Created
October 11, 2013 14:34
-
-
Save glamrock/6935712 to your computer and use it in GitHub Desktop.
debuginfo before wireless crash (tp-link N750 / WDR4300)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sat Sep 10 19:53:45 UTC 2011 | |
-------------------------------------------------------------------- | |
BEGIN DEBUGGING INFO | |
-------------------------------------------------------------------- | |
-------------------------------------------------------------------- | |
IP Routing Table: (route -n) | |
-------------------------------------------------------------------- | |
Kernel IP routing table | |
Destination Gateway Genmask Flags Metric Ref Use Iface | |
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br-plug | |
-------------------------------------------------------------------- | |
IP Routing Tables (ip route list table all): | |
-------------------------------------------------------------------- | |
192.168.1.0/24 dev br-plug proto kernel scope link src 192.168.1.20 | |
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1 | |
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 | |
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 | |
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1 | |
broadcast 192.168.1.0 dev br-plug table local proto kernel scope link src 192.168.1.20 | |
local 192.168.1.20 dev br-plug table local proto kernel scope host src 192.168.1.20 | |
broadcast 192.168.1.255 dev br-plug table local proto kernel scope link src 192.168.1.20 | |
fe80::/64 dev br-plug proto kernel metric 256 | |
unreachable default dev lo table unspec proto kernel metric -1 error -128 hoplimit 255 | |
local ::1 via :: dev lo table local proto none metric 0 | |
local fe80:: via :: dev lo table local proto none metric 0 | |
local fe80::a2f3:c1ff:fef8:8a94 via :: dev lo table local proto none metric 0 | |
ff00::/8 dev br-plug table local metric 256 | |
unreachable default dev lo table unspec proto kernel metric -1 error -128 hoplimit 255 | |
-------------------------------------------------------------------- | |
JSON INFO:(wget http://localhost:2006) | |
-------------------------------------------------------------------- | |
-------------------------------------------------------------------- | |
IP Routing Table's for Smart Gateway:(ip route ls table [224 & 223]) | |
-------------------------------------------------------------------- | |
---------------OLSRd Standard Default Route--------------------- | |
---------------Smart Gateway Default Route--------------------- | |
-------------------------------------------------------------------- | |
radio1 scan | |
-------------------------------------------------------------------- | |
Cell 01 - Address: DC:9F:DB:1B:9F:21 | |
ESSID: "OTISTAFF5" | |
Mode: Master Channel: 36 | |
Signal: -37 dBm Quality: 70/70 | |
Encryption: WPA2 PSK (CCMP) | |
Cell 02 - Address: DC:9F:DB:1B:9F:7F | |
ESSID: "OTISTAFF5" | |
Mode: Master Channel: 48 | |
Signal: -55 dBm Quality: 55/70 | |
Encryption: WPA2 PSK (CCMP) | |
Cell 03 - Address: 00:03:52:5E:79:E0 | |
ESSID: "NAFGUEST" | |
Mode: Master Channel: 153 | |
Signal: -61 dBm Quality: 49/70 | |
Encryption: none | |
Cell 04 - Address: 00:03:52:5E:79:E1 | |
ESSID: "NAFSTAFF" | |
Mode: Master Channel: 153 | |
Signal: -62 dBm Quality: 48/70 | |
Encryption: WEP Open/Shared (WEP-40, WEP-104) | |
Cell 05 - Address: 00:03:52:5E:79:E2 | |
ESSID: "NAFWPA" | |
Mode: Master Channel: 153 | |
Signal: -61 dBm Quality: 49/70 | |
Encryption: mixed WPA/WPA2 PSK (TKIP, CCMP) | |
Cell 06 - Address: 58:35:D9:7B:54:10 | |
ESSID: "LSKS_Wireless" | |
Mode: Master Channel: 157 | |
Signal: -84 dBm Quality: 26/70 | |
Encryption: WPA PSK (TKIP) | |
Cell 07 - Address: 00:03:52:5E:73:30 | |
ESSID: "NAFGUEST" | |
Mode: Master Channel: 165 | |
Signal: -72 dBm Quality: 38/70 | |
Encryption: none | |
Cell 08 - Address: 00:03:52:5E:73:31 | |
ESSID: "NAFSTAFF" | |
Mode: Master Channel: 165 | |
Signal: -73 dBm Quality: 37/70 | |
Encryption: WEP Open/Shared (WEP-40, WEP-104) | |
Cell 09 - Address: 00:03:52:5E:73:32 | |
ESSID: "NAFWPA" | |
Mode: Master Channel: 165 | |
Signal: -73 dBm Quality: 37/70 | |
Encryption: mixed WPA/WPA2 PSK (TKIP, CCMP) | |
-------------------------------------------------------------------- | |
IP Filter Tables: (iptables -nvL) | |
-------------------------------------------------------------------- | |
Chain INPUT (policy DROP 0 packets, 0 bytes) | |
pkts bytes target prot opt in out source destination | |
1252 112K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED | |
551 37444 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 | |
1290 58984 syn_flood tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 | |
1477 68223 input_rule all -- * * 0.0.0.0/0 0.0.0.0/0 | |
1477 68223 input all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain FORWARD (policy DROP 0 packets, 0 bytes) | |
pkts bytes target prot opt in out source destination | |
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED | |
0 0 forwarding_rule all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 forward all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) | |
pkts bytes target prot opt in out source destination | |
2217 169K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED | |
551 37444 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 | |
290 10589 output_rule all -- * * 0.0.0.0/0 0.0.0.0/0 | |
289 10553 output all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain forward (1 references) | |
pkts bytes target prot opt in out source destination | |
0 0 zone_lan_forward all -- br-plug * 0.0.0.0/0 0.0.0.0/0 | |
Chain forwarding_ap (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain forwarding_lan (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain forwarding_mesh (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain forwarding_rule (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain forwarding_secAp (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain forwarding_vpn (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain forwarding_wan (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain input (1 references) | |
pkts bytes target prot opt in out source destination | |
1457 67287 zone_lan all -- br-plug * 0.0.0.0/0 0.0.0.0/0 | |
Chain input_ap (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain input_lan (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain input_mesh (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain input_rule (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain input_secAp (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain input_vpn (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain input_wan (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain output (1 references) | |
pkts bytes target prot opt in out source destination | |
289 10553 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
10 360 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
9 324 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
8 288 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
7 252 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
6 216 zone_vpn_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain output_rule (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain reject (2 references) | |
pkts bytes target prot opt in out source destination | |
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset | |
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable | |
Chain syn_flood (1 references) | |
pkts bytes target prot opt in out source destination | |
1123 51300 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50 | |
167 7684 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_ap (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 | |
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8082 | |
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 input_ap all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_ap_ACCEPT (5 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_ap_DROP (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_ap_REJECT (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_ap_forward (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 forwarding_ap all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_ap_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_lan (1 references) | |
pkts bytes target prot opt in out source destination | |
81 4764 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 | |
1 44 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 | |
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 | |
1 44 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 | |
75 4484 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 | |
1 44 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8082 | |
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:698 | |
10 1630 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 | |
1288 56277 input_lan all -- * * 0.0.0.0/0 0.0.0.0/0 | |
1288 56277 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_lan_ACCEPT (5 references) | |
pkts bytes target prot opt in out source destination | |
278 10157 ACCEPT all -- * br-plug 0.0.0.0/0 0.0.0.0/0 | |
1288 56277 ACCEPT all -- br-plug * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_lan_DROP (1 references) | |
pkts bytes target prot opt in out source destination | |
0 0 DROP all -- * br-plug 0.0.0.0/0 0.0.0.0/0 | |
0 0 DROP all -- br-plug * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_lan_REJECT (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 reject all -- * br-plug 0.0.0.0/0 0.0.0.0/0 | |
0 0 reject all -- br-plug * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_lan_forward (1 references) | |
pkts bytes target prot opt in out source destination | |
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 forwarding_lan all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_lan_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_mesh (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 | |
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 | |
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:698 | |
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 input_mesh all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_mesh_ACCEPT (6 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_mesh_DROP (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_mesh_REJECT (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_mesh_forward (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 forwarding_mesh all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_mesh_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_secAp (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 | |
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8082 | |
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 input_secAp all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_secAp_ACCEPT (5 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_secAp_DROP (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_secAp_REJECT (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_secAp_forward (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 forwarding_secAp all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_secAp_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_vpn (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 | |
