-- Logs begin at Thu 2019-02-14 10:12:00 GMT, end at Tue 2024-06-11 04:54:28 BST. -- Jun 11 04:53:45 hacker fake-hwclock[308]: Tue Jun 11 03:53:45 UTC 2024 Jun 11 04:53:45 hacker systemd[1]: Started Remount Root and Kernel File Systems. Jun 11 04:53:45 hacker systemd[1]: Mounted Kernel Debug File System. Jun 11 04:53:45 hacker systemd[1]: Mounted RPC Pipe File System. Jun 11 04:53:45 hacker systemd[1]: Mounted POSIX Message Queue File System. Jun 11 04:53:45 hacker systemd[1]: Started Restore / save the current clock. Jun 11 04:53:45 hacker systemd[1]: Mounted FUSE Control File System. Jun 11 04:53:45 hacker systemd[1]: Mounted Kernel Configuration File System. Jun 11 04:53:45 hacker systemd[1]: Started Apply Kernel Variables. Jun 11 04:53:45 hacker systemd[1]: Starting Create System Users... Jun 11 04:53:45 hacker systemd[1]: Starting Load/Save Random Seed... Jun 11 04:53:45 hacker systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped. Jun 11 04:53:45 hacker systemd[1]: dynamicswap.service: Succeeded. Jun 11 04:53:45 hacker systemd[1]: Started Load/Save Random Seed. Jun 11 04:53:45 hacker systemd[1]: Started udev Coldplug all Devices. Jun 11 04:53:45 hacker systemd[1]: Starting Helper to synchronize boot up for ifupdown... Jun 11 04:53:45 hacker systemd[1]: Started Create System Users. Jun 11 04:53:45 hacker systemd[1]: Starting Create Static Device Nodes in /dev... Jun 11 04:53:45 hacker systemd[1]: Started Helper to synchronize boot up for ifupdown. Jun 11 04:53:45 hacker systemd[1]: Started Create Static Device Nodes in /dev. Jun 11 04:53:45 hacker systemd[1]: Starting udev Kernel Device Manager... Jun 11 04:53:45 hacker systemd[1]: Reached target Local File Systems (Pre). Jun 11 04:53:45 hacker systemd[1]: var-log.mount: Directory /var/log to mount over is not empty, mounting anyway. Jun 11 04:53:45 hacker systemd[1]: Mounting /var/log... Jun 11 04:53:45 hacker systemd[1]: tmp.mount: Directory /tmp to mount over is not empty, mounting anyway. Jun 11 04:53:45 hacker systemd[1]: Mounting /tmp... Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups... Jun 11 04:53:45 hacker systemd[1]: Mounted /var/log. Jun 11 04:53:45 hacker systemd[1]: Starting Flush Journal to Persistent Storage... Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups. Jun 11 04:53:45 hacker systemd[1]: Mounted /tmp. Jun 11 04:53:45 hacker systemd[1]: Mounting /var/spool/cups/tmp... Jun 11 04:53:45 hacker systemd-udevd[349]: Network interface NamePolicy= disabled on kernel command line, ignoring. Jun 11 04:53:45 hacker systemd[1]: Mounted /var/spool/cups/tmp. Jun 11 04:53:45 hacker systemd-journald[304]: Runtime journal (/run/log/journal/8ae31a5258af32ecbc8d1a0d62a2178b) is 7.5M, max 30.0M, 22.5M free. Jun 11 04:53:45 hacker systemd[1]: Started Flush Journal to Persistent Storage. Jun 11 04:53:45 hacker systemd[1]: Started udev Kernel Device Manager. Jun 11 04:53:45 hacker systemd[1]: Starting Show Plymouth Boot Screen... Jun 11 04:53:45 hacker systemd[1]: plymouth-start.service: Succeeded. Jun 11 04:53:45 hacker systemd[1]: Started Show Plymouth Boot Screen. Jun 11 04:53:45 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped. Jun 11 04:53:45 hacker systemd[1]: Reached target Local Encrypted Volumes. Jun 11 04:53:45 hacker systemd[1]: Reached target Paths. Jun 11 04:53:45 hacker systemd[1]: Started Forward Password Requests to Plymouth Directory Watch. Jun 11 04:53:46 hacker kernel: vc_sm_cma: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835_vc_sm_cma_probe: Videocore shared memory driver Jun 11 04:53:46 hacker kernel: [vc_sm_connected_init]: start Jun 11 04:53:46 hacker kernel: mc: Linux media interface: v0.10 Jun 11 04:53:46 hacker kernel: [vc_sm_connected_init]: installed successfully Jun 11 04:53:46 hacker kernel: rpi-gpiomem 3f200000.gpiomem: window base 0x3f200000 size 0x00001000 Jun 11 04:53:46 hacker kernel: rpi-gpiomem 3f200000.gpiomem: initialised 1 regions as /dev/gpiomem Jun 11 04:53:46 hacker kernel: videodev: Linux video capture interface: v2.00 Jun 11 04:53:46 hacker kernel: bcm2835_mmal_vchiq: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835_isp: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835_v4l2: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video13 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video14 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video15 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video16 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node output[0] registered as /dev/video20 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[0] registered as /dev/video21 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node capture[1] registered as /dev/video22 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Device node stats[2] registered as /dev/video23 Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register output node 0 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 1 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 2 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Register capture node 3 with media controller Jun 11 04:53:46 hacker kernel: bcm2835-isp bcm2835-isp: Loaded V4L2 bcm2835-isp Jun 11 04:53:46 hacker kernel: bcm2835_codec: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video10 Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 decode Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video11 Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video12 Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 isp Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video18 Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 image_fx Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Device registered as /dev/video31 Jun 11 04:53:46 hacker kernel: bcm2835-codec bcm2835-codec: Loaded V4L2 encode_image Jun 11 04:53:46 hacker systemd[1]: Found device /dev/disk/by-uuid/815B-E7CF. Jun 11 04:53:46 hacker kernel: snd_bcm2835: module is from the staging directory, the quality is unknown, you have been warned. Jun 11 04:53:46 hacker kernel: snd_bcm2835: unknown parameter 'enable_compat_alsa' ignored Jun 11 04:53:46 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels Jun 11 04:53:46 hacker kernel: bcm2835_audio bcm2835_audio: card created with 4 channels Jun 11 04:53:47 hacker kernel: Bluetooth: Core ver 2.22 Jun 11 04:53:47 hacker kernel: NET: Registered PF_BLUETOOTH protocol family Jun 11 04:53:47 hacker kernel: Bluetooth: HCI device and connection manager initialized Jun 11 04:53:47 hacker kernel: Bluetooth: HCI socket layer initialized Jun 11 04:53:47 hacker kernel: Bluetooth: L2CAP socket layer initialized Jun 11 04:53:47 hacker kernel: Bluetooth: SCO socket layer initialized Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART driver ver 2.3 Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART protocol H4 registered Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART protocol Three-wire (H5) registered Jun 11 04:53:47 hacker kernel: Bluetooth: HCI UART protocol Broadcom registered Jun 11 04:53:47 hacker kernel: hci_uart_bcm serial0-0: supply vbat not found, using dummy regulator Jun 11 04:53:47 hacker kernel: hci_uart_bcm serial0-0: supply vddio not found, using dummy regulator Jun 11 04:53:47 hacker kernel: uart-pl011 3f201000.serial: no DMA platform data Jun 11 04:53:47 hacker systemd[1]: Starting File System Check on /dev/disk/by-uuid/815B-E7CF... Jun 11 04:53:47 hacker systemd-udevd[361]: Using default interface naming scheme 'v240'. Jun 11 04:53:47 hacker systemd-udevd[361]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:47 hacker systemd[1]: Started File System Check Daemon to report status. Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM: chip id 107 Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM: features 0x2f Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM4345C0 Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0000 Jun 11 04:53:47 hacker kernel: Bluetooth: hci0: BCM4345C0 'brcm/BCM4345C0.hcd' Patch Jun 11 04:53:47 hacker kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'benh@debian.org: 577e021cb980e0e820821ba7b54b4961b8b4fadf' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'romain.perier@gmail.com: 3abbc6ec146e09d1b6016ab9d6cf71dd233f0328' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' Jun 11 04:53:47 hacker kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Jun 11 04:53:47 hacker systemd-udevd[364]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:47 hacker systemd-fsck[433]: fsck.fat 4.1 (2017-01-24) Jun 11 04:53:47 hacker systemd-fsck[433]: 0x25: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Jun 11 04:53:47 hacker systemd-fsck[433]: Automatically removing dirty bit. Jun 11 04:53:47 hacker systemd-fsck[433]: Performing changes. Jun 11 04:53:47 hacker systemd-fsck[433]: /dev/mmcblk0p1: 456 files, 34026/46774 clusters Jun 11 04:53:47 hacker systemd[1]: Started File System Check on /dev/disk/by-uuid/815B-E7CF. Jun 11 04:53:47 hacker kernel: brcmfmac: F1 signature read @0x18000000=0x15264345 Jun 11 04:53:47 hacker kernel: brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6 Jun 11 04:53:47 hacker kernel: usbcore: registered new interface driver brcmfmac Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM: features 0x2f Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM43455 37.4MHz Raspberry Pi 3+ Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM4345C0 (003.001.025) build 0342 Jun 11 04:53:48 hacker kernel: Bluetooth: hci0: BCM: Using default device address (43:45:c0:00:1f:ac) Jun 11 04:53:48 hacker kernel: brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Nov 1 2021 00:37:25 version 7.45.241 (1a2f2fa CY) FWID 01-703fd60 Jun 11 04:53:48 hacker systemd-udevd[356]: Using default interface naming scheme 'v240'. Jun 11 04:53:48 hacker systemd-udevd[356]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in 7800 being skipped. Jun 11 04:53:49 hacker systemd[1]: Created slice system-bthelper.slice. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Huge Pages File System being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jun 11 04:53:49 hacker systemd[1]: Starting Show Plymouth Boot Screen... Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped. Jun 11 04:53:49 hacker systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jun 11 04:53:49 hacker systemd[1]: Mounting /boot... Jun 11 04:53:49 hacker systemd[1]: Found device /sys/subsystem/net/devices/wlan0. Jun 11 04:53:49 hacker systemd[1]: Mounted /boot. Jun 11 04:53:49 hacker systemd[1]: plymouth-start.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Show Plymouth Boot Screen. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped. Jun 11 04:53:49 hacker systemd[1]: Reached target Local File Systems. Jun 11 04:53:49 hacker systemd[1]: Started ifup for eth0. Jun 11 04:53:49 hacker systemd[1]: Starting Raise network interfaces... Jun 11 04:53:49 hacker systemd[1]: Starting Preprocess NFS configuration... Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped. Jun 11 04:53:49 hacker systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... Jun 11 04:53:49 hacker systemd[1]: Starting Create Volatile Files and Directories... Jun 11 04:53:49 hacker systemd[1]: Started ifup for wlan0. Jun 11 04:53:49 hacker systemd[1]: Starting Load/Save RF Kill Switch Status... Jun 11 04:53:49 hacker systemd[1]: nfs-config.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Preprocess NFS configuration. Jun 11 04:53:49 hacker systemd[1]: Received SIGRTMIN+20 from PID 191 (plymouthd). Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in RPC security service for NFS client and server being skipped. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in RPC security service for NFS server being skipped. Jun 11 04:53:49 hacker systemd[1]: Reached target NFS client services. Jun 11 04:53:49 hacker systemd[1]: plymouth-read-write.service: Succeeded. Jun 11 04:53:49 hacker systemd[1]: Started Tell Plymouth To Write Out Runtime Data. Jun 11 04:53:49 hacker systemd[1]: Started Load/Save RF Kill Switch Status. Jun 11 04:53:49 hacker systemd[1]: Started Create Volatile Files and Directories. Jun 11 04:53:49 hacker systemd[1]: Condition check resulted in Network Time Synchronization being skipped. Jun 11 04:53:49 hacker systemd[1]: Starting Update UTMP about System Boot/Shutdown... Jun 11 04:53:49 hacker systemd[1]: Started Entropy daemon using the HAVEGE algorithm. Jun 11 04:53:49 hacker systemd[1]: Starting RPC bind portmap service... Jun 11 04:53:49 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:49 hacker systemd[1]: Started Update UTMP about System Boot/Shutdown. Jun 11 04:53:49 hacker systemd[1]: Reached target System Initialization. Jun 11 04:53:50 hacker systemd[1]: Listening on triggerhappy.socket. Jun 11 04:53:50 hacker systemd[1]: apt-daily.timer: Not using persistent file timestamp Sat 2024-07-06 11:27:00 BST as it is in the future. Jun 11 04:53:50 hacker systemd[1]: Started Daily apt download activities. Jun 11 04:53:50 hacker systemd[1]: apt-daily-upgrade.timer: Not using persistent file timestamp Sat 2024-07-06 11:27:00 BST as it is in the future. Jun 11 04:53:50 hacker systemd[1]: Started Daily apt upgrade and clean activities. Jun 11 04:53:50 hacker systemd[1]: Listening on D-Bus System Message Bus Socket. Jun 11 04:53:50 hacker systemd[1]: Started Daily Cleanup of Temporary Directories. Jun 11 04:53:50 hacker systemd[1]: Reached target Timers. Jun 11 04:53:50 hacker systemd[1]: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. Jun 11 04:53:50 hacker systemd[1]: Reached target Sockets. Jun 11 04:53:50 hacker systemd[1]: Reached target Basic System. Jun 11 04:53:50 hacker kernel: 8021q: 802.1Q VLAN Support v1.8 Jun 11 04:53:50 hacker systemd[1]: Started UPnP Renderer front-end to MPD. Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Volumio SSH enabler being skipped. Jun 11 04:53:50 hacker systemd[1]: Started Volumio Log Rotation Service. Jun 11 04:53:50 hacker systemd[1]: Starting Wireless Services... Jun 11 04:53:50 hacker systemd[1]: Starting Avahi mDNS/DNS-SD Stack... Jun 11 04:53:50 hacker systemd[1]: Starting triggerhappy global hotkey daemon... Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in Copy user wpa_supplicant.conf being skipped. Jun 11 04:53:50 hacker systemd[1]: Starting dhcpcd on all interfaces... Jun 11 04:53:50 hacker systemd[1]: Started D-Bus System Message Bus. Jun 11 04:53:50 hacker dhcpcd[622]: Not running dhcpcd because /etc/network/interfaces Jun 11 04:53:50 hacker dhcpcd[622]: defines some interfaces that will use a Jun 11 04:53:50 hacker dhcpcd[622]: DHCP client or static address Jun 11 04:53:50 hacker thd[621]: Unable to parse trigger line: Jun 11 04:53:50 hacker thd[621]: Unable to parse trigger line: KEY_MIN_INTERESTING 1 /usr/local/bin/volumio volume toggle Jun 11 04:53:50 hacker thd[621]: Unable to parse trigger line: Jun 11 04:53:50 hacker thd[621]: Found socket passed from systemd Jun 11 04:53:50 hacker systemd[1]: Starting WPA supplicant... Jun 11 04:53:50 hacker systemd[1]: Starting Configure Bluetooth Modems connected by UART... Jun 11 04:53:50 hacker systemd[1]: Started volumio-remote-updater.service. Jun 11 04:53:50 hacker systemd[1]: Started Manage Sound Card State (restore and store). Jun 11 04:53:50 hacker systemd[1]: Starting Save/Restore Sound Card State... Jun 11 04:53:50 hacker systemd[1]: Condition check resulted in getty on tty2-tty6 if dbus and logind are not available being skipped. Jun 11 04:53:50 hacker systemd[1]: Started Volumio Iptables Module. Jun 11 04:53:50 hacker alsactl[632]: alsactl 1.1.8 daemon started Jun 11 04:53:50 hacker systemd[1]: Starting Login Service... Jun 11 04:53:50 hacker systemd[1]: Started RPC bind portmap service. Jun 11 04:53:50 hacker systemd[1]: Started triggerhappy global hotkey daemon. Jun 11 04:53:50 hacker systemd[1]: dhcpcd.service: Control process exited, code=exited, status=6/NOTCONFIGURED Jun 11 04:53:50 hacker systemd[1]: dhcpcd.service: Failed with result 'exit-code'. Jun 11 04:53:50 hacker systemd[1]: Failed to start dhcpcd on all interfaces. Jun 11 04:53:50 hacker systemd[1]: Started Save/Restore Sound Card State. Jun 11 04:53:50 hacker systemd[1]: Reached target Sound Card. Jun 11 04:53:50 hacker systemd[1]: Reached target RPC Port Mapper. Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems (Pre). Jun 11 04:53:50 hacker systemd[1]: Reached target Remote File Systems. Jun 11 04:53:50 hacker avahi-daemon[619]: Found user 'avahi' (UID 110) and group 'avahi' (GID 113). Jun 11 04:53:50 hacker avahi-daemon[619]: Successfully dropped root privileges. Jun 11 04:53:50 hacker systemd[1]: Starting LSB: Load kernel modules needed to enable cpufreq scaling... Jun 11 04:53:50 hacker avahi-daemon[619]: avahi-daemon 0.7 starting up. Jun 11 04:53:50 hacker sh[524]: wlan0=wlan0 Jun 11 04:53:50 hacker systemd-logind[635]: New seat seat0. Jun 11 04:53:51 hacker kernel: lan78xx 1-1.1.1:1.0 eth0: Link is Down Jun 11 04:53:51 hacker sh[516]: eth0: waiting for carrier Jun 11 04:53:51 hacker kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Jun 11 04:53:51 hacker dhcpcd[571]: eth0: waiting for carrier Jun 11 04:53:51 hacker dbus-daemon[624]: [system] Successfully activated service 'org.freedesktop.systemd1' Jun 11 04:53:51 hacker avahi-daemon[619]: Successfully called chroot(). Jun 11 04:53:51 hacker avahi-daemon[619]: Successfully dropped remaining capabilities. Jun 11 04:53:51 hacker systemd[1]: Started Avahi mDNS/DNS-SD Stack. Jun 11 04:53:51 hacker systemd[1]: Started Login Service. Jun 11 04:53:51 hacker systemd[1]: hciuart.service: Succeeded. Jun 11 04:53:51 hacker systemd[1]: Started Configure Bluetooth Modems connected by UART. Jun 11 04:53:51 hacker avahi-daemon[619]: Loading service file /services/volumio.service. Jun 11 04:53:51 hacker wpa_supplicant[626]: Successfully initialized wpa_supplicant Jun 11 04:53:51 hacker avahi-daemon[619]: Network interface enumeration completed. Jun 11 04:53:51 hacker avahi-daemon[619]: Server startup complete. Host name is hacker.local. Local service cookie is 3701576460. Jun 11 04:53:51 hacker avahi-daemon[619]: Service "Hacker" (/services/volumio.service) successfully established. Jun 11 04:53:51 hacker systemd[1]: Started Raise network interfaces. Jun 11 04:53:51 hacker systemd[1]: Started WPA supplicant. Jun 11 04:53:51 hacker systemd[1]: Reached target Network. Jun 11 04:53:51 hacker systemd[1]: Starting Permit User Sessions... Jun 11 04:53:51 hacker systemd[1]: Starting Network Time Service... Jun 11 04:53:51 hacker systemd[1]: Starting OpenBSD Secure Shell server... Jun 11 04:53:51 hacker systemd[1]: Condition check resulted in fast remote file copy program daemon being skipped. Jun 11 04:53:51 hacker systemd[1]: Reached target Network is Online. Jun 11 04:53:51 hacker systemd[1]: Starting LSB: Brings up/down network automatically... Jun 11 04:53:51 hacker systemd[1]: Starting Samba NMB Daemon... Jun 11 04:53:51 hacker systemd[1]: Starting /etc/rc.local Compatibility... Jun 11 04:53:51 hacker systemd[1]: Starting Raspberry Pi bluetooth helper... Jun 11 04:53:51 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:53:52 hacker volumio-remote-updater[631]: Error: No active session Jun 11 04:53:52 hacker systemd[1]: Started Permit User Sessions. Jun 11 04:53:52 hacker systemd[1]: Started /etc/rc.local Compatibility. Jun 11 04:53:52 hacker volumio-remote-updater[631]: [2024-06-11 04:53:52] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:53:52 hacker volumio-remote-updater[631]: [2024-06-11 04:53:52] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:53:52 hacker volumio-remote-updater[631]: [2024-06-11 04:53:52] [error] handle_connect error: Underlying Transport Error Jun 11 04:53:52 hacker systemd[1]: Starting Hold until boot process finishes up... Jun 11 04:53:52 hacker systemd[1]: Starting Terminate Plymouth Boot Screen... Jun 11 04:53:52 hacker volumio[606]: Could not open config: /tmp/upmpdcli.conf Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Main process exited, code=exited, status=1/FAILURE Jun 11 04:53:52 hacker systemd[1]: upmpdcli.service: Failed with result 'exit-code'. Jun 11 04:53:52 hacker bthelper[717]: Raspberry Pi BDADDR already set Jun 11 04:53:52 hacker systemd[1]: Started Raspberry Pi bluetooth helper. Jun 11 04:53:52 hacker systemd[1]: plymouth-quit-wait.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Started Hold until boot process finishes up. Jun 11 04:53:52 hacker systemd[1]: plymouth-quit.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Started Terminate Plymouth Boot Screen. Jun 11 04:53:52 hacker systemd[1]: iptables.service: Succeeded. Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 191 (n/a). Jun 11 04:53:52 hacker systemd[1]: Received SIGRTMIN+21 from PID 191 (n/a). Jun 11 04:53:52 hacker ifplugd(eth0)[772]: ifplugd 0.28 initializing. Jun 11 04:53:52 hacker ifplugd(eth0)[772]: Using interface eth0/B8:27:EB:AD:38:72 with driver (version: 6.1.77-v7+) Jun 11 04:53:52 hacker systemd[1]: Started Getty on tty1. Jun 11 04:53:52 hacker systemd[1]: Reached target Login Prompts. Jun 11 04:53:52 hacker ifplugd(eth0)[772]: Using detection mode: SIOCETHTOOL Jun 11 04:53:52 hacker ifplugd(eth0)[772]: Initialization complete, link beat not detected. Jun 11 04:53:52 hacker systemd[1]: Starting Bluetooth service... Jun 11 04:53:52 hacker ntpd[709]: ntpd 4.2.8p12@1.3728-o (1): Starting Jun 11 04:53:52 hacker ntpd[709]: Command line: /usr/sbin/ntpd -p /var/run/ntpd.pid -g -u 103:103 Jun 11 04:53:52 hacker systemd[1]: Started Network Time Service. Jun 11 04:53:52 hacker ifplugd[713]: Network Interface Plugging Daemon...start eth0...done. Jun 11 04:53:52 hacker systemd[1]: Started LSB: Brings up/down network automatically. Jun 11 04:53:52 hacker loadcpufreq[657]: Loading cpufreq kernel modules...done (none). Jun 11 04:53:52 hacker systemd[1]: Started LSB: Load kernel modules needed to enable cpufreq scaling. Jun 11 04:53:52 hacker ntpd[777]: proto: precision = 1.458 usec (-19) Jun 11 04:53:52 hacker ntpd[777]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): good hash signature Jun 11 04:53:52 hacker ntpd[777]: leapsecond file ('/usr/share/zoneinfo/leap-seconds.list'): loaded, expire=2024-12-28T00:00:00Z last=2017-01-01T00:00:00Z ofs=37 Jun 11 04:53:52 hacker ntpd[777]: Listen and drop on 0 v6wildcard [::]:123 Jun 11 04:53:52 hacker ntpd[777]: Listen and drop on 1 v4wildcard 0.0.0.0:123 Jun 11 04:53:52 hacker ntpd[777]: Listen normally on 2 lo 127.0.0.1:123 Jun 11 04:53:52 hacker ntpd[777]: Listening on routing socket on fd #19 for interface updates Jun 11 04:53:52 hacker ntpd[777]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jun 11 04:53:52 hacker ntpd[777]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jun 11 04:53:52 hacker systemd[1]: Starting LSB: set CPUFreq kernel parameters... Jun 11 04:53:52 hacker sshd[782]: Server listening on 0.0.0.0 port 22. Jun 11 04:53:52 hacker sshd[782]: Server listening on :: port 22. Jun 11 04:53:52 hacker systemd[1]: Started OpenBSD Secure Shell server. Jun 11 04:53:53 hacker bluetoothd[773]: Bluetooth daemon 5.50 Jun 11 04:53:53 hacker bluetoothd[773]: Unknown key AutoConnectTimeout for group General in /etc/bluetooth/main.conf Jun 11 04:53:53 hacker systemd[1]: Started Bluetooth service. Jun 11 04:53:53 hacker systemd[1]: Reached target Bluetooth. Jun 11 04:53:53 hacker bluetoothd[773]: Starting SDP server Jun 11 04:53:53 hacker bluetoothd[773]: Excluding (cli) sap Jun 11 04:53:53 hacker cpufrequtils[779]: CPUFreq Utilities: Setting ondemand CPUFreq governor...CPU0...CPU1...CPU2...CPU3...done. Jun 11 04:53:53 hacker systemd[1]: Started LSB: set CPUFreq kernel parameters. Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP filters: protocol multicast Jun 11 04:53:53 hacker kernel: Bluetooth: BNEP socket layer initialized Jun 11 04:53:53 hacker dbus-daemon[624]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.5' (uid=0 pid=773 comm="/usr/lib/bluetooth/bluetoothd --noplugin=sap ") Jun 11 04:53:53 hacker bluetoothd[773]: Bluetooth management interface 1.22 initialized Jun 11 04:53:53 hacker kernel: Bluetooth: MGMT ver 1.22 Jun 11 04:53:53 hacker haveged[575]: haveged: ver: 1.9.1; arch: generic; vend: ; build: (gcc 8.2.0 CTV); collect: 128K Jun 11 04:53:53 hacker haveged[575]: haveged: cpu: (VC); data: 16K (D); inst: 16K (D); idx: 11/40; sz: 14768/63488 Jun 11 04:53:53 hacker haveged[575]: haveged: tot tests(BA8): A:1/1 B:1/1 continuous tests(B): last entropy estimate 7.99841 Jun 11 04:53:53 hacker haveged[575]: haveged: fills: 0, generated: 0 Jun 11 04:53:53 hacker bluetoothd[773]: Failed to set privacy: Rejected (0x0b) Jun 11 04:53:53 hacker systemd[1]: Starting Hostname Service... Jun 11 04:53:53 hacker dbus-daemon[624]: [system] Successfully activated service 'org.freedesktop.hostname1' Jun 11 04:53:53 hacker systemd[1]: Started Hostname Service. Jun 11 04:53:53 hacker ntpd[777]: error resolving pool 0.debian.pool.ntp.org: System error (-11) Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.867967, 0] ../source3/nmbd/asyncdns.c:158(start_async_dns) Jun 11 04:53:53 hacker nmbd[726]: started asyncdns process 802 Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.871621, 0] ../lib/util/become_daemon.c:149(daemon_status) Jun 11 04:53:53 hacker nmbd[726]: daemon_status: STATUS=daemon 'nmbd' : No local IPv4 non-loopback interfaces available, waiting for interface ... Jun 11 04:53:53 hacker nmbd[726]: [2024/06/11 04:53:53.872364, 0] ../source3/nmbd/nmbd_subnetdb.c:254(create_subnets) Jun 11 04:53:53 hacker nmbd[726]: NOTE: NetBIOS name resolution is not supported for Internet Protocol Version 6 (IPv6). Jun 11 04:53:54 hacker wireless.js[616]: Cleaning previous... Jun 11 04:53:54 hacker sudo[810]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0 Jun 11 04:53:54 hacker sudo[810]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:54 hacker sudo[810]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:54 hacker sudo[812]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down Jun 11 04:53:54 hacker sudo[812]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:54 hacker ntpd[777]: error resolving pool 1.debian.pool.ntp.org: System error (-11) Jun 11 04:53:54 hacker systemd[1]: systemd-rfkill.service: Succeeded. Jun 11 04:53:55 hacker sudo[812]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker wireless.js[616]: Stopped aP Jun 11 04:53:55 hacker sudo[819]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:55 hacker sudo[819]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker sudo[819]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:55 hacker sudo[821]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg get Jun 11 04:53:55 hacker sudo[821]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker sudo[821]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker sudo[828]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:55 hacker sudo[828]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker sudo[828]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:55 hacker sudo[830]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw wlan0 scan Jun 11 04:53:55 hacker sudo[830]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:55 hacker ntpd[777]: error resolving pool 2.debian.pool.ntp.org: System error (-11) Jun 11 04:53:56 hacker ntpd[777]: error resolving pool 3.debian.pool.ntp.org: System error (-11) Jun 11 04:53:57 hacker volumio-remote-updater[631]: [2024-06-11 04:53:57] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:53:57 hacker volumio-remote-updater[631]: [2024-06-11 04:53:57] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:53:57 hacker volumio-remote-updater[631]: [2024-06-11 04:53:57] [error] handle_connect error: Underlying Transport Error Jun 11 04:53:57 hacker bthelper[717]: Changing power off succeeded Jun 11 04:53:57 hacker bthelper[717]: [CHG] Controller B8:27:EB:07:92:D8 Class: 0x0000041c Jun 11 04:53:57 hacker bthelper[717]: Changing power on succeeded Jun 11 04:53:57 hacker sudo[830]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker wireless.js[616]: SETTING APPROPRIATE REG DOMAIN: GB Jun 11 04:53:57 hacker sudo[842]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 up Jun 11 04:53:57 hacker sudo[842]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[842]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker sudo[844]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iw reg set GB Jun 11 04:53:57 hacker sudo[844]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[844]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker wireless.js[616]: SUCCESSFULLY SET NEW REGDOMAIN: GB Jun 11 04:53:57 hacker wireless.js[616]: Start wireless flow Jun 11 04:53:57 hacker wireless.js[616]: Stopped hotspot (if there).. Jun 11 04:53:57 hacker sudo[849]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ip addr flush dev wlan0 Jun 11 04:53:57 hacker sudo[849]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:57 hacker sudo[849]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:57 hacker sudo[851]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 down Jun 11 04:53:57 hacker sudo[851]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:58 hacker sudo[851]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:58 hacker wireless.js[616]: DHCP IP Jun 11 04:53:58 hacker wireless.js[616]: Start ap Jun 11 04:53:58 hacker wpa_supplicant[853]: Successfully initialized wpa_supplicant Jun 11 04:53:58 hacker sudo[854]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/dhcpcd Jun 11 04:53:58 hacker sudo[854]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:58 hacker dhcpcd[855]: dev: loaded udev Jun 11 04:53:58 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:53:58 hacker dhcpcd-run-hooks[873]: wlan0: starting wpa_supplicant Jun 11 04:53:58 hacker dhcpcd-run-hooks[878]: wlan0: failed to start wpa_supplicant Jun 11 04:53:58 hacker dhcpcd-run-hooks[879]: wlan0: Successfully initialized wpa_supplicant nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Match already configured nl80211: kernel reports: Ma Jun 11 04:53:58 hacker dhcpcd[855]: wlan0: connected to Access Point `' Jun 11 04:53:59 hacker dhcpcd[855]: no interfaces have a carrier Jun 11 04:53:59 hacker dhcpcd[855]: forked to background, child pid 889 Jun 11 04:53:59 hacker dhcpcd[889]: eth0: waiting for carrier Jun 11 04:53:59 hacker dhcpcd[889]: wlan0: waiting for carrier Jun 11 04:53:59 hacker sudo[854]: pam_unix(sudo:session): session closed for user root Jun 11 04:53:59 hacker wireless.js[616]: trying... Jun 11 04:53:59 hacker sudo[891]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:53:59 hacker sudo[891]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:53:59 hacker sudo[891]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:00 hacker wireless.js[616]: trying... Jun 11 04:54:00 hacker sudo[894]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:00 hacker sudo[894]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:00 hacker sudo[894]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:01 hacker wpa_supplicant[877]: wlan0: Trying to associate with SSID 'FRITZ!Box 7530 KO' Jun 11 04:54:01 hacker wireless.js[616]: trying... Jun 11 04:54:01 hacker sudo[897]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:01 hacker sudo[897]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:01 hacker sudo[897]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:02 hacker wireless.js[616]: trying... Jun 11 04:54:02 hacker sudo[900]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:02 hacker sudo[900]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:02 hacker sudo[900]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:03 hacker wireless.js[616]: trying... Jun 11 04:54:03 hacker sudo[903]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:03 hacker sudo[903]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:03 hacker sudo[903]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:03 hacker wpa_supplicant[877]: wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:00:00:00:00:00 status_code=16 Jun 11 04:54:04 hacker wireless.js[616]: trying... Jun 11 04:54:04 hacker sudo[906]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:04 hacker sudo[906]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:04 hacker sudo[906]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:04 hacker volumio-remote-updater[631]: [2024-06-11 04:54:04] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:54:04 hacker volumio-remote-updater[631]: [2024-06-11 04:54:04] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:54:04 hacker volumio-remote-updater[631]: [2024-06-11 04:54:04] [error] handle_connect error: Underlying Transport Error Jun 11 04:54:05 hacker wireless.js[616]: trying... Jun 11 04:54:05 hacker sudo[909]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:05 hacker sudo[909]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:05 hacker sudo[909]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:06 hacker wpa_supplicant[877]: wlan0: Trying to associate with SSID 'FRITZ!Box 7530 KO' Jun 11 04:54:06 hacker