-- Logs begin at Thu 2019-02-14 10:12:00 GMT, end at Tue 2024-06-11 04:54:22 BST. --
Jun 11 04:53:45 hacker kernel: usb 1-1.1: New USB device found, idVendor=0424, idProduct=2514, bcdDevice= b.b3
Jun 11 04:53:45 hacker kernel: usb 1-1.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Jun 11 04:53:45 hacker kernel: hub 1-1.1:1.0: USB hub found
Jun 11 04:53:45 hacker kernel: hub 1-1.1:1.0: 3 ports detected
Jun 11 04:53:45 hacker kernel: fuse: init (API version 7.37)
Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: new high-speed USB device number 4 using dwc_otg
Jun 11 04:53:45 hacker kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
Jun 11 04:53:45 hacker kernel: usbcore: registered new interface driver uas
Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: New USB device found, idVendor=2357, idProduct=0120, bcdDevice= 2.00
Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: Product: 802.11ac WLAN Adapter
Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: Manufacturer: Realtek
Jun 11 04:53:45 hacker kernel: usb 1-1.1.2: SerialNumber: 00e04c000001
Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: new high-speed USB device number 5 using dwc_otg
Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: New USB device found, idVendor=0424, idProduct=7800, bcdDevice= 3.00
Jun 11 04:53:45 hacker kernel: usb 1-1.1.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Jun 11 04:53:45 hacker kernel: lan78xx 1-1.1.1:1.0 (unnamed net_device) (uninitialized): No External EEPROM. Setting MAC Speed
Jun 11 04:53:45 hacker kernel: lan78xx 1-1.1.1:1.0 (unnamed net_device) (uninitialized): int urb period 64
Jun 11 04:53:45 hacker kernel: FAT-fs (mmcblk0p1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p2): recovery complete
Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p2): mounted filesystem with ordered data mode. Quota mode: none.
Jun 11 04:53:45 hacker kernel: loop0: detected capacity change from 0 to 979240
Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p3): recovery complete
Jun 11 04:53:45 hacker kernel: EXT4-fs (mmcblk0p3): mounted filesystem with ordered data mode. Quota mode: none.
Jun 11 04:53:45 hacker systemd[1]: System time before build time, advancing clock.
Jun 11 04:53:45 hacker kernel: NET: Registered PF_INET6 protocol family
Jun 11 04:53:45 hacker kernel: Segment Routing with IPv6
Jun 11 04:53:45 hacker kernel: In-situ OAM (IOAM) with IPv6
Jun 11 04:53:45 hacker systemd[1]: systemd 241 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN -PCRE2 default-hierarchy=hybrid)
Jun 11 04:53:45 hacker systemd[1]: Detected architecture arm.
Jun 11 04:53:45 hacker systemd[1]: Set hostname to .
Jun 11 04:53:45 hacker systemd[1]: /lib/systemd/system/winbind.service:8: PIDFile= references path below legacy directory /var/run/, updating /var/run/samba/winbindd.pid → /run/samba/winbindd.pid; please update the unit file accordingly.
Jun 11 04:53:45 hacker systemd[1]: Created slice system-getty.slice.
Jun 11 04:53:45 hacker systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point.
Jun 11 04:53:45 hacker systemd[1]: Listening on Journal Audit Socket.
Jun 11 04:53:45 hacker systemd[1]: Created slice system-systemd\x2dfsck.slice.
Jun 11 04:53:45 hacker systemd[1]: Listening on fsck to fsckd communication Socket.
Jun 11 04:53:45 hacker systemd[1]: Listening on Journal Socket.
Jun 11 04:53:45 hacker kernel: i2c_dev: i2c /dev entries driver
Jun 11 04:53:45 hacker systemd-journald[304]: Journal started
Jun 11 04:53:45 hacker systemd-journald[304]: Runtime journal (/run/log/journal/8ae31a5258af32ecbc8d1a0d62a2178b) is 7.5M, max 30.0M, 22.5M free.
Jun 11 04:53:45 hacker systemd-modules-load[301]: Inserted module 'i2c_dev'
Jun 11 04:53:45 hacker fake-hwclock[311]: Tue Jun 11 03:53:45 UTC 2024
Jun 11 04:53:45 hacker systemd[1]: Started Load/Save Random Seed.
Jun 11 04:53:45 hacker systemd[1]: dynamicswap.service: Succeeded.
Jun 11 04:53:45 hacker systemd[1]: Started Create System Users.
Jun 11 04:53:45 hacker systemd[1]: Starting Create Static Device Nodes in /dev...
Jun 11 04:53:45 hacker systemd[1]: Started udev Coldplug all Devices.
Jun 11 04:53:45 hacker systemd[1]: Starting Helper to synchronize boot up for ifupdown...
Jun 11 04:53:45 hacker systemd[1]: Started Helper to synchronize boot up for ifupdown.
Jun 11 04:53:45 hacker systemd[1]: Started Create Static Device Nodes in /dev.
Jun 11 04:53:45 hacker systemd[1]: Starting udev Kernel Device Manager...
Jun 11 04:53:45 hacker systemd[1]: Reached target Local File Systems (Pre).
Jun 11 04:53:45 hacker systemd[1]: var-log.mount: Directory /var/log to mount over is not empty, mounting anyway.
Jun 11 04:53:45 hacker systemd[1]: Mounting /var/log...
Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups...
Jun 11 04:53:45 hacker systemd[1]: tmp.mount: Directory /tmp to mount over is not empty, mounting anyway.
Jun 11 04:53:45 hacker systemd[1]: Mounting /tmp...
Jun 11 04:53:45 hacker systemd[1]: Mounted /var/log.
Jun 11 04:53:45 hacker systemd[1]: Starting Flush Journal to Persistent Storage...
Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups.
Jun 11 04:53:45 hacker systemd[1]: Mounted /tmp.
Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups/tmp...
Jun 11 04:53:45 hacker systemd-udevd[341]: Network interface NamePolicy= disabled on kernel command line, ignoring.
Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups/tmp.
Jun 11 04:53:45 hacker systemd-journald[304]: Runtime journal (/run/log/journal/8ae31a5258af32ecbc8d1a0d62a2178b) is 7.5M, max 30.0M, 22.5M free.
Jun 11 04:53:45 hacker systemd[1]: Started udev Kernel Device Manager.
Jun 11 04:53:45 hacker systemd[1]: Started Flush Journal to Persistent Storage.
Jun 11 04:53:45 hacker systemd[1]: Starting Show Plymouth Boot Screen...
Jun 11 04:53:45 hacker systemd[1]: plymouth-start.service: Succeeded.
Jun 11 04:53:45 hacker systemd[1]: Started Show Plymouth Boot Screen.
Jun 11 04:53:45 hacker systemd[1]: Started Forward Password Requests to Plymouth Directory Watch.
Jun 11 04:53:45 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped.
Jun 11 04:53:45 hacker systemd[1]: Reached target Local Encrypted Volumes.
Jun 11 04:53:45 hacker systemd[1]: Reached target Paths.
Jun 11 04:53:45 hacker kernel: rpi-gpiomem 3f200000.gpiomem: window base 0x3f200000 size 0x00001000
Jun 11 04:53:45 hacker kernel: rpi-gpiomem 3f200000.gpiomem: initialised 1 regions as /dev/gpiomem
Jun 11 04:53:45 hacker kernel: vc_sm_cma: module is from the staging directory, the quality is unknown, you have been warned.
Jun 11 04:53:45 hacker kernel: bcm2835_vc_sm_cma_probe: Videocore shared memory driver
Jun 11 04:53:45 hacker kernel: [vc_sm_connected_init]: start
Jun 11 04:53:45 hacker kernel: [vc_sm_connected_init]: installed successfully
Jun 11 04:53:45 hacker kernel: mc: Linux media interface: v0.10
Jun 11 04:53:46 hacker kernel: videodev: Linux video capture interface: v2.00
Jun 11 04:53:46 hacker kernel: Bluetooth: Core ver 2.22
Jun 11 04:53:46 hacker kernel: NET: Registered PF_BLUETOOTH protocol family
Jun 11 04:53:46 hacker kernel: Bluetooth: HCI device and connection manager initialized
Jun 11 04:53:46 hacker kernel: Bluetooth: HCI socket layer initialized
Jun 11 04:53:46 hacker kernel: Bluetooth: L2CAP socket layer initialized
Jun 11 04:53:46 hacker kernel: Bluetooth: SCO socket layer initialized
Jun 11 04:53:46 hacker systemd[1]: Found device /dev/disk/by-uuid/815B-E7CF.
Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART driver ver 2.3
Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART protocol H4 registered
Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART protocol Three-wire (H5) registered
Jun 11 04:53:46 hacker kernel: Bluetooth: HCI UART protocol Broadcom registered
Jun 11 04:53:46 hacker kernel: hci_uart_bcm serial0-0: supply vbat not found, using dummy regulator
Jun 11 04:53:46 hacker kernel: hci_uart_bcm serial0-0: supply vddio not found, using dummy regulator
Jun 11 04:53:46 hacker kernel: bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned.
Jun 11 04:53:46 hacker kernel: uart-pl011 3f201000.serial: no DMA platform data
Jun 11 04:53:46 hacker systemd[1]: Starting File System Check on /dev/disk/by-uuid/815B-E7CF...
Jun 11 04:53:46 hacker kernel: snd_bcm2835: module is from the staging directory, the quality is unknown, you have been warned.
Jun 11 04:53:46 hacker kernel: snd_bcm2835: unknown parameter 'enable_compat_alsa' ignored
Jun 11 04:53:46 hacker systemd[1]: Started File System Check Daemon to report status.
Jun 11 04:53:46 hacker kernel: bcm2835_v4l2: module is from the staging directory, the quality is unknown, you have been warned.
Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM: chip id 107
Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM: features 0x2f
Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM4345C0
Jun 11 04:53:46 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0000
Jun 11 04:53:46 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels
Jun 11 04:53:47 hacker kernel: bcm2835_isp: module is from the staging directory, the quality is unknown, you have been warned.
Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM4345C0 'brcm/BCM4345C0.hcd' Patch
Jun 11 04:53:47 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels
Jun 11 04:53:47 hacker kernel: bcm2835_codec: module is from the staging directory, the quality is unknown, you have been warned.
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video10
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 decode
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video13
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video14
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video15
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video16
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video11
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video20
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video21
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video12
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 isp
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video22
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video23
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller
Jun 11 04:53:47 hacker kernel: bcm2835-isp bcm2835-isp: Loaded V4L2 bcm2835-isp
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video18
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 image_fx
Jun 11 04:53:47 hacker kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video31
Jun 11 04:53:47 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode_image
Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'benh@debian.org: 577e021cb980e0e820821ba7b54b4961b8b4fadf'
Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'romain.perier@gmail.com: 3abbc6ec146e09d1b6016ab9d6cf71dd233f0328'
Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600'
Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Jun 11 04:53:47 hacker systemd-fsck[397]: fsck.fat 4.1 (2017-01-24)
Jun 11 04:53:47 hacker systemd-fsck[397]: 0x25: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt.
Jun 11 04:53:47 hacker systemd-fsck[397]: Automatically removing dirty bit.
Jun 11 04:53:47 hacker systemd-fsck[397]: Performing changes.
Jun 11 04:53:47 hacker systemd-fsck[397]: /dev/mmcblk0p1: 456 files, 34026/46774 clusters
Jun 11 04:53:47 hacker systemd[1]: Started File System Check on /dev/disk/by-uuid/815B-E7CF.
Jun 11 04:53:47 hacker systemd[1]: Mounting /boot...
Jun 11 04:53:47 hacker systemd[1]: Mounted /boot.
Jun 11 04:53:47 hacker systemd[1]: Reached target Local File Systems.
Jun 11 04:53:47 hacker systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped.
Jun 11 04:53:47 hacker systemd[1]: Starting Preprocess NFS configuration...
Jun 11 04:53:47 hacker systemd[1]: Starting Raise network interfaces...
Jun 11 04:53:47 hacker systemd[1]: Starting Tell Plymouth To Write Out Runtime Data...
Jun 11 04:53:47 hacker systemd[1]: Starting Create Volatile Files and Directories...
Jun 11 04:53:47 hacker systemd[1]: nfs-config.service: Succeeded.
Jun 11 04:53:47 hacker systemd[1]: Started Preprocess NFS configuration.
Jun 11 04:53:47 hacker systemd[1]: Condition check resulted in RPC security service for NFS client and server being skipped.
Jun 11 04:53:47 hacker systemd[1]: Condition check resulted in RPC security service for NFS server being skipped.
Jun 11 04:53:47 hacker systemd[1]: Reached target NFS client services.
Jun 11 04:53:47 hacker systemd[1]: Received SIGRTMIN+20 from PID 191 (plymouthd).
Jun 11 04:53:47 hacker systemd[1]: plymouth-read-write.service: Succeeded.
Jun 11 04:53:47 hacker systemd[1]: Started Tell Plymouth To Write Out Runtime Data.
Jun 11 04:53:47 hacker kernel: brcmfmac: F1 signature read @0x18000000=0x15264345
Jun 11 04:53:47 hacker kernel: brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6
Jun 11 04:53:47 hacker kernel: usbcore: registered new interface driver brcmfmac
Jun 11 04:53:47 hacker systemd-udevd[357]: Using default interface naming scheme 'v240'.
Jun 11 04:53:47 hacker systemd-udevd[357]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Jun 11 04:53:47 hacker ifup[447]: command failed: No such device (-19)
Jun 11 04:53:47 hacker systemd[1]: Started Create Volatile Files and Directories.
Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM: features 0x2f
Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM43455 37.4MHz Raspberry Pi 3+
Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0342
Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM: Using default device address (43:45:c0:00:1f:ac)
Jun 11 04:53:47 hacker systemd-udevd[356]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Jun 11 04:53:47 hacker kernel: brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Nov 1 2021 00:37:25 version 7.45.241 (1a2f2fa CY) FWID 01-703fd60
Jun 11 04:53:48 hacker systemd-udevd[348]: Using default interface naming scheme 'v240'.
Jun 11 04:53:48 hacker systemd-udevd[348]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Jun 11 04:53:49 hacker systemd[1]: Started Raise network interfaces.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in 7800 being skipped.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in /sys/subsystem/net/devices/wlan0 being skipped.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Network Time Synchronization being skipped.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Huge Pages File System being skipped.
Jun 11 04:53:49 hacker systemd[1]: Created slice system-bthelper.slice.
Jun 11 04:53:49 hacker systemd[1]: Starting Tell Plymouth To Write Out Runtime Data...
Jun 11 04:53:49 hacker systemd[1]: Starting Show Plymouth Boot Screen...
Jun 11 04:53:49 hacker systemd[1]: Started ifup for wlan0.
Jun 11 04:53:49 hacker systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch.
Jun 11 04:53:49 hacker systemd[1]: Started ifup for eth0.
Jun 11 04:53:49 hacker systemd[1]: Starting Update UTMP about System Boot/Shutdown...
Jun 11 04:53:49 hacker systemd[1]: Started Entropy daemon using the HAVEGE algorithm.
Jun 11 04:53:49 hacker systemd[1]: Starting RPC bind portmap service...
Jun 11 04:53:49 hacker systemd[1]: plymouth-read-write.service: Succeeded.
Jun 11 04:53:49 hacker systemd[1]: Started Tell Plymouth To Write Out Runtime Data.
Jun 11 04:53:49 hacker systemd[1]: Received SIGRTMIN+20 from PID 191 (plymouthd).
Jun 11 04:53:49 hacker systemd[1]: Starting Load/Save RF Kill Switch Status...
Jun 11 04:53:49 hacker systemd[1]: plymouth-start.service: Succeeded.
Jun 11 04:53:49 hacker systemd[1]: Started Show Plymouth Boot Screen.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped.
Jun 11 04:53:49 hacker systemd[1]: Started Update UTMP about System Boot/Shutdown.
Jun 11 04:53:49 hacker systemd[1]: Reached target System Initialization.
Jun 11 04:53:49 hacker systemd[1]: apt-daily.timer: Not using persistent file timestamp Sat 2024-07-06 10:53:33 BST as it is in the future.
Jun 11 04:53:49 hacker systemd[1]: Started Daily apt download activities.
Jun 11 04:53:49 hacker systemd[1]: apt-daily-upgrade.timer: Not using persistent file timestamp Sat 2024-07-06 10:53:33 BST as it is in the future.
Jun 11 04:53:49 hacker systemd[1]: Started Daily apt upgrade and clean activities.
Jun 11 04:53:49 hacker systemd[1]: Started Daily Cleanup of Temporary Directories.
Jun 11 04:53:49 hacker systemd[1]: Reached target Timers.
Jun 11 04:53:49 hacker systemd[1]: Listening on D-Bus System Message Bus Socket.