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 input_vpn all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_vpn_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_vpn_ACCEPT (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_vpn_DROP (2 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_vpn_REJECT (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_vpn_forward (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 forwarding_vpn all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_vpn_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_wan (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 | |
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 | |
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:698 | |
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 input_wan all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_wan_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_wan_ACCEPT (5 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_wan_DROP (2 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_wan_REJECT (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_wan_forward (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 forwarding_wan all -- * * 0.0.0.0/0 0.0.0.0/0 | |
0 0 zone_wan_DROP all -- * * 0.0.0.0/0 0.0.0.0/0 | |
-------------------------------------------------------------------- | |
IP NAT Filter Table: (iptables -t nat -nvL) | |
-------------------------------------------------------------------- | |
Chain PREROUTING (policy ACCEPT 1302 packets, 61002 bytes) | |
pkts bytes target prot opt in out source destination | |
1311 61542 prerouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0 | |
1302 61002 zone_lan_prerouting all -- br-plug * 0.0.0.0/0 0.0.0.0/0 | |
Chain INPUT (policy ACCEPT 1135 packets, 53318 bytes) | |
pkts bytes target prot opt in out source destination | |
Chain OUTPUT (policy ACCEPT 530 packets, 36006 bytes) | |
pkts bytes target prot opt in out source destination | |
Chain POSTROUTING (policy ACCEPT 530 packets, 36006 bytes) | |
pkts bytes target prot opt in out source destination | |
554 37638 postrouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0 | |
3 194 zone_lan_nat all -- * br-plug 0.0.0.0/0 0.0.0.0/0 | |
Chain postrouting_rule (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain prerouting_ap (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain prerouting_lan (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain prerouting_mesh (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain prerouting_rule (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain prerouting_secAp (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain prerouting_vpn (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain prerouting_wan (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_ap_nat (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_ap_prerouting (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 prerouting_ap all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_lan_nat (1 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_lan_prerouting (1 references) | |
pkts bytes target prot opt in out source destination | |
1302 61002 prerouting_lan all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_mesh_nat (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_mesh_prerouting (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 prerouting_mesh all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_secAp_nat (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_secAp_prerouting (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 prerouting_secAp all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_vpn_nat (0 references) | |
pkts bytes target prot opt in out source destination | |
Chain zone_vpn_prerouting (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 prerouting_vpn all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_wan_nat (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 | |
Chain zone_wan_prerouting (0 references) | |
pkts bytes target prot opt in out source destination | |
0 0 prerouting_wan all -- * * 0.0.0.0/0 0.0.0.0/0 | |
-------------------------------------------------------------------- | |
IP Routing Rules: (ip rule show) | |
-------------------------------------------------------------------- | |
0: from all lookup local | |
32766: from all lookup main | |
32767: from all lookup default | |
-------------------------------------------------------------------- | |
UCI Firewall Rules: (uci show firewall) | |
-------------------------------------------------------------------- | |
firewall.@defaults[0]=defaults | |
firewall.@defaults[0].syn_flood=1 | |
firewall.@defaults[0].input=DROP | |
firewall.@defaults[0].output=ACCEPT | |
firewall.@defaults[0].forward=DROP | |
firewall.@zone[0]=zone | |
firewall.@zone[0].name=lan | |
firewall.@zone[0].input=ACCEPT | |
firewall.@zone[0].output=ACCEPT | |
firewall.@zone[0].forward=DROP | |
firewall.@zone[0].network=plug | |
firewall.@zone[1]=zone | |
firewall.@zone[1].name=ap | |
firewall.@zone[1].input=ACCEPT | |
firewall.@zone[1].output=ACCEPT | |
firewall.@zone[1].forward=DROP | |
firewall.@zone[1].network=ap | |
firewall.@zone[2]=zone | |
firewall.@zone[2].name=secAp | |
firewall.@zone[2].input=ACCEPT | |
firewall.@zone[2].output=ACCEPT | |
firewall.@zone[2].forward=DROP | |
firewall.@zone[2].network=secAp | |
firewall.@zone[3]=zone | |
firewall.@zone[3].name=mesh | |
firewall.@zone[3].input=ACCEPT | |
firewall.@zone[3].output=ACCEPT | |
firewall.@zone[3].forward=DROP | |
firewall.@zone[3].network=mesh | |
firewall.@zone[4]=zone | |
firewall.@zone[4].name=wan | |
firewall.@zone[4].input=DROP | |
firewall.@zone[4].output=ACCEPT | |
firewall.@zone[4].forward=DROP | |
firewall.@zone[4].masq=1 | |
firewall.@zone[4].network=wan | |
firewall.@zone[5]=zone | |
firewall.@zone[5].name=vpn | |
firewall.@zone[5].input=DROP | |
firewall.@zone[5].output=ACCEPT | |
firewall.@zone[5].forward=DROP | |
firewall.@zone[5].network=vpn | |
firewall.@forwarding[0]=forwarding | |
firewall.@forwarding[0].src=ap | |
firewall.@forwarding[0].dest=mesh | |
firewall.@forwarding[1]=forwarding | |
firewall.@forwarding[1].src=ap | |
firewall.@forwarding[1].dest=ap | |
firewall.@forwarding[2]=forwarding | |
firewall.@forwarding[2].src=secAp | |
firewall.@forwarding[2].dest=mesh | |
firewall.@forwarding[3]=forwarding | |
firewall.@forwarding[3].src=secAp | |
firewall.@forwarding[3].dest=secAp | |
firewall.@forwarding[4]=forwarding | |
firewall.@forwarding[4].src=mesh | |
firewall.@forwarding[4].dest=mesh | |
firewall.@forwarding[5]=forwarding | |
firewall.@forwarding[5].src=lan | |
firewall.@forwarding[5].dest=lan | |
firewall.@forwarding[6]=forwarding | |
firewall.@forwarding[6].src=ap | |
firewall.@forwarding[6].dest=wan | |
firewall.@forwarding[7]=forwarding | |
firewall.@forwarding[7].src=secAp | |
firewall.@forwarding[7].dest=wan | |
firewall.@forwarding[8]=forwarding | |
firewall.@forwarding[8].src=mesh | |
firewall.@forwarding[8].dest=wan | |
firewall.@forwarding[9]=forwarding | |
firewall.@forwarding[9].src=lan | |
firewall.@forwarding[9].dest=mesh | |
firewall.@forwarding[10]=forwarding | |
firewall.@forwarding[10].src=lan | |
firewall.@forwarding[10].dest=wan | |
firewall.@forwarding[11]=forwarding | |
firewall.@forwarding[11].src=lan | |
firewall.@forwarding[11].dest=ap | |
firewall.@forwarding[12]=forwarding | |
firewall.@forwarding[12].src=ap | |
firewall.@forwarding[12].dest=lan | |
firewall.@forwarding[13]=forwarding | |
firewall.@forwarding[13].src=lan | |
firewall.@forwarding[13].dest=secAp | |
firewall.@forwarding[14]=forwarding | |
firewall.@forwarding[14].src=secAp | |
firewall.@forwarding[14].dest=lan | |
firewall.@forwarding[15]=forwarding | |
firewall.@forwarding[15].src=ap | |
firewall.@forwarding[15].dest=secAp | |
firewall.@forwarding[16]=forwarding | |
firewall.@forwarding[16].src=secAp | |
firewall.@forwarding[16].dest=ap | |
firewall.@rule[0]=rule | |
firewall.@rule[0].src=wan | |
firewall.@rule[0].dest_port=22 | |
firewall.@rule[0].target=ACCEPT | |
firewall.@rule[0].proto=tcp | |
firewall.@rule[1]=rule | |
firewall.@rule[1].src=mesh | |
firewall.@rule[1].dest_port=22 | |
firewall.@rule[1].target=ACCEPT | |
firewall.@rule[1].proto=tcp | |
firewall.@rule[2]=rule | |
firewall.@rule[2].src=lan | |
firewall.@rule[2].dest_port=22 | |
firewall.@rule[2].target=ACCEPT | |
firewall.@rule[2].proto=tcp | |
firewall.@rule[3]=rule | |
firewall.@rule[3].src=vpn | |
firewall.@rule[3].dest_port=22 | |
firewall.@rule[3].target=ACCEPT | |
firewall.@rule[3].proto=tcp | |
firewall.@rule[4]=rule | |
firewall.@rule[4].src=mesh | |
firewall.@rule[4].dest_port=53 | |
firewall.@rule[4].target=ACCEPT | |
firewall.@rule[4].proto=tcpudp | |
firewall.@rule[5]=rule | |
firewall.@rule[5].src=lan | |
firewall.@rule[5].dest_port=53 | |
firewall.@rule[5].target=ACCEPT | |
firewall.@rule[5].proto=tcpudp | |
firewall.@rule[6]=rule | |
firewall.@rule[6].src=ap | |
firewall.@rule[6].dest_port=53 | |
firewall.@rule[6].target=ACCEPT | |
firewall.@rule[6].proto=tcpudp | |
firewall.@rule[7]=rule | |
firewall.@rule[7].src=secAp | |
firewall.@rule[7].dest_port=53 | |
firewall.@rule[7].target=ACCEPT | |
firewall.@rule[7].proto=tcpudp | |
firewall.@rule[8]=rule | |
firewall.@rule[8].src=lan | |
firewall.@rule[8].dest_port=80 | |
firewall.@rule[8].target=ACCEPT | |
firewall.@rule[8].proto=tcp | |
firewall.@rule[9]=rule | |
firewall.@rule[9].src=wan | |
firewall.@rule[9].dest_port=80 | |
firewall.@rule[9].target=ACCEPT | |
firewall.@rule[9].proto=tcp | |
firewall.@rule[10]=rule | |
firewall.@rule[10].src=ap | |
firewall.@rule[10].dest_port=80 | |
firewall.@rule[10].target=ACCEPT | |
firewall.@rule[10].proto=tcp | |
firewall.@rule[11]=rule | |
firewall.@rule[11].src=secAp | |
firewall.@rule[11].dest_port=80 | |
firewall.@rule[11].target=ACCEPT | |
firewall.@rule[11].proto=tcp | |
firewall.@rule[12]=rule | |
firewall.@rule[12].src=vpn | |
firewall.@rule[12].dest_port=80 | |
firewall.@rule[12].target=ACCEPT | |
firewall.@rule[12].proto=tcp | |
firewall.@rule[13]=rule | |
firewall.@rule[13].src=ap | |
firewall.@rule[13].dest_port=443 | |
firewall.@rule[13].target=ACCEPT | |
firewall.@rule[13].proto=tcp | |
firewall.@rule[14]=rule | |
firewall.@rule[14].src=secAp | |
firewall.@rule[14].dest_port=443 | |
firewall.@rule[14].target=ACCEPT | |
firewall.@rule[14].proto=tcp | |
firewall.@rule[15]=rule | |
firewall.@rule[15].src=lan | |
firewall.@rule[15].dest_port=443 | |
firewall.@rule[15].target=ACCEPT | |
firewall.@rule[15].proto=tcp | |
firewall.@rule[16]=rule | |
firewall.@rule[16].src=vpn | |
firewall.@rule[16].dest_port=443 | |
firewall.@rule[16].target=ACCEPT | |
firewall.@rule[16].proto=tcp | |
firewall.@rule[17]=rule | |
firewall.@rule[17].src=ap | |
firewall.@rule[17].dest_port=22 | |
firewall.@rule[17].target=ACCEPT | |
firewall.@rule[17].proto=tcp | |