wireless.js[616]: trying... Jun 11 04:54:06 hacker sudo[912]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:06 hacker sudo[912]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:06 hacker sudo[912]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:07 hacker wireless.js[616]: trying... Jun 11 04:54:07 hacker sudo[915]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:07 hacker sudo[915]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:07 hacker sudo[915]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:08 hacker dhcpcd[889]: wlan0: carrier acquired Jun 11 04:54:08 hacker dhcpcd[889]: wlan0: connected to Access Point `FRITZ!Box 7530 KO' Jun 11 04:54:08 hacker wpa_supplicant[877]: wlan0: Associated with 98:9b:cb:b9:11:2f Jun 11 04:54:08 hacker wireless.js[616]: trying... Jun 11 04:54:08 hacker wpa_supplicant[877]: wlan0: CTRL-EVENT-CONNECTED - Connection to 98:9b:cb:b9:11:2f completed [id=0 id_str=] Jun 11 04:54:08 hacker wpa_supplicant[877]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Jun 11 04:54:08 hacker wpa_supplicant[877]: wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=GB Jun 11 04:54:08 hacker dhcpcd[889]: DUID 00:01:00:01:2a:34:d5:bb:b8:27:eb:ad:38:72 Jun 11 04:54:08 hacker dhcpcd[889]: wlan0: IAID eb:f8:6d:27 Jun 11 04:54:08 hacker dhcpcd[889]: wlan0: adding address fe80::145a:8513:d5a8:3d51 Jun 11 04:54:08 hacker dhcpcd[889]: ipv6_addaddr1: Permission denied Jun 11 04:54:08 hacker dhcpcd[889]: wlan0: carrier lost Jun 11 04:54:08 hacker sudo[919]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:08 hacker sudo[919]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:08 hacker sudo[919]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:08 hacker dhcpcd[889]: wlan0: carrier acquired Jun 11 04:54:08 hacker dhcpcd[889]: wlan0: IAID eb:f8:6d:27 Jun 11 04:54:09 hacker dhcpcd[889]: wlan0: soliciting an IPv6 router Jun 11 04:54:09 hacker dhcpcd[889]: wlan0: rebinding lease of 192.168.178.85 Jun 11 04:54:09 hacker dhcpcd[889]: wlan0: probing address 192.168.178.85/24 Jun 11 04:54:09 hacker wireless.js[616]: trying... Jun 11 04:54:09 hacker sudo[933]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:09 hacker sudo[933]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:09 hacker sudo[933]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:10 hacker wireless.js[616]: trying... Jun 11 04:54:10 hacker sudo[936]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:10 hacker sudo[936]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:10 hacker sudo[936]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:11 hacker wireless.js[616]: trying... Jun 11 04:54:11 hacker sudo[939]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:11 hacker sudo[939]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:11 hacker sudo[939]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:12 hacker wireless.js[616]: trying... Jun 11 04:54:12 hacker sudo[942]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:12 hacker sudo[942]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:12 hacker sudo[942]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:13 hacker wireless.js[616]: trying... Jun 11 04:54:13 hacker sudo[945]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:13 hacker sudo[945]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:13 hacker sudo[945]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:14 hacker wireless.js[616]: trying... Jun 11 04:54:14 hacker volumio-remote-updater[631]: [2024-06-11 04:54:14] [info] asio async_connect error: system:111 (Connection refused) Jun 11 04:54:14 hacker volumio-remote-updater[631]: [2024-06-11 04:54:14] [info] Error getting remote endpoint: system:107 (Transport endpoint is not connected) Jun 11 04:54:14 hacker volumio-remote-updater[631]: [2024-06-11 04:54:14] [error] handle_connect error: Underlying Transport Error Jun 11 04:54:14 hacker sudo[948]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:14 hacker sudo[948]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:14 hacker sudo[948]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:15 hacker dhcpcd[889]: wlan0: leased 192.168.178.85 for 864000 seconds Jun 11 04:54:15 hacker avahi-daemon[619]: Joining mDNS multicast group on interface wlan0.IPv4 with address 192.168.178.85. Jun 11 04:54:15 hacker dhcpcd[889]: wlan0: adding route to 192.168.178.0/24 Jun 11 04:54:15 hacker dhcpcd[889]: wlan0: adding default route via 192.168.178.1 Jun 11 04:54:15 hacker avahi-daemon[619]: New relevant interface wlan0.IPv4 for mDNS. Jun 11 04:54:15 hacker avahi-daemon[619]: Registering new address record for 192.168.178.85 on wlan0.IPv4. Jun 11 04:54:15 hacker wireless.js[616]: trying... Jun 11 04:54:15 hacker sudo[972]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwgetid -r Jun 11 04:54:15 hacker sudo[972]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:15 hacker sudo[972]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:15 hacker wireless.js[616]: Connected to: ----FRITZ!Box 7530 KO Jun 11 04:54:15 hacker wireless.js[616]: ---- Jun 11 04:54:15 hacker sudo[975]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 Jun 11 04:54:15 hacker sudo[975]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:15 hacker sudo[975]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:15 hacker wireless.js[616]: ... joined AP, wlan0 IPv4 is 192.168.178.85, ipV6 is undefined Jun 11 04:54:15 hacker wireless.js[616]: It's done! AP Jun 11 04:54:15 hacker systemd[1]: Started Wireless Services. Jun 11 04:54:15 hacker kernel: brcmfmac: brcmf_cfg80211_set_power_mgmt: power save disabled Jun 11 04:54:15 hacker systemd[1]: Started Volumio Backend Module. Jun 11 04:54:15 hacker systemd[1]: Started Volumio Cpu Tweaker. Jun 11 04:54:15 hacker volumio-cpu-tweak[981]: Setting RT Priority for mpd Jun 11 04:54:15 hacker volumio-cpu-tweak[981]: pid 35's current scheduling policy: SCHED_OTHER Jun 11 04:54:15 hacker volumio-cpu-tweak[981]: pid 35's current scheduling priority: 0 Jun 11 04:54:15 hacker volumio-cpu-tweak[981]: Setting MPD Affinity Jun 11 04:54:15 hacker volumio-cpu-tweak[981]: pid 3's current affinity mask: f Jun 11 04:54:15 hacker volumio-cpu-tweak[981]: /bin/volumio_cpu_tweak: line 27: warning: command substitution: ignored null byte in input Jun 11 04:54:15 hacker volumio-cpu-tweak[981]: VOLUMIO CPU TWEAK: Setting CPU Governor: performance Jun 11 04:54:15 hacker systemd[1]: volumio_cpu_tweak.service: Succeeded. Jun 11 04:54:16 hacker ntpd[777]: Listen normally on 3 wlan0 192.168.178.85:123 Jun 11 04:54:16 hacker ntpd[777]: new interface(s) found: waking up resolver Jun 11 04:54:17 hacker systemd[1]: systemd-fsckd.service: Succeeded. Jun 11 04:54:18 hacker volumio[980]: info: ------------------------------------------- Jun 11 04:54:18 hacker volumio[980]: info: ----- Volumio3 ---- Jun 11 04:54:18 hacker volumio[980]: info: ------------------------------------------- Jun 11 04:54:18 hacker volumio[980]: info: ----- System startup ---- Jun 11 04:54:18 hacker volumio[980]: info: ------------------------------------------- Jun 11 04:54:18 hacker nmbd[726]: [2024/06/11 04:54:18.882705, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:18 hacker nmbd[726]: daemon_ready: STATUS=daemon 'nmbd' finished starting up and ready to serve connections Jun 11 04:54:18 hacker systemd[1]: Started Samba NMB Daemon. Jun 11 04:54:18 hacker systemd[1]: Starting Samba Winbind Daemon... Jun 11 04:54:19 hacker winbindd[1005]: [2024/06/11 04:54:19.303255, 0] ../source3/winbindd/winbindd_cache.c:3160(initialize_winbindd_cache) Jun 11 04:54:19 hacker winbindd[1005]: initialize_winbindd_cache: clearing cache and re-creating with version number 2 Jun 11 04:54:19 hacker winbindd[1005]: [2024/06/11 04:54:19.330615, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:19 hacker winbindd[1005]: daemon_ready: STATUS=daemon 'winbindd' finished starting up and ready to serve connections Jun 11 04:54:19 hacker systemd[1]: Started Samba Winbind Daemon. Jun 11 04:54:19 hacker systemd[1]: Starting Samba SMB Daemon... Jun 11 04:54:19 hacker volumio[980]: info: MYVOLUMIO Environment detected Jun 11 04:54:19 hacker volumio[980]: info: Plugin folders cleanup Jun 11 04:54:19 hacker volumio[980]: info: Scanning into folder /volumio/app/plugins/ Jun 11 