-- Logs begin at Thu 2019-02-14 10:12:00 GMT, end at Tue 2024-06-11 04:54:26 BST. -- Jun 11 04:53:45 hacker kernel: usb usb1: SerialNumber: 3f980000.usb Jun 11 04:53:45 hacker kernel: hub 1-0:1.0: USB hub found Jun 11 04:53:45 hacker kernel: hub 1-0:1.0: 1 port detected Jun 11 04:53:45 hacker kernel: dwc_otg: FIQ enabled Jun 11 04:53:45 hacker kernel: dwc_otg: NAK holdoff enabled Jun 11 04:53:45 hacker kernel: dwc_otg: FIQ split-transaction FSM enabled Jun 11 04:53:45 hacker kernel: Module dwc_common_port init Jun 11 04:53:45 hacker kernel: usbcore: registered new interface driver usb-storage Jun 11 04:53:45 hacker kernel: mousedev: PS/2 mouse device common for all mice Jun 11 04:53:45 hacker kernel: sdhci: Secure Digital Host Controller Interface driver Jun 11 04:53:45 hacker kernel: sdhci: Copyright(c) Pierre Ossman Jun 11 04:53:45 hacker kernel: sdhci-pltfm: SDHCI platform and OF driver helper Jun 11 04:53:45 hacker kernel: ledtrig-cpu: registered to indicate activity on CPUs Jun 11 04:53:45 hacker kernel: hid: raw HID events driver (C) Jiri Kosina Jun 11 04:53:45 hacker kernel: usbcore: registered new interface driver usbhid Jun 11 04:53:45 hacker kernel: usbhid: USB HID core driver Jun 11 04:53:45 hacker kernel: Initializing XFRM netlink socket Jun 11 04:53:45 hacker kernel: NET: Registered PF_PACKET protocol family Jun 11 04:53:45 hacker kernel: Key type dns_resolver registered Jun 11 04:53:45 hacker kernel: Registering SWP/SWPB emulation handler Jun 11 04:53:45 hacker kernel: registered taskstats version 1 Jun 11 04:53:45 hacker kernel: Loading compiled-in X.509 certificates Jun 11 04:53:45 hacker kernel: Key type .fscrypt registered Jun 11 04:53:45 hacker kernel: Key type fscrypt-provisioning registered Jun 11 04:53:45 hacker kernel: uart-pl011 3f201000.serial: cts_event_workaround enabled Jun 11 04:53:45 hacker kernel: 3f201000.serial: ttyAMA1 at MMIO 0x3f201000 (irq = 114, base_baud = 0) is a PL011 rev2 Jun 11 04:53:45 hacker kernel: serial serial0: tty port ttyAMA1 registered Jun 11 04:53:45 hacker kernel: bcm2835-wdt bcm2835-wdt: Broadcom BCM2835 watchdog timer Jun 11 04:53:45 hacker kernel: bcm2835-power bcm2835-power: Broadcom BCM2835 power domains driver Jun 11 04:53:45 hacker kernel: mmc-bcm2835 3f300000.mmcnr: mmc_debug:0 mmc_debug2:0 Jun 11 04:53:45 hacker kernel: mmc-bcm2835 3f300000.mmcnr: DMA channel allocated Jun 11 04:53:45 hacker kernel: sdhost: log_buf @ 0652149b (f4113000) Jun 11 04:53:45 hacker kernel: mmc0: sdhost-bcm2835 loaded - DMA enabled (>1) Jun 11 04:53:45 hacker kernel: of_cfs_init Jun 11 04:53:45 hacker kernel: of_cfs_init: OK Jun 11 04:53:45 hacker kernel: Freeing unused kernel image (initmem) memory: 1024K Jun 11 04:53:45 hacker kernel: Indeed it is in host mode hprt0 = 00021501 Jun 11 04:53:45 hacker kernel: Run /init as init process Jun 11 04:53:45 hacker kernel: with arguments: Jun 11 04:53:45 hacker kernel: /init Jun 11 04:53:45 hacker kernel: splash Jun 11 04:53:45 hacker kernel: nodebug Jun 11 04:53:45 hacker kernel: with environment: Jun 11 04:53:45 hacker kernel: HOME=/ Jun 11 04:53:45 hacker kernel: TERM=linux Jun 11 04:53:45 hacker kernel: imgpart=UUID=104224f7-d7af-43f8-9bc3-0adf882b37ed Jun 11 04:53:45 hacker kernel: imgfile=/volumio_current.sqsh Jun 11 04:53:45 hacker kernel: bootpart=UUID=815B-E7CF Jun 11 04:53:45 hacker kernel: datapart=UUID=a85db844-1281-425f-b5a9-6e4ee797aae5 Jun 11 04:53:45 hacker kernel: uuidconfig=cmdline.txt Jun 11 04:53:45 hacker kernel: pcie_aspm=off Jun 11 04:53:45 hacker kernel: pci=pcie_bus_safe Jun 11 04:53:45 hacker kernel: bootdelay=7 Jun 11 04:53:45 hacker kernel: use_kmsg=no Jun 11 04:53:45 hacker kernel: mmc1: new high speed SDIO card at address 0001 Jun 11 04:53:45 hacker kernel: mmc0: host does not support reading read-only switch, assuming write-enable Jun 11 04:53:45 hacker kernel: mmc0: new high speed SDHC card at address aaaa Jun 11 04:53:45 hacker kernel: mmcblk0: mmc0:aaaa SC16G 14.8 GiB Jun 11 04:53:45 hacker kernel: mmcblk0: p1 p2 p3 Jun 11 04:53:45 hacker kernel: mmcblk0: mmc0:aaaa SC16G 14.8 GiB (quirks 0x00004000) Jun 11 04:53:45 hacker kernel: usb 1-1: new high-speed USB device number 2 using dwc_otg Jun 11 04:53:45 hacker kernel: Indeed it is in host mode hprt0 = 00001101 Jun 11 04:53:45 hacker kernel: usb 1-1: New USB device found, idVendor=0424, idProduct=2514, bcdDevice= b.b3 Jun 11 04:53:45 hacker kernel: usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Jun 11 04:53:45 hacker kernel: hub 1-1:1.0: USB hub found Jun 11 04:53:45 hacker kernel: hub 1-1:1.0: 4 ports detected Jun 11 04:53:45 hacker kernel: usb 1-1.1: new high-speed USB device number 3 using dwc_otg Jun 11 04:53:45 hacker kernel: usb 1-1.1: New USB device found, idVendor=0424, idProduct=2514, bcdDevice= b.b3 Jun 11 04:53:45 hacker kernel: usb 1-1.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Jun 11 04:53:45 hacker kernel: hub 1-1.1:1.0: USB hub found Jun 11 04:53:45 hacker kernel: hub 1-1.1:1.0: 3 ports detected Jun 11 04:53:45 hacker kernel: fuse: init (API version 7.37) Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: new high-speed USB device number 4 using dwc_otg Jun 11 04:53:45 hacker kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jun 11 04:53:45 hacker kernel: usbcore: registered new interface driver uas Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: New USB device found, idVendor=2357, idProduct=0120, bcdDevice= 2.00 Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: Product: 802.11ac WLAN Adapter Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: Manufacturer: Realtek Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: SerialNumber: 00e04c000001 Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: new high-speed USB device number 5 using dwc_otg Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: New USB device found, idVendor=0424, idProduct=7800, bcdDevice= 3.00 Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Jun 11 04:53:45 hacker kernel: lan78xx 1-1.1.1:1.0 (unnamed net_device) (uninitialized): No External EEPROM. Setting MAC Speed Jun 11 04:53:45 hacker kernel: lan78xx 1-1.1.1:1.0 (unnamed net_device) (uninitialized): int urb period 64 Jun 11 04:53:45 hacker kernel: FAT-fs (mmcblk0p1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p2): recovery complete Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p2): mounted filesystem with ordered data mode. Quota mode: none. Jun 11 04:53:45 hacker kernel: loop0: detected capacity change from 0 to 979240 Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p3): recovery complete Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p3): mounted filesystem with ordered data mode. Quota mode: none. Jun 11 04:53:45 hacker systemd[1]: System time before build time, advancing clock. Jun 11 04:53:45 hacker kernel: NET: Registered PF_INET6 protocol family Jun 11 04:53:45 hacker kernel: Segment Routing with IPv6 Jun 11 04:53:45 hacker kernel: In-situ OAM (IOAM) with IPv6 Jun 11 04:53:45 hacker systemd[1]: systemd 241 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN -PCRE2 default-hierarchy=hybrid) Jun 11 04:53:45 hacker systemd[1]: Detected architecture arm. Jun 11 04:53:45 hacker systemd[1]: Set hostname to . Jun 11 04:53:45 hacker systemd[1]: /lib/systemd/system/winbind.service:8: PIDFile= references path below legacy directory /var/run/, updating /var/run/samba/winbindd.pid → /run/samba/winbindd.pid; please update the unit file accordingly. Jun 11 04:53:45 hacker systemd[1]: Created slice system-systemd\x2dfsck.slice. Jun 11 04:53:45 hacker systemd[1]: Listening on fsck to fsckd communication Socket. Jun 11 04:53:45 hacker systemd[1]: Listening on udev Control Socket. Jun 11 04:53:45 hacker systemd[1]: Listening on Journal Audit Socket. Jun 11 04:53:45 hacker systemd[1]: Reached target System Time Synchronized. Jun 11 04:53:45 hacker systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jun 11 04:53:45 hacker kernel: i2c_dev: i2c /dev entries driver Jun 11 04:53:45 hacker systemd-journald[305]: Journal started Jun 11 04:53:45 hacker systemd-journald[305]: Runtime journal (/run/log/journal/8ae31a5258af32ecbc8d1a0d62a2178b) is 7.5M, max 30.0M, 22.5M free. Jun 11 04:53:45 hacker systemd-modules-load[299]: Inserted module 'i2c_dev' Jun 11 04:53:45 hacker fake-hwclock[302]: Tue Jun 11 03:53:45 UTC 2024 Jun 11 04:53:45 hacker systemd[1]: Mounted Kernel Configuration File System. Jun 11 04:53:45 hacker systemd[1]: Mounted FUSE Control File System. Jun 11 04:53:45 hacker systemd[1]: dynamicswap.service: Succeeded. Jun 11 04:53:45 hacker systemd[1]: Started Apply Kernel Variables. Jun 11 04:53:45 hacker systemd[1]: Started Load/Save Random Seed. Jun 11 04:53:45 hacker systemd[1]: Started Create System Users. Jun 11 04:53:45 hacker systemd[1]: Starting Create Static Device Nodes in /dev... Jun 11 04:53:45 hacker systemd[1]: Started udev Coldplug all Devices. Jun 11 04:53:45 hacker systemd[1]: Starting Helper to synchronize boot up for ifupdown... Jun 11 04:53:45 hacker systemd[1]: Started Helper to synchronize boot up for ifupdown. Jun 11 04:53:45 hacker systemd[1]: Started Create Static Device Nodes in /dev. Jun 11 04:53:45 hacker systemd[1]: Reached target Local File Systems (Pre). Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups... Jun 11 04:53:45 hacker systemd[1]: tmp.mount: Directory /tmp to mount over is not empty, mounting anyway. Jun 11 04:53:45 hacker systemd[1]: Mounting /tmp... Jun 11 04:53:45 hacker systemd[1]: var-log.mount: Directory /var/log to mount over is not empty, mounting anyway. Jun 11 04:53:45 hacker systemd[1]: Mounting /var/log... Jun 11 04:53:45 hacker systemd[1]: Starting udev Kernel Device Manager... Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups. Jun 11 04:53:45 hacker systemd[1]: Mounted /tmp. Jun 11 04:53:45 hacker systemd[1]: Mounted /var/log. Jun 11 04:53:45 hacker systemd[1]: Starting Flush Journal to Persistent Storage... Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups/tmp... Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups/tmp. Jun 11 04:53:45 hacker systemd-udevd[342]: Network interface NamePolicy= disabled on kernel command line, ignoring. Jun 11 04:53:45 hacker systemd-journald[305]: Runtime journal (/run/log/journal/8ae31a5258af32ecbc8d1a0d62a2178b) is 7.5M, max 30.0M, 22.5M free. Jun 11 04:53:45 hacker systemd[1]: Started Flush Journal to Persistent Storage. Jun 11 04:53:45 hacker systemd[1]: Started udev Kernel Device Manager. Jun 11 04:53:45 hacker systemd[1]: Starting Show Plymouth Boot Screen... Jun 11 04:53:45 hacker systemd[1]: plymouth-start.service: Succeeded. Jun 11 04:53:45 hacker systemd[1]: Started Show Plymouth Boot Screen. Jun 11 04:53:45 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped. Jun 11 04:53:45 hacker systemd[1]: Reached target Local Encrypted Volumes. Jun 11 04:53:45 hacker systemd[1]: Reached target Paths. Jun 11 04:53:45 hacker systemd[1]: Started Forward Password Requests to Plymouth Directory Watch. Jun 11 04:53:46 hacker kernel: vc_sm_cma: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: rpi-gpiomem 3f200000.gpiomem: window base 0x3f200000 size 0x00001000 Jun 11 04:53:46 hacker kernel: mc: Linux media interface: v0.10 Jun 11 04:53:46 hacker kernel: bcm2835_vc_sm_cma_probe: Videocore shared memory driver Jun 11 04:53:46 hacker kernel: [vc_sm_connected_init]: start Jun 11 04:53:46 hacker kernel: rpi-gpiomem 3f200000.gpiomem: initialised 1 regions as /dev/gpiomem Jun 11 04:53:46 hacker kernel: [vc_sm_connected_init]: installed successfully Jun 11 04:53:46 hacker kernel: videodev: Linux video capture interface: v2.00 Jun 11 04:53:46 hacker kernel: bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835_v4l2: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835_isp: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video13 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video14 Jun 11 04:53:46 hacker kernel: bcm2835_codec: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video15 Jun 11 04:53:46 hacker kernel: snd_bcm2835: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: snd_bcm2835: unknown parameter 'enable_compat_alsa' ignored Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video16 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller Jun 11 04:53:46 hacker systemd[1]: Found device /dev/disk/by-uuid/815B-E7CF. Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video20 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video21 Jun 11 04:53:46 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video22 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video23 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Loaded V4L2 bcm2835-isp Jun 11 04:53:47 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video10 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 decode Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video11 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode Jun 11 04:53:47 hacker kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video12 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 isp Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video18 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 image_fx Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video31 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode_image Jun 11 04:53:47 hacker systemd-udevd[350]: Using default interface naming scheme 'v240'. Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'benh@debian.org: 577e021cb980e0e820821ba7b54b4961b8b4fadf' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'romain.perier@gmail.com: 3abbc6ec146e09d1b6016ab9d6cf71dd233f0328' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Jun 11 04:53:47 hacker systemd-udevd[350]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:47 hacker systemd[1]: Starting File System Check on /dev/disk/by-uuid/815B-E7CF... Jun 11 04:53:47 hacker systemd[1]: Started File System Check Daemon to report status. Jun 11 04:53:47 hacker kernel: brcmfmac: F1 signature read @0x18000000=0x15264345 Jun 11 04:53:47 hacker kernel: brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6 Jun 11 04:53:47 hacker kernel: usbcore: registered new interface driver brcmfmac Jun 11 04:53:47 hacker kernel: Bluetooth: Core ver 2.22 Jun 11 04:53:47 hacker kernel: NET: Registered PF_BLUETOOTH protocol family Jun 11 04:53:47 hacker kernel: Bluetooth: HCI device and connection manager initialized Jun 11 04:53:47 hacker kernel: Bluetooth: HCI socket layer initialized Jun 11 04:53:47 hacker kernel: Bluetooth: L2CAP socket layer initialized Jun 11 04:53:47 hacker kernel: Bluetooth: SCO socket layer initialized Jun 11 04:53:47 hacker systemd-fsck[415]: fsck.fat 4.1 (2017-01-24) Jun 11 04:53:47 hacker systemd-fsck[415]: 0x25: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Jun 11 04:53:47 hacker systemd-fsck[415]: Automatically removing dirty bit. Jun 11 04:53:47 hacker systemd-fsck[415]: Performing changes. Jun 11 04:53:47 hacker systemd-fsck[415]: /dev/mmcblk0p1: 456 files, 34026/46774 clusters Jun 11 04:53:47 hacker systemd[1]: Started File System Check on /dev/disk/by-uuid/815B-E7CF. Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART driver ver 2.3 Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART protocol H4 registered Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART protocol Three-wire (H5) registered Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART protocol Broadcom registered Jun 11 04:53:47 hacker kernel: hci_uart_bcm serial0-0: supply vbat not found, using dummy regulator Jun 11 04:53:47 hacker kernel: hci_uart_bcm serial0-0: supply vddio not found, using dummy regulator Jun 11 04:53:47 hacker systemd-udevd[345]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:47 hacker kernel: uart-pl011 3f201000.serial: no DMA platform data Jun 11 04:53:48 hacker kernel: brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Nov 1 2021 00:37:25 version 7.45.241 (1a2f2fa CY) FWID 01-703fd60 Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM: chip id 107 Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM: features 0x2f Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM4345C0 Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0000 Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM4345C0 'brcm/BCM4345C0.hcd' Patch Jun 11 04:53:48 hacker systemd-udevd[355]: Using default interface naming scheme 'v240'. Jun 11 04:53:48 hacker systemd-udevd[355]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM: features 0x2f Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM43455 37.4MHz Raspberry Pi 3+ Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0342 Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM: Using default device address (43:45:c0:00:1f:ac) Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in 7800 being skipped. Jun 11 04:53:49 hacker systemd[1]: Created slice system-bthelper.slice. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Huge Pages File System being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jun 11 04:53:49 hacker systemd[1]: Starting Show Plymouth Boot Screen... Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped. Jun 11 04:53:49 hacker systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jun 11 04:53:49 hacker systemd[1]: Mounting /boot... Jun 11 04:53:49 hacker systemd[1]: Found device /sys/subsystem/net/devices/wlan0. Jun 11 04:53:49 hacker systemd[1]: Mounted /boot. Jun 11 04:53:49 hacker systemd[1]: Starting Load/Save RF Kill Switch Status... Jun 11 04:53:49 hacker systemd[1]: Reached target Local File Systems. Jun 11 04:53:49 hacker systemd[1]: Starting Create Volatile Files and Directories... Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped. Jun 11 04:53:49 hacker systemd[1]: Started ifup for eth0. Jun 11 04:53:49 hacker systemd[1]: Starting Preprocess NFS configuration... Jun 11 04:53:49 hacker systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... Jun 11 04:53:49 hacker systemd[1]: Starting Raise network interfaces... Jun 11 04:53:49 hacker systemd[1]: Started ifup for wlan0. Jun 11 04:53:49 hacker systemd[1]: plymouth-start.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Show Plymouth Boot Screen. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped. Jun 11 04:53:49 hacker systemd[1]: Started Load/Save RF Kill Switch Status. Jun 11 04:53:49 hacker systemd[1]: nfs-config.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Preprocess NFS configuration. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in RPC security service for NFS client and server being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in RPC security service for NFS server being skipped. Jun 11 04:53:49 hacker systemd[1]: Reached target NFS client services. Jun 11 04:53:49 hacker systemd[1]: Received SIGRTMIN+20 from PID 192 (plymouthd). Jun 11 04:53:49 hacker systemd[1]: plymouth-read-write.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Tell Plymouth To Write Out Runtime Data. Jun 11 04:53:49 hacker systemd[1]: Started Create Volatile Files and Directories. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Network Time Synchronization being skipped. Jun 11 04:53:49 hacker systemd[1]: Starting Update UTMP about System Boot/Shutdown... Jun 11 04:53:49 hacker systemd[1]: Starting RPC bind portmap service... Jun 11 04:53:49 hacker systemd[1]: Started Entropy daemon using the HAVEGE algorithm. Jun 11 04:53:49 hacker systemd[1]: Started Update UTMP about System Boot/Shutdown. Jun 11 04:53:49 hacker systemd[1]: Reached target System Initialization. Jun 11 04:53:49 hacker systemd[1]: apt-daily.timer: Not using persistent file timestamp Sat 2024-07-06 11:21:20 BST as it is in the future. Jun 11 04:53:49 hacker systemd[1]: Started Daily apt download activities. Jun 11 04:53:49 hacker systemd[1]: apt-daily-upgrade.timer: Not using persistent file timestamp Sat 2024-07-06 11:21:20 BST as it is in the future. Jun 11 04:53:49 hacker systemd[1]: Started Daily apt upgrade and clean activities. Jun 11 04:53:49 hacker systemd[1]: Listening on triggerhappy.socket. Jun 11 04:53:49 hacker systemd[1]: Started Daily Cleanup of Temporary Directories. Jun 11 04:53:49 hacker systemd[1]: Reached target Timers. Jun 11 04:53:49 hacker systemd[1]: Listening on D-Bus System Message Bus Socket. Jun 11 04:53:49 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:49 hacker systemd[1]: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. Jun 11 04:53:49 hacker systemd[1]: Reached target Sockets. Jun 11 04:53:49 hacker systemd[1]: Reached target Basic System. Jun 11 04:53:49 hacker kernel: 8021q: 802.1Q VLAN Support v1.8 Jun 11 04:53:49 hacker systemd[1]: Started Manage Sound Card State (restore and store). Jun 11 04:53:50 hacker systemd[1]: Started Volumio Iptables Module. Jun 11 04:53:50 hacker systemd[1]: Started UPnP Renderer front-end to MPD. Jun 11 04:53:50 hacker alsactl[592]: alsactl 1.1.8 daemon started Jun 11 04:53:50 hacker systemd[1]: Starting Avahi mDNS/DNS-SD Stack... Jun 11 04:53:50 hacker systemd[1]: Starting Login Service... Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in getty on tty2-tty6 if dbus and logind are not available being skipped. Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Volumio SSH enabler being skipped. Jun 11 04:53:50 hacker systemd[1]: Started Volumio Log Rotation Service. Jun 11 04:53:50 hacker systemd[1]: Starting Wireless Services... Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Copy user wpa_supplicant.conf being skipped. Jun 11 04:53:50 hacker systemd[1]: Starting dhcpcd on all interfaces... Jun 11 04:53:50 hacker systemd[1]: Starting Save/Restore Sound Card State... Jun 11 04:53:50 hacker systemd[1]: Started D-Bus System Message Bus. Jun 11 04:53:50 hacker systemd[1]: Starting WPA supplicant... Jun 11 04:53:50 hacker systemd[1]: Starting triggerhappy global hotkey daemon... Jun 11 04:53:50 hacker systemd[1]: Starting Configure Bluetooth Modems connected by UART... Jun 11 04:53:50 hacker systemd[1]: Started volumio-remote-updater.service. Jun 11 04:53:50 hacker systemd[1]: Started RPC bind portmap service. Jun 11 04:53:50 hacker dhcpcd[621]: Not running dhcpcd because /etc/network/interfaces Jun 11 04:53:50 hacker dhcpcd[621]: defines some interfaces that will use a Jun 11 04:53:50 hacker dhcpcd[621]: DHCP client or static address Jun 11 04:53:50 hacker systemd[1]: dhcpcd.service: Control process exited, code=exited, status=6/NOTCONFIGURED Jun 11 04:53:50 hacker systemd[1]: dhcpcd.service: Failed with result 'exit-code'. Jun 11 04:53:50 hacker systemd[1]: Failed to start dhcpcd on all interfaces. Jun 11 04:53:50 hacker thd[626]: Unable to parse trigger line: Jun 11 04:53:50 hacker thd[626]: Unable to parse trigger line: KEY_MIN_INTERESTING 1 /usr/local/bin/volumio volume toggle Jun 11 04:53:50 hacker thd[626]: Unable to parse trigger line: Jun 11 04:53:50 hacker thd[626]: Found socket passed from systemd Jun 11 04:53:50 hacker systemd[1]: Started Save/Restore Sound Card State. Jun 11 04:53:50 hacker systemd[1]: Started triggerhappy global hotkey daemon. Jun 11 04:53:50 hacker systemd-logind[616]: New seat seat0. Jun 11 04:53:50 hacker systemd[1]: Reached target Sound Card. Jun 11 04:53:50 hacker systemd[1]: Reached target RPC Port Mapper. Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems (Pre). Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems. Jun 11 04:53:50 hacker sh[516]: wlan0=wlan0 Jun 11 04:53:50 hacker systemd[1]: Starting LSB: Load kernel modules needed to enable cpufreq scaling... Jun 11 04:53:50 hacker avahi-daemon[613]: Found user 'avahi' (UID 110) and group 'avahi' (GID 113). Jun 11 04:53:50 hacker avahi-daemon[613]: Successfully dropped root privileges. Jun 11 04:53:50 hacker avahi-daemon[613]: avahi-daemon 0.7 starting up. Jun 11 04:53:50 hacker kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Jun 11 04:53:50 hacker kernel: lan78xx 1-1.1.1:1.0 eth0: Link is Down Jun 11 04:53:50 hacker dhcpcd[562]: eth0: waiting for carrier Jun 11 04:53:50 hacker sh[510]: eth0: waiting for carrier Jun 11 04:53:51 hacker systemd[1]: hciuart.service: Succeeded. Jun 11 04:53:51 hacker systemd[1]: Started Configure Bluetooth Modems connected by UART. Jun 11 04:53:51 hacker avahi-daemon[613]: Successfully called chroot(). Jun 11 04:53:51 hacker avahi-daemon[613]: Successfully dropped remaining capabilities. Jun 11 04:53:51 hacker wpa_supplicant[625]: Successfully initialized wpa_supplicant Jun 11 04:53:51 hacker avahi-daemon[613]: Loading service file /services/volumio.service. Jun 11 04:53:51 hacker avahi-daemon[613]: Network interface enumeration completed. Jun 11 04:53:51 hacker avahi-daemon[613]: Server startup complete. Host name is hacker.local. Local service cookie is 3148571750. Jun 11 04:53:51 hacker avahi-daemon[613]: Service "Hacker" (/services/volumio.service) successfully established. Jun 11 04:53:51 hacker systemd[1]: Started Raise network interfaces. Jun 11 04:53:51 hacker systemd[1]: Started Login Service. Jun 11 04:53:51 hacker systemd[1]: Started Avahi mDNS/DNS-SD Stack. Jun 11 04:53:51 hacker systemd[1]: Started WPA supplicant. Jun 11 04:53:51 hacker systemd[1]: Reached target Network. Jun 11 04:53:51 hacker systemd[1]: Starting Permit User Sessions... Jun 11 04:53:51 hacker systemd[1]: Starting OpenBSD Secure Shell server... Jun 11 04:53:51 hacker systemd[1]: Condition check resulted in fast remote file copy program daemon being skipped. Jun 11 04:53:51 hacker systemd[1]: Starting Network Time Service... Jun 11 04:53:51 hacker systemd[1]: Reached target Network is Online. Jun 11 04:53:51 hacker systemd[1]: Starting /etc/rc.local Compatibility... Jun 11 04:53:51 hacker systemd[1]: Starting LSB: Brings up/down network automatically... Jun 11 04:53:51 hacker systemd[1]: Starting Samba NMB Daemon... Jun 11 04:53:51 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:53:51 hacker systemd[1]: Starting Raspberry Pi bluetooth helper... Jun 11 04:53:51 hacker systemd[1]: Started Permit User Sessions. Jun 11 04:53:52 hacker systemd[1]: Started /etc/rc.local Compatibility. Jun 11 04:53:52 hacker bthelper[724]: Raspberry Pi BDADDR already set Jun 11 04:53:52 hacker systemd[1]: Started Raspberry Pi bluetooth helper. Jun 11 04:53:52 hacker systemd[1]: iptables.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Starting Bluetooth service... Jun 11 04:53:52 hacker loadcpufreq[658]: Loading cpufreq kernel modules...done (none). Jun 11 04:53:52 hacker systemd[1]: Starting Hold until boot process finishes up... Jun 11 04:53:52 hacker systemd[1]: Starting Terminate Plymouth Boot Screen... Jun 11 04:53:52 hacker systemd[1]: Started LSB: Load kernel modules needed to enable cpufreq scaling. Jun 11 04:53:52 hacker volumio-remote-updater[628]: Error: No active session Jun 11 04:53:52 hacker volumio-remote-updater[628]: [2024-06-11 04:53:52] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:53:52 hacker volumio-remote-updater[628]: [2024-06-11 04:53:52] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:53:52 hacker volumio-remote-updater[628]: [2024-06-11 04:53:52] [error] handle_connect error: Underlying Transport Error Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 192 (plymouthd). Jun 11 04:53:52 hacker ntpd[713]: ntpd 4.2.8p12@1.3728-o (1): Starting Jun 11 04:53:52 hacker ntpd[713]: Command line: /usr/sbin/ntpd -p /var/run/ntpd.pid -g -u 103:103 Jun 11 04:53:52 hacker systemd[1]: Starting LSB: set CPUFreq kernel parameters... Jun 11 04:53:52 hacker systemd[1]: Started Network Time Service. Jun 11 04:53:52 hacker systemd[1]: plymouth-quit-wait.