firewall.@rule[18]=rule | |
firewall.@rule[18].src=secAp | |
firewall.@rule[18].dest_port=22 | |
firewall.@rule[18].target=ACCEPT | |
firewall.@rule[18].proto=tcp | |
firewall.@rule[19]=rule | |
firewall.@rule[19].src=ap | |
firewall.@rule[19].dest_port=8082 | |
firewall.@rule[19].target=ACCEPT | |
firewall.@rule[19].proto=tcp | |
firewall.@rule[20]=rule | |
firewall.@rule[20].src=secAp | |
firewall.@rule[20].dest_port=8082 | |
firewall.@rule[20].target=ACCEPT | |
firewall.@rule[20].proto=tcp | |
firewall.@rule[21]=rule | |
firewall.@rule[21].src=lan | |
firewall.@rule[21].dest_port=8082 | |
firewall.@rule[21].target=ACCEPT | |
firewall.@rule[21].proto=tcp | |
firewall.@rule[22]=rule | |
firewall.@rule[22].src=mesh | |
firewall.@rule[22].dest_port=698 | |
firewall.@rule[22].target=ACCEPT | |
firewall.@rule[22].proto=udp | |
firewall.@rule[23]=rule | |
firewall.@rule[23].src=wan | |
firewall.@rule[23].dest_port=698 | |
firewall.@rule[23].target=ACCEPT | |
firewall.@rule[23].proto=udp | |
firewall.@rule[24]=rule | |
firewall.@rule[24].src=lan | |
firewall.@rule[24].dest_port=698 | |
firewall.@rule[24].target=ACCEPT | |
firewall.@rule[24].proto=udp | |
firewall.@rule[25]=rule | |
firewall.@rule[25].src=mesh | |
firewall.@rule[25].proto=icmp | |
firewall.@rule[25].target=ACCEPT | |
firewall.@rule[26]=rule | |
firewall.@rule[26].src=lan | |
firewall.@rule[26].proto=icmp | |
firewall.@rule[26].target=ACCEPT | |
firewall.@rule[27]=rule | |
firewall.@rule[27].src=wan | |
firewall.@rule[27].proto=icmp | |
firewall.@rule[27].target=ACCEPT | |
firewall.@rule[28]=rule | |
firewall.@rule[28].src=ap | |
firewall.@rule[28].proto=icmp | |
firewall.@rule[28].target=ACCEPT | |
firewall.@rule[29]=rule | |
firewall.@rule[29].src=secAp | |
firewall.@rule[29].proto=icmp | |
firewall.@rule[29].target=ACCEPT | |
firewall.@rule[30]=rule | |
firewall.@rule[30].src=vpn | |
firewall.@rule[30].proto=icmp | |
firewall.@rule[30].target=ACCEPT | |
firewall.@include[0]=include | |
firewall.@include[0].path=/etc/firewall.freifunk | |
-------------------------------------------------------------------- | |
UCI Firewall Current State: (uci show -p /var/state firewall) | |
-------------------------------------------------------------------- | |
firewall.@defaults[0]=defaults | |
firewall.@defaults[0].syn_flood=1 | |
firewall.@defaults[0].input=DROP | |
firewall.@defaults[0].output=ACCEPT | |
firewall.@defaults[0].forward=DROP | |
firewall.@zone[0]=zone | |
firewall.@zone[0].name=lan | |
firewall.@zone[0].input=ACCEPT | |
firewall.@zone[0].output=ACCEPT | |
firewall.@zone[0].forward=DROP | |
firewall.@zone[0].network=plug | |
firewall.@zone[1]=zone | |
firewall.@zone[1].name=ap | |
firewall.@zone[1].input=ACCEPT | |
firewall.@zone[1].output=ACCEPT | |
firewall.@zone[1].forward=DROP | |
firewall.@zone[1].network=ap | |
firewall.@zone[2]=zone | |
firewall.@zone[2].name=secAp | |
firewall.@zone[2].input=ACCEPT | |
firewall.@zone[2].output=ACCEPT | |
firewall.@zone[2].forward=DROP | |
firewall.@zone[2].network=secAp | |
firewall.@zone[3]=zone | |
firewall.@zone[3].name=mesh | |
firewall.@zone[3].input=ACCEPT | |
firewall.@zone[3].output=ACCEPT | |
firewall.@zone[3].forward=DROP | |
firewall.@zone[3].network=mesh | |
firewall.@zone[4]=zone | |
firewall.@zone[4].name=wan | |
firewall.@zone[4].input=DROP | |
firewall.@zone[4].output=ACCEPT | |
firewall.@zone[4].forward=DROP | |
firewall.@zone[4].masq=1 | |
firewall.@zone[4].network=wan | |
firewall.@zone[5]=zone | |
firewall.@zone[5].name=vpn | |
firewall.@zone[5].input=DROP | |
firewall.@zone[5].output=ACCEPT | |
firewall.@zone[5].forward=DROP | |
firewall.@zone[5].network=vpn | |
firewall.@forwarding[0]=forwarding | |
firewall.@forwarding[0].src=ap | |
firewall.@forwarding[0].dest=mesh | |
firewall.@forwarding[1]=forwarding | |
firewall.@forwarding[1].src=ap | |
firewall.@forwarding[1].dest=ap | |
firewall.@forwarding[2]=forwarding | |
firewall.@forwarding[2].src=secAp | |
firewall.@forwarding[2].dest=mesh | |
firewall.@forwarding[3]=forwarding | |
firewall.@forwarding[3].src=secAp | |
firewall.@forwarding[3].dest=secAp | |
firewall.@forwarding[4]=forwarding | |
firewall.@forwarding[4].src=mesh | |
firewall.@forwarding[4].dest=mesh | |
firewall.@forwarding[5]=forwarding | |
firewall.@forwarding[5].src=lan | |
firewall.@forwarding[5].dest=lan | |
firewall.@forwarding[6]=forwarding | |
firewall.@forwarding[6].src=ap | |
firewall.@forwarding[6].dest=wan | |
firewall.@forwarding[7]=forwarding | |
firewall.@forwarding[7].src=secAp | |
firewall.@forwarding[7].dest=wan | |
firewall.@forwarding[8]=forwarding | |
firewall.@forwarding[8].src=mesh | |
firewall.@forwarding[8].dest=wan | |
firewall.@forwarding[9]=forwarding | |
firewall.@forwarding[9].src=lan | |
firewall.@forwarding[9].dest=mesh | |
firewall.@forwarding[10]=forwarding | |
firewall.@forwarding[10].src=lan | |
firewall.@forwarding[10].dest=wan | |
firewall.@forwarding[11]=forwarding | |
firewall.@forwarding[11].src=lan | |
firewall.@forwarding[11].dest=ap | |
firewall.@forwarding[12]=forwarding | |
firewall.@forwarding[12].src=ap | |
firewall.@forwarding[12].dest=lan | |
firewall.@forwarding[13]=forwarding | |
firewall.@forwarding[13].src=lan | |
firewall.@forwarding[13].dest=secAp | |
firewall.@forwarding[14]=forwarding | |
firewall.@forwarding[14].src=secAp | |
firewall.@forwarding[14].dest=lan | |
firewall.@forwarding[15]=forwarding | |
firewall.@forwarding[15].src=ap | |
firewall.@forwarding[15].dest=secAp | |
firewall.@forwarding[16]=forwarding | |
firewall.@forwarding[16].src=secAp | |
firewall.@forwarding[16].dest=ap | |
firewall.@rule[0]=rule | |
firewall.@rule[0].src=wan | |
firewall.@rule[0].dest_port=22 | |
firewall.@rule[0].target=ACCEPT | |
firewall.@rule[0].proto=tcp | |
firewall.@rule[1]=rule | |
firewall.@rule[1].src=mesh | |
firewall.@rule[1].dest_port=22 | |
firewall.@rule[1].target=ACCEPT | |
firewall.@rule[1].proto=tcp | |
firewall.@rule[2]=rule | |
firewall.@rule[2].src=lan | |
firewall.@rule[2].dest_port=22 | |
firewall.@rule[2].target=ACCEPT | |
firewall.@rule[2].proto=tcp | |
firewall.@rule[3]=rule | |
firewall.@rule[3].src=vpn | |
firewall.@rule[3].dest_port=22 | |
firewall.@rule[3].target=ACCEPT | |
firewall.@rule[3].proto=tcp | |
firewall.@rule[4]=rule | |
firewall.@rule[4].src=mesh | |
firewall.@rule[4].dest_port=53 | |
firewall.@rule[4].target=ACCEPT | |
firewall.@rule[4].proto=tcpudp | |
firewall.@rule[5]=rule | |
firewall.@rule[5].src=lan | |
firewall.@rule[5].dest_port=53 | |
firewall.@rule[5].target=ACCEPT | |
firewall.@rule[5].proto=tcpudp | |
firewall.@rule[6]=rule | |
firewall.@rule[6].src=ap | |
firewall.@rule[6].dest_port=53 | |
firewall.@rule[6].target=ACCEPT | |
firewall.@rule[6].proto=tcpudp | |
firewall.@rule[7]=rule | |
firewall.@rule[7].src=secAp | |
firewall.@rule[7].dest_port=53 | |
firewall.@rule[7].target=ACCEPT | |
firewall.@rule[7].proto=tcpudp | |
firewall.@rule[8]=rule | |
firewall.@rule[8].src=lan | |
firewall.@rule[8].dest_port=80 | |
firewall.@rule[8].target=ACCEPT | |
firewall.@rule[8].proto=tcp | |
firewall.@rule[9]=rule | |
firewall.@rule[9].src=wan | |
firewall.@rule[9].dest_port=80 | |
firewall.@rule[9].target=ACCEPT | |
firewall.@rule[9].proto=tcp | |
firewall.@rule[10]=rule | |
firewall.@rule[10].src=ap | |
firewall.@rule[10].dest_port=80 | |
firewall.@rule[10].target=ACCEPT | |
firewall.@rule[10].proto=tcp | |
firewall.@rule[11]=rule | |
firewall.@rule[11].src=secAp | |
firewall.@rule[11].dest_port=80 | |
firewall.@rule[11].target=ACCEPT | |
firewall.@rule[11].proto=tcp | |
firewall.@rule[12]=rule | |
firewall.@rule[12].src=vpn | |
firewall.@rule[12].dest_port=80 | |
firewall.@rule[12].target=ACCEPT | |
firewall.@rule[12].proto=tcp | |
firewall.@rule[13]=rule | |
firewall.@rule[13].src=ap | |
firewall.@rule[13].dest_port=443 | |
firewall.@rule[13].target=ACCEPT | |
firewall.@rule[13].proto=tcp | |
firewall.@rule[14]=rule | |
firewall.@rule[14].src=secAp | |
firewall.@rule[14].dest_port=443 | |
firewall.@rule[14].target=ACCEPT | |
firewall.@rule[14].proto=tcp | |
firewall.@rule[15]=rule | |
firewall.@rule[15].src=lan | |
firewall.@rule[15].dest_port=443 | |
firewall.@rule[15].target=ACCEPT | |
firewall.@rule[15].proto=tcp | |
firewall.@rule[16]=rule | |
firewall.@rule[16].src=vpn | |
firewall.@rule[16].dest_port=443 | |
firewall.@rule[16].target=ACCEPT | |
firewall.@rule[16].proto=tcp | |
firewall.@rule[17]=rule | |
firewall.@rule[17].src=ap | |
firewall.@rule[17].dest_port=22 | |
firewall.@rule[17].target=ACCEPT | |
firewall.@rule[17].proto=tcp | |
firewall.@rule[18]=rule | |
firewall.@rule[18].src=secAp | |
firewall.@rule[18].dest_port=22 | |
firewall.@rule[18].target=ACCEPT | |
firewall.@rule[18].proto=tcp | |
firewall.@rule[19]=rule | |
firewall.@rule[19].src=ap | |
firewall.@rule[19].dest_port=8082 | |
firewall.@rule[19].target=ACCEPT | |
firewall.@rule[19].proto=tcp | |
firewall.@rule[20]=rule | |
firewall.@rule[20].src=secAp | |
firewall.@rule[20].dest_port=8082 | |
firewall.@rule[20].target=ACCEPT | |
firewall.@rule[20].proto=tcp | |
firewall.@rule[21]=rule | |
firewall.@rule[21].src=lan | |
firewall.@rule[21].dest_port=8082 | |
firewall.@rule[21].target=ACCEPT | |
firewall.@rule[21].proto=tcp | |
firewall.@rule[22]=rule | |
firewall.@rule[22].src=mesh | |
firewall.@rule[22].dest_port=698 | |
firewall.@rule[22].target=ACCEPT | |
firewall.@rule[22].proto=udp | |
firewall.@rule[23]=rule | |
firewall.@rule[23].src=wan | |
firewall.@rule[23].dest_port=698 | |
firewall.@rule[23].target=ACCEPT | |
firewall.@rule[23].proto=udp | |
firewall.@rule[24]=rule | |
firewall.@rule[24].src=lan | |
firewall.@rule[24].dest_port=698 | |
firewall.@rule[24].target=ACCEPT | |
firewall.@rule[24].proto=udp | |
firewall.@rule[25]=rule | |
firewall.@rule[25].src=mesh | |
firewall.@rule[25].proto=icmp | |
firewall.@rule[25].target=ACCEPT | |
firewall.@rule[26]=rule | |
firewall.@rule[26].src=lan | |
firewall.@rule[26].proto=icmp | |
firewall.@rule[26].target=ACCEPT | |
firewall.@rule[27]=rule | |
firewall.@rule[27].src=wan | |
firewall.@rule[27].proto=icmp | |
firewall.@rule[27].target=ACCEPT | |
firewall.@rule[28]=rule | |
firewall.@rule[28].src=ap | |
firewall.@rule[28].proto=icmp | |
firewall.@rule[28].target=ACCEPT | |
firewall.@rule[29]=rule | |
firewall.@rule[29].src=secAp | |
firewall.@rule[29].proto=icmp | |
firewall.@rule[29].target=ACCEPT | |
firewall.@rule[30]=rule | |
firewall.@rule[30].src=vpn | |
firewall.@rule[30].proto=icmp | |
firewall.@rule[30].target=ACCEPT | |
firewall.@include[0]=include | |
firewall.@include[0].path=/etc/firewall.freifunk | |
firewall.core=firewall_state | |
firewall.core.lan_ipv4=1 | |
firewall.core.lan_ipv6=1 | |
firewall.core.ap_ipv4=1 | |
firewall.core.ap_ipv6=1 | |
firewall.core.secAp_ipv4=1 | |
firewall.core.secAp_ipv6=1 | |
firewall.core.mesh_ipv4=1 | |
firewall.core.mesh_ipv6=1 | |
firewall.core.wan_ipv4=1 | |
firewall.core.wan_ipv6=1 | |
firewall.core.vpn_ipv4=1 | |
firewall.core.vpn_ipv6=1 | |
firewall.core.lan_networks=plug | |
firewall.core.plug_zone=lan | |
firewall.core.plug_ifname=br-plug | |
firewall.core.zones=lan ap secAp mesh wan vpn | |
firewall.core.loaded=1 | |
-------------------------------------------------------------------- | |
