-- Logs begin at Thu 2019-02-14 10:12:00 GMT, end at Tue 2024-06-11 04:54:22 BST. -- Jun 11 04:53:45 hacker kernel: usb 1-1.1: New USB device found, idVendor=0424, idProduct=2514, bcdDevice= b.b3 Jun 11 04:53:45 hacker kernel: usb 1-1.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Jun 11 04:53:45 hacker kernel: hub 1-1.1:1.0: USB hub found Jun 11 04:53:45 hacker kernel: hub 1-1.1:1.0: 3 ports detected Jun 11 04:53:45 hacker kernel: fuse: init (API version 7.37) Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: new high-speed USB device number 4 using dwc_otg Jun 11 04:53:45 hacker kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jun 11 04:53:45 hacker kernel: usbcore: registered new interface driver uas Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: New USB device found, idVendor=2357, idProduct=0120, bcdDevice= 2.00 Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: Product: 802.11ac WLAN Adapter Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: Manufacturer: Realtek Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: SerialNumber: 00e04c000001 Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: new high-speed USB device number 5 using dwc_otg Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: New USB device found, idVendor=0424, idProduct=7800, bcdDevice= 3.00 Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Jun 11 04:53:45 hacker kernel: lan78xx 1-1.1.1:1.0 (unnamed net_device) (uninitialized): No External EEPROM. Setting MAC Speed Jun 11 04:53:45 hacker kernel: lan78xx 1-1.1.1:1.0 (unnamed net_device) (uninitialized): int urb period 64 Jun 11 04:53:45 hacker kernel: FAT-fs (mmcblk0p1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p2): recovery complete Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p2): mounted filesystem with ordered data mode. Quota mode: none. Jun 11 04:53:45 hacker kernel: loop0: detected capacity change from 0 to 979240 Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p3): recovery complete Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p3): mounted filesystem with ordered data mode. Quota mode: none. Jun 11 04:53:45 hacker systemd[1]: System time before build time, advancing clock. Jun 11 04:53:45 hacker kernel: NET: Registered PF_INET6 protocol family Jun 11 04:53:45 hacker kernel: Segment Routing with IPv6 Jun 11 04:53:45 hacker kernel: In-situ OAM (IOAM) with IPv6 Jun 11 04:53:45 hacker systemd[1]: systemd 241 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN -PCRE2 default-hierarchy=hybrid) Jun 11 04:53:45 hacker systemd[1]: Detected architecture arm. Jun 11 04:53:45 hacker systemd[1]: Set hostname to . Jun 11 04:53:45 hacker systemd[1]: /lib/systemd/system/winbind.service:8: PIDFile= references path below legacy directory /var/run/, updating /var/run/samba/winbindd.pid → /run/samba/winbindd.pid; please update the unit file accordingly. Jun 11 04:53:45 hacker systemd[1]: Created slice system-getty.slice. Jun 11 04:53:45 hacker systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jun 11 04:53:45 hacker systemd[1]: Listening on Journal Audit Socket. Jun 11 04:53:45 hacker systemd[1]: Created slice system-systemd\x2dfsck.slice. Jun 11 04:53:45 hacker systemd[1]: Listening on fsck to fsckd communication Socket. Jun 11 04:53:45 hacker systemd[1]: Listening on Journal Socket. Jun 11 04:53:45 hacker kernel: i2c_dev: i2c /dev entries driver Jun 11 04:53:45 hacker systemd-journald[304]: Journal started Jun 11 04:53:45 hacker systemd-journald[304]: Runtime journal (/run/log/journal/8ae31a5258af32ecbc8d1a0d62a2178b) is 7.5M, max 30.0M, 22.5M free. Jun 11 04:53:45 hacker systemd-modules-load[301]: Inserted module 'i2c_dev' Jun 11 04:53:45 hacker fake-hwclock[311]: Tue Jun 11 03:53:45 UTC 2024 Jun 11 04:53:45 hacker systemd[1]: Started Load/Save Random Seed. Jun 11 04:53:45 hacker systemd[1]: dynamicswap.service: Succeeded. Jun 11 04:53:45 hacker systemd[1]: Started Create System Users. Jun 11 04:53:45 hacker systemd[1]: Starting Create Static Device Nodes in /dev... Jun 11 04:53:45 hacker systemd[1]: Started udev Coldplug all Devices. Jun 11 04:53:45 hacker systemd[1]: Starting Helper to synchronize boot up for ifupdown... Jun 11 04:53:45 hacker systemd[1]: Started Helper to synchronize boot up for ifupdown. Jun 11 04:53:45 hacker systemd[1]: Started Create Static Device Nodes in /dev. Jun 11 04:53:45 hacker systemd[1]: Starting udev Kernel Device Manager... Jun 11 04:53:45 hacker systemd[1]: Reached target Local File Systems (Pre). Jun 11 04:53:45 hacker systemd[1]: var-log.mount: Directory /var/log to mount over is not empty, mounting anyway. Jun 11 04:53:45 hacker systemd[1]: Mounting /var/log... Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups... Jun 11 04:53:45 hacker systemd[1]: tmp.mount: Directory /tmp to mount over is not empty, mounting anyway. Jun 11 04:53:45 hacker systemd[1]: Mounting /tmp... Jun 11 04:53:45 hacker systemd[1]: Mounted /var/log. Jun 11 04:53:45 hacker systemd[1]: Starting Flush Journal to Persistent Storage... Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups. Jun 11 04:53:45 hacker systemd[1]: Mounted /tmp. Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups/tmp... Jun 11 04:53:45 hacker systemd-udevd[341]: Network interface NamePolicy= disabled on kernel command line, ignoring. Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups/tmp. Jun 11 04:53:45 hacker systemd-journald[304]: Runtime journal (/run/log/journal/8ae31a5258af32ecbc8d1a0d62a2178b) is 7.5M, max 30.0M, 22.5M free. Jun 11 04:53:45 hacker systemd[1]: Started udev Kernel Device Manager. Jun 11 04:53:45 hacker systemd[1]: Started Flush Journal to Persistent Storage. Jun 11 04:53:45 hacker systemd[1]: Starting Show Plymouth Boot Screen... Jun 11 04:53:45 hacker systemd[1]: plymouth-start.service: Succeeded. Jun 11 04:53:45 hacker systemd[1]: Started Show Plymouth Boot Screen. Jun 11 04:53:45 hacker systemd[1]: Started Forward Password Requests to Plymouth Directory Watch. Jun 11 04:53:45 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped. Jun 11 04:53:45 hacker systemd[1]: Reached target Local Encrypted Volumes. Jun 11 04:53:45 hacker systemd[1]: Reached target Paths. Jun 11 04:53:45 hacker kernel: rpi-gpiomem 3f200000.gpiomem: window base 0x3f200000 size 0x00001000 Jun 11 04:53:45 hacker kernel: rpi-gpiomem 3f200000.gpiomem: initialised 1 regions as /dev/gpiomem Jun 11 04:53:45 hacker kernel: vc_sm_cma: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:45 hacker kernel: bcm2835_vc_sm_cma_probe: Videocore shared memory driver Jun 11 04:53:45 hacker kernel: [vc_sm_connected_init]: start Jun 11 04:53:45 hacker kernel: [vc_sm_connected_init]: installed successfully Jun 11 04:53:45 hacker kernel: mc: Linux media interface: v0.10 Jun 11 04:53:46 hacker kernel: videodev: Linux video capture interface: v2.00 Jun 11 04:53:46 hacker kernel: Bluetooth: Core ver 2.22 Jun 11 04:53:46 hacker kernel: NET: Registered PF_BLUETOOTH protocol family Jun 11 04:53:46 hacker kernel: Bluetooth: HCI device and connection manager initialized Jun 11 04:53:46 hacker kernel: Bluetooth: HCI socket layer initialized Jun 11 04:53:46 hacker kernel: Bluetooth: L2CAP socket layer initialized Jun 11 04:53:46 hacker kernel: Bluetooth: SCO socket layer initialized Jun 11 04:53:46 hacker systemd[1]: Found device /dev/disk/by-uuid/815B-E7CF. Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART driver ver 2.3 Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART protocol H4 registered Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART protocol Three-wire (H5) registered Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART protocol Broadcom registered Jun 11 04:53:46 hacker kernel: hci_uart_bcm serial0-0: supply vbat not found, using dummy regulator Jun 11 04:53:46 hacker kernel: hci_uart_bcm serial0-0: supply vddio not found, using dummy regulator Jun 11 04:53:46 hacker kernel: bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: uart-pl011 3f201000.serial: no DMA platform data Jun 11 04:53:46 hacker systemd[1]: Starting File System Check on /dev/disk/by-uuid/815B-E7CF... Jun 11 04:53:46 hacker kernel: snd_bcm2835: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: snd_bcm2835: unknown parameter 'enable_compat_alsa' ignored Jun 11 04:53:46 hacker systemd[1]: Started File System Check Daemon to report status. Jun 11 04:53:46 hacker kernel: bcm2835_v4l2: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM: chip id 107 Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM: features 0x2f Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM4345C0 Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0000 Jun 11 04:53:46 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels Jun 11 04:53:47 hacker kernel: bcm2835_isp: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM4345C0 'brcm/BCM4345C0.hcd' Patch Jun 11 04:53:47 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels Jun 11 04:53:47 hacker kernel: bcm2835_codec: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video10 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 decode Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video13 Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video14 Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video15 Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video16 Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video11 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video20 Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video21 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video12 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 isp Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video22 Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video23 Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Loaded V4L2 bcm2835-isp Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video18 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 image_fx Jun 11 04:53:47 hacker kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video31 Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode_image Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'benh@debian.org: 577e021cb980e0e820821ba7b54b4961b8b4fadf' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'romain.perier@gmail.com: 3abbc6ec146e09d1b6016ab9d6cf71dd233f0328' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Jun 11 04:53:47 hacker systemd-fsck[397]: fsck.fat 4.1 (2017-01-24) Jun 11 04:53:47 hacker systemd-fsck[397]: 0x25: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Jun 11 04:53:47 hacker systemd-fsck[397]: Automatically removing dirty bit. Jun 11 04:53:47 hacker systemd-fsck[397]: Performing changes. Jun 11 04:53:47 hacker systemd-fsck[397]: /dev/mmcblk0p1: 456 files, 34026/46774 clusters Jun 11 04:53:47 hacker systemd[1]: Started File System Check on /dev/disk/by-uuid/815B-E7CF. Jun 11 04:53:47 hacker systemd[1]: Mounting /boot... Jun 11 04:53:47 hacker systemd[1]: Mounted /boot. Jun 11 04:53:47 hacker systemd[1]: Reached target Local File Systems. Jun 11 04:53:47 hacker systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped. Jun 11 04:53:47 hacker systemd[1]: Starting Preprocess NFS configuration... Jun 11 04:53:47 hacker systemd[1]: Starting Raise network interfaces... Jun 11 04:53:47 hacker systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... Jun 11 04:53:47 hacker systemd[1]: Starting Create Volatile Files and Directories... Jun 11 04:53:47 hacker systemd[1]: nfs-config.service: Succeeded. Jun 11 04:53:47 hacker systemd[1]: Started Preprocess NFS configuration. Jun 11 04:53:47 hacker systemd[1]: Condition check resulted in RPC security service for NFS client and server being skipped. Jun 11 04:53:47 hacker systemd[1]: Condition check resulted in RPC security service for NFS server being skipped. Jun 11 04:53:47 hacker systemd[1]: Reached target NFS client services. Jun 11 04:53:47 hacker systemd[1]: Received SIGRTMIN+20 from PID 191 (plymouthd). Jun 11 04:53:47 hacker systemd[1]: plymouth-read-write.service: Succeeded. Jun 11 04:53:47 hacker systemd[1]: Started Tell Plymouth To Write Out Runtime Data. Jun 11 04:53:47 hacker kernel: brcmfmac: F1 signature read @0x18000000=0x15264345 Jun 11 04:53:47 hacker kernel: brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6 Jun 11 04:53:47 hacker kernel: usbcore: registered new interface driver brcmfmac Jun 11 04:53:47 hacker systemd-udevd[357]: Using default interface naming scheme 'v240'. Jun 11 04:53:47 hacker systemd-udevd[357]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:47 hacker ifup[447]: command failed: No such device (-19) Jun 11 04:53:47 hacker systemd[1]: Started Create Volatile Files and Directories. Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM: features 0x2f Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM43455 37.4MHz Raspberry Pi 3+ Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0342 Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM: Using default device address (43:45:c0:00:1f:ac) Jun 11 04:53:47 hacker systemd-udevd[356]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:47 hacker kernel: brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Nov 1 2021 00:37:25 version 7.45.241 (1a2f2fa CY) FWID 01-703fd60 Jun 11 04:53:48 hacker systemd-udevd[348]: Using default interface naming scheme 'v240'. Jun 11 04:53:48 hacker systemd-udevd[348]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:49 hacker systemd[1]: Started Raise network interfaces. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in 7800 being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in /sys/subsystem/net/devices/wlan0 being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Network Time Synchronization being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Huge Pages File System being skipped. Jun 11 04:53:49 hacker systemd[1]: Created slice system-bthelper.slice. Jun 11 04:53:49 hacker systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... Jun 11 04:53:49 hacker systemd[1]: Starting Show Plymouth Boot Screen... Jun 11 04:53:49 hacker systemd[1]: Started ifup for wlan0. Jun 11 04:53:49 hacker systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jun 11 04:53:49 hacker systemd[1]: Started ifup for eth0. Jun 11 04:53:49 hacker systemd[1]: Starting Update UTMP about System Boot/Shutdown... Jun 11 04:53:49 hacker systemd[1]: Started Entropy daemon using the HAVEGE algorithm. Jun 11 04:53:49 hacker systemd[1]: Starting RPC bind portmap service... Jun 11 04:53:49 hacker systemd[1]: plymouth-read-write.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Tell Plymouth To Write Out Runtime Data. Jun 11 04:53:49 hacker systemd[1]: Received SIGRTMIN+20 from PID 191 (plymouthd). Jun 11 04:53:49 hacker systemd[1]: Starting Load/Save RF Kill Switch Status... Jun 11 04:53:49 hacker systemd[1]: plymouth-start.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Show Plymouth Boot Screen. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped. Jun 11 04:53:49 hacker systemd[1]: Started Update UTMP about System Boot/Shutdown. Jun 11 04:53:49 hacker systemd[1]: Reached target System Initialization. Jun 11 04:53:49 hacker systemd[1]: apt-daily.timer: Not using persistent file timestamp Sat 2024-07-06 10:53:33 BST as it is in the future. Jun 11 04:53:49 hacker systemd[1]: Started Daily apt download activities. Jun 11 04:53:49 hacker systemd[1]: apt-daily-upgrade.timer: Not using persistent file timestamp Sat 2024-07-06 10:53:33 BST as it is in the future. Jun 11 04:53:49 hacker systemd[1]: Started Daily apt upgrade and clean activities. Jun 11 04:53:49 hacker systemd[1]: Started Daily Cleanup of Temporary Directories. Jun 11 04:53:49 hacker systemd[1]: Reached target Timers. Jun 11 04:53:49 hacker systemd[1]: Listening on D-Bus System Message Bus Socket. Jun 11 04:53:49 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:49 hacker systemd[1]: Listening on triggerhappy.socket. Jun 11 04:53:49 hacker systemd[1]: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. Jun 11 04:53:49 hacker systemd[1]: Reached target Sockets. Jun 11 04:53:49 hacker systemd[1]: Reached target Basic System. Jun 11 04:53:49 hacker systemd[1]: Started D-Bus System Message Bus. Jun 11 04:53:49 hacker systemd[1]: Started UPnP Renderer front-end to MPD. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in getty on tty2-tty6 if dbus and logind are not available being skipped. Jun 11 04:53:50 hacker systemd[1]: Started volumio-remote-updater.service. Jun 11 04:53:50 hacker kernel: 8021q: 802.1Q VLAN Support v1.8 Jun 11 04:53:50 hacker systemd[1]: Starting Login Service... Jun 11 04:53:50 hacker systemd[1]: Starting triggerhappy global hotkey daemon... Jun 11 04:53:50 hacker systemd[1]: Starting WPA supplicant... Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Volumio SSH enabler being skipped. Jun 11 04:53:50 hacker systemd[1]: Started Manage Sound Card State (restore and store). Jun 11 04:53:50 hacker alsactl[634]: alsactl 1.1.8 daemon started Jun 11 04:53:50 hacker systemd[1]: Started Volumio Log Rotation Service. Jun 11 04:53:50 hacker systemd[1]: Starting Configure Bluetooth Modems connected by UART... Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line: Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line: KEY_MIN_INTERESTING 1 /usr/local/bin/volumio volume toggle Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line: Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line: Jun 11 04:53:50 hacker thd[632]: Found socket passed from systemd Jun 11 04:53:50 hacker systemd[1]: Starting Save/Restore Sound Card State... Jun 11 04:53:50 hacker systemd[1]: Starting Wireless Services... Jun 11 04:53:50 hacker systemd[1]: Starting Avahi mDNS/DNS-SD Stack... Jun 11 04:53:50 hacker systemd[1]: Started Volumio Iptables Module. Jun 11 04:53:50 hacker systemd[1]: Started Load/Save RF Kill Switch Status. Jun 11 04:53:50 hacker systemd[1]: Started RPC bind portmap service. Jun 11 04:53:50 hacker systemd[1]: Started triggerhappy global hotkey daemon. Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems (Pre). Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems. Jun 11 04:53:50 hacker systemd[1]: Starting LSB: Load kernel modules needed to enable cpufreq scaling... Jun 11 04:53:50 hacker systemd[1]: Reached target RPC Port Mapper. Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Copy user wpa_supplicant.conf being skipped. Jun 11 04:53:50 hacker systemd[1]: Starting dhcpcd on all interfaces... Jun 11 04:53:50 hacker systemd-logind[630]: New seat seat0. Jun 11 04:53:50 hacker sh[567]: wlan0=wlan0 Jun 11 04:53:50 hacker dhcpcd[653]: Not running dhcpcd because /etc/network/interfaces Jun 11 04:53:50 hacker dhcpcd[653]: defines some interfaces that will use a Jun 11 04:53:50 hacker dhcpcd[653]: DHCP client or static address Jun 11 04:53:50 hacker avahi-daemon[641]: Found user 'avahi' (UID 110) and group 'avahi' (GID 113). Jun 11 04:53:50 hacker avahi-daemon[641]: Successfully dropped root privileges. Jun 11 04:53:50 hacker avahi-daemon[641]: avahi-daemon 0.7 starting up. Jun 11 04:53:51 hacker systemd[1]: Started Login Service. Jun 11 04:53:51 hacker avahi-daemon[641]: Successfully called chroot(). Jun 11 04:53:51 hacker avahi-daemon[641]: Successfully dropped remaining capabilities. Jun 11 04:53:51 hacker systemd[1]: hciuart.service: Succeeded. Jun 11 04:53:51 hacker wpa_supplicant[633]: Successfully initialized wpa_supplicant Jun 11 04:53:51 hacker avahi-daemon[641]: Loading service file /services/volumio.service. Jun 11 04:53:51 hacker systemd[1]: Started Configure Bluetooth Modems connected by UART. Jun 11 04:53:51 hacker systemd[1]: Started Save/Restore Sound Card State. Jun 11 04:53:51 hacker systemd[1]: dhcpcd.service: Control process exited, code=exited, status=6/NOTCONFIGURED Jun 11 04:53:51 hacker systemd[1]: dhcpcd.service: Failed with result 'exit-code'. Jun 11 04:53:51 hacker avahi-daemon[641]: Network interface enumeration completed. Jun 11 04:53:51 hacker systemd[1]: Failed to start dhcpcd on all interfaces. Jun 11 04:53:51 hacker avahi-daemon[641]: Server startup complete. Host name is hacker.local. Local service cookie is 6860304. Jun 11 04:53:51 hacker avahi-daemon[641]: Service "Hacker" (/services/volumio.service) successfully established. Jun 11 04:53:51 hacker sh[569]: eth0: waiting for carrier Jun 11 04:53:51 hacker dhcpcd[603]: eth0: waiting for carrier Jun 11 04:53:51 hacker kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Jun 11 04:53:51 hacker kernel: lan78xx 1-1.1.1:1.0 eth0: Link is Down Jun 11 04:53:51 hacker systemd[1]: Started Avahi mDNS/DNS-SD Stack. Jun 11 04:53:51 hacker systemd[1]: Started WPA supplicant. Jun 11 04:53:51 hacker systemd[1]: Reached target Network. Jun 11 04:53:51 hacker systemd[1]: Reached target Network is Online. Jun 11 04:53:51 hacker systemd[1]: Starting LSB: Brings up/down network automatically... Jun 11 04:53:51 hacker systemd[1]: Starting Network Time Service... Jun 11 04:53:51 hacker systemd[1]: Starting Samba NMB Daemon... Jun 11 04:53:51 hacker systemd[1]: Condition check resulted in fast remote file copy program daemon being skipped. Jun 11 04:53:51 hacker systemd[1]: Starting Permit User Sessions... Jun 11 04:53:51 hacker systemd[1]: Starting OpenBSD Secure Shell server... Jun 11 04:53:51 hacker systemd[1]: Starting /etc/rc.local Compatibility... Jun 11 04:53:51 hacker systemd[1]: Reached target Sound Card. Jun 11 04:53:51 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:53:51 hacker systemd[1]: Starting Raspberry Pi bluetooth helper... Jun 11 04:53:51 hacker systemd[1]: Started /etc/rc.local Compatibility. Jun 11 04:53:51 hacker systemd[1]: Started Permit User Sessions. Jun 11 04:53:51 hacker systemd[1]: Starting Terminate Plymouth Boot Screen... Jun 11 04:53:52 hacker systemd[1]: Starting Hold until boot process finishes up... Jun 11 04:53:52 hacker volumio-remote-updater[626]: Error: No active session Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 191 (plymouthd). Jun 11 04:53:52 hacker volumio-remote-updater[626]: [2024-06-11 04:53:52] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:53:52 hacker volumio-remote-updater[626]: [2024-06-11 04:53:52] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:53:52 hacker volumio-remote-updater[626]: [2024-06-11 04:53:52] [error] handle_connect error: Underlying Transport Error Jun 11 04:53:52 hacker bthelper[718]: Raspberry Pi BDADDR already set Jun 11 04:53:52 hacker systemd[1]: Started Raspberry Pi bluetooth helper. Jun 11 04:53:52 hacker loadcpufreq[652]: Loading cpufreq kernel modules...done (none). Jun 11 04:53:52 hacker systemd[1]: Starting Bluetooth service... Jun 11 04:53:52 hacker systemd[1]: Started LSB: Load kernel modules needed to enable cpufreq scaling. Jun 11 04:53:52 hacker systemd[1]: plymouth-quit.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Started Terminate Plymouth Boot Screen. Jun 11 04:53:52 hacker systemd[1]: plymouth-quit-wait.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Started Hold until boot process finishes up. Jun 11 04:53:52 hacker ifplugd(eth0)[766]: ifplugd 0.28 initializing. Jun 11 04:53:52 hacker ifplugd(eth0)[766]: Using interface eth0/B8:27:EB:AD:38:72 with driver (version: 6.1.77-v7+) Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 191 (n/a). Jun 11 04:53:52 hacker systemd[1]: Started Getty on tty1. Jun 11 04:53:52 hacker systemd[1]: Reached target Login Prompts. Jun 11 04:53:52 hacker ifplugd(eth0)[766]: Using detection mode: SIOCETHTOOL Jun 11 04:53:52 hacker ifplugd(eth0)[766]: Initialization complete, link beat not detected. Jun 11 04:53:52 hacker systemd[1]: Starting LSB: set CPUFreq kernel parameters... Jun 11 04:53:52 hacker ntpd[704]: ntpd 4.2.8p12@1.3728-o (1): Starting Jun 11 04:53:52 hacker ntpd[704]: Command line: /usr/sbin/ntpd -p /var/run/ntpd.pid -g -u 103:103 Jun 11 04:53:52 hacker systemd[1]: Started Network Time Service. Jun 11 04:53:52 hacker volumio[625]: Could not open config: /tmp/upmpdcli.conf Jun 11 04:53:52 hacker ntpd[770]: proto: precision = 1.407 usec (-19) Jun 11 04:53:52 hacker ifplugd[699]: Network Interface Plugging Daemon...start eth0...done. Jun 11 04:53:52 hacker systemd[1]: Started LSB: Brings up/down network automatically. Jun 11 04:53:52 hacker ntpd[770]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): good hash signature Jun 11 04:53:52 hacker ntpd[770]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): loaded, expire=2024-12-28T00:00:00Z last=2017-01-01T00:00:00Z ofs=37 Jun 11 04:53:52 hacker ntpd[770]: Listen and drop on 0 v6wildcard [::]:123 Jun 11 04:53:52 hacker ntpd[770]: Listen and drop on 1 v4wildcard 0.0.0.0:123 Jun 11 04:53:52 hacker ntpd[770]: Listen normally on 2 lo 127.0.0.1:123 Jun 11 04:53:52 hacker ntpd[770]: Listening on routing socket on fd #19 for interface updates Jun 11 04:53:52 hacker ntpd[770]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jun 11 04:53:52 hacker ntpd[770]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Main process exited, code=exited, status=1/FAILURE Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Failed with result 'exit-code'. Jun 11 04:53:52 hacker systemd[1]: iptables.service: Succeeded. Jun 11 04:53:52 hacker sshd[777]: Server listening on 0.0.0.0 port 22. Jun 11 04:53:52 hacker sshd[777]: Server listening on :: port 22. Jun 11 04:53:52 hacker systemd[1]: Started OpenBSD Secure Shell server. Jun 11 04:53:52 hacker cpufrequtils[769]: CPUFreq Utilities: Setting ondemand CPUFreq governor...CPU0...CPU1...CPU2...CPU3...done. Jun 11 04:53:52 hacker systemd[1]: Started LSB: set CPUFreq kernel parameters. Jun 11 04:53:52 hacker bluetoothd[758]: Bluetooth daemon 5.50 Jun 11 04:53:52 hacker bluetoothd[758]: Unknown key AutoConnectTimeout for group General in /etc/bluetooth/main.conf Jun 11 04:53:52 hacker systemd[1]: Started Bluetooth service. Jun 11 04:53:52 hacker systemd[1]: Reached target Bluetooth. Jun 11 04:53:53 hacker bluetoothd[758]: Starting SDP server Jun 11 04:53:53 hacker bluetoothd[758]: Excluding (cli) sap Jun 11 04:53:53 hacker haveged[578]: haveged: ver: 1.9.1; arch: generic; vend: ; build: (gcc 8.2.0 CTV); collect: 128K Jun 11 04:53:53 hacker haveged[578]: haveged: cpu: (VC); data: 16K (D); inst: 16K (D); idx: 11/40; sz: 14768/63488 Jun 11 04:53:53 hacker haveged[578]: haveged: tot tests(BA8): A:1/1 B:1/1 continuous tests(B): last entropy estimate 8.00283 Jun 11 04:53:53 hacker haveged[578]: haveged: fills: 0, generated: 0 Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP filters: protocol multicast Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP socket layer initialized Jun 11 04:53:53 hacker bluetoothd[758]: Bluetooth management interface 1.22 initialized Jun 11 04:53:53 hacker dbus-daemon[618]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.5' (uid=0 pid=758 comm="/usr/lib/bluetooth/bluetoothd --noplugin=sap ") Jun 11 04:53:53 hacker kernel: Bluetooth: MGMT ver 1.22 Jun 11 04:53:53 hacker bluetoothd[758]: Failed to set privacy: Rejected (0x0b) Jun 11 04:53:53 hacker systemd[1]: Starting Hostname Service... Jun 11 04:53:53 hacker ntpd[770]: error resolving pool 0.debian.pool.ntp.org: System error (-11) Jun 11 04:53:53 hacker dbus-daemon[618]: [system] Successfully activated service 'org.freedesktop.hostname1' Jun 11 04:53:53 hacker systemd[1]: Started Hostname Service. Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.769463, 0] ../source3/nmbd/asyncdns.c:158(start_async_dns) Jun 11 04:53:53 hacker nmbd[726]: started asyncdns process 796 Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.771879, 0] ../lib/util/become_daemon.c:149(daemon_status) Jun 11 04:53:53 hacker nmbd[726]: daemon_status: STATUS=daemon 'nmbd' : No local IPv4 non-loopback interfaces available, waiting for interface ... Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.772078, 0] ../source3/nmbd/nmbd_subnetdb.c:254(create_subnets) Jun 11 04:53:53 hacker nmbd[726]: NOTE: NetBIOS name resolution is not supported for Internet Protocol Version 6 (IPv6). Jun 11 04:53:54 hacker wireless.js[639]: Cleaning previous... Jun 11 04:53:54 hacker sudo[804]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0 Jun 11 04:53:54 hacker sudo[804]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:54 hacker sudo[804]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:54 hacker sudo[806]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down Jun 11 04:53:54 hacker sudo[806]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:54 hacker ntpd[770]: error resolving pool 1.debian.pool.ntp.org: System error (-11) Jun 11 04:53:54 hacker systemd[1]: systemd-rfkill.service: Succeeded. Jun 11 04:53:54 hacker sudo[806]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:54 hacker wireless.js[639]: Stopped aP Jun 11 04:53:55 hacker sudo[813]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:55 hacker sudo[813]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:55 hacker sudo[813]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker sudo[815]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg get Jun 11 04:53:55 hacker sudo[815]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker sudo[815]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker sudo[822]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:55 hacker sudo[822]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker sudo[822]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker sudo[824]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw wlan0 scan Jun 11 04:53:55 hacker sudo[824]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker ntpd[770]: error resolving pool 2.debian.pool.ntp.org: System error (-11) Jun 11 04:53:56 hacker ntpd[770]: error resolving pool 3.debian.pool.ntp.org: System error (-11) Jun 11 04:53:57 hacker volumio-remote-updater[626]: [2024-06-11 04:53:57] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:53:57 hacker volumio-remote-updater[626]: [2024-06-11 04:53:57] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:53:57 hacker volumio-remote-updater[626]: [2024-06-11 04:53:57] [error] handle_connect error: Underlying Transport Error Jun 11 04:53:57 hacker bthelper[718]: Changing power off succeeded Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Powered: no Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Discovering: no Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Class: 0x00000000 Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Class: 0x0000041c Jun 11 04:53:57 hacker bthelper[718]: Changing power on succeeded Jun 11 04:53:57 hacker sudo[824]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker wireless.js[639]: SETTING APPROPRIATE REG DOMAIN: GB Jun 11 04:53:57 hacker sudo[836]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:57 hacker sudo[836]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[836]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker sudo[838]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg set GB Jun 11 04:53:57 hacker sudo[838]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[838]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker wireless.js[639]: SUCCESSFULLY SET NEW REGDOMAIN: GB Jun 11 04:53:57 hacker wireless.js[639]: Start wireless flow Jun 11 04:53:57 hacker wireless.js[639]: Stopped hotspot (if there).. Jun 11 04:53:57 hacker sudo[843]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0 Jun 11 04:53:57 hacker sudo[843]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[843]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker sudo[845]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down Jun 11 04:53:57 hacker sudo[845]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:58 hacker sudo[845]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:58 hacker wireless.js[639]: DHCP IP Jun 11 04:53:58 hacker wireless.js[639]: Start ap Jun 11 04:53:58 hacker wpa_supplicant[847]: Successfully initialized wpa_supplicant Jun 11 04:53:58 hacker sudo[848]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/dhcpcd Jun 11 04:53:58 hacker sudo[848]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:58 hacker dhcpcd[849]: dev: loaded udev Jun 11 04:53:58 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:58 hacker dhcpcd-run-hooks[867]: wlan0: starting wpa_supplicant Jun 11 04:53:58 hacker dhcpcd-run-hooks[872]: wlan0: failed to start wpa_supplicant Jun 11 04:53:58 hacker dhcpcd-run-hooks[873]: wlan0: Successfully initialized wpa_supplicant nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Ma Jun 11 04:53:58 hacker dhcpcd[849]: wlan0: connected to Access Point `' Jun 11 04:53:58 hacker dhcpcd[849]: no interfaces have a carrier Jun 11 04:53:58 hacker dhcpcd[849]: forked to background, child pid 883 Jun 11 04:53:58 hacker dhcpcd[883]: eth0: waiting for carrier Jun 11 04:53:58 hacker dhcpcd[883]: wlan0: waiting for carrier Jun 11 04:53:58 hacker sudo[848]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:59 hacker wireless.js[639]: trying... Jun 11 04:53:59 hacker sudo[885]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:53:59 hacker sudo[885]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:59 hacker sudo[885]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:00 hacker wireless.js[639]: trying... Jun 11 04:54:00 hacker sudo[888]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:00 hacker sudo[888]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:00 hacker sudo[888]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:01 hacker wpa_supplicant[871]: wlan0: Trying to associate with SSID 'FRITZ!Box 7530 KO' Jun 11 04:54:01 hacker wireless.js[639]: trying... Jun 11 04:54:01 hacker sudo[891]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:01 hacker sudo[891]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:01 hacker sudo[891]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:02 hacker wireless.js[639]: trying... Jun 11 04:54:02 hacker sudo[894]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:02 hacker sudo[894]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:02 hacker sudo[894]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:03 hacker wireless.js[639]: trying... Jun 11 04:54:03 hacker sudo[897]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:03 hacker sudo[897]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:03 hacker sudo[897]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: carrier acquired Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: connected to Access Point `FRITZ!Box 7530 KO' Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: Associated with 98:9b:cb:b9:11:2f Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: CTRL-EVENT-CONNECTED - Connection to 98:9b:cb:b9:11:2f completed [id=0 id_str=] Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=GB Jun 11 04:54:03 hacker dhcpcd[883]: DUID 00:01:00:01:2a:34:d5:bb:b8:27:eb:ad:38:72 Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: IAID eb:f8:6d:27 Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: adding address fe80::145a:8513:d5a8:3d51 Jun 11 04:54:03 hacker dhcpcd[883]: ipv6_addaddr1: Permission denied Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: carrier lost Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: carrier acquired Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: IAID eb:f8:6d:27 Jun 11 04:54:04 hacker dhcpcd[883]: wlan0: rebinding lease of 192.168.178.85 Jun 11 04:54:04 hacker dhcpcd[883]: wlan0: probing address 192.168.178.85/24 Jun 11 04:54:04 hacker wireless.js[639]: trying... Jun 11 04:54:04 hacker sudo[912]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:04 hacker sudo[912]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:04 hacker sudo[912]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:04 hacker volumio-remote-updater[626]: [2024-06-11 04:54:04] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:54:04 hacker volumio-remote-updater[626]: [2024-06-11 04:54:04] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:54:04 hacker volumio-remote-updater[626]: [2024-06-11 04:54:04] [error] handle_connect error: Underlying Transport Error Jun 11 04:54:04 hacker dhcpcd[883]: wlan0: soliciting an IPv6 router Jun 11 04:54:05 hacker wireless.js[639]: trying... Jun 11 04:54:05 hacker sudo[915]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:05 hacker sudo[915]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:05 hacker sudo[915]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:06 hacker wireless.js[639]: trying... Jun 11 04:54:06 hacker sudo[918]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:06 hacker sudo[918]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:06 hacker sudo[918]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:07 hacker wireless.js[639]: trying... Jun 11 04:54:07 hacker sudo[921]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:07 hacker sudo[921]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:07 hacker sudo[921]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:08 hacker wireless.js[639]: trying... Jun 11 04:54:08 hacker sudo[924]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:08 hacker sudo[924]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:08 hacker sudo[924]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:09 hacker dhcpcd[883]: wlan0: leased 192.168.178.85 for 864000 seconds Jun 11 04:54:09 hacker avahi-daemon[641]: Joining mDNS multicast group on interface wlan0.IPv4 with address 192.168.178.85. Jun 11 04:54:09 hacker dhcpcd[883]: wlan0: adding route to 192.168.178.0/24 Jun 11 04:54:09 hacker dhcpcd[883]: wlan0: adding default route via 192.168.178.1 Jun 11 04:54:09 hacker avahi-daemon[641]: New relevant interface wlan0.IPv4 for mDNS. Jun 11 04:54:09 hacker avahi-daemon[641]: Registering new address record for 192.168.178.85 on wlan0.IPv4. Jun 11 04:54:09 hacker wireless.js[639]: trying... Jun 11 04:54:09 hacker sudo[948]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:09 hacker sudo[948]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:09 hacker sudo[948]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:09 hacker wireless.js[639]: Connected to: ----FRITZ!Box 7530 KO Jun 11 04:54:09 hacker wireless.js[639]: ---- Jun 11 04:54:09 hacker sudo[951]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 Jun 11 04:54:09 hacker sudo[951]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:09 hacker sudo[951]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:09 hacker wireless.js[639]: ... joined AP, wlan0 IPv4 is 192.168.178.85, ipV6 is undefined Jun 11 04:54:09 hacker wireless.js[639]: It's done! AP Jun 11 04:54:09 hacker systemd[1]: Started Wireless Services. Jun 11 04:54:09 hacker systemd[1]: Started Volumio Backend Module. Jun 11 04:54:09 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:54:09 hacker systemd[1]: Started Volumio Cpu Tweaker. Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: Setting RT Priority for mpd Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: pid 35's current scheduling policy: SCHED_OTHER Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: pid 35's current scheduling priority: 0 Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: Setting MPD Affinity Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: pid 3's current affinity mask: f Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: /bin/volumio_cpu_tweak: line 27: warning: command substitution: ignored null byte in input Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: VOLUMIO CPU TWEAK: Setting CPU Governor: performance Jun 11 04:54:09 hacker systemd[1]: volumio_cpu_tweak.service: Succeeded. Jun 11 04:54:10 hacker ntpd[770]: Listen normally on 3 wlan0 192.168.178.85:123 Jun 11 04:54:10 hacker ntpd[770]: new interface(s) found: waking up resolver Jun 11 04:54:12 hacker volumio[956]: info: ------------------------------------------- Jun 11 04:54:12 hacker volumio[956]: info: ----- Volumio3 ---- Jun 11 04:54:12 hacker volumio[956]: info: ------------------------------------------- Jun 11 04:54:12 hacker volumio[956]: info: ----- System startup ---- Jun 11 04:54:12 hacker volumio[956]: info: ------------------------------------------- Jun 11 04:54:13 hacker volumio[956]: info: MYVOLUMIO Environment detected Jun 11 04:54:13 hacker volumio[956]: info: Plugin folders cleanup Jun 11 04:54:13 hacker volumio[956]: info: Scanning into folder /volumio/app/plugins/ Jun 11 04:54:13 hacker volumio[956]: info: Scanning category audio_interface Jun 11 04:54:13 hacker volumio[956]: info: Scanning category miscellanea Jun 11 04:54:13 hacker volumio[956]: info: Scanning category music_service Jun 11 04:54:13 hacker volumio[956]: info: Scanning category plugins.json Jun 11 04:54:13 hacker volumio[956]: info: Scanning category system_controller Jun 11 04:54:13 hacker volumio[956]: info: Scanning category user_interface Jun 11 04:54:13 hacker volumio[956]: info: Scanning into folder /data/plugins/ Jun 11 04:54:13 hacker volumio[956]: info: Scanning category audio_interface Jun 11 04:54:13 hacker volumio[956]: info: Scanning category music_service Jun 11 04:54:13 hacker volumio[956]: info: Plugin folders cleanup completed Jun 11 04:54:13 hacker volumio[956]: info: ------------------------------------------- Jun 11 04:54:13 hacker volumio[956]: info: ----- Core plugins startup ---- Jun 11 04:54:13 hacker volumio[956]: info: ------------------------------------------- Jun 11 04:54:13 hacker volumio[956]: info: Loading plugins from folder /volumio/app/plugins/ Jun 11 04:54:13 hacker volumio[956]: info: Adding plugin upnp to MyMusic Plugins Jun 11 04:54:13 hacker volumio[956]: info: Adding plugin airplay_emulation to MyMusic Plugins Jun 11 04:54:13 hacker volumio[956]: info: Adding plugin upnp_browser to MyMusic Plugins Jun 11 04:54:13 hacker volumio[956]: info: Loading plugins from folder /data/plugins/ Jun 11 04:54:13 hacker volumio[956]: info: Loading plugin "system"... Jun 11 04:54:13 hacker volumio[956]: info: Loading plugin "appearance"... Jun 11 04:54:13 hacker nmbd[726]: [2024/06/11 04:54:13.778413, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:13 hacker systemd[1]: Started Samba NMB Daemon. Jun 11 04:54:13 hacker nmbd[726]: daemon_ready: STATUS=daemon 'nmbd' finished starting up and ready to serve connections Jun 11 04:54:13 hacker systemd[1]: Starting Samba Winbind Daemon... Jun 11 04:54:14 hacker winbindd[986]: [2024/06/11 04:54:14.194008, 0] ../source3/winbindd/winbindd_cache.c:3160(initialize_winbindd_cache) Jun 11 04:54:14 hacker winbindd[986]: initialize_winbindd_cache: clearing cache and re-creating with version number 2 Jun 11 04:54:14 hacker winbindd[986]: [2024/06/11 04:54:14.226725, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:14 hacker systemd[1]: Started Samba Winbind Daemon. Jun 11 04:54:14 hacker winbindd[986]: daemon_ready: STATUS=daemon 'winbindd' finished starting up and ready to serve connections Jun 11 04:54:14 hacker systemd[1]: Starting Samba SMB Daemon... Jun 11 04:54:14 hacker volumio-remote-updater[626]: [2024-06-11 04:54:14] [connect] Successful connection Jun 11 04:54:14 hacker winbindd[986]: [2024/06/11 04:54:14.765891, 0] ../source3/winbindd/wb_lookupsids.c:659(wb_lookupsids_recv) Jun 11 04:54:14 hacker winbindd[986]: res_names->count = 3, expected 4 Jun 11 04:54:14 hacker smbd[991]: [2024/06/11 04:54:14.795411, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:14 hacker smbd[991]: daemon_ready: STATUS=daemon 'smbd' finished starting up and ready to serve connections Jun 11 04:54:14 hacker systemd[1]: Started Samba SMB Daemon. Jun 11 04:54:14 hacker systemd[1]: Reached target Multi-User System. Jun 11 04:54:14 hacker systemd[1]: Reached target Graphical Interface. Jun 11 04:54:14 hacker systemd[1]: Starting Update UTMP about System Runlevel Changes... Jun 11 04:54:14 hacker systemd[1]: systemd-update-utmp-runlevel.service: Succeeded. Jun 11 04:54:14 hacker systemd[1]: Started Update UTMP about System Runlevel Changes. Jun 11 04:54:14 hacker systemd[1]: Startup finished in 15.595s (kernel) + 32.707s (userspace) = 48.302s. Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "network"... Jun 11 04:54:15 hacker volumio[956]: info: Refreshing Cached IP Addresses Jun 11 04:54:15 hacker sudo[1001]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig eth0 Jun 11 04:54:15 hacker sudo[1001]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:15 hacker sudo[1001]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:15 hacker sudo[1003]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "services"... Jun 11 04:54:15 hacker sudo[1003]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "alsa_controller"... Jun 11 04:54:15 hacker sudo[1003]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:15 hacker sudo[1006]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwlist wlan0 scan Jun 11 04:54:15 hacker sudo[1006]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:15 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "wizard"... Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "networkfs"... Jun 11 04:54:15 hacker volumio[956]: info: Starting Udev Watcher for removable devices Jun 11 04:54:15 hacker sudo[1014]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/mount -t nfs -o ro,soft,noauto 192.168.178.108:/volume1/music /mnt/NAS/Synology Jun 11 04:54:15 hacker sudo[1014]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:15 hacker volumio[956]: info: Ignoring mount for partition: boot Jun 11 04:54:15 hacker volumio[956]: info: Ignoring mount for partition: volumio Jun 11 04:54:15 hacker volumio[956]: info: Ignoring mount for partition: volumio_data Jun 11 04:54:15 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "volumio_command_line_client"... Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "upnp"... Jun 11 04:54:15 hacker volumio[956]: info: [1718078055567] Starting Upmpd Daemon Jun 11 04:54:15 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "my_music"... Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "mpd"... Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "upnp_browser"... Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "alarm-clock"... Jun 11 04:54:16 hacker systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "airplay_emulation"... Jun 11 04:54:16 hacker volumio[956]: info: Starting Shairport Sync Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "last_100"... Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "webradio"... Jun 11 04:54:16 hacker systemd[1]: Starting Preprocess NFS configuration... Jun 11 04:54:16 hacker systemd[1]: Reached target Host and Network Name Lookups. Jun 11 04:54:16 hacker systemd[1]: nfs-config.service: Succeeded. Jun 11 04:54:16 hacker systemd[1]: Started Preprocess NFS configuration. Jun 11 04:54:16 hacker systemd[1]: Starting Notify NFS peers of a restart... Jun 11 04:54:16 hacker systemd[1]: Starting NFS status monitor for NFSv2/3 locking.... Jun 11 04:54:16 hacker sm-notify[1028]: Version 1.3.3 starting Jun 11 04:54:16 hacker systemd[1]: rpc-statd-notify.service: Succeeded. Jun 11 04:54:16 hacker systemd[1]: Started Notify NFS peers of a restart. Jun 11 04:54:16 hacker rpc.statd[1030]: Version 1.3.3 starting Jun 11 04:54:16 hacker rpc.statd[1030]: Flags: TI-RPC Jun 11 04:54:16 hacker systemd[1]: Started NFS status monitor for NFSv2/3 locking.. Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "i2s_dacs"... Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "volumiodiscovery"... Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:17 hacker node[956]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:17 hacker node[956]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** For more information see Jun 11 04:54:17 hacker node[956]: *** WARNING *** For more information see Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:17 hacker node[956]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:17 hacker node[956]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** For more information see Jun 11 04:54:17 hacker node[956]: *** WARNING *** For more information see Jun 11 04:54:17 hacker volumio[956]: info: Applying required configuration parameters for plugin volumiodiscovery Jun 11 04:54:17 hacker volumio[956]: info: Discovery: Started advertising with name: Hacker Jun 11 04:54:17 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "bandcamp"... Jun 11 04:54:17 hacker systemd[1]: systemd-fsckd.service: Succeeded. Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "outputs"... Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "albumart"... Jun 11 04:54:17 hacker volumio[956]: info: Plugin example_plugin is not enabled Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "inputs"... Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "updater_comm"... Jun 11 04:54:17 hacker volumio[956]: info: Plugin mpdemulation is not enabled Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "rest_api"... Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "websocket"... Jun 11 04:54:17 hacker volumio[956]: info: Starting Socket.io Server version 2.3.0 Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "fusiondsp"... Jun 11 04:54:17 hacker volumio[956]: Forking 3 albumart workers Jun 11 04:54:18 hacker volumio[956]: info: Applying required configuration parameters for plugin fusiondsp Jun 11 04:54:18 hacker volumio[956]: info: Loading i18n strings for locale en Jun 11 04:54:18 hacker volumio[956]: Updating browse sources language Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:18 hacker volumio[956]: Starting albumart workers Jun 11 04:54:18 hacker volumio[956]: Starting albumart workers Jun 11 04:54:18 hacker volumio[956]: Starting albumart workers Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::initPlayerControls Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:18 hacker volumio[956]: Express server listening on port 3000 Jun 11 04:54:18 hacker volumio[956]: [Metrics] WebUI: 7s 617.40ms Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::resetVolumioState Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::getcurrentVolume Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioRetrievevolume Jun 11 04:54:19 hacker sudo[1006]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:19 hacker volumio[956]: verbose: New Socket.io Connection to 192.168.178.85:3000 from 192.168.178.98 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 1 Jun 11 04:54:19 hacker volumio-remote-updater[626]: [2024-06-11 04:54:19] [connect] WebSocket Connection 127.0.0.1:3000 v-2 "WebSocket++/0.8.2" /socket.io/?EIO=4&transport=websocket&t=1718078054 101 Jun 11 04:54:19 hacker volumio[956]: verbose: New Socket.io Connection to 127.0.0.1:3000 from 127.0.0.1 UA: WebSocket++/0.8.2 Engine version: 4 Transport: websocket Total Clients: 2 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:19 hacker volumio[956]: info: Reloading queue from file Jun 11 04:54:19 hacker volumio[956]: info: Setting Device type: Raspberry PI Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::setRepeat null single undefined Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::setRandom null Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:19 hacker volumio[956]: info: VolumeController:: Volume=79 Mute =false Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::updateTrackBlock Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrackBlock Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioRetrievevolume Jun 11 04:54:19 hacker volumio[956]: info: VolumeController:: Volume=79 Mute =false Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:19 hacker volumio[956]: info: Discovery: adding 2c059fac-910b-4553-9975-724a0b682124 Jun 11 04:54:19 hacker volumio[956]: info: Discovery: Found device Hacker Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioGetState Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:19 hacker sudo[1014]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:19 hacker volumio[956]: info: Cannot mount NAS Synology at system boot, trial number 1 ,retrying in 5 seconds Jun 11 04:54:19 hacker volumio[956]: info: Completed loading Core Plugins Jun 11 04:54:19 hacker volumio[956]: info: Preparing to generate the ALSA configuration file Jun 11 04:54:19 hacker volumio[956]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf Jun 11 04:54:19 hacker volumio[956]: info: Reading ALSA contributions from plugins. Jun 11 04:54:19 hacker volumio[956]: info: Asound.conf file unchanged, so no further update is needed Jun 11 04:54:19 hacker volumio[956]: info: Output device has changed, restarting MPD Jun 11 04:54:19 hacker volumio[956]: info: Output device has changed, restarting Shairport Sync Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:19 hacker sudo[1098]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:19 hacker sudo[1098]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker sudo[1098]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:19 hacker sudo[1100]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:19 hacker sudo[1100]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:19 hacker volumio[956]: info: ___________ START PLUGINS ___________ Jun 11 04:54:19 hacker volumio[956]: info: ControllerMpd::onStart: Initializing MPD Jun 11 04:54:19 hacker volumio[956]: info: Creating MPD Configuration file Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:19 hacker sudo[1108]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:19 hacker sudo[1108]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker volumio[956]: info: [1718078059826] CoreMusicLibrary::Adding element Media Servers Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:19 hacker systemd[1]: Listening on mpd.socket. Jun 11 04:54:19 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:19 hacker sudo[1108]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:19 hacker sudo[1110]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:19 hacker sudo[1110]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:19 hacker systemd[1]: mpd.service: Control process exited, code=killed, status=15/TERM Jun 11 04:54:19 hacker systemd[1]: mpd.service: Succeeded. Jun 11 04:54:19 hacker systemd[1]: Stopped Music Player Daemon. Jun 11 04:54:19 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:19 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:19 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:19 hacker volumio[956]: info: [1718078059959] CoreMusicLibrary::Adding element Last_100 Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:19 hacker volumio[956]: info: [1718078059963] CoreMusicLibrary::Adding element Webradio Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:19 hacker volumio[956]: info: Initializing BBC Radios Jun 11 04:54:19 hacker sudo[1115]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log Jun 11 04:54:19 hacker sudo[1115]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:19 hacker sudo[1115]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory Jun 11 04:54:19 hacker sudo[1115]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:20 hacker volumio[956]: info: [1718078060055] CoreMusicLibrary::Adding element Bandcamp Discover Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:20 hacker volumio[956]: Cannot find translation for source Bandcamp Discover Jun 11 04:54:20 hacker volumio[956]: info: Loading i18n strings for locale en Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , updateALSAConfigFile Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: FusionDsp - mixtype--------------------- Hardware Jun 11 04:54:20 hacker volumio[956]: info: Volumio Calling Home Jun 11 04:54:20 hacker volumio[956]: info: Preparing to generate the ALSA configuration file Jun 11 04:54:20 hacker volumio[956]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf Jun 11 04:54:20 hacker volumio[956]: info: Reading ALSA contributions from plugins. Jun 11 04:54:20 hacker volumio[956]: info: MPD Permissions set Jun 11 04:54:20 hacker volumio[956]: info: MPD Permissions set Jun 11 04:54:20 hacker volumio[956]: verbose: New Socket.io Connection to localhost:3000 from 127.0.0.1 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 3 Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: Volumio called home Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync Jun 11 04:54:20 hacker sudo[1146]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:20 hacker sudo[1146]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:20 hacker volumio[956]: info: Asound.conf file unchanged, so no further update is needed Jun 11 04:54:20 hacker volumio[956]: info: Output device has changed, restarting MPD Jun 11 04:54:20 hacker sudo[1148]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:20 hacker sudo[1151]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:20 hacker sudo[1148]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:20 hacker sudo[1151]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:20 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:20 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:20 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:20 hacker sudo[1155]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:20 hacker sudo[1155]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:20 hacker volumio[956]: info: Output device has changed, restarting Shairport Sync Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:20 hacker sudo[1155]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:20 hacker sudo[1159]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:20 hacker sudo[1159]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:20 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:20 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:20 hacker sudo[1146]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::volumioGetState Jun 11 04:54:20 hacker volumio[956]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:20 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:20 hacker volumio[956]: info: MPD Permissions set Jun 11 04:54:20 hacker systemd[1]: mpd.service: Main process exited, code=killed, status=15/TERM Jun 11 04:54:20 hacker systemd[1]: mpd.service: Succeeded. Jun 11 04:54:20 hacker systemd[1]: Stopped Music Player Daemon. Jun 11 04:54:20 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:20 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started Jun 11 04:54:20 hacker volumio[956]: Error adding Membership: Error: addMembership EINVAL Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:20 hacker sudo[1151]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:20 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync Jun 11 04:54:20 hacker sudo[1148]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:20 hacker volumio[956]: info: Discovery: adding 938cc0b6-0f9c-44ba-aa1d-b67b2b391b23 Jun 11 04:54:20 hacker volumio[956]: info: Discovery: Found device TiVolumio Jun 11 04:54:20 hacker volumio[956]: info: Discovery: Connecting to remote: 192.168.178.98 Jun 11 04:54:20 hacker sudo[1176]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:20 hacker sudo[1176]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started Jun 11 04:54:20 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:20 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:20 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:20 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:20 hacker sudo[1176]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started Jun 11 04:54:20 hacker sudo[1174]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log Jun 11 04:54:20 hacker sudo[1174]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:20 hacker sudo[1174]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory Jun 11 04:54:20 hacker sudo[1174]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:21 hacker sh[569]: timed out Jun 11 04:54:21 hacker dhcpcd[603]: timed out Jun 11 04:54:21 hacker sh[569]: dhcpcd exited Jun 11 04:54:21 hacker dhcpcd[603]: dhcpcd exited Jun 11 04:54:21 hacker sh[569]: ifup: failed to bring up eth0 Jun 11 04:54:21 hacker systemd[1]: ifup@eth0.service: Main process exited, code=exited, status=1/FAILURE Jun 11 04:54:21 hacker systemd[1]: ifup@eth0.service: Failed with result 'exit-code'. Jun 11 04:54:21 hacker volumio[956]: info: Discovery: Connected to remote: 192.168.178.98 Jun 11 04:54:22 hacker volumio[956]: info: camilladsp spawned new process with pid undefined, instance 1, run: true Jun 11 04:54:22 hacker volumio[956]: info: camilladsp service started and running in background, instance 1 Jun 11 04:54:22 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:22 hacker volumio[956]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found Jun 11 04:54:22 hacker volumio[956]: error: FusionDsp - ----Hw detection failed :Error: Command failed: /data/plugins/audio_interface/fusiondsp/hw_params volumioHw >/data/configuration/audio_interface/fusiondsp/hwinfo.json Jun 11 04:54:22 hacker volumio[956]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found Jun 11 04:54:22 hacker volumio[956]: info: FusionDsp loaded Jun 11 04:54:22 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: network , getCachedIPAddresses Jun 11 04:54:22 hacker sudo[1196]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl start fusiondsp.service Jun 11 04:54:22 hacker sudo[1196]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:22 hacker volumio[956]: info: FusionDsp - Reporting Fusion DSP Enabled Jun 11 04:54:22 hacker volumio[956]: info: Adding Signal Path Element [object Object] Jun 11 04:54:22 hacker volumio[956]: info: Adding fusiondspeq DSP Signal Path Element Jun 11 04:54:22 hacker volumio[956]: info: FusionDsp - ---- installed callbackRead Jun 11 04:54:22 hacker volumio[956]: |||||||||||||||||||||||| WARNING: FATAL ERROR ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| Jun 11 04:54:22 hacker sudo[1196]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:22 hacker volumio[956]: Error: spawn /data/plugins/audio_interface/fusiondsp/camilladsp ENOENT Jun 11 04:54:22 hacker volumio[956]: at Process.ChildProcess._handle.onexit (internal/child_process.js:269:19) Jun 11 04:54:22 hacker volumio[956]: at onErrorNT (internal/child_process.js:465:16) Jun 11 04:54:22 hacker volumio[956]: at processTicksAndRejections (internal/process/task_queues.js:80:21) { Jun 11 04:54:22 hacker volumio[956]: errno: -2, Jun 11 04:54:22 hacker volumio[956]: code: 'ENOENT', Jun 11 04:54:22 hacker volumio[956]: syscall: 'spawn /data/plugins/audio_interface/fusiondsp/camilladsp', Jun 11 04:54:22 hacker volumio[956]: path: '/data/plugins/audio_interface/fusiondsp/camilladsp', Jun 11 04:54:22 hacker volumio[956]: spawnargs: [ Jun 11 04:54:22 hacker volumio[956]: '-p', Jun 11 04:54:22 hacker volumio[956]: 9876, Jun 11 04:54:22 hacker volumio[956]: '-o', Jun 11 04:54:22 hacker volumio[956]: '/tmp/camilladsp.log', Jun 11 04:54:22 hacker volumio[956]: '-l', Jun 11 04:54:22 hacker volumio[956]: 'warn', Jun 11 04:54:22 hacker volumio[956]: '/data/configuration/audio_interface/fusiondsp/camilladsp.yml' Jun 11 04:54:22 hacker volumio[956]: ] Jun 11 04:54:22 hacker volumio[956]: } Jun 11 04:54:22 hacker volumio[956]: ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| Jun 11 04:54:22 hacker sudo[1207]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/journalctl --since=2024-06-11 04:53 Jun 11 04:54:22 hacker sudo[1207]: pam_unix(sudo:session): session opened for user root by (uid=0) PRETTY_NAME="Raspbian GNU/Linux 10 (buster)" NAME="Raspbian GNU/Linux" VERSION_ID="10" VERSION="10 (buster)" VERSION_CODENAME=buster ID=raspbian ID_LIKE=debian HOME_URL="http://www.raspbian.org/" SUPPORT_URL="http://www.raspbian.org/RaspbianForums" BUG_REPORT_URL="http://www.raspbian.org/RaspbianBugs" VOLUMIO_BUILD_VERSION="4b122b2365bb8c09786cd63b50d1ea6db780eb4e" VOLUMIO_FE_VERSION="e7cae168f9927391640a091813b8a9656b6909b6" VOLUMIO_FE3_VERSION="df82a8f23c90a3617c15c55572c8aaea90d8b32a" VOLUMIO_BE_VERSION="49f98390f2d84c6549f33dc85b694fbd99e4c720" VOLUMIO_ARCH="arm" VOLUMIO_VARIANT="volumio" VOLUMIO_TEST="FALSE" VOLUMIO_BUILD_DATE="Tue 04 Jun 2024 08:41:12 PM CEST" VOLUMIO_VERSION="3.703" VOLUMIO_HARDWARE="pi" VOLUMIO_DEVICENAME="Raspberry Pi" VOLUMIO_HASH="8e78a6e3f56f1bcbbd1760812129a8e9"