04:54:19 hacker volumio[980]: info: Scanning category audio_interface Jun 11 04:54:19 hacker volumio[980]: info: Scanning category miscellanea Jun 11 04:54:19 hacker volumio[980]: info: Scanning category music_service Jun 11 04:54:19 hacker volumio[980]: info: Scanning category plugins.json Jun 11 04:54:19 hacker volumio[980]: info: Scanning category system_controller Jun 11 04:54:19 hacker volumio[980]: info: Scanning category user_interface Jun 11 04:54:19 hacker volumio[980]: info: Scanning into folder /data/plugins/ Jun 11 04:54:19 hacker volumio[980]: info: Scanning category audio_interface Jun 11 04:54:19 hacker volumio[980]: info: Scanning category music_service Jun 11 04:54:19 hacker volumio[980]: info: Plugin folders cleanup completed Jun 11 04:54:19 hacker volumio[980]: info: ------------------------------------------- Jun 11 04:54:19 hacker volumio[980]: info: ----- Core plugins startup ---- Jun 11 04:54:19 hacker volumio[980]: info: ------------------------------------------- Jun 11 04:54:19 hacker volumio[980]: info: Loading plugins from folder /volumio/app/plugins/ Jun 11 04:54:19 hacker volumio[980]: info: Adding plugin upnp to MyMusic Plugins Jun 11 04:54:19 hacker volumio[980]: info: Adding plugin airplay_emulation to MyMusic Plugins Jun 11 04:54:19 hacker volumio[980]: info: Adding plugin upnp_browser to MyMusic Plugins Jun 11 04:54:19 hacker volumio[980]: info: Loading plugins from folder /data/plugins/ Jun 11 04:54:19 hacker volumio[980]: info: Loading plugin "system"... Jun 11 04:54:19 hacker volumio[980]: info: Loading plugin "appearance"... Jun 11 04:54:19 hacker winbindd[1005]: [2024/06/11 04:54:19.861780, 0] ../source3/winbindd/wb_lookupsids.c:659(wb_lookupsids_recv) Jun 11 04:54:19 hacker winbindd[1005]: res_names->count = 3, expected 4 Jun 11 04:54:19 hacker systemd[1]: Started Samba SMB Daemon. Jun 11 04:54:19 hacker systemd[1]: Reached target Multi-User System. Jun 11 04:54:19 hacker systemd[1]: Reached target Graphical Interface. Jun 11 04:54:19 hacker smbd[1010]: [2024/06/11 04:54:19.895466, 0] ../lib/util/become_daemon.c:138(daemon_ready) Jun 11 04:54:19 hacker smbd[1010]: daemon_ready: STATUS=daemon 'smbd' finished starting up and ready to serve connections Jun 11 04:54:19 hacker systemd[1]: Starting Update UTMP about System Runlevel Changes... Jun 11 04:54:20 hacker systemd[1]: systemd-update-utmp-runlevel.service: Succeeded. Jun 11 04:54:20 hacker systemd[1]: Started Update UTMP about System Runlevel Changes. Jun 11 04:54:20 hacker systemd[1]: Startup finished in 17.862s (kernel) + 37.271s (userspace) = 55.134s. Jun 11 04:54:21 hacker sh[516]: timed out Jun 11 04:54:21 hacker dhcpcd[571]: timed out Jun 11 04:54:21 hacker sh[516]: dhcpcd exited Jun 11 04:54:21 hacker dhcpcd[571]: dhcpcd exited Jun 11 04:54:21 hacker sh[516]: ifup: failed to bring up eth0 Jun 11 04:54:21 hacker systemd[1]: ifup@eth0.service: Main process exited, code=exited, status=1/FAILURE Jun 11 04:54:21 hacker systemd[1]: ifup@eth0.service: Failed with result 'exit-code'. Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "network"... Jun 11 04:54:21 hacker volumio[980]: info: Refreshing Cached IP Addresses Jun 11 04:54:21 hacker sudo[1026]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig eth0 Jun 11 04:54:21 hacker sudo[1026]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:21 hacker sudo[1026]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "services"... Jun 11 04:54:21 hacker sudo[1028]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/ifconfig wlan0 Jun 11 04:54:21 hacker sudo[1028]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "alsa_controller"... Jun 11 04:54:21 hacker sudo[1028]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:21 hacker sudo[1031]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/sbin/iwlist wlan0 scan Jun 11 04:54:21 hacker sudo[1031]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:21 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "wizard"... Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "networkfs"... Jun 11 04:54:21 hacker volumio[980]: info: Starting Udev Watcher for removable devices Jun 11 04:54:21 hacker sudo[1039]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/mount -t nfs -o ro,soft,noauto 192.168.178.108:/volume1/music /mnt/NAS/Synology Jun 11 04:54:21 hacker sudo[1039]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:21 hacker volumio[980]: info: Ignoring mount for partition: boot Jun 11 04:54:21 hacker volumio[980]: info: Ignoring mount for partition: volumio Jun 11 04:54:21 hacker volumio[980]: info: Ignoring mount for partition: volumio_data Jun 11 04:54:21 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "volumio_command_line_client"... Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "upnp"... Jun 11 04:54:21 hacker volumio[980]: info: [1718078061641] Starting Upmpd Daemon Jun 11 04:54:21 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "my_music"... Jun 11 04:54:21 hacker volumio[980]: info: Loading plugin "mpd"... Jun 11 04:54:22 hacker volumio[980]: info: Loading plugin "upnp_browser"... Jun 11 04:54:22 hacker systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Jun 11 04:54:22 hacker systemd[1]: Reached target Host and Network Name Lookups. Jun 11 04:54:22 hacker systemd[1]: Starting Preprocess NFS configuration... Jun 11 04:54:22 hacker systemd[1]: nfs-config.service: Succeeded. Jun 11 04:54:22 hacker systemd[1]: Started Preprocess NFS configuration. Jun 11 04:54:22 hacker systemd[1]: Starting NFS status monitor for NFSv2/3 locking.... Jun 11 04:54:22 hacker systemd[1]: Starting Notify NFS peers of a restart... Jun 11 04:54:22 hacker sm-notify[1052]: Version 1.3.3 starting Jun 11 04:54:22 hacker systemd[1]: rpc-statd-notify.service: Succeeded. Jun 11 04:54:22 hacker systemd[1]: Started Notify NFS peers of a restart. Jun 11 04:54:22 hacker rpc.statd[1053]: Version 1.3.3 starting Jun 11 04:54:22 hacker rpc.statd[1053]: Flags: TI-RPC Jun 11 04:54:22 hacker systemd[1]: Started NFS status monitor for NFSv2/3 locking.. Jun 11 04:54:22 hacker volumio[980]: info: Loading plugin "alarm-clock"... Jun 11 04:54:22 hacker volumio[980]: info: Loading plugin "airplay_emulation"... Jun 11 04:54:22 hacker volumio[980]: info: Starting Shairport Sync Jun 11 04:54:22 hacker volumio[980]: info: Loading plugin "last_100"... Jun 11 04:54:22 hacker volumio[980]: info: Loading plugin "webradio"... Jun 11 04:54:22 hacker sudo[1039]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "i2s_dacs"... Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "volumiodiscovery"... Jun 11 04:54:23 hacker volumio[980]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:23 hacker volumio[980]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:23 hacker volumio[980]: *** WARNING *** For more information see Jun 11 04:54:23 hacker volumio[980]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:23 hacker volumio[980]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:23 hacker node[980]: *** WARNING *** The program 'node' uses the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:23 hacker volumio[980]: *** WARNING *** For more information see Jun 11 04:54:23 hacker node[980]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:23 hacker node[980]: *** WARNING *** For more information see Jun 11 04:54:23 hacker node[980]: *** WARNING *** The program 'node' called 'DNSServiceRegister()' which is not supported (or only supported partially) in the Apple Bonjour compatibility layer of Avahi. Jun 11 04:54:23 hacker node[980]: *** WARNING *** Please fix your application to use the native API of Avahi! Jun 11 04:54:23 hacker node[980]: *** WARNING *** For more information see Jun 11 04:54:23 hacker volumio[980]: info: Applying required configuration parameters for plugin volumiodiscovery Jun 11 04:54:23 hacker volumio[980]: info: Discovery: Started advertising with name: Hacker Jun 11 04:54:23 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , registerCallback Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "bandcamp"... Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "outputs"... Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "albumart"... Jun 11 04:54:23 hacker volumio[980]: info: Plugin example_plugin is not enabled Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "inputs"... Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "updater_comm"... Jun 11 04:54:23 hacker systemd[1]: systemd-hostnamed.service: Succeeded. Jun 11 04:54:23 hacker volumio[980]: info: Plugin mpdemulation is not enabled Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "rest_api"... Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "websocket"... Jun 11 04:54:23 hacker volumio[980]: info: Starting Socket.io Server version 2.3.0 Jun 11 04:54:23 hacker volumio[980]: info: Loading plugin "fusiondsp"... Jun 11 04:54:23 hacker volumio[980]: Forking 3 albumart workers Jun 11 04:54:24 hacker volumio[980]: info: Applying required configuration parameters for plugin fusiondsp Jun 11 04:54:24 hacker volumio-remote-updater[631]: [2024-06-11 04:54:24] [connect] Successful connection Jun 11 04:54:24 hacker sudo[1031]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:24 hacker volumio[980]: info: Loading i18n strings for locale en Jun 11 04:54:24 hacker volumio[980]: Updating browse sources language Jun 11 04:54:24 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:24 hacker volumio[980]: Starting albumart workers Jun 11 04:54:24 hacker volumio[980]: Starting albumart workers Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::initPlayerControls Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:25 hacker volumio[980]: Starting albumart workers Jun 11 04:54:25 hacker volumio[980]: Express server listening on port 3000 Jun 11 04:54:25 hacker volumio[980]: [Metrics] WebUI: 7s 607.03ms Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::resetVolumioState Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::getcurrentVolume Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioRetrievevolume Jun 11 04:54:25 hacker volumio[980]: info: Cannot mount NAS Synology at system boot, trial number 1 ,retrying in 5 seconds Jun 11 04:54:25 hacker volumio[980]: verbose: New Socket.io Connection to 192.168.178.85:3000 from 192.168.178.98 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 1 Jun 11 04:54:25 hacker volumio-remote-updater[631]: [2024-06-11 04:54:25] [connect] WebSocket Connection 127.0.0.1:3000 v-2 "WebSocket++/0.8.2" /socket.io/?EIO=4&transport=websocket&t=1718078064 101 Jun 11 04:54:25 hacker volumio[980]: verbose: New Socket.io Connection to 127.0.0.1:3000 from 127.0.0.1 UA: WebSocket++/0.8.2 Engine version: 4 Transport: websocket Total Clients: 2 Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: Reloading queue from file Jun 11 04:54:25 hacker volumio[980]: info: Setting Device type: Raspberry PI Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::setRepeat null single undefined Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::pushState Jun 11 04:54:25 hacker volumio[980]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::setRandom null Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::pushState Jun 11 04:54:25 hacker volumio[980]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:25 hacker volumio[980]: info: VolumeController:: Volume=79 Mute =false Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::pushState Jun 11 04:54:25 hacker volumio[980]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: volumiodiscovery , saveDeviceInfo Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:25 hacker volumio[980]: info: CoreStateMachine::updateTrackBlock Jun 11 04:54:25 hacker volumio[980]: info: CorePlayQueue::getTrackBlock Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioRetrievevolume Jun 11 04:54:25 hacker volumio[980]: info: Completed loading Core Plugins Jun 11 04:54:25 hacker volumio[980]: info: Preparing to generate the ALSA configuration file Jun 11 04:54:25 hacker volumio[980]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf Jun 11 04:54:25 hacker volumio[980]: info: Reading ALSA contributions from plugins. Jun 11 04:54:25 hacker volumio[980]: info: Asound.conf file unchanged, so no further update is needed Jun 11 04:54:25 hacker volumio[980]: info: Output device has changed, restarting MPD Jun 11 04:54:25 hacker volumio[980]: info: Output device has changed, restarting Shairport Sync Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker sudo[1115]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:25 hacker sudo[1115]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:25 hacker sudo[1115]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:25 hacker sudo[1117]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:25 hacker sudo[1117]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:25 hacker volumio[980]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:25 hacker volumio[980]: info: ___________ START PLUGINS ___________ Jun 11 04:54:25 hacker volumio[980]: info: ControllerMpd::onStart: Initializing MPD Jun 11 04:54:25 hacker volumio[980]: info: Creating MPD Configuration file Jun 11 04:54:25 hacker sudo[1133]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:25 hacker sudo[1133]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: mpd , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:25 hacker volumio[980]: info: [1718078065836] CoreMusicLibrary::Adding element Media Servers Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:25 hacker systemd[1]: Listening on mpd.socket. Jun 11 04:54:25 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:25 hacker sudo[1135]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:25 hacker sudo[1135]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:25 hacker sudo[1133]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:25 hacker systemd[1]: mpd.service: Control process exited, code=killed, status=15/TERM Jun 11 04:54:25 hacker systemd[1]: mpd.service: Succeeded. Jun 11 04:54:25 hacker systemd[1]: Stopped Music Player Daemon. Jun 11 04:54:25 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:25 hacker volumio[980]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:25 hacker volumio[980]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:25 hacker volumio[980]: info: [1718078065966] CoreMusicLibrary::Adding element Last_100 Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:25 hacker volumio[980]: info: [1718078065970] CoreMusicLibrary::Adding element Webradio Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:25 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:25 hacker volumio[980]: info: Initializing BBC Radios Jun 11 04:54:26 hacker sudo[1142]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log Jun 11 04:54:26 hacker sudo[1142]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker sudo[1142]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory Jun 11 04:54:26 hacker sudo[1142]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getSystemVersion Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::volumioAddToBrowseSources[object Object] Jun 11 04:54:26 hacker volumio[980]: info: [1718078066044] CoreMusicLibrary::Adding element Bandcamp Discover Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: my_music , getDisabledSources Jun 11 04:54:26 hacker volumio[980]: Cannot find translation for source Bandcamp Discover Jun 11 04:54:26 hacker volumio[980]: info: Loading i18n strings for locale en Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , updateALSAConfigFile Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: FusionDsp - mixtype--------------------- Hardware Jun 11 04:54:26 hacker volumio[980]: info: Volumio Calling Home Jun 11 04:54:26 hacker volumio[980]: info: Preparing to generate the ALSA configuration file Jun 11 04:54:26 hacker volumio[980]: info: The plugin fusiondsp has an ALSA contribution file volumioDsp.postDsp.10.conf Jun 11 04:54:26 hacker volumio[980]: info: Reading ALSA contributions from plugins. Jun 11 04:54:26 hacker volumio[980]: info: MPD Permissions set Jun 11 04:54:26 hacker volumio[980]: info: MPD Permissions set Jun 11 04:54:26 hacker volumio[980]: info: VolumeController:: Volume=79 Mute =false Jun 11 04:54:26 hacker volumio[980]: info: CoreStateMachine::pushState Jun 11 04:54:26 hacker volumio[980]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::volumioPushState Jun 11 04:54:26 hacker volumio[980]: verbose: New Socket.io Connection to localhost:3000 from 127.0.0.1 UA: node-XMLHttpRequest Engine version: 3 Transport: polling Total Clients: 3 Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: Starting Shairport Sync Jun 11 04:54:26 hacker volumio[980]: info: Starting Shairport Sync Jun 11 04:54:26 hacker volumio[980]: info: Starting Shairport Sync Jun 11 04:54:26 hacker sudo[1170]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:26 hacker sudo[1172]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:26 hacker sudo[1172]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker sudo[1170]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker volumio[980]: info: Asound.conf file unchanged, so no further update is needed Jun 11 04:54:26 hacker volumio[980]: info: Output device has changed, restarting MPD Jun 11 04:54:26 hacker volumio[980]: info: Output device has changed, restarting Shairport Sync Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:26 hacker sudo[1174]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:26 hacker sudo[1174]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:26 hacker sudo[1180]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart mpd.service Jun 11 04:54:26 hacker sudo[1180]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:26 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:26 hacker sudo[1178]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 777 /etc/mpd.conf Jun 11 04:54:26 hacker sudo[1178]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker sudo[1178]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker volumio[980]: info: Could not detect Primo: Error: Command failed: aplay -l | grep es90x8q2m-dac-dai-0 Jun 11 04:54:26 hacker volumio[980]: info: MPD Permissions set Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: system , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:26 hacker volumio[980]: info: Starting Shairport Sync Jun 11 04:54:26 hacker sudo[1193]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl restart shairport-sync Jun 11 04:54:26 hacker sudo[1193]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:26 hacker sudo[1172]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker sudo[1170]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker volumio[980]: info: Shairport-Sync Started Jun 11 04:54:26 hacker volumio[980]: Error adding Membership: Error: addMembership EINVAL Jun 11 04:54:26 hacker volumio[980]: info: Shairport-Sync Started Jun 11 04:54:26 hacker systemd[1]: Stopping Shairport Sync - AirPlay Audio Receiver... Jun 11 04:54:26 hacker systemd[1]: mpd.service: Main process exited, code=killed, status=15/TERM Jun 11 04:54:26 hacker systemd[1]: mpd.service: Succeeded. Jun 11 04:54:26 hacker systemd[1]: Stopped Music Player Daemon. Jun 11 04:54:26 hacker systemd[1]: shairport-sync.service: Main process exited, code=killed, status=15/TERM Jun 11 04:54:26 hacker systemd[1]: shairport-sync.service: Succeeded. Jun 11 04:54:26 hacker systemd[1]: Stopped Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:26 hacker systemd[1]: Started Shairport Sync - AirPlay Audio Receiver. Jun 11 04:54:26 hacker sudo[1174]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker systemd[1]: Starting Music Player Daemon... Jun 11 04:54:26 hacker volumio[980]: info: Shairport-Sync Started Jun 11 04:54:26 hacker sudo[1193]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker volumio[980]: info: Shairport-Sync Started Jun 11 04:54:26 hacker volumio[980]: info: Discovery: adding 2c059fac-910b-4553-9975-724a0b682124 Jun 11 04:54:26 hacker volumio[980]: info: Discovery: Found device Hacker Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::volumioGetState Jun 11 04:54:26 hacker volumio[980]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:26 hacker sudo[1196]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown mpd:audio /var/log/mpd.log Jun 11 04:54:26 hacker sudo[1196]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:26 hacker sudo[1196]: /bin/chown: cannot access '/var/log/mpd.log': No such file or directory Jun 11 04:54:26 hacker sudo[1196]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:26 hacker volumio[980]: info: Volumio called home Jun 11 04:54:26 hacker volumio[980]: info: CoreCommandRouter::volumioGetState Jun 11 04:54:26 hacker volumio[980]: info: CorePlayQueue::getTrack 0 Jun 11 04:54:28 hacker volumio[980]: info: camilladsp spawned new process with pid undefined, instance 1, run: true Jun 11 04:54:28 hacker volumio[980]: info: camilladsp service started and running in background, instance 1 Jun 11 04:54:28 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: alsa_controller , getConfigParam Jun 11 04:54:28 hacker volumio[980]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found Jun 11 04:54:28 hacker volumio[980]: error: FusionDsp - ----Hw detection failed :Error: Command failed: /data/plugins/audio_interface/fusiondsp/hw_params volumioHw >/data/configuration/audio_interface/fusiondsp/hwinfo.json Jun 11 04:54:28 hacker volumio[980]: /bin/sh: 1: /data/plugins/audio_interface/fusiondsp/hw_params: not found Jun 11 04:54:28 hacker volumio[980]: info: FusionDsp loaded Jun 11 04:54:28 hacker volumio[980]: info: CoreCommandRouter::executeOnPlugin: network , getCachedIPAddresses Jun 11 04:54:28 hacker sudo[1211]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/systemctl start fusiondsp.service Jun 11 04:54:28 hacker sudo[1211]: pam_unix(sudo:session): session opened for user root by (uid=0) Jun 11 04:54:28 hacker volumio[980]: info: FusionDsp - Reporting Fusion DSP Enabled Jun 11 04:54:28 hacker volumio[980]: info: Adding Signal Path Element [object Object] Jun 11 04:54:28 hacker volumio[980]: info: Adding fusiondspeq DSP Signal Path Element Jun 11 04:54:28 hacker volumio[980]: info: FusionDsp - ---- installed callbackRead Jun 11 04:54:28 hacker sudo[1211]: pam_unix(sudo:session): session closed for user root Jun 11 04:54:28 hacker volumio[980]: |||||||||||||||||||||||| WARNING: FATAL ERROR ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| Jun 11 04:54:28 hacker volumio[980]: Error: spawn /data/plugins/audio_interface/fusiondsp/camilladsp ENOENT Jun 11 04:54:28 hacker volumio[980]: at Process.ChildProcess._handle.onexit (internal/child_process.js:269:19) Jun 11 04:54:28 hacker volumio[980]: at onErrorNT (internal/child_process.js:465:16) Jun 11 04:54:28 hacker volumio[980]: at processTicksAndRejections (internal/process/task_queues.js:80:21) { Jun 11 04:54:28 hacker volumio[980]: errno: -2, Jun 11 04:54:28 hacker volumio[980]: code: 'ENOENT', Jun 11 04:54:28 hacker volumio[980]: syscall: 'spawn /data/plugins/audio_interface/fusiondsp/camilladsp', Jun 11 04:54:28 hacker volumio[980]: path: '/data/plugins/audio_interface/fusiondsp/camilladsp', Jun 11 04:54:28 hacker volumio[980]: spawnargs: [ Jun 11 04:54:28 hacker volumio[980]: '-p', Jun 11 04:54:28 hacker volumio[980]: 9876, Jun 11 04:54:28 hacker volumio[980]: '-o', Jun 11 04:54:28 hacker volumio[980]: '/tmp/camilladsp.log', Jun 11 04:54:28 hacker volumio[980]: '-l', Jun 11 04:54:28 hacker volumio[980]: 'warn', Jun 11 04:54:28 hacker volumio[980]: '/data/configuration/audio_interface/fusiondsp/camilladsp.yml' Jun 11 04:54:28 hacker volumio[980]: ] Jun 11 04:54:28 hacker volumio[980]: } Jun 11 04:54:28 hacker volumio[980]: ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| Jun 11 04:54:28 hacker sudo[1222]: volumio : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/journalctl --since=2024-06-11 04:53 Jun 11 04:54:28 hacker sudo[1222]: pam_unix(sudo:session): session opened for user root by (uid=0) PRETTY_NAME="Raspbian GNU/Linux 10 (buster)" NAME="Raspbian GNU/Linux" VERSION_ID="10" VERSION="10 (buster)" VERSION_CODENAME=buster ID=raspbian ID_LIKE=debian HOME_URL="http://www.raspbian.org/" SUPPORT_URL="http://www.raspbian.org/RaspbianForums" BUG_REPORT_URL="http://www.raspbian.org/RaspbianBugs" VOLUMIO_BUILD_VERSION="4b122b2365bb8c09786cd63b50d1ea6db780eb4e" VOLUMIO_FE_VERSION="e7cae168f9927391640a091813b8a9656b6909b6" VOLUMIO_FE3_VERSION="df82a8f23c90a3617c15c55572c8aaea90d8b32a" VOLUMIO_BE_VERSION="49f98390f2d84c6549f33dc85b694fbd99e4c720" VOLUMIO_ARCH="arm" VOLUMIO_VARIANT="volumio" VOLUMIO_TEST="FALSE" VOLUMIO_BUILD_DATE="Tue 04 Jun 2024 08:41:12 PM CEST" VOLUMIO_VERSION="3.703" VOLUMIO_HARDWARE="pi" VOLUMIO_DEVICENAME="Raspberry Pi" VOLUMIO_HASH="8e78a6e3f56f1bcbbd1760812129a8e9"