UCI Splash Info:(uci show luci_splash) | |
-------------------------------------------------------------------- | |
-------------------------------------------------------------------- | |
UCI Splash Current State:(uci show -p /var/state luci_splash) | |
-------------------------------------------------------------------- | |
-------------------------------------------------------------------- | |
Kernel Buffer Log: (dmesg) | |
-------------------------------------------------------------------- | |
[ 0.000000] Linux version 3.3.8 (jenkins@ashida) (gcc version 4.6.3 20120201 (prerelease) (Linaro GCC 4.6-2012.02) ) #1 Wed Sep 25 15:05:48 EDT 2013 | |
[ 0.000000] MyLoader: sysp=b3a3d853, boardp=492118fc, parts=f35d1cdf | |
[ 0.000000] bootconsole [early0] enabled | |
[ 0.000000] CPU revision is: 0001974c (MIPS 74Kc) | |
[ 0.000000] SoC: Atheros AR9344 rev 2 | |
[ 0.000000] Clocks: CPU:560.000MHz, DDR:450.000MHz, AHB:225.000MHz, Ref:40.000MHz | |
[ 0.000000] Determined physical RAM map: | |
[ 0.000000] memory: 08000000 @ 00000000 (usable) | |
[ 0.000000] Initrd not found or empty - disabling initrd | |
[ 0.000000] Zone PFN ranges: | |
[ 0.000000] Normal 0x00000000 -> 0x00008000 | |
[ 0.000000] Movable zone start PFN for each node | |
[ 0.000000] Early memory PFN ranges | |
[ 0.000000] 0: 0x00000000 -> 0x00008000 | |
[ 0.000000] On node 0 totalpages: 32768 | |
[ 0.000000] free_area_init_node: node 0, pgdat 802da1f0, node_mem_map 81000000 | |
[ 0.000000] Normal zone: 256 pages used for memmap | |
[ 0.000000] Normal zone: 0 pages reserved | |
[ 0.000000] Normal zone: 32512 pages, LIFO batch:7 | |
[ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768 | |
[ 0.000000] pcpu-alloc: [0] 0 | |
[ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512 | |
[ 0.000000] Kernel command line: board=TL-WDR4300 console=ttyS0,115200 rootfstype=squashfs,jffs2 noinitrd | |
[ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes) | |
[ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes) | |
[ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes) | |
[ 0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes. | |
[ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes | |
[ 0.000000] Writing ErrCtl register=00000000 | |
[ 0.000000] Readback ErrCtl register=00000000 | |
[ 0.000000] Memory: 126560k/131072k available (2134k kernel code, 4512k reserved, 403k data, 208k init, 0k highmem) | |
[ 0.000000] SLUB: Genslabs=9, HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 | |
[ 0.000000] NR_IRQS:51 | |
[ 0.000000] Calibrating delay loop... 278.93 BogoMIPS (lpj=1394688) | |
[ 0.070000] pid_max: default: 32768 minimum: 301 | |
[ 0.070000] Mount-cache hash table entries: 512 | |
[ 0.080000] NET: Registered protocol family 16 | |
[ 0.080000] gpiochip_add: registered GPIOs 0 to 22 on device: ath79 | |
[ 0.090000] MIPS: machine is TP-LINK TL-WDR3600/4300/4310 | |
[ 0.090000] registering PCI controller with io_map_base unset | |
[ 0.310000] bio: create slab <bio-0> at 0 | |
[ 0.310000] PCI host bridge to bus 0000:00 | |
[ 0.320000] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff] | |
[ 0.320000] pci_bus 0000:00: root bus resource [io 0x0000] | |
[ 0.330000] pci 0000:00:00.0: [168c:0033] type 0 class 0x000280 | |
[ 0.330000] pci 0000:00:00.0: invalid calibration data | |
[ 0.330000] pci 0000:00:00.0: reg 10: [mem 0x00000000-0x0001ffff 64bit] | |
[ 0.330000] pci 0000:00:00.0: reg 30: [mem 0x00000000-0x0000ffff pref] | |
[ 0.330000] pci 0000:00:00.0: supports D1 | |
[ 0.330000] pci 0000:00:00.0: PME# supported from D0 D1 D3hot | |
[ 0.330000] pci 0000:00:00.0: BAR 0: assigned [mem 0x10000000-0x1001ffff 64bit] | |
[ 0.340000] pci 0000:00:00.0: BAR 6: assigned [mem 0x10020000-0x1002ffff pref] | |
[ 0.340000] pci 0000:00:00.0: using irq 40 for pin 1 | |
[ 0.350000] Switching to clocksource MIPS | |
[ 0.350000] NET: Registered protocol family 2 | |
[ 0.360000] IP route cache hash table entries: 1024 (order: 0, 4096 bytes) | |
[ 0.360000] TCP established hash table entries: 4096 (order: 3, 32768 bytes) | |
[ 0.370000] TCP bind hash table entries: 4096 (order: 2, 16384 bytes) | |
[ 0.370000] TCP: Hash tables configured (established 4096 bind 4096) | |
[ 0.380000] TCP reno registered | |
[ 0.380000] UDP hash table entries: 256 (order: 0, 4096 bytes) | |
[ 0.390000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes) | |
[ 0.390000] NET: Registered protocol family 1 | |
[ 0.400000] PCI: CLS 0 bytes, default 32 | |
[ 0.410000] squashfs: version 4.0 (2009/01/31) Phillip Lougher | |
[ 0.420000] JFFS2 version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc. | |
[ 0.430000] msgmni has been set to 247 | |
[ 0.430000] io scheduler noop registered | |
[ 0.440000] io scheduler deadline registered (default) | |
[ 0.440000] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled | |
[ 0.470000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11) is a 16550A | |
[ 0.470000] console [ttyS0] enabled, bootconsole disabled | |
[ 0.490000] m25p80 spi0.0: found en25q64, expected m25p80 | |
[ 0.490000] m25p80 spi0.0: en25q64 (8192 Kbytes) | |
[ 0.500000] 5 tp-link partitions found on MTD device spi0.0 | |
[ 0.500000] Creating 5 MTD partitions on "spi0.0": | |
[ 0.510000] 0x000000000000-0x000000020000 : "u-boot" | |
[ 0.520000] 0x000000020000-0x0000001035f4 : "kernel" | |
[ 0.520000] mtd: partition "kernel" must either start or end on erase block boundary or be smaller than an erase block -- forcing read-only | |
[ 0.540000] 0x0000001035f4-0x0000007f0000 : "rootfs" | |
[ 0.540000] mtd: partition "rootfs" must either start or end on erase block boundary or be smaller than an erase block -- forcing read-only | |
[ 0.550000] mtd: partition "rootfs" set to be root filesystem | |
[ 0.560000] mtd: partition "rootfs_data" created automatically, ofs=660000, len=190000 | |
[ 0.570000] 0x000000660000-0x0000007f0000 : "rootfs_data" | |
[ 0.580000] 0x0000007f0000-0x000000800000 : "art" | |
[ 0.580000] 0x000000020000-0x0000007f0000 : "firmware" | |
[ 0.720000] ag71xx_mdio: probed | |
[ 0.720000] eth0: Atheros AG71xx at 0xb9000000, irq 4 | |
[ 1.300000] eth0: Atheros AR8327 switch driver attached. | |
[ 2.460000] ag71xx ag71xx.0: eth0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd033, driver=Atheros AR8216/AR8236/AR8316] | |
[ 2.480000] TCP cubic registered | |
[ 2.480000] NET: Registered protocol family 17 | |
[ 2.480000] 8021q: 802.1Q VLAN Support v1.8 | |
[ 2.490000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2. | |
[ 2.500000] Freeing unused kernel memory: 208k freed | |
[ 4.390000] Registered led device: tp-link:blue:qss | |
[ 4.390000] Registered led device: tp-link:blue:system | |
[ 4.390000] Registered led device: tp-link:green:usb1 | |
[ 4.390000] Registered led device: tp-link:green:usb2 | |
[ 4.390000] Registered led device: tp-link:blue:wlan2g | |
[ 5.470000] eth0: link up (1000Mbps/Full duplex) | |
[ 7.750000] JFFS2 notice: (472) jffs2_build_xattr_subsystem: complete building xattr subsystem, 1 of xdatum (1 unchecked, 0 orphan) and 25 of xref (0 dead, 0 orphan) found. | |
[ 7.840000] eth0: link down | |
[ 9.650000] Compat-drivers backport release: compat-drivers-2013-01-21-1 | |
[ 9.650000] Backport based on wireless-testing.git master-2013-02-22 | |
[ 9.660000] compat.git: wireless-testing.git | |
[ 9.790000] cfg80211: Calling CRDA to update world regulatory domain | |
[ 9.800000] cfg80211: World regulatory domain updated: | |
[ 9.800000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) | |
[ 9.810000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) | |
[ 9.820000] cfg80211: (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) | |
[ 9.830000] cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) | |
[ 9.840000] cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) | |
[ 9.840000] cfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) | |
[ 10.370000] NET: Registered protocol family 10 | |
[ 10.700000] SCSI subsystem initialized | |
[ 10.850000] usbcore: registered new interface driver usbfs | |
[ 10.850000] usbcore: registered new interface driver hub | |
[ 10.860000] usbcore: registered new device driver usb | |
[ 11.350000] ath: EEPROM regdomain: 0x0 | |
[ 11.350000] ath: EEPROM indicates default country code should be used | |
[ 11.350000] ath: doing EEPROM country->regdmn map search | |
[ 11.350000] ath: country maps to regdmn code: 0x3a | |
[ 11.350000] ath: Country alpha2 being used: US | |
[ 11.350000] ath: Regpair used: 0x3a | |
[ 11.360000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht' | |
[ 11.360000] Registered led device: ath9k-phy0 | |
[ 11.360000] ieee80211 phy0: Atheros AR9340 Rev:0 mem=0xb8100000, irq=47 | |
[ 11.370000] PCI: Enabling device 0000:00:00.0 (0000 -> 0002) | |
[ 11.380000] ath: EEPROM regdomain: 0x0 | |
[ 11.380000] ath: EEPROM indicates default country code should be used | |
[ 11.380000] ath: doing EEPROM country->regdmn map search | |
[ 11.380000] ath: country maps to regdmn code: 0x3a | |
[ 11.380000] ath: Country alpha2 being used: US | |
[ 11.380000] ath: Regpair used: 0x3a | |
[ 11.380000] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht' | |
[ 11.390000] Registered led device: ath9k-phy1 | |
[ 11.390000] ieee80211 phy1: Atheros AR9300 Rev:4 mem=0xb0000000, irq=40 | |
[ 11.400000] cfg80211: Calling CRDA for country: US | |
[ 11.540000] cfg80211: Regulatory domain changed to country: US | |
[ 11.550000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) | |
[ 11.560000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2700 mBm) | |
[ 11.570000] cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 1700 mBm) | |
[ 11.570000] cfg80211: (5250000 KHz - 5330000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) | |
[ 11.580000] cfg80211: (5490000 KHz - 5600000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) | |
[ 11.590000] cfg80211: (5650000 KHz - 5710000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) | |
[ 11.600000] cfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 3000 mBm) | |
[ 11.690000] PPP generic driver version 2.4.2 | |
[ 11.800000] tun: Universal TUN/TAP device driver, 1.6 | |
[ 11.810000] tun: (C) 1999-2004 Max Krasnyansky <[email protected]> | |
[ 11.900000] IPv4 over IPv4 tunneling driver | |
[ 12.020000] ip_tables: (C) 2000-2006 Netfilter Core Team | |
[ 12.200000] NET: Registered protocol family 24 | |
[ 12.370000] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver | |
[ 12.380000] ehci-platform ehci-platform: Generic Platform EHCI Controller | |
[ 12.390000] ehci-platform ehci-platform: new USB bus registered, assigned bus number 1 | |
[ 12.430000] ehci-platform ehci-platform: irq 3, io mem 0x1b000000 | |
[ 12.450000] ehci-platform ehci-platform: USB 2.0 started, EHCI 1.00 | |
[ 12.450000] hub 1-0:1.0: USB hub found | |
[ 12.460000] hub 1-0:1.0: 1 port detected | |
[ 12.480000] nf_conntrack version 0.5.0 (1980 buckets, 7920 max) | |
[ 12.850000] usb 1-1: new high-speed USB device number 2 using ehci-platform | |
[ 13.120000] hub 1-1:1.0: USB hub found | |
[ 13.120000] hub 1-1:1.0: 4 ports detected | |
[ 13.160000] xt_time: kernel timezone is -0000 | |