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Started Hold until boot process finishes up. Jun 11 04:53:52 hacker systemd[1]: plymouth-quit.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Started Terminate Plymouth Boot Screen. Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 192 (n/a). Jun 11 04:53:52 hacker systemd[1]: Started Getty on tty1. Jun 11 04:53:52 hacker systemd[1]: Reached target Login Prompts. Jun 11 04:53:52 hacker volumio[609]: Could not open config: /tmp/upmpdcli.conf Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Main process exited, code=exited, status=1/FAILURE Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Failed with result 'exit-code'. Jun 11 04:53:52 hacker ntpd[771]: proto: precision = 1.458 usec (-19) Jun 11 04:53:52 hacker ifplugd(eth0)[782]: ifplugd 0.28 initializing. Jun 11 04:53:52 hacker ifplugd(eth0)[782]: Using interface eth0/B8:27:EB:AD:38:72 with driver (version: 6.1.77-v7+) Jun 11 04:53:52 hacker ifplugd(eth0)[782]: Using detection mode: SIOCETHTOOL Jun 11 04:53:52 hacker ifplugd(eth0)[782]: Initialization complete, link beat not detected. Jun 11 04:53:52 hacker ntpd[771]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): good hash signature Jun 11 04:53:52 hacker ntpd[771]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): loaded, expire=2024-12-28T00:00:00Z last=2017-01-01T00:00:00Z ofs=37 Jun 11 04:53:52 hacker ntpd[771]: Listen and drop on 0 v6wildcard [::]:123 Jun 11 04:53:52 hacker ntpd[771]: Listen and drop on 1 v4wildcard 0.0.0.0:123 Jun 11 04:53:52 hacker ntpd[771]: Listen normally on 2 lo 127.0.0.1:123 Jun 11 04:53:52 hacker ntpd[771]: Listening on routing socket on fd #19 for interface updates Jun 11 04:53:52 hacker ntpd[771]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jun 11 04:53:52 hacker ntpd[771]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jun 11 04:53:52 hacker ifplugd[715]: Network Interface Plugging Daemon...start eth0...done. Jun 11 04:53:52 hacker bluetoothd[762]: Bluetooth daemon 5.50 Jun 11 04:53:52 hacker bluetoothd[762]: Unknown key AutoConnectTimeout for group General in /etc/bluetooth/main.conf Jun 11 04:53:52 hacker systemd[1]: Started LSB: Brings up/down network automatically. Jun 11 04:53:52 hacker systemd[1]: Started Bluetooth service. Jun 11 04:53:52 hacker bluetoothd[762]: Starting SDP server Jun 11 04:53:52 hacker bluetoothd[762]: Excluding (cli) sap Jun 11 04:53:52 hacker systemd[1]: Reached target Bluetooth. Jun 11 04:53:52 hacker sshd[785]: Server listening on 0.0.0.0 port 22. Jun 11 04:53:52 hacker systemd[1]: Started OpenBSD Secure Shell server. Jun 11 04:53:52 hacker sshd[785]: Server listening on :: port 22. Jun 11 04:53:52 hacker cpufrequtils[768]: CPUFreq Utilities: Setting ondemand CPUFreq governor...CPU0...CPU1...CPU2...CPU3...done. Jun 11 04:53:52 hacker systemd[1]: Started LSB: set CPUFreq kernel parameters. Jun 11 04:53:52 hacker kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 Jun 11 04:53:52 hacker kernel: Bluetooth: BNEP filters: protocol multicast Jun 11 04:53:52 hacker kernel: Bluetooth: BNEP socket layer initialized Jun 11 04:53:52 hacker dbus-daemon[624]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.5' (uid=0 pid=762 comm="/usr/lib/bluetooth/bluetoothd --noplugin=sap ") Jun 11 04:53:52 hacker bluetoothd[762]: Bluetooth management interface 1.22 initialized Jun 11 04:53:52 hacker kernel: Bluetooth: MGMT ver 1.22 Jun 11 04:53:53 hacker bluetoothd[762]: Failed to set privacy: Rejected (0x0b) Jun 11 04:53:53 hacker haveged[579]: haveged: ver: 1.9.1; arch: generic; vend: ; build: (gcc 8.2.0 CTV); collect: 128K Jun 11 04:53:53 hacker haveged[579]: haveged: cpu: (VC); data: 16K (D); inst: 16K (D); idx: 11/40; sz: 14768/63488 Jun 11 04:53:53 hacker haveged[579]: haveged: tot tests(BA8): A:1/1 B:1/1 continuous tests(B): last entropy estimate 8.00042 Jun 11 04:53:53 hacker haveged[579]: haveged: fills: 0, generated: 0 Jun 11 04:53:53 hacker systemd[1]: Starting Hostname Service... Jun 11 04:53:53 hacker dbus-daemon[624]: [system] Successfully activated service 'org.freedesktop.hostname1' Jun 11 04:53:53 hacker systemd[1]: Started Hostname Service. Jun 11 04:53:53 hacker ntpd[771]: error resolving pool 0.debian.pool.ntp.org: System error (-11) Jun 11 04:53:53 hacker nmbd[756]: [2024/06/11 04:53:53.655222, 0] ../source3/nmbd/asyncdns.c:158(start_async_dns) Jun 11 04:53:53 hacker nmbd[756]: started asyncdns process 803 Jun 11 04:53:53 hacker nmbd[756]: [2024/06/11 04:53:53.657495, 0] ../lib/util/become_daemon.c:149(daemon_status) Jun 11 04:53:53 hacker nmbd[756]: daemon_status: STATUS=daemon 'nmbd' : No local IPv4 non-loopback interfaces available, waiting for interface ... Jun 11 04:53:53 hacker nmbd[756]: [2024/06/11 04:53:53.657657, 0] ../source3/nmbd/nmbd_subnetdb.c:254(create_subnets) Jun 11 04:53:53 hacker nmbd[756]: NOTE: NetBIOS name resolution is not supported for Internet Protocol Version 6 (IPv6). Jun 11 04:53:54 hacker wireless.js[620]: Cleaning previous... Jun 11 04:53:54 hacker sudo[811]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0 Jun 11 04:53:54 hacker sudo[811]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:54 hacker sudo[811]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:54 hacker sudo[813]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down Jun 11 04:53:54 hacker sudo[813]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:54 hacker ntpd[771]: error resolving pool 1.debian.pool.ntp.org: System error (-11) Jun 11 04:53:54 hacker systemd[1]: systemd-rfkill.service: Succeeded. Jun 11 04:53:54 hacker sudo[813]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:54 hacker wireless.js[620]: Stopped aP Jun 11 04:53:54 hacker sudo[820]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:54 hacker sudo[820]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:54 hacker sudo[820]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:55 hacker sudo[822]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg get Jun 11 04:53:55 hacker sudo[822]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker sudo[822]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker sudo[829]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:55 hacker sudo[829]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker sudo[829]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker sudo[831]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw wlan0 scan Jun 11 04:53:55 hacker sudo[831]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker ntpd[771]: error resolving pool 2.debian.pool.ntp.org: System error (-11) Jun 11 04:53:56 hacker ntpd[771]: error resolving pool 3.debian.pool.ntp.org: System error (-11) Jun 11 04:53:57 hacker bthelper[724]: Changing power off succeeded Jun 11 04:53:57 hacker bthelper[724]: [CHG] Controller B8:27:EB:07:92:D8 Powered: no Jun 11 04:53:57 hacker bthelper[724]: [CHG] Controller B8:27:EB:07:92:D8 Discovering: no Jun 11 04:53:57 hacker bthelper[724]: [CHG] Controller B8:27:EB:07:92:D8 Class: 0x00000000 Jun 11 04:53:57 hacker bthelper[724]: [CHG] Controller B8:27:EB:07:92:D8 Class: 0x0000041c Jun 11 04:53:57 hacker bthelper[724]: Changing power on succeeded Jun 11 04:53:57 hacker volumio-remote-updater[628]: [2024-06-11 04:53:57] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:53:57 hacker volumio-remote-updater[628]: [2024-06-11 04:53:57] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:53:57 hacker volumio-remote-updater[628]: [2024-06-11 04:53:57] [error] handle_connect error: Underlying Transport Error Jun 11 04:53:57 hacker sudo[831]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker wireless.js[620]: SETTING APPROPRIATE REG DOMAIN: GB Jun 11 04:53:57 hacker sudo[843]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:57 hacker sudo[843]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[843]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker sudo[845]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg set GB Jun 11 04:53:57 hacker sudo[845]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[845]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker wireless.js[620]: SUCCESSFULLY SET NEW REGDOMAIN: GB Jun 11 04:53:57 hacker wireless.js[620]: Start wireless flow Jun 11 04:53:57 hacker wireless.js[620]: Stopped hotspot (if there).. Jun 11 04:53:57 hacker sudo[850]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0 Jun 11 04:53:57 hacker sudo[850]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[850]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker sudo[852]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down Jun 11 04:53:57 hacker sudo[852]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:58 hacker sudo[852]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:58 hacker wireless.js[620]: DHCP IP Jun 11 04:53:58 hacker wireless.js[620]: Start ap Jun 11 04:53:58 hacker wpa_supplicant[854]: Successfully initialized wpa_supplicant Jun 11 04:53:58 hacker sudo[855]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/dhcpcd Jun 11 04:53:58 hacker sudo[855]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:58 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:58 hacker dhcpcd[856]: dev: loaded udev Jun 11 04:53:58 hacker dhcpcd-run-hooks[874]: wlan0: starting wpa_supplicant Jun 11 04:53:58 hacker dhcpcd-run-hooks[879]: wlan0: failed to start wpa_supplicant Jun 11 04:53:58 hacker dhcpcd-run-hooks[880]: wlan0: Successfully initialized wpa_supplicant nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Ma Jun 11 04:53:58 hacker dhcpcd[856]: wlan0: connected to Access Point `' Jun 11 04:53:58 hacker dhcpcd[856]: no interfaces have a carrier Jun 11 04:53:58 hacker dhcpcd[856]: forked to background, child pid 890 Jun 11 04:53:58 hacker dhcpcd[890]: eth0: waiting for carrier Jun 11 04:53:58 hacker dhcpcd[890]: wlan0: waiting for carrier Jun 11 04:53:58 hacker sudo[855]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:59 hacker wireless.js[620]: trying... Jun 11 04:53:59 hacker sudo[892]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:53:59 hacker sudo[892]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:59 hacker sudo[892]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:00 hacker wireless.js[620]: trying... Jun 11 04:54:00 hacker sudo[895]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:00 hacker sudo[895]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:00 hacker sudo[895]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:01 hacker wpa_supplicant[878]: wlan0: Trying to associate with SSID 'FRITZ!Box 7530 KO' Jun 11 04:54:01 hacker wireless.js[620]: trying... Jun 11 04:54:01 hacker sudo[898]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:01 hacker sudo[898]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:01 hacker sudo[898]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:02 hacker wireless.js[620]: trying... Jun 11 04:54:02 hacker sudo[901]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:02 hacker sudo[901]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:02 hacker sudo[901]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:03 hacker wireless.js[620]: trying... Jun 11 04:54:03 hacker sudo[904]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:03 hacker sudo[904]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:03 hacker sudo[904]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:03 hacker dhcpcd[890]: wlan0: carrier acquired Jun 11 04:54:03 hacker dhcpcd[890]: wlan0: connected to Access Point `FRITZ!Box 7530 KO' Jun 11 04:54:03 hacker wpa_supplicant[878]: wlan0: Associated with 98:9b:cb:b9:11:2f Jun 11 04:54:03 hacker wpa_supplicant[878]: wlan0: CTRL-EVENT-CONNECTED - Connection to 98:9b:cb:b9:11:2f completed [id=0 id_str=] Jun 11 04:54:03 hacker wpa_supplicant[878]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Jun 11 04:54:03 hacker wpa_supplicant[878]: wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=GB Jun 11 04:54:03 hacker dhcpcd[890]: DUID 00:01:00:01:2a:34:d5:bb:b8:27:eb:ad:38:72 Jun 11 04:54:03 hacker dhcpcd[890]: wlan0: IAID eb:f8:6d:27 Jun 11 04:54:03 hacker dhcpcd[890]: wlan0: adding address fe80::145a:8513:d5a8:3d51 Jun 11 04:54:03 hacker dhcpcd[890]: ipv6_addaddr1: Permission denied Jun 11 04:54:03 hacker dhcpcd[890]: wlan0: carrier lost Jun 11 04:54:03 hacker dhcpcd[890]: wlan0: carrier acquired Jun 11 04:54:03 hacker dhcpcd[890]: wlan0: IAID eb:f8:6d:27 Jun 11 04:54:04 hacker dhcpcd[890]: wlan0: soliciting an IPv6 router Jun 11 04:54:04 hacker dhcpcd[890]: wlan0: rebinding lease of 192.168.178.85 Jun 11 04:54:04 hacker wireless.js[620]: trying... Jun 11 04:54:04 hacker sudo[919]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:04 hacker sudo[919]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:04 hacker sudo[919]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:04 hacker volumio-remote-updater[628]: [2024-06-11 04:54:04] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:54:04 hacker volumio-remote-updater[628]: [2024-06-11 04:54:04] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:54:04 hacker volumio-remote-updater[628]: [2024-06-11 04:54:04] [error] handle_connect error: Underlying Transport Error Jun 11 04:54:05 hacker wireless.js[620]: trying... Jun 11 04:54:05 hacker sudo[922]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:05 hacker sudo[922]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:05 hacker sudo[922]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:06 hacker wireless.js[620]: trying... Jun 11 04:54:06 hacker sudo[925]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:06 hacker sudo[925]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:06 hacker sudo[925]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:07 hacker wireless.js[620]: trying... Jun 11 04:54:07 hacker sudo[928]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:07 hacker sudo[928]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:07 hacker sudo[928]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:08 hacker wireless.js[620]: trying... Jun 11 04:54:08 hacker sudo[931]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:08 hacker sudo[931]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:08 hacker sudo[931]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:08 hacker dhcpcd[890]: wlan0: probing address 192.168.178.85/24 Jun 11 04:54:09 hacker wireless.js[620]: trying... Jun 11 04:54:09 hacker sudo[934]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:09 hacker sudo[934]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:09 hacker sudo[934]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:10 hacker wireless.js[620]: trying... Jun 11 04:54:10 hacker sudo[937]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:10 hacker sudo[937]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:10 hacker sudo[937]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:11 hacker wireless.js[620]: trying... Jun 11 04:54:11 hacker sudo[940]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:11 hacker sudo[940]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:11 hacker sudo[940]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:12 hacker wireless.js[620]: trying... Jun 11 04:54:12 hacker sudo[943]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:12 hacker sudo[943]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:12 hacker sudo[943]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:13 hacker dhcpcd[890]: wlan0: leased 192.168.178.85 for 864000 seconds Jun 11 04:54:13 hacker avahi-daemon[613]: Joining mDNS multicast group on interface wlan0.IPv4 with address 192.168.178.85. Jun 11 04:54:13 hacker dhcpcd[890]: wlan0: adding route to 192.168.178.0/24 Jun 11 04:54:13 hacker avahi-daemon[613]: New relevant interface wlan0.IPv4 for mDNS. Jun 11 04:54:13 hacker dhcpcd[890]: wlan0: adding default route via 192.168.178.1 Jun 11 04:54:13 hacker avahi-daemon[613]: Registering new address record for 192.168.178.85 on wlan0.IPv4. Jun 11 04:54:13 hacker wireless.js[620]: trying... Jun 11 04:54:13 hacker sudo[967]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:13 hacker sudo[967]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:13 hacker sudo[967]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:13 hacker wireless.js[620]: Connected to: ----FRITZ!Box 7530 KO Jun 11 04:54:13 hacker wireless.js[620]: ---- Jun 11 04:54:13 hacker sudo[970]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 Jun 11 04:54:13 hacker sudo[970]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:13 hacker sudo[970]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:13 hacker wireless.js[620]: ... joined AP, wlan0 IPv4 is 192.168.178.85, ipV6 is undefined Jun 11 04:54:13 hacker wireless.js[620]: It's done! AP Jun 11 04:54:13 hacker systemd[1]: Started Wireless Services. Jun 11 04:54:13 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:54:13 hacker systemd[1]: Started Volumio Backend Module. Jun 11 04:54:13 hacker systemd[1]: Started Volumio Cpu Tweaker. Jun 11 04:54:13 hacker volumio-cpu-tweak[976]: Setting RT Priority for mpd Jun 11 04:54:13 hacker volumio-cpu-tweak[976]: pid 35's current scheduling policy: SCHED_OTHER Jun 11 04:54:13 hacker volumio-cpu-tweak[976]: pid 35's current scheduling priority: 0 Jun 11 04:54:13 hacker volumio-cpu-tweak[976]: Setting MPD Affinity Jun 11 04:54:13 hacker volumio-cpu-tweak[976]: pid 3's current affinity mask: f Jun 11 04:54:13 hacker nmbd[756]: [2024/06/11 04:54:13.663298, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:13 hacker nmbd[756]: daemon_ready: STATUS=daemon 'nmbd' finished starting up and ready to serve connections Jun 11 04:54:13 hacker systemd[1]: Started Samba NMB Daemon. Jun 11 04:54:13 hacker volumio-cpu-tweak[976]: /bin/volumio_cpu_tweak: line 27: warning: command substitution: ignored null byte in input Jun 11 04:54:13 hacker volumio-cpu-tweak[976]: VOLUMIO CPU TWEAK: Setting CPU Governor: performance Jun 11 04:54:13 hacker systemd[1]: Starting Samba Winbind Daemon... Jun 11 04:54:13 hacker systemd[1]: volumio_cpu_tweak.service: Succeeded. Jun 11 04:54:14 hacker winbindd[991]: [2024/06/11 04:54:14.032195, 0] ../source3/winbindd/winbindd_cache.c:3160(initialize_winbindd_cache) Jun 11 04:54:14 hacker winbindd[991]: initialize_winbindd_cache: clearing cache and re-creating with version number 2 Jun 11 04:54:14 hacker winbindd[991]: [2024/06/11 04:54:14.054247, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:14 hacker systemd[1]: Started Samba Winbind Daemon. Jun 11 04:54:14 hacker winbindd[991]: daemon_ready: STATUS=daemon 'winbindd' finished starting up and ready to serve connections Jun 11 04:54:14 hacker systemd[1]: Starting Samba SMB Daemon... Jun 11 04:54:14 hacker ntpd[771]: Listen normally on 3 wlan0 192.168.178.85:123 Jun 11 04:54:14 hacker ntpd[771]: new interface(s) found: waking up resolver Jun 11 04:54:14 hacker winbindd[991]: [2024/06/11 04:54:14.610078, 0] ../source3/winbindd/wb_lookupsids.c:659(wb_lookupsids_recv) Jun 11 04:54:14 hacker winbindd[991]: res_names->count = 3, expected 4 Jun 11 04:54:14 hacker smbd[997]: [2024/06/11 04:54:14.634501, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:14 hacker smbd[997]: daemon_ready: STATUS=daemon 'smbd' finished starting up and ready to serve connections Jun 11 04:54:14 hacker systemd[1]: Started Samba SMB Daemon. Jun 11 04:54:14 hacker systemd[1]: Reached target Multi-User System. Jun 11 04:54:14 hacker systemd[1]: Reached target Graphical Interface. Jun 11 04:54:14 hacker systemd[1]: Starting Update UTMP about System Runlevel Changes... Jun 11 04:54:14 hacker systemd[1]: systemd-update-utmp-runlevel.service: Succeeded. Jun 11 04:54:14 hacker systemd[1]: Started Update UTMP about System Runlevel Changes. Jun 11 04:54:14 hacker systemd[1]: Startup finished in 17.851s (kernel) + 31.941s (userspace) = 49.792s. Jun 11 04:54:14 hacker volumio-remote-updater[628]: [2024-06-11 04:54:14] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:54:14 hacker volumio-remote-updater[628]: [2024-06-11 04:54:14] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:54:14 hacker volumio-remote-updater[628]: [2024-06-11 04:54:14] [error] handle_connect error: Underlying Transport Error Jun 11 04:54:15 hacker nmbd[756]: [2024/06/11 04:54:15.742845, 0] ../source3/nmbd/nmbd_namequery.c:109(query_name_response) Jun 11 04:54:15 hacker nmbd[756]: query_name_response: Multiple (2) responses received for a query on subnet 192.168.178.85 for name WORKGROUP<1d>. Jun 11 04:54:15 hacker nmbd[756]: This response was from IP 192.168.178.22, reporting an IP address of 192.168.178.22. Jun 11 04:54:16 hacker volumio[975]: info: ------------------------------------------- Jun 11 04:54:16 hacker volumio[975]: info: ----- Volumio3 ---- Jun 11 04:54:16 hacker volumio[975]: info: ------------------------------------------- Jun 11 04:54:16 hacker volumio[975]: info: ----- System startup ---- Jun 11 04:54:16 hacker volumio[975]: info: ------------------------------------------- Jun 11 04:54:17 hacker volumio[975]: info: MYVOLUMIO Environment detected Jun 11 04:54:17 hacker volumio[975]: info: Plugin folders cleanup Jun 11 04:54:17 hacker volumio[975]: info: Scanning into folder /volumio/app/plugins/ Jun 11 04:54:17 hacker volumio[975]: info: Scanning category audio_interface Jun 11 04:54:17 hacker volumio[975]: info: Scanning category miscellanea Jun 11 04:54:17 hacker volumio[975]: info: Scanning category music_service Jun 11 04:54:17 hacker volumio[975]: info: Scanning category plugins.json Jun 11 04:54:17 hacker volumio[975]: info: Scanning category system_controller Jun 11 04:54:17 hacker volumio[975]: info: Scanning category user_interface Jun 11 04:54:17 hacker volumio[975]: info: Scanning into folder /data/plugins/ Jun 11 04:54:17 hacker volumio[975]: info: Scanning category audio_interface Jun 11 04:54:17 hacker volumio[975]: info: Scanning category music_service Jun 11 04:54:17 hacker volumio[975]: info: Plugin folders cleanup completed Jun 11 04:54:17 hacker volumio[975]: info: ------------------------------------------- Jun 11 04:54:17 hacker volumio[975]: info: ----- Core plugins startup ---- Jun 11 04:54:17 hacker volumio[975]: info: ------------------------------------------- Jun 11 04:54:17 hacker volumio[975]: info: Loading plugins from folder /volumio/app/plugins/ Jun 11 04:54:17 hacker volumio[975]: info: Adding plugin upnp to MyMusic Plugins Jun 11 04:54:17 hacker volumio[975]: info: Adding plugin airplay_emulation to MyMusic Plugins Jun 11 04:54:17 hacker volumio[975]: info: Adding plugin upnp_browser to MyMusic Plugins Jun 11 04:54:17 hacker volumio[975]: info: Loading plugins from folder /data/plugins/ Jun 11 04:54:17 hacker volumio[975]: info: Loading plugin "system"... Jun 11 04:54:17 hacker volumio[975]: info: Loading plugin "appearance"... Jun 11 04:54:17 hacker systemd[1]: systemd-fsckd.service: Succeeded. Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "network"... Jun 11 04:54:19 hacker volumio[975]: info: Refreshing Cached IP Addresses Jun 11 04:54:19 hacker sudo[1020]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig eth0 Jun 11 04:54:19 hacker sudo[1020]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "services"... Jun 11 04:54:19 hacker sudo[1022]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 Jun 11 04:54:19 hacker sudo[1022]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker sudo[1020]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "alsa_controller"... Jun 11 04:54:19 hacker sudo[1022]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:19 hacker sudo[1025]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwlist wlan0 scan Jun 11 04:54:19 hacker sudo[1025]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "wizard"... Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "networkfs"... Jun 11 04:54:19 hacker volumio[975]: info: Starting Udev Watcher for removable devices Jun 11 04:54:19 hacker sudo[1033]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/mount -t nfs -o ro,soft,noauto 192.168.178.108:/volume1/music /mnt/NAS/Synology Jun 11 04:54:19 hacker sudo[1033]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker volumio[975]: info: Ignoring mount for partition: boot Jun 11 04:54:19 hacker volumio[975]: info: Ignoring mount for partition: volumio Jun 11 04:54:19 hacker volumio[975]: info: Ignoring mount for partition: volumio_data Jun 11 04:54:19 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "volumio_command_line_client"... Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "upnp"... Jun 11 04:54:19 hacker volumio[975]: info: [1718078059372] Starting Upmpd Daemon Jun 11 04:54:19 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "my_music"... Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "mpd"... Jun 11 04:54:19 hacker systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Jun 11 04:54:19 hacker systemd[1]: Reached target Host and Network Name Lookups. Jun 11 04:54:19 hacker volumio[975]: info: Loading plugin "upnp_browser"... Jun 11 04:54:19 hacker systemd[1]: Starting Preprocess NFS configuration... Jun 11 04:54:19 hacker systemd[1]: nfs-config.service: Succeeded. Jun 11 04:54:19 hacker systemd[1]: Started Preprocess NFS configuration. Jun 11 04:54:19 hacker systemd[1]: Starting NFS status monitor for NFSv2/3 locking.... Jun 11 04:54:19 hacker systemd[1]: Starting Notify NFS peers of a restart... Jun 11 04:54:19 hacker sm-notify[1048]: Version 1.3.3 starting Jun 11 04:54:19 hacker systemd[1]: rpc-statd-notify.service: Succeeded. Jun 11 04:54:19 hacker systemd[1]: Started Notify NFS peers of a restart. Jun 11 04:54:19 hacker rpc.statd[1049]: Version 1.3.3 starting Jun 11 04:54:19 hacker rpc.statd[1049]: Flags: TI-RPC Jun 11 04:54:20 hacker systemd[1]: Started NFS status monitor for NFSv2/3 locking.. Jun 11 04:54:20 hacker volumio[975]: info: Loading plugin "alarm-clock"... Jun 11 04:54:20 hacker sudo[1033]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:20 hacker volumio[975]: info: Loading plugin "airplay_emulation"... Jun 11 04:54:20 hacker volumio[975]: info: Starting Shairport Sync Jun 11 04:54:20 hacker volumio[975]: info: Loading plugin "last_100"... Jun 11 04:54:20 hacker volumio[975]: info: Loading plugin "webradio"... Jun 11 04:54:20 hacker volumio[975]: info: Loading plugin "i2s_dacs"... Jun 11 04:54:20 hacker volumio[975]: info: Loading plugin "volumiodiscovery"... Jun 11 04:54:20 hacker sh[510]: timed out Jun 11 04:54:20 hacker dhcpcd[562]: timed out Jun 11 04:54:20 hacker sh[510]: dhcpcd exited Jun 11 04:54:20 hacker dhcpcd[562]: dhcpcd exited Jun 11 04:54:20 hacker sh[510]: ifup: failed to bring up eth0 Jun 11 04:54:20 hacker systemd[1]: ifup@eth0.service: Main process exited, code=exited, status=1/FAILURE Jun 11 04:54:20 hacker systemd[1]: ifup@eth0.service: Failed with result 'exit-code'. Jun 11 04:54:20 hacker volumio[975]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:20 hacker volumio[975]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:20 hacker volumio[975]: *** WARNING *** For more information see Jun 11 04:54:20 hacker node[975]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:20 hacker volumio[975]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:20 hacker volumio[975]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:20 hacker volumio[975]: *** WARNING *** For more information see Jun 11 04:54:20 hacker node[975]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:20 hacker node[975]: *** WARNING *** For more information see Jun 11 04:54:20 hacker node[975]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:20 hacker node[975]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:20 hacker node[975]: *** WARNING *** For more information see Jun 11 04:54:20 hacker volumio[975]: info: Applying required configuration parameters for plugin volumiodiscovery Jun 11 04:54:20 hacker volumio[975]: info: Discovery: Started advertising with name: Hacker Jun 11 04:54:20 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:20 hacker volumio[975]: info: Loading plugin "bandcamp"... Jun 11 04:54:21 hacker volumio[975]: info: Loading plugin "outputs"... Jun 11 04:54:21 hacker volumio[975]: info: Loading plugin "albumart"... Jun 11 04:54:21 hacker volumio[975]: info: Plugin example_plugin is not enabled Jun 11 04:54:21 hacker volumio[975]: info: Loading plugin "inputs"... Jun 11 04:54:21 hacker volumio[975]: info: Loading plugin "updater_comm"... Jun 11 04:54:21 hacker volumio[975]: info: Plugin mpdemulation is not enabled Jun 11 04:54:21 hacker volumio[975]: info: Loading plugin "rest_api"... Jun 11 04:54:21 hacker volumio[975]: info: Loading plugin "websocket"... Jun 11 04:54:21 hacker volumio[975]: info: Starting Socket.io Server version 2.3.0 Jun 11 04:54:21 hacker volumio[975]: info: Loading plugin "fusiondsp"... Jun 11 04:54:21 hacker volumio[975]: Forking 3 albumart workers Jun 11 04:54:22 hacker volumio[975]: info: Applying required configuration parameters for plugin fusiondsp Jun 11 04:54:22 hacker volumio[975]: info: Loading i18n strings for locale en Jun 11 04:54:22 hacker volumio[975]: Updating browse sources language Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:22 hacker volumio[975]: Starting albumart workers Jun 11 04:54:22 hacker volumio[975]: Starting albumart workers Jun 11 04:54:22 hacker volumio[975]: Starting albumart workers Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::initPlayerControls Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:22 hacker volumio[975]: Express server listening on port 3000 Jun 11 04:54:22 hacker volumio[975]: [Metrics] WebUI: 7s 353.92ms Jun 11 04:54:22 hacker volumio[975]: info: CoreStateMachine::resetVolumioState Jun 11 04:54:22 hacker volumio[975]: info: CoreStateMachine::getcurrentVolume Jun 11 04:54:22 hacker volumio[975]: info: CoreCommandRouter::volumioRetrievevolume Jun 11 04:54:22 hacker sudo[1025]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:22 hacker volumio[975]: info: Cannot mount NAS Synology at system boot, trial number 1 ,retrying in 5 seconds Jun 11 04:54:23 hacker volumio[975]: verbose: New Socket.io Connection to 192.168.178.85:3000 from 192.168.178.98 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 1 Jun 11 04:54:23 hacker volumio[975]: verbose: New Socket.io Connection to 192.168.178.85:3000 from 192.168.178.98 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 2 Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:23 hacker volumio[975]: info: Reloading queue from file Jun 11 04:54:23 hacker volumio[975]: info: Setting Device type: Raspberry PI Jun 11 04:54:23 hacker volumio[975]: info: CoreStateMachine::setRepeat null single undefined Jun 11 04:54:23 hacker volumio[975]: info: CoreStateMachine::pushState Jun 11 04:54:23 hacker volumio[975]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:23 hacker volumio[975]: info: CoreStateMachine::setRandom null Jun 11 04:54:23 hacker volumio[975]: info: CoreStateMachine::pushState Jun 11 04:54:23 hacker volumio[975]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:23 hacker volumio[975]: info: Completed loading Core Plugins Jun 11 04:54:23 hacker volumio[975]: info: Preparing to generate the ALSA configuration file Jun 11 04:54:23 hacker systemd[1]: systemd-hostnamed.service: Succeeded. Jun 11 04:54:23 hacker volumio[975]: info: VolumeController:: Volume=79 Mute =false Jun 11 04:54:23 hacker volumio[975]: info: CoreStateMachine::pushState Jun 11 04:54:23 hacker volumio[975]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:23 hacker volumio[975]: info: CoreStateMachine::updateTrackBlock Jun 11 04:54:23 hacker volumio[975]: info: CorePlayQueue::getTrackBlock Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioRetrievevolume Jun 11 04:54:23 hacker volumio[975]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf Jun 11 04:54:23 hacker volumio[975]: info: Reading ALSA contributions from plugins. Jun 11 04:54:23 hacker volumio[975]: info: Asound.conf file unchanged, so no further update is needed Jun 11 04:54:23 hacker volumio[975]: info: Output device has changed, restarting MPD Jun 11 04:54:23 hacker volumio[975]: info: Output device has changed, restarting Shairport Sync Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:23 hacker sudo[1119]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:23 hacker sudo[1119]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:23 hacker sudo[1119]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:23 hacker sudo[1121]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:23 hacker sudo[1121]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:23 hacker volumio[975]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:23 hacker volumio[975]: info: ___________ START PLUGINS ___________ Jun 11 04:54:23 hacker volumio[975]: info: ControllerMpd::onStart: Initializing MPD Jun 11 04:54:23 hacker volumio[975]: info: Creating MPD Configuration file Jun 11 04:54:23 hacker systemd[1]: Listening on mpd.socket. Jun 11 04:54:23 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:23 hacker volumio[975]: info: [1718078063624] CoreMusicLibrary::Adding element Media Servers Jun 11 04:54:23 hacker sudo[1129]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:23 hacker sudo[1129]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:23 hacker sudo[1129]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:23 hacker sudo[1132]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:23 hacker sudo[1132]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:23 hacker systemd[1]: mpd.service: Control process exited, code=killed, status=15/TERM Jun 11 04:54:23 hacker systemd[1]: mpd.service: Succeeded. Jun 11 04:54:23 hacker systemd[1]: Stopped Music Player Daemon. Jun 11 04:54:23 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:23 hacker volumio[975]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:23 hacker volumio[975]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:23 hacker volumio[975]: info: [1718078063749] CoreMusicLibrary::Adding element Last_100 Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:23 hacker volumio[975]: info: [1718078063753] CoreMusicLibrary::Adding element Webradio Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:23 hacker volumio[975]: info: Initializing BBC Radios Jun 11 04:54:23 hacker sudo[1138]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log Jun 11 04:54:23 hacker sudo[1138]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:23 hacker sudo[1138]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory Jun 11 04:54:23 hacker sudo[1138]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:23 hacker volumio[975]: info: [1718078063843] CoreMusicLibrary::Adding element Bandcamp Discover Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:23 hacker volumio[975]: Cannot find translation for source Bandcamp Discover Jun 11 04:54:23 hacker volumio[975]: info: Loading i18n strings for locale en Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , updateALSAConfigFile Jun 11 04:54:23 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:23 hacker volumio[975]: info: FusionDsp - mixtype--------------------- Hardware Jun 11 04:54:23 hacker volumio[975]: info: Volumio Calling Home Jun 11 04:54:23 hacker volumio[975]: info: Preparing to generate the ALSA configuration file Jun 11 04:54:24 hacker volumio[975]: info: Discovery: adding 2c059fac-910b-4553-9975-724a0b682124 Jun 11 04:54:24 hacker volumio[975]: info: Discovery: Found device Hacker Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::volumioGetState Jun 11 04:54:24 hacker volumio[975]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:24 hacker volumio[975]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf Jun 11 04:54:24 hacker volumio[975]: info: Reading ALSA contributions from plugins. Jun 11 04:54:24 hacker volumio[975]: info: MPD Permissions set Jun 11 04:54:24 hacker volumio[975]: info: MPD Permissions set Jun 11 04:54:24 hacker volumio[975]: verbose: New Socket.io Connection to localhost:3000 from 127.0.0.1 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 3 Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: VolumeController:: Volume=79 Mute =false Jun 11 04:54:24 hacker volumio[975]: info: CoreStateMachine::pushState Jun 11 04:54:24 hacker volumio[975]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:24 hacker volumio[975]: info: Volumio called home Jun 11 04:54:24 hacker volumio[975]: info: Starting Shairport Sync Jun 11 04:54:24 hacker volumio[975]: info: Starting Shairport Sync Jun 11 04:54:24 hacker volumio[975]: info: Starting Shairport Sync Jun 11 04:54:24 hacker sudo[1168]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:24 hacker sudo[1168]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:24 hacker sudo[1170]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:24 hacker sudo[1170]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:24 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:24 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:24 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:24 hacker sudo[1173]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:24 hacker sudo[1173]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::volumioGetState Jun 11 04:54:24 hacker volumio[975]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:24 hacker volumio[975]: info: Asound.conf file unchanged, so no further update is needed Jun 11 04:54:24 hacker volumio[975]: info: Output device has changed, restarting MPD Jun 11 04:54:24 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:24 hacker sudo[1168]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:24 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:24 hacker systemd[1]: shairport-sync.service: Main process exited, code=killed, status=15/TERM Jun 11 04:54:24 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:24 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:24 hacker volumio[975]: info: Output device has changed, restarting Shairport Sync Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:24 hacker sudo[1178]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:24 hacker sudo[1178]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:24 hacker sudo[1178]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:24 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:24 hacker sudo[1170]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:24 hacker sudo[1173]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:24 hacker sudo[1180]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:24 hacker sudo[1180]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:24 hacker systemd[1]: mpd.service: Main process exited, code=killed, status=15/TERM Jun 11 04:54:24 hacker systemd[1]: mpd.service: Succeeded. Jun 11 04:54:24 hacker systemd[1]: Stopped Music Player Daemon. Jun 11 04:54:24 hacker volumio[975]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:24 hacker volumio[975]: info: Discovery: adding 938cc0b6-0f9c-44ba-aa1d-b67b2b391b23 Jun 11 04:54:24 hacker volumio[975]: info: Discovery: Found device TiVolumio Jun 11 04:54:24 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:24 hacker volumio[975]: info: Discovery: Connecting to remote: 192.168.178.98 Jun 11 04:54:24 hacker volumio[975]: info: MPD Permissions set Jun 11 04:54:24 hacker volumio[975]: info: Shairport-Sync Started Jun 11 04:54:24 hacker volumio[975]: Error adding Membership: Error: addMembership EINVAL Jun 11 04:54:24 hacker volumio[975]: info: Shairport-Sync Started Jun 11 04:54:24 hacker volumio[975]: info: Shairport-Sync Started Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio-remote-updater[628]: [2024-06-11 04:54:24] [connect] Successful connection Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:24 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:24 hacker volumio-remote-updater[628]: [2024-06-11 04:54:24] [connect] WebSocket Connection 127.0.0.1:3000 v-2 "WebSocket++/0.8.2" /socket.io/?EIO=4&transport=websocket&t=1718078064 101 Jun 11 04:54:24 hacker volumio[975]: verbose: New Socket.io Connection to 127.0.0.1:3000 from 127.0.0.1 UA: WebSocket++/0.8.2 Engine version: 4 Transport: websocket Total Clients: 4 Jun 11 04:54:24 hacker volumio[975]: info: Starting Shairport Sync Jun 11 04:54:24 hacker sudo[1188]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log Jun 11 04:54:24 hacker sudo[1188]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:24 hacker sudo[1188]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory Jun 11 04:54:24 hacker sudo[1188]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:24 hacker sudo[1197]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:24 hacker sudo[1197]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:24 hacker volumio[975]: info: Discovery: Connected to remote: 192.168.178.98 Jun 11 04:54:24 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:24 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:24 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:24 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:25 hacker sudo[1197]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:25 hacker volumio[975]: info: Shairport-Sync Started Jun 11 04:54:25 hacker volumio[975]: info: camilladsp spawned new process with pid undefined, instance 1, run: true Jun 11 04:54:25 hacker volumio[975]: info: camilladsp service started and running in background, instance 1 Jun 11 04:54:25 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[975]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found Jun 11 04:54:25 hacker volumio[975]: error: FusionDsp - ----Hw detection failed :Error: Command failed: /data/plugins/audio_interface/fusiondsp/hw_params volumioHw >/data/configuration/audio_interface/fusiondsp/hwinfo.json Jun 11 04:54:25 hacker volumio[975]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found Jun 11 04:54:25 hacker volumio[975]: info: FusionDsp loaded Jun 11 04:54:25 hacker volumio[975]: info: CoreCommandRouter::executeOnPlugin: network , getCachedIPAddresses Jun 11 04:54:25 hacker sudo[1212]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl start fusiondsp.service Jun 11 04:54:25 hacker sudo[1212]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:25 hacker volumio[975]: info: FusionDsp - Reporting Fusion DSP Enabled Jun 11 04:54:25 hacker volumio[975]: info: Adding Signal Path Element [object Object] Jun 11 04:54:25 hacker volumio[975]: info: Adding fusiondspeq DSP Signal Path Element Jun 11 04:54:25 hacker volumio[975]: info: FusionDsp - ---- installed callbackRead Jun 11 04:54:25 hacker volumio[975]: |||||||||||||||||||||||| WARNING: FATAL ERROR ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| Jun 11 04:54:25 hacker sudo[1212]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker volumio[975]: Error: spawn /data/plugins/audio_interface/fusiondsp/camilladsp ENOENT Jun 11 04:54:26 hacker volumio[975]: at Process.ChildProcess._handle.onexit (internal/child_process.js:269:19) Jun 11 04:54:26 hacker volumio[975]: at onErrorNT (internal/child_process.js:465:16) Jun 11 04:54:26 hacker volumio[975]: at processTicksAndRejections (internal/process/task_queues.js:80:21) { Jun 11 04:54:26 hacker volumio[975]: errno: -2, Jun 11 04:54:26 hacker volumio[975]: code: 'ENOENT', Jun 11 04:54:26 hacker volumio[975]: syscall: 'spawn /data/plugins/audio_interface/fusiondsp/camilladsp', Jun 11 04:54:26 hacker volumio[975]: path: '/data/plugins/audio_interface/fusiondsp/camilladsp', Jun 11 04:54:26 hacker volumio[975]: spawnargs: [ Jun 11 04:54:26 hacker volumio[975]: '-p', Jun 11 04:54:26 hacker volumio[975]: 9876, Jun 11 04:54:26 hacker volumio[975]: '-o', Jun 11 04:54:26 hacker volumio[975]: '/tmp/camilladsp.log', Jun 11 04:54:26 hacker volumio[975]: '-l', Jun 11 04:54:26 hacker volumio[975]: 'warn', Jun 11 04:54:26 hacker volumio[975]: '/data/configuration/audio_interface/fusiondsp/camilladsp.yml' Jun 11 04:54:26 hacker volumio[975]: ] Jun 11 04:54:26 hacker volumio[975]: } Jun 11 04:54:26 hacker volumio[975]: ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| Jun 11 04:54:26 hacker sudo[1223]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/journalctl --since=2024-06-11 04:53 Jun 11 04:54:26 hacker sudo[1223]: pam_unix(sudo:session): session opened for user root by (uid=0) PRETTY_NAME="Raspbian GNU/Linux 10 (buster)" NAME="Raspbian GNU/Linux" VERSION_ID="10" VERSION="10 (buster)" VERSION_CODENAME=buster ID=raspbian ID_LIKE=debian HOME_URL="http://www.raspbian.org/" SUPPORT_URL="http://www.raspbian.org/RaspbianForums" BUG_REPORT_URL="http://www.raspbian.org/RaspbianBugs" VOLUMIO_BUILD_VERSION="4b122b2365bb8c09786cd63b50d1ea6db780eb4e" VOLUMIO_FE_VERSION="e7cae168f9927391640a091813b8a9656b6909b6" VOLUMIO_FE3_VERSION="df82a8f23c90a3617c15c55572c8aaea90d8b32a" VOLUMIO_BE_VERSION="49f98390f2d84c6549f33dc85b694fbd99e4c720" VOLUMIO_ARCH="arm" VOLUMIO_VARIANT="volumio" VOLUMIO_TEST="FALSE" VOLUMIO_BUILD_DATE="Tue 04 Jun 2024 08:41:12 PM CEST" VOLUMIO_VERSION="3.703" VOLUMIO_HARDWARE="pi" VOLUMIO_DEVICENAME="Raspberry Pi" VOLUMIO_HASH="8e78a6e3f56f1bcbbd1760812129a8e9"