Hi all,I'm have a problem that is proving problematic to diagnose...Since Sunday (9 Dec 2012), my Slingshot ADSL keeps dropping. It happens every 10-120 minutes, sometimes one after the other for an extended period. It usually takes several seconds to several minutes to reconnect again, and occasionally it can't reconnect and just keeps trying. When the ADSL drops, the ADSL light on my modem goes out and blinks while it's synching again.Slingshot tech support initially said it was likely a problem with my ADSL modem (TP Link TD-W8960N v3 with the latest firmware [1.4.0 Build 111108 Rel.40398n]).Here are the steps I've taken so far:TP Link router factory resetDisabled all modulations except for G.DmtGot another modem from my neighbor and tried thatIsolation test: plugged the modem directly into the master jack (no filter, no other jacks, no connections/splices before the jack - the line in from the street terminates at this jack)The Chorus tech (earlier today):Replaced the master jack (it was an old jack with the extra capacitor in it)Changed my "profile" from standard to robust. The profile change meant my downstream line rate dropped from ~14000 odd ~10000 (which i expected), but ultimately had no effect on my disconnections. After all of the above, I still get disconnected...The SNR and attenuation seem ok.Here's the system log from my ADSL modem for the last hour or so before posting. It includes a router reboot, thus the initial activity and incorrect date/time:Date/Time Facility Severity MessageJan 1 00:00:06 syslog emerg BCM96345 started: BusyBox v1.00 (2011.04.10-10:17+0000)Jan 1 00:00:06 user warn kernel: Serial flash device: name S25FL032A, id 0x0115, size 4096KBJan 1 00:00:06 user warn kernel: 96358VW2 prom initJan 1 00:00:06 user warn kernel: CPU revision is: 0002a010Jan 1 00:00:06 user warn kernel: Determined physical RAM map:Jan 1 00:00:06 user warn kernel: memory: 01fa0000 @ 00000000 (usable)Jan 1 00:00:06 user warn kernel: Built 1 zonelists. Total pages: 8033Jan 1 00:00:06 user warn kernel: brcm mips: enabling icache and dcache...Jan 1 00:00:06 user warn kernel: Primary instruction cache 32kB, physically tagged, 2-way, linesize 16 bytes.Jan 1 00:00:06 user warn kernel: Primary data cache 16kB, 2-way, linesize 16 bytes.Jan 1 00:00:06 user warn kernel: PID hash table entries: 128 (order: 7, 512 bytes)Jan 1 00:00:06 user warn kernel: Using 150.000 MHz high precision timer.Jan 1 00:00:06 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)Jan 1 00:00:06 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)Jan 1 00:00:06 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80300000 ... 0x80400000>Jan 1 00:00:06 user warn kernel: Mount-cache hash table entries: 512Jan 1 00:00:06 user warn kernel: Total Flash size: 4096K with 64 sectorsJan 1 00:00:06 user warn kernel: File system address: 0xbfc10100Jan 1 00:00:06 user warn kernel: registering PCI controller with io_map_base unsetJan 1 00:00:06 user warn kernel: BLOG v1.0 InitializedJan 1 00:00:06 user warn kernel: IP route cache hash table entries: 1024 (order: 0, 4096 bytes)Jan 1 00:00:06 user warn kernel: TCP established hash table entries: 1024 (order: 1, 8192 bytes)Jan 1 00:00:06 user warn kernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes)Jan 1 00:00:06 user warn kernel: squashfs: LZMA suppport for slax.org by jroJan 1 00:00:06 user warn kernel: bcm963xx_mtd driver v1.0Jan 1 00:00:06 user warn kernel: brcmboard: brcm_board_init entryJan 1 00:00:06 user warn kernel: SES: Button Interrupt 0x3 is enabledJan 1 00:00:06 user warn kernel: SES: LED GPIO 0x4 is enabledJan 1 00:00:06 user warn kernel: irq.c: reset_fac_irq is set to low_trigger.Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46Jan 1 00:00:06 user warn kernel: Mirror/redirect action onJan 1 00:00:06 user warn kernel: u32 classifierJan 1 00:00:06 user warn kernel: Actions configuredJan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcacheJan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entryJan 1 00:00:06 user warn kernel: adsl: adsl_init entryJan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY InterfaceJan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registeredJan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 90:F6:52:A4:67:3CJan 1 00:00:06 user crit kernel: eth0 Link UP.Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)Jan 1 00:00:06 user warn kernel: wl0: Broadcom BCM4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registeredJan 1 00:00:07 user warn kernel: KLOB extended to 2 poolsJan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00000980 adsl2=0x00000000Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B777C 0xDEADBEEFJan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96CJan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00000980 adsl2=0x00000000Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registeredJan 1 00:00:08 user warn kernel: KLOB extended to 3 poolsJan 1 00:00:08 user warn kernel: KLOB extended to 4 poolsJan 1 00:00:08 user warn kernel: KLOB extended to 5 poolsJan 1 00:00:08 user warn kernel: KLOB extended to 6 poolsJan 1 00:00:08 user warn kernel: KLOB extended to 7 poolsJan 1 00:00:08 user warn kernel: KLOB extended to 8 poolsJan 1 00:00:10 user warn kernel: Scratch pad is not initialized.Jan 1 00:00:10 user crit kernel: xDSL G.994 trainingJan 1 00:00:16 user crit kernel: ADSL G.992 startedJan 1 00:00:17 user crit kernel: ADSL link downJan 1 00:00:17 user warn kernel: TP: ADSL LINK DOWN.Jan 1 00:00:24 user crit kernel: xDSL G.994 trainingJan 1 00:00:30 user crit kernel: ADSL G.992 startedJan 1 00:00:35 user crit kernel: ADSL G.992 channel analysisJan 1 00:00:43 user crit kernel: ADSL link downJan 1 00:00:43 user warn kernel: TP: ADSL LINK DOWN.Jan 1 00:00:46 user crit kernel: xDSL G.994 trainingJan 1 00:00:52 user crit kernel: ADSL G.992 startedJan 1 00:00:57 user crit kernel: ADSL G.992 channel analysisJan 1 00:01:05 user crit kernel: ADSL link downJan 1 00:01:05 user warn kernel: TP: ADSL LINK DOWN.Jan 1 00:01:12 user crit kernel: xDSL G.994 trainingJan 1 00:01:18 user crit kernel: ADSL G.992 startedJan 1 00:01:23 user crit kernel: ADSL G.992 channel analysisJan 1 00:01:31 user crit kernel: ADSL G.992 message exchangeJan 1 00:01:32 user crit kernel: ADSL link up, Path 0, us=632, ds=10647Jan 1 00:01:35 daemon crit syslog: PPP LCP UP.Jan 1 00:01:35 daemon crit syslog: Received valid IP address from server. Connection UP.Jan 1 00:01:35 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core TeamJan 1 00:01:36 user warn kernel: Netfilter messages via NETLINK v0.30.Jan 1 00:01:36 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)Dec 11 16:53:01 user warn dnsprobe[790]: dns query failedDec 11 16:53:06 user warn dnsprobe[790]: dns query failedDec 11 16:53:11 user warn dnsprobe[790]: dns query failedDec 11 16:57:19 user warn dnsprobe[790]: dns query failedDec 11 16:57:23 user crit kernel: ADSL link downDec 11 16:57:23 user warn kernel: TP: ADSL LINK DOWN.Dec 11 16:57:24 user warn dnsprobe[790]: dns query failedDec 11 16:57:25 user crit kernel: xDSL G.994 trainingDec 11 16:57:26 daemon crit syslog: Clear IP addresses. Connection DOWN.Dec 11 16:57:26 daemon crit syslog: Clear IP addresses. PPP connection DOWN.Dec 11 16:57:29 user warn dnsprobe[790]: dns query failedDec 11 16:57:31 user crit kernel: ADSL G.992 startedDec 11 16:57:36 user crit kernel: ADSL G.992 channel analysisDec 11 16:57:44 user crit kernel: ADSL G.992 message exchangeDec 11 16:57:45 user crit kernel: ADSL link up, Path 0, us=504, ds=9795Dec 11 16:57:54 daemon crit syslog: PPP LCP UP.Dec 11 16:57:54 daemon crit syslog: Received valid IP address from server. Connection UP.Dec 11 17:09:17 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=46.72.48.242 DST=119.xxx.xxx.xxx LEN=48 TOS=0x00 PREC=0x00 TTL=106 ID=25637 PROTO=TCP SPT=38052 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:14:57 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=93.179.203.114 DST=119.xxx.xxx.xxx LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=9750 DF PROTO=TCP SPT=59548 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0Dec 11 17:27:19 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=61.164.116.80 DST=119.xxx.xxx.xxx LEN=40 TOS=0x00 PREC=0x00 TTL=103 ID=256 PROTO=TCP SPT=6000 DPT=3389 WINDOW=16384 RES=0x00 SYN URGP=0Dec 11 17:29:52 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=103 ID=20517 DF PROTO=TCP SPT=34470 DPT=18669 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:29:53 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=103 ID=20598 DF PROTO=TCP SPT=48335 DPT=18669 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:29:54 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=103 ID=20679 DF PROTO=TCP SPT=50101 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:29:54 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=104 ID=20678 DF PROTO=TCP SPT=58248 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:41:45 user crit kernel: ADSL link downDec 11 17:41:45 user warn kernel: TP: ADSL LINK DOWN.Dec 11 17:41:47 daemon crit syslog: Clear IP addresses. Connection DOWN.Dec 11 17:41:47 daemon crit syslog: Clear IP addresses. PPP connection DOWN.Dec 11 17:42:11 user crit kernel: xDSL G.994 trainingDec 11 17:42:18 user crit kernel: ADSL G.992 startedDec 11 17:42:23 user crit kernel: ADSL G.992 channel analysisDec 11 17:42:31 user crit kernel: ADSL G.992 message exchangeDec 11 17:42:31 user crit kernel: ADSL link up, Path 0, us=504, ds=9383Dec 11 17:42:40 daemon crit syslog: PPP LCP UP.Dec 11 17:42:40 daemon crit syslog: Received valid IP address from server. Connection UP.Dec 11 17:42:46 user warn dnsprobe[2072]: dns query failedDec 11 17:42:51 user warn dnsprobe[2072]: dns query failedDec 11 17:44:28 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=11395 DF PROTO=TCP SPT=13280 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:44:31 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=12241 DF PROTO=TCP SPT=13280 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:44:37 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=13980 DF PROTO=TCP SPT=13280 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:46:16 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=43148 DF PROTO=TCP SPT=13880 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:46:19 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=44072 DF PROTO=TCP SPT=13880 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:47:36 user crit kernel: ADSL link downDec 11 17:47:36 user warn kernel: TP: ADSL LINK DOWN.Dec 11 17:47:37 daemon crit syslog: Clear IP addresses. Connection DOWN.Dec 11 17:47:37 daemon crit syslog: Clear IP addresses. PPP connection DOWN.Dec 11 17:47:59 user crit kernel: xDSL G.994 trainingDec 11 17:48:01 user warn dnsprobe[2072]: dns query failedDec 11 17:48:05 user crit kernel: ADSL G.992 startedDec 11 17:48:06 user warn dnsprobe[2072]: dns query failedDec 11 17:48:11 user warn dnsprobe[2072]: dns query failedDec 11 17:48:11 user crit kernel: ADSL G.992 channel analysisDec 11 17:48:19 user crit kernel: ADSL G.992 message exchangeDec 11 17:48:19 user crit kernel: ADSL link up, Path 0, us=440, ds=9011Dec 11 17:48:28 daemon crit syslog: PPP LCP UP.Dec 11 17:48:28 daemon crit syslog: Received valid IP address from server. Connection UP.Dec 11 17:48:34 user warn dnsprobe[2485]: dns query failedDec 11 17:48:39 user warn dnsprobe[2485]: dns query failedDec 11 17:49:32 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=212.94.96.131 DST=119.xxx.xxx.xxx LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=31934 PROTO=TCP SPT=40985 DPT=8443 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:51:41 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=5875 DF PROTO=TCP SPT=15886 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:51:44 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=6652 DF PROTO=TCP SPT=15886 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:51:50 user alert kernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=8411 DF PROTO=TCP SPT=15886 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0 Any bright ideas about what could be causing this?System Log Date/TimeFacilitySeverityMessageJan 1 00:00:06syslogemergBCM96345 started: BusyBox v1.00 (2011.04.10-10:17+0000)Jan 1 00:00:06userwarnkernel: Serial flash device: name S25FL032A, id 0x0115, size 4096KBJan 1 00:00:06userwarnkernel: 96358VW2 prom initJan 1 00:00:06userwarnkernel: CPU revision is: 0002a010Jan 1 00:00:06userwarnkernel: Determined physical RAM map:Jan 1 00:00:06userwarnkernel: memory: 01fa0000 @ 00000000 (usable)Jan 1 00:00:06userwarnkernel: Built 1 zonelists. Total pages: 8033Jan 1 00:00:06userwarnkernel: brcm mips: enabling icache and dcache...Jan 1 00:00:06userwarnkernel: Primary instruction cache 32kB, physically tagged, 2-way, linesize 16 bytes.Jan 1 00:00:06userwarnkernel: Primary data cache 16kB, 2-way, linesize 16 bytes.Jan 1 00:00:06userwarnkernel: PID hash table entries: 128 (order: 7, 512 bytes)Jan 1 00:00:06userwarnkernel: Using 150.000 MHz high precision timer.Jan 1 00:00:06userwarnkernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)Jan 1 00:00:06userwarnkernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)Jan 1 00:00:06userwarnkernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80300000 ... 0x80400000>Jan 1 00:00:06userwarnkernel: Mount-cache hash table entries: 512Jan 1 00:00:06userwarnkernel: Total Flash size: 4096K with 64 sectorsJan 1 00:00:06userwarnkernel: File system address: 0xbfc10100Jan 1 00:00:06userwarnkernel: registering PCI controller with io_map_base unsetJan 1 00:00:06userwarnkernel: BLOG v1.0 InitializedJan 1 00:00:06userwarnkernel: IP route cache hash table entries: 1024 (order: 0, 4096 bytes)Jan 1 00:00:06userwarnkernel: TCP established hash table entries: 1024 (order: 1, 8192 bytes)Jan 1 00:00:06userwarnkernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes)Jan 1 00:00:06userwarnkernel: squashfs: LZMA suppport for slax.org by jroJan 1 00:00:06userwarnkernel: bcm963xx_mtd driver v1.0Jan 1 00:00:06userwarnkernel: brcmboard: brcm_board_init entryJan 1 00:00:06userwarnkernel: SES: Button Interrupt 0x3 is enabledJan 1 00:00:06userwarnkernel: SES: LED GPIO 0x4 is enabledJan 1 00:00:06userwarnkernel: irq.c: reset_fac_irq is set to low_trigger.Jan 1 00:00:06userwarnkernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46Jan 1 00:00:06userwarnkernel: Mirror/redirect action onJan 1 00:00:06userwarnkernel: u32 classifierJan 1 00:00:06userwarnkernel: Actions configuredJan 1 00:00:06userwarnkernel: VFS: Mounted root (squashfs filesystem) readonly.Jan 1 00:00:06userwarnkernel: pktflow: module license 'Proprietary' taints kernel.Jan 1 00:00:06userwarnkernel: Broadcom Packet Flow Cache learning via BLOG enabled.Jan 1 00:00:06userwarnkernel: Created Proc FS /procfs/fcacheJan 1 00:00:06userwarnkernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08Jan 1 00:00:06userwarnkernel: bcmxtmcfg: bcmxtmcfg_init entryJan 1 00:00:06userwarnkernel: adsl: adsl_init entryJan 1 00:00:06userwarnkernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31Jan 1 00:00:06userwarnkernel: Config Ethernet Switch Through MDIO Pseudo PHY InterfaceJan 1 00:00:06userwarnkernel: ethsw: found bcm5325e!Jan 1 00:00:06userwarnkernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registeredJan 1 00:00:06userwarnkernel: rate ctrl page 0x35, addr 0x02: 0Jan 1 00:00:06userwarnkernel: 8021x_1 page 0x0A, addr 0x4C: 0Jan 1 00:00:06userwarnkernel: 8021x_2 page 0x0A, addr 0x4E: 0Jan 1 00:00:06userwarnkernel: eth0: MAC Address: 90:F6:52:A4:67:3CJan 1 00:00:06usercritkernel: eth0 Link UP.Jan 1 00:00:06userwarnkernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)Jan 1 00:00:06userwarnkernel: wl0: Broadcom BCM4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0Jan 1 00:00:06userwarnkernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registeredJan 1 00:00:07userwarnkernel: KLOB extended to 2 poolsJan 1 00:00:07userwarnkernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744Jan 1 00:00:07userwarnkernel: AnnexCParam=0x00000000 AnnexAParam=0x00000980 adsl2=0x00000000Jan 1 00:00:07userwarnkernel: pSdramPHY=0xA1FFFFF8, 0x1B777C 0xDEADBEEFJan 1 00:00:08userwarnkernel: AdslCoreSharedMemInit: shareMemAvailable=21712Jan 1 00:00:08userwarnkernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96CJan 1 00:00:08userwarnkernel: AnnexCParam=0x00000000 AnnexAParam=0x00000980 adsl2=0x00000000Jan 1 00:00:08userwarnkernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registeredJan 1 00:00:08userwarnkernel: KLOB extended to 3 poolsJan 1 00:00:08userwarnkernel: KLOB extended to 4 poolsJan 1 00:00:08userwarnkernel: KLOB extended to 5 poolsJan 1 00:00:08userwarnkernel: KLOB extended to 6 poolsJan 1 00:00:08userwarnkernel: KLOB extended to 7 poolsJan 1 00:00:08userwarnkernel: KLOB extended to 8 poolsJan 1 00:00:10userwarnkernel: Scratch pad is not initialized.Jan 1 00:00:10usercritkernel: xDSL G.994 trainingJan 1 00:00:16usercritkernel: ADSL G.992 startedJan 1 00:00:17usercritkernel: ADSL link downJan 1 00:00:17userwarnkernel: TP: ADSL LINK DOWN.Jan 1 00:00:24usercritkernel: xDSL G.994 trainingJan 1 00:00:30usercritkernel: ADSL G.992 startedJan 1 00:00:35usercritkernel: ADSL G.992 channel analysisJan 1 00:00:43usercritkernel: ADSL link downJan 1 00:00:43userwarnkernel: TP: ADSL LINK DOWN.Jan 1 00:00:46usercritkernel: xDSL G.994 trainingJan 1 00:00:52usercritkernel: ADSL G.992 startedJan 1 00:00:57usercritkernel: ADSL G.992 channel analysisJan 1 00:01:05usercritkernel: ADSL link downJan 1 00:01:05userwarnkernel: TP: ADSL LINK DOWN.Jan 1 00:01:12usercritkernel: xDSL G.994 trainingJan 1 00:01:18usercritkernel: ADSL G.992 startedJan 1 00:01:23usercritkernel: ADSL G.992 channel analysisJan 1 00:01:31usercritkernel: ADSL G.992 message exchangeJan 1 00:01:32usercritkernel: ADSL link up, Path 0, us=632, ds=10647Jan 1 00:01:35daemoncritsyslog: PPP LCP UP.Jan 1 00:01:35daemoncritsyslog: Received valid IP address from server. Connection UP.Jan 1 00:01:35userwarnkernel: ip_tables: (C) 2000-2006 Netfilter Core TeamJan 1 00:01:36userwarnkernel: Netfilter messages via NETLINK v0.30.Jan 1 00:01:36userwarnkernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)Dec 11 16:53:01userwarndnsprobe[790]: dns query failedDec 11 16:53:06userwarndnsprobe[790]: dns query failedDec 11 16:53:11userwarndnsprobe[790]: dns query failedDec 11 16:57:19userwarndnsprobe[790]: dns query failedDec 11 16:57:23usercritkernel: ADSL link downDec 11 16:57:23userwarnkernel: TP: ADSL LINK DOWN.Dec 11 16:57:24userwarndnsprobe[790]: dns query failedDec 11 16:57:25usercritkernel: xDSL G.994 trainingDec 11 16:57:26daemoncritsyslog: Clear IP addresses. Connection DOWN.Dec 11 16:57:26daemoncritsyslog: Clear IP addresses. PPP connection DOWN.Dec 11 16:57:29userwarndnsprobe[790]: dns query failedDec 11 16:57:31usercritkernel: ADSL G.992 startedDec 11 16:57:36usercritkernel: ADSL G.992 channel analysisDec 11 16:57:44usercritkernel: ADSL G.992 message exchangeDec 11 16:57:45usercritkernel: ADSL link up, Path 0, us=504, ds=9795Dec 11 16:57:54daemoncritsyslog: PPP LCP UP.Dec 11 16:57:54daemoncritsyslog: Received valid IP address from server. Connection UP.Dec 11 17:09:17useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=46.72.48.242 DST=119.224.38.104 LEN=48 TOS=0x00 PREC=0x00 TTL=106 ID=25637 PROTO=TCP SPT=38052 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:14:57useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=93.179.203.114 DST=119.224.38.104 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=9750 DF PROTO=TCP SPT=59548 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0Dec 11 17:27:19useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=61.164.116.80 DST=119.224.38.104 LEN=40 TOS=0x00 PREC=0x00 TTL=103 ID=256 PROTO=TCP SPT=6000 DPT=3389 WINDOW=16384 RES=0x00 SYN URGP=0Dec 11 17:29:52useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=103 ID=20517 DF PROTO=TCP SPT=34470 DPT=18669 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:29:53useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=103 ID=20598 DF PROTO=TCP SPT=48335 DPT=18669 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:29:54useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=103 ID=20679 DF PROTO=TCP SPT=50101 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:29:54useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=41.228.41.135 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=104 ID=20678 DF PROTO=TCP SPT=58248 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0Dec 11 17:41:45usercritkernel: ADSL link downDec 11 17:41:45userwarnkernel: TP: ADSL LINK DOWN.Dec 11 17:41:47daemoncritsyslog: Clear IP addresses. Connection DOWN.Dec 11 17:41:47daemoncritsyslog: Clear IP addresses. PPP connection DOWN.Dec 11 17:42:11usercritkernel: xDSL G.994 trainingDec 11 17:42:18usercritkernel: ADSL G.992 startedDec 11 17:42:23usercritkernel: ADSL G.992 channel analysisDec 11 17:42:31usercritkernel: ADSL G.992 message exchangeDec 11 17:42:31usercritkernel: ADSL link up, Path 0, us=504, ds=9383Dec 11 17:42:40daemoncritsyslog: PPP LCP UP.Dec 11 17:42:40daemoncritsyslog: Received valid IP address from server. Connection UP.Dec 11 17:42:46userwarndnsprobe[2072]: dns query failedDec 11 17:42:51userwarndnsprobe[2072]: dns query failedDec 11 17:44:28useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=11395 DF PROTO=TCP SPT=13280 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:44:31useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=12241 DF PROTO=TCP SPT=13280 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:44:37useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=13980 DF PROTO=TCP SPT=13280 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:46:16useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=43148 DF PROTO=TCP SPT=13880 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:46:19useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=44072 DF PROTO=TCP SPT=13880 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:47:36usercritkernel: ADSL link downDec 11 17:47:36userwarnkernel: TP: ADSL LINK DOWN.Dec 11 17:47:37daemoncritsyslog: Clear IP addresses. Connection DOWN.Dec 11 17:47:37daemoncritsyslog: Clear IP addresses. PPP connection DOWN.Dec 11 17:47:59usercritkernel: xDSL G.994 trainingDec 11 17:48:01userwarndnsprobe[2072]: dns query failedDec 11 17:48:05usercritkernel: ADSL G.992 startedDec 11 17:48:06userwarndnsprobe[2072]: dns query failedDec 11 17:48:11userwarndnsprobe[2072]: dns query failedDec 11 17:48:11usercritkernel: ADSL G.992 channel analysisDec 11 17:48:19usercritkernel: ADSL G.992 message exchangeDec 11 17:48:19usercritkernel: ADSL link up, Path 0, us=440, ds=9011Dec 11 17:48:28daemoncritsyslog: PPP LCP UP.Dec 11 17:48:28daemoncritsyslog: Received valid IP address from server. Connection UP.Dec 11 17:48:34userwarndnsprobe[2485]: dns query failedDec 11 17:48:39userwarndnsprobe[2485]: dns query failedDec 11 17:49:32useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=212.94.96.131 DST=119.224.38.104 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=31934 PROTO=TCP SPT=40985 DPT=8443 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:51:41useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=5875 DF PROTO=TCP SPT=15886 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:51:44useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=6652 DF PROTO=TCP SPT=15886 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0Dec 11 17:51:50useralertkernel: Intrusion -> IN=pppoa0 OUT= MAC= SRC=201.78.28.244 DST=119.224.38.104 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=8411 DF PROTO=TCP SPT=15886 DPT=34026 WINDOW=65535 RES=0x00 SYN URGP=0
↧