[ 13.540000] ip6_tables: (C) 2000-2006 Netfilter Core Team | |
[ 13.840000] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver | |
[ 14.040000] Initializing USB Mass Storage driver... | |
[ 14.040000] usbcore: registered new interface driver usb-storage | |
[ 14.050000] USB Mass Storage support registered. | |
[ 18.150000] ADDRCONF(NETDEV_UP): eth0: link is not ready | |
[ 18.170000] device eth0 entered promiscuous mode | |
[ 18.170000] ADDRCONF(NETDEV_UP): br-plug: link is not ready | |
[ 20.050000] eth0: link up (1000Mbps/Full duplex) | |
[ 20.080000] br-plug: port 1(eth0) entered forwarding state | |
[ 20.080000] br-plug: port 1(eth0) entered forwarding state | |
[ 20.090000] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready | |
[ 20.090000] ADDRCONF(NETDEV_CHANGE): br-plug: link becomes ready | |
[ 22.080000] br-plug: port 1(eth0) entered forwarding state | |
[ 25.170000] ADDRCONF(NETDEV_UP): wlan0: link is not ready | |
[ 25.190000] device wlan0 entered promiscuous mode | |
[ 25.210000] ADDRCONF(NETDEV_UP): wlan0: link is not ready | |
[ 25.420000] br-plug: port 2(wlan0) entered forwarding state | |
[ 25.430000] br-plug: port 2(wlan0) entered forwarding state | |
[ 25.430000] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready | |
[ 27.430000] br-plug: port 2(wlan0) entered forwarding state | |
[ 29.520000] ADDRCONF(NETDEV_UP): wlan1: link is not ready | |
[ 29.540000] device wlan1 entered promiscuous mode | |
[ 29.560000] ADDRCONF(NETDEV_UP): wlan1: link is not ready | |
[ 29.560000] device wlan1 left promiscuous mode | |
[ 29.570000] br-plug: port 3(wlan1) entered disabled state | |
[187641.200000] br-plug: port 2(wlan0) entered disabled state | |
[187641.210000] br-plug: port 1(eth0) entered disabled state | |
[187641.240000] device eth0 left promiscuous mode | |
[187641.240000] br-plug: port 1(eth0) entered disabled state | |
[187641.250000] eth0: link down | |
[187641.300000] device wlan0 left promiscuous mode | |
[187641.300000] br-plug: port 2(wlan0) entered disabled state | |
[187641.330000] ADDRCONF(NETDEV_UP): eth0: link is not ready | |
[187641.330000] device eth0 entered promiscuous mode | |
[187641.390000] device wlan0 entered promiscuous mode | |
[187641.450000] br-plug: port 2(wlan0) entered forwarding state | |
[187641.450000] br-plug: port 2(wlan0) entered forwarding state | |
[187641.510000] device wlan0 left promiscuous mode | |
[187641.520000] br-plug: port 2(wlan0) entered disabled state | |
[187642.800000] eth0: link up (1000Mbps/Full duplex) | |
[187642.830000] br-plug: port 1(eth0) entered forwarding state | |
[187642.830000] br-plug: port 1(eth0) entered forwarding state | |
[187642.840000] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready | |
[187644.500000] ADDRCONF(NETDEV_UP): wlan0: link is not ready | |
[187644.560000] device wlan0 entered promiscuous mode | |
[187644.640000] ADDRCONF(NETDEV_UP): wlan0: link is not ready | |
[187644.830000] br-plug: port 1(eth0) entered forwarding state | |
[187645.070000] br-plug: port 2(wlan0) entered forwarding state | |
[187645.070000] br-plug: port 2(wlan0) entered forwarding state | |
[187645.080000] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready | |
[187647.070000] br-plug: port 2(wlan0) entered forwarding state | |
[187649.490000] ADDRCONF(NETDEV_UP): wlan1: link is not ready | |
[187649.510000] device wlan1 entered promiscuous mode | |
[187649.530000] ADDRCONF(NETDEV_UP): wlan1: link is not ready | |
[187649.530000] device wlan1 left promiscuous mode | |
[187649.540000] br-plug: port 3(wlan1) entered disabled state | |
[187795.230000] ADDRCONF(NETDEV_UP): tmp.wlan1: link is not ready | |
-------------------------------------------------------------------- | |
Device Logs: (logread) | |
-------------------------------------------------------------------- | |
Sep 10 19:38:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27363 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:39:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27376 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:39:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27377 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:40:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27390 cmd /usr/sbin/commotion-service-parser | |
Sep 10 19:40:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27391 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:40:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27392 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:41:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27422 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:41:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27423 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:42:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27436 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:42:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27439 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:43:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27451 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:43:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27452 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 IEEE 802.11: authenticated | |
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 IEEE 802.11: associated (aid 1) | |
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 RADIUS: starting accounting session 4E68E2D0-0000000B | |
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 WPA: pairwise key handshake completed (RSN) | |
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPDISCOVER(br-plug) 102.138.148.2 6c:88:14:49:67:b0 | |
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPOFFER(br-plug) 102.138.148.2 6c:88:14:49:67:b0 | |
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPREQUEST(br-plug) 102.138.148.2 6c:88:14:49:67:b0 | |
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPACK(br-plug) 102.138.148.2 6c:88:14:49:67:b0 the-gibson | |
Sep 10 19:44:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27465 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:44:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27466 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:44:16 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 WPA: group key handshake completed (RSN) | |
Sep 10 19:45:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27479 cmd /usr/sbin/commotion-service-parser | |
Sep 10 19:45:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27480 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:45:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27481 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:46:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27511 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:46:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27512 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:47:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27530 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:47:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27531 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:48:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27567 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:48:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27568 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:49:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27617 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:49:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27618 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:50:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27691 cmd /usr/sbin/commotion-service-parser | |
Sep 10 19:50:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27692 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:50:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27693 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:51:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27789 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:51:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27790 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:51:11 hacklab023254291092 daemon.notice netifd: Interface 'cfg044d8f' is now down | |
Sep 10 19:51:11 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for 192.168.1.20 on br-plug. | |
Sep 10 19:51:11 hacklab023254291092 daemon.info avahi-daemon[2177]: Leaving mDNS multicast group on interface br-plug.IPv4 with address 192.168.1.20. | |
Sep 10 19:51:11 hacklab023254291092 daemon.info avahi-daemon[2177]: Joining mDNS multicast group on interface br-plug.IPv4 with address 102.138.148.1. | |
Sep 10 19:51:11 hacklab023254291092 daemon.info dnsmasq[1810]: reading /tmp/resolv.conf.auto | |
Sep 10 19:51:11 hacklab023254291092 daemon.info dnsmasq[1810]: using nameserver 8.8.8.8#53 | |
Sep 10 19:51:11 hacklab023254291092 daemon.info dnsmasq[1810]: using local addresses only for domain mesh.local | |
Sep 10 19:51:12 hacklab023254291092 daemon.notice netifd: Interface 'plug' is now down | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.200000] br-plug: port 2(wlan0) entered disabled state | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.210000] br-plug: port 1(eth0) entered disabled state | |
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for 102.138.148.1 on br-plug. | |
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Leaving mDNS multicast group on interface br-plug.IPv4 with address 102.138.148.1. | |
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Interface br-plug.IPv4 no longer relevant for mDNS. | |
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for fe80::a2f3:c1ff:fef8:8a94 on br-plug. | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.240000] device eth0 left promiscuous mode | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.240000] br-plug: port 1(eth0) entered disabled state | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.250000] eth0: link down | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.300000] device wlan0 left promiscuous mode | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.300000] br-plug: port 2(wlan0) entered disabled state | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.330000] ADDRCONF(NETDEV_UP): eth0: link is not ready | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.330000] device eth0 entered promiscuous mode | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.390000] device wlan0 entered promiscuous mode | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.450000] br-plug: port 2(wlan0) entered forwarding state | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.450000] br-plug: port 2(wlan0) entered forwarding state | |
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Joining mDNS multicast group on interface br-plug.IPv4 with address 192.168.1.20. | |
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: New relevant interface br-plug.IPv4 for mDNS. | |
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Registering new address record for 192.168.1.20 on br-plug.IPv4. | |
Sep 10 19:51:12 hacklab023254291092 daemon.notice netifd: Interface 'cfg044d8f' is now up | |
Sep 10 19:51:12 hacklab023254291092 daemon.notice netifd: Interface 'plug' is now up | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.510000] device wlan0 left promiscuous mode | |
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.520000] br-plug: port 2(wlan0) entered disabled state | |
Sep 10 19:51:13 hacklab023254291092 daemon.info avahi-daemon[2177]: Registering new address record for fe80::a2f3:c1ff:fef8:8a94 on br-plug.*. | |
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.800000] eth0: link up (1000Mbps/Full duplex) | |
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.830000] br-plug: port 1(eth0) entered forwarding state | |
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.830000] br-plug: port 1(eth0) entered forwarding state | |
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.840000] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready | |
Sep 10 19:51:13 hacklab023254291092 user.notice hotplug.olsrd: Action: ifdown, Proto: , Iface: cfg044d8f, Type: | |
Sep 10 19:51:13 hacklab023254291092 user.notice commotion.hotplug.olsrd: proto: static | |
Sep 10 19:51:13 hacklab023254291092 user.notice commotion.hotplug.olsrd: type: state <interface> <property> | |
Sep 10 19:51:14 hacklab023254291092 user.notice commotion.dnsmasq.hotplug: Action: ifdown, Interface: cfg044d8f, Type: state <interface> <property> | |
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.500000] ADDRCONF(NETDEV_UP): wlan0: link is not ready | |
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.560000] device wlan0 entered promiscuous mode | |
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.640000] ADDRCONF(NETDEV_UP): wlan0: link is not ready | |
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.830000] br-plug: port 1(eth0) entered forwarding state | |
Sep 10 19:51:15 hacklab023254291092 user.notice ifup: Enabling Router Solicitations on plug (br-plug) | |
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187645.070000] br-plug: port 2(wlan0) entered forwarding state | |
Sep 10 19:51:15 hacklab023254291092 daemon.warn dnsmasq[1810]: no servers found in /tmp/resolv.conf.auto, will retry | |
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187645.070000] br-plug: port 2(wlan0) entered forwarding state | |
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187645.080000] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready | |
Sep 10 19:51:16 hacklab023254291092 user.info firewall: removing plug (br-plug) from zone lan | |
Sep 10 19:51:16 hacklab023254291092 user.notice hotplug.olsrd: Action: ifup, Proto: , Iface: plug, Type: | |
Sep 10 19:51:16 hacklab023254291092 user.notice commotion.hotplug.olsrd: proto: none | |
Sep 10 19:51:16 hacklab023254291092 user.notice commotion.hotplug.olsrd: type: plug | |
Sep 10 19:51:16 hacklab023254291092 user.notice commotion.dnsmasq.hotplug: Action: ifup, Interface: plug, Type: plug | |
Sep 10 19:51:16 hacklab023254291092 daemon.info dnsmasq[1810]: exiting on receipt of SIGTERM | |
Sep 10 19:51:17 hacklab023254291092 daemon.info avahi-daemon[2177]: Registering new address record for fe80::a2f3:c1ff:fef8:8a95 on wlan0.*. | |
Sep 10 19:51:17 hacklab023254291092 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! | |
Sep 10 19:51:17 hacklab023254291092 user.notice dnsmasq: Allowing 127.0.0.0/8 responses | |
Sep 10 19:51:17 hacklab023254291092 kern.info kernel: [187647.070000] br-plug: port 2(wlan0) entered forwarding state | |
Sep 10 19:51:17 hacklab023254291092 user.info firewall: adding plug (br-plug) to zone lan | |
Sep 10 19:51:18 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for fe80::a2f3:c1ff:fef8:8a95 on wlan0. | |
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.490000] ADDRCONF(NETDEV_UP): wlan1: link is not ready | |
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.510000] device wlan1 entered promiscuous mode | |
Sep 10 19:51:20 hacklab023254291092 daemon.warn hostapd: wlan1: IEEE 802.11 Configured channel (11) not found from the channel list of current mode (2) IEEE 802.11a | |
Sep 10 19:51:20 hacklab023254291092 daemon.warn hostapd: wlan1: IEEE 802.11 Hardware does not support configured channel | |
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.530000] ADDRCONF(NETDEV_UP): wlan1: link is not ready | |
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.530000] device wlan1 left promiscuous mode | |
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.540000] br-plug: port 3(wlan1) entered disabled state | |
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: started, version 2.62 cachesize 150 | |
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack | |
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq-dhcp[28369]: DHCP, IP range 102.138.148.2 -- 102.138.148.151, lease time 12h | |
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: using local addresses only for domain mesh.local | |
Sep 10 19:51:20 hacklab023254291092 daemon.warn dnsmasq[28369]: no servers found in /tmp/resolv.conf.auto, will retry | |
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: read /etc/hosts - 2 addresses | |
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq-dhcp[28369]: read /etc/ethers - 0 addresses | |
Sep 10 19:51:21 hacklab023254291092 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! | |
Sep 10 19:51:21 hacklab023254291092 user.notice dnsmasq: Allowing 127.0.0.0/8 responses | |
Sep 10 19:51:21 hacklab023254291092 user.notice ifup: Enabling Router Solicitations on cfg044d8f (br-plug) | |
Sep 10 19:51:22 hacklab023254291092 user.notice hotplug.olsrd: Action: ifup, Proto: , Iface: cfg044d8f, Type: | |
Sep 10 19:51:23 hacklab023254291092 user.notice commotion.hotplug.olsrd: proto: static | |
Sep 10 19:51:23 hacklab023254291092 user.notice commotion.hotplug.olsrd: type: plug | |
Sep 10 19:51:23 hacklab023254291092 user.notice commotion.dnsmasq.hotplug: Action: ifup, Interface: cfg044d8f, Type: plug | |
Sep 10 19:51:23 hacklab023254291092 daemon.info dnsmasq[28369]: exiting on receipt of SIGTERM | |
Sep 10 19:51:23 hacklab023254291092 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! | |
Sep 10 19:51:23 hacklab023254291092 user.notice dnsmasq: Allowing 127.0.0.0/8 responses | |
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: started, version 2.62 cachesize 150 | |
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack | |
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq-dhcp[28513]: DHCP, IP range 102.138.148.2 -- 102.138.148.151, lease time 12h | |
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: using local addresses only for domain mesh.local | |
Sep 10 19:51:24 hacklab023254291092 daemon.warn dnsmasq[28513]: no servers found in /tmp/resolv.conf.auto, will retry | |
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: read /etc/hosts - 2 addresses | |
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq-dhcp[28513]: read /etc/ethers - 0 addresses | |
Sep 10 19:51:33 hacklab023254291092 user.info firewall: adding plug (br-plug) to zone lan | |
Sep 10 19:51:36 hacklab023254291092 user.notice freifunk-p2pblock: WARNING! not running - Aborting! | |
Sep 10 19:51:37 hacklab023254291092 user.notice freifunk-p2pblock: starting p2pblock... | |
Sep 10 19:51:37 hacklab023254291092 user.notice freifunk-p2pblock: No wan interface present. | |
Sep 10 19:52:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29207 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:52:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29208 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:53:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29243 cmd /usr/bin/commotion-bigboard-send | |
Sep 10 19:53:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29246 cmd /usr/sbin/ff_olsr_test_gw.sh | |
Sep 10 19:53:46 hacklab023254291092 kern.info kernel: [187795.230000] ADDRCONF(NETDEV_UP): tmp.wlan1: link is not ready | |
-------------------------------------------------------------------- | |
UCI info: (uci show) | |
-------------------------------------------------------------------- | |
applications.settings=settings | |
applications.settings.category=Community Collaboration Fun | |
applications.settings.autoapprove=1 | |
applications.settings.checkconnect=1 | |
applications.settings.expiration=86400 | |
applications.settings.allowpermanent=1 | |
applications.settings.disabled=0 | |
commotion-dash.@dashboard[0]=dashboard | |
commotion-dash.@dashboard[0].gatherer=x.x.x.x | |
commotion-dash.@dashboard[0].enabled=false | |
commotiond.@daemon[0]=daemon | |
commotiond.@node[0]=node | |
commotiond.@node[0].dhcp_timeout=20 | |
commotiond.@node[0].id=3254291093 | |
dhcp.@dnsmasq[0]=dnsmasq | |
dhcp.@dnsmasq[0].domainneeded=1 | |
dhcp.@dnsmasq[0].boguspriv=1 | |
dhcp.@dnsmasq[0].filterwin2k=0 | |
dhcp.@dnsmasq[0].localise_queries=1 | |
dhcp.@dnsmasq[0].rebind_protection=1 | |
dhcp.@dnsmasq[0].rebind_localhost=1 | |
dhcp.@dnsmasq[0].local=/mesh.local/ | |
dhcp.@dnsmasq[0].domain=mesh.local | |
dhcp.@dnsmasq[0].expandhosts=1 | |
dhcp.@dnsmasq[0].nonegcache=0 | |
dhcp.@dnsmasq[0].authoritative=1 | |
dhcp.@dnsmasq[0].readethers=1 | |
dhcp.@dnsmasq[0].leasefile=/tmp/dhcp.leases | |
dhcp.@dnsmasq[0].resolvfile=/tmp/resolv.conf.auto | |
dhcp.@dhcp[0]=dhcp | |
dhcp.@dhcp[0].interface=plug | |
dhcp.@dhcp[0].start=2 | |
dhcp.@dhcp[0].limit=150 | |
dhcp.@dhcp[0].leasetime=12h | |
dropbear.@dropbear[0]=dropbear | |
dropbear.@dropbear[0].PasswordAuth=on | |
dropbear.@dropbear[0].RootPasswordAuth=on | |
dropbear.@dropbear[0].Port=22 | |
etherwake.setup=etherwake | |
etherwake.setup.pathes=/usr/bin/etherwake /usr/bin/ether-wake | |
etherwake.setup.sudo=off | |
etherwake.setup.broadcast=off | |
etherwake.@target[0]=target | |
etherwake.@target[0].name=example | |
etherwake.@target[0].mac=11:22:33:44:55:66 | |
etherwake.@target[0].password=AABBCCDDEEFF | |
etherwake.@target[0].wakeonboot=off | |
firewall.@defaults[0]=defaults | |
firewall.@defaults[0].syn_flood=1 | |
firewall.@defaults[0].input=DROP | |
firewall.@defaults[0].output=ACCEPT | |
firewall.@defaults[0].forward=DROP | |
firewall.@zone[0]=zone | |
firewall.@zone[0].name=lan | |
firewall.@zone[0].input=ACCEPT | |
firewall.@zone[0].output=ACCEPT | |
firewall.@zone[0].forward=DROP | |
firewall.@zone[0].network=plug | |
firewall.@zone[1]=zone | |
firewall.@zone[1].name=ap | |
firewall.@zone[1].input=ACCEPT | |
firewall.@zone[1].output=ACCEPT | |
firewall.@zone[1].forward=DROP | |
firewall.@zone[1].network=ap | |
firewall.@zone[2]=zone | |
firewall.@zone[2].name=secAp | |
firewall.@zone[2].input=ACCEPT | |
firewall.@zone[2].output=ACCEPT | |
firewall.@zone[2].forward=DROP | |
firewall.@zone[2].network=secAp | |
firewall.@zone[3]=zone | |
firewall.@zone[3].name=mesh | |
firewall.@zone[3].input=ACCEPT | |
firewall.@zone[3].output=ACCEPT | |
firewall.@zone[3].forward=DROP | |
firewall.@zone[3].network=mesh | |
firewall.@zone[4]=zone | |
firewall.@zone[4].name=wan | |
firewall.@zone[4].input=DROP | |
firewall.@zone[4].output=ACCEPT | |
firewall.@zone[4].forward=DROP | |
firewall.@zone[4].masq=1 | |
firewall.@zone[4].network=wan | |
firewall.@zone[5]=zone | |
firewall.@zone[5].name=vpn | |
firewall.@zone[5].input=DROP | |
firewall.@zone[5].output=ACCEPT | |
firewall.@zone[5].forward=DROP | |
firewall.@zone[5].network=vpn | |
firewall.@forwarding[0]=forwarding | |
firewall.@forwarding[0].src=ap | |
firewall.@forwarding[0].dest=mesh | |
firewall.@forwarding[1]=forwarding | |
firewall.@forwarding[1].src=ap | |
firewall.@forwarding[1].dest=ap | |
firewall.@forwarding[2]=forwarding | |
firewall.@forwarding[2].src=secAp | |
firewall.@forwarding[2].dest=mesh | |
firewall.@forwarding[3]=forwarding | |
firewall.@forwarding[3].src=secAp | |
firewall.@forwarding[3].dest=secAp | |
firewall.@forwarding[4]=forwarding | |
firewall.@forwarding[4].src=mesh | |
firewall.@forwarding[4].dest=mesh | |
firewall.@forwarding[5]=forwarding | |
firewall.@forwarding[5].src=lan | |
firewall.@forwarding[5].dest=lan | |
firewall.@forwarding[6]=forwarding | |
firewall.@forwarding[6].src=ap | |
firewall.@forwarding[6].dest=wan | |
firewall.@forwarding[7]=forwarding | |
firewall.@forwarding[7].src=secAp | |
firewall.@forwarding[7].dest=wan | |
firewall.@forwarding[8]=forwarding | |
firewall.@forwarding[8].src=mesh | |
firewall.@forwarding[8].dest=wan | |
firewall.@forwarding[9]=forwarding | |
firewall.@forwarding[9].src=lan | |
firewall.@forwarding[9].dest=mesh | |
firewall.@forwarding[10]=forwarding | |
firewall.@forwarding[10].src=lan | |
firewall.@forwarding[10].dest=wan | |
firewall.@forwarding[11]=forwarding | |
firewall.@forwarding[11].src=lan | |
firewall.@forwarding[11].dest=ap | |
firewall.@forwarding[12]=forwarding | |
firewall.@forwarding[12].src=ap | |
firewall.@forwarding[12].dest=lan | |
firewall.@forwarding[13]=forwarding | |
firewall.@forwarding[13].src=lan | |
firewall.@forwarding[13].dest=secAp | |
firewall.@forwarding[14]=forwarding | |
firewall.@forwarding[14].src=secAp | |
firewall.@forwarding[14].dest=lan | |
firewall.@forwarding[15]=forwarding | |
firewall.@forwarding[15].src=ap | |
firewall.@forwarding[15].dest=secAp | |
firewall.@forwarding[16]=forwarding | |
firewall.@forwarding[16].src=secAp | |
firewall.@forwarding[16].dest=ap | |
firewall.@rule[0]=rule | |
firewall.@rule[0].src=wan | |
firewall.@rule[0].dest_port=22 | |
firewall.@rule[0].target=ACCEPT | |
firewall.@rule[0].proto=tcp | |
firewall.@rule[1]=rule | |
firewall.@rule[1].src=mesh | |
firewall.@rule[1].dest_port=22 | |
firewall.@rule[1].target=ACCEPT | |
firewall.@rule[1].proto=tcp | |
firewall.@rule[2]=rule | |
firewall.@rule[2].src=lan | |
firewall.@rule[2].dest_port=22 | |
firewall.@rule[2].target=ACCEPT | |
firewall.@rule[2].proto=tcp | |
firewall.@rule[3]=rule | |
firewall.@rule[3].src=vpn | |
firewall.@rule[3].dest_port=22 | |
firewall.@rule[3].target=ACCEPT | |
firewall.@rule[3].proto=tcp | |
firewall.@rule[4]=rule | |
firewall.@rule[4].src=mesh | |
firewall.@rule[4].dest_port=53 | |
firewall.@rule[4].target=ACCEPT | |
firewall.@rule[4].proto=tcpudp | |
firewall.@rule[5]=rule | |
firewall.@rule[5].src=lan | |
firewall.@rule[5].dest_port=53 | |
firewall.@rule[5].target=ACCEPT | |
firewall.@rule[5].proto=tcpudp | |
firewall.@rule[6]=rule | |
firewall.@rule[6].src=ap | |
firewall.@rule[6].dest_port=53 | |
firewall.@rule[6].target=ACCEPT | |
firewall.@rule[6].proto=tcpudp | |
firewall.@rule[7]=rule | |
firewall.@rule[7].src=secAp | |
firewall.@rule[7].dest_port=53 | |
firewall.@rule[7].target=ACCEPT | |
firewall.@rule[7].proto=tcpudp | |
firewall.@rule[8]=rule | |
firewall.@rule[8].src=lan | |
firewall.@rule[8].dest_port=80 | |
firewall.@rule[8].target=ACCEPT | |
firewall.@rule[8].proto=tcp | |
firewall.@rule[9]=rule | |
firewall.@rule[9].src=wan | |
firewall.@rule[9].dest_port=80 | |
firewall.@rule[9].target=ACCEPT | |
firewall.@rule[9].proto=tcp | |
firewall.@rule[10]=rule | |
firewall.@rule[10].src=ap | |
firewall.@rule[10].dest_port=80 | |
firewall.@rule[10].target=ACCEPT | |
firewall.@rule[10].proto=tcp | |
firewall.@rule[11]=rule | |
firewall.@rule[11].src=secAp | |
firewall.@rule[11].dest_port=80 | |
firewall.@rule[11].target=ACCEPT | |
firewall.@rule[11].proto=tcp | |
firewall.@rule[12]=rule | |
firewall.@rule[12].src=vpn | |
firewall.@rule[12].dest_port=80 | |
firewall.@rule[12].target=ACCEPT | |
firewall.@rule[12].proto=tcp | |
firewall.@rule[13]=rule | |
firewall.@rule[13].src=ap | |
firewall.@rule[13].dest_port=443 | |
firewall.@rule[13].target=ACCEPT | |
firewall.@rule[13].proto=tcp | |
firewall.@rule[14]=rule | |
firewall.@rule[14].src=secAp | |
firewall.@rule[14].dest_port=443 | |
firewall.@rule[14].target=ACCEPT | |
firewall.@rule[14].proto=tcp | |
firewall.@rule[15]=rule | |
firewall.@rule[15].src=lan | |
firewall.@rule[15].dest_port=443 | |
firewall.@rule[15].target=ACCEPT | |
firewall.@rule[15].proto=tcp | |
firewall.@rule[16]=rule | |
firewall.@rule[16].src=vpn | |
firewall.@rule[16].dest_port=443 | |
firewall.@rule[16].target=ACCEPT | |
firewall.@rule[16].proto=tcp | |
firewall.@rule[17]=rule | |
firewall.@rule[17].src=ap | |
firewall.@rule[17].dest_port=22 | |
firewall.@rule[17].target=ACCEPT | |
firewall.@rule[17].proto=tcp | |
firewall.@rule[18]=rule | |
firewall.@rule[18].src=secAp | |
firewall.@rule[18].dest_port=22 | |
firewall.@rule[18].target=ACCEPT | |
firewall.@rule[18].proto=tcp | |
firewall.@rule[19]=rule | |
firewall.@rule[19].src=ap | |
firewall.@rule[19].dest_port=8082 | |
firewall.@rule[19].target=ACCEPT | |
firewall.@rule[19].proto=tcp | |
firewall.@rule[20]=rule | |
firewall.@rule[20].src=secAp | |
firewall.@rule[20].dest_port=8082 | |
firewall.@rule[20].target=ACCEPT | |
firewall.@rule[20].proto=tcp | |
firewall.@rule[21]=rule | |
firewall.@rule[21].src=lan | |
firewall.@rule[21].dest_port=8082 | |
firewall.@rule[21].target=ACCEPT | |
firewall.@rule[21].proto=tcp | |
firewall.@rule[22]=rule | |
firewall.@rule[22].src=mesh | |
firewall.@rule[22].dest_port=698 | |
firewall.@rule[22].target=ACCEPT | |
firewall.@rule[22].proto=udp | |
firewall.@rule[23]=rule | |
firewall.@rule[23].src=wan | |
firewall.@rule[23].dest_port=698 | |
firewall.@rule[23].target=ACCEPT | |
firewall.@rule[23].proto=udp | |
firewall.@rule[24]=rule | |
firewall.@rule[24].src=lan | |
firewall.@rule[24].dest_port=698 | |
firewall.@rule[24].target=ACCEPT | |
firewall.@rule[24].proto=udp | |
firewall.@rule[25]=rule | |
firewall.@rule[25].src=mesh | |
firewall.@rule[25].proto=icmp | |
firewall.@rule[25].target=ACCEPT | |
firewall.@rule[26]=rule | |
firewall.@rule[26].src=lan | |
firewall.@rule[26].proto=icmp | |
firewall.@rule[26].target=ACCEPT | |
firewall.@rule[27]=rule | |
firewall.@rule[27].src=wan | |
firewall.@rule[27].proto=icmp | |
firewall.@rule[27].target=ACCEPT | |
firewall.@rule[28]=rule | |
firewall.@rule[28].src=ap | |
firewall.@rule[28].proto=icmp | |
firewall.@rule[28].target=ACCEPT | |
firewall.@rule[29]=rule | |
firewall.@rule[29].src=secAp | |
firewall.@rule[29].proto=icmp | |
firewall.@rule[29].target=ACCEPT | |
firewall.@rule[30]=rule | |
firewall.@rule[30].src=vpn | |
firewall.@rule[30].proto=icmp | |
firewall.@rule[30].target=ACCEPT | |
firewall.@include[0]=include | |
firewall.@include[0].path=/etc/firewall.freifunk | |
freifunk-gwcheck.hosts=gwcheck | |
freifunk-gwcheck.hosts.host=augsburg.freifunk.net vpn4.leipzig.freifunk.net luci.subsignal.org conntest.jpod.cc | |
freifunk-policyrouting.pr=settings | |
freifunk-policyrouting.pr.enable=0 | |
freifunk-policyrouting.pr.strict=1 | |
freifunk-policyrouting.pr.fallback=1 | |
freifunk_p2pblock.p2pblock=settings | |
freifunk_p2pblock.p2pblock.portrange=1024:65535 | |
freifunk_p2pblock.p2pblock.layer7=edonkey bittorrent fasttrack | |
freifunk_p2pblock.p2pblock.ipp2p=edk dc kazaa gnu bit ares soul winmx apple | |
freifunk_p2pblock.p2pblock.blocktime=60 | |
luci.main=core | |
luci.main.lang=auto | |
luci.main.resourcebase=/luci-static/resources | |
luci.main.mediaurlbase=/luci-static/commotion | |
luci.flash_keep=extern | |
luci.flash_keep.uci=/etc/config/ | |
luci.flash_keep.dropbear=/etc/dropbear/ | |
luci.flash_keep.openvpn=/etc/openvpn/ | |
luci.flash_keep.passwd=/etc/passwd | |
luci.flash_keep.opkg=/etc/opkg.conf | |
luci.flash_keep.firewall=/etc/firewall.user | |
luci.flash_keep.uploads=/lib/uci/upload/ | |
luci.languages=internal | |
luci.languages.en=English | |
luci.languages.fr=Français | |
luci.sauth=internal | |
luci.sauth.sessionpath=/tmp/luci-sessions | |
luci.sauth.sessiontime=3600 | |
luci.ccache=internal | |
luci.ccache.enable=1 | |
luci.themes=internal | |
luci.themes.Bootstrap=/luci-static/bootstrap | |
luci.themes.Commotion=/luci-static/commotion | |
luci.themes.OpenWrt=/luci-static/openwrt.org | |
luci_olsr.general=olsr | |
luci_olsr.general.resolve=1 | |
n2n.@edge[0]=edge | |
network.loopback=interface | |
network.loopback.ifname=lo | |
network.loopback.proto=static | |
network.loopback.ipaddr=127.0.0.1 | |
network.loopback.netmask=255.0.0.0 | |
network.plug=interface | |
network.plug.ifname=eth0 | |
network.plug.type=bridge | |
network.plug._orig_ifname=eth0 wlan0 radio1.network1 | |
network.plug._orig_bridge=true | |
network.plug.proto=none | |
network.plug.auto=1 | |
network.@alias[0]=alias | |
network.@alias[0].interface=plug | |
network.@alias[0].proto=static | |
network.@alias[0].ipaddr=192.168.1.20 | |
network.@alias[0].netmask=255.255.255.0 | |
ntpclient.@ntpserver[0]=ntpserver | |
ntpclient.@ntpserver[0].hostname=0.openwrt.pool.ntp.org | |
ntpclient.@ntpserver[0].port=123 | |
ntpclient.@ntpserver[1]=ntpserver | |
ntpclient.@ntpserver[1].hostname=1.openwrt.pool.ntp.org | |
ntpclient.@ntpserver[1].port=123 | |
ntpclient.@ntpserver[2]=ntpserver | |
ntpclient.@ntpserver[2].hostname=2.openwrt.pool.ntp.org | |
ntpclient.@ntpserver[2].port=123 | |
ntpclient.@ntpserver[3]=ntpserver | |
ntpclient.@ntpserver[3].hostname=3.openwrt.pool.ntp.org | |
ntpclient.@ntpserver[3].port=123 | |
ntpclient.@ntpdrift[0]=ntpdrift | |
ntpclient.@ntpdrift[0].freq=0 | |
ntpclient.@ntpclient[0]=ntpclient | |
ntpclient.@ntpclient[0].interval=600 | |
olsrd.@olsrd[0]=olsrd | |
olsrd.@olsrd[0].IpVersion=4 | |
olsrd.@olsrd[0].LinkQualityLevel=2 | |
olsrd.@olsrd[0].LinkQualityAlgorithm=etx_ffeth | |
olsrd.@olsrd[0].SmartGateway=yes | |
olsrd.@LoadPlugin[0]=LoadPlugin | |
olsrd.@LoadPlugin[0].library=olsrd_arprefresh.so.0.1 | |
olsrd.@LoadPlugin[1]=LoadPlugin | |
olsrd.@LoadPlugin[1].library=olsrd_dyn_gw.so.0.5 | |
olsrd.@LoadPlugin[2]=LoadPlugin | |
olsrd.@LoadPlugin[2].library=olsrd_nameservice.so.0.3 | |
olsrd.@LoadPlugin[2].sighup_pid_file=/var/run/dnsmasq.pid | |
olsrd.@LoadPlugin[2].hosts_file=/var/run/hosts_olsr | |
olsrd.@LoadPlugin[2].suffix=.mesh.local | |
olsrd.@LoadPlugin[3]=LoadPlugin | |
olsrd.@LoadPlugin[3].library=olsrd_dnssd.so.0.1.2 | |
olsrd.@LoadPlugin[3].P2pdTtl=5 | |
olsrd.@LoadPlugin[3].UdpDestPort=224.0.0.251 5353 | |
olsrd.@LoadPlugin[3].ServiceFileDir=/etc/avahi/services | |
olsrd.@LoadPlugin[3].Domain=mesh.local | |
olsrd.@LoadPlugin[3].ServiceUpdateInterval=300 | |
olsrd.@LoadPlugin[4]=LoadPlugin | |
olsrd.@LoadPlugin[4].library=olsrd_txtinfo.so.0.1 | |
olsrd.@LoadPlugin[4].accept=127.0.0.1 | |
olsrd.@LoadPlugin[4].listen=127.0.0.1 | |
olsrd.@LoadPlugin[5]=LoadPlugin | |
olsrd.@LoadPlugin[5].library=olsrd_jsoninfo.so.0.0 | |
olsrd.@LoadPlugin[5].accept=127.0.0.1 | |
olsrd.@LoadPlugin[5].listen=127.0.0.1 | |
olsrd.@LoadPlugin[5].port=9090 | |
olsrd.@LoadPlugin[5].UUIDFile=/etc/olsrd.d/olsrd.uuid | |
olsrd.plug=Hna4 | |
olsrd.plug.netaddr=102.138.149.0 | |
olsrd.plug.netmask=255.255.255.0 | |
qos.wan=interface | |
qos.wan.classgroup=Default | |
qos.wan.enabled=0 | |
qos.wan.upload=128 | |
qos.wan.download=1024 | |
qos.@classify[0]=classify | |
qos.@classify[0].target=Priority | |
qos.@classify[0].ports=22,53 | |
qos.@classify[1]=classify | |
qos.@classify[1].target=Normal | |
qos.@classify[1].proto=tcp | |
qos.@classify[1].ports=20,21,25,80,110,443,993,995 | |
qos.@classify[2]=classify | |
qos.@classify[2].target=Express | |
qos.@classify[2].ports=5190 | |
qos.@default[0]=default | |
qos.@default[0].target=Express | |
qos.@default[0].proto=udp | |
qos.@default[0].pktsize=-500 | |
qos.@reclassify[0]=reclassify | |
qos.@reclassify[0].target=Priority | |
qos.@reclassify[0].proto=icmp | |
qos.@default[1]=default | |
qos.@default[1].target=Bulk | |
qos.@default[1].portrange=1024-65535 | |
qos.@reclassify[1]=reclassify | |
qos.@reclassify[1].target=Priority | |
qos.@reclassify[1].proto=tcp | |
qos.@reclassify[1].pktsize=-128 | |
qos.@reclassify[1].mark=!Bulk | |
qos.@reclassify[1].tcpflags=SYN | |
qos.@reclassify[2]=reclassify | |
qos.@reclassify[2].target=Priority | |
qos.@reclassify[2].proto=tcp | |
qos.@reclassify[2].pktsize=-128 | |
qos.@reclassify[2].mark=!Bulk | |
qos.@reclassify[2].tcpflags=ACK | |
qos.Default=classgroup | |
qos.Default.classes=Priority Express Normal Bulk | |
qos.Default.default=Normal | |
qos.Priority=class | |
qos.Priority.packetsize=400 | |
qos.Priority.maxsize=400 | |
qos.Priority.avgrate=10 | |
qos.Priority.priority=20 | |
qos.Priority_down=class | |
qos.Priority_down.packetsize=1000 | |
qos.Priority_down.avgrate=10 | |
qos.Express=class | |
qos.Express.packetsize=1000 | |
qos.Express.maxsize=800 | |
qos.Express.avgrate=50 | |
qos.Express.priority=10 | |
qos.Normal=class | |
qos.Normal.packetsize=1500 | |
qos.Normal.packetdelay=100 | |
qos.Normal.avgrate=10 | |
qos.Normal.priority=5 | |
qos.Normal_down=class | |
qos.Normal_down.avgrate=20 | |
qos.Bulk=class | |
qos.Bulk.avgrate=1 | |
qos.Bulk.packetdelay=200 | |
quickstart.options=quickstart | |
quickstart.options.pageNo=welcome | |
quickstart.options.lastPg=welcome | |
quickstart.options.complete=false | |
quickstart.options.apps=true | |
quickstart.welcome=page | |
quickstart.welcome.pageTitle=Welcome | |
quickstart.welcome.topheader=Welcome to the Commotion Quick Start | |
quickstart.welcome.modules=adminPassword name meshPassword | |
quickstart.welcome.buttons=noBack 2:finish,|Finish >,| ,| 3:settingsFile,|Use a pre-built network file >,| ,| | |
quickstart.settingsFile=page | |
quickstart.settingsFile.pageTitle=Using a Settings File | |
quickstart.settingsFile.topheader=Using a Settings File | |
quickstart.settingsFile.subheading=If you have a settings file, please upload it below. | |
quickstart.settingsFile.fileType=config | |
quickstart.settingsFile.modules=upload | |
quickstart.settingsFile.buttons=4:finish,|Upload and Finish,|,| ,| 5:startOver,|<< Start Over,| ,|plus | |
system.@system[0]=system | |
system.@system[0].timezone=UTC | |
system.@system[0].community=Commotion | |
system.@system[0].homepage=http://thisnode/commotion/index/apps | |
system.@system[0].hostname=hacklab023254291092 | |
system.ntp=timeserver | |
system.ntp.server=0.openwrt.pool.ntp.org 1.openwrt.pool.ntp.org 2.openwrt.pool.ntp.org 3.openwrt.pool.ntp.org | |
system.ntp.enable_server=0 | |
system.led_usb1=led | |
system.led_usb1.name=USB1 | |
system.led_usb1.sysfs=tp-link:green:usb1 | |
system.led_usb1.trigger=usbdev | |
system.led_usb1.dev=1-1.1 | |
system.led_usb1.interval=50 | |
system.led_usb2=led | |
system.led_usb2.name=USB2 | |
system.led_usb2.sysfs=tp-link:green:usb2 | |
system.led_usb2.trigger=usbdev | |
system.led_usb2.dev=1-1.2 | |
system.led_usb2.interval=50 | |
system.led_wlan2g=led | |
system.led_wlan2g.name=WLAN2G | |
system.led_wlan2g.sysfs=tp-link:blue:wlan2g | |
system.led_wlan2g.trigger=phy0tpt | |
trelay.@trelay[0]=trelay | |
trelay.@trelay[0].enabled=0 | |
trelay.@trelay[0].dev1=eth0 | |
trelay.@trelay[0].dev2=wlan0 | |
ucitrack.@network[0]=network | |
ucitrack.@network[0].init=network | |
ucitrack.@network[0].affects=dhcp radvd | |
ucitrack.@wireless[0]=wireless | |
ucitrack.@wireless[0].affects=network | |
ucitrack.@firewall[0]=firewall | |
ucitrack.@firewall[0].init=firewall | |
ucitrack.@firewall[0].affects=luci-splash qos miniupnpd | |
ucitrack.@olsr[0]=olsr | |
ucitrack.@olsr[0].init=olsrd | |
ucitrack.@dhcp[0]=dhcp | |
ucitrack.@dhcp[0].init=dnsmasq | |
ucitrack.@dropbear[0]=dropbear | |
ucitrack.@dropbear[0].init=dropbear | |
ucitrack.@httpd[0]=httpd | |
ucitrack.@httpd[0].init=httpd | |
ucitrack.@fstab[0]=fstab | |
ucitrack.@fstab[0].init=fstab | |
ucitrack.@qos[0]=qos | |
ucitrack.@qos[0].init=qos | |
ucitrack.@system[0]=system | |
ucitrack.@system[0].init=led | |
ucitrack.@system[0].affects=luci_statistics | |
ucitrack.@luci_splash[0]=luci_splash | |
ucitrack.@luci_splash[0].init=luci_splash | |
ucitrack.@upnpd[0]=upnpd | |
ucitrack.@upnpd[0].init=miniupnpd | |
ucitrack.@ntpclient[0]=ntpclient | |
ucitrack.@ntpclient[0].init=ntpclient | |
ucitrack.@samba[0]=samba | |
ucitrack.@samba[0].init=samba | |
ucitrack.@tinyproxy[0]=tinyproxy | |
ucitrack.@tinyproxy[0].init=tinyproxy | |
ucitrack.@freifunk-policyrouting[0]=freifunk-policyrouting | |
ucitrack.@freifunk-policyrouting[0].affects=network | |
ucitrack.@olsrd[0]=olsrd | |
ucitrack.@olsrd[0].init=olsrd | |
ucitrack.@freifunk_p2pblock[0]=freifunk_p2pblock | |
ucitrack.@freifunk_p2pblock[0].init=freifunk-p2pblock | |
uhttpd.main=uhttpd | |
uhttpd.main.listen_http=0.0.0.0:80 | |
uhttpd.main.listen_https=0.0.0.0:443 | |
uhttpd.main.home=/www | |
uhttpd.main.rfc1918_filter=1 | |
uhttpd.main.max_requests=2 | |
uhttpd.main.cert=/etc/uhttpd.crt | |
uhttpd.main.key=/etc/uhttpd.key | |
uhttpd.main.cgi_prefix=/cgi-bin | |
uhttpd.main.script_timeout=60 | |
uhttpd.main.network_timeout=30 | |
uhttpd.main.tcp_keepalive=1 | |
uhttpd.px5g=cert | |
uhttpd.px5g.days=730 | |
uhttpd.px5g.bits=1024 | |
uhttpd.px5g.country=DE | |
uhttpd.px5g.state=Berlin | |
uhttpd.px5g.location=Berlin | |
uhttpd.px5g.commonname=OpenWrt | |
wireless.radio0=wifi-device | |
wireless.radio0.type=mac80211 | |
wireless.radio0.hwmode=11ng | |
wireless.radio0.macaddr=a0:f3:c1:f8:8a:95 | |
wireless.radio0.htmode=HT20 | |
wireless.radio0.ht_capab=LDPC SHORT-GI-20 SHORT-GI-40 TX-STBC RX-STBC1 DSSS_CCK-40 | |
wireless.radio0.txpower=27 | |
wireless.radio0.country=US | |
wireless.radio0.channel=10 | |
wireless.radio1=wifi-device | |
wireless.radio1.type=mac80211 | |
wireless.radio1.hwmode=11na | |
wireless.radio1.macaddr=a0:f3:c1:f8:8a:96 | |
wireless.radio1.htmode=HT20 | |
wireless.radio1.ht_capab=LDPC SHORT-GI-20 SHORT-GI-40 TX-STBC RX-STBC1 DSSS_CCK-40 | |
wireless.radio1.txpower=17 | |
wireless.radio1.country=US | |
wireless.radio1.channel=11 | |
wireless.@wifi-iface[0]=wifi-iface | |
wireless.@wifi-iface[0].device=radio0 | |
wireless.@wifi-iface[0].mode=ap | |
wireless.@wifi-iface[0].ssid=IS4CWN-HACKLAB2-2GHz | |
wireless.@wifi-iface[0].network=plug | |
wireless.@wifi-iface[0].encryption=psk2 | |
wireless.@wifi-iface[0].key=h4ckth1s! | |
wireless.@wifi-iface[1]=wifi-iface | |
wireless.@wifi-iface[1].device=radio1 | |
wireless.@wifi-iface[1].mode=ap | |
wireless.@wifi-iface[1].network=plug | |
wireless.@wifi-iface[1].encryption=psk2 | |
wireless.@wifi-iface[1].key=h4ckth1s! | |
wireless.@wifi-iface[1].ssid=IS4CWN-HACKLAB2-5GHz | |
-------------------------------------------------------------------- | |
Current Processes: (ps -w) | |
-------------------------------------------------------------------- | |
PID USER VSZ STAT COMMAND | |
1 root 1504 S init | |
2 root 0 SW [kthreadd] | |
3 root 0 SW [ksoftirqd/0] | |
5 root 0 SW [kworker/u:0] | |
6 root 0 SW< [khelper] | |
7 root 0 SW [kworker/u:1] | |
64 root 0 SW [sync_supers] | |
66 root 0 SW [bdi-default] | |
68 root 0 SW< [kblockd] | |
99 root 0 SW [kswapd0] | |
148 root 0 SW [fsnotify_mark] | |
161 root 0 SW< [ath79-spi] | |
172 root 0 SW [mtdblock0] | |
177 root 0 SW [mtdblock1] | |
182 root 0 SW [mtdblock2] | |
187 root 0 SW [mtdblock3] | |
192 root 0 SW [mtdblock4] | |
197 root 0 SW [mtdblock5] | |
265 root 0 SW [kworker/0:1] | |
473 root 0 SWN [jffs2_gcd_mtd3] | |
491 root 1504 S init | |
529 root 0 SW< [cfg80211] | |
546 root 0 SW [khubd] | |
670 root 1508 S /sbin/syslogd -C16 | |
672 root 1488 S /sbin/klogd | |
674 root 856 S /sbin/hotplug2 --override --persistent --set-rules-file /etc/hotplug2.rules --set-coldplug-cmd /sbin/udev | |
680 root 872 S /sbin/ubusd | |
698 root 1052 S /usr/sbin/commotiond | |
722 root 1456 S /sbin/netifd | |
909 root 1500 S /sbin/watchdog -t 5 /dev/watchdog | |
2013 root 1512 S /usr/sbin/crond -c /etc/crontabs -l 5 | |
2024 root 1152 S /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22 | |
2128 root 1712 S /usr/sbin/uhttpd -f -h /www -r hacklab023254291092 -x /cgi-bin -t 60 -T 30 -A 1 -n 2 -R -p 0.0.0.0:80 -C | |
2177 nobody 1728 S avahi-daemon: running [hacklab023254291092.local] | |
2184 root 4412 S /usr/bin/servald start | |
2227 root 800 S /sbin/rngd -r /dev/urandom -W 4000 -t 30 | |
2231 root 1500 S /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.openwrt.pool.ntp.org -p 2.openwrt.pool.ntp.org -p 3.open | |
2253 root 1404 S avahi-client | |
13376 root 0 SW [kworker/0:3] | |
27544 root 0 SW [kworker/0:0] | |
28093 root 1896 S hostapd -P /var/run/wifi-phy0.pid -B /var/run/hostapd-phy0.conf | |
28183 root 0 SW [flush-mtd-unmap] | |
28513 nobody 952 S /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf | |
29221 root 0 SW [kworker/0:2] | |
29270 root 4096 S {luci} /usr/bin/lua /www/cgi-bin/luci | |
29276 root 1500 S /bin/sh -c /usr/sbin/cdh -a all | |
29277 root 1504 S {cdh} /bin/sh /usr/sbin/cdh -a all | |
29286 root 856 S /sbin/hotplug2 --override --persistent --set-rules-file /etc/hotplug2.rules --set-coldplug-cmd /sbin/udev | |
29309 root 1532 S {hotplug-call} /bin/sh /sbin/hotplug-call net | |
29312 root 1496 R ps -w | |
29313 root 1532 S {hotplug-call} /bin/sh /sbin/hotplug-call net | |
29315 root 1488 R dirname /devices/pci0000:00/0000:00:00.0/net | |
-------------------------------------------------------------------- | |
Router uptime and Load: (uptime) | |
-------------------------------------------------------------------- | |
19:53:48 up 2 days, 4:09, load average: 0.72, 0.49, 0.27 | |
-------------------------------------------------------------------- | |
radio1 info | |
-------------------------------------------------------------------- | |
radio1 ESSID: unknown | |
Access Point: 00:00:00:00:00:00 | |
Mode: Client Channel: 36 (5.180 GHz) | |
Tx-Power: unknown Link Quality: unknown/70 | |
Signal: unknown Noise: unknown | |
Bit Rate: unknown | |
Encryption: unknown | |
Type: nl80211 HW Mode(s): 802.11an | |
Hardware: 168C:0033 168C:A120 [Generic MAC80211] | |
TX power offset: unknown | |
Frequency offset: unknown | |
Supports VAPs: yes |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment