Автор: inzaim
Дата сообщения: 04.01.2011 21:09
Нашел где логи включаются. Вот что было внутри:
Код:
System Log
Date/Time Facility Severity Message
Jan 1 02:16:36 syslog emerg BCM96345 started: BusyBox v1.00 (2010.10.26-14:42+0000)
Jan 1 02:16:36 user notice kernel: klogd started: BusyBox v1.00 (2010.10.26-14:42+0000)
Jan 1 02:16:36 user warn kernel: Linux version 2.6.8.1 (zhouyu@localhost.localdomain) (gcc version 3.4.2) #1 Tue Oct 26 22:41:42 CST 2010
Jan 1 02:16:36 user warn kernel: Parallel flash device: name AM29LV160B, id 0x2249, size 2048KB
Jan 1 02:16:36 user warn kernel: 96338E prom init
Jan 1 02:16:36 user warn kernel: CPU revision is: 00029010
Jan 1 02:16:36 user warn kernel: Determined physical RAM map:
Jan 1 02:16:36 user warn kernel: memory: 00fa0000 @ 00000000 (usable)
Jan 1 02:16:36 user debug kernel: On node 0 totalpages: 4000
Jan 1 02:16:36 user debug kernel: DMA zone: 4000 pages, LIFO batch:1
Jan 1 02:16:36 user debug kernel: Normal zone: 0 pages, LIFO batch:1
Jan 1 02:16:36 user debug kernel: HighMem zone: 0 pages, LIFO batch:1
Jan 1 02:16:36 user warn kernel: Built 1 zonelists
Jan 1 02:16:36 user warn kernel: Kernel command line: root=31:0 ro noinitrd console=ttyS0,115200
Jan 1 02:16:36 user warn kernel: brcm mips: enabling icache and dcache...
Jan 1 02:16:36 user warn kernel: Primary instruction cache 16kB, physically tagged, 2-way, linesize 16 bytes.
Jan 1 02:16:36 user warn kernel: Primary data cache 8kB 2-way, linesize 16 bytes.
Jan 1 02:16:36 user warn kernel: PID hash table entries: 64 (order 6: 512 bytes)
Jan 1 02:16:36 user warn kernel: Using 120.000 MHz high precision timer.
Jan 1 02:16:36 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)
Jan 1 02:16:36 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)
Jan 1 02:16:36 user info kernel: Memory: 13908k/16000k available (1447k kernel code, 2072k reserved, 212k data, 68k init, 0k highmem)
Jan 1 02:16:36 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80e00000 ... 0x80f00000>
Jan 1 02:16:36 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS
Jan 1 02:16:36 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jan 1 02:16:36 user warn kernel: Checking for 'wait' instruction... unavailable.
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 16
Jan 1 02:16:36 user warn kernel: Total Flash size: 2048K with 35 sectors
Jan 1 02:16:36 user warn kernel: File system address: 0xbfc10100
Jan 1 02:16:36 user warn kernel: Blk# BlkOff Blks MemLen Partition Name
Jan 1 02:16:36 user warn kernel: 0 1408 1 1024 NVRAM
Jan 1 02:16:36 user warn kernel: 33 49152 1 16384 Config 2
Jan 1 02:16:36 user warn kernel: 34 40960 1 8192 Scratch PAD
Jan 1 02:16:36 user warn kernel: 34 49152 1 16384 Config 1
Jan 1 02:16:36 user warn kernel: Can't analyze prologue code at 80178774
Jan 1 02:16:36 user info kernel: Initializing Cryptographic API
Jan 1 02:16:36 user info kernel: PPP generic driver version 2.4.2
Jan 1 02:16:36 user info kernel: PPP Deflate Compression module registered
Jan 1 02:16:36 user info kernel: PPP BSD Compression module registered
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 24
Jan 1 02:16:36 user warn kernel: Using noop io scheduler
Jan 1 02:16:36 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 02:16:36 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 02:16:36 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $
Jan 1 02:16:36 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 2
Jan 1 02:16:36 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Jan 1 02:16:36 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
Jan 1 02:16:36 user info kernel: Initializing IPsec netlink socket
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 1
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 17
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 15
Jan 1 02:16:36 user notice kernel: Ebtables v2.0 registered
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 8
Jan 1 02:16:36 user info kernel: NET: Registered protocol family 20
Jan 1 02:16:36 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Jan 1 02:16:36 user info kernel: All bugs added by David S. Miller
Jan 1 02:16:36 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 02:16:36 user info kernel: Freeing unused kernel memory: 68k freed
Jan 1 02:16:36 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 02:16:36 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 02:16:36 user warn kernel: adsl: adsl_init entry
Jan 1 02:16:36 user warn kernel: blaadd: blaa_detect entry
Jan 1 02:16:36 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 02:16:36 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Oct 26 2010 22:41:04
Jan 1 02:16:36 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
Jan 1 02:16:36 user warn kernel: ====>PAGE_MANAGEMENT=02, REG_DEV_ID=30, val32=00000000
Jan 1 02:16:36 user warn kernel: ethsw: found bcm5325e!
Jan 1 02:16:36 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 02:16:36 user warn kernel: eth0: MAC Address: 00:26:ED:79:FA:A2
Jan 1 02:16:36 user crit kernel: eth0 Link UP.
Jan 1 02:16:36 user warn kernel: BcmAdsl_Initialize=0xC00643E8, g_pFnNotifyCallback=0xC007EFE4
Jan 1 02:16:36 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 02:16:36 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x1B77A4 0xDEADBEEF
Jan 1 02:16:36 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FEF96C
Jan 1 02:16:36 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 02:16:36 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 02:16:36 user warn kernel: ATM proc init !!!