Jun 11 04:53:49 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled
Jun 11 04:53:49 hacker systemd[1]: Listening on triggerhappy.socket.
Jun 11 04:53:49 hacker systemd[1]: Listening on Avahi mDNS/DNS-SD Stack Activation Socket.
Jun 11 04:53:49 hacker systemd[1]: Reached target Sockets.
Jun 11 04:53:49 hacker systemd[1]: Reached target Basic System.
Jun 11 04:53:49 hacker systemd[1]: Started D-Bus System Message Bus.
Jun 11 04:53:49 hacker systemd[1]: Started UPnP Renderer front-end to MPD.
Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in getty on tty2-tty6 if dbus and logind are not available being skipped.
Jun 11 04:53:50 hacker systemd[1]: Started volumio-remote-updater.service.
Jun 11 04:53:50 hacker kernel: 8021q: 802.1Q VLAN Support v1.8
Jun 11 04:53:50 hacker systemd[1]: Starting Login Service...
Jun 11 04:53:50 hacker systemd[1]: Starting triggerhappy global hotkey daemon...
Jun 11 04:53:50 hacker systemd[1]: Starting WPA supplicant...
Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Volumio SSH enabler being skipped.
Jun 11 04:53:50 hacker systemd[1]: Started Manage Sound Card State (restore and store).
Jun 11 04:53:50 hacker alsactl[634]: alsactl 1.1.8 daemon started
Jun 11 04:53:50 hacker systemd[1]: Started Volumio Log Rotation Service.
Jun 11 04:53:50 hacker systemd[1]: Starting Configure Bluetooth Modems connected by UART...
Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line:
Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line: KEY_MIN_INTERESTING 1 /usr/local/bin/volumio volume toggle
Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line:
Jun 11 04:53:50 hacker thd[632]: Unable to parse trigger line:
Jun 11 04:53:50 hacker thd[632]: Found socket passed from systemd
Jun 11 04:53:50 hacker systemd[1]: Starting Save/Restore Sound Card State...
Jun 11 04:53:50 hacker systemd[1]: Starting Wireless Services...
Jun 11 04:53:50 hacker systemd[1]: Starting Avahi mDNS/DNS-SD Stack...
Jun 11 04:53:50 hacker systemd[1]: Started Volumio Iptables Module.
Jun 11 04:53:50 hacker systemd[1]: Started Load/Save RF Kill Switch Status.
Jun 11 04:53:50 hacker systemd[1]: Started RPC bind portmap service.
Jun 11 04:53:50 hacker systemd[1]: Started triggerhappy global hotkey daemon.
Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems (Pre).
Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems.
Jun 11 04:53:50 hacker systemd[1]: Starting LSB: Load kernel modules needed to enable cpufreq scaling...
Jun 11 04:53:50 hacker systemd[1]: Reached target RPC Port Mapper.
Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Copy user wpa_supplicant.conf being skipped.
Jun 11 04:53:50 hacker systemd[1]: Starting dhcpcd on all interfaces...
Jun 11 04:53:50 hacker systemd-logind[630]: New seat seat0.
Jun 11 04:53:50 hacker sh[567]: wlan0=wlan0
Jun 11 04:53:50 hacker dhcpcd[653]: Not running dhcpcd because /etc/network/interfaces
Jun 11 04:53:50 hacker dhcpcd[653]: defines some interfaces that will use a
Jun 11 04:53:50 hacker dhcpcd[653]: DHCP client or static address
Jun 11 04:53:50 hacker avahi-daemon[641]: Found user 'avahi' (UID 110) and group 'avahi' (GID 113).
Jun 11 04:53:50 hacker avahi-daemon[641]: Successfully dropped root privileges.
Jun 11 04:53:50 hacker avahi-daemon[641]: avahi-daemon 0.7 starting up.
Jun 11 04:53:51 hacker systemd[1]: Started Login Service.
Jun 11 04:53:51 hacker avahi-daemon[641]: Successfully called chroot().
Jun 11 04:53:51 hacker avahi-daemon[641]: Successfully dropped remaining capabilities.
Jun 11 04:53:51 hacker systemd[1]: hciuart.service: Succeeded.
Jun 11 04:53:51 hacker wpa_supplicant[633]: Successfully initialized wpa_supplicant
Jun 11 04:53:51 hacker avahi-daemon[641]: Loading service file /services/volumio.service.
Jun 11 04:53:51 hacker systemd[1]: Started Configure Bluetooth Modems connected by UART.
Jun 11 04:53:51 hacker systemd[1]: Started Save/Restore Sound Card State.
Jun 11 04:53:51 hacker systemd[1]: dhcpcd.service: Control process exited, code=exited, status=6/NOTCONFIGURED
Jun 11 04:53:51 hacker systemd[1]: dhcpcd.service: Failed with result 'exit-code'.
Jun 11 04:53:51 hacker avahi-daemon[641]: Network interface enumeration completed.
Jun 11 04:53:51 hacker systemd[1]: Failed to start dhcpcd on all interfaces.
Jun 11 04:53:51 hacker avahi-daemon[641]: Server startup complete. Host name is hacker.local. Local service cookie is 6860304.
Jun 11 04:53:51 hacker avahi-daemon[641]: Service "Hacker" (/services/volumio.service) successfully established.
Jun 11 04:53:51 hacker sh[569]: eth0: waiting for carrier
Jun 11 04:53:51 hacker dhcpcd[603]: eth0: waiting for carrier
Jun 11 04:53:51 hacker kernel: 8021q: adding VLAN 0 to HW filter on device eth0
Jun 11 04:53:51 hacker kernel: lan78xx 1-1.1.1:1.0 eth0: Link is Down
Jun 11 04:53:51 hacker systemd[1]: Started Avahi mDNS/DNS-SD Stack.
Jun 11 04:53:51 hacker systemd[1]: Started WPA supplicant.
Jun 11 04:53:51 hacker systemd[1]: Reached target Network.
Jun 11 04:53:51 hacker systemd[1]: Reached target Network is Online.
Jun 11 04:53:51 hacker systemd[1]: Starting LSB: Brings up/down network automatically...
Jun 11 04:53:51 hacker systemd[1]: Starting Network Time Service...
Jun 11 04:53:51 hacker systemd[1]: Starting Samba NMB Daemon...
Jun 11 04:53:51 hacker systemd[1]: Condition check resulted in fast remote file copy program daemon being skipped.
Jun 11 04:53:51 hacker systemd[1]: Starting Permit User Sessions...
Jun 11 04:53:51 hacker systemd[1]: Starting OpenBSD Secure Shell server...
Jun 11 04:53:51 hacker systemd[1]: Starting /etc/rc.local Compatibility...
Jun 11 04:53:51 hacker systemd[1]: Reached target Sound Card.
Jun 11 04:53:51 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver.
Jun 11 04:53:51 hacker systemd[1]: Starting Raspberry Pi bluetooth helper...
Jun 11 04:53:51 hacker systemd[1]: Started /etc/rc.local Compatibility.
Jun 11 04:53:51 hacker systemd[1]: Started Permit User Sessions.
Jun 11 04:53:51 hacker systemd[1]: Starting Terminate Plymouth Boot Screen...
Jun 11 04:53:52 hacker systemd[1]: Starting Hold until boot process finishes up...
Jun 11 04:53:52 hacker volumio-remote-updater[626]: Error: No active session
Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 191 (plymouthd).
Jun 11 04:53:52 hacker volumio-remote-updater[626]: [2024-06-11 04:53:52] [info] asio async_connect error: system:111 (Connection refused)
Jun 11 04:53:52 hacker volumio-remote-updater[626]: [2024-06-11 04:53:52] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected)
Jun 11 04:53:52 hacker volumio-remote-updater[626]: [2024-06-11 04:53:52] [error] handle_connect error: Underlying Transport Error
Jun 11 04:53:52 hacker bthelper[718]: Raspberry Pi BDADDR already set
Jun 11 04:53:52 hacker systemd[1]: Started Raspberry Pi bluetooth helper.
Jun 11 04:53:52 hacker loadcpufreq[652]: Loading cpufreq kernel modules...done (none).
Jun 11 04:53:52 hacker systemd[1]: Starting Bluetooth service...
Jun 11 04:53:52 hacker systemd[1]: Started LSB: Load kernel modules needed to enable cpufreq scaling.
Jun 11 04:53:52 hacker systemd[1]: plymouth-quit.service: Succeeded.
Jun 11 04:53:52 hacker systemd[1]: Started Terminate Plymouth Boot Screen.
Jun 11 04:53:52 hacker systemd[1]: plymouth-quit-wait.service: Succeeded.
Jun 11 04:53:52 hacker systemd[1]: Started Hold until boot process finishes up.
Jun 11 04:53:52 hacker ifplugd(eth0)[766]: ifplugd 0.28 initializing.
Jun 11 04:53:52 hacker ifplugd(eth0)[766]: Using interface eth0/B8:27:EB:AD:38:72 with driver (version: 6.1.77-v7+)
Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 191 (n/a).
Jun 11 04:53:52 hacker systemd[1]: Started Getty on tty1.
Jun 11 04:53:52 hacker systemd[1]: Reached target Login Prompts.
Jun 11 04:53:52 hacker ifplugd(eth0)[766]: Using detection mode: SIOCETHTOOL
Jun 11 04:53:52 hacker ifplugd(eth0)[766]: Initialization complete, link beat not detected.
Jun 11 04:53:52 hacker systemd[1]: Starting LSB: set CPUFreq kernel parameters...
Jun 11 04:53:52 hacker ntpd[704]: ntpd 4.2.8p12@1.3728-o (1): Starting
Jun 11 04:53:52 hacker ntpd[704]: Command line: /usr/sbin/ntpd -p /var/run/ntpd.pid -g -u 103:103
Jun 11 04:53:52 hacker systemd[1]: Started Network Time Service.
Jun 11 04:53:52 hacker volumio[625]: Could not open config: /tmp/upmpdcli.conf
Jun 11 04:53:52 hacker ntpd[770]: proto: precision = 1.407 usec (-19)
Jun 11 04:53:52 hacker ifplugd[699]: Network Interface Plugging Daemon...start eth0...done.
Jun 11 04:53:52 hacker systemd[1]: Started LSB: Brings up/down network automatically.
Jun 11 04:53:52 hacker ntpd[770]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): good hash signature
Jun 11 04:53:52 hacker ntpd[770]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): loaded, expire=2024-12-28T00:00:00Z last=2017-01-01T00:00:00Z ofs=37
Jun 11 04:53:52 hacker ntpd[770]: Listen and drop on 0 v6wildcard [::]:123
Jun 11 04:53:52 hacker ntpd[770]: Listen and drop on 1 v4wildcard 0.0.0.0:123
Jun 11 04:53:52 hacker ntpd[770]: Listen normally on 2 lo 127.0.0.1:123
Jun 11 04:53:52 hacker ntpd[770]: Listening on routing socket on fd #19 for interface updates
Jun 11 04:53:52 hacker ntpd[770]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
Jun 11 04:53:52 hacker ntpd[770]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Main process exited, code=exited, status=1/FAILURE
Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Failed with result 'exit-code'.
Jun 11 04:53:52 hacker systemd[1]: iptables.service: Succeeded.
Jun 11 04:53:52 hacker sshd[777]: Server listening on 0.0.0.0 port 22.
Jun 11 04:53:52 hacker sshd[777]: Server listening on :: port 22.
Jun 11 04:53:52 hacker systemd[1]: Started OpenBSD Secure Shell server.
Jun 11 04:53:52 hacker cpufrequtils[769]: CPUFreq Utilities: Setting ondemand CPUFreq governor...CPU0...CPU1...CPU2...CPU3...done.
Jun 11 04:53:52 hacker systemd[1]: Started LSB: set CPUFreq kernel parameters.
Jun 11 04:53:52 hacker bluetoothd[758]: Bluetooth daemon 5.50
Jun 11 04:53:52 hacker bluetoothd[758]: Unknown key AutoConnectTimeout for group General in /etc/bluetooth/main.conf
Jun 11 04:53:52 hacker systemd[1]: Started Bluetooth service.
Jun 11 04:53:52 hacker systemd[1]: Reached target Bluetooth.
Jun 11 04:53:53 hacker bluetoothd[758]: Starting SDP server
Jun 11 04:53:53 hacker bluetoothd[758]: Excluding (cli) sap
Jun 11 04:53:53 hacker haveged[578]: haveged: ver: 1.9.1; arch: generic; vend: ; build: (gcc 8.2.0 CTV); collect: 128K
Jun 11 04:53:53 hacker haveged[578]: haveged: cpu: (VC); data: 16K (D); inst: 16K (D); idx: 11/40; sz: 14768/63488
Jun 11 04:53:53 hacker haveged[578]: haveged: tot tests(BA8): A:1/1 B:1/1 continuous tests(B): last entropy estimate 8.00283
Jun 11 04:53:53 hacker haveged[578]: haveged: fills: 0, generated: 0
Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3
Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP filters: protocol multicast
Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP socket layer initialized
Jun 11 04:53:53 hacker bluetoothd[758]: Bluetooth management interface 1.22 initialized
Jun 11 04:53:53 hacker dbus-daemon[618]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.5' (uid=0 pid=758 comm="/usr/lib/bluetooth/bluetoothd --noplugin=sap ")
Jun 11 04:53:53 hacker kernel: Bluetooth: MGMT ver 1.22
Jun 11 04:53:53 hacker bluetoothd[758]: Failed to set privacy: Rejected (0x0b)
Jun 11 04:53:53 hacker systemd[1]: Starting Hostname Service...
Jun 11 04:53:53 hacker ntpd[770]: error resolving pool 0.debian.pool.ntp.org: System error (-11)
Jun 11 04:53:53 hacker dbus-daemon[618]: [system] Successfully activated service 'org.freedesktop.hostname1'
Jun 11 04:53:53 hacker systemd[1]: Started Hostname Service.
Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.769463, 0] ../source3/nmbd/asyncdns.c:158(start_async_dns)
Jun 11 04:53:53 hacker nmbd[726]: started asyncdns process 796
Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.771879, 0] ../lib/util/become_daemon.c:149(daemon_status)
Jun 11 04:53:53 hacker nmbd[726]: daemon_status: STATUS=daemon 'nmbd' : No local IPv4 non-loopback interfaces available, waiting for interface ...
Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.772078, 0] ../source3/nmbd/nmbd_subnetdb.c:254(create_subnets)
Jun 11 04:53:53 hacker nmbd[726]: NOTE: NetBIOS name resolution is not supported for Internet Protocol Version 6 (IPv6).
Jun 11 04:53:54 hacker wireless.js[639]: Cleaning previous...
Jun 11 04:53:54 hacker sudo[804]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0
Jun 11 04:53:54 hacker sudo[804]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:54 hacker sudo[804]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:54 hacker sudo[806]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down
Jun 11 04:53:54 hacker sudo[806]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:54 hacker ntpd[770]: error resolving pool 1.debian.pool.ntp.org: System error (-11)
Jun 11 04:53:54 hacker systemd[1]: systemd-rfkill.service: Succeeded.
Jun 11 04:53:54 hacker sudo[806]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:54 hacker wireless.js[639]: Stopped aP
Jun 11 04:53:55 hacker sudo[813]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up
Jun 11 04:53:55 hacker sudo[813]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:55 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled
Jun 11 04:53:55 hacker sudo[813]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:55 hacker sudo[815]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg get
Jun 11 04:53:55 hacker sudo[815]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:55 hacker sudo[815]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:55 hacker sudo[822]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up
Jun 11 04:53:55 hacker sudo[822]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:55 hacker sudo[822]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:55 hacker sudo[824]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw wlan0 scan
Jun 11 04:53:55 hacker sudo[824]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:55 hacker ntpd[770]: error resolving pool 2.debian.pool.ntp.org: System error (-11)
Jun 11 04:53:56 hacker ntpd[770]: error resolving pool 3.debian.pool.ntp.org: System error (-11)
Jun 11 04:53:57 hacker volumio-remote-updater[626]: [2024-06-11 04:53:57] [info] asio async_connect error: system:111 (Connection refused)
Jun 11 04:53:57 hacker volumio-remote-updater[626]: [2024-06-11 04:53:57] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected)
Jun 11 04:53:57 hacker volumio-remote-updater[626]: [2024-06-11 04:53:57] [error] handle_connect error: Underlying Transport Error
Jun 11 04:53:57 hacker bthelper[718]: Changing power off succeeded
Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Powered: no
Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Discovering: no
Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Class: 0x00000000
Jun 11 04:53:57 hacker bthelper[718]: [CHG] Controller B8:27:EB:07:92:D8 Class: 0x0000041c
Jun 11 04:53:57 hacker bthelper[718]: Changing power on succeeded
Jun 11 04:53:57 hacker sudo[824]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:57 hacker wireless.js[639]: SETTING APPROPRIATE REG DOMAIN: GB
Jun 11 04:53:57 hacker sudo[836]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up
Jun 11 04:53:57 hacker sudo[836]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:57 hacker sudo[836]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:57 hacker sudo[838]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg set GB
Jun 11 04:53:57 hacker sudo[838]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:57 hacker sudo[838]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:57 hacker wireless.js[639]: SUCCESSFULLY SET NEW REGDOMAIN: GB
Jun 11 04:53:57 hacker wireless.js[639]: Start wireless flow
Jun 11 04:53:57 hacker wireless.js[639]: Stopped hotspot (if there)..
Jun 11 04:53:57 hacker sudo[843]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0
Jun 11 04:53:57 hacker sudo[843]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:57 hacker sudo[843]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:57 hacker sudo[845]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down
Jun 11 04:53:57 hacker sudo[845]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:58 hacker sudo[845]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:58 hacker wireless.js[639]: DHCP IP
Jun 11 04:53:58 hacker wireless.js[639]: Start ap
Jun 11 04:53:58 hacker wpa_supplicant[847]: Successfully initialized wpa_supplicant
Jun 11 04:53:58 hacker sudo[848]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/dhcpcd
Jun 11 04:53:58 hacker sudo[848]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:58 hacker dhcpcd[849]: dev: loaded udev
Jun 11 04:53:58 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled
Jun 11 04:53:58 hacker dhcpcd-run-hooks[867]: wlan0: starting wpa_supplicant
Jun 11 04:53:58 hacker dhcpcd-run-hooks[872]: wlan0: failed to start wpa_supplicant
Jun 11 04:53:58 hacker dhcpcd-run-hooks[873]: wlan0: Successfully initialized wpa_supplicant
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Match already configured
nl80211: kernel reports: Ma
Jun 11 04:53:58 hacker dhcpcd[849]: wlan0: connected to Access Point `'
Jun 11 04:53:58 hacker dhcpcd[849]: no interfaces have a carrier
Jun 11 04:53:58 hacker dhcpcd[849]: forked to background, child pid 883
Jun 11 04:53:58 hacker dhcpcd[883]: eth0: waiting for carrier
Jun 11 04:53:58 hacker dhcpcd[883]: wlan0: waiting for carrier
Jun 11 04:53:58 hacker sudo[848]: pam_unix(sudo:session): session closed for user root
Jun 11 04:53:59 hacker wireless.js[639]: trying...
Jun 11 04:53:59 hacker sudo[885]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:53:59 hacker sudo[885]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:53:59 hacker sudo[885]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:00 hacker wireless.js[639]: trying...
Jun 11 04:54:00 hacker sudo[888]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:00 hacker sudo[888]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:00 hacker sudo[888]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:01 hacker wpa_supplicant[871]: wlan0: Trying to associate with SSID 'FRITZ!Box 7530 KO'
Jun 11 04:54:01 hacker wireless.js[639]: trying...
Jun 11 04:54:01 hacker sudo[891]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:01 hacker sudo[891]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:01 hacker sudo[891]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:02 hacker wireless.js[639]: trying...
Jun 11 04:54:02 hacker sudo[894]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:02 hacker sudo[894]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:02 hacker sudo[894]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:03 hacker wireless.js[639]: trying...
Jun 11 04:54:03 hacker sudo[897]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:03 hacker sudo[897]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:03 hacker sudo[897]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: carrier acquired
Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: connected to Access Point `FRITZ!Box 7530 KO'
Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: Associated with 98:9b:cb:b9:11:2f
Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: CTRL-EVENT-CONNECTED - Connection to 98:9b:cb:b9:11:2f completed [id=0 id_str=]
Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Jun 11 04:54:03 hacker wpa_supplicant[871]: wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=GB
Jun 11 04:54:03 hacker dhcpcd[883]: DUID 00:01:00:01:2a:34:d5:bb:b8:27:eb:ad:38:72
Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: IAID eb:f8:6d:27
Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: adding address fe80::145a:8513:d5a8:3d51
Jun 11 04:54:03 hacker dhcpcd[883]: ipv6_addaddr1: Permission denied
Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: carrier lost
Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: carrier acquired
Jun 11 04:54:03 hacker dhcpcd[883]: wlan0: IAID eb:f8:6d:27
Jun 11 04:54:04 hacker dhcpcd[883]: wlan0: rebinding lease of 192.168.178.85
Jun 11 04:54:04 hacker dhcpcd[883]: wlan0: probing address 192.168.178.85/24
Jun 11 04:54:04 hacker wireless.js[639]: trying...
Jun 11 04:54:04 hacker sudo[912]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:04 hacker sudo[912]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:04 hacker sudo[912]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:04 hacker volumio-remote-updater[626]: [2024-06-11 04:54:04] [info] asio async_connect error: system:111 (Connection refused)
Jun 11 04:54:04 hacker volumio-remote-updater[626]: [2024-06-11 04:54:04] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected)
Jun 11 04:54:04 hacker volumio-remote-updater[626]: [2024-06-11 04:54:04] [error] handle_connect error: Underlying Transport Error
Jun 11 04:54:04 hacker dhcpcd[883]: wlan0: soliciting an IPv6 router
Jun 11 04:54:05 hacker wireless.js[639]: trying...
Jun 11 04:54:05 hacker sudo[915]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:05 hacker sudo[915]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:05 hacker sudo[915]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:06 hacker wireless.js[639]: trying...
Jun 11 04:54:06 hacker sudo[918]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:06 hacker sudo[918]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:06 hacker sudo[918]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:07 hacker wireless.js[639]: trying...
Jun 11 04:54:07 hacker sudo[921]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:07 hacker sudo[921]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:07 hacker sudo[921]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:08 hacker wireless.js[639]: trying...
Jun 11 04:54:08 hacker sudo[924]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:08 hacker sudo[924]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:08 hacker sudo[924]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:09 hacker dhcpcd[883]: wlan0: leased 192.168.178.85 for 864000 seconds
Jun 11 04:54:09 hacker avahi-daemon[641]: Joining mDNS multicast group on interface wlan0.IPv4 with address 192.168.178.85.
Jun 11 04:54:09 hacker dhcpcd[883]: wlan0: adding route to 192.168.178.0/24
Jun 11 04:54:09 hacker dhcpcd[883]: wlan0: adding default route via 192.168.178.1
Jun 11 04:54:09 hacker avahi-daemon[641]: New relevant interface wlan0.IPv4 for mDNS.
Jun 11 04:54:09 hacker avahi-daemon[641]: Registering new address record for 192.168.178.85 on wlan0.IPv4.
Jun 11 04:54:09 hacker wireless.js[639]: trying...
Jun 11 04:54:09 hacker sudo[948]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r
Jun 11 04:54:09 hacker sudo[948]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:09 hacker sudo[948]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:09 hacker wireless.js[639]: Connected to: ----FRITZ!Box 7530 KO
Jun 11 04:54:09 hacker wireless.js[639]: ----
Jun 11 04:54:09 hacker sudo[951]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0
Jun 11 04:54:09 hacker sudo[951]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:09 hacker sudo[951]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:09 hacker wireless.js[639]: ... joined AP, wlan0 IPv4 is 192.168.178.85, ipV6 is undefined
Jun 11 04:54:09 hacker wireless.js[639]: It's done! AP
Jun 11 04:54:09 hacker systemd[1]: Started Wireless Services.
Jun 11 04:54:09 hacker systemd[1]: Started Volumio Backend Module.
Jun 11 04:54:09 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled
Jun 11 04:54:09 hacker systemd[1]: Started Volumio Cpu Tweaker.
Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: Setting RT Priority for mpd
Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: pid 35's current scheduling policy: SCHED_OTHER
Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: pid 35's current scheduling priority: 0
Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: Setting MPD Affinity
Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: pid 3's current affinity mask: f
Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: /bin/volumio_cpu_tweak: line 27: warning: command substitution: ignored null byte in input
Jun 11 04:54:09 hacker volumio-cpu-tweak[957]: VOLUMIO CPU TWEAK: Setting CPU Governor: performance
Jun 11 04:54:09 hacker systemd[1]: volumio_cpu_tweak.service: Succeeded.
Jun 11 04:54:10 hacker ntpd[770]: Listen normally on 3 wlan0 192.168.178.85:123
Jun 11 04:54:10 hacker ntpd[770]: new interface(s) found: waking up resolver
Jun 11 04:54:12 hacker volumio[956]: info: -------------------------------------------
Jun 11 04:54:12 hacker volumio[956]: info: ----- Volumio3 ----
Jun 11 04:54:12 hacker volumio[956]: info: -------------------------------------------
Jun 11 04:54:12 hacker volumio[956]: info: ----- System startup ----
Jun 11 04:54:12 hacker volumio[956]: info: -------------------------------------------
Jun 11 04:54:13 hacker volumio[956]: info: MYVOLUMIO Environment detected
Jun 11 04:54:13 hacker volumio[956]: info: Plugin folders cleanup
Jun 11 04:54:13 hacker volumio[956]: info: Scanning into folder /volumio/app/plugins/
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category audio_interface
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category miscellanea
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category music_service
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category plugins.json
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category system_controller
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category user_interface
Jun 11 04:54:13 hacker volumio[956]: info: Scanning into folder /data/plugins/
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category audio_interface
Jun 11 04:54:13 hacker volumio[956]: info: Scanning category music_service
Jun 11 04:54:13 hacker volumio[956]: info: Plugin folders cleanup completed
Jun 11 04:54:13 hacker volumio[956]: info: -------------------------------------------
Jun 11 04:54:13 hacker volumio[956]: info: ----- Core plugins startup ----
Jun 11 04:54:13 hacker volumio[956]: info: -------------------------------------------
Jun 11 04:54:13 hacker volumio[956]: info: Loading plugins from folder /volumio/app/plugins/
Jun 11 04:54:13 hacker volumio[956]: info: Adding plugin upnp to MyMusic Plugins
Jun 11 04:54:13 hacker volumio[956]: info: Adding plugin airplay_emulation to MyMusic Plugins
Jun 11 04:54:13 hacker volumio[956]: info: Adding plugin upnp_browser to MyMusic Plugins
Jun 11 04:54:13 hacker volumio[956]: info: Loading plugins from folder /data/plugins/
Jun 11 04:54:13 hacker volumio[956]: info: Loading plugin "system"...
Jun 11 04:54:13 hacker volumio[956]: info: Loading plugin "appearance"...
Jun 11 04:54:13 hacker nmbd[726]: [2024/06/11 04:54:13.778413, 0] ../lib/util/become_daemon.c:138(daemon_ready)
Jun 11 04:54:13 hacker systemd[1]: Started Samba NMB Daemon.
Jun 11 04:54:13 hacker nmbd[726]: daemon_ready: STATUS=daemon 'nmbd' finished starting up and ready to serve connections
Jun 11 04:54:13 hacker systemd[1]: Starting Samba Winbind Daemon...
Jun 11 04:54:14 hacker winbindd[986]: [2024/06/11 04:54:14.194008, 0] ../source3/winbindd/winbindd_cache.c:3160(initialize_winbindd_cache)
Jun 11 04:54:14 hacker winbindd[986]: initialize_winbindd_cache: clearing cache and re-creating with version number 2
Jun 11 04:54:14 hacker winbindd[986]: [2024/06/11 04:54:14.226725, 0] ../lib/util/become_daemon.c:138(daemon_ready)
Jun 11 04:54:14 hacker systemd[1]: Started Samba Winbind Daemon.
Jun 11 04:54:14 hacker winbindd[986]: daemon_ready: STATUS=daemon 'winbindd' finished starting up and ready to serve connections
Jun 11 04:54:14 hacker systemd[1]: Starting Samba SMB Daemon...
Jun 11 04:54:14 hacker volumio-remote-updater[626]: [2024-06-11 04:54:14] [connect] Successful connection
Jun 11 04:54:14 hacker winbindd[986]: [2024/06/11 04:54:14.765891, 0] ../source3/winbindd/wb_lookupsids.c:659(wb_lookupsids_recv)
Jun 11 04:54:14 hacker winbindd[986]: res_names->count = 3, expected 4
Jun 11 04:54:14 hacker smbd[991]: [2024/06/11 04:54:14.795411, 0] ../lib/util/become_daemon.c:138(daemon_ready)
Jun 11 04:54:14 hacker smbd[991]: daemon_ready: STATUS=daemon 'smbd' finished starting up and ready to serve connections
Jun 11 04:54:14 hacker systemd[1]: Started Samba SMB Daemon.
Jun 11 04:54:14 hacker systemd[1]: Reached target Multi-User System.
Jun 11 04:54:14 hacker systemd[1]: Reached target Graphical Interface.
Jun 11 04:54:14 hacker systemd[1]: Starting Update UTMP about System Runlevel Changes...
Jun 11 04:54:14 hacker systemd[1]: systemd-update-utmp-runlevel.service: Succeeded.
Jun 11 04:54:14 hacker systemd[1]: Started Update UTMP about System Runlevel Changes.
Jun 11 04:54:14 hacker systemd[1]: Startup finished in 15.595s (kernel) + 32.707s (userspace) = 48.302s.
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "network"...
Jun 11 04:54:15 hacker volumio[956]: info: Refreshing Cached IP Addresses
Jun 11 04:54:15 hacker sudo[1001]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig eth0
Jun 11 04:54:15 hacker sudo[1001]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:15 hacker sudo[1001]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:15 hacker sudo[1003]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "services"...
Jun 11 04:54:15 hacker sudo[1003]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "alsa_controller"...
Jun 11 04:54:15 hacker sudo[1003]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:15 hacker sudo[1006]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwlist wlan0 scan
Jun 11 04:54:15 hacker sudo[1006]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:15 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "wizard"...
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "networkfs"...
Jun 11 04:54:15 hacker volumio[956]: info: Starting Udev Watcher for removable devices
Jun 11 04:54:15 hacker sudo[1014]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/mount -t nfs -o ro,soft,noauto 192.168.178.108:/volume1/music /mnt/NAS/Synology
Jun 11 04:54:15 hacker sudo[1014]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:15 hacker volumio[956]: info: Ignoring mount for partition: boot
Jun 11 04:54:15 hacker volumio[956]: info: Ignoring mount for partition: volumio
Jun 11 04:54:15 hacker volumio[956]: info: Ignoring mount for partition: volumio_data
Jun 11 04:54:15 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "volumio_command_line_client"...
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "upnp"...
Jun 11 04:54:15 hacker volumio[956]: info: [1718078055567] Starting Upmpd Daemon
Jun 11 04:54:15 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "my_music"...
Jun 11 04:54:15 hacker volumio[956]: info: Loading plugin "mpd"...
Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "upnp_browser"...
Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "alarm-clock"...
Jun 11 04:54:16 hacker systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly.
Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "airplay_emulation"...
Jun 11 04:54:16 hacker volumio[956]: info: Starting Shairport Sync
Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "last_100"...
Jun 11 04:54:16 hacker volumio[956]: info: Loading plugin "webradio"...
Jun 11 04:54:16 hacker systemd[1]: Starting Preprocess NFS configuration...
Jun 11 04:54:16 hacker systemd[1]: Reached target Host and Network Name Lookups.
Jun 11 04:54:16 hacker systemd[1]: nfs-config.service: Succeeded.
Jun 11 04:54:16 hacker systemd[1]: Started Preprocess NFS configuration.
Jun 11 04:54:16 hacker systemd[1]: Starting Notify NFS peers of a restart...
Jun 11 04:54:16 hacker systemd[1]: Starting NFS status monitor for NFSv2/3 locking....
Jun 11 04:54:16 hacker sm-notify[1028]: Version 1.3.3 starting
Jun 11 04:54:16 hacker systemd[1]: rpc-statd-notify.service: Succeeded.
Jun 11 04:54:16 hacker systemd[1]: Started Notify NFS peers of a restart.
Jun 11 04:54:16 hacker rpc.statd[1030]: Version 1.3.3 starting
Jun 11 04:54:16 hacker rpc.statd[1030]: Flags: TI-RPC
Jun 11 04:54:16 hacker systemd[1]: Started NFS status monitor for NFSv2/3 locking..
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "i2s_dacs"...
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "volumiodiscovery"...
Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi.
Jun 11 04:54:17 hacker node[956]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi.
Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** Please fix your application to use the native API of Avahi!
Jun 11 04:54:17 hacker node[956]: *** WARNING *** Please fix your application to use the native API of Avahi!
Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** For more information see
Jun 11 04:54:17 hacker node[956]: *** WARNING *** For more information see
Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi.
Jun 11 04:54:17 hacker node[956]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi.
Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** Please fix your application to use the native API of Avahi!
Jun 11 04:54:17 hacker node[956]: *** WARNING *** Please fix your application to use the native API of Avahi!
Jun 11 04:54:17 hacker volumio[956]: *** WARNING *** For more information see
Jun 11 04:54:17 hacker node[956]: *** WARNING *** For more information see
Jun 11 04:54:17 hacker volumio[956]: info: Applying required configuration parameters for plugin volumiodiscovery
Jun 11 04:54:17 hacker volumio[956]: info: Discovery: Started advertising with name: Hacker
Jun 11 04:54:17 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "bandcamp"...
Jun 11 04:54:17 hacker systemd[1]: systemd-fsckd.service: Succeeded.
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "outputs"...
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "albumart"...
Jun 11 04:54:17 hacker volumio[956]: info: Plugin example_plugin is not enabled
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "inputs"...
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "updater_comm"...
Jun 11 04:54:17 hacker volumio[956]: info: Plugin mpdemulation is not enabled
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "rest_api"...
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "websocket"...
Jun 11 04:54:17 hacker volumio[956]: info: Starting Socket.io Server version 2.3.0
Jun 11 04:54:17 hacker volumio[956]: info: Loading plugin "fusiondsp"...
Jun 11 04:54:17 hacker volumio[956]: Forking 3 albumart workers
Jun 11 04:54:18 hacker volumio[956]: info: Applying required configuration parameters for plugin fusiondsp
Jun 11 04:54:18 hacker volumio[956]: info: Loading i18n strings for locale en
Jun 11 04:54:18 hacker volumio[956]: Updating browse sources language
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources
Jun 11 04:54:18 hacker volumio[956]: Starting albumart workers
Jun 11 04:54:18 hacker volumio[956]: Starting albumart workers
Jun 11 04:54:18 hacker volumio[956]: Starting albumart workers
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::initPlayerControls
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam
Jun 11 04:54:18 hacker volumio[956]: Express server listening on port 3000
Jun 11 04:54:18 hacker volumio[956]: [Metrics] WebUI: 7s 617.40ms
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::resetVolumioState
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::getcurrentVolume
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioRetrievevolume
Jun 11 04:54:19 hacker sudo[1006]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:19 hacker volumio[956]: verbose: New Socket.io Connection to 192.168.178.85:3000 from 192.168.178.98 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 1
Jun 11 04:54:19 hacker volumio-remote-updater[626]: [2024-06-11 04:54:19] [connect] WebSocket Connection 127.0.0.1:3000 v-2 "WebSocket++/0.8.2" /socket.io/?EIO=4&transport=websocket&t=1718078054 101
Jun 11 04:54:19 hacker volumio[956]: verbose: New Socket.io Connection to 127.0.0.1:3000 from 127.0.0.1 UA: WebSocket++/0.8.2 Engine version: 4 Transport: websocket Total Clients: 2
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:19 hacker volumio[956]: info: Reloading queue from file
Jun 11 04:54:19 hacker volumio[956]: info: Setting Device type: Raspberry PI
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::setRepeat null single undefined
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState
Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::setRandom null
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState
Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState
Jun 11 04:54:19 hacker volumio[956]: info: VolumeController:: Volume=79 Mute =false
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState
Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::updateTrackBlock
Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrackBlock
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioRetrievevolume
Jun 11 04:54:19 hacker volumio[956]: info: VolumeController:: Volume=79 Mute =false
Jun 11 04:54:19 hacker volumio[956]: info: CoreStateMachine::pushState
Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioPushState
Jun 11 04:54:19 hacker volumio[956]: info: Discovery: adding 2c059fac-910b-4553-9975-724a0b682124
Jun 11 04:54:19 hacker volumio[956]: info: Discovery: Found device Hacker
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioGetState
Jun 11 04:54:19 hacker volumio[956]: info: CorePlayQueue::getTrack 0
Jun 11 04:54:19 hacker sudo[1014]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:19 hacker volumio[956]: info: Cannot mount NAS Synology at system boot, trial number 1 ,retrying in 5 seconds
Jun 11 04:54:19 hacker volumio[956]: info: Completed loading Core Plugins
Jun 11 04:54:19 hacker volumio[956]: info: Preparing to generate the ALSA configuration file
Jun 11 04:54:19 hacker volumio[956]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf
Jun 11 04:54:19 hacker volumio[956]: info: Reading ALSA contributions from plugins.
Jun 11 04:54:19 hacker volumio[956]: info: Asound.conf file unchanged, so no further update is needed
Jun 11 04:54:19 hacker volumio[956]: info: Output device has changed, restarting MPD
Jun 11 04:54:19 hacker volumio[956]: info: Output device has changed, restarting Shairport Sync
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:19 hacker sudo[1098]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:19 hacker sudo[1098]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:19 hacker sudo[1098]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:19 hacker sudo[1100]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service
Jun 11 04:54:19 hacker sudo[1100]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:19 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0
Jun 11 04:54:19 hacker volumio[956]: info: ___________ START PLUGINS ___________
Jun 11 04:54:19 hacker volumio[956]: info: ControllerMpd::onStart: Initializing MPD
Jun 11 04:54:19 hacker volumio[956]: info: Creating MPD Configuration file
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object]
Jun 11 04:54:19 hacker sudo[1108]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf
Jun 11 04:54:19 hacker sudo[1108]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:19 hacker volumio[956]: info: [1718078059826] CoreMusicLibrary::Adding element Media Servers
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources
Jun 11 04:54:19 hacker systemd[1]: Listening on mpd.socket.
Jun 11 04:54:19 hacker systemd[1]: Starting Music Player Daemon...
Jun 11 04:54:19 hacker sudo[1108]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:19 hacker sudo[1110]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service
Jun 11 04:54:19 hacker sudo[1110]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:19 hacker systemd[1]: mpd.service: Control process exited, code=killed, status=15/TERM
Jun 11 04:54:19 hacker systemd[1]: mpd.service: Succeeded.
Jun 11 04:54:19 hacker systemd[1]: Stopped Music Player Daemon.
Jun 11 04:54:19 hacker systemd[1]: Starting Music Player Daemon...
Jun 11 04:54:19 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:19 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object]
Jun 11 04:54:19 hacker volumio[956]: info: [1718078059959] CoreMusicLibrary::Adding element Last_100
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object]
Jun 11 04:54:19 hacker volumio[956]: info: [1718078059963] CoreMusicLibrary::Adding element Webradio
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources
Jun 11 04:54:19 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion
Jun 11 04:54:19 hacker volumio[956]: info: Initializing BBC Radios
Jun 11 04:54:19 hacker sudo[1115]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log
Jun 11 04:54:19 hacker sudo[1115]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:19 hacker sudo[1115]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory
Jun 11 04:54:19 hacker sudo[1115]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object]
Jun 11 04:54:20 hacker volumio[956]: info: [1718078060055] CoreMusicLibrary::Adding element Bandcamp Discover
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources
Jun 11 04:54:20 hacker volumio[956]: Cannot find translation for source Bandcamp Discover
Jun 11 04:54:20 hacker volumio[956]: info: Loading i18n strings for locale en
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , updateALSAConfigFile
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: FusionDsp - mixtype--------------------- Hardware
Jun 11 04:54:20 hacker volumio[956]: info: Volumio Calling Home
Jun 11 04:54:20 hacker volumio[956]: info: Preparing to generate the ALSA configuration file
Jun 11 04:54:20 hacker volumio[956]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf
Jun 11 04:54:20 hacker volumio[956]: info: Reading ALSA contributions from plugins.
Jun 11 04:54:20 hacker volumio[956]: info: MPD Permissions set
Jun 11 04:54:20 hacker volumio[956]: info: MPD Permissions set
Jun 11 04:54:20 hacker volumio[956]: verbose: New Socket.io Connection to localhost:3000 from 127.0.0.1 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 3
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: Volumio called home
Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync
Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync
Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync
Jun 11 04:54:20 hacker sudo[1146]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync
Jun 11 04:54:20 hacker sudo[1146]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:20 hacker volumio[956]: info: Asound.conf file unchanged, so no further update is needed
Jun 11 04:54:20 hacker volumio[956]: info: Output device has changed, restarting MPD
Jun 11 04:54:20 hacker sudo[1148]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync
Jun 11 04:54:20 hacker sudo[1151]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync
Jun 11 04:54:20 hacker sudo[1148]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:20 hacker sudo[1151]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:20 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver...
Jun 11 04:54:20 hacker systemd[1]: shairport-sync.service: Succeeded.
Jun 11 04:54:20 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver.
Jun 11 04:54:20 hacker sudo[1155]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf
Jun 11 04:54:20 hacker sudo[1155]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:20 hacker volumio[956]: info: Output device has changed, restarting Shairport Sync
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:20 hacker sudo[1155]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:20 hacker sudo[1159]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service
Jun 11 04:54:20 hacker sudo[1159]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:20 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver.
Jun 11 04:54:20 hacker volumio[956]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0
Jun 11 04:54:20 hacker sudo[1146]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::volumioGetState
Jun 11 04:54:20 hacker volumio[956]: info: CorePlayQueue::getTrack 0
Jun 11 04:54:20 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver...
Jun 11 04:54:20 hacker volumio[956]: info: MPD Permissions set
Jun 11 04:54:20 hacker systemd[1]: mpd.service: Main process exited, code=killed, status=15/TERM
Jun 11 04:54:20 hacker systemd[1]: mpd.service: Succeeded.
Jun 11 04:54:20 hacker systemd[1]: Stopped Music Player Daemon.
Jun 11 04:54:20 hacker systemd[1]: shairport-sync.service: Succeeded.
Jun 11 04:54:20 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver.
Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started
Jun 11 04:54:20 hacker volumio[956]: Error adding Membership: Error: addMembership EINVAL
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver.
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam
Jun 11 04:54:20 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:20 hacker sudo[1151]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:20 hacker systemd[1]: Starting Music Player Daemon...
Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started
Jun 11 04:54:20 hacker volumio[956]: info: Starting Shairport Sync
Jun 11 04:54:20 hacker sudo[1148]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:20 hacker volumio[956]: info: Discovery: adding 938cc0b6-0f9c-44ba-aa1d-b67b2b391b23
Jun 11 04:54:20 hacker volumio[956]: info: Discovery: Found device TiVolumio
Jun 11 04:54:20 hacker volumio[956]: info: Discovery: Connecting to remote: 192.168.178.98
Jun 11 04:54:20 hacker sudo[1176]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync
Jun 11 04:54:20 hacker sudo[1176]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started
Jun 11 04:54:20 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver...
Jun 11 04:54:20 hacker systemd[1]: shairport-sync.service: Succeeded.
Jun 11 04:54:20 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver.
Jun 11 04:54:20 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver.
Jun 11 04:54:20 hacker sudo[1176]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:20 hacker volumio[956]: info: Shairport-Sync Started
Jun 11 04:54:20 hacker sudo[1174]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log
Jun 11 04:54:20 hacker sudo[1174]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:20 hacker sudo[1174]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory
Jun 11 04:54:20 hacker sudo[1174]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:21 hacker sh[569]: timed out
Jun 11 04:54:21 hacker dhcpcd[603]: timed out
Jun 11 04:54:21 hacker sh[569]: dhcpcd exited
Jun 11 04:54:21 hacker dhcpcd[603]: dhcpcd exited
Jun 11 04:54:21 hacker sh[569]: ifup: failed to bring up eth0
Jun 11 04:54:21 hacker systemd[1]: ifup@eth0.service: Main process exited, code=exited, status=1/FAILURE
Jun 11 04:54:21 hacker systemd[1]: ifup@eth0.service: Failed with result 'exit-code'.
Jun 11 04:54:21 hacker volumio[956]: info: Discovery: Connected to remote: 192.168.178.98
Jun 11 04:54:22 hacker volumio[956]: info: camilladsp spawned new process with pid undefined, instance 1, run: true
Jun 11 04:54:22 hacker volumio[956]: info: camilladsp service started and running in background, instance 1
Jun 11 04:54:22 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam
Jun 11 04:54:22 hacker volumio[956]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found
Jun 11 04:54:22 hacker volumio[956]: error: FusionDsp - ----Hw detection failed :Error: Command failed: /data/plugins/audio_interface/fusiondsp/hw_params volumioHw >/data/configuration/audio_interface/fusiondsp/hwinfo.json
Jun 11 04:54:22 hacker volumio[956]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found
Jun 11 04:54:22 hacker volumio[956]: info: FusionDsp loaded
Jun 11 04:54:22 hacker volumio[956]: info: CoreCommandRouter::executeOnPlugin: network , getCachedIPAddresses
Jun 11 04:54:22 hacker sudo[1196]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl start fusiondsp.service
Jun 11 04:54:22 hacker sudo[1196]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 11 04:54:22 hacker volumio[956]: info: FusionDsp - Reporting Fusion DSP Enabled
Jun 11 04:54:22 hacker volumio[956]: info: Adding Signal Path Element [object Object]
Jun 11 04:54:22 hacker volumio[956]: info: Adding fusiondspeq DSP Signal Path Element
Jun 11 04:54:22 hacker volumio[956]: info: FusionDsp - ---- installed callbackRead
Jun 11 04:54:22 hacker volumio[956]: |||||||||||||||||||||||| WARNING: FATAL ERROR |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Jun 11 04:54:22 hacker sudo[1196]: pam_unix(sudo:session): session closed for user root
Jun 11 04:54:22 hacker volumio[956]: Error: spawn /data/plugins/audio_interface/fusiondsp/camilladsp ENOENT
Jun 11 04:54:22 hacker volumio[956]: at Process.ChildProcess._handle.onexit (internal/child_process.js:269:19)
Jun 11 04:54:22 hacker volumio[956]: at onErrorNT (internal/child_process.js:465:16)
Jun 11 04:54:22 hacker volumio[956]: at processTicksAndRejections (internal/process/task_queues.js:80:21) {
Jun 11 04:54:22 hacker volumio[956]: errno: -2,
Jun 11 04:54:22 hacker volumio[956]: code: 'ENOENT',
Jun 11 04:54:22 hacker volumio[956]: syscall: 'spawn /data/plugins/audio_interface/fusiondsp/camilladsp',
Jun 11 04:54:22 hacker volumio[956]: path: '/data/plugins/audio_interface/fusiondsp/camilladsp',
Jun 11 04:54:22 hacker volumio[956]: spawnargs: [
Jun 11 04:54:22 hacker volumio[956]: '-p',
Jun 11 04:54:22 hacker volumio[956]: 9876,
Jun 11 04:54:22 hacker volumio[956]: '-o',
Jun 11 04:54:22 hacker volumio[956]: '/tmp/camilladsp.log',
Jun 11 04:54:22 hacker volumio[956]: '-l',
Jun 11 04:54:22 hacker volumio[956]: 'warn',
Jun 11 04:54:22 hacker volumio[956]: '/data/configuration/audio_interface/fusiondsp/camilladsp.yml'
Jun 11 04:54:22 hacker volumio[956]: ]
Jun 11 04:54:22 hacker volumio[956]: }
Jun 11 04:54:22 hacker volumio[956]: |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Jun 11 04:54:22 hacker sudo[1207]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/journalctl --since=2024-06-11 04:53
Jun 11 04:54:22 hacker sudo[1207]: pam_unix(sudo:session): session opened for user root by (uid=0)
PRETTY_NAME="Raspbian GNU/Linux 10 (buster)"
NAME="Raspbian GNU/Linux"
VERSION_ID="10"
VERSION="10 (buster)"
VERSION_CODENAME=buster
ID=raspbian
ID_LIKE=debian
HOME_URL="http://www.raspbian.org/"
SUPPORT_URL="http://www.raspbian.org/RaspbianForums"
BUG_REPORT_URL="http://www.raspbian.org/RaspbianBugs"
VOLUMIO_BUILD_VERSION="4b122b2365bb8c09786cd63b50d1ea6db780eb4e"
VOLUMIO_FE_VERSION="e7cae168f9927391640a091813b8a9656b6909b6"
VOLUMIO_FE3_VERSION="df82a8f23c90a3617c15c55572c8aaea90d8b32a"
VOLUMIO_BE_VERSION="49f98390f2d84c6549f33dc85b694fbd99e4c720"
VOLUMIO_ARCH="arm"
VOLUMIO_VARIANT="volumio"
VOLUMIO_TEST="FALSE"
VOLUMIO_BUILD_DATE="Tue 04 Jun 2024 08:41:12 PM CEST"
VOLUMIO_VERSION="3.703"
VOLUMIO_HARDWARE="pi"
VOLUMIO_DEVICENAME="Raspberry Pi"
VOLUMIO_HASH="8e78a6e3f56f1bcbbd1760812129a8e9"