Skip to content

Instantly share code, notes, and snippets.

@MaskRay
Created July 12, 2025 22:41
Show Gist options
  • Save MaskRay/0fa33f70b28961febb578827b4565a47 to your computer and use it in GitHub Desktop.
Save MaskRay/0fa33f70b28961febb578827b4565a47 to your computer and use it in GitHub Desktop.
Eurocom Ultra Blitz 2 freeze 15:25 kernel log, 15:33 freeze
Jul 12 15:12:14 hacking kernel: Linux version 6.15.6-arch1-1 (linux@archlinux) (gcc (GCC) 15.1.1 20250425, GNU ld (GNU Binutils) 2.44.0) #1 SMP PREEMPT_DYNAMIC Thu, 10 Jul 2025 17:10:18 +0000
Jul 12 15:12:14 hacking kernel: Command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2
Jul 12 15:12:14 hacking kernel: x86/split lock detection: #AC: crashing the kernel on kernel split_locks and warning on user-space split_locks
Jul 12 15:12:14 hacking kernel: BIOS-provided physical RAM map:
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009efff] usable
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x000000000009f000-0x00000000000fffff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000000100000-0x000000005df8afff] usable
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x000000005df8b000-0x000000005e88afff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x000000005e88b000-0x00000000606befff] usable
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000606bf000-0x00000000626befff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000626bf000-0x0000000067ebefff] ACPI NVS
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000067ebf000-0x0000000067ffefff] ACPI data
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000067fff000-0x0000000067ffffff] usable
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000068000000-0x00000000787fffff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000c0000000-0x00000000cfffffff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000fe010000-0x00000000fe010fff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000fed20000-0x00000000fed7ffff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087fffffff] usable
Jul 12 15:12:14 hacking kernel: NX (Execute Disable) protection: active
Jul 12 15:12:14 hacking kernel: APIC: Static calls initialized
Jul 12 15:12:14 hacking kernel: efi: EFI v2.9 by INSYDE Corp.
Jul 12 15:12:14 hacking kernel: efi: TPMFinalLog=0x67e17000 ACPI=0x67ffe000 ACPI 2.0=0x67ffe014 SMBIOS=0x60dea000 MEMATTR=0x59090018 ESRT=0x5a526698 RNG=0x67f37f18 INITRD=0x5908ed18 TPMEventLog=0x67f2e018
Jul 12 15:12:14 hacking kernel: random: crng init done
Jul 12 15:12:14 hacking kernel: efi: Remove mem91: MMIO range=[0xc0000000-0xcfffffff] (256MB) from e820 map
Jul 12 15:12:14 hacking kernel: e820: remove [mem 0xc0000000-0xcfffffff] reserved
Jul 12 15:12:14 hacking kernel: efi: Not removing mem92: MMIO range=[0xfe010000-0xfe010fff] (4KB) from e820 map
Jul 12 15:12:14 hacking kernel: efi: Remove mem94: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map
Jul 12 15:12:14 hacking kernel: e820: remove [mem 0xff000000-0xffffffff] reserved
Jul 12 15:12:14 hacking kernel: SMBIOS 3.6 present.
Jul 12 15:12:14 hacking kernel: DMI: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 12 15:12:14 hacking kernel: DMI: Memory slots populated: 1/2
Jul 12 15:12:14 hacking kernel: tsc: Detected 3700.000 MHz processor
Jul 12 15:12:14 hacking kernel: tsc: Detected 3686.400 MHz TSC
Jul 12 15:12:14 hacking kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Jul 12 15:12:14 hacking kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Jul 12 15:12:14 hacking kernel: last_pfn = 0x880000 max_arch_pfn = 0x400000000
Jul 12 15:12:14 hacking kernel: MTRR map: 7 entries (3 fixed + 4 variable; max 23), built from 10 variable MTRRs
Jul 12 15:12:14 hacking kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT
Jul 12 15:12:14 hacking kernel: x2apic: enabled by BIOS, switching to x2apic ops
Jul 12 15:12:14 hacking kernel: last_pfn = 0x68000 max_arch_pfn = 0x400000000
Jul 12 15:12:14 hacking kernel: esrt: Reserving ESRT space from 0x000000005a526698 to 0x000000005a526720.
Jul 12 15:12:14 hacking kernel: e820: update [mem 0x5a526000-0x5a526fff] usable ==> reserved
Jul 12 15:12:14 hacking kernel: Using GB pages for direct mapping
Jul 12 15:12:14 hacking kernel: Secure boot disabled
Jul 12 15:12:14 hacking kernel: RAMDISK: [mem 0x52a4a000-0x54866fff]
Jul 12 15:12:14 hacking kernel: ACPI: Early table checksum verification disabled
Jul 12 15:12:14 hacking kernel: ACPI: RSDP 0x0000000067FFE014 000024 (v02 INSYDE)
Jul 12 15:12:14 hacking kernel: ACPI: XSDT 0x0000000067FCF188 00014C (v01 INSYDE ARL 00000002 01000013)
Jul 12 15:12:14 hacking kernel: ACPI: FACP 0x0000000067FC2000 000114 (v06 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: DSDT 0x0000000067F45000 07944F (v02 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: FACS 0x0000000067DEC000 000040
Jul 12 15:12:14 hacking kernel: ACPI: UEFI 0x0000000067E16000 0001CF (v01 INSYDE H2O BIOS 00000001 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FFC000 000770 (v02 PmRef Cpu0Ist 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FFB000 0005FB (v02 PmRef Cpu0Hwp 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FFA000 0001AB (v02 PmRef Cpu0Psd 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF9000 000394 (v02 PmRef Cpu0Cst 00003001 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF7000 001BAF (v02 PmRef ApIst 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF5000 001620 (v02 PmRef ApHwp 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF3000 001349 (v02 PmRef ApPsd 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF2000 000FBB (v02 PmRef ApCst 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FEE000 003BC8 (v02 CpuRef CpuSsdt 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: DTPR 0x0000000067FED000 000088 (v01 00000000 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FEA000 0021A0 (v02 INTEL IgfxSsdt 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FE0000 009A2C (v02 INTEL TcssSsdt 00001000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: ECDT 0x0000000067FDF000 000069 (v01 00000001 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FDE000 00077B (v02 INSYDE Tpm2Tabl 00001000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: TPM2 0x0000000067FDD000 00004C (v04 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FD2000 009168 (v02 DptfTb DptfTabl 00001000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: LPIT 0x0000000067FD1000 0000CC (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: WSMT 0x0000000067FD0000 000028 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FCD000 0015CD (v02 INSYDE PtidDevc 00001000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FC7000 005E42 (v02 INSYDE TbtTypeC 00000000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: DBGP 0x0000000067FFD000 000034 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: DBG2 0x0000000067FC6000 000054 (v00 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FC4000 00189A (v02 INSYDE UsbCTabl 00001000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: NHLT 0x0000000067FC3000 0002E3 (v00 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: HPET 0x0000000067FC1000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: APIC 0x0000000067FC0000 000358 (v05 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: MCFG 0x0000000067FBF000 00003C (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: DMAR 0x0000000067F44000 000098 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F42000 0010C3 (v02 INTEL xh_mtlpR 00000000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F3F000 00281A (v02 SocGpe SocGpe 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F3C000 0028D3 (v02 SocCmn SocCmn 00003000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F3B000 0000F8 (v02 INSYDE PcdTabl 00001000 INTL 20200717)
Jul 12 15:12:14 hacking kernel: ACPI: FPDT 0x0000000067F3A000 000044 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: PHAT 0x0000000067F38000 000790 (v01 INSYDE ARL 00000005 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: BGRT 0x0000000067F39000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 12 15:12:14 hacking kernel: ACPI: Reserving FACP table memory at [mem 0x67fc2000-0x67fc2113]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DSDT table memory at [mem 0x67f45000-0x67fbe44e]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving FACS table memory at [mem 0x67dec000-0x67dec03f]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving UEFI table memory at [mem 0x67e16000-0x67e161ce]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffc000-0x67ffc76f]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffb000-0x67ffb5fa]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffa000-0x67ffa1aa]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff9000-0x67ff9393]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff7000-0x67ff8bae]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff5000-0x67ff661f]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff3000-0x67ff4348]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff2000-0x67ff2fba]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fee000-0x67ff1bc7]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DTPR table memory at [mem 0x67fed000-0x67fed087]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fea000-0x67fec19f]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fe0000-0x67fe9a2b]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving ECDT table memory at [mem 0x67fdf000-0x67fdf068]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fde000-0x67fde77a]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving TPM2 table memory at [mem 0x67fdd000-0x67fdd04b]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fd2000-0x67fdb167]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving LPIT table memory at [mem 0x67fd1000-0x67fd10cb]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving WSMT table memory at [mem 0x67fd0000-0x67fd0027]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fcd000-0x67fce5cc]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc7000-0x67fcce41]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DBGP table memory at [mem 0x67ffd000-0x67ffd033]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DBG2 table memory at [mem 0x67fc6000-0x67fc6053]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc4000-0x67fc5899]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving NHLT table memory at [mem 0x67fc3000-0x67fc32e2]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving HPET table memory at [mem 0x67fc1000-0x67fc1037]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving APIC table memory at [mem 0x67fc0000-0x67fc0357]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving MCFG table memory at [mem 0x67fbf000-0x67fbf03b]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DMAR table memory at [mem 0x67f44000-0x67f44097]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f42000-0x67f430c2]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3f000-0x67f41819]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3c000-0x67f3e8d2]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3b000-0x67f3b0f7]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving FPDT table memory at [mem 0x67f3a000-0x67f3a043]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving PHAT table memory at [mem 0x67f38000-0x67f3878f]
Jul 12 15:12:14 hacking kernel: ACPI: Reserving BGRT table memory at [mem 0x67f39000-0x67f39037]
Jul 12 15:12:14 hacking kernel: APIC: Switched APIC routing to: cluster x2apic
Jul 12 15:12:14 hacking kernel: No NUMA configuration found
Jul 12 15:12:14 hacking kernel: Faking a node at [mem 0x0000000000000000-0x000000087fffffff]
Jul 12 15:12:14 hacking kernel: NODE_DATA(0) allocated [mem 0x87ffd5280-0x87fffffff]
Jul 12 15:12:14 hacking kernel: Zone ranges:
Jul 12 15:12:14 hacking kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff]
Jul 12 15:12:14 hacking kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff]
Jul 12 15:12:14 hacking kernel: Normal [mem 0x0000000100000000-0x000000087fffffff]
Jul 12 15:12:14 hacking kernel: Device empty
Jul 12 15:12:14 hacking kernel: Movable zone start for each node
Jul 12 15:12:14 hacking kernel: Early memory node ranges
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000000001000-0x000000000009efff]
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000000100000-0x000000005df8afff]
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x000000005e88b000-0x00000000606befff]
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000067fff000-0x0000000067ffffff]
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000100000000-0x000000087fffffff]
Jul 12 15:12:14 hacking kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087fffffff]
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA32: 2304 pages in unavailable ranges
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA32: 31040 pages in unavailable ranges
Jul 12 15:12:14 hacking kernel: ACPI: PM-Timer IO Port: 0x1808
Jul 12 15:12:14 hacking kernel: ACPI: X2APIC_NMI (uid[0xffffffff] high level lint[0x1])
Jul 12 15:12:14 hacking kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
Jul 12 15:12:14 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Jul 12 15:12:14 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Jul 12 15:12:14 hacking kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Jul 12 15:12:14 hacking kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Jul 12 15:12:14 hacking kernel: e820: update [mem 0x58516000-0x585a6fff] usable ==> reserved
Jul 12 15:12:14 hacking kernel: TSC deadline timer available
Jul 12 15:12:14 hacking kernel: CPU topo: Max. logical packages: 1
Jul 12 15:12:14 hacking kernel: CPU topo: Max. logical dies: 1
Jul 12 15:12:14 hacking kernel: CPU topo: Max. dies per package: 1
Jul 12 15:12:14 hacking kernel: CPU topo: Max. threads per core: 1
Jul 12 15:12:14 hacking kernel: CPU topo: Num. cores per package: 16
Jul 12 15:12:14 hacking kernel: CPU topo: Num. threads per package: 16
Jul 12 15:12:14 hacking kernel: CPU topo: Allowing 16 present CPUs plus 0 hotplug CPUs
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff]
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x000fffff]
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x58516000-0x585a6fff]
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5a526000-0x5a526fff]
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5df8b000-0x5e88afff]
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x606bf000-0x67ffefff]
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x68000000-0xffffffff]
Jul 12 15:12:14 hacking kernel: [mem 0x78800000-0xfe00ffff] available for PCI devices
Jul 12 15:12:14 hacking kernel: Booting paravirtualized kernel on bare hardware
Jul 12 15:12:14 hacking kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Jul 12 15:12:14 hacking kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1
Jul 12 15:12:14 hacking kernel: percpu: Embedded 62 pages/cpu s217088 r8192 d28672 u262144
Jul 12 15:12:14 hacking kernel: pcpu-alloc: s217088 r8192 d28672 u262144 alloc=1*2097152
Jul 12 15:12:14 hacking kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15
Jul 12 15:12:14 hacking kernel: Kernel command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2
Jul 12 15:12:14 hacking kernel: printk: log buffer data + meta data: 131072 + 458752 = 589824 bytes
Jul 12 15:12:14 hacking kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear)
Jul 12 15:12:14 hacking kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear)
Jul 12 15:12:14 hacking kernel: software IO TLB: area num 16.
Jul 12 15:12:14 hacking kernel: Fallback order for Node 0: 0
Jul 12 15:12:14 hacking kernel: Built 1 zonelists, mobility grouping on. Total pages: 8256862
Jul 12 15:12:14 hacking kernel: Policy zone: Normal
Jul 12 15:12:14 hacking kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off
Jul 12 15:12:14 hacking kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1
Jul 12 15:12:14 hacking kernel: ftrace: allocating 55582 entries in 220 pages
Jul 12 15:12:14 hacking kernel: ftrace: allocated 220 pages with 5 groups
Jul 12 15:12:14 hacking kernel: Dynamic Preempt: full
Jul 12 15:12:14 hacking kernel: rcu: Preemptible hierarchical RCU implementation.
Jul 12 15:12:14 hacking kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=16.
Jul 12 15:12:14 hacking kernel: rcu: RCU priority boosting: priority 1 delay 500 ms.
Jul 12 15:12:14 hacking kernel: Trampoline variant of Tasks RCU enabled.
Jul 12 15:12:14 hacking kernel: Rude variant of Tasks RCU enabled.
Jul 12 15:12:14 hacking kernel: Tracing variant of Tasks RCU enabled.
Jul 12 15:12:14 hacking kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Jul 12 15:12:14 hacking kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16
Jul 12 15:12:14 hacking kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16.
Jul 12 15:12:14 hacking kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16.
Jul 12 15:12:14 hacking kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16.
Jul 12 15:12:14 hacking kernel: NR_IRQS: 524544, nr_irqs: 2184, preallocated irqs: 16
Jul 12 15:12:14 hacking kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
Jul 12 15:12:14 hacking kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____)
Jul 12 15:12:14 hacking kernel: Console: colour dummy device 80x25
Jul 12 15:12:14 hacking kernel: printk: legacy console [tty0] enabled
Jul 12 15:12:14 hacking kernel: ACPI: Core revision 20240827
Jul 12 15:12:14 hacking kernel: hpet: HPET dysfunctional in PC10. Force disabled.
