inzaim
Newbie | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Нашел где логи включаются. Вот что было внутри: Код: System Log Date/Time Facility Severity Message Jan 1 02:16:36 syslog emerg BCM96345 started: BusyBox v1.00 (2010.10.26-14:42+0000) Jan 1 02:16:36 user notice kernel: klogd started: BusyBox v1.00 (2010.10.26-14:42+0000) Jan 1 02:16:36 user warn kernel: Linux version 2.6.8.1 (zhouyu@localhost.localdomain) (gcc version 3.4.2) #1 Tue Oct 26 22:41:42 CST 2010 Jan 1 02:16:36 user warn kernel: Parallel flash device: name AM29LV160B, id 0x2249, size 2048KB Jan 1 02:16:36 user warn kernel: 96338E prom init Jan 1 02:16:36 user warn kernel: CPU revision is: 00029010 Jan 1 02:16:36 user warn kernel: Determined physical RAM map: Jan 1 02:16:36 user warn kernel: memory: 00fa0000 @ 00000000 (usable) Jan 1 02:16:36 user debug kernel: On node 0 totalpages: 4000 Jan 1 02:16:36 user debug kernel: DMA zone: 4000 pages, LIFO batch:1 Jan 1 02:16:36 user debug kernel: Normal zone: 0 pages, LIFO batch:1 Jan 1 02:16:36 user debug kernel: HighMem zone: 0 pages, LIFO batch:1 Jan 1 02:16:36 user warn kernel: Built 1 zonelists Jan 1 02:16:36 user warn kernel: Kernel command line: root=31:0 ro noinitrd console=ttyS0,115200 Jan 1 02:16:36 user warn kernel: brcm mips: enabling icache and dcache... Jan 1 02:16:36 user warn kernel: Primary instruction cache 16kB, physically tagged, 2-way, linesize 16 bytes. Jan 1 02:16:36 user warn kernel: Primary data cache 8kB 2-way, linesize 16 bytes. Jan 1 02:16:36 user warn kernel: PID hash table entries: 64 (order 6: 512 bytes) Jan 1 02:16:36 user warn kernel: Using 120.000 MHz high precision timer. Jan 1 02:16:36 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes) Jan 1 02:16:36 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes) Jan 1 02:16:36 user info kernel: Memory: 13908k/16000k available (1447k kernel code, 2072k reserved, 212k data, 68k init, 0k highmem) Jan 1 02:16:36 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80e00000 ... 0x80f00000> Jan 1 02:16:36 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS Jan 1 02:16:36 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes) Jan 1 02:16:36 user warn kernel: Checking for 'wait' instruction... unavailable. Jan 1 02:16:36 user info kernel: NET: Registered protocol family 16 Jan 1 02:16:36 user warn kernel: Total Flash size: 2048K with 35 sectors Jan 1 02:16:36 user warn kernel: File system address: 0xbfc10100 Jan 1 02:16:36 user warn kernel: Blk# BlkOff Blks MemLen Partition Name Jan 1 02:16:36 user warn kernel: 0 1408 1 1024 NVRAM Jan 1 02:16:36 user warn kernel: 33 49152 1 16384 Config 2 Jan 1 02:16:36 user warn kernel: 34 40960 1 8192 Scratch PAD Jan 1 02:16:36 user warn kernel: 34 49152 1 16384 Config 1 Jan 1 02:16:36 user warn kernel: Can't analyze prologue code at 80178774 Jan 1 02:16:36 user info kernel: Initializing Cryptographic API Jan 1 02:16:36 user info kernel: PPP generic driver version 2.4.2 Jan 1 02:16:36 user info kernel: PPP Deflate Compression module registered Jan 1 02:16:36 user info kernel: PPP BSD Compression module registered Jan 1 02:16:36 user info kernel: NET: Registered protocol family 24 Jan 1 02:16:36 user warn kernel: Using noop io scheduler Jan 1 02:16:36 user warn kernel: bcm963xx_mtd driver v1.0 Jan 1 02:16:36 user warn kernel: brcmboard: brcm_board_init entry Jan 1 02:16:36 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $ Jan 1 02:16:36 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX Jan 1 02:16:36 user info kernel: NET: Registered protocol family 2 Jan 1 02:16:36 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes Jan 1 02:16:36 user info kernel: TCP: Hash tables configured (established 512 bind 1024) Jan 1 02:16:36 user info kernel: Initializing IPsec netlink socket Jan 1 02:16:36 user info kernel: NET: Registered protocol family 1 Jan 1 02:16:36 user info kernel: NET: Registered protocol family 17 Jan 1 02:16:36 user info kernel: NET: Registered protocol family 15 Jan 1 02:16:36 user notice kernel: Ebtables v2.0 registered Jan 1 02:16:36 user info kernel: NET: Registered protocol family 8 Jan 1 02:16:36 user info kernel: NET: Registered protocol family 20 Jan 1 02:16:36 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear Jan 1 02:16:36 user info kernel: All bugs added by David S. Miller Jan 1 02:16:36 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly. Jan 1 02:16:36 user info kernel: Freeing unused kernel memory: 68k freed Jan 1 02:16:36 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5 Jan 1 02:16:36 user warn kernel: atmapi: module license 'Proprietary' taints kernel. Jan 1 02:16:36 user warn kernel: adsl: adsl_init entry Jan 1 02:16:36 user warn kernel: blaadd: blaa_detect entry Jan 1 02:16:36 user info kernel: Broadcom BCMPROCFS v1.0 initialized Jan 1 02:16:36 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Oct 26 2010 22:41:04 Jan 1 02:16:36 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface Jan 1 02:16:36 user warn kernel: ====>PAGE_MANAGEMENT=02, REG_DEV_ID=30, val32=00000000 Jan 1 02:16:36 user warn kernel: ethsw: found bcm5325e! Jan 1 02:16:36 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered Jan 1 02:16:36 user warn kernel: eth0: MAC Address: 00:26:ED:79:FA:A2 Jan 1 02:16:36 user crit kernel: eth0 Link UP. Jan 1 02:16:36 user warn kernel: BcmAdsl_Initialize=0xC00643E8, g_pFnNotifyCallback=0xC007EFE4 Jan 1 02:16:36 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000 Jan 1 02:16:36 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x1B77A4 0xDEADBEEF Jan 1 02:16:36 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FEF96C Jan 1 02:16:36 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000 Jan 1 02:16:36 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered Jan 1 02:16:36 user warn kernel: ATM proc init !!! Jan 1 02:16:36 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team Jan 1 02:16:36 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 376 bytes per conntrack Jan 1 02:16:36 user warn kernel: ip_conntrack_pptp version 2.1 loaded Jan 1 02:16:36 user crit kernel: ADSL G.994 training Jan 1 02:16:36 user warn kernel: ip_nat_pptp version 2.0 loaded Jan 1 02:16:36 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27 Jan 1 02:16:36 user warn kernel: BRCM NAT Cache: Hooking hit function @ c0061088 Jan 1 02:16:36 user info kernel: device nas_0_1_91 entered promiscuous mode Jan 1 02:16:36 user info kernel: br0: port 1(nas_0_1_91) entering learning state Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating Jan 1 02:16:36 user info kernel: br0: port 1(nas_0_1_91) entering forwarding state Jan 1 02:16:36 user info kernel: device nas_0_1_92 entered promiscuous mode Jan 1 02:16:36 user info kernel: entering learning state Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating Jan 1 02:16:36 user info kernel: br0: port 2(nas_0_1_92) entering forwarding state Jan 1 02:16:36 user crit kernel: ADSL G.992 started Jan 1 02:16:36 user warn kernel: eth0.2: MAC Address: 00:26:ED:79:FA:A2 Jan 1 02:16:36 user warn kernel: eth0.3: MAC Address: 00:26:ED:79:FA:A2 Jan 1 02:16:36 user warn kernel: eth0.4: MAC Address: 00:26:ED:79:FA:A2 Jan 1 02:16:36 user warn kernel: eth0.5: MAC Address: 00:26:ED:79:FA:A2 Jan 1 02:16:36 user info kernel: device nas_0_1_91 left promiscuous mode Jan 1 02:16:36 user info kernel: br0: port 1(nas_0_1_91) entering disabled state Jan 1 02:16:36 user info kernel: device nas_0_1_92 left promiscuous mode Jan 1 02:16:36 user info kernel: br0: port 2(nas_0_1_92) entering disabled state Jan 1 02:16:36 user info kernel: device nas_0_1_91 entered promiscuous mode Jan 1 02:16:36 user info kernel: br1: port 1(nas_0_1_91) entering learning state Jan 1 02:16:36 user info kernel: br1: topology change detected, propagating Jan 1 02:16:36 user info kernel: br1: port 1(nas_0_1_91) entering forwarding state Jan 1 02:16:36 user info kernel: device nas_0_1_92 entered promiscuous mode Jan 1 02:16:36 user info kernel: br1: port 2(nas_0_1_92) entering learning state Jan 1 02:16:36 user info kernel: br1: topology change detected, propagating Jan 1 02:16:36 user info kernel: br1: port 2(nas_0_1_92) entering forwarding state Jan 1 02:16:36 user info kernel: device eth0.2 entered promiscuous mode Jan 1 02:16:36 user info kernel: br0: port 1(eth0.2) entering learning state Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating Jan 1 02:16:36 user info kernel: br0: port 1(eth0.2) entering forwarding state Jan 1 02:16:36 user info kernel: device eth0.3 entered promiscuous mode Jan 1 02:16:36 user info kernel: br0: port 2(eth0.3) entering learning state Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating Jan 1 02:16:36 user info kernel: br0: port 2(eth0.3) entering forwarding state Jan 1 02:16:36 user info kernel: device eth0.4 entered promiscuous mode Jan 1 02:16:36 user info kernel: br0: port 3(eth0.4) entering learning state Jan 1 02:16:36 user info kernel: br0: topology change detected, propagating Jan 1 02:16:36 user info kernel: br0: port 3(eth0.4) entering forwarding state Jan 1 02:16:36 user info kernel: device eth0.5 entered promiscuous mode Jan 1 02:16:36 user info kernel: br1: port 3(eth0.5) entering learning state Jan 1 02:16:36 user info kernel: br1: topology change detected, propagating Jan 1 02:16:36 user info kernel: br1: port 3(eth0.5) entering forwarding state Jan 1 02:16:36 user crit kernel: ADSL G.992 channel analysis Jan 1 02:16:36 user info kernel: br0: port 3(eth0.4) entering disabled state Jan 1 02:16:36 user crit kernel: ADSL G.992 message exchange Jan 1 02:16:36 user crit kernel: ADSL link up, interleaved, us=766, ds=6143 Jan 1 02:16:36 user warn kernel: ATM Soft SAR: ATM link connected. Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=79.135.199.19 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=112 ID=42521 DF PROTO=TCP SPT=4911 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=178.140.148.12 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=120 ID=29057 DF PROTO=TCP SPT=61472 DPT=41067 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=79.135.199.19 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=112 ID=44395 DF PROTO=TCP SPT=4911 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=95.25.119.250 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=120 ID=22415 DF PROTO=TCP SPT=53173 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=178.140.148.12 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=120 ID=29971 DF PROTO=TCP SPT=61472 DPT=41067 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=89.222.246.5 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=52 ID=40139 DF PROTO=TCP SPT=58669 DPT=41067 WINDOW=5840 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=95.29.41.148 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=118 ID=14790 DF PROTO=TCP SPT=63904 DPT=41067 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=94.45.80.82 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=112 ID=4784 DF PROTO=TCP SPT=22716 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=92.243.181.195 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=117 ID=29657 DF PROTO=TCP SPT=16556 DPT=57033 WINDOW=16384 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user err kernel: ipt_tcpmss_target: bad length (576 bytes) Jan 1 02:16:36 user err kernel: ipt_tcpmss_target: bad length (576 bytes) Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=94.75.144.225 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=116 ID=5138 DF PROTO=TCP SPT=3107 DPT=57033 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=77.79.135.231 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=53 ID=43578 DF PROTO=TCP SPT=60349 DPT=41067 WINDOW=5440 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: 9 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=213.79.110.131 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=55 ID=51841 DF PROTO=TCP SPT=55427 DPT=41067 WINDOW=5840 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=212.231.208.2 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=106 ID=19102 DF PROTO=TCP SPT=54626 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=178.120.206.32 DST=91.76.84.216 LEN=48 TOS=0x00 PREC=0x20 TTL=113 ID=31167 DF PROTO=TCP SPT=56324 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=93.175.208.110 DST=91.76.84.216 LEN=60 TOS=0x00 PREC=0x20 TTL=53 ID=3835 DF PROTO=TCP SPT=9068 DPT=41067 WINDOW=5840 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=92.115.134.117 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=114 ID=9602 DF PROTO=TCP SPT=14307 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0 Jan 1 02:16:36 user alert kernel: Intrusion -> IN=ppp_0_1_50_1 OUT= MAC= SRC=109.200.112.144 DST=91.76.84.216 LEN=52 TOS=0x00 PREC=0x20 TTL=118 ID=25333 DF PROTO=TCP SPT=61388 DPT=57033 WINDOW=8192 RES=0x00 SYN URGP=0 | | Всего записей: 12 | Зарегистр. 21-12-2010 | Отправлено: 22:09 04-01-2011 | Исправлено: inzaim, 22:10 04-01-2011 |
|