Jan 1 02:16:36 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 02:16:36 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 376 bytes per conntrack
Jan 1 02:16:36 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 02:16:36 user crit kernel: ADSL G.994 training
Jan 1 02:16:36 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 02:16:36 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27
Jan 1 02:16:36 user warn kernel: BRCM NAT Cache: Hooking hit function @ c0061088
Jan 1 02:16:36 user info kernel: device nas_0_1_91 entered promiscuous mode
Jan 1 02:16:36 user info kernel: br0: port 1(nas_0_1_91) entering learning state
Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br0: port 1(nas_0_1_91) entering forwarding state
Jan 1 02:16:36 user info kernel: device nas_0_1_92 entered promiscuous mode
Jan 1 02:16:36 user info kernel: entering learning state
Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br0: port 2(nas_0_1_92) entering forwarding state
Jan 1 02:16:36 user crit kernel: ADSL G.992 started
Jan 1 02:16:36 user warn kernel: eth0.2: MAC Address: 00:26:ED:79:FA:A2
Jan 1 02:16:36 user warn kernel: eth0.3: MAC Address: 00:26:ED:79:FA:A2
Jan 1 02:16:36 user warn kernel: eth0.4: MAC Address: 00:26:ED:79:FA:A2
Jan 1 02:16:36 user warn kernel: eth0.5: MAC Address: 00:26:ED:79:FA:A2
Jan 1 02:16:36 user info kernel: device nas_0_1_91 left promiscuous mode
Jan 1 02:16:36 user info kernel: br0: port 1(nas_0_1_91) entering disabled state
Jan 1 02:16:36 user info kernel: device nas_0_1_92 left promiscuous mode
Jan 1 02:16:36 user info kernel: br0: port 2(nas_0_1_92) entering disabled state
Jan 1 02:16:36 user info kernel: device nas_0_1_91 entered promiscuous mode
Jan 1 02:16:36 user info kernel: br1: port 1(nas_0_1_91) entering learning state
Jan 1 02:16:36 user info kernel: br1: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br1: port 1(nas_0_1_91) entering forwarding state
Jan 1 02:16:36 user info kernel: device nas_0_1_92 entered promiscuous mode
Jan 1 02:16:36 user info kernel: br1: port 2(nas_0_1_92) entering learning state
Jan 1 02:16:36 user info kernel: br1: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br1: port 2(nas_0_1_92) entering forwarding state
Jan 1 02:16:36 user info kernel: device eth0.2 entered promiscuous mode
Jan 1 02:16:36 user info kernel: br0: port 1(eth0.2) entering learning state
Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br0: port 1(eth0.2) entering forwarding state
Jan 1 02:16:36 user info kernel: device eth0.3 entered promiscuous mode
Jan 1 02:16:36 user info kernel: br0: port 2(eth0.3) entering learning state
Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br0: port 2(eth0.3) entering forwarding state
Jan 1 02:16:36 user info kernel: device eth0.4 entered promiscuous mode
Jan 1 02:16:36 user info kernel: br0: port 3(eth0.4) entering learning state
Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br0: port 3(eth0.4) entering forwarding state
Jan 1 02:16:36 user info kernel: device eth0.5 entered promiscuous mode
Jan 1 02:16:36 user info kernel: br1: port 3(eth0.5) entering learning state
Jan 1 02:16:36 user info kernel: br1: topology change detected, propagating
Jan 1 02:16:36 user info kernel: br1: port 3(eth0.5) entering forwarding state
Jan 1 02:16:36 user crit kernel: ADSL G.992 channel analysis
Jan 1 02:16:36 user info kernel: br0: port 3(eth0.4) entering disabled state
Jan 1 02:16:36 user crit kernel: ADSL G.992 message exchange
Jan 1 02:16:36 user crit kernel: ADSL link up, interleaved, us=766, ds=6143
Jan 1 02:16:36 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=79.135.199.19 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=112 ID=42521 DF PROTO=TCP SPT=4911 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=178.140.148.12 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=120 ID=29057 DF PROTO=TCP SPT=61472 DPT=41067 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=79.135.199.19 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=112 ID=44395 DF PROTO=TCP SPT=4911 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=95.25.119.250 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=120 ID=22415 DF PROTO=TCP SPT=53173 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=178.140.148.12 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=120 ID=29971 DF PROTO=TCP SPT=61472 DPT=41067 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=89.222.246.5 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=52 ID=40139 DF PROTO=TCP SPT=58669 DPT=41067 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=95.29.41.148 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=118 ID=14790 DF PROTO=TCP SPT=63904 DPT=41067 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=94.45.80.82 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=112 ID=4784 DF PROTO=TCP SPT=22716 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=92.243.181.195 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=117 ID=29657 DF PROTO=TCP SPT=16556 DPT=57033 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user err kernel: ipt_tcpmss_target: bad length (576 bytes)
Jan 1 02:16:36 user err kernel: ipt_tcpmss_target: bad length (576 bytes)
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=94.75.144.225 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=116 ID=5138 DF PROTO=TCP SPT=3107 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=77.79.135.231 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=53 ID=43578 DF PROTO=TCP SPT=60349 DPT=41067 WINDOW=5440 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: 9 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=213.79.110.131 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=55 ID=51841 DF PROTO=TCP SPT=55427 DPT=41067 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=212.231.208.2 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=106 ID=19102 DF PROTO=TCP SPT=54626 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=178.120.206.32 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=113 ID=31167 DF PROTO=TCP SPT=56324 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=93.175.208.110 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=53 ID=3835 DF PROTO=TCP SPT=9068 DPT=41067 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=92.115.134.117 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=114 ID=9602 DF PROTO=TCP SPT=14307 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=109.200.112.144 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=118 ID=25333 DF PROTO=TCP SPT=61388 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0