Jul 12 15:12:14 hacking kernel: APIC: Switch to symmetric I/O mode setup
Jul 12 15:12:14 hacking kernel: DMAR: Host address width 42
Jul 12 15:12:14 hacking kernel: DMAR: DRHD base: 0x000000fc800000 flags: 0x0
Jul 12 15:12:14 hacking kernel: DMAR: dmar0: reg_base_addr fc800000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0ef5e
Jul 12 15:12:14 hacking kernel: DMAR: DRHD base: 0x000000fc801000 flags: 0x1
Jul 12 15:12:14 hacking kernel: DMAR: dmar1: reg_base_addr fc801000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0efde
Jul 12 15:12:14 hacking kernel: DMAR: SATC flags: 0x1
Jul 12 15:12:14 hacking kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfc801000 IOMMU 1
Jul 12 15:12:14 hacking kernel: DMAR-IR: HPET id 0 under DRHD base 0xfc801000
Jul 12 15:12:14 hacking kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping.
Jul 12 15:12:14 hacking kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode
Jul 12 15:12:14 hacking kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns
Jul 12 15:12:14 hacking kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7372.80 BogoMIPS (lpj=3686400)
Jul 12 15:12:14 hacking kernel: CPU0: Thermal monitoring enabled (TM1)
Jul 12 15:12:14 hacking kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated
Jul 12 15:12:14 hacking kernel: CET detected: Indirect Branch Tracking enabled
Jul 12 15:12:14 hacking kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0
Jul 12 15:12:14 hacking kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0
Jul 12 15:12:14 hacking kernel: process: using mwait in idle threads
Jul 12 15:12:14 hacking kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Jul 12 15:12:14 hacking kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS
Jul 12 15:12:14 hacking kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Jul 12 15:12:14 hacking kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x800: 'Control-flow User registers'
Jul 12 15:12:14 hacking kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
Jul 12 15:12:14 hacking kernel: x86/fpu: xstate_offset[9]: 832, xstate_sizes[9]: 8
Jul 12 15:12:14 hacking kernel: x86/fpu: xstate_offset[11]: 840, xstate_sizes[11]: 16
Jul 12 15:12:14 hacking kernel: x86/fpu: Enabled xstate features 0xa07, context size is 856 bytes, using 'compacted' format.
Jul 12 15:12:14 hacking kernel: Freeing SMP alternatives memory: 52K
Jul 12 15:12:14 hacking kernel: pid_max: default: 32768 minimum: 301
Jul 12 15:12:14 hacking kernel: LSM: initializing lsm=capability,landlock,lockdown,yama,bpf
Jul 12 15:12:14 hacking kernel: landlock: Up and running.
Jul 12 15:12:14 hacking kernel: Yama: becoming mindful.
Jul 12 15:12:14 hacking kernel: LSM support for eBPF active
Jul 12 15:12:14 hacking kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Jul 12 15:12:14 hacking kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Jul 12 15:12:14 hacking kernel: smpboot: CPU0: Intel(R) Core(TM) Ultra 7 255H (family: 0x6, model: 0xc5, stepping: 0x2)
Jul 12 15:12:14 hacking kernel: Performance Events: XSAVE Architectural LBR, PEBS fmt5+-baseline, AnyThread deprecated, ArrowLake-H Hybrid events, 32-deep LBR, full-width counters, Intel PMU driver.
Jul 12 15:12:14 hacking kernel: core: cpu_core PMU driver:
Jul 12 15:12:14 hacking kernel: ... version: 5
Jul 12 15:12:14 hacking kernel: ... bit width: 48
Jul 12 15:12:14 hacking kernel: ... generic registers: 10
Jul 12 15:12:14 hacking kernel: ... value mask: 0000ffffffffffff
Jul 12 15:12:14 hacking kernel: ... max period: 00007fffffffffff
Jul 12 15:12:14 hacking kernel: ... fixed-purpose events: 4
Jul 12 15:12:14 hacking kernel: ... event mask: 0001000f000003ff
Jul 12 15:12:14 hacking kernel: signal: max sigframe size: 3632
Jul 12 15:12:14 hacking kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1411
Jul 12 15:12:14 hacking kernel: rcu: Hierarchical SRCU implementation.
Jul 12 15:12:14 hacking kernel: rcu: Max phase no-delay instances is 400.
Jul 12 15:12:14 hacking kernel: Timer migration: 2 hierarchy levels; 8 children per group; 2 crossnode level
Jul 12 15:12:14 hacking kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter.
Jul 12 15:12:14 hacking kernel: smp: Bringing up secondary CPUs ...
Jul 12 15:12:14 hacking kernel: smpboot: x86: Booting SMP configuration:
Jul 12 15:12:14 hacking kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15
Jul 12 15:12:14 hacking kernel: core: cpu_atom PMU driver:
Jul 12 15:12:14 hacking kernel: ... version: 5
Jul 12 15:12:14 hacking kernel: ... bit width: 48
Jul 12 15:12:14 hacking kernel: ... generic registers: 8
Jul 12 15:12:14 hacking kernel: ... value mask: 0000ffffffffffff
Jul 12 15:12:14 hacking kernel: ... max period: 00007fffffffffff
Jul 12 15:12:14 hacking kernel: ... fixed-purpose events: 6
Jul 12 15:12:14 hacking kernel: ... event mask: 00000077000000ff
Jul 12 15:12:14 hacking kernel: core: cpu_lowpower PMU driver:
Jul 12 15:12:14 hacking kernel: ... version: 5
Jul 12 15:12:14 hacking kernel: ... bit width: 48
Jul 12 15:12:14 hacking kernel: ... generic registers: 8
Jul 12 15:12:14 hacking kernel: ... value mask: 0000ffffffffffff
Jul 12 15:12:14 hacking kernel: ... max period: 00007fffffffffff
Jul 12 15:12:14 hacking kernel: ... fixed-purpose events: 3
Jul 12 15:12:14 hacking kernel: ... event mask: 00000007000000ff
Jul 12 15:12:14 hacking kernel: smp: Brought up 1 node, 16 CPUs
Jul 12 15:12:14 hacking kernel: smpboot: Total of 16 processors activated (117964.80 BogoMIPS)
Jul 12 15:12:14 hacking kernel: Memory: 32269760K/33027448K available (19692K kernel code, 2940K rwdata, 16528K rodata, 4640K init, 5028K bss, 729692K reserved, 0K cma-reserved)
Jul 12 15:12:14 hacking kernel: devtmpfs: initialized
Jul 12 15:12:14 hacking kernel: x86/mm: Memory block size: 128MB
Jul 12 15:12:14 hacking kernel: ACPI: PM: Registering ACPI NVS region [mem 0x626bf000-0x67ebefff] (92274688 bytes)
Jul 12 15:12:14 hacking kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Jul 12 15:12:14 hacking kernel: posixtimers hash table entries: 8192 (order: 5, 131072 bytes, linear)
Jul 12 15:12:14 hacking kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear)
Jul 12 15:12:14 hacking kernel: pinctrl core: initialized pinctrl subsystem
Jul 12 15:12:14 hacking kernel: PM: RTC time: 22:12:09, date: 2025-07-12
Jul 12 15:12:14 hacking kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Jul 12 15:12:14 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations
Jul 12 15:12:14 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Jul 12 15:12:14 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Jul 12 15:12:14 hacking kernel: audit: initializing netlink subsys (disabled)
Jul 12 15:12:14 hacking kernel: audit: type=2000 audit(1752358329.013:1): state=initialized audit_enabled=0 res=1
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'fair_share'
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'bang_bang'
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'step_wise'
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'user_space'
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'power_allocator'
Jul 12 15:12:14 hacking kernel: cpuidle: using governor ladder
Jul 12 15:12:14 hacking kernel: cpuidle: using governor menu
Jul 12 15:12:14 hacking kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Jul 12 15:12:14 hacking kernel: PCI: ECAM [mem 0xc0000000-0xcfffffff] (base 0xc0000000) for domain 0000 [bus 00-ff]
Jul 12 15:12:14 hacking kernel: PCI: Using configuration type 1 for base access
Jul 12 15:12:14 hacking kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Jul 12 15:12:14 hacking kernel: HugeTLB: allocation took 0ms with hugepage_allocation_threads=4
Jul 12 15:12:14 hacking kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages
Jul 12 15:12:14 hacking kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page
Jul 12 15:12:14 hacking kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages
Jul 12 15:12:14 hacking kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page
Jul 12 15:12:14 hacking kernel: raid6: skipped pq benchmark and selected avx2x4
Jul 12 15:12:14 hacking kernel: raid6: using avx2x2 recovery algorithm
Jul 12 15:12:14 hacking kernel: ACPI: Added _OSI(Module Device)
Jul 12 15:12:14 hacking kernel: ACPI: Added _OSI(Processor Device)
Jul 12 15:12:14 hacking kernel: ACPI: Added _OSI(Processor Aggregator Device)
Jul 12 15:12:14 hacking kernel: ACPI: 21 ACPI AML tables successfully acquired and loaded
Jul 12 15:12:14 hacking kernel: ACPI: EC: EC started
Jul 12 15:12:14 hacking kernel: ACPI: EC: interrupt blocked
Jul 12 15:12:14 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 12 15:12:14 hacking kernel: ACPI: EC: Boot ECDT EC used to handle transactions
Jul 12 15:12:14 hacking kernel: ACPI: USB4 _OSC: OS supports USB3+ DisplayPort+ PCIe+ XDomain+
Jul 12 15:12:14 hacking kernel: ACPI: USB4 _OSC: OS controls USB3+ DisplayPort+ PCIe+ XDomain+
Jul 12 15:12:14 hacking kernel: ACPI: Interpreter enabled
Jul 12 15:12:14 hacking kernel: ACPI: PM: (supports S0 S4 S5)
Jul 12 15:12:14 hacking kernel: ACPI: Using IOAPIC for interrupt routing
Jul 12 15:12:14 hacking kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Jul 12 15:12:14 hacking kernel: PCI: Ignoring E820 reservations for host bridge windows
Jul 12 15:12:14 hacking kernel: ACPI: Enabled 9 GPEs in block 00 to 7F
Jul 12 15:12:14 hacking kernel: ACPI: Enabled 8 GPEs in block 80 to DF
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.BTRT: New power resource
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.DBTR: New power resource
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.RP08.PXSX.WRST: New power resource
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.TBT0: New power resource
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.TBT1: New power resource
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.D3C_: New power resource
Jul 12 15:12:14 hacking kernel: ACPI: \PIN_: New power resource
Jul 12 15:12:14 hacking kernel: ACPI: PCI Root Bridge [PC00] (domain 0000 [bus 00-fe])
Jul 12 15:12:14 hacking kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3]
Jul 12 15:12:14 hacking kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC]
Jul 12 15:12:14 hacking kernel: PCI host bridge to bus 0000:00
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xbfffffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x4000000000-0x3ffbfffffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [bus 00-fe]
Jul 12 15:12:14 hacking kernel: pci 0000:00:00.0: [8086:7d06] type 00 class 0x060000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: [8086:7dd1] type 00 class 0x030000 PCIe Root Complex Integrated Endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: BAR 0 [mem 0x4818000000-0x4818ffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: BAR 2 [mem 0x4000000000-0x400fffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: DMAR: Skip IOMMU disabling for graphics
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: PME# supported from D0 D3hot
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x00ffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x06ffffff 64bit pref]: contains BAR 0 for 7 VFs
Jul 12 15:12:14 hacking kernel: pci 0000:00:04.0: [8086:7d03] type 00 class 0x118000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:04.0: BAR 0 [mem 0x4819280000-0x481929ffff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: [8086:7ecb] type 01 class 0x060400 PCIe Root Port
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01]
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PME# supported from D0 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PTM enabled (root), 4ns granularity
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: [8086:7ec4] type 01 class 0x060400 PCIe Root Port
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b]
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PME# supported from D0 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PTM enabled (root), 4ns granularity
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: [8086:774c] type 00 class 0x088000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: BAR 0 [mem 0x48192bf000-0x48192bffff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: [8086:7d0d] type 00 class 0x118000 PCIe Root Complex Integrated Endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: BAR 0 [mem 0x4819240000-0x481927ffff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: enabling Extended Tags
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: [8086:7d1d] type 00 class 0x120000 PCIe Root Complex Integrated Endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: BAR 0 [mem 0x4810000000-0x4817ffffff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: BAR 4 [mem 0x48192be000-0x48192befff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: [8086:7ec0] type 00 class 0x0c0330 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: BAR 0 [mem 0x48192a0000-0x48192affff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: PME# supported from D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: [8086:7ec2] type 00 class 0x0c0340 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: BAR 0 [mem 0x4819200000-0x481923ffff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: BAR 2 [mem 0x48192bd000-0x48192bdfff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: supports D1 D2
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: PME# supported from D0 D1 D2 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: [8086:777d] type 00 class 0x0c0330 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: BAR 0 [mem 0x86320000-0x8632ffff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: [8086:777f] type 00 class 0x050000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: BAR 0 [mem 0x48192b4000-0x48192b7fff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: BAR 2 [mem 0x48192bc000-0x48192bcfff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: [8086:7778] type 00 class 0x0c8000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x00000000-0x00000fff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: [8086:7779] type 00 class 0x0c8000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x00000000-0x00000fff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: [8086:7770] type 00 class 0x078000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: BAR 0 [mem 0x48192b9000-0x48192b9fff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: PME# supported from D3hot
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: [8086:773d] type 01 class 0x060400 PCIe Root Port
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PTM enabled (root), 4ns granularity
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: [8086:773f] type 01 class 0x060400 PCIe Root Port
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PTM enabled (root), 4ns granularity
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.0: [8086:7702] type 00 class 0x060100 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: [8086:7728] type 00 class 0x040380 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: BAR 0 [mem 0x48192b0000-0x48192b3fff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: BAR 4 [mem 0x4819000000-0x48191fffff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: [8086:7722] type 00 class 0x0c0500 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: BAR 0 [mem 0x48192b8000-0x48192b80ff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: BAR 4 [io 0xefa0-0xefbf]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: [8086:7723] type 00 class 0x0c8000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: [8086:550a] type 00 class 0x020000 conventional PCI endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: BAR 0 [mem 0x86300000-0x8631ffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: PME# supported from D0 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:01:00.0: [144d:a80d] type 00 class 0x010802 PCIe Endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:01:00.0: BAR 0 [mem 0x86200000-0x86203fff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Upstream Port
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 00]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x0000-0x0fff]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: enabling Extended Tags
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: supports D1 D2
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PTM enabled, 4ns granularity
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 00]
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge window [io 0x0000-0x0fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: enabling Extended Tags
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: supports D1 D2
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 00]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x0000-0x0fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: enabling Extended Tags
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: supports D1 D2
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 00]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x0000-0x0fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: enabling Extended Tags
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: supports D1 D2
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 00]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x0000-0x0fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: enabling Extended Tags
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: supports D1 D2
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 00]
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge window [io 0x0000-0x0fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: enabling Extended Tags
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: supports D1 D2
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b]
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04-2b]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:04: busn_res: [bus 04-2b] end is updated to 04
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-2b]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-2b] end is updated to 11
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-2b]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-2b] end is updated to 1e
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2b]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2b] end is updated to 2a
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] end is updated to 2b
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] end is updated to 2b
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: [1217:8621] type 00 class 0x080501 PCIe Endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: BAR 0 [mem 0x86101000-0x86101fff]
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: BAR 1 [mem 0x86100000-0x861007ff]
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: PME# supported from D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c]
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: [8086:272b] type 00 class 0x028000 PCIe Endpoint
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: BAR 0 [mem 0x86000000-0x86003fff 64bit]
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: PME# supported from D0 D3hot D3cold
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d]
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PEPD: Duplicate LPS0 _DSM functions (mask: 0x1)
Jul 12 15:12:14 hacking kernel: Low-power S0 idle used by default for system suspend
Jul 12 15:12:14 hacking kernel: ACPI: EC: interrupt unblocked
Jul 12 15:12:14 hacking kernel: ACPI: EC: event unblocked
Jul 12 15:12:14 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 12 15:12:14 hacking kernel: ACPI: EC: GPE=0x6e
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: Boot ECDT EC initialization complete
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: EC: Used to handle transactions and events
Jul 12 15:12:14 hacking kernel: iommu: Default domain type: Translated
Jul 12 15:12:14 hacking kernel: iommu: DMA domain TLB invalidation policy: lazy mode
Jul 12 15:12:14 hacking kernel: SCSI subsystem initialized
Jul 12 15:12:14 hacking kernel: libata version 3.00 loaded.
Jul 12 15:12:14 hacking kernel: ACPI: bus type USB registered
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver usbfs
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver hub
Jul 12 15:12:14 hacking kernel: usbcore: registered new device driver usb
Jul 12 15:12:14 hacking kernel: EDAC MC: Ver: 3.0.0
Jul 12 15:12:14 hacking kernel: efivars: Registered efivars operations
Jul 12 15:12:14 hacking kernel: NetLabel: Initializing
Jul 12 15:12:14 hacking kernel: NetLabel: domain hash size = 128
Jul 12 15:12:14 hacking kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
Jul 12 15:12:14 hacking kernel: NetLabel: unlabeled traffic allowed by default
Jul 12 15:12:14 hacking kernel: mctp: management component transport protocol core
Jul 12 15:12:14 hacking kernel: NET: Registered PF_MCTP protocol family
Jul 12 15:12:14 hacking kernel: PCI: Using ACPI for IRQ routing
Jul 12 15:12:14 hacking kernel: PCI: pci_cache_line_size set to 64 bytes
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff]: can't claim; no compatible bridge window
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x0009f000-0x0009ffff]
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x58516000-0x5bffffff]
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x5a526000-0x5bffffff]
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x5df8b000-0x5fffffff]
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x606bf000-0x63ffffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: vgaarb: bridge control possible
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Jul 12 15:12:14 hacking kernel: vgaarb: loaded
Jul 12 15:12:14 hacking kernel: clocksource: Switched to clocksource tsc-early
Jul 12 15:12:14 hacking kernel: VFS: Disk quotas dquot_6.6.0
Jul 12 15:12:14 hacking kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jul 12 15:12:14 hacking kernel: pnp: PnP ACPI init
Jul 12 15:12:14 hacking kernel: system 00:00: [io 0x3322-0x3323] has been reserved
Jul 12 15:12:14 hacking kernel: system 00:01: [io 0x1854-0x1857] has been reserved
Jul 12 15:12:14 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfedc0000-0xfedc7fff] has been reserved
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xc0000000-0xcfffffff] has been reserved
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfed20000-0xfed7ffff] could not be reserved
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfc800000-0xfc81ffff] could not be reserved
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfed45000-0xfed8ffff] could not be reserved
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfee00000-0xfeefffff] has been reserved
Jul 12 15:12:14 hacking kernel: system 00:04: [io 0x2000-0x20fe] has been reserved
Jul 12 15:12:14 hacking kernel: pnp: PnP ACPI: found 6 devices
Jul 12 15:12:14 hacking kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Jul 12 15:12:14 hacking kernel: NET: Registered PF_INET protocol family
Jul 12 15:12:14 hacking kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jul 12 15:12:14 hacking kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear)
Jul 12 15:12:14 hacking kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Jul 12 15:12:14 hacking kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jul 12 15:12:14 hacking kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear)
Jul 12 15:12:14 hacking kernel: TCP: Hash tables configured (established 262144 bind 65536)
Jul 12 15:12:14 hacking kernel: MPTCP token hash table entries: 32768 (order: 7, 786432 bytes, linear)
Jul 12 15:12:14 hacking kernel: UDP hash table entries: 16384 (order: 8, 1048576 bytes, linear)
Jul 12 15:12:14 hacking kernel: UDP-Lite hash table entries: 16384 (order: 8, 1048576 bytes, linear)
Jul 12 15:12:14 hacking kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Jul 12 15:12:14 hacking kernel: NET: Registered PF_XDP protocol family
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x1000-0x0fff] to [bus 05-11] add_size 1000
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 05-11] add_size 200000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 05-11] add_size 200000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x1000-0x0fff] to [bus 12-1e] add_size 1000
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 12-1e] add_size 200000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 12-1e] add_size 200000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x1000-0x0fff] to [bus 1f-2a] add_size 1000
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 1f-2a] add_size 200000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 1f-2a] add_size 200000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x1000-0x0fff] to [bus 03-2b] add_size 3000
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff 64bit pref] to [bus 03-2b] add_size 600000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff] to [bus 03-2b] add_size 600000 add_align 100000
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 02-2b] add_size 4000
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x481a000000-0x4820ffffff 64bit pref]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x48192ba000-0x48192bafff 64bit]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x48192bb000-0x48192bbfff 64bit]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0x86330000-0x86330fff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01]
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff]: assigned
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-11]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-1e]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2a]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b]
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d]
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xbfffffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 8 [mem 0x4000000000-0x3ffbfffffff window]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:01: resource 1 [mem 0x86200000-0x862fffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:02: resource 0 [io 0x4000-0x7fff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:02: resource 1 [mem 0x80000000-0x85ffffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:02: resource 2 [mem 0x4010000000-0x480fffffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x6fff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: resource 1 [mem 0x80000000-0x808fffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: resource 2 [mem 0x4010000000-0x40108fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: resource 1 [mem 0x80000000-0x801fffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: resource 2 [mem 0x4010000000-0x40101fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: resource 0 [io 0x5000-0x5fff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: resource 1 [mem 0x80200000-0x803fffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: resource 2 [mem 0x4010200000-0x40103fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: resource 0 [io 0x6000-0x6fff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: resource 1 [mem 0x80400000-0x805fffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: resource 2 [mem 0x4010400000-0x40105fffff 64bit pref]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2c: resource 1 [mem 0x86100000-0x861fffff]
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2d: resource 1 [mem 0x86000000-0x860fffff]
Jul 12 15:12:14 hacking kernel: PCI: CLS 64 bytes, default 64
Jul 12 15:12:14 hacking kernel: DMAR: Intel-IOMMU force enabled due to platform opt in
Jul 12 15:12:14 hacking kernel: DMAR: No RMRR found
Jul 12 15:12:14 hacking kernel: DMAR: No ATSR found
Jul 12 15:12:14 hacking kernel: DMAR: dmar0: Using Queued invalidation
Jul 12 15:12:14 hacking kernel: DMAR: dmar1: Using Queued invalidation
Jul 12 15:12:14 hacking kernel: Trying to unpack rootfs image as initramfs...
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: Adding to iommu group 0
Jul 12 15:12:14 hacking kernel: pci 0000:00:00.0: Adding to iommu group 1
Jul 12 15:12:14 hacking kernel: pci 0000:00:04.0: Adding to iommu group 2
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: Adding to iommu group 3
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: Adding to iommu group 4
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: Adding to iommu group 5
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: Adding to iommu group 6
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: Adding to iommu group 7
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: Adding to iommu group 8
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: Adding to iommu group 8
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: Adding to iommu group 9
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: Adding to iommu group 9
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: Adding to iommu group 10
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: Adding to iommu group 10
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: Adding to iommu group 11
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: Adding to iommu group 12
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: Adding to iommu group 13
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.0: Adding to iommu group 14
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: Adding to iommu group 14
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: Adding to iommu group 14
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: Adding to iommu group 14
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: Adding to iommu group 14
Jul 12 15:12:14 hacking kernel: pci 0000:01:00.0: Adding to iommu group 15
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: Adding to iommu group 16
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: Adding to iommu group 17
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: Adding to iommu group 18
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: Adding to iommu group 19
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: Adding to iommu group 20
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: Adding to iommu group 21
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: Adding to iommu group 22
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: Adding to iommu group 23
Jul 12 15:12:14 hacking kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O
Jul 12 15:12:14 hacking kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Jul 12 15:12:14 hacking kernel: software IO TLB: mapped [mem 0x000000004ea4a000-0x0000000052a4a000] (64MB)
Jul 12 15:12:14 hacking kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns
Jul 12 15:12:14 hacking kernel: clocksource: Switched to clocksource tsc
Jul 12 15:12:14 hacking kernel: platform rtc_cmos: registered platform RTC device (no PNP device found)
Jul 12 15:12:14 hacking kernel: Initialise system trusted keyrings
Jul 12 15:12:14 hacking kernel: Key type blacklist registered
Jul 12 15:12:14 hacking kernel: workingset: timestamp_bits=36 max_order=23 bucket_order=0
Jul 12 15:12:14 hacking kernel: fuse: init (API version 7.43)
Jul 12 15:12:14 hacking kernel: integrity: Platform Keyring initialized
Jul 12 15:12:14 hacking kernel: integrity: Machine keyring initialized
Jul 12 15:12:14 hacking kernel: xor: automatically using best checksumming function avx
Jul 12 15:12:14 hacking kernel: Key type asymmetric registered
Jul 12 15:12:14 hacking kernel: Asymmetric key parser 'x509' registered
Jul 12 15:12:14 hacking kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246)
Jul 12 15:12:14 hacking kernel: io scheduler mq-deadline registered
Jul 12 15:12:14 hacking kernel: io scheduler kyber registered
Jul 12 15:12:14 hacking kernel: io scheduler bfq registered
Jul 12 15:12:14 hacking kernel: ledtrig-cpu: registered to indicate activity on CPUs
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:06.0: PME: Signaling with IRQ 122
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:06.0: AER: enabled with IRQ 122
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: PME: Signaling with IRQ 123
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: AER: enabled with IRQ 123
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 124
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 124
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.7: PME: Signaling with IRQ 125
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.7: AER: enabled with IRQ 125
Jul 12 15:12:14 hacking kernel: pcieport 0000:02:00.0: enabling device (0000 -> 0003)
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:01.0: enabling device (0000 -> 0003)
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:01.0: pciehp: Slot #1 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:02.0: enabling device (0000 -> 0003)
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:02.0: pciehp: Slot #2 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:03.0: enabling device (0000 -> 0003)
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:03.0: pciehp: Slot #3 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 12 15:12:14 hacking kernel: Monitor-Mwait will be used to enter C-1 state
Jul 12 15:12:14 hacking kernel: Monitor-Mwait will be used to enter C-2 state
Jul 12 15:12:14 hacking kernel: Monitor-Mwait will be used to enter C-3 state
Jul 12 15:12:14 hacking kernel: intel_idle: max_cstate 2 reached
Jul 12 15:12:14 hacking kernel: ACPI: AC: AC Adapter [AC] (on-line)
Jul 12 15:12:14 hacking kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0
Jul 12 15:12:14 hacking kernel: ACPI: button: Power Button [PWRB]
Jul 12 15:12:14 hacking kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1
Jul 12 15:12:14 hacking kernel: ACPI: button: Sleep Button [SLPB]
Jul 12 15:12:14 hacking kernel: input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0D:00/input/input2
Jul 12 15:12:14 hacking kernel: ACPI: button: Lid Switch [LID0]
Jul 12 15:12:14 hacking kernel: Freeing initrd memory: 30836K
Jul 12 15:12:14 hacking kernel: thermal LNXTHERM:00: registered as thermal_zone0
Jul 12 15:12:14 hacking kernel: ACPI: thermal: Thermal Zone [TZ0] (25 C)
Jul 12 15:12:14 hacking kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled
Jul 12 15:12:14 hacking kernel: ACPI: battery: Slot [BAT0] (battery present)
Jul 12 15:12:14 hacking kernel: hpet_acpi_add: no address or irqs in _CRS
Jul 12 15:12:14 hacking kernel: Non-volatile memory driver v1.3
Jul 12 15:12:14 hacking kernel: Linux agpgart interface v0.103
Jul 12 15:12:14 hacking kernel: tpm_tis IFX1523:00: 2.0 TPM (device-id 0x1D, rev-id 54)
Jul 12 15:12:14 hacking kernel: ACPI: bus type drm_connector registered
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 1
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 2
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: Host supports USB 3.2 Enhanced SuperSpeed
Jul 12 15:12:14 hacking kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15
Jul 12 15:12:14 hacking kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 12 15:12:14 hacking kernel: usb usb1: Product: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: usb usb1: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 12 15:12:14 hacking kernel: usb usb1: SerialNumber: 0000:00:0d.0
Jul 12 15:12:14 hacking kernel: hub 1-0:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 1-0:1.0: 1 port detected
Jul 12 15:12:14 hacking kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15
Jul 12 15:12:14 hacking kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 12 15:12:14 hacking kernel: usb usb2: Product: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: usb usb2: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 12 15:12:14 hacking kernel: usb usb2: SerialNumber: 0000:00:0d.0
Jul 12 15:12:14 hacking kernel: hub 2-0:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 2-0:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 3
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.2 Enhanced SuperSpeed
Jul 12 15:12:14 hacking kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15
Jul 12 15:12:14 hacking kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 12 15:12:14 hacking kernel: usb usb3: Product: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: usb usb3: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 12 15:12:14 hacking kernel: usb usb3: SerialNumber: 0000:00:14.0
Jul 12 15:12:14 hacking kernel: hub 3-0:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 3-0:1.0: 12 ports detected
Jul 12 15:12:14 hacking kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15
Jul 12 15:12:14 hacking kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 12 15:12:14 hacking kernel: usb usb4: Product: xHCI Host Controller
Jul 12 15:12:14 hacking kernel: usb usb4: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 12 15:12:14 hacking kernel: usb usb4: SerialNumber: 0000:00:14.0
Jul 12 15:12:14 hacking kernel: hub 4-0:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 4-0:1.0: 2 ports detected
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver usbserial_generic
Jul 12 15:12:14 hacking kernel: usbserial: USB Serial support registered for generic
Jul 12 15:12:14 hacking kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K] at 0x60,0x64 irq 1
Jul 12 15:12:14 hacking kernel: i8042: PNP: PS/2 appears to have AUX port disabled, if this is incorrect please boot with i8042.nopnp
Jul 12 15:12:14 hacking kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: RTC can wake from S4
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: registered as rtc0
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: setting system clock to 2025-07-12T22:12:10 UTC (1752358330)
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram
Jul 12 15:12:14 hacking kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input3
Jul 12 15:12:14 hacking kernel: intel_pstate: Intel P-state driver initializing
Jul 12 15:12:14 hacking kernel: Hybrid CPU capacity scaling enabled
Jul 12 15:12:14 hacking kernel: intel_pstate: HWP enabled
Jul 12 15:12:14 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] Registered 1 planes with drm panic
Jul 12 15:12:14 hacking kernel: [drm] Initialized simpledrm 1.0.0 for simple-framebuffer.0 on minor 0
Jul 12 15:12:14 hacking kernel: fbcon: Deferring console take-over
Jul 12 15:12:14 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] fb0: simpledrmdrmfb frame buffer device
Jul 12 15:12:14 hacking kernel: hid: raw HID events driver (C) Jiri Kosina
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver usbhid
Jul 12 15:12:14 hacking kernel: usbhid: USB HID core driver
Jul 12 15:12:14 hacking kernel: drop_monitor: Initializing network drop monitor service
Jul 12 15:12:14 hacking kernel: NET: Registered PF_INET6 protocol family
Jul 12 15:12:14 hacking kernel: Segment Routing with IPv6
Jul 12 15:12:14 hacking kernel: RPL Segment Routing with IPv6
Jul 12 15:12:14 hacking kernel: In-situ OAM (IOAM) with IPv6
Jul 12 15:12:14 hacking kernel: NET: Registered PF_PACKET protocol family
Jul 12 15:12:14 hacking kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance'
Jul 12 15:12:14 hacking kernel: microcode: Current revision: 0x00000118
Jul 12 15:12:14 hacking kernel: microcode: Updated early from: 0x00000115
Jul 12 15:12:14 hacking kernel: IPI shorthand broadcast: enabled
Jul 12 15:12:14 hacking kernel: sched_clock: Marking stable (687001240, 6090692)->(725859963, -32768031)
Jul 12 15:12:14 hacking kernel: registered taskstats version 1
Jul 12 15:12:14 hacking kernel: Loading compiled-in X.509 certificates
Jul 12 15:12:14 hacking kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c92675c24f6b4bd17516ae0e98b61f2812601d04'
Jul 12 15:12:14 hacking kernel: zswap: loaded using pool zstd/zsmalloc
Jul 12 15:12:14 hacking kernel: Demotion targets for Node 0: null
Jul 12 15:12:14 hacking kernel: Key type .fscrypt registered
Jul 12 15:12:14 hacking kernel: Key type fscrypt-provisioning registered
Jul 12 15:12:14 hacking kernel: Btrfs loaded, zoned=yes, fsverity=yes
Jul 12 15:12:14 hacking kernel: Key type big_key registered
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53'
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation: Windows UEFI CA 2023: aefc5fbbbe055d8f8daa585473499417ab5a5272'
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4'
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft UEFI CA 2023: 81aa6b3244c935bce0d6628af39827421e32497d'
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Secure Certificate: 01dcc89619884ca147983429f8a4a1a0'
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Cus CA: d6136d376b87ef934511c12ce2c3880c'
Jul 12 15:12:14 hacking kernel: PM: Magic number: 1:411:249
Jul 12 15:12:14 hacking kernel: acpi device:5f: hash matches
Jul 12 15:12:14 hacking kernel: memory memory123: hash matches
Jul 12 15:12:14 hacking kernel: RAS: Correctable Errors collector initialized.
Jul 12 15:12:14 hacking kernel: clk: Disabling unused clocks
Jul 12 15:12:14 hacking kernel: PM: genpd: Disabling unused power domains
Jul 12 15:12:14 hacking kernel: Freeing unused decrypted memory: 2028K
Jul 12 15:12:14 hacking kernel: Freeing unused kernel image (initmem) memory: 4640K
Jul 12 15:12:14 hacking kernel: Write protecting the kernel read-only data: 38912k
Jul 12 15:12:14 hacking kernel: Freeing unused kernel image (text/rodata gap) memory: 784K
Jul 12 15:12:14 hacking kernel: Freeing unused kernel image (rodata/data gap) memory: 1904K
Jul 12 15:12:14 hacking kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found.
Jul 12 15:12:14 hacking kernel: rodata_test: all tests were successful
Jul 12 15:12:14 hacking kernel: Run /init as init process
Jul 12 15:12:14 hacking kernel: with arguments:
Jul 12 15:12:14 hacking kernel: /init
Jul 12 15:12:14 hacking kernel: with environment:
Jul 12 15:12:14 hacking kernel: HOME=/
Jul 12 15:12:14 hacking kernel: TERM=linux
Jul 12 15:12:14 hacking kernel: fbcon: Taking over console
Jul 12 15:12:14 hacking kernel: Console: switching to colour frame buffer device 240x67
Jul 12 15:12:14 hacking kernel: usb 3-6: new high-speed USB device number 2 using xhci_hcd
Jul 12 15:12:14 hacking kernel: Key type psk registered
Jul 12 15:12:14 hacking kernel: sdhci: Secure Digital Host Controller Interface driver
Jul 12 15:12:14 hacking kernel: sdhci: Copyright(c) Pierre Ossman
Jul 12 15:12:14 hacking kernel: nvme 0000:01:00.0: platform quirk: setting simple suspend
Jul 12 15:12:14 hacking kernel: nvme nvme0: pci function 0000:01:00.0
Jul 12 15:12:14 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 2 using xhci_hcd
Jul 12 15:12:14 hacking kernel: nvme nvme0: D3 entry latency set to 10 seconds
Jul 12 15:12:14 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34
Jul 12 15:12:14 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 2-1: Product: USB3.0 Hub
Jul 12 15:12:14 hacking kernel: usb 2-1: Manufacturer: Intel Corporation.
Jul 12 15:12:14 hacking kernel: hub 2-1:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 2-1:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: nvme nvme0: allocated 64 MiB host memory buffer (16 segments).
Jul 12 15:12:14 hacking kernel: nvme nvme0: 16/0/0 default/read/poll queues
Jul 12 15:12:14 hacking kernel: nvme0n1: p1 p2 p3
Jul 12 15:12:14 hacking kernel: sdhci-pci 0000:2c:00.0: SDHCI controller found [1217:8621] (rev 1)
Jul 12 15:12:14 hacking kernel: sdhci-pci 0000:2c:00.0: enabling device (0000 -> 0002)
Jul 12 15:12:14 hacking kernel: mmc0: SDHCI controller on PCI [0000:2c:00.0] using ADMA
Jul 12 15:12:14 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01
Jul 12 15:12:14 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6: Product: USB2.0 Hub
Jul 12 15:12:14 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc.
Jul 12 15:12:14 hacking kernel: hub 3-6:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 3-6:1.0: 6 ports detected
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Found meteorlake (device ID 7dd1) integrated display version 14.00 stepping D0
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access
Jul 12 15:12:14 hacking kernel: usb 3-7: new high-speed USB device number 3 using xhci_hcd
Jul 12 15:12:14 hacking kernel: Console: switching to colour dummy device 80x25
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: vgaarb: deactivate vga console
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Using Transparent Hugepages
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/mtl_dmc.bin (v2.23)
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GuC firmware i915/mtl_guc_70.bin version 70.44.1
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: submission enabled
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: RC enabled
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GuC firmware i915/mtl_guc_70.bin version 70.44.1
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC firmware i915/mtl_huc_gsc.bin version 8.5.4
Jul 12 15:12:14 hacking kernel: usb 3-7: New USB device found, idVendor=04f2, idProduct=b729, bcdDevice=27.39
Jul 12 15:12:14 hacking kernel: usb 3-7: New USB device strings: Mfr=3, Product=1, SerialNumber=2
Jul 12 15:12:14 hacking kernel: usb 3-7: Product: Chicony USB2.0 Camera
Jul 12 15:12:14 hacking kernel: usb 3-7: Manufacturer: CHICONY
Jul 12 15:12:14 hacking kernel: usb 3-7: SerialNumber: 200901010001
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for clear media
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: submission enabled
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: SLPC enabled
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: RC enabled
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Protected Xe Path (PXP) protected content support initialized
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] *ERROR* [CRTC:82:pipe A] DSB 0 poll error
Jul 12 15:12:14 hacking kernel: [drm] Initialized i915 1.6.0 for 0000:00:02.0 on minor 1
Jul 12 15:12:14 hacking kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no)
Jul 12 15:12:14 hacking kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input4
Jul 12 15:12:14 hacking kernel: usb 3-10: new full-speed USB device number 4 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 3 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91
Jul 12 15:12:14 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 2-1.4: Product: USB3.2 Hub
Jul 12 15:12:14 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic
Jul 12 15:12:14 hacking kernel: hub 2-1.4:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 2-1.4:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: Loaded GSC firmware i915/mtl_gsc_1.bin (cv1.0, r102.1.15.1926, svn 1)
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for all workloads
Jul 12 15:12:14 hacking kernel: usb 3-10: New USB device found, idVendor=8087, idProduct=0036, bcdDevice= 0.00
Jul 12 15:12:14 hacking kernel: usb 3-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.2: new full-speed USB device number 5 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46
Jul 12 15:12:14 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 12 15:12:14 hacking kernel: usb 3-6.2: Product: S34C65T
Jul 12 15:12:14 hacking kernel: usb 3-6.2: Manufacturer: Samsung
Jul 12 15:12:14 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 4 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Manufacturer: Generic
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: usb 3-6.4: new high-speed USB device number 6 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 5 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Product: USB2.1 Hub
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: new high-speed USB device number 7 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Manufacturer: Generic
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: fbcon: i915drmfb (fb0) is primary device
Jul 12 15:12:14 hacking kernel: Console: switching to colour frame buffer device 240x75
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 8 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals
Jul 12 15:12:14 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0001/input/input5
Jul 12 15:12:14 hacking kernel: hid-generic 0003:1A7C:0191.0001: input,hidraw0: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 9 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0002/input/input6
Jul 12 15:12:14 hacking kernel: hid-generic 0003:2EFD:2130.0002: input,hidraw1: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (0080) error -71
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71
Jul 12 15:12:14 hacking kernel: usbhid 3-6.4.1.4:1.1: can't add hid device: -71
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71
Jul 12 15:12:14 hacking kernel: usbhid 3-6.4.1.4:1.1: probe with driver usbhid failed with error -71
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: USB disconnect, device number 4
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: USB disconnect, device number 5
Jul 12 15:12:14 hacking kernel: usb 3-6.4: USB disconnect, device number 6
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: USB disconnect, device number 7
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: USB disconnect, device number 8
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: USB disconnect, device number 9
Jul 12 15:12:14 hacking kernel: usb 2-1.4: reset SuperSpeed USB device number 3 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 3-6.4: new high-speed USB device number 10 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Product: USB2.1 Hub
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] fb0: i915drmfb frame buffer device
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 6 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Manufacturer: Generic
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: new high-speed USB device number 11 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 7 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Manufacturer: Generic
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: USB hub found
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected
Jul 12 15:12:14 hacking kernel: EXT4-fs (nvme0n1p3): mounted filesystem 2403f944-7fdf-4185-8119-4f6fd8f7f887 r/w with ordered data mode. Quota mode: none.
Jul 12 15:12:14 hacking systemd[1]: systemd 257.7-1-arch running in system mode (+PAM +AUDIT -SELINUX -APPARMOR -IMA +IPE +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +BTF +XKBCOMMON +UTMP -SYSVINIT +LIBARCHIVE)
Jul 12 15:12:14 hacking systemd[1]: Detected architecture x86-64.
Jul 12 15:12:14 hacking systemd[1]: Hostname set to <hacking>.
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 12 using xhci_hcd
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals
Jul 12 15:12:14 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0003/input/input7
Jul 12 15:12:14 hacking kernel: hid-generic 0003:1A7C:0191.0003: input,hidraw0: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 13 using xhci_hcd
Jul 12 15:12:14 hacking systemd[1]: bpf-restrict-fs: LSM BPF program attached
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0004/input/input8
Jul 12 15:12:14 hacking systemd[1]: Queued start job for default target Graphical Interface.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/dirmngr.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/getty.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent-browser.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent-extra.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent-ssh.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/keyboxd.
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/modprobe.
Jul 12 15:12:14 hacking systemd[1]: Created slice User and Session Slice.
Jul 12 15:12:14 hacking systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
Jul 12 15:12:14 hacking systemd[1]: Started Forward Password Requests to Wall Directory Watch.
Jul 12 15:12:14 hacking systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point.
Jul 12 15:12:14 hacking systemd[1]: Expecting device /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7...
Jul 12 15:12:14 hacking systemd[1]: Expecting device /dev/disk/by-uuid/860B-DC20...
Jul 12 15:12:14 hacking systemd[1]: Reached target Local Encrypted Volumes.
Jul 12 15:12:14 hacking systemd[1]: Reached target Local Integrity Protected Volumes.
Jul 12 15:12:14 hacking systemd[1]: Reached target Path Units.
Jul 12 15:12:14 hacking systemd[1]: Reached target Remote File Systems.
Jul 12 15:12:14 hacking systemd[1]: Reached target Slice Units.
Jul 12 15:12:14 hacking systemd[1]: Reached target Local Verity Protected Volumes.
Jul 12 15:12:14 hacking systemd[1]: Listening on Device-mapper event daemon FIFOs.
Jul 12 15:12:14 hacking systemd[1]: Listening on Process Core Dump Socket.
Jul 12 15:12:14 hacking systemd[1]: Listening on Credential Encryption/Decryption.
Jul 12 15:12:14 hacking systemd[1]: Listening on Journal Socket (/dev/log).
Jul 12 15:12:14 hacking systemd[1]: Listening on Journal Sockets.
Jul 12 15:12:14 hacking systemd[1]: TPM PCR Measurements was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: Make TPM PCR Policy was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: Listening on udev Control Socket.
Jul 12 15:12:14 hacking systemd[1]: Listening on udev Kernel Socket.
Jul 12 15:12:14 hacking systemd[1]: Listening on User Database Manager Socket.
Jul 12 15:12:14 hacking systemd[1]: Mounting Huge Pages File System...
Jul 12 15:12:14 hacking systemd[1]: Mounting POSIX Message Queue File System...
Jul 12 15:12:14 hacking systemd[1]: Mounting Kernel Debug File System...
Jul 12 15:12:14 hacking systemd[1]: Mounting Kernel Trace File System...
Jul 12 15:12:14 hacking systemd[1]: Starting Create List of Static Device Nodes...
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module configfs...
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module dm_mod...
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module drm...
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module fuse...
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module loop...
Jul 12 15:12:14 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Jul 12 15:12:14 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
Jul 12 15:12:14 hacking systemd[1]: Starting Journal Service...
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Modules...
Jul 12 15:12:14 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: Starting Remount Root and Kernel File Systems...
Jul 12 15:12:14 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: Starting Load udev Rules from Credentials...
Jul 12 15:12:14 hacking systemd[1]: Starting Coldplug All udev Devices...
Jul 12 15:12:14 hacking systemd[1]: Mounted Huge Pages File System.
Jul 12 15:12:14 hacking systemd[1]: Mounted POSIX Message Queue File System.
Jul 12 15:12:14 hacking systemd[1]: Mounted Kernel Debug File System.
Jul 12 15:12:14 hacking systemd[1]: Mounted Kernel Trace File System.
Jul 12 15:12:14 hacking systemd[1]: Finished Create List of Static Device Nodes.
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module configfs.
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module drm.
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module fuse.
Jul 12 15:12:14 hacking systemd[1]: Mounting FUSE Control File System...
Jul 12 15:12:14 hacking kernel: loop: module loaded
Jul 12 15:12:14 hacking systemd[1]: Mounting Kernel Configuration File System...
Jul 12 15:12:14 hacking kernel: Asymmetric key parser 'pkcs8' registered
Jul 12 15:12:14 hacking systemd[1]: Starting Create Static Device Nodes in /dev gracefully...
Jul 12 15:12:14 hacking kernel: device-mapper: uevent: version 1.0.3
Jul 12 15:12:14 hacking kernel: device-mapper: ioctl: 4.49.0-ioctl (2025-01-17) initialised: [email protected]
Jul 12 15:12:14 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module dm_mod.
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module loop.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Modules.
Jul 12 15:12:14 hacking systemd-journald[427]: Collecting audit messages is disabled.
Jul 12 15:12:14 hacking systemd[1]: Finished Load udev Rules from Credentials.
Jul 12 15:12:14 hacking systemd[1]: Mounted FUSE Control File System.
Jul 12 15:12:14 hacking systemd[1]: Mounted Kernel Configuration File System.
Jul 12 15:12:14 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met.
Jul 12 15:12:14 hacking systemd[1]: Starting Apply Kernel Variables...
Jul 12 15:12:14 hacking systemd[1]: Starting User Database Manager...
Jul 12 15:12:14 hacking kernel: EXT4-fs (nvme0n1p3): re-mounted 2403f944-7fdf-4185-8119-4f6fd8f7f887.
Jul 12 15:12:14 hacking systemd[1]: Finished Remount Root and Kernel File Systems.
Jul 12 15:12:14 hacking systemd[1]: Rebuild Hardware Database was skipped because of an unmet condition check (ConditionNeedsUpdate=/etc).
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save OS Random Seed...
Jul 12 15:12:14 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: Finished Load/Save OS Random Seed.
Jul 12 15:12:14 hacking systemd[1]: Started User Database Manager.
Jul 12 15:12:14 hacking systemd[1]: Finished Create Static Device Nodes in /dev gracefully.
Jul 12 15:12:14 hacking systemd[1]: Create System Users was skipped because no trigger condition checks were met.
Jul 12 15:12:14 hacking systemd[1]: Starting Create Static Device Nodes in /dev...
Jul 12 15:12:14 hacking kernel: hid-generic 0003:2EFD:2130.0004: input,hidraw1: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0
Jul 12 15:12:14 hacking systemd[1]: Finished Apply Kernel Variables.
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0005/input/input9
Jul 12 15:12:14 hacking systemd[1]: Finished Create Static Device Nodes in /dev.
Jul 12 15:12:14 hacking systemd[1]: Reached target Preparation for Local File Systems.
Jul 12 15:12:14 hacking systemd-journald[427]: Journal started
Jul 12 15:12:14 hacking systemd-journald[427]: Runtime Journal (/run/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 8M, max 1.5G, 1.5G free.
Jul 12 15:12:14 hacking systemd-modules-load[428]: Inserted module 'crypto_user'
Jul 12 15:12:14 hacking systemd-modules-load[428]: Inserted module 'pkcs8_key_parser'
Jul 12 15:12:14 hacking systemd[1]: Starting Rule-based Manager for Device Events and Files...
Jul 12 15:12:14 hacking systemd[1]: Started Journal Service.
Jul 12 15:12:14 hacking systemd[1]: Starting Flush Journal to Persistent Storage...
Jul 12 15:12:14 hacking systemd-journald[427]: Time spent on flushing to /var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b is 22.791ms for 1138 entries.
Jul 12 15:12:14 hacking systemd-journald[427]: System Journal (/var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 112M, max 4G, 3.8G free.
Jul 12 15:12:14 hacking systemd-journald[427]: Received client request to flush runtime journal.
Jul 12 15:12:14 hacking systemd-udevd[450]: Using default interface naming scheme 'v257'.
Jul 12 15:12:14 hacking systemd[1]: Started Rule-based Manager for Device Events and Files.
Jul 12 15:12:14 hacking systemd[1]: Condition check resulted in /dev/tpmrm0 being skipped.
Jul 12 15:12:14 hacking systemd[1]: Reached target Trusted Platform Module.
Jul 12 15:12:14 hacking systemd[1]: Finished Coldplug All udev Devices.
Jul 12 15:12:14 hacking systemd[1]: Finished Flush Journal to Persistent Storage.
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0005/input/input10
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0005/input/input11
Jul 12 15:12:14 hacking kernel: tuxedo_compatibility_check: loading out-of-tree module taints kernel.
Jul 12 15:12:14 hacking kernel: tuxedo_compatibility_check: module verification failed: signature and/or required key missing - tainting kernel
Jul 12 15:12:14 hacking kernel: input: Intel HID events as /devices/platform/INTC10CB:00/input/input12
Jul 12 15:12:14 hacking kernel: hid-generic 0003:2EFD:2130.0005: input,hidraw2: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input1
Jul 12 15:12:14 hacking kernel: tuxedo_keyboard: module init
Jul 12 15:12:14 hacking kernel: resource: resource sanity check: requesting [mem 0x00000000fedc0000-0x00000000fedcffff], which spans more than pnp 00:03 [mem 0xfedc0000-0xfedc7fff]
Jul 12 15:12:14 hacking kernel: caller igen6_probe+0x155/0x81c [igen6_edac] mapping multiple BARs
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: Setting to D3hot
Jul 12 15:12:14 hacking kernel: EDAC MC0: Giving out device to module igen6_edac controller Intel_client_SoC MC#0: DEV 0000:00:00.0 (INTERRUPT)
Jul 12 15:12:14 hacking kernel: EDAC igen6: Expected 2 mcs, but only 1 detected.
Jul 12 15:12:14 hacking kernel: EDAC igen6: v2.5.1
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/systemd-backlight.
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of backlight:intel_backlight...
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: Setting to D3hot
Jul 12 15:12:14 hacking kernel: ACPI: bus type thunderbolt registered
Jul 12 15:12:14 hacking kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set
Jul 12 15:12:14 hacking kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt
Jul 12 15:12:14 hacking kernel: pps_core: LinuxPPS API ver. 1 registered
Jul 12 15:12:14 hacking kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <[email protected]>
Jul 12 15:12:14 hacking kernel: input: PC Speaker as /devices/platform/pcspkr/input/input13
Jul 12 15:12:14 hacking kernel: intel_pmc_core INT33A1:00: Assuming a default substate order for this platform
Jul 12 15:12:14 hacking kernel: intel_pmc_core INT33A1:00: pmc_core: couldn't get DMU telem endpoint -6
Jul 12 15:12:14 hacking kernel: intel_pmc_core INT33A1:00: initialized
Jul 12 15:12:14 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB EFI\x20system\x20partition.
Jul 12 15:12:14 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB swap\x20partition.
Jul 12 15:12:14 hacking kernel: tuxedo_keyboard: Set keyboard backlight mode on CUSTOM
Jul 12 15:12:14 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Firmware: intel/vpu/vpu_37xx_v1.bin, version: 20250415*MTL_CLIENT_SILICON-release*1900*ci_tag_ud202518_vpu_rc_20250415_1900*7ef0f3fdb82
Jul 12 15:12:14 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Scheduler mode: HW
Jul 12 15:12:14 hacking systemd[1]: Activating swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7...
Jul 12 15:12:14 hacking kernel: Adding 4194300k swap on /dev/nvme0n1p2. Priority:-2 extents:1 across:4194300k SS
Jul 12 15:12:14 hacking kernel: ACPI: battery: new hook: TUXEDO Flexicharger Extension
Jul 12 15:12:14 hacking kernel: input: TUXEDO Keyboard as /devices/platform/tuxedo_keyboard/input/input14
Jul 12 15:12:14 hacking kernel: clevo_acpi: interface initialized
Jul 12 15:12:14 hacking kernel: clevo_wmi: interface initialized
Jul 12 15:12:14 hacking systemd[1]: Activated swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7.
Jul 12 15:12:14 hacking systemd[1]: Reached target Swaps.
Jul 12 15:12:14 hacking kernel: PTP clock support registered
Jul 12 15:12:14 hacking systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch.
Jul 12 15:12:14 hacking systemd[1]: Starting Virtual Console Setup...
Jul 12 15:12:14 hacking kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain package 2^-14 Joules
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain psys 2^-14 Joules
Jul 12 15:12:14 hacking kernel: mc: Linux media interface: v0.10
Jul 12 15:12:14 hacking kernel: mousedev: PS/2 mouse device common for all mice
Jul 12 15:12:14 hacking kernel: mei_gsc_proxy 0000:00:16.0-0f73db04-97ab-4125-b893-e904ad0d5464: bound 0000:00:02.0 (ops i915_gsc_proxy_component_ops [i915])
Jul 12 15:12:14 hacking kernel: iTCO_vendor_support: vendor-support=0
Jul 12 15:12:14 hacking kernel: intel_rapl_msr: PL4 support detected.
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain package
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain core
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain uncore
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain psys
Jul 12 15:12:14 hacking systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Stopped Virtual Console Setup.
Jul 12 15:12:14 hacking kernel: usbcore: registered new device driver r8152-cfgselector
Jul 12 15:12:14 hacking kernel: e1000e: Intel(R) PRO/1000 Network Driver
Jul 12 15:12:14 hacking kernel: e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode
Jul 12 15:12:14 hacking systemd[1]: Starting Virtual Console Setup...
Jul 12 15:12:14 hacking kernel: intel-lpss 0000:00:15.0: enabling device (0004 -> 0006)
Jul 12 15:12:14 hacking kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit
Jul 12 15:12:14 hacking kernel: Bluetooth: Core ver 2.22
Jul 12 15:12:14 hacking kernel: NET: Registered PF_BLUETOOTH protocol family
Jul 12 15:12:14 hacking kernel: Bluetooth: HCI device and connection manager initialized
Jul 12 15:12:14 hacking kernel: Bluetooth: HCI socket layer initialized
Jul 12 15:12:14 hacking kernel: Bluetooth: L2CAP socket layer initialized
Jul 12 15:12:14 hacking kernel: Bluetooth: SCO socket layer initialized
Jul 12 15:12:14 hacking kernel: intel-lpss 0000:00:15.1: enabling device (0004 -> 0006)
Jul 12 15:12:14 hacking kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit
Jul 12 15:12:14 hacking kernel: cryptd: max_cpu_qlen set to 1000
Jul 12 15:12:14 hacking kernel: videodev: Linux video capture interface: v2.00
Jul 12 15:12:14 hacking systemd[1]: Finished Virtual Console Setup.
Jul 12 15:12:14 hacking kernel: r8152-cfgselector 2-1.4.4: reset SuperSpeed USB device number 7 using xhci_hcd
Jul 12 15:12:14 hacking kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database
Jul 12 15:12:14 hacking kernel: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Jul 12 15:12:14 hacking kernel: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600'
Jul 12 15:12:14 hacking kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
Jul 12 15:12:14 hacking kernel: cfg80211: failed to load regulatory.db
Jul 12 15:12:14 hacking kernel: usb 3-6: USB disconnect, device number 2
Jul 12 15:12:14 hacking kernel: usb 3-6.2: USB disconnect, device number 5
Jul 12 15:12:14 hacking kernel: usb 3-6.4: USB disconnect, device number 10
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: USB disconnect, device number 11
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: USB disconnect, device number 12
Jul 12 15:12:14 hacking kernel: r8152-cfgselector 2-1.4.4: Failed to read 4 bytes at 0xb400/0x0133 (-71)
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Link Down
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Card not present
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:03.0: Runtime PM usage count underflow!
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:02.0: Runtime PM usage count underflow!
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:01.0: Runtime PM usage count underflow!
Jul 12 15:12:14 hacking kernel: pci_bus 0000:04: busn_res: [bus 04] is released
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-11] is released
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-1e] is released
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2a] is released
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] is released
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] is released
Jul 12 15:12:14 hacking kernel: [drm] Initialized intel_vpu 1.0.0 for 0000:00:0b.0 on minor 0
Jul 12 15:12:14 hacking kernel: usb 2-1: USB disconnect, device number 2
Jul 12 15:12:14 hacking kernel: usb 2-1.4: USB disconnect, device number 3
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: USB disconnect, device number 6
Jul 12 15:12:14 hacking kernel: r8152-cfgselector 2-1.4.4: USB disconnect, device number 7
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: USB disconnect, device number 13
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of leds:white:kbd_backlight...
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input15
Jul 12 15:12:14 hacking kernel: r8152 2-1.4.4:1.0 (unnamed net_device) (uninitialized): Get ether addr fail
Jul 12 15:12:14 hacking kernel: r8152 2-1.4.4:1.0 eth0: v1.12.13
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver r8152
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock
Jul 12 15:12:14 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of leds:white:kbd_backlight.
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) d4:93:90:57:77:c4
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 eth0: MAC: 16, PHY: 12, PBA No: FFFFFF-0FF
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input16
Jul 12 15:12:14 hacking kernel: hid-generic 0018:2808:0222.0006: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01
Jul 12 15:12:14 hacking kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400)
Jul 12 15:12:14 hacking kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 enp0s31f6: renamed from eth0
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver cdc_ether
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver r8153_ecm
Jul 12 15:12:14 hacking kernel: Intel(R) Wireless WiFi driver for Linux
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: enabling device (0000 -> 0002)
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain package
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver btusb
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save RF Kill Switch Status...
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Device revision is 0
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Secure boot is enabled
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: OTP lock is disabled
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: API lock is enabled
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Debug lock is disabled
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Minimum firmware build 1 week 10 2014
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Bootloader timestamp 2022.18 buildtype 1 build 16362
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: DSM reset method type: 0x01
Jul 12 15:12:14 hacking kernel: usb 3-7: Found UVC 1.10 device Chicony USB2.0 Camera (04f2:b729)
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver uvcvideo
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Found device firmware: intel/ibt-0291-0291.sfi
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Boot Address: 0x100800
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Firmware Version: 137-18.25
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: Detected crf-id 0x2001910, cnv-id 0x2001910 wfpm id 0x80000000
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: PCI dev 272b/00f4, rev=0x472, rfid=0x112200
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: Detected Intel(R) Wi-Fi 7 BE200 320MHz
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: TLV_FW_FSEQ_VERSION: FSEQ Version: 0.0.4.196
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: loaded firmware version 98.d661c37c.0 gl-c0-fm-c0-98.ucode op_mode iwlmld
Jul 12 15:12:14 hacking kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002)
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module dm_mod...
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module loop...
Jul 12 15:12:14 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Jul 12 15:12:14 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
Jul 12 15:12:14 hacking systemd[1]: Rebuild Hardware Database was skipped because of an unmet condition check (ConditionNeedsUpdate=/etc).
Jul 12 15:12:14 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: Create System Users was skipped because no trigger condition checks were met.
Jul 12 15:12:14 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:14 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module dm_mod.
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module loop.
Jul 12 15:12:14 hacking systemd[1]: Started Load/Save RF Kill Switch Status.
Jul 12 15:12:14 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met.
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input18
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input19
Jul 12 15:12:14 hacking kernel: hid-multitouch 0018:2808:0222.0006: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: Detected RF FM, rfid=0x112200
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: loaded PNVM version 752be616
Jul 12 15:12:15 hacking systemd[1]: Mounting /boot...
Jul 12 15:12:15 hacking systemd[1]: Mounting Temporary Directory /tmp...
Jul 12 15:12:15 hacking systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Jul 12 15:12:15 hacking systemd[1]: Listening on Disk Image Download Service Socket.
Jul 12 15:12:15 hacking systemd[1]: Mounted Temporary Directory /tmp.
Jul 12 15:12:15 hacking kernel: FAT-fs (nvme0n1p1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
Jul 12 15:12:15 hacking systemd[1]: Mounted /boot.
Jul 12 15:12:15 hacking systemd[1]: Reached target Local File Systems.
Jul 12 15:12:15 hacking systemd[1]: Listening on Boot Entries Service Socket.
Jul 12 15:12:15 hacking systemd[1]: Listening on System Extension Image Management.
Jul 12 15:12:15 hacking systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met.
Jul 12 15:12:15 hacking systemd[1]: Starting Update Boot Loader Random Seed...
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: base HW address: 5c:b4:7e:c1:32:3e
Jul 12 15:12:15 hacking systemd[1]: Starting Create System Files and Directories...
Jul 12 15:12:15 hacking bootctl[621]: ! Mount point '/boot' which backs the random seed file is world accessible, which is a security hole! !
Jul 12 15:12:15 hacking bootctl[621]: ! Random seed file '/boot/loader/random-seed' is world accessible, which is a security hole! !
Jul 12 15:12:15 hacking bootctl[621]: Random seed file /boot/loader/random-seed successfully refreshed (32 bytes).
Jul 12 15:12:15 hacking systemd[1]: Finished Update Boot Loader Random Seed.
Jul 12 15:12:15 hacking systemd[1]: Finished Create System Files and Directories.
Jul 12 15:12:15 hacking systemd[1]: Rebuild Dynamic Linker Cache was skipped because no trigger condition checks were met.
Jul 12 15:12:15 hacking systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes).
Jul 12 15:12:15 hacking systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes).
Jul 12 15:12:15 hacking systemd[1]: Rebuild Journal Catalog was skipped because of an unmet condition check (ConditionNeedsUpdate=/var).
Jul 12 15:12:15 hacking systemd[1]: Save Transient machine-id to Disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id).
Jul 12 15:12:15 hacking systemd[1]: Update is Completed was skipped because no trigger condition checks were met.
Jul 12 15:12:15 hacking systemd[1]: Starting Record System Boot/Shutdown in UTMP...
Jul 12 15:12:15 hacking systemd[1]: Finished Record System Boot/Shutdown in UTMP.
Jul 12 15:12:15 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of backlight:intel_backlight.
Jul 12 15:12:15 hacking systemd[1]: Reached target System Initialization.
Jul 12 15:12:15 hacking systemd[1]: Started Refresh existing PGP keys of archlinux-keyring regularly.
Jul 12 15:12:15 hacking systemd[1]: Started Daily man-db regeneration.
Jul 12 15:12:15 hacking systemd[1]: Started Daily verification of password and group files.
Jul 12 15:12:15 hacking systemd[1]: Started Daily Cleanup of Temporary Directories.
Jul 12 15:12:15 hacking systemd[1]: Reached target Timer Units.
Jul 12 15:12:15 hacking systemd[1]: Listening on D-Bus System Message Bus Socket.
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG network certificate management daemon for /etc/pacman.d/gnupg.
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers) for /etc/pacman.d/gnupg.
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (restricted) for /etc/pacman.d/gnupg.
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent (ssh-agent emulation) for /etc/pacman.d/gnupg.
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache for /etc/pacman.d/gnupg.
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG public key management service for /etc/pacman.d/gnupg.
Jul 12 15:12:15 hacking systemd[1]: Listening on OpenSSH Server Socket (systemd-ssh-generator, AF_UNIX Local).
Jul 12 15:12:15 hacking systemd[1]: Listening on Hostname Service Socket.
Jul 12 15:12:15 hacking systemd[1]: Reached target Socket Units.
Jul 12 15:12:15 hacking systemd[1]: Starting D-Bus System Message Bus...
Jul 12 15:12:15 hacking systemd[1]: TPM PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: Registered PHC clock: iwlwifi-PTP, with index: 1
Jul 12 15:12:15 hacking systemd[1]: Started D-Bus System Message Bus.
Jul 12 15:12:15 hacking systemd[1]: Reached target Basic System.
Jul 12 15:12:15 hacking systemd[1]: Starting Bluetooth service...
Jul 12 15:12:15 hacking dbus-broker-launch[634]: Ready
Jul 12 15:12:15 hacking systemd[1]: Starting Initialize hardware monitoring sensors...
Jul 12 15:12:15 hacking systemd[1]: Starting User Login Management...
Jul 12 15:12:15 hacking systemd[1]: TPM PCR Barrier (User) was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 12 15:12:15 hacking systemd[1]: Starting Permit User Sessions...
Jul 12 15:12:15 hacking (modprobe)[639]: lm_sensors.service: Referenced but unset environment variable evaluates to an empty string: BUS_MODULES
Jul 12 15:12:15 hacking systemd[1]: Finished Permit User Sessions.
Jul 12 15:12:15 hacking bluetoothd[637]: Bluetooth daemon 5.83
Jul 12 15:12:15 hacking bluetoothd[637]: Starting SDP server
Jul 12 15:12:15 hacking bluetoothd[637]: Bluetooth management interface 1.23 initialized
Jul 12 15:12:15 hacking kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3
Jul 12 15:12:15 hacking kernel: Bluetooth: BNEP filters: protocol multicast
Jul 12 15:12:15 hacking kernel: Bluetooth: BNEP socket layer initialized
Jul 12 15:12:15 hacking systemd[1]: Started Bluetooth service.
Jul 12 15:12:15 hacking systemd-logind[640]: New seat seat0.
Jul 12 15:12:15 hacking systemd[1]: Reached target Bluetooth Support.
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event0 (Power Button)
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event2 (Lid Switch)
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event1 (Sleep Button)
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event10 (Intel HID events)
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event3 (AT Translated Set 2 keyboard)
Jul 12 15:12:15 hacking systemd[1]: Started Getty on tty1.
Jul 12 15:12:15 hacking systemd[1]: Reached target Login Prompts.
Jul 12 15:12:15 hacking systemd[1]: Started User Login Management.
Jul 12 15:12:15 hacking systemd[1]: Finished Initialize hardware monitoring sensors.
Jul 12 15:12:15 hacking systemd[1]: Reached target Multi-User System.
Jul 12 15:12:15 hacking systemd[1]: Reached target Graphical Interface.
Jul 12 15:12:15 hacking systemd[1]: Starting Hostname Service...
Jul 12 15:12:15 hacking systemd[1]: Started Hostname Service.
Jul 12 15:12:15 hacking systemd[1]: Startup finished in 13.877s (firmware) + 4.760s (loader) + 4.099s (kernel) + 1.614s (userspace) = 24.352s.
Jul 12 15:12:16 hacking kernel: snd_hda_intel 0000:00:1f.3: bound 0000:00:02.0 (ops intel_audio_component_bind_ops [i915])
Jul 12 15:12:16 hacking kernel: typec port0: bound usb3-port6 (ops connector_ops)
Jul 12 15:12:16 hacking kernel: typec port0: bound usb2-port1 (ops connector_ops)
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: ALC245: picked fixup for PCI SSID 1558:a763
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC245: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:speaker
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0)
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x21/0x0/0x0/0x0/0x0)
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: inputs:
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Internal Mic=0x12
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Headset Mic=0x19
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input21
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input22
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input23
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input24
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input25
Jul 12 15:12:16 hacking systemd[1]: Reached target Sound Card.
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Waiting for firmware download to complete
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Firmware loaded in 1764689 usecs
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Waiting for device to boot
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Device booted in 51880 usecs
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: dsbr: enable: 0x01 value: 0x0f
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Found Intel DDC parameters: intel/ibt-0291-0291.ddc
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Applying Intel DDC parameters completed
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Firmware timestamp 2025.18 buildtype 1 build 82313
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Firmware SHA1: 0x81d88c7f
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Fseq status: Success (0x00)
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Fseq executed: 00.00.04.197
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Fseq BT Top: 00.00.04.197
Jul 12 15:12:16 hacking bluetoothd[637]: Battery Provider Manager created
Jul 12 15:12:16 hacking kernel: Bluetooth: MGMT ver 1.23
Jul 12 15:12:16 hacking kernel: NET: Registered PF_ALG protocol family
Jul 12 15:12:17 hacking kernel: thunderbolt 0-1: new device found, vendor=0x175 device=0x6534
Jul 12 15:12:17 hacking kernel: thunderbolt 0-1: SAMSUNG ELECTRONICS CO.,LTD S34C65T
Jul 12 15:12:17 hacking kernel: thunderbolt 0-0:1.1: new retimer found, vendor=0x8087 device=0xd9c
Jul 12 15:12:18 hacking kernel: usb 3-6: new high-speed USB device number 14 using xhci_hcd
Jul 12 15:12:18 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01
Jul 12 15:12:18 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:18 hacking kernel: usb 3-6: Product: USB2.0 Hub
Jul 12 15:12:18 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc.
Jul 12 15:12:18 hacking kernel: hub 3-6:1.0: USB hub found
Jul 12 15:12:18 hacking kernel: hub 3-6:1.0: 6 ports detected
Jul 12 15:12:18 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 8 using xhci_hcd
Jul 12 15:12:18 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34
Jul 12 15:12:18 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:18 hacking kernel: usb 2-1: Product: USB3.0 Hub
Jul 12 15:12:18 hacking kernel: usb 2-1: Manufacturer: Intel Corporation.
Jul 12 15:12:18 hacking kernel: hub 2-1:1.0: USB hub found
Jul 12 15:12:18 hacking kernel: hub 2-1:1.0: 4 ports detected
Jul 12 15:12:18 hacking kernel: usb 3-6.2: new full-speed USB device number 15 using xhci_hcd
Jul 12 15:12:18 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46
Jul 12 15:12:18 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 12 15:12:18 hacking kernel: usb 3-6.2: Product: S34C65T
Jul 12 15:12:18 hacking kernel: usb 3-6.2: Manufacturer: Samsung
Jul 12 15:12:18 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00
Jul 12 15:12:19 hacking kernel: usb 3-6.4: new high-speed USB device number 16 using xhci_hcd
Jul 12 15:12:19 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91
Jul 12 15:12:19 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:19 hacking kernel: usb 3-6.4: Product: USB2.1 Hub
Jul 12 15:12:19 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic
Jul 12 15:12:19 hacking kernel: hub 3-6.4:1.0: USB hub found
Jul 12 15:12:19 hacking kernel: hub 3-6.4:1.0: 4 ports detected
Jul 12 15:12:19 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 9 using xhci_hcd
Jul 12 15:12:19 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91
Jul 12 15:12:19 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:19 hacking kernel: usb 2-1.4: Product: USB3.2 Hub
Jul 12 15:12:19 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic
Jul 12 15:12:19 hacking kernel: hub 2-1.4:1.0: USB hub found
Jul 12 15:12:19 hacking kernel: hub 2-1.4:1.0: 4 ports detected
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: new high-speed USB device number 17 using xhci_hcd
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: Manufacturer: Generic
Jul 12 15:12:19 hacking kernel: hub 3-6.4.1:1.0: USB hub found
Jul 12 15:12:19 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 10 using xhci_hcd
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: Manufacturer: Generic
Jul 12 15:12:19 hacking kernel: hub 2-1.4.1:1.0: USB hub found
Jul 12 15:12:19 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 11 using xhci_hcd
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001
Jul 12 15:12:19 hacking kernel: r8152-cfgselector 2-1.4.4: reset SuperSpeed USB device number 11 using xhci_hcd
Jul 12 15:12:19 hacking kernel: r8152 2-1.4.4:1.0 eth0: v1.12.13
Jul 12 15:12:19 hacking kernel: r8152 2-1.4.4:1.0 enp0s13f0u1u4u4: renamed from eth0
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 19 using xhci_hcd
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals
Jul 12 15:12:20 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0007/input/input26
Jul 12 15:12:20 hacking kernel: hid-generic 0003:1A7C:0191.0007: input,hidraw1: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0
Jul 12 15:12:20 hacking systemd[1]: systemd-rfkill.service: Deactivated successfully.
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 20 using xhci_hcd
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0008/input/input27
Jul 12 15:12:20 hacking kernel: hid-generic 0003:2EFD:2130.0008: input,hidraw2: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0009/input/input28
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0009/input/input29
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0009/input/input30
Jul 12 15:12:20 hacking kernel: hid-generic 0003:2EFD:2130.0009: input,hidraw3: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input1
Jul 12 15:12:20 hacking systemd-logind[640]: Watching system buttons on /dev/input/event16 (SONiX USB Keyboard)
Jul 12 15:12:20 hacking systemd-logind[640]: Watching system buttons on /dev/input/event18 (SONiX USB Keyboard System Control)
Jul 12 15:12:20 hacking systemd-logind[640]: Watching system buttons on /dev/input/event19 (SONiX USB Keyboard)
Jul 12 15:12:23 hacking dbus-broker-launch[634]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found.
Jul 12 15:12:24 hacking login[656]: pam_unix(login:session): session opened for user ray(uid=1000) by ray(uid=0)
Jul 12 15:12:24 hacking systemd[1]: Created slice User Slice of UID 1000.
Jul 12 15:12:24 hacking systemd[1]: Starting User Runtime Directory /run/user/1000...
Jul 12 15:12:24 hacking systemd-logind[640]: New session 1 of user ray.
Jul 12 15:12:24 hacking systemd[1]: Finished User Runtime Directory /run/user/1000.
Jul 12 15:12:24 hacking systemd[1]: Starting User Manager for UID 1000...
Jul 12 15:12:24 hacking (systemd)[707]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8002 service=[systemd-user] terminal=[] user=[ray] ruser=[<unknown>] rhost=[<unknown>]
Jul 12 15:12:24 hacking (systemd)[707]: pam_unix(systemd-user:session): session opened for user ray(uid=1000) by ray(uid=0)
Jul 12 15:12:24 hacking systemd-logind[640]: New session 2 of user ray.
Jul 12 15:12:24 hacking systemd[707]: Queued start job for default target Main User Target.
Jul 12 15:12:24 hacking systemd[707]: Created slice User Application Slice.
Jul 12 15:12:24 hacking systemd[707]: Started Break Encouragement.
Jul 12 15:12:24 hacking systemd[707]: Reached target Paths.
Jul 12 15:12:24 hacking systemd[707]: Reached target Timers.
Jul 12 15:12:24 hacking systemd[707]: Starting D-Bus User Message Bus Socket...
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG network certificate management daemon.
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers).
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent and passphrase cache (restricted).
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent (ssh-agent emulation).
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent and passphrase cache.
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG public key management service.
Jul 12 15:12:24 hacking systemd[707]: Listening on p11-kit server.
Jul 12 15:12:24 hacking systemd[707]: Listening on PipeWire PulseAudio.
Jul 12 15:12:24 hacking systemd[707]: Listening on PipeWire Multimedia System Sockets.
Jul 12 15:12:24 hacking systemd[707]: Listening on D-Bus User Message Bus Socket.
Jul 12 15:12:24 hacking systemd[707]: Reached target Sockets.
Jul 12 15:12:24 hacking systemd[707]: Reached target Basic System.
Jul 12 15:12:24 hacking systemd[1]: Started User Manager for UID 1000.
Jul 12 15:12:24 hacking systemd[707]: Started Kanata keyboard remapper.
Jul 12 15:12:24 hacking systemd[707]: Reached target Main User Target.
Jul 12 15:12:24 hacking systemd[707]: Startup finished in 79ms.
Jul 12 15:12:24 hacking systemd[1]: Started Session 1 of User ray.
Jul 12 15:12:24 hacking login[656]: LOGIN ON tty1 BY ray
Jul 12 15:12:24 hacking sh[717]: /usr/bin/sh: line 1: /home/ray/.cargo/bin/kanata: No such file or directory
Jul 12 15:12:24 hacking systemd[707]: kanata.service: Main process exited, code=exited, status=127/n/a
Jul 12 15:12:24 hacking systemd[707]: kanata.service: Failed with result 'exit-code'.
Jul 12 15:12:29 hacking systemd[707]: Created slice User Core Session Slice.
Jul 12 15:12:29 hacking systemd[707]: Starting D-Bus User Message Bus...
Jul 12 15:12:29 hacking dbus-broker-launch[754]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored
Jul 12 15:12:29 hacking dbus-broker-launch[754]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored
Jul 12 15:12:29 hacking systemd[707]: Started D-Bus User Message Bus.
Jul 12 15:12:29 hacking dbus-broker-launch[754]: Ready
Jul 12 15:12:29 hacking systemd[707]: keynav.service: Failed to open /home/ray/.config/systemd/user/keynav.service: No such file or directory
Jul 12 15:12:29 hacking systemd[707]: Started Flexible Input Method Framwork.
Jul 12 15:12:29 hacking systemd[707]: Started notify-client -> notify-server -> notify-send.
Jul 12 15:12:29 hacking systemd[707]: Started Redshift display colour temperature adjustment (GUI).
Jul 12 15:12:29 hacking systemd[707]: Started Taskbar.
Jul 12 15:12:29 hacking systemd[707]: Started xscreensaver.service.
Jul 12 15:12:29 hacking systemd[707]: Reached target Graphical Interface.
Jul 12 15:12:29 hacking (y-server)[760]: notify-server.service: Unable to locate executable '/home/ray/bin/notify-server': No such file or directory
Jul 12 15:12:29 hacking (y-server)[760]: notify-server.service: Failed at step EXEC spawning /home/ray/bin/notify-server: No such file or directory
Jul 12 15:12:29 hacking systemd[707]: notify-server.service: Main process exited, code=exited, status=203/EXEC
Jul 12 15:12:29 hacking systemd[707]: notify-server.service: Failed with result 'exit-code'.
Jul 12 15:12:29 hacking (hift-gtk)[761]: redshift-gtk.service: Unable to locate executable '/usr/bin/redshift-gtk': No such file or directory
Jul 12 15:12:29 hacking (hift-gtk)[761]: redshift-gtk.service: Failed at step EXEC spawning /usr/bin/redshift-gtk: No such file or directory
Jul 12 15:12:29 hacking systemd[707]: redshift-gtk.service: Main process exited, code=exited, status=203/EXEC
Jul 12 15:12:29 hacking systemd[707]: redshift-gtk.service: Failed with result 'exit-code'.
Jul 12 15:12:29 hacking (taskbar)[762]: taskbar.service: Unable to locate executable '/home/ray/bin/taskbar': No such file or directory
Jul 12 15:12:29 hacking (taskbar)[762]: taskbar.service: Failed at step EXEC spawning /home/ray/bin/taskbar: No such file or directory
Jul 12 15:12:29 hacking systemd[707]: taskbar.service: Main process exited, code=exited, status=203/EXEC
Jul 12 15:12:29 hacking systemd[707]: taskbar.service: Failed with result 'exit-code'.
Jul 12 15:12:29 hacking (eensaver)[763]: xscreensaver.service: Unable to locate executable '/usr/bin/xscreensaver': No such file or directory
Jul 12 15:12:29 hacking (eensaver)[763]: xscreensaver.service: Failed at step EXEC spawning /usr/bin/xscreensaver: No such file or directory
Jul 12 15:12:29 hacking systemd[707]: xscreensaver.service: Main process exited, code=exited, status=203/EXEC
Jul 12 15:12:29 hacking systemd[707]: xscreensaver.service: Failed with result 'exit-code'.
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.625948 instance.cpp:1400] Override Enabled Addons: {}
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.628372 instance.cpp:1401] Override Disabled Addons: {}
Jul 12 15:12:29 hacking fcitx5[759]: E2025-07-12 15:12:29.634534 waylandmodule.cpp:244] Failed to open wayland connection
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.634552 addonmanager.cpp:204] Loaded addon wayland
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.634811 addonmanager.cpp:204] Loaded addon imselector
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.638163 xcbconnection.cpp:199] Connecting to X11 display, display name::0.
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.638289 addonmanager.cpp:204] Loaded addon xcb
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.640007 addonmanager.cpp:204] Loaded addon quickphrase
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.640701 addonmanager.cpp:204] Loaded addon waylandim
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.641156 keyboard.cpp:226] Attempting to load keyboard from: ["/usr/share/X11/xkb"] Rule: evdev
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.643797 addonmanager.cpp:204] Loaded addon keyboard
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.644475 addonmanager.cpp:204] Loaded addon clipboard
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.645018 addonmanager.cpp:204] Loaded addon unicode
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.645745 addonmanager.cpp:204] Loaded addon dbus
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.646267 addonmanager.cpp:204] Loaded addon dbusfrontend
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.649307 addonmanager.cpp:204] Loaded addon fcitx4frontend
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.649945 addonmanager.cpp:204] Loaded addon ibusfrontend
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.650643 addonmanager.cpp:204] Loaded addon xim
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.668862 inputmethodmanager.cpp:210] Found 742 input method(s) in addon keyboard
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.679992 addonmanager.cpp:204] Loaded addon kimpanel
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.681043 addonmanager.cpp:204] Loaded addon virtualkeyboard
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.700620 classicui.cpp:90] Created classicui for x11 display::0
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.700671 addonmanager.cpp:204] Loaded addon classicui
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.701500 addonmanager.cpp:204] Loaded addon notificationitem
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.702123 addonmanager.cpp:204] Loaded addon notifications
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.706425 dbusmodule.cpp:816] Service name change: org.fcitx.Fcitx5 :1.3
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.706521 kimpanel.cpp:116] Kimpanel new owner:
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.706558 virtualkeyboard.cpp:218] VirtualKeyboard new owner:
Jul 12 15:12:30 hacking fcitx5[759]: I2025-07-12 15:12:30.775163 addonmanager.cpp:204] Loaded addon rime
Jul 12 15:12:30 hacking systemd[707]: Started tmux child pane 889 launched by process 821.
Jul 12 15:12:44 hacking systemd[707]: Starting Accessibility services bus...
Jul 12 15:12:44 hacking systemd[707]: Started Accessibility services bus.
Jul 12 15:12:44 hacking systemd[707]: Started app-com.google.Chrome-977.scope.
Jul 12 15:12:45 hacking systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 12 15:13:14 hacking chrome[977]: [977:994:0712/151314.699900:INFO:chrome/browser/extensions/extension_garbage_collector.cc:184] Garbage collection for extensions on file thread is complete.
Jul 12 15:15:08 hacking systemd[707]: Started tmux child pane 1724 launched by process 821.
Jul 12 15:15:48 hacking systemd[707]: Started tmux child pane 1846 launched by process 821.
Jul 12 15:15:49 hacking sudo[1863]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome
Jul 12 15:15:49 hacking sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 12 15:15:49 hacking systemd[1]: Starting Wireless service...
Jul 12 15:15:49 hacking iwd[1867]: Wireless daemon version 3.9
Jul 12 15:15:49 hacking systemd[1]: Started Wireless service.
Jul 12 15:15:49 hacking systemd[1]: Reached target Network.
Jul 12 15:15:49 hacking sudo[1863]: pam_unix(sudo:session): session closed for user root
Jul 12 15:15:49 hacking iwd[1867]: station: Network configuration is disabled.
Jul 12 15:15:49 hacking iwd[1867]: Wiphy: 0, Name: phy0
Jul 12 15:15:49 hacking iwd[1867]: Permanent Address: 5c:b4:7e:c1:32:3e
Jul 12 15:15:49 hacking iwd[1867]: 2.4GHz Band:
Jul 12 15:15:49 hacking iwd[1867]: Bitrates (non-HT):
Jul 12 15:15:49 hacking iwd[1867]: 1.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 2.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 5.5 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 11.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 6.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 9.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 12.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 18.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 24.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 36.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 48.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 54.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: HT Capabilities:
Jul 12 15:15:49 hacking iwd[1867]: HT40
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 20Mhz
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 40Mhz
Jul 12 15:15:49 hacking iwd[1867]: HT RX MCS indexes:
Jul 12 15:15:49 hacking iwd[1867]: 0-15
Jul 12 15:15:49 hacking iwd[1867]: HE Capabilities
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: ap p2p-go
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: station p2p-client
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: 5GHz Band:
Jul 12 15:15:49 hacking iwd[1867]: Bitrates (non-HT):
Jul 12 15:15:49 hacking iwd[1867]: 6.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 9.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 12.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 18.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 24.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 36.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 48.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 54.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: HT Capabilities:
Jul 12 15:15:49 hacking iwd[1867]: HT40
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 20Mhz
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 40Mhz
Jul 12 15:15:49 hacking iwd[1867]: HT RX MCS indexes:
Jul 12 15:15:49 hacking iwd[1867]: 0-15
Jul 12 15:15:49 hacking iwd[1867]: VHT Capabilities:
Jul 12 15:15:49 hacking iwd[1867]: 160 Mhz operation
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 80Mhz
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 160 and 80 + 80 Mhz
Jul 12 15:15:49 hacking iwd[1867]: Max RX MCS: 0-9 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max TX MCS: 0-9 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: HE Capabilities
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: ap p2p-go
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: station p2p-client
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: 6GHz Band:
Jul 12 15:15:49 hacking iwd[1867]: Bitrates (non-HT):
Jul 12 15:15:49 hacking iwd[1867]: 6.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 9.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 12.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 18.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 24.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 36.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 48.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: 54.0 Mbps
Jul 12 15:15:49 hacking iwd[1867]: HE Capabilities
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: ap p2p-go
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: station p2p-client
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 12 15:15:49 hacking iwd[1867]: Ciphers: BIP-GMAC-256 BIP-GMAC-128 GCMP-256 GCMP-128
Jul 12 15:15:49 hacking iwd[1867]: BIP-CMAC-128 CCMP-128 TKIP
Jul 12 15:15:49 hacking iwd[1867]: Supported iftypes: ad-hoc station ap p2p-client p2p-go p2p-device
Jul 12 15:15:49 hacking kernel: ------------[ cut here ]------------
Jul 12 15:15:49 hacking kernel: WARNING: CPU: 11 PID: 1867 at net/wireless/nl80211.c:8819 nl80211_get_reg_do+0x1e4/0x210 [cfg80211]
Jul 12 15:15:49 hacking kernel: Modules linked in: ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 cmac algif_hash algif_skcipher af_alg snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component ac97_bus snd_pcm_dmaengine crc8 bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp iwlmld kvm_intel mac80211 kvm libarc4 irqbypass snd_hda_intel polyval_clmulni snd_intel_dspcfg snd_intel_sdw_acpi polyval_generic ghash_clmulni_intel uvcvideo snd_hda_codec btusb processor_thermal_device_pci sha512_ssse3 processor_thermal_device
Jul 12 15:15:49 hacking kernel: videobuf2_vmalloc btrtl hid_multitouch r8153_ecm sha256_ssse3 processor_thermal_wt_hint uvc snd_hda_core btintel cdc_ether iwlwifi videobuf2_memops sha1_ssse3 videobuf2_v4l2 aesni_intel usbnet btbcm snd_hwdep videobuf2_common crypto_simd iTCO_wdt btmtk videodev intel_pmc_bxt snd_pcm cryptd processor_thermal_rfim cfg80211 mei_gsc_proxy intel_rapl_msr bluetooth iTCO_vendor_support e1000e mc mousedev r8152 rapl intel_lpss_pci processor_thermal_rapl intel_cstate snd_timer ptp intel_lpss intel_rapl_common mii ucsi_acpi intel_uncore libphy typec_ucsi joydev wmi_bmof pcspkr clevo_wmi(OE) mei_me rfkill pps_core processor_thermal_wt_req idma64 snd i2c_i801 thunderbolt intel_vpu typec processor_thermal_power_floor i2c_smbus mei clevo_acpi(OE) soundcore i2c_mux processor_thermal_mbox igen6_edac roles tuxedo_io(OE) intel_pmc_core int3403_thermal i2c_hid_acpi tuxedo_keyboard(OE) int340x_thermal_zone int3400_thermal i2c_hid pmt_telemetry tuxedo_compatibility_check(OE) intel_hid acpi_thermal_rel acpi_tad
Jul 12 15:15:49 hacking kernel: led_class_multicolor acpi_pad pmt_class pinctrl_meteorlake sparse_keymap mac_hid pkcs8_key_parser dm_mod crypto_user loop nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit drm_buddy sdhci_uhs2 nvme ttm sdhci nvme_core cqhci intel_gtt nvme_keyring mmc_core drm_display_helper serio_raw nvme_auth intel_vsec video cec wmi
Jul 12 15:15:49 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 12 15:15:49 hacking kernel: CPU: 11 UID: 0 PID: 1867 Comm: iwd Tainted: G OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 12 15:15:49 hacking kernel: Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 12 15:15:49 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 12 15:15:49 hacking kernel: RIP: 0010:nl80211_get_reg_do+0x1e4/0x210 [cfg80211]
Jul 12 15:15:49 hacking kernel: Code: 4c 24 0c ba 04 00 00 00 be 9a 00 00 00 48 89 df c7 44 24 0c 01 00 00 00 e8 69 55 d6 e5 85 c0 0f 84 4f ff ff ff e9 18 ff ff ff <0f> 0b bd ea ff ff ff e9 11 ff ff ff 89 c5 e9 0f ff ff ff bd 97 ff
Jul 12 15:15:49 hacking kernel: RSP: 0018:ffffcbfb0bb879a0 EFLAGS: 00010202
Jul 12 15:15:49 hacking kernel: RAX: 0000000000000000 RBX: ffff8b5f6bfcb400 RCX: 0000000000000000
Jul 12 15:15:49 hacking kernel: RDX: ffff8b5f70603680 RSI: 0000000000000000 RDI: ffff8b5f0c6003c0
Jul 12 15:15:49 hacking kernel: RBP: ffffcbfb0bb87a00 R08: 0000000000000000 R09: ffff8b5f17618014
Jul 12 15:15:49 hacking kernel: R10: 0000000000000000 R11: ffffffffc1891bf0 R12: ffff8b5f17618014
Jul 12 15:15:49 hacking kernel: R13: ffff8b5f6bfca500 R14: ffff8b5f0c6003c0 R15: 0000000000000001
Jul 12 15:15:49 hacking kernel: FS: 00007f645c53db80(0000) GS:ffff8b66b67ed000(0000) knlGS:0000000000000000
Jul 12 15:15:49 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 12 15:15:49 hacking kernel: CR2: 00005642ab32ba50 CR3: 0000000184e6e005 CR4: 0000000000f72ef0
Jul 12 15:15:49 hacking kernel: PKRU: 55555554
Jul 12 15:15:49 hacking kernel: Call Trace:
Jul 12 15:15:49 hacking kernel: <TASK>
Jul 12 15:15:49 hacking kernel: genl_family_rcv_msg_doit+0xfc/0x160
Jul 12 15:15:49 hacking kernel: genl_rcv_msg+0x1aa/0x2b0
Jul 12 15:15:49 hacking kernel: ? __pfx_nl80211_pre_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429]
Jul 12 15:15:49 hacking kernel: ? __pfx_nl80211_get_reg_do+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429]
Jul 12 15:15:49 hacking kernel: ? __pfx_nl80211_post_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429]
Jul 12 15:15:49 hacking kernel: ? __pfx_genl_rcv_msg+0x10/0x10
Jul 12 15:15:49 hacking kernel: netlink_rcv_skb+0x59/0x110
Jul 12 15:15:49 hacking kernel: genl_rcv+0x28/0x40
Jul 12 15:15:49 hacking kernel: netlink_unicast+0x26f/0x3a0
Jul 12 15:15:49 hacking kernel: netlink_sendmsg+0x207/0x440
Jul 12 15:15:49 hacking kernel: __sys_sendto+0x1f4/0x200
Jul 12 15:15:49 hacking kernel: __x64_sys_sendto+0x24/0x30
Jul 12 15:15:49 hacking kernel: do_syscall_64+0x7b/0x810
Jul 12 15:15:49 hacking kernel: ? __sys_recvmsg+0x89/0xe0
Jul 12 15:15:49 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 12 15:15:49 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 12 15:15:49 hacking kernel: ? __x64_sys_epoll_wait+0x70/0x120
Jul 12 15:15:49 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 12 15:15:49 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 12 15:15:49 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0
Jul 12 15:15:49 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jul 12 15:15:49 hacking kernel: RIP: 0033:0x7f645c5d1006
Jul 12 15:15:49 hacking kernel: Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08
Jul 12 15:15:49 hacking kernel: RSP: 002b:00007ffd350140d0 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
Jul 12 15:15:49 hacking kernel: RAX: ffffffffffffffda RBX: 00005642b8f388f0 RCX: 00007f645c5d1006
Jul 12 15:15:49 hacking kernel: RDX: 000000000000001c RSI: 00005642b8f444c0 RDI: 0000000000000004
Jul 12 15:15:49 hacking kernel: RBP: 00007ffd350140f0 R08: 0000000000000000 R09: 0000000000000000
Jul 12 15:15:49 hacking kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 00005642b8f444c0
Jul 12 15:15:49 hacking kernel: R13: 00005642b8f43b70 R14: 0000000000000001 R15: 0000000000000000
Jul 12 15:15:49 hacking kernel: </TASK>
Jul 12 15:15:49 hacking kernel: ---[ end trace 0000000000000000 ]---
Jul 12 15:15:49 hacking sudo[1942]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0
Jul 12 15:15:49 hacking sudo[1942]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 12 15:15:49 hacking dhcpcd[1946]: dhcpcd-10.2.4 starting
Jul 12 15:15:49 hacking dhcpcd[1949]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e
Jul 12 15:15:49 hacking kernel: 8021q: 802.1Q VLAN Support v1.8
Jul 12 15:15:50 hacking iwd[1867]: event: state, old: disconnected, new: autoconnect_quick
Jul 12 15:15:50 hacking dhcpcd[1949]: wlan0: interface not found
Jul 12 15:15:50 hacking sudo[1942]: pam_unix(sudo:session): session closed for user root
Jul 12 15:15:50 hacking iwd[1867]: udev interface=wlan0 ifindex=7
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for a8:70:5d:9a:e6:02
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8c:76:3f:a8:f7:a4
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8c:76:3f:a4:76:25
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8a:76:3f:a4:76:25
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 92:76:3f:a4:76:25
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8a:76:3f:a8:f7:a4
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 1c:93:7c:62:82:ed
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 0a:93:7c:62:82:ed
Jul 12 15:15:50 hacking iwd[1867]: event: connect-info, ssid: monkeyhome, bss: 8c:76:3f:a4:76:25, signal: -35, load: 0/255
Jul 12 15:15:50 hacking iwd[1867]: event: state, old: autoconnect_quick, new: connecting (auto)
Jul 12 15:15:50 hacking kernel: wlan0: authenticate with 8c:76:3f:a4:76:25 (local address=5c:b4:7e:c1:32:3e)
Jul 12 15:15:50 hacking kernel: wlan0: send auth to 8c:76:3f:a4:76:25 (try 1/3)
Jul 12 15:15:50 hacking kernel: wlan0: authenticated
Jul 12 15:15:50 hacking kernel: wlan0: associate with 8c:76:3f:a4:76:25 (try 1/3)
Jul 12 15:15:50 hacking kernel: wlan0: RX AssocResp from 8c:76:3f:a4:76:25 (capab=0x1011 status=0 aid=10)
Jul 12 15:15:50 hacking kernel: wlan0: associated
Jul 12 15:15:50 hacking kernel: wlan0: Limiting TX power to 30 (30 - 0) dBm as advertised by 8c:76:3f:a4:76:25
Jul 12 15:15:50 hacking iwd[1867]: event: state, old: connecting (auto), new: connected
Jul 12 15:15:52 hacking kernel: warning: `ThreadPoolForeg' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211
Jul 12 15:15:52 hacking sudo[1974]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome
Jul 12 15:15:52 hacking sudo[1974]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 12 15:15:52 hacking sudo[1974]: pam_unix(sudo:session): session closed for user root
Jul 12 15:15:52 hacking sudo[1978]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0
Jul 12 15:15:52 hacking sudo[1978]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 12 15:15:52 hacking dhcpcd[1981]: dhcpcd-10.2.4 starting
Jul 12 15:15:52 hacking dhcpcd[1984]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e
Jul 12 15:15:52 hacking dhcpcd[1984]: dhcp6_openudp: Cannot assign requested address
Jul 12 15:15:52 hacking dhcpcd[1984]: ps_inet_listenin6: Cannot assign requested address
Jul 12 15:15:52 hacking dhcpcd[1984]: ps_root_recvmsg: Cannot assign requested address
Jul 12 15:15:52 hacking dhcpcd[1984]: wlan0: DHCP6 proxy 2601:647:4700:79e0:5eb4:7eff:fec1:323e exited unexpectedly from PID 1987, code=1
Jul 12 15:15:52 hacking dhcpcd[1984]: wlan0: connected to Access Point: monkeyhome
Jul 12 15:15:52 hacking dhcpcd[1984]: wlan0: IAID 7e:c1:32:3e
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: soliciting an IPv6 router
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: rebinding lease of 10.0.0.199
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: probing address 10.0.0.199/24
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: Router Advertisement from fe80::8e76:3fff:fea4:7623
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: adding address 2601:647:4700:79e0:a4d3:a029:3fe1:b2c0/64
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: adding route to 2601:647:4700:79e0::/64
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: adding default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: confirming prior DHCPv6 lease
Jul 12 15:15:54 hacking dhcpcd[1984]: wlan0: REPLY6 received from fe80::8e76:3fff:fea4:7623
Jul 12 15:15:54 hacking dhcpcd[1984]: wlan0: adding address 2601:647:4700:79e0::c146/128
Jul 12 15:15:54 hacking dhcpcd[1984]: wlan0: renew in 116350, rebind in 220030, expire in 289150 seconds
Jul 12 15:15:55 hacking sudo[1978]: pam_unix(sudo:session): session closed for user root
Jul 12 15:15:59 hacking dhcpcd[1984]: wlan0: leased 10.0.0.199 for 172800 seconds
Jul 12 15:15:59 hacking dhcpcd[1984]: wlan0: adding route to 10.0.0.0/24
Jul 12 15:15:59 hacking dhcpcd[1984]: wlan0: adding default route via 10.0.0.1
Jul 12 15:16:01 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:16:01 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:16:10 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:16:10 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:16:19 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:16:19 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:16:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:16:28 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:16:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:16:40 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:16:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:16:49 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:16:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:16:58 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:17:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:17:07 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:17:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:17:16 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:17:25 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:17:25 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:17:37 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:17:37 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:17:43 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:17:43 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:17:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:17:52 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:17:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:17:58 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:04 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:18:04 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:13 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:18:13 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:18:22 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:18:31 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:18:40 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:18:49 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:54 hacking dhcpcd[1984]: wlan0: pid 0 deleted default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:18:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:19:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:19:19 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:19:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:19:37 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:19:46 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:19:55 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:20:04 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:20:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:20:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:20:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:20:42 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:20:46 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:20:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:01 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:10 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:34 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:37 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:21:55 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:22:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:22:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:22:25 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:22:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:22:34 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:22:43 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:22:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:23:01 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:23:13 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:23:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:23:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:23:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:23:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:23:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:06 hacking systemd[707]: Started PipeWire Multimedia Service.
Jul 12 15:24:06 hacking systemd[707]: Started Multimedia Service Session Manager.
Jul 12 15:24:06 hacking systemd[707]: Started PipeWire PulseAudio.
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit does not give us MinNiceLevel, using 0
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit does not give us MinNiceLevel, using 0
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit does not give us MinNiceLevel, using 0
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1
Jul 12 15:24:06 hacking wireplumber[5577]: default: Failed to get percentage from UPower: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 12 15:24:06 hacking wireplumber[5577]: wp-device: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 12 15:24:06 hacking wireplumber[5577]: s-monitors-libcamera: PipeWire's libcamera SPA plugin is missing or broken. Some camera types may not be supported.
Jul 12 15:24:06 hacking kernel: Bluetooth: RFCOMM TTY layer initialized
Jul 12 15:24:06 hacking kernel: Bluetooth: RFCOMM socket layer initialized
Jul 12 15:24:06 hacking kernel: Bluetooth: RFCOMM ver 1.11
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/ldac
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/aptx_hd
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_hd
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/aptx
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/aac
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aac
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/opus_g
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/opus_g
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/sbc
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/sbc
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_1
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_0
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/faststream
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/faststream_duplex
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/opus_05
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/opus_05
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/opus_05_duplex
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/opus_05_duplex
Jul 12 15:24:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:08 hacking wireplumber[5577]: m-portal-permissionstore: <WpPortalPermissionStorePlugin:0x55f931060150> Lookup: The name is not activatable (org.freedesktop.DBus.Error.ServiceUnknown)
Jul 12 15:24:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:25 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:34 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:43 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:24:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:13 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64
Jul 12 15:25:59 hacking kernel: ------------[ cut here ]------------
Jul 12 15:25:59 hacking kernel: frame on invalid queue - is on 8 and indicates 6
Jul 12 15:25:59 hacking kernel: WARNING: CPU: 7 PID: 590 at drivers/net/wireless/intel/iwlwifi/pcie/rx.c:1335 iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 15:25:59 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 cmac algif_hash algif_skcipher af_alg snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component ac97_bus snd_pcm_dmaengine crc8 bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp iwlmld kvm_intel mac80211 kvm libarc4 irqbypass snd_hda_intel polyval_clmulni snd_intel_dspcfg snd_intel_sdw_acpi polyval_generic ghash_clmulni_intel uvcvideo snd_hda_codec
Jul 12 15:25:59 hacking kernel: btusb processor_thermal_device_pci sha512_ssse3 processor_thermal_device videobuf2_vmalloc btrtl hid_multitouch r8153_ecm sha256_ssse3 processor_thermal_wt_hint uvc snd_hda_core btintel cdc_ether iwlwifi videobuf2_memops sha1_ssse3 videobuf2_v4l2 aesni_intel usbnet btbcm snd_hwdep videobuf2_common crypto_simd iTCO_wdt btmtk videodev intel_pmc_bxt snd_pcm cryptd processor_thermal_rfim cfg80211 mei_gsc_proxy intel_rapl_msr bluetooth iTCO_vendor_support e1000e mc mousedev r8152 rapl intel_lpss_pci processor_thermal_rapl intel_cstate snd_timer ptp intel_lpss intel_rapl_common mii ucsi_acpi intel_uncore libphy typec_ucsi joydev wmi_bmof pcspkr clevo_wmi(OE) mei_me rfkill pps_core processor_thermal_wt_req idma64 snd i2c_i801 thunderbolt intel_vpu typec processor_thermal_power_floor i2c_smbus mei clevo_acpi(OE) soundcore i2c_mux processor_thermal_mbox igen6_edac roles tuxedo_io(OE) intel_pmc_core int3403_thermal i2c_hid_acpi tuxedo_keyboard(OE) int340x_thermal_zone int3400_thermal i2c_hid pmt_telemetry
Jul 12 15:25:59 hacking kernel: tuxedo_compatibility_check(OE) intel_hid acpi_thermal_rel acpi_tad led_class_multicolor acpi_pad pmt_class pinctrl_meteorlake sparse_keymap mac_hid pkcs8_key_parser dm_mod crypto_user loop nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit drm_buddy sdhci_uhs2 nvme ttm sdhci nvme_core cqhci intel_gtt nvme_keyring mmc_core drm_display_helper serio_raw nvme_auth intel_vsec video cec wmi
Jul 12 15:25:59 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 12 15:25:59 hacking kernel: CPU: 7 UID: 0 PID: 590 Comm: irq/189-iwlwifi Tainted: G W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 12 15:25:59 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 12 15:25:59 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 12 15:25:59 hacking kernel: RIP: 0010:iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 15:25:59 hacking kernel: Code: 1f 84 00 00 00 00 00 90 48 83 c0 01 48 39 c8 0f 84 06 ff ff ff 38 10 75 ef e9 02 ff ff ff 48 c7 c7 d8 49 98 c1 e8 ae 70 43 e5 <0f> 0b e9 54 fe ff ff 8b 6c 24 3c 4c 8b 54 24 10 4c 8b 7c 24 40 80
Jul 12 15:25:59 hacking kernel: RSP: 0018:ffffcbfb00394d90 EFLAGS: 00010246
Jul 12 15:25:59 hacking kernel: RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000027
Jul 12 15:25:59 hacking kernel: RDX: ffff8b66601dcbc8 RSI: 0000000000000001 RDI: ffff8b66601dcbc0
Jul 12 15:25:59 hacking kernel: RBP: 000000000000057e R08: 0000000000000000 R09: 00000000ffffefff
Jul 12 15:25:59 hacking kernel: R10: ffffffffa8e60f20 R11: ffffcbfb00394c28 R12: ffff8b5f048c8028
Jul 12 15:25:59 hacking kernel: R13: 0000000000000000 R14: ffff8b5f21eb5380 R15: ffff8b5f06d8b000
Jul 12 15:25:59 hacking kernel: FS: 0000000000000000(0000) GS:ffff8b66b66ed000(0000) knlGS:0000000000000000
Jul 12 15:25:59 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 12 15:25:59 hacking kernel: CR2: 00007f5070fe09ac CR3: 0000000103bd4002 CR4: 0000000000f72ef0
Jul 12 15:25:59 hacking kernel: PKRU: 55555554
Jul 12 15:25:59 hacking kernel: Call Trace:
Jul 12 15:25:59 hacking kernel: <IRQ>
Jul 12 15:25:59 hacking kernel: iwl_pcie_napi_poll_msix+0x38/0xd0 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27]
Jul 12 15:25:59 hacking kernel: __napi_poll+0x2e/0x1e0
Jul 12 15:25:59 hacking kernel: net_rx_action+0x341/0x3e0
Jul 12 15:25:59 hacking kernel: ? enqueue_task+0xce/0x170
Jul 12 15:25:59 hacking kernel: handle_softirqs+0xe3/0x2a0
Jul 12 15:25:59 hacking kernel: ? handle_edge_irq+0x8b/0x220
Jul 12 15:25:59 hacking kernel: ? __pfx_irq_thread_fn+0x10/0x10
Jul 12 15:25:59 hacking kernel: do_softirq.part.0+0x3b/0x60
Jul 12 15:25:59 hacking kernel: </IRQ>
Jul 12 15:25:59 hacking kernel: <TASK>
Jul 12 15:25:59 hacking kernel: __local_bh_enable_ip+0x60/0x70
Jul 12 15:25:59 hacking kernel: iwl_pcie_irq_rx_msix_handler+0xcc/0x180 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27]
Jul 12 15:25:59 hacking kernel: irq_thread_fn+0x22/0x60
Jul 12 15:25:59 hacking kernel: irq_thread+0x1b0/0x310
Jul 12 15:25:59 hacking kernel: ? __pfx_irq_thread_dtor+0x10/0x10
Jul 12 15:25:59 hacking kernel: ? __pfx_irq_thread+0x10/0x10
Jul 12 15:25:59 hacking kernel: kthread+0xf9/0x240
Jul 12 15:25:59 hacking kernel: ? __pfx_kthread+0x10/0x10
Jul 12 15:25:59 hacking kernel: ret_from_fork+0x31/0x50
Jul 12 15:25:59 hacking kernel: ? __pfx_kthread+0x10/0x10
Jul 12 15:25:59 hacking kernel: ret_from_fork_asm+0x1a/0x30
Jul 12 15:25:59 hacking kernel: </TASK>
Jul 12 15:25:59 hacking kernel: ---[ end trace 0000000000000000 ]---
Jul 12 15:27:15 hacking systemd[1]: Starting Cleanup of Temporary Directories...
Jul 12 15:27:15 hacking systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully.
Jul 12 15:27:15 hacking systemd[1]: Finished Cleanup of Temporary Directories.
Jul 12 15:27:26 hacking systemd-logind[640]: Lid closed.
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: fe80::8e76:3fff:fea4:7623: router expired
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: part of a Router Advertisement expired
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: deleting default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:30:34 hacking kernel: i915 0000:00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment