbcore: registered new interface driver cdc_acm
Jan  1 00:00:04 mto kernel: [    4.463767] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Apr 22 18:30:00 mto kernel: [    4.476878] rtc-pcf8523 1-0068: registered as rtc0
Apr 22 18:30:00 mto kernel: [    4.480536] rtc-pcf8523 1-0068: setting system clock to 2026-04-22T18:30:00 UTC (1776882600)
Apr 22 18:30:00 mto kernel: [    4.494649] cfg80211: Loading compiled-in X.509 certificates for regulatory database
Apr 22 18:30:00 mto gpsd.hotplug: add /dev/ttyACM0
Apr 22 18:30:00 mto gpsdctl: gpsd_control(action=add, arg=/dev/ttyACM0)
Apr 22 18:30:00 mto gpsdctl: launching gpsd -n -F /run/gpsd.sock
Apr 22 18:30:00 mto kernel: [    4.652612] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Apr 22 18:30:00 mto kernel: [    4.656314] NET: Registered protocol family 10
Apr 22 18:30:00 mto gpsd[190]: gpsd:ERROR: can't bind to IPv6 port 2947, Cannot assign requested address
Apr 22 18:30:00 mto kernel: [    4.658073] Segment Routing with IPv6
Apr 22 18:30:00 mto rsyslogd: [origin software="rsyslogd" swVersion="8.2010.0" x-pid="122" x-info="https://www.rsyslog.com"] start
Apr 22 18:30:00 mto kernel: [    4.697213] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6
Apr 22 18:30:00 mto kernel: [    4.706390] usbcore: registered new interface driver brcmfmac
Apr 22 18:30:00 mto kernel: [    4.886872] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6
Apr 22 18:30:00 mto kernel: [    4.895869] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available
Apr 22 18:30:00 mto kernel: [    4.909863] brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Mar  1 2015 07:29:38 version 7.45.18 (r538002) FWID 01-6a2c8ad4
Apr 22 18:30:00 mto wpa_supplicant[230]: Successfully initialized wpa_supplicant
Apr 22 18:30:00 mto kernel: [    5.297730] brcmfmac: brcmf_cfg80211_set_power_mgmt: power save enabled
Apr 22 18:30:02 mto kernel: [    7.244723] random: crng init done
Apr 22 18:30:02 mto kernel: [    7.244748] random: 7 urandom warning(s) missed due to ratelimiting
Apr 22 18:30:02 mto wpa_supplicant[233]: wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
Apr 22 18:30:02 mto kernel: [    7.552948] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Apr 22 18:30:02 mto kernel: [    7.553561] r8152 2-2:1.0 eth1: carrier on
Apr 22 18:30:03 mto ifplugd(eth0): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Apr 22 18:30:03 mto ifplugd(eth0): upping interface
Apr 22 18:30:03 mto kernel: [    8.324339] bcmgenet fd580000.ethernet: configuring instance for external RGMII (RX delay)
Apr 22 18:30:03 mto kernel: [    8.324749] bcmgenet fd580000.ethernet eth0: Link is Down
Apr 22 18:30:03 mto ifplugd(eth0): using SIOCETHTOOL detection mode
Apr 22 18:30:03 mto ifplugd(eth0): interface exists
Apr 22 18:30:03 mto ifplugd(eth0): link is down
Apr 22 18:30:03 mto ifplugd(wlan0): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Apr 22 18:30:03 mto ifplugd(wlan0): using wireless extension detection mode
Apr 22 18:30:03 mto ifplugd(wlan0): interface exists
Apr 22 18:30:03 mto ifplugd(wlan0): link is down
Apr 22 18:30:03 mto ifplugd(eth1): started: BusyBox v1.33.0 (2022-04-13 15:15:41 PDT)
Apr 22 18:30:03 mto ifplugd(eth1): using SIOCETHTOOL detection mode
Apr 22 18:30:03 mto ifplugd(eth1): interface exists
Apr 22 18:30:03 mto ifplugd(eth1): link is up
Apr 22 18:30:03 mto chronyd[323]: chronyd version 4.0 starting (+CMDMON +NTP +REFCLOCK +RTC -PRIVDROP -SCFILTER -SIGND +ASYNCDNS -NTS -SECHASH +IPV6 -DEBUG)
Apr 22 18:30:03 mto gpsd[327]: gpsd:ERROR: can't bind to IPv4 port 2947, Address already in use
Apr 22 18:30:03 mto gpsd[327]: gpsd:ERROR: maybe gpsd is already running!  Or systemd has the port?
Apr 22 18:30:03 mto gpsd[327]: gpsd:ERROR: SER: /dev/gps0 already opened by another process
Apr 22 18:30:03 mto sshd[337]: Server listening on 0.0.0.0 port 22.
Apr 22 18:30:03 mto sshd[337]: Server listening on :: port 22.
Apr 22 18:30:03 mto rpc.statd[351]: Version 2.3.3 starting
Apr 22 18:30:03 mto sm-notify[352]: Version 2.3.3 starting
Apr 22 18:30:03 mto rpc.statd[351]: Initializing NSM state
Apr 22 18:30:03 mto rpc.statd[351]: Running as root.  chown /run/nfs to choose different user
Apr 22 18:30:03 mto kernel: [    8.825652] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
Apr 22 18:30:04 mto kernel: [    9.962922] NFSD: Using UMH upcall client tracking operations.
Apr 22 18:30:04 mto kernel: [    9.962951] NFSD: starting 90-second grace period (net f0000081)
Apr 22 18:30:04 mto rpc.mountd[366]: Version 2.3.3 starting
Apr 22 18:30:05 mto su: + none root:news
Apr 22 18:30:07 mto ifplugd(eth0): link is up
Apr 22 18:30:07 mto ifplugd(eth0): executing '/etc/ifplugd/ifplugd.action eth0 up'
Apr 22 18:30:07 mto kernel: [   12.416993] bcmgenet fd580000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
Apr 22 18:30:07 mto kernel: [   12.417062] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Apr 22 18:30:07 mto udhcpc[452]: started, v1.33.0
Apr 22 18:30:07 mto udhcpc[452]: sending discover
Apr 22 18:30:07 mto : starting pid 464, tty '/dev/console': '/sbin/getty -L  console 0 vt100 '
Apr 22 18:30:07 mto : starting pid 465, tty '/dev/tty1': '/sbin/getty -L  tty1 0 vt100 '
Apr 22 18:30:10 mto udhcpc[452]: sending discover
Apr 22 18:30:10 mto udhcpc[452]: sending select for 192.168.1.166
Apr 22 18:30:10 mto udhcpc[452]: lease of 192.168.1.166 obtained, lease time 86400
Apr 22 18:30:10 mto ifplugd(eth0): exit code: 0
Apr 22 18:30:36 mto chronyd[323]: Selected source 72.14.183.39 (pool.ntp.org)
Apr 22 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 22 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 22 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 22 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 22 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 22 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 22 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 22 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 22 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 22 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 01:00:02 mto relay-watchdog: Relay flag is still current
Apr 23 01:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 23 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 03:29:11 mto kernel: [32356.395915] usb 1-1.3: new high-speed USB device number 4 using xhci_hcd
Apr 23 03:29:11 mto kernel: [32356.496202] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 23 03:29:11 mto kernel: [32356.496223] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 23 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 23 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 23 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 23 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 06:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 23 06:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 23 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 23 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 23 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 23 09:26:59 mto kernel: [53824.665856] usb 1-1.3: USB disconnect, device number 4
Apr 23 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 18:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 23 18:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 23 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 23 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 23 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 03:31:26 mto kernel: [118892.472282] usb 1-1.3: new high-speed USB device number 5 using xhci_hcd
Apr 24 03:31:26 mto kernel: [118892.572664] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 24 03:31:26 mto kernel: [118892.572686] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 24 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 24 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 24 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 24 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 06:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 24 06:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 24 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 24 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 24 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 24 09:26:58 mto kernel: [140224.799388] usb 1-1.3: USB disconnect, device number 5
Apr 24 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 18:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 24 18:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 24 19:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 24 19:00:02 mto relay-watchdog: Relay flag is still current
Apr 24 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 24 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 24 23:00:02 mto relay-watchdog: Relay flag is still current
Apr 24 23:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 25 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 02:34:54 mto kernel: [201901.687599] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
Apr 25 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 03:33:46 mto kernel: [205433.964307] usb 1-1.3: new high-speed USB device number 6 using xhci_hcd
Apr 25 03:33:46 mto kernel: [205434.064666] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 25 03:33:46 mto kernel: [205434.064687] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 25 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 25 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 25 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 25 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 06:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 25 06:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 25 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 25 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 25 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 25 09:22:58 mto kernel: [226386.332274] usb 1-1.3: USB disconnect, device number 6
Apr 25 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 17:00:02 mto relay-watchdog: Relay flag is still current
Apr 25 17:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 25 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 18:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 25 18:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 25 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 25 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 25 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 03:36:06 mto kernel: [291975.463910] usb 1-1.3: new high-speed USB device number 7 using xhci_hcd
Apr 26 03:36:06 mto kernel: [291975.564284] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 26 03:36:06 mto kernel: [291975.564306] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 26 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 26 05:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Apr 26 05:00:02 mto relay-watchdog: Relay flag is still current
Apr 26 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 26 06:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 26 06:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 26 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 26 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 26 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 26 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 09:18:59 mto kernel: [312548.641653] usb 1-1.3: USB disconnect, device number 7
Apr 26 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 18:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 26 18:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 26 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 26 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 26 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 03:38:26 mto kernel: [378516.695777] usb 1-1.3: new high-speed USB device number 8 using xhci_hcd
Apr 27 03:38:26 mto kernel: [378516.796105] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 27 03:38:26 mto kernel: [378516.796130] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 27 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 27 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 27 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 27 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 06:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 27 06:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 27 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 27 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 27 08:40:02 mto sshd[11168]: error: kex_exchange_identification: Connection closed by remote host
Apr 27 08:40:02 mto sshd[11168]: Connection closed by 192.168.1.1 port 39066
Apr 27 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 27 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 09:18:59 mto kernel: [398950.071334] usb 1-1.3: USB disconnect, device number 8
Apr 27 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 17:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 27 17:00:02 mto relay-watchdog: Relay flag is still current
Apr 27 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 18:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 27 18:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 27 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 27 22:00:02 mto relay-watchdog: Relay flag is still current
Apr 27 22:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 27 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 27 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 00:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 28 00:00:02 mto relay-watchdog: Relay flag is still current
Apr 28 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 03:40:51 mto kernel: [465063.055651] usb 1-1.3: new high-speed USB device number 9 using xhci_hcd
Apr 28 03:40:51 mto kernel: [465063.156042] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 28 03:40:51 mto kernel: [465063.156063] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 28 04:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 28 04:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 28 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 28 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 06:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 28 06:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 28 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 28 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 28 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 09:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 09:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 28 09:14:58 mto kernel: [485110.589901] usb 1-1.3: USB disconnect, device number 9
Apr 28 10:00:02 mto relay-watchdog: Relay flag is still current
Apr 28 10:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 28 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 11:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 13:00:02 mto relay-watchdog: Relay flag is still current
Apr 28 13:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 28 14:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 14:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 18:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 28 18:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 28 19:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 19:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 20:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 20:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 21:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 21:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 22:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 22:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 28 23:00:01 mto relay-watchdog: Relay flag is still current
Apr 28 23:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 00:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 00:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 01:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 01:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 02:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 02:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 03:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 03:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 03:43:11 mto kernel: [551604.559119] usb 1-1.3: new high-speed USB device number 10 using xhci_hcd
Apr 29 03:43:11 mto kernel: [551604.659487] usb 1-1.3: New USB device found, idVendor=20e7, idProduct=df3d, bcdDevice=19.c6
Apr 29 03:43:11 mto kernel: [551604.659511] usb 1-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Apr 29 04:00:02 mto relay-watchdog: Relay flag is still current
Apr 29 04:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Apr 29 05:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 05:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 29 06:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 29 06:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 06:30:10 mto udhcpc[482]: sending renew to 192.168.1.1
Apr 29 06:30:10 mto udhcpc[482]: lease of 192.168.1.166 obtained, lease time 86400
Apr 29 07:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 07:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 29 08:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 08:00:01 mto exchange-watchdog: Keepalive flags found, skipping
Apr 29 09:00:02 mto relay-watchdog: Relay flag is still current
Apr 29 09:00:02 mto exchange-watchdog: Keepalive flags found, skipping
Apr 29 09:10:58 mto kernel: [571271.873022] usb 1-1.3: USB disconnect, device number 10
Apr 29 10:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 10:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 11:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 11:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 29 12:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 12:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 13:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 13:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 14:00:02 mto relay-watchdog: Relay flag is still current
Apr 29 14:00:02 mto exchange-watchdog: Exchange flag is still current
Apr 29 15:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 15:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 16:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 16:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 17:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 17:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 18:00:01 mto exchange-watchdog: Exchange flag is still current
Apr 29 18:00:01 mto relay-watchdog: Relay flag is still current
Apr 29 18:28:01 mto cron.flagwatchdog: Reboot system flag detected
Apr 29 18:28:01 mto cron.flagwatchdog: Rebooting system
Apr 29 18:28:01 mto : starting pid 14037, tty '': '/etc/init.d/rcK'
Apr 29 18:28:17 mto su: + none root:news
Apr 29 18:28:42 mto rpc.mountd[366]: Caught signal 15, un-registering and exiting.
Apr 29 18:28:42 mto sshd[337]: Received signal 15; terminating.
Apr 29 18:28:42 mto chronyd[323]: chronyd exiting
Apr 29 18:28:42 mto ifplugd(eth0): exiting
Apr 29 18:28:42 mto ifplugd(wlan0): exiting
Apr 29 18:28:42 mto ifplugd(eth1): exiting
Apr 29 18:28:44 mto wpa_supplicant[233]: nl80211: deinit ifname=p2p-dev-wlan0 disabled_11b_rates=0
Apr 29 18:28:44 mto wpa_supplicant[233]: p2p-dev-wlan0: CTRL-EVENT-TERMINATING 
Apr 29 18:28:44 mto wpa_supplicant[233]: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
