Created
July 12, 2025 22:41
-
-
Save MaskRay/0fa33f70b28961febb578827b4565a47 to your computer and use it in GitHub Desktop.
Eurocom Ultra Blitz 2 freeze 15:25 kernel log, 15:33 freeze
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jul 12 15:12:14 hacking kernel: Linux version 6.15.6-arch1-1 (linux@archlinux) (gcc (GCC) 15.1.1 20250425, GNU ld (GNU Binutils) 2.44.0) #1 SMP PREEMPT_DYNAMIC Thu, 10 Jul 2025 17:10:18 +0000 | |
Jul 12 15:12:14 hacking kernel: Command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2 | |
Jul 12 15:12:14 hacking kernel: x86/split lock detection: #AC: crashing the kernel on kernel split_locks and warning on user-space split_locks | |
Jul 12 15:12:14 hacking kernel: BIOS-provided physical RAM map: | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009efff] usable | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x000000000009f000-0x00000000000fffff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000000100000-0x000000005df8afff] usable | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x000000005df8b000-0x000000005e88afff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x000000005e88b000-0x00000000606befff] usable | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000606bf000-0x00000000626befff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000626bf000-0x0000000067ebefff] ACPI NVS | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000067ebf000-0x0000000067ffefff] ACPI data | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000067fff000-0x0000000067ffffff] usable | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000068000000-0x00000000787fffff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000c0000000-0x00000000cfffffff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000fe010000-0x00000000fe010fff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000fed20000-0x00000000fed7ffff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved | |
Jul 12 15:12:14 hacking kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087fffffff] usable | |
Jul 12 15:12:14 hacking kernel: NX (Execute Disable) protection: active | |
Jul 12 15:12:14 hacking kernel: APIC: Static calls initialized | |
Jul 12 15:12:14 hacking kernel: efi: EFI v2.9 by INSYDE Corp. | |
Jul 12 15:12:14 hacking kernel: efi: TPMFinalLog=0x67e17000 ACPI=0x67ffe000 ACPI 2.0=0x67ffe014 SMBIOS=0x60dea000 MEMATTR=0x59090018 ESRT=0x5a526698 RNG=0x67f37f18 INITRD=0x5908ed18 TPMEventLog=0x67f2e018 | |
Jul 12 15:12:14 hacking kernel: random: crng init done | |
Jul 12 15:12:14 hacking kernel: efi: Remove mem91: MMIO range=[0xc0000000-0xcfffffff] (256MB) from e820 map | |
Jul 12 15:12:14 hacking kernel: e820: remove [mem 0xc0000000-0xcfffffff] reserved | |
Jul 12 15:12:14 hacking kernel: efi: Not removing mem92: MMIO range=[0xfe010000-0xfe010fff] (4KB) from e820 map | |
Jul 12 15:12:14 hacking kernel: efi: Remove mem94: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map | |
Jul 12 15:12:14 hacking kernel: e820: remove [mem 0xff000000-0xffffffff] reserved | |
Jul 12 15:12:14 hacking kernel: SMBIOS 3.6 present. | |
Jul 12 15:12:14 hacking kernel: DMI: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 12 15:12:14 hacking kernel: DMI: Memory slots populated: 1/2 | |
Jul 12 15:12:14 hacking kernel: tsc: Detected 3700.000 MHz processor | |
Jul 12 15:12:14 hacking kernel: tsc: Detected 3686.400 MHz TSC | |
Jul 12 15:12:14 hacking kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved | |
Jul 12 15:12:14 hacking kernel: e820: remove [mem 0x000a0000-0x000fffff] usable | |
Jul 12 15:12:14 hacking kernel: last_pfn = 0x880000 max_arch_pfn = 0x400000000 | |
Jul 12 15:12:14 hacking kernel: MTRR map: 7 entries (3 fixed + 4 variable; max 23), built from 10 variable MTRRs | |
Jul 12 15:12:14 hacking kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT | |
Jul 12 15:12:14 hacking kernel: x2apic: enabled by BIOS, switching to x2apic ops | |
Jul 12 15:12:14 hacking kernel: last_pfn = 0x68000 max_arch_pfn = 0x400000000 | |
Jul 12 15:12:14 hacking kernel: esrt: Reserving ESRT space from 0x000000005a526698 to 0x000000005a526720. | |
Jul 12 15:12:14 hacking kernel: e820: update [mem 0x5a526000-0x5a526fff] usable ==> reserved | |
Jul 12 15:12:14 hacking kernel: Using GB pages for direct mapping | |
Jul 12 15:12:14 hacking kernel: Secure boot disabled | |
Jul 12 15:12:14 hacking kernel: RAMDISK: [mem 0x52a4a000-0x54866fff] | |
Jul 12 15:12:14 hacking kernel: ACPI: Early table checksum verification disabled | |
Jul 12 15:12:14 hacking kernel: ACPI: RSDP 0x0000000067FFE014 000024 (v02 INSYDE) | |
Jul 12 15:12:14 hacking kernel: ACPI: XSDT 0x0000000067FCF188 00014C (v01 INSYDE ARL 00000002 01000013) | |
Jul 12 15:12:14 hacking kernel: ACPI: FACP 0x0000000067FC2000 000114 (v06 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: DSDT 0x0000000067F45000 07944F (v02 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: FACS 0x0000000067DEC000 000040 | |
Jul 12 15:12:14 hacking kernel: ACPI: UEFI 0x0000000067E16000 0001CF (v01 INSYDE H2O BIOS 00000001 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FFC000 000770 (v02 PmRef Cpu0Ist 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FFB000 0005FB (v02 PmRef Cpu0Hwp 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FFA000 0001AB (v02 PmRef Cpu0Psd 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF9000 000394 (v02 PmRef Cpu0Cst 00003001 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF7000 001BAF (v02 PmRef ApIst 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF5000 001620 (v02 PmRef ApHwp 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF3000 001349 (v02 PmRef ApPsd 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FF2000 000FBB (v02 PmRef ApCst 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FEE000 003BC8 (v02 CpuRef CpuSsdt 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: DTPR 0x0000000067FED000 000088 (v01 00000000 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FEA000 0021A0 (v02 INTEL IgfxSsdt 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FE0000 009A2C (v02 INTEL TcssSsdt 00001000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: ECDT 0x0000000067FDF000 000069 (v01 00000001 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FDE000 00077B (v02 INSYDE Tpm2Tabl 00001000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: TPM2 0x0000000067FDD000 00004C (v04 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FD2000 009168 (v02 DptfTb DptfTabl 00001000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: LPIT 0x0000000067FD1000 0000CC (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: WSMT 0x0000000067FD0000 000028 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FCD000 0015CD (v02 INSYDE PtidDevc 00001000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FC7000 005E42 (v02 INSYDE TbtTypeC 00000000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: DBGP 0x0000000067FFD000 000034 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: DBG2 0x0000000067FC6000 000054 (v00 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067FC4000 00189A (v02 INSYDE UsbCTabl 00001000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: NHLT 0x0000000067FC3000 0002E3 (v00 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: HPET 0x0000000067FC1000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: APIC 0x0000000067FC0000 000358 (v05 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: MCFG 0x0000000067FBF000 00003C (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: DMAR 0x0000000067F44000 000098 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F42000 0010C3 (v02 INTEL xh_mtlpR 00000000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F3F000 00281A (v02 SocGpe SocGpe 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F3C000 0028D3 (v02 SocCmn SocCmn 00003000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: SSDT 0x0000000067F3B000 0000F8 (v02 INSYDE PcdTabl 00001000 INTL 20200717) | |
Jul 12 15:12:14 hacking kernel: ACPI: FPDT 0x0000000067F3A000 000044 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: PHAT 0x0000000067F38000 000790 (v01 INSYDE ARL 00000005 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: BGRT 0x0000000067F39000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving FACP table memory at [mem 0x67fc2000-0x67fc2113] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DSDT table memory at [mem 0x67f45000-0x67fbe44e] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving FACS table memory at [mem 0x67dec000-0x67dec03f] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving UEFI table memory at [mem 0x67e16000-0x67e161ce] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffc000-0x67ffc76f] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffb000-0x67ffb5fa] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffa000-0x67ffa1aa] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff9000-0x67ff9393] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff7000-0x67ff8bae] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff5000-0x67ff661f] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff3000-0x67ff4348] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff2000-0x67ff2fba] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fee000-0x67ff1bc7] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DTPR table memory at [mem 0x67fed000-0x67fed087] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fea000-0x67fec19f] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fe0000-0x67fe9a2b] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving ECDT table memory at [mem 0x67fdf000-0x67fdf068] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fde000-0x67fde77a] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving TPM2 table memory at [mem 0x67fdd000-0x67fdd04b] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fd2000-0x67fdb167] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving LPIT table memory at [mem 0x67fd1000-0x67fd10cb] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving WSMT table memory at [mem 0x67fd0000-0x67fd0027] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fcd000-0x67fce5cc] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc7000-0x67fcce41] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DBGP table memory at [mem 0x67ffd000-0x67ffd033] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DBG2 table memory at [mem 0x67fc6000-0x67fc6053] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc4000-0x67fc5899] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving NHLT table memory at [mem 0x67fc3000-0x67fc32e2] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving HPET table memory at [mem 0x67fc1000-0x67fc1037] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving APIC table memory at [mem 0x67fc0000-0x67fc0357] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving MCFG table memory at [mem 0x67fbf000-0x67fbf03b] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving DMAR table memory at [mem 0x67f44000-0x67f44097] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f42000-0x67f430c2] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3f000-0x67f41819] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3c000-0x67f3e8d2] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3b000-0x67f3b0f7] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving FPDT table memory at [mem 0x67f3a000-0x67f3a043] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving PHAT table memory at [mem 0x67f38000-0x67f3878f] | |
Jul 12 15:12:14 hacking kernel: ACPI: Reserving BGRT table memory at [mem 0x67f39000-0x67f39037] | |
Jul 12 15:12:14 hacking kernel: APIC: Switched APIC routing to: cluster x2apic | |
Jul 12 15:12:14 hacking kernel: No NUMA configuration found | |
Jul 12 15:12:14 hacking kernel: Faking a node at [mem 0x0000000000000000-0x000000087fffffff] | |
Jul 12 15:12:14 hacking kernel: NODE_DATA(0) allocated [mem 0x87ffd5280-0x87fffffff] | |
Jul 12 15:12:14 hacking kernel: Zone ranges: | |
Jul 12 15:12:14 hacking kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] | |
Jul 12 15:12:14 hacking kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] | |
Jul 12 15:12:14 hacking kernel: Normal [mem 0x0000000100000000-0x000000087fffffff] | |
Jul 12 15:12:14 hacking kernel: Device empty | |
Jul 12 15:12:14 hacking kernel: Movable zone start for each node | |
Jul 12 15:12:14 hacking kernel: Early memory node ranges | |
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] | |
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000000100000-0x000000005df8afff] | |
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x000000005e88b000-0x00000000606befff] | |
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000067fff000-0x0000000067ffffff] | |
Jul 12 15:12:14 hacking kernel: node 0: [mem 0x0000000100000000-0x000000087fffffff] | |
Jul 12 15:12:14 hacking kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087fffffff] | |
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA: 1 pages in unavailable ranges | |
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA: 97 pages in unavailable ranges | |
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA32: 2304 pages in unavailable ranges | |
Jul 12 15:12:14 hacking kernel: On node 0, zone DMA32: 31040 pages in unavailable ranges | |
Jul 12 15:12:14 hacking kernel: ACPI: PM-Timer IO Port: 0x1808 | |
Jul 12 15:12:14 hacking kernel: ACPI: X2APIC_NMI (uid[0xffffffff] high level lint[0x1]) | |
Jul 12 15:12:14 hacking kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 | |
Jul 12 15:12:14 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) | |
Jul 12 15:12:14 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) | |
Jul 12 15:12:14 hacking kernel: ACPI: Using ACPI (MADT) for SMP configuration information | |
Jul 12 15:12:14 hacking kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 | |
Jul 12 15:12:14 hacking kernel: e820: update [mem 0x58516000-0x585a6fff] usable ==> reserved | |
Jul 12 15:12:14 hacking kernel: TSC deadline timer available | |
Jul 12 15:12:14 hacking kernel: CPU topo: Max. logical packages: 1 | |
Jul 12 15:12:14 hacking kernel: CPU topo: Max. logical dies: 1 | |
Jul 12 15:12:14 hacking kernel: CPU topo: Max. dies per package: 1 | |
Jul 12 15:12:14 hacking kernel: CPU topo: Max. threads per core: 1 | |
Jul 12 15:12:14 hacking kernel: CPU topo: Num. cores per package: 16 | |
Jul 12 15:12:14 hacking kernel: CPU topo: Num. threads per package: 16 | |
Jul 12 15:12:14 hacking kernel: CPU topo: Allowing 16 present CPUs plus 0 hotplug CPUs | |
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] | |
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x000fffff] | |
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x58516000-0x585a6fff] | |
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5a526000-0x5a526fff] | |
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5df8b000-0x5e88afff] | |
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x606bf000-0x67ffefff] | |
Jul 12 15:12:14 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x68000000-0xffffffff] | |
Jul 12 15:12:14 hacking kernel: [mem 0x78800000-0xfe00ffff] available for PCI devices | |
Jul 12 15:12:14 hacking kernel: Booting paravirtualized kernel on bare hardware | |
Jul 12 15:12:14 hacking kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns | |
Jul 12 15:12:14 hacking kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 | |
Jul 12 15:12:14 hacking kernel: percpu: Embedded 62 pages/cpu s217088 r8192 d28672 u262144 | |
Jul 12 15:12:14 hacking kernel: pcpu-alloc: s217088 r8192 d28672 u262144 alloc=1*2097152 | |
Jul 12 15:12:14 hacking kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 | |
Jul 12 15:12:14 hacking kernel: Kernel command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2 | |
Jul 12 15:12:14 hacking kernel: printk: log buffer data + meta data: 131072 + 458752 = 589824 bytes | |
Jul 12 15:12:14 hacking kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: software IO TLB: area num 16. | |
Jul 12 15:12:14 hacking kernel: Fallback order for Node 0: 0 | |
Jul 12 15:12:14 hacking kernel: Built 1 zonelists, mobility grouping on. Total pages: 8256862 | |
Jul 12 15:12:14 hacking kernel: Policy zone: Normal | |
Jul 12 15:12:14 hacking kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off | |
Jul 12 15:12:14 hacking kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 | |
Jul 12 15:12:14 hacking kernel: ftrace: allocating 55582 entries in 220 pages | |
Jul 12 15:12:14 hacking kernel: ftrace: allocated 220 pages with 5 groups | |
Jul 12 15:12:14 hacking kernel: Dynamic Preempt: full | |
Jul 12 15:12:14 hacking kernel: rcu: Preemptible hierarchical RCU implementation. | |
Jul 12 15:12:14 hacking kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=16. | |
Jul 12 15:12:14 hacking kernel: rcu: RCU priority boosting: priority 1 delay 500 ms. | |
Jul 12 15:12:14 hacking kernel: Trampoline variant of Tasks RCU enabled. | |
Jul 12 15:12:14 hacking kernel: Rude variant of Tasks RCU enabled. | |
Jul 12 15:12:14 hacking kernel: Tracing variant of Tasks RCU enabled. | |
Jul 12 15:12:14 hacking kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. | |
Jul 12 15:12:14 hacking kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 | |
Jul 12 15:12:14 hacking kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16. | |
Jul 12 15:12:14 hacking kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16. | |
Jul 12 15:12:14 hacking kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16. | |
Jul 12 15:12:14 hacking kernel: NR_IRQS: 524544, nr_irqs: 2184, preallocated irqs: 16 | |
Jul 12 15:12:14 hacking kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. | |
Jul 12 15:12:14 hacking kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) | |
Jul 12 15:12:14 hacking kernel: Console: colour dummy device 80x25 | |
Jul 12 15:12:14 hacking kernel: printk: legacy console [tty0] enabled | |
Jul 12 15:12:14 hacking kernel: ACPI: Core revision 20240827 | |
Jul 12 15:12:14 hacking kernel: hpet: HPET dysfunctional in PC10. Force disabled. | |
Jul 12 15:12:14 hacking kernel: APIC: Switch to symmetric I/O mode setup | |
Jul 12 15:12:14 hacking kernel: DMAR: Host address width 42 | |
Jul 12 15:12:14 hacking kernel: DMAR: DRHD base: 0x000000fc800000 flags: 0x0 | |
Jul 12 15:12:14 hacking kernel: DMAR: dmar0: reg_base_addr fc800000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0ef5e | |
Jul 12 15:12:14 hacking kernel: DMAR: DRHD base: 0x000000fc801000 flags: 0x1 | |
Jul 12 15:12:14 hacking kernel: DMAR: dmar1: reg_base_addr fc801000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0efde | |
Jul 12 15:12:14 hacking kernel: DMAR: SATC flags: 0x1 | |
Jul 12 15:12:14 hacking kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfc801000 IOMMU 1 | |
Jul 12 15:12:14 hacking kernel: DMAR-IR: HPET id 0 under DRHD base 0xfc801000 | |
Jul 12 15:12:14 hacking kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. | |
Jul 12 15:12:14 hacking kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode | |
Jul 12 15:12:14 hacking kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns | |
Jul 12 15:12:14 hacking kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7372.80 BogoMIPS (lpj=3686400) | |
Jul 12 15:12:14 hacking kernel: CPU0: Thermal monitoring enabled (TM1) | |
Jul 12 15:12:14 hacking kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated | |
Jul 12 15:12:14 hacking kernel: CET detected: Indirect Branch Tracking enabled | |
Jul 12 15:12:14 hacking kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 | |
Jul 12 15:12:14 hacking kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 | |
Jul 12 15:12:14 hacking kernel: process: using mwait in idle threads | |
Jul 12 15:12:14 hacking kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |
Jul 12 15:12:14 hacking kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS | |
Jul 12 15:12:14 hacking kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier | |
Jul 12 15:12:14 hacking kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl | |
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' | |
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' | |
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' | |
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' | |
Jul 12 15:12:14 hacking kernel: x86/fpu: Supporting XSAVE feature 0x800: 'Control-flow User registers' | |
Jul 12 15:12:14 hacking kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 | |
Jul 12 15:12:14 hacking kernel: x86/fpu: xstate_offset[9]: 832, xstate_sizes[9]: 8 | |
Jul 12 15:12:14 hacking kernel: x86/fpu: xstate_offset[11]: 840, xstate_sizes[11]: 16 | |
Jul 12 15:12:14 hacking kernel: x86/fpu: Enabled xstate features 0xa07, context size is 856 bytes, using 'compacted' format. | |
Jul 12 15:12:14 hacking kernel: Freeing SMP alternatives memory: 52K | |
Jul 12 15:12:14 hacking kernel: pid_max: default: 32768 minimum: 301 | |
Jul 12 15:12:14 hacking kernel: LSM: initializing lsm=capability,landlock,lockdown,yama,bpf | |
Jul 12 15:12:14 hacking kernel: landlock: Up and running. | |
Jul 12 15:12:14 hacking kernel: Yama: becoming mindful. | |
Jul 12 15:12:14 hacking kernel: LSM support for eBPF active | |
Jul 12 15:12:14 hacking kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: smpboot: CPU0: Intel(R) Core(TM) Ultra 7 255H (family: 0x6, model: 0xc5, stepping: 0x2) | |
Jul 12 15:12:14 hacking kernel: Performance Events: XSAVE Architectural LBR, PEBS fmt5+-baseline, AnyThread deprecated, ArrowLake-H Hybrid events, 32-deep LBR, full-width counters, Intel PMU driver. | |
Jul 12 15:12:14 hacking kernel: core: cpu_core PMU driver: | |
Jul 12 15:12:14 hacking kernel: ... version: 5 | |
Jul 12 15:12:14 hacking kernel: ... bit width: 48 | |
Jul 12 15:12:14 hacking kernel: ... generic registers: 10 | |
Jul 12 15:12:14 hacking kernel: ... value mask: 0000ffffffffffff | |
Jul 12 15:12:14 hacking kernel: ... max period: 00007fffffffffff | |
Jul 12 15:12:14 hacking kernel: ... fixed-purpose events: 4 | |
Jul 12 15:12:14 hacking kernel: ... event mask: 0001000f000003ff | |
Jul 12 15:12:14 hacking kernel: signal: max sigframe size: 3632 | |
Jul 12 15:12:14 hacking kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1411 | |
Jul 12 15:12:14 hacking kernel: rcu: Hierarchical SRCU implementation. | |
Jul 12 15:12:14 hacking kernel: rcu: Max phase no-delay instances is 400. | |
Jul 12 15:12:14 hacking kernel: Timer migration: 2 hierarchy levels; 8 children per group; 2 crossnode level | |
Jul 12 15:12:14 hacking kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. | |
Jul 12 15:12:14 hacking kernel: smp: Bringing up secondary CPUs ... | |
Jul 12 15:12:14 hacking kernel: smpboot: x86: Booting SMP configuration: | |
Jul 12 15:12:14 hacking kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 | |
Jul 12 15:12:14 hacking kernel: core: cpu_atom PMU driver: | |
Jul 12 15:12:14 hacking kernel: ... version: 5 | |
Jul 12 15:12:14 hacking kernel: ... bit width: 48 | |
Jul 12 15:12:14 hacking kernel: ... generic registers: 8 | |
Jul 12 15:12:14 hacking kernel: ... value mask: 0000ffffffffffff | |
Jul 12 15:12:14 hacking kernel: ... max period: 00007fffffffffff | |
Jul 12 15:12:14 hacking kernel: ... fixed-purpose events: 6 | |
Jul 12 15:12:14 hacking kernel: ... event mask: 00000077000000ff | |
Jul 12 15:12:14 hacking kernel: core: cpu_lowpower PMU driver: | |
Jul 12 15:12:14 hacking kernel: ... version: 5 | |
Jul 12 15:12:14 hacking kernel: ... bit width: 48 | |
Jul 12 15:12:14 hacking kernel: ... generic registers: 8 | |
Jul 12 15:12:14 hacking kernel: ... value mask: 0000ffffffffffff | |
Jul 12 15:12:14 hacking kernel: ... max period: 00007fffffffffff | |
Jul 12 15:12:14 hacking kernel: ... fixed-purpose events: 3 | |
Jul 12 15:12:14 hacking kernel: ... event mask: 00000007000000ff | |
Jul 12 15:12:14 hacking kernel: smp: Brought up 1 node, 16 CPUs | |
Jul 12 15:12:14 hacking kernel: smpboot: Total of 16 processors activated (117964.80 BogoMIPS) | |
Jul 12 15:12:14 hacking kernel: Memory: 32269760K/33027448K available (19692K kernel code, 2940K rwdata, 16528K rodata, 4640K init, 5028K bss, 729692K reserved, 0K cma-reserved) | |
Jul 12 15:12:14 hacking kernel: devtmpfs: initialized | |
Jul 12 15:12:14 hacking kernel: x86/mm: Memory block size: 128MB | |
Jul 12 15:12:14 hacking kernel: ACPI: PM: Registering ACPI NVS region [mem 0x626bf000-0x67ebefff] (92274688 bytes) | |
Jul 12 15:12:14 hacking kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns | |
Jul 12 15:12:14 hacking kernel: posixtimers hash table entries: 8192 (order: 5, 131072 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: pinctrl core: initialized pinctrl subsystem | |
Jul 12 15:12:14 hacking kernel: PM: RTC time: 22:12:09, date: 2025-07-12 | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family | |
Jul 12 15:12:14 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations | |
Jul 12 15:12:14 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations | |
Jul 12 15:12:14 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations | |
Jul 12 15:12:14 hacking kernel: audit: initializing netlink subsys (disabled) | |
Jul 12 15:12:14 hacking kernel: audit: type=2000 audit(1752358329.013:1): state=initialized audit_enabled=0 res=1 | |
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'fair_share' | |
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'bang_bang' | |
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'step_wise' | |
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'user_space' | |
Jul 12 15:12:14 hacking kernel: thermal_sys: Registered thermal governor 'power_allocator' | |
Jul 12 15:12:14 hacking kernel: cpuidle: using governor ladder | |
Jul 12 15:12:14 hacking kernel: cpuidle: using governor menu | |
Jul 12 15:12:14 hacking kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 | |
Jul 12 15:12:14 hacking kernel: PCI: ECAM [mem 0xc0000000-0xcfffffff] (base 0xc0000000) for domain 0000 [bus 00-ff] | |
Jul 12 15:12:14 hacking kernel: PCI: Using configuration type 1 for base access | |
Jul 12 15:12:14 hacking kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. | |
Jul 12 15:12:14 hacking kernel: HugeTLB: allocation took 0ms with hugepage_allocation_threads=4 | |
Jul 12 15:12:14 hacking kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages | |
Jul 12 15:12:14 hacking kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page | |
Jul 12 15:12:14 hacking kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages | |
Jul 12 15:12:14 hacking kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page | |
Jul 12 15:12:14 hacking kernel: raid6: skipped pq benchmark and selected avx2x4 | |
Jul 12 15:12:14 hacking kernel: raid6: using avx2x2 recovery algorithm | |
Jul 12 15:12:14 hacking kernel: ACPI: Added _OSI(Module Device) | |
Jul 12 15:12:14 hacking kernel: ACPI: Added _OSI(Processor Device) | |
Jul 12 15:12:14 hacking kernel: ACPI: Added _OSI(Processor Aggregator Device) | |
Jul 12 15:12:14 hacking kernel: ACPI: 21 ACPI AML tables successfully acquired and loaded | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: EC started | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: interrupt blocked | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: Boot ECDT EC used to handle transactions | |
Jul 12 15:12:14 hacking kernel: ACPI: USB4 _OSC: OS supports USB3+ DisplayPort+ PCIe+ XDomain+ | |
Jul 12 15:12:14 hacking kernel: ACPI: USB4 _OSC: OS controls USB3+ DisplayPort+ PCIe+ XDomain+ | |
Jul 12 15:12:14 hacking kernel: ACPI: Interpreter enabled | |
Jul 12 15:12:14 hacking kernel: ACPI: PM: (supports S0 S4 S5) | |
Jul 12 15:12:14 hacking kernel: ACPI: Using IOAPIC for interrupt routing | |
Jul 12 15:12:14 hacking kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug | |
Jul 12 15:12:14 hacking kernel: PCI: Ignoring E820 reservations for host bridge windows | |
Jul 12 15:12:14 hacking kernel: ACPI: Enabled 9 GPEs in block 00 to 7F | |
Jul 12 15:12:14 hacking kernel: ACPI: Enabled 8 GPEs in block 80 to DF | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.BTRT: New power resource | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.DBTR: New power resource | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.RP08.PXSX.WRST: New power resource | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.TBT0: New power resource | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.TBT1: New power resource | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.D3C_: New power resource | |
Jul 12 15:12:14 hacking kernel: ACPI: \PIN_: New power resource | |
Jul 12 15:12:14 hacking kernel: ACPI: PCI Root Bridge [PC00] (domain 0000 [bus 00-fe]) | |
Jul 12 15:12:14 hacking kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] | |
Jul 12 15:12:14 hacking kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] | |
Jul 12 15:12:14 hacking kernel: PCI host bridge to bus 0000:00 | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xbfffffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x4000000000-0x3ffbfffffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: root bus resource [bus 00-fe] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:00.0: [8086:7d06] type 00 class 0x060000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: [8086:7dd1] type 00 class 0x030000 PCIe Root Complex Integrated Endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: BAR 0 [mem 0x4818000000-0x4818ffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: BAR 2 [mem 0x4000000000-0x400fffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: DMAR: Skip IOMMU disabling for graphics | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: PME# supported from D0 D3hot | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x00ffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x06ffffff 64bit pref]: contains BAR 0 for 7 VFs | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:04.0: [8086:7d03] type 00 class 0x118000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:04.0: BAR 0 [mem 0x4819280000-0x481929ffff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: [8086:7ecb] type 01 class 0x060400 PCIe Root Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PME# supported from D0 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PTM enabled (root), 4ns granularity | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: [8086:7ec4] type 01 class 0x060400 PCIe Root Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PME# supported from D0 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PTM enabled (root), 4ns granularity | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: [8086:774c] type 00 class 0x088000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: BAR 0 [mem 0x48192bf000-0x48192bffff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: [8086:7d0d] type 00 class 0x118000 PCIe Root Complex Integrated Endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: BAR 0 [mem 0x4819240000-0x481927ffff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: enabling Extended Tags | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: [8086:7d1d] type 00 class 0x120000 PCIe Root Complex Integrated Endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: BAR 0 [mem 0x4810000000-0x4817ffffff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: BAR 4 [mem 0x48192be000-0x48192befff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: [8086:7ec0] type 00 class 0x0c0330 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: BAR 0 [mem 0x48192a0000-0x48192affff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: PME# supported from D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: [8086:7ec2] type 00 class 0x0c0340 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: BAR 0 [mem 0x4819200000-0x481923ffff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: BAR 2 [mem 0x48192bd000-0x48192bdfff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: supports D1 D2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: [8086:777d] type 00 class 0x0c0330 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: BAR 0 [mem 0x86320000-0x8632ffff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: [8086:777f] type 00 class 0x050000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: BAR 0 [mem 0x48192b4000-0x48192b7fff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: BAR 2 [mem 0x48192bc000-0x48192bcfff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: [8086:7778] type 00 class 0x0c8000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x00000000-0x00000fff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: [8086:7779] type 00 class 0x0c8000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x00000000-0x00000fff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: [8086:7770] type 00 class 0x078000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: BAR 0 [mem 0x48192b9000-0x48192b9fff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: PME# supported from D3hot | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: [8086:773d] type 01 class 0x060400 PCIe Root Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PTM enabled (root), 4ns granularity | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: [8086:773f] type 01 class 0x060400 PCIe Root Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PTM enabled (root), 4ns granularity | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.0: [8086:7702] type 00 class 0x060100 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: [8086:7728] type 00 class 0x040380 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: BAR 0 [mem 0x48192b0000-0x48192b3fff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: BAR 4 [mem 0x4819000000-0x48191fffff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: [8086:7722] type 00 class 0x0c0500 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: BAR 0 [mem 0x48192b8000-0x48192b80ff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: BAR 4 [io 0xefa0-0xefbf] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: [8086:7723] type 00 class 0x0c8000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: [8086:550a] type 00 class 0x020000 conventional PCI endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: BAR 0 [mem 0x86300000-0x8631ffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: PME# supported from D0 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:01:00.0: [144d:a80d] type 00 class 0x010802 PCIe Endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:01:00.0: BAR 0 [mem 0x86200000-0x86203fff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Upstream Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 00] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x0000-0x0fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: enabling Extended Tags | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: supports D1 D2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PTM enabled, 4ns granularity | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 00] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge window [io 0x0000-0x0fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: enabling Extended Tags | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: supports D1 D2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 00] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x0000-0x0fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: enabling Extended Tags | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: supports D1 D2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 00] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x0000-0x0fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: enabling Extended Tags | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: supports D1 D2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 00] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x0000-0x0fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: enabling Extended Tags | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: supports D1 D2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 00] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge window [io 0x0000-0x0fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: enabling Extended Tags | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: supports D1 D2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04-2b] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:04: busn_res: [bus 04-2b] end is updated to 04 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-2b] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-2b] end is updated to 11 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-2b] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-2b] end is updated to 1e | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2b] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2b] end is updated to 2a | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] end is updated to 2b | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] end is updated to 2b | |
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: [1217:8621] type 00 class 0x080501 PCIe Endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: BAR 0 [mem 0x86101000-0x86101fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: BAR 1 [mem 0x86100000-0x861007ff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: PME# supported from D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c] | |
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: [8086:272b] type 00 class 0x028000 PCIe Endpoint | |
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: BAR 0 [mem 0x86000000-0x86003fff 64bit] | |
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: PME# supported from D0 D3hot D3cold | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d] | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PEPD: Duplicate LPS0 _DSM functions (mask: 0x1) | |
Jul 12 15:12:14 hacking kernel: Low-power S0 idle used by default for system suspend | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: interrupt unblocked | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: event unblocked | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 | |
Jul 12 15:12:14 hacking kernel: ACPI: EC: GPE=0x6e | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: Boot ECDT EC initialization complete | |
Jul 12 15:12:14 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: EC: Used to handle transactions and events | |
Jul 12 15:12:14 hacking kernel: iommu: Default domain type: Translated | |
Jul 12 15:12:14 hacking kernel: iommu: DMA domain TLB invalidation policy: lazy mode | |
Jul 12 15:12:14 hacking kernel: SCSI subsystem initialized | |
Jul 12 15:12:14 hacking kernel: libata version 3.00 loaded. | |
Jul 12 15:12:14 hacking kernel: ACPI: bus type USB registered | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver usbfs | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver hub | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new device driver usb | |
Jul 12 15:12:14 hacking kernel: EDAC MC: Ver: 3.0.0 | |
Jul 12 15:12:14 hacking kernel: efivars: Registered efivars operations | |
Jul 12 15:12:14 hacking kernel: NetLabel: Initializing | |
Jul 12 15:12:14 hacking kernel: NetLabel: domain hash size = 128 | |
Jul 12 15:12:14 hacking kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO | |
Jul 12 15:12:14 hacking kernel: NetLabel: unlabeled traffic allowed by default | |
Jul 12 15:12:14 hacking kernel: mctp: management component transport protocol core | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_MCTP protocol family | |
Jul 12 15:12:14 hacking kernel: PCI: Using ACPI for IRQ routing | |
Jul 12 15:12:14 hacking kernel: PCI: pci_cache_line_size set to 64 bytes | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff]: can't claim; no compatible bridge window | |
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x0009f000-0x0009ffff] | |
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x58516000-0x5bffffff] | |
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x5a526000-0x5bffffff] | |
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x5df8b000-0x5fffffff] | |
Jul 12 15:12:14 hacking kernel: e820: reserve RAM buffer [mem 0x606bf000-0x63ffffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: vgaarb: bridge control possible | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none | |
Jul 12 15:12:14 hacking kernel: vgaarb: loaded | |
Jul 12 15:12:14 hacking kernel: clocksource: Switched to clocksource tsc-early | |
Jul 12 15:12:14 hacking kernel: VFS: Disk quotas dquot_6.6.0 | |
Jul 12 15:12:14 hacking kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) | |
Jul 12 15:12:14 hacking kernel: pnp: PnP ACPI init | |
Jul 12 15:12:14 hacking kernel: system 00:00: [io 0x3322-0x3323] has been reserved | |
Jul 12 15:12:14 hacking kernel: system 00:01: [io 0x1854-0x1857] has been reserved | |
Jul 12 15:12:14 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfedc0000-0xfedc7fff] has been reserved | |
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xc0000000-0xcfffffff] has been reserved | |
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfed20000-0xfed7ffff] could not be reserved | |
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfc800000-0xfc81ffff] could not be reserved | |
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfed45000-0xfed8ffff] could not be reserved | |
Jul 12 15:12:14 hacking kernel: system 00:03: [mem 0xfee00000-0xfeefffff] has been reserved | |
Jul 12 15:12:14 hacking kernel: system 00:04: [io 0x2000-0x20fe] has been reserved | |
Jul 12 15:12:14 hacking kernel: pnp: PnP ACPI: found 6 devices | |
Jul 12 15:12:14 hacking kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_INET protocol family | |
Jul 12 15:12:14 hacking kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: TCP: Hash tables configured (established 262144 bind 65536) | |
Jul 12 15:12:14 hacking kernel: MPTCP token hash table entries: 32768 (order: 7, 786432 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: UDP hash table entries: 16384 (order: 8, 1048576 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: UDP-Lite hash table entries: 16384 (order: 8, 1048576 bytes, linear) | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_XDP protocol family | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x1000-0x0fff] to [bus 05-11] add_size 1000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 05-11] add_size 200000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 05-11] add_size 200000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x1000-0x0fff] to [bus 12-1e] add_size 1000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 12-1e] add_size 200000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 12-1e] add_size 200000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x1000-0x0fff] to [bus 1f-2a] add_size 1000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 1f-2a] add_size 200000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 1f-2a] add_size 200000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x1000-0x0fff] to [bus 03-2b] add_size 3000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff 64bit pref] to [bus 03-2b] add_size 600000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff] to [bus 03-2b] add_size 600000 add_align 100000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 02-2b] add_size 4000 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x481a000000-0x4820ffffff 64bit pref]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x48192ba000-0x48192bafff 64bit]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x48192bb000-0x48192bbfff 64bit]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0x86330000-0x86330fff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff]: assigned | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-11] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-1e] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2a] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d] | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xbfffffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:00: resource 8 [mem 0x4000000000-0x3ffbfffffff window] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:01: resource 1 [mem 0x86200000-0x862fffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:02: resource 0 [io 0x4000-0x7fff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:02: resource 1 [mem 0x80000000-0x85ffffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:02: resource 2 [mem 0x4010000000-0x480fffffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x6fff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: resource 1 [mem 0x80000000-0x808fffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: resource 2 [mem 0x4010000000-0x40108fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: resource 1 [mem 0x80000000-0x801fffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: resource 2 [mem 0x4010000000-0x40101fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: resource 0 [io 0x5000-0x5fff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: resource 1 [mem 0x80200000-0x803fffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: resource 2 [mem 0x4010200000-0x40103fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: resource 0 [io 0x6000-0x6fff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: resource 1 [mem 0x80400000-0x805fffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: resource 2 [mem 0x4010400000-0x40105fffff 64bit pref] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2c: resource 1 [mem 0x86100000-0x861fffff] | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2d: resource 1 [mem 0x86000000-0x860fffff] | |
Jul 12 15:12:14 hacking kernel: PCI: CLS 64 bytes, default 64 | |
Jul 12 15:12:14 hacking kernel: DMAR: Intel-IOMMU force enabled due to platform opt in | |
Jul 12 15:12:14 hacking kernel: DMAR: No RMRR found | |
Jul 12 15:12:14 hacking kernel: DMAR: No ATSR found | |
Jul 12 15:12:14 hacking kernel: DMAR: dmar0: Using Queued invalidation | |
Jul 12 15:12:14 hacking kernel: DMAR: dmar1: Using Queued invalidation | |
Jul 12 15:12:14 hacking kernel: Trying to unpack rootfs image as initramfs... | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:02.0: Adding to iommu group 0 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:00.0: Adding to iommu group 1 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:04.0: Adding to iommu group 2 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:06.0: Adding to iommu group 3 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:07.0: Adding to iommu group 4 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: Adding to iommu group 5 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0a.0: Adding to iommu group 6 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: Adding to iommu group 7 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.0: Adding to iommu group 8 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0d.2: Adding to iommu group 8 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.0: Adding to iommu group 9 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:14.2: Adding to iommu group 9 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.0: Adding to iommu group 10 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:15.1: Adding to iommu group 10 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:16.0: Adding to iommu group 11 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.0: Adding to iommu group 12 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1c.7: Adding to iommu group 13 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.0: Adding to iommu group 14 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.3: Adding to iommu group 14 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.4: Adding to iommu group 14 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.5: Adding to iommu group 14 | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:1f.6: Adding to iommu group 14 | |
Jul 12 15:12:14 hacking kernel: pci 0000:01:00.0: Adding to iommu group 15 | |
Jul 12 15:12:14 hacking kernel: pci 0000:02:00.0: Adding to iommu group 16 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:00.0: Adding to iommu group 17 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:01.0: Adding to iommu group 18 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:02.0: Adding to iommu group 19 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:03.0: Adding to iommu group 20 | |
Jul 12 15:12:14 hacking kernel: pci 0000:03:04.0: Adding to iommu group 21 | |
Jul 12 15:12:14 hacking kernel: pci 0000:2c:00.0: Adding to iommu group 22 | |
Jul 12 15:12:14 hacking kernel: pci 0000:2d:00.0: Adding to iommu group 23 | |
Jul 12 15:12:14 hacking kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O | |
Jul 12 15:12:14 hacking kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) | |
Jul 12 15:12:14 hacking kernel: software IO TLB: mapped [mem 0x000000004ea4a000-0x0000000052a4a000] (64MB) | |
Jul 12 15:12:14 hacking kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns | |
Jul 12 15:12:14 hacking kernel: clocksource: Switched to clocksource tsc | |
Jul 12 15:12:14 hacking kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) | |
Jul 12 15:12:14 hacking kernel: Initialise system trusted keyrings | |
Jul 12 15:12:14 hacking kernel: Key type blacklist registered | |
Jul 12 15:12:14 hacking kernel: workingset: timestamp_bits=36 max_order=23 bucket_order=0 | |
Jul 12 15:12:14 hacking kernel: fuse: init (API version 7.43) | |
Jul 12 15:12:14 hacking kernel: integrity: Platform Keyring initialized | |
Jul 12 15:12:14 hacking kernel: integrity: Machine keyring initialized | |
Jul 12 15:12:14 hacking kernel: xor: automatically using best checksumming function avx | |
Jul 12 15:12:14 hacking kernel: Key type asymmetric registered | |
Jul 12 15:12:14 hacking kernel: Asymmetric key parser 'x509' registered | |
Jul 12 15:12:14 hacking kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) | |
Jul 12 15:12:14 hacking kernel: io scheduler mq-deadline registered | |
Jul 12 15:12:14 hacking kernel: io scheduler kyber registered | |
Jul 12 15:12:14 hacking kernel: io scheduler bfq registered | |
Jul 12 15:12:14 hacking kernel: ledtrig-cpu: registered to indicate activity on CPUs | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:06.0: PME: Signaling with IRQ 122 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:06.0: AER: enabled with IRQ 122 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: PME: Signaling with IRQ 123 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: AER: enabled with IRQ 123 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 124 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 124 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.7: PME: Signaling with IRQ 125 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:1c.7: AER: enabled with IRQ 125 | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:02:00.0: enabling device (0000 -> 0003) | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:01.0: enabling device (0000 -> 0003) | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:01.0: pciehp: Slot #1 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:02.0: enabling device (0000 -> 0003) | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:02.0: pciehp: Slot #2 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:03.0: enabling device (0000 -> 0003) | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:03.0: pciehp: Slot #3 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 12 15:12:14 hacking kernel: Monitor-Mwait will be used to enter C-1 state | |
Jul 12 15:12:14 hacking kernel: Monitor-Mwait will be used to enter C-2 state | |
Jul 12 15:12:14 hacking kernel: Monitor-Mwait will be used to enter C-3 state | |
Jul 12 15:12:14 hacking kernel: intel_idle: max_cstate 2 reached | |
Jul 12 15:12:14 hacking kernel: ACPI: AC: AC Adapter [AC] (on-line) | |
Jul 12 15:12:14 hacking kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 | |
Jul 12 15:12:14 hacking kernel: ACPI: button: Power Button [PWRB] | |
Jul 12 15:12:14 hacking kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 | |
Jul 12 15:12:14 hacking kernel: ACPI: button: Sleep Button [SLPB] | |
Jul 12 15:12:14 hacking kernel: input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0D:00/input/input2 | |
Jul 12 15:12:14 hacking kernel: ACPI: button: Lid Switch [LID0] | |
Jul 12 15:12:14 hacking kernel: Freeing initrd memory: 30836K | |
Jul 12 15:12:14 hacking kernel: thermal LNXTHERM:00: registered as thermal_zone0 | |
Jul 12 15:12:14 hacking kernel: ACPI: thermal: Thermal Zone [TZ0] (25 C) | |
Jul 12 15:12:14 hacking kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled | |
Jul 12 15:12:14 hacking kernel: ACPI: battery: Slot [BAT0] (battery present) | |
Jul 12 15:12:14 hacking kernel: hpet_acpi_add: no address or irqs in _CRS | |
Jul 12 15:12:14 hacking kernel: Non-volatile memory driver v1.3 | |
Jul 12 15:12:14 hacking kernel: Linux agpgart interface v0.103 | |
Jul 12 15:12:14 hacking kernel: tpm_tis IFX1523:00: 2.0 TPM (device-id 0x1D, rev-id 54) | |
Jul 12 15:12:14 hacking kernel: ACPI: bus type drm_connector registered | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 1 | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810 | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 2 | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:0d.0: Host supports USB 3.2 Enhanced SuperSpeed | |
Jul 12 15:12:14 hacking kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15 | |
Jul 12 15:12:14 hacking kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 12 15:12:14 hacking kernel: usb usb1: Product: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: usb usb1: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 12 15:12:14 hacking kernel: usb usb1: SerialNumber: 0000:00:0d.0 | |
Jul 12 15:12:14 hacking kernel: hub 1-0:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 1-0:1.0: 1 port detected | |
Jul 12 15:12:14 hacking kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15 | |
Jul 12 15:12:14 hacking kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 12 15:12:14 hacking kernel: usb usb2: Product: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: usb usb2: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 12 15:12:14 hacking kernel: usb usb2: SerialNumber: 0000:00:0d.0 | |
Jul 12 15:12:14 hacking kernel: hub 2-0:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 2-0:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 3 | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810 | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4 | |
Jul 12 15:12:14 hacking kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.2 Enhanced SuperSpeed | |
Jul 12 15:12:14 hacking kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15 | |
Jul 12 15:12:14 hacking kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 12 15:12:14 hacking kernel: usb usb3: Product: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: usb usb3: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 12 15:12:14 hacking kernel: usb usb3: SerialNumber: 0000:00:14.0 | |
Jul 12 15:12:14 hacking kernel: hub 3-0:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 3-0:1.0: 12 ports detected | |
Jul 12 15:12:14 hacking kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15 | |
Jul 12 15:12:14 hacking kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 12 15:12:14 hacking kernel: usb usb4: Product: xHCI Host Controller | |
Jul 12 15:12:14 hacking kernel: usb usb4: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 12 15:12:14 hacking kernel: usb usb4: SerialNumber: 0000:00:14.0 | |
Jul 12 15:12:14 hacking kernel: hub 4-0:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 4-0:1.0: 2 ports detected | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver usbserial_generic | |
Jul 12 15:12:14 hacking kernel: usbserial: USB Serial support registered for generic | |
Jul 12 15:12:14 hacking kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K] at 0x60,0x64 irq 1 | |
Jul 12 15:12:14 hacking kernel: i8042: PNP: PS/2 appears to have AUX port disabled, if this is incorrect please boot with i8042.nopnp | |
Jul 12 15:12:14 hacking kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 | |
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: RTC can wake from S4 | |
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: registered as rtc0 | |
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: setting system clock to 2025-07-12T22:12:10 UTC (1752358330) | |
Jul 12 15:12:14 hacking kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram | |
Jul 12 15:12:14 hacking kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input3 | |
Jul 12 15:12:14 hacking kernel: intel_pstate: Intel P-state driver initializing | |
Jul 12 15:12:14 hacking kernel: Hybrid CPU capacity scaling enabled | |
Jul 12 15:12:14 hacking kernel: intel_pstate: HWP enabled | |
Jul 12 15:12:14 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] Registered 1 planes with drm panic | |
Jul 12 15:12:14 hacking kernel: [drm] Initialized simpledrm 1.0.0 for simple-framebuffer.0 on minor 0 | |
Jul 12 15:12:14 hacking kernel: fbcon: Deferring console take-over | |
Jul 12 15:12:14 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] fb0: simpledrmdrmfb frame buffer device | |
Jul 12 15:12:14 hacking kernel: hid: raw HID events driver (C) Jiri Kosina | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver usbhid | |
Jul 12 15:12:14 hacking kernel: usbhid: USB HID core driver | |
Jul 12 15:12:14 hacking kernel: drop_monitor: Initializing network drop monitor service | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_INET6 protocol family | |
Jul 12 15:12:14 hacking kernel: Segment Routing with IPv6 | |
Jul 12 15:12:14 hacking kernel: RPL Segment Routing with IPv6 | |
Jul 12 15:12:14 hacking kernel: In-situ OAM (IOAM) with IPv6 | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_PACKET protocol family | |
Jul 12 15:12:14 hacking kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' | |
Jul 12 15:12:14 hacking kernel: microcode: Current revision: 0x00000118 | |
Jul 12 15:12:14 hacking kernel: microcode: Updated early from: 0x00000115 | |
Jul 12 15:12:14 hacking kernel: IPI shorthand broadcast: enabled | |
Jul 12 15:12:14 hacking kernel: sched_clock: Marking stable (687001240, 6090692)->(725859963, -32768031) | |
Jul 12 15:12:14 hacking kernel: registered taskstats version 1 | |
Jul 12 15:12:14 hacking kernel: Loading compiled-in X.509 certificates | |
Jul 12 15:12:14 hacking kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c92675c24f6b4bd17516ae0e98b61f2812601d04' | |
Jul 12 15:12:14 hacking kernel: zswap: loaded using pool zstd/zsmalloc | |
Jul 12 15:12:14 hacking kernel: Demotion targets for Node 0: null | |
Jul 12 15:12:14 hacking kernel: Key type .fscrypt registered | |
Jul 12 15:12:14 hacking kernel: Key type fscrypt-provisioning registered | |
Jul 12 15:12:14 hacking kernel: Btrfs loaded, zoned=yes, fsverity=yes | |
Jul 12 15:12:14 hacking kernel: Key type big_key registered | |
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' | |
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation: Windows UEFI CA 2023: aefc5fbbbe055d8f8daa585473499417ab5a5272' | |
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' | |
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Microsoft UEFI CA 2023: 81aa6b3244c935bce0d6628af39827421e32497d' | |
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Secure Certificate: 01dcc89619884ca147983429f8a4a1a0' | |
Jul 12 15:12:14 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 12 15:12:14 hacking kernel: integrity: Loaded X.509 cert 'Cus CA: d6136d376b87ef934511c12ce2c3880c' | |
Jul 12 15:12:14 hacking kernel: PM: Magic number: 1:411:249 | |
Jul 12 15:12:14 hacking kernel: acpi device:5f: hash matches | |
Jul 12 15:12:14 hacking kernel: memory memory123: hash matches | |
Jul 12 15:12:14 hacking kernel: RAS: Correctable Errors collector initialized. | |
Jul 12 15:12:14 hacking kernel: clk: Disabling unused clocks | |
Jul 12 15:12:14 hacking kernel: PM: genpd: Disabling unused power domains | |
Jul 12 15:12:14 hacking kernel: Freeing unused decrypted memory: 2028K | |
Jul 12 15:12:14 hacking kernel: Freeing unused kernel image (initmem) memory: 4640K | |
Jul 12 15:12:14 hacking kernel: Write protecting the kernel read-only data: 38912k | |
Jul 12 15:12:14 hacking kernel: Freeing unused kernel image (text/rodata gap) memory: 784K | |
Jul 12 15:12:14 hacking kernel: Freeing unused kernel image (rodata/data gap) memory: 1904K | |
Jul 12 15:12:14 hacking kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. | |
Jul 12 15:12:14 hacking kernel: rodata_test: all tests were successful | |
Jul 12 15:12:14 hacking kernel: Run /init as init process | |
Jul 12 15:12:14 hacking kernel: with arguments: | |
Jul 12 15:12:14 hacking kernel: /init | |
Jul 12 15:12:14 hacking kernel: with environment: | |
Jul 12 15:12:14 hacking kernel: HOME=/ | |
Jul 12 15:12:14 hacking kernel: TERM=linux | |
Jul 12 15:12:14 hacking kernel: fbcon: Taking over console | |
Jul 12 15:12:14 hacking kernel: Console: switching to colour frame buffer device 240x67 | |
Jul 12 15:12:14 hacking kernel: usb 3-6: new high-speed USB device number 2 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: Key type psk registered | |
Jul 12 15:12:14 hacking kernel: sdhci: Secure Digital Host Controller Interface driver | |
Jul 12 15:12:14 hacking kernel: sdhci: Copyright(c) Pierre Ossman | |
Jul 12 15:12:14 hacking kernel: nvme 0000:01:00.0: platform quirk: setting simple suspend | |
Jul 12 15:12:14 hacking kernel: nvme nvme0: pci function 0000:01:00.0 | |
Jul 12 15:12:14 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 2 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: nvme nvme0: D3 entry latency set to 10 seconds | |
Jul 12 15:12:14 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34 | |
Jul 12 15:12:14 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 2-1: Product: USB3.0 Hub | |
Jul 12 15:12:14 hacking kernel: usb 2-1: Manufacturer: Intel Corporation. | |
Jul 12 15:12:14 hacking kernel: hub 2-1:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 2-1:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: nvme nvme0: allocated 64 MiB host memory buffer (16 segments). | |
Jul 12 15:12:14 hacking kernel: nvme nvme0: 16/0/0 default/read/poll queues | |
Jul 12 15:12:14 hacking kernel: nvme0n1: p1 p2 p3 | |
Jul 12 15:12:14 hacking kernel: sdhci-pci 0000:2c:00.0: SDHCI controller found [1217:8621] (rev 1) | |
Jul 12 15:12:14 hacking kernel: sdhci-pci 0000:2c:00.0: enabling device (0000 -> 0002) | |
Jul 12 15:12:14 hacking kernel: mmc0: SDHCI controller on PCI [0000:2c:00.0] using ADMA | |
Jul 12 15:12:14 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01 | |
Jul 12 15:12:14 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6: Product: USB2.0 Hub | |
Jul 12 15:12:14 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc. | |
Jul 12 15:12:14 hacking kernel: hub 3-6:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 3-6:1.0: 6 ports detected | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Found meteorlake (device ID 7dd1) integrated display version 14.00 stepping D0 | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access | |
Jul 12 15:12:14 hacking kernel: usb 3-7: new high-speed USB device number 3 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: Console: switching to colour dummy device 80x25 | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: vgaarb: deactivate vga console | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Using Transparent Hugepages | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/mtl_dmc.bin (v2.23) | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GuC firmware i915/mtl_guc_70.bin version 70.44.1 | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: submission enabled | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: RC enabled | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GuC firmware i915/mtl_guc_70.bin version 70.44.1 | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC firmware i915/mtl_huc_gsc.bin version 8.5.4 | |
Jul 12 15:12:14 hacking kernel: usb 3-7: New USB device found, idVendor=04f2, idProduct=b729, bcdDevice=27.39 | |
Jul 12 15:12:14 hacking kernel: usb 3-7: New USB device strings: Mfr=3, Product=1, SerialNumber=2 | |
Jul 12 15:12:14 hacking kernel: usb 3-7: Product: Chicony USB2.0 Camera | |
Jul 12 15:12:14 hacking kernel: usb 3-7: Manufacturer: CHICONY | |
Jul 12 15:12:14 hacking kernel: usb 3-7: SerialNumber: 200901010001 | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for clear media | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: submission enabled | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: SLPC enabled | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: RC enabled | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] Protected Xe Path (PXP) protected content support initialized | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] *ERROR* [CRTC:82:pipe A] DSB 0 poll error | |
Jul 12 15:12:14 hacking kernel: [drm] Initialized i915 1.6.0 for 0000:00:02.0 on minor 1 | |
Jul 12 15:12:14 hacking kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no) | |
Jul 12 15:12:14 hacking kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input4 | |
Jul 12 15:12:14 hacking kernel: usb 3-10: new full-speed USB device number 4 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 3 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4: Product: USB3.2 Hub | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic | |
Jul 12 15:12:14 hacking kernel: hub 2-1.4:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 2-1.4:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: Loaded GSC firmware i915/mtl_gsc_1.bin (cv1.0, r102.1.15.1926, svn 1) | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for all workloads | |
Jul 12 15:12:14 hacking kernel: usb 3-10: New USB device found, idVendor=8087, idProduct=0036, bcdDevice= 0.00 | |
Jul 12 15:12:14 hacking kernel: usb 3-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.2: new full-speed USB device number 5 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.2: Product: S34C65T | |
Jul 12 15:12:14 hacking kernel: usb 3-6.2: Manufacturer: Samsung | |
Jul 12 15:12:14 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 4 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Manufacturer: Generic | |
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: new high-speed USB device number 6 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 5 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Product: USB2.1 Hub | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: new high-speed USB device number 7 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Manufacturer: Generic | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: fbcon: i915drmfb (fb0) is primary device | |
Jul 12 15:12:14 hacking kernel: Console: switching to colour frame buffer device 240x75 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 8 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals | |
Jul 12 15:12:14 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0001/input/input5 | |
Jul 12 15:12:14 hacking kernel: hid-generic 0003:1A7C:0191.0001: input,hidraw0: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 9 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX | |
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0002/input/input6 | |
Jul 12 15:12:14 hacking kernel: hid-generic 0003:2EFD:2130.0002: input,hidraw1: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (0080) error -71 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71 | |
Jul 12 15:12:14 hacking kernel: usbhid 3-6.4.1.4:1.1: can't add hid device: -71 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: clear tt 4 (8080) error -71 | |
Jul 12 15:12:14 hacking kernel: usbhid 3-6.4.1.4:1.1: probe with driver usbhid failed with error -71 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: USB disconnect, device number 4 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: USB disconnect, device number 5 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: USB disconnect, device number 6 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: USB disconnect, device number 7 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: USB disconnect, device number 8 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: USB disconnect, device number 9 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4: reset SuperSpeed USB device number 3 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: new high-speed USB device number 10 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Product: USB2.1 Hub | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: i915 0000:00:02.0: [drm] fb0: i915drmfb frame buffer device | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 6 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: Manufacturer: Generic | |
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: new high-speed USB device number 11 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 7 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: Manufacturer: Generic | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: USB hub found | |
Jul 12 15:12:14 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected | |
Jul 12 15:12:14 hacking kernel: EXT4-fs (nvme0n1p3): mounted filesystem 2403f944-7fdf-4185-8119-4f6fd8f7f887 r/w with ordered data mode. Quota mode: none. | |
Jul 12 15:12:14 hacking systemd[1]: systemd 257.7-1-arch running in system mode (+PAM +AUDIT -SELINUX -APPARMOR -IMA +IPE +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +BTF +XKBCOMMON +UTMP -SYSVINIT +LIBARCHIVE) | |
Jul 12 15:12:14 hacking systemd[1]: Detected architecture x86-64. | |
Jul 12 15:12:14 hacking systemd[1]: Hostname set to <hacking>. | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 12 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals | |
Jul 12 15:12:14 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0003/input/input7 | |
Jul 12 15:12:14 hacking kernel: hid-generic 0003:1A7C:0191.0003: input,hidraw0: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 13 using xhci_hcd | |
Jul 12 15:12:14 hacking systemd[1]: bpf-restrict-fs: LSM BPF program attached | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX | |
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0004/input/input8 | |
Jul 12 15:12:14 hacking systemd[1]: Queued start job for default target Graphical Interface. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/dirmngr. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/getty. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent-browser. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent-extra. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/gpg-agent-ssh. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/keyboxd. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/modprobe. | |
Jul 12 15:12:14 hacking systemd[1]: Created slice User and Session Slice. | |
Jul 12 15:12:14 hacking systemd[1]: Started Dispatch Password Requests to Console Directory Watch. | |
Jul 12 15:12:14 hacking systemd[1]: Started Forward Password Requests to Wall Directory Watch. | |
Jul 12 15:12:14 hacking systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. | |
Jul 12 15:12:14 hacking systemd[1]: Expecting device /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7... | |
Jul 12 15:12:14 hacking systemd[1]: Expecting device /dev/disk/by-uuid/860B-DC20... | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Local Encrypted Volumes. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Local Integrity Protected Volumes. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Path Units. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Remote File Systems. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Slice Units. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Local Verity Protected Volumes. | |
Jul 12 15:12:14 hacking systemd[1]: Listening on Device-mapper event daemon FIFOs. | |
Jul 12 15:12:14 hacking systemd[1]: Listening on Process Core Dump Socket. | |
Jul 12 15:12:14 hacking systemd[1]: Listening on Credential Encryption/Decryption. | |
Jul 12 15:12:14 hacking systemd[1]: Listening on Journal Socket (/dev/log). | |
Jul 12 15:12:14 hacking systemd[1]: Listening on Journal Sockets. | |
Jul 12 15:12:14 hacking systemd[1]: TPM PCR Measurements was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: Make TPM PCR Policy was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: Listening on udev Control Socket. | |
Jul 12 15:12:14 hacking systemd[1]: Listening on udev Kernel Socket. | |
Jul 12 15:12:14 hacking systemd[1]: Listening on User Database Manager Socket. | |
Jul 12 15:12:14 hacking systemd[1]: Mounting Huge Pages File System... | |
Jul 12 15:12:14 hacking systemd[1]: Mounting POSIX Message Queue File System... | |
Jul 12 15:12:14 hacking systemd[1]: Mounting Kernel Debug File System... | |
Jul 12 15:12:14 hacking systemd[1]: Mounting Kernel Trace File System... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Create List of Static Device Nodes... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module configfs... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module dm_mod... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module drm... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module fuse... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module loop... | |
Jul 12 15:12:14 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). | |
Jul 12 15:12:14 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). | |
Jul 12 15:12:14 hacking systemd[1]: Starting Journal Service... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Modules... | |
Jul 12 15:12:14 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: Starting Remount Root and Kernel File Systems... | |
Jul 12 15:12:14 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load udev Rules from Credentials... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Coldplug All udev Devices... | |
Jul 12 15:12:14 hacking systemd[1]: Mounted Huge Pages File System. | |
Jul 12 15:12:14 hacking systemd[1]: Mounted POSIX Message Queue File System. | |
Jul 12 15:12:14 hacking systemd[1]: Mounted Kernel Debug File System. | |
Jul 12 15:12:14 hacking systemd[1]: Mounted Kernel Trace File System. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Create List of Static Device Nodes. | |
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module configfs. | |
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module drm. | |
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module fuse. | |
Jul 12 15:12:14 hacking systemd[1]: Mounting FUSE Control File System... | |
Jul 12 15:12:14 hacking kernel: loop: module loaded | |
Jul 12 15:12:14 hacking systemd[1]: Mounting Kernel Configuration File System... | |
Jul 12 15:12:14 hacking kernel: Asymmetric key parser 'pkcs8' registered | |
Jul 12 15:12:14 hacking systemd[1]: Starting Create Static Device Nodes in /dev gracefully... | |
Jul 12 15:12:14 hacking kernel: device-mapper: uevent: version 1.0.3 | |
Jul 12 15:12:14 hacking kernel: device-mapper: ioctl: 4.49.0-ioctl (2025-01-17) initialised: [email protected] | |
Jul 12 15:12:14 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module dm_mod. | |
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module loop. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Modules. | |
Jul 12 15:12:14 hacking systemd-journald[427]: Collecting audit messages is disabled. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load udev Rules from Credentials. | |
Jul 12 15:12:14 hacking systemd[1]: Mounted FUSE Control File System. | |
Jul 12 15:12:14 hacking systemd[1]: Mounted Kernel Configuration File System. | |
Jul 12 15:12:14 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. | |
Jul 12 15:12:14 hacking systemd[1]: Starting Apply Kernel Variables... | |
Jul 12 15:12:14 hacking systemd[1]: Starting User Database Manager... | |
Jul 12 15:12:14 hacking kernel: EXT4-fs (nvme0n1p3): re-mounted 2403f944-7fdf-4185-8119-4f6fd8f7f887. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Remount Root and Kernel File Systems. | |
Jul 12 15:12:14 hacking systemd[1]: Rebuild Hardware Database was skipped because of an unmet condition check (ConditionNeedsUpdate=/etc). | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save OS Random Seed... | |
Jul 12 15:12:14 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load/Save OS Random Seed. | |
Jul 12 15:12:14 hacking systemd[1]: Started User Database Manager. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Create Static Device Nodes in /dev gracefully. | |
Jul 12 15:12:14 hacking systemd[1]: Create System Users was skipped because no trigger condition checks were met. | |
Jul 12 15:12:14 hacking systemd[1]: Starting Create Static Device Nodes in /dev... | |
Jul 12 15:12:14 hacking kernel: hid-generic 0003:2EFD:2130.0004: input,hidraw1: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0 | |
Jul 12 15:12:14 hacking systemd[1]: Finished Apply Kernel Variables. | |
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0005/input/input9 | |
Jul 12 15:12:14 hacking systemd[1]: Finished Create Static Device Nodes in /dev. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Preparation for Local File Systems. | |
Jul 12 15:12:14 hacking systemd-journald[427]: Journal started | |
Jul 12 15:12:14 hacking systemd-journald[427]: Runtime Journal (/run/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 8M, max 1.5G, 1.5G free. | |
Jul 12 15:12:14 hacking systemd-modules-load[428]: Inserted module 'crypto_user' | |
Jul 12 15:12:14 hacking systemd-modules-load[428]: Inserted module 'pkcs8_key_parser' | |
Jul 12 15:12:14 hacking systemd[1]: Starting Rule-based Manager for Device Events and Files... | |
Jul 12 15:12:14 hacking systemd[1]: Started Journal Service. | |
Jul 12 15:12:14 hacking systemd[1]: Starting Flush Journal to Persistent Storage... | |
Jul 12 15:12:14 hacking systemd-journald[427]: Time spent on flushing to /var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b is 22.791ms for 1138 entries. | |
Jul 12 15:12:14 hacking systemd-journald[427]: System Journal (/var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 112M, max 4G, 3.8G free. | |
Jul 12 15:12:14 hacking systemd-journald[427]: Received client request to flush runtime journal. | |
Jul 12 15:12:14 hacking systemd-udevd[450]: Using default interface naming scheme 'v257'. | |
Jul 12 15:12:14 hacking systemd[1]: Started Rule-based Manager for Device Events and Files. | |
Jul 12 15:12:14 hacking systemd[1]: Condition check resulted in /dev/tpmrm0 being skipped. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Trusted Platform Module. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Coldplug All udev Devices. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Flush Journal to Persistent Storage. | |
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0005/input/input10 | |
Jul 12 15:12:14 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0005/input/input11 | |
Jul 12 15:12:14 hacking kernel: tuxedo_compatibility_check: loading out-of-tree module taints kernel. | |
Jul 12 15:12:14 hacking kernel: tuxedo_compatibility_check: module verification failed: signature and/or required key missing - tainting kernel | |
Jul 12 15:12:14 hacking kernel: input: Intel HID events as /devices/platform/INTC10CB:00/input/input12 | |
Jul 12 15:12:14 hacking kernel: hid-generic 0003:2EFD:2130.0005: input,hidraw2: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input1 | |
Jul 12 15:12:14 hacking kernel: tuxedo_keyboard: module init | |
Jul 12 15:12:14 hacking kernel: resource: resource sanity check: requesting [mem 0x00000000fedc0000-0x00000000fedcffff], which spans more than pnp 00:03 [mem 0xfedc0000-0xfedc7fff] | |
Jul 12 15:12:14 hacking kernel: caller igen6_probe+0x155/0x81c [igen6_edac] mapping multiple BARs | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:0b.0: Setting to D3hot | |
Jul 12 15:12:14 hacking kernel: EDAC MC0: Giving out device to module igen6_edac controller Intel_client_SoC MC#0: DEV 0000:00:00.0 (INTERRUPT) | |
Jul 12 15:12:14 hacking kernel: EDAC igen6: Expected 2 mcs, but only 1 detected. | |
Jul 12 15:12:14 hacking kernel: EDAC igen6: v2.5.1 | |
Jul 12 15:12:14 hacking systemd[1]: Created slice Slice /system/systemd-backlight. | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of backlight:intel_backlight... | |
Jul 12 15:12:14 hacking kernel: pci 0000:00:08.0: Setting to D3hot | |
Jul 12 15:12:14 hacking kernel: ACPI: bus type thunderbolt registered | |
Jul 12 15:12:14 hacking kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set | |
Jul 12 15:12:14 hacking kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt | |
Jul 12 15:12:14 hacking kernel: pps_core: LinuxPPS API ver. 1 registered | |
Jul 12 15:12:14 hacking kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <[email protected]> | |
Jul 12 15:12:14 hacking kernel: input: PC Speaker as /devices/platform/pcspkr/input/input13 | |
Jul 12 15:12:14 hacking kernel: intel_pmc_core INT33A1:00: Assuming a default substate order for this platform | |
Jul 12 15:12:14 hacking kernel: intel_pmc_core INT33A1:00: pmc_core: couldn't get DMU telem endpoint -6 | |
Jul 12 15:12:14 hacking kernel: intel_pmc_core INT33A1:00: initialized | |
Jul 12 15:12:14 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB EFI\x20system\x20partition. | |
Jul 12 15:12:14 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB swap\x20partition. | |
Jul 12 15:12:14 hacking kernel: tuxedo_keyboard: Set keyboard backlight mode on CUSTOM | |
Jul 12 15:12:14 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Firmware: intel/vpu/vpu_37xx_v1.bin, version: 20250415*MTL_CLIENT_SILICON-release*1900*ci_tag_ud202518_vpu_rc_20250415_1900*7ef0f3fdb82 | |
Jul 12 15:12:14 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Scheduler mode: HW | |
Jul 12 15:12:14 hacking systemd[1]: Activating swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7... | |
Jul 12 15:12:14 hacking kernel: Adding 4194300k swap on /dev/nvme0n1p2. Priority:-2 extents:1 across:4194300k SS | |
Jul 12 15:12:14 hacking kernel: ACPI: battery: new hook: TUXEDO Flexicharger Extension | |
Jul 12 15:12:14 hacking kernel: input: TUXEDO Keyboard as /devices/platform/tuxedo_keyboard/input/input14 | |
Jul 12 15:12:14 hacking kernel: clevo_acpi: interface initialized | |
Jul 12 15:12:14 hacking kernel: clevo_wmi: interface initialized | |
Jul 12 15:12:14 hacking systemd[1]: Activated swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7. | |
Jul 12 15:12:14 hacking systemd[1]: Reached target Swaps. | |
Jul 12 15:12:14 hacking kernel: PTP clock support registered | |
Jul 12 15:12:14 hacking systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. | |
Jul 12 15:12:14 hacking systemd[1]: Starting Virtual Console Setup... | |
Jul 12 15:12:14 hacking kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer | |
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules | |
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain package 2^-14 Joules | |
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules | |
Jul 12 15:12:14 hacking kernel: RAPL PMU: hw unit of domain psys 2^-14 Joules | |
Jul 12 15:12:14 hacking kernel: mc: Linux media interface: v0.10 | |
Jul 12 15:12:14 hacking kernel: mousedev: PS/2 mouse device common for all mice | |
Jul 12 15:12:14 hacking kernel: mei_gsc_proxy 0000:00:16.0-0f73db04-97ab-4125-b893-e904ad0d5464: bound 0000:00:02.0 (ops i915_gsc_proxy_component_ops [i915]) | |
Jul 12 15:12:14 hacking kernel: iTCO_vendor_support: vendor-support=0 | |
Jul 12 15:12:14 hacking kernel: intel_rapl_msr: PL4 support detected. | |
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain package | |
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain core | |
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain uncore | |
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain psys | |
Jul 12 15:12:14 hacking systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Stopped Virtual Console Setup. | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new device driver r8152-cfgselector | |
Jul 12 15:12:14 hacking kernel: e1000e: Intel(R) PRO/1000 Network Driver | |
Jul 12 15:12:14 hacking kernel: e1000e: Copyright(c) 1999 - 2015 Intel Corporation. | |
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode | |
Jul 12 15:12:14 hacking systemd[1]: Starting Virtual Console Setup... | |
Jul 12 15:12:14 hacking kernel: intel-lpss 0000:00:15.0: enabling device (0004 -> 0006) | |
Jul 12 15:12:14 hacking kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit | |
Jul 12 15:12:14 hacking kernel: Bluetooth: Core ver 2.22 | |
Jul 12 15:12:14 hacking kernel: NET: Registered PF_BLUETOOTH protocol family | |
Jul 12 15:12:14 hacking kernel: Bluetooth: HCI device and connection manager initialized | |
Jul 12 15:12:14 hacking kernel: Bluetooth: HCI socket layer initialized | |
Jul 12 15:12:14 hacking kernel: Bluetooth: L2CAP socket layer initialized | |
Jul 12 15:12:14 hacking kernel: Bluetooth: SCO socket layer initialized | |
Jul 12 15:12:14 hacking kernel: intel-lpss 0000:00:15.1: enabling device (0004 -> 0006) | |
Jul 12 15:12:14 hacking kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit | |
Jul 12 15:12:14 hacking kernel: cryptd: max_cpu_qlen set to 1000 | |
Jul 12 15:12:14 hacking kernel: videodev: Linux video capture interface: v2.00 | |
Jul 12 15:12:14 hacking systemd[1]: Finished Virtual Console Setup. | |
Jul 12 15:12:14 hacking kernel: r8152-cfgselector 2-1.4.4: reset SuperSpeed USB device number 7 using xhci_hcd | |
Jul 12 15:12:14 hacking kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database | |
Jul 12 15:12:14 hacking kernel: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' | |
Jul 12 15:12:14 hacking kernel: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' | |
Jul 12 15:12:14 hacking kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 | |
Jul 12 15:12:14 hacking kernel: cfg80211: failed to load regulatory.db | |
Jul 12 15:12:14 hacking kernel: usb 3-6: USB disconnect, device number 2 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.2: USB disconnect, device number 5 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4: USB disconnect, device number 10 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1: USB disconnect, device number 11 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.3: USB disconnect, device number 12 | |
Jul 12 15:12:14 hacking kernel: r8152-cfgselector 2-1.4.4: Failed to read 4 bytes at 0xb400/0x0133 (-71) | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Link Down | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Card not present | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:03.0: Runtime PM usage count underflow! | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:02.0: Runtime PM usage count underflow! | |
Jul 12 15:12:14 hacking kernel: pcieport 0000:03:01.0: Runtime PM usage count underflow! | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:04: busn_res: [bus 04] is released | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-11] is released | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-1e] is released | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2a] is released | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] is released | |
Jul 12 15:12:14 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] is released | |
Jul 12 15:12:14 hacking kernel: [drm] Initialized intel_vpu 1.0.0 for 0000:00:0b.0 on minor 0 | |
Jul 12 15:12:14 hacking kernel: usb 2-1: USB disconnect, device number 2 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4: USB disconnect, device number 3 | |
Jul 12 15:12:14 hacking kernel: usb 2-1.4.1: USB disconnect, device number 6 | |
Jul 12 15:12:14 hacking kernel: r8152-cfgselector 2-1.4.4: USB disconnect, device number 7 | |
Jul 12 15:12:14 hacking kernel: usb 3-6.4.1.4: USB disconnect, device number 13 | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of leds:white:kbd_backlight... | |
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input15 | |
Jul 12 15:12:14 hacking kernel: r8152 2-1.4.4:1.0 (unnamed net_device) (uninitialized): Get ether addr fail | |
Jul 12 15:12:14 hacking kernel: r8152 2-1.4.4:1.0 eth0: v1.12.13 | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver r8152 | |
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of leds:white:kbd_backlight. | |
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) d4:93:90:57:77:c4 | |
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection | |
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 eth0: MAC: 16, PHY: 12, PBA No: FFFFFF-0FF | |
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input16 | |
Jul 12 15:12:14 hacking kernel: hid-generic 0018:2808:0222.0006: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01 | |
Jul 12 15:12:14 hacking kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) | |
Jul 12 15:12:14 hacking kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) | |
Jul 12 15:12:14 hacking kernel: e1000e 0000:00:1f.6 enp0s31f6: renamed from eth0 | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver cdc_ether | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver r8153_ecm | |
Jul 12 15:12:14 hacking kernel: Intel(R) Wireless WiFi driver for Linux | |
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: enabling device (0000 -> 0002) | |
Jul 12 15:12:14 hacking kernel: intel_rapl_common: Found RAPL domain package | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver btusb | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load/Save RF Kill Switch Status... | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Device revision is 0 | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Secure boot is enabled | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: OTP lock is disabled | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: API lock is enabled | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Debug lock is disabled | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Minimum firmware build 1 week 10 2014 | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Bootloader timestamp 2022.18 buildtype 1 build 16362 | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: DSM reset method type: 0x01 | |
Jul 12 15:12:14 hacking kernel: usb 3-7: Found UVC 1.10 device Chicony USB2.0 Camera (04f2:b729) | |
Jul 12 15:12:14 hacking kernel: usbcore: registered new interface driver uvcvideo | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Found device firmware: intel/ibt-0291-0291.sfi | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Boot Address: 0x100800 | |
Jul 12 15:12:14 hacking kernel: Bluetooth: hci0: Firmware Version: 137-18.25 | |
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: Detected crf-id 0x2001910, cnv-id 0x2001910 wfpm id 0x80000000 | |
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: PCI dev 272b/00f4, rev=0x472, rfid=0x112200 | |
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: Detected Intel(R) Wi-Fi 7 BE200 320MHz | |
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: TLV_FW_FSEQ_VERSION: FSEQ Version: 0.0.4.196 | |
Jul 12 15:12:14 hacking kernel: iwlwifi 0000:2d:00.0: loaded firmware version 98.d661c37c.0 gl-c0-fm-c0-98.ucode op_mode iwlmld | |
Jul 12 15:12:14 hacking kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module dm_mod... | |
Jul 12 15:12:14 hacking systemd[1]: Starting Load Kernel Module loop... | |
Jul 12 15:12:14 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). | |
Jul 12 15:12:14 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). | |
Jul 12 15:12:14 hacking systemd[1]: Rebuild Hardware Database was skipped because of an unmet condition check (ConditionNeedsUpdate=/etc). | |
Jul 12 15:12:14 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: Create System Users was skipped because no trigger condition checks were met. | |
Jul 12 15:12:14 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:14 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module dm_mod. | |
Jul 12 15:12:14 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 12 15:12:14 hacking systemd[1]: Finished Load Kernel Module loop. | |
Jul 12 15:12:14 hacking systemd[1]: Started Load/Save RF Kill Switch Status. | |
Jul 12 15:12:14 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. | |
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input18 | |
Jul 12 15:12:14 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0006/input/input19 | |
Jul 12 15:12:14 hacking kernel: hid-multitouch 0018:2808:0222.0006: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01 | |
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: Detected RF FM, rfid=0x112200 | |
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: loaded PNVM version 752be616 | |
Jul 12 15:12:15 hacking systemd[1]: Mounting /boot... | |
Jul 12 15:12:15 hacking systemd[1]: Mounting Temporary Directory /tmp... | |
Jul 12 15:12:15 hacking systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). | |
Jul 12 15:12:15 hacking systemd[1]: Listening on Disk Image Download Service Socket. | |
Jul 12 15:12:15 hacking systemd[1]: Mounted Temporary Directory /tmp. | |
Jul 12 15:12:15 hacking kernel: FAT-fs (nvme0n1p1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. | |
Jul 12 15:12:15 hacking systemd[1]: Mounted /boot. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Local File Systems. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on Boot Entries Service Socket. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on System Extension Image Management. | |
Jul 12 15:12:15 hacking systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. | |
Jul 12 15:12:15 hacking systemd[1]: Starting Update Boot Loader Random Seed... | |
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: base HW address: 5c:b4:7e:c1:32:3e | |
Jul 12 15:12:15 hacking systemd[1]: Starting Create System Files and Directories... | |
Jul 12 15:12:15 hacking bootctl[621]: ! Mount point '/boot' which backs the random seed file is world accessible, which is a security hole! ! | |
Jul 12 15:12:15 hacking bootctl[621]: ! Random seed file '/boot/loader/random-seed' is world accessible, which is a security hole! ! | |
Jul 12 15:12:15 hacking bootctl[621]: Random seed file /boot/loader/random-seed successfully refreshed (32 bytes). | |
Jul 12 15:12:15 hacking systemd[1]: Finished Update Boot Loader Random Seed. | |
Jul 12 15:12:15 hacking systemd[1]: Finished Create System Files and Directories. | |
Jul 12 15:12:15 hacking systemd[1]: Rebuild Dynamic Linker Cache was skipped because no trigger condition checks were met. | |
Jul 12 15:12:15 hacking systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). | |
Jul 12 15:12:15 hacking systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). | |
Jul 12 15:12:15 hacking systemd[1]: Rebuild Journal Catalog was skipped because of an unmet condition check (ConditionNeedsUpdate=/var). | |
Jul 12 15:12:15 hacking systemd[1]: Save Transient machine-id to Disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). | |
Jul 12 15:12:15 hacking systemd[1]: Update is Completed was skipped because no trigger condition checks were met. | |
Jul 12 15:12:15 hacking systemd[1]: Starting Record System Boot/Shutdown in UTMP... | |
Jul 12 15:12:15 hacking systemd[1]: Finished Record System Boot/Shutdown in UTMP. | |
Jul 12 15:12:15 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of backlight:intel_backlight. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target System Initialization. | |
Jul 12 15:12:15 hacking systemd[1]: Started Refresh existing PGP keys of archlinux-keyring regularly. | |
Jul 12 15:12:15 hacking systemd[1]: Started Daily man-db regeneration. | |
Jul 12 15:12:15 hacking systemd[1]: Started Daily verification of password and group files. | |
Jul 12 15:12:15 hacking systemd[1]: Started Daily Cleanup of Temporary Directories. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Timer Units. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on D-Bus System Message Bus Socket. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG network certificate management daemon for /etc/pacman.d/gnupg. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers) for /etc/pacman.d/gnupg. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (restricted) for /etc/pacman.d/gnupg. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent (ssh-agent emulation) for /etc/pacman.d/gnupg. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache for /etc/pacman.d/gnupg. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on GnuPG public key management service for /etc/pacman.d/gnupg. | |
Jul 12 15:12:15 hacking systemd[1]: Listening on OpenSSH Server Socket (systemd-ssh-generator, AF_UNIX Local). | |
Jul 12 15:12:15 hacking systemd[1]: Listening on Hostname Service Socket. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Socket Units. | |
Jul 12 15:12:15 hacking systemd[1]: Starting D-Bus System Message Bus... | |
Jul 12 15:12:15 hacking systemd[1]: TPM PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:15 hacking kernel: iwlwifi 0000:2d:00.0: Registered PHC clock: iwlwifi-PTP, with index: 1 | |
Jul 12 15:12:15 hacking systemd[1]: Started D-Bus System Message Bus. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Basic System. | |
Jul 12 15:12:15 hacking systemd[1]: Starting Bluetooth service... | |
Jul 12 15:12:15 hacking dbus-broker-launch[634]: Ready | |
Jul 12 15:12:15 hacking systemd[1]: Starting Initialize hardware monitoring sensors... | |
Jul 12 15:12:15 hacking systemd[1]: Starting User Login Management... | |
Jul 12 15:12:15 hacking systemd[1]: TPM PCR Barrier (User) was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 12 15:12:15 hacking systemd[1]: Starting Permit User Sessions... | |
Jul 12 15:12:15 hacking (modprobe)[639]: lm_sensors.service: Referenced but unset environment variable evaluates to an empty string: BUS_MODULES | |
Jul 12 15:12:15 hacking systemd[1]: Finished Permit User Sessions. | |
Jul 12 15:12:15 hacking bluetoothd[637]: Bluetooth daemon 5.83 | |
Jul 12 15:12:15 hacking bluetoothd[637]: Starting SDP server | |
Jul 12 15:12:15 hacking bluetoothd[637]: Bluetooth management interface 1.23 initialized | |
Jul 12 15:12:15 hacking kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 | |
Jul 12 15:12:15 hacking kernel: Bluetooth: BNEP filters: protocol multicast | |
Jul 12 15:12:15 hacking kernel: Bluetooth: BNEP socket layer initialized | |
Jul 12 15:12:15 hacking systemd[1]: Started Bluetooth service. | |
Jul 12 15:12:15 hacking systemd-logind[640]: New seat seat0. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Bluetooth Support. | |
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event0 (Power Button) | |
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event2 (Lid Switch) | |
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event1 (Sleep Button) | |
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event10 (Intel HID events) | |
Jul 12 15:12:15 hacking systemd-logind[640]: Watching system buttons on /dev/input/event3 (AT Translated Set 2 keyboard) | |
Jul 12 15:12:15 hacking systemd[1]: Started Getty on tty1. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Login Prompts. | |
Jul 12 15:12:15 hacking systemd[1]: Started User Login Management. | |
Jul 12 15:12:15 hacking systemd[1]: Finished Initialize hardware monitoring sensors. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Multi-User System. | |
Jul 12 15:12:15 hacking systemd[1]: Reached target Graphical Interface. | |
Jul 12 15:12:15 hacking systemd[1]: Starting Hostname Service... | |
Jul 12 15:12:15 hacking systemd[1]: Started Hostname Service. | |
Jul 12 15:12:15 hacking systemd[1]: Startup finished in 13.877s (firmware) + 4.760s (loader) + 4.099s (kernel) + 1.614s (userspace) = 24.352s. | |
Jul 12 15:12:16 hacking kernel: snd_hda_intel 0000:00:1f.3: bound 0000:00:02.0 (ops intel_audio_component_bind_ops [i915]) | |
Jul 12 15:12:16 hacking kernel: typec port0: bound usb3-port6 (ops connector_ops) | |
Jul 12 15:12:16 hacking kernel: typec port0: bound usb2-port1 (ops connector_ops) | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: ALC245: picked fixup for PCI SSID 1558:a763 | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC245: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:speaker | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x21/0x0/0x0/0x0/0x0) | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: inputs: | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Internal Mic=0x12 | |
Jul 12 15:12:16 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Headset Mic=0x19 | |
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input21 | |
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input22 | |
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input23 | |
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input24 | |
Jul 12 15:12:16 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input25 | |
Jul 12 15:12:16 hacking systemd[1]: Reached target Sound Card. | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Waiting for firmware download to complete | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Firmware loaded in 1764689 usecs | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Waiting for device to boot | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Device booted in 51880 usecs | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: dsbr: enable: 0x01 value: 0x0f | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Found Intel DDC parameters: intel/ibt-0291-0291.ddc | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Applying Intel DDC parameters completed | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Firmware timestamp 2025.18 buildtype 1 build 82313 | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Firmware SHA1: 0x81d88c7f | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Fseq status: Success (0x00) | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Fseq executed: 00.00.04.197 | |
Jul 12 15:12:16 hacking kernel: Bluetooth: hci0: Fseq BT Top: 00.00.04.197 | |
Jul 12 15:12:16 hacking bluetoothd[637]: Battery Provider Manager created | |
Jul 12 15:12:16 hacking kernel: Bluetooth: MGMT ver 1.23 | |
Jul 12 15:12:16 hacking kernel: NET: Registered PF_ALG protocol family | |
Jul 12 15:12:17 hacking kernel: thunderbolt 0-1: new device found, vendor=0x175 device=0x6534 | |
Jul 12 15:12:17 hacking kernel: thunderbolt 0-1: SAMSUNG ELECTRONICS CO.,LTD S34C65T | |
Jul 12 15:12:17 hacking kernel: thunderbolt 0-0:1.1: new retimer found, vendor=0x8087 device=0xd9c | |
Jul 12 15:12:18 hacking kernel: usb 3-6: new high-speed USB device number 14 using xhci_hcd | |
Jul 12 15:12:18 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01 | |
Jul 12 15:12:18 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:18 hacking kernel: usb 3-6: Product: USB2.0 Hub | |
Jul 12 15:12:18 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc. | |
Jul 12 15:12:18 hacking kernel: hub 3-6:1.0: USB hub found | |
Jul 12 15:12:18 hacking kernel: hub 3-6:1.0: 6 ports detected | |
Jul 12 15:12:18 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 8 using xhci_hcd | |
Jul 12 15:12:18 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34 | |
Jul 12 15:12:18 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:18 hacking kernel: usb 2-1: Product: USB3.0 Hub | |
Jul 12 15:12:18 hacking kernel: usb 2-1: Manufacturer: Intel Corporation. | |
Jul 12 15:12:18 hacking kernel: hub 2-1:1.0: USB hub found | |
Jul 12 15:12:18 hacking kernel: hub 2-1:1.0: 4 ports detected | |
Jul 12 15:12:18 hacking kernel: usb 3-6.2: new full-speed USB device number 15 using xhci_hcd | |
Jul 12 15:12:18 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46 | |
Jul 12 15:12:18 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 | |
Jul 12 15:12:18 hacking kernel: usb 3-6.2: Product: S34C65T | |
Jul 12 15:12:18 hacking kernel: usb 3-6.2: Manufacturer: Samsung | |
Jul 12 15:12:18 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00 | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4: new high-speed USB device number 16 using xhci_hcd | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91 | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4: Product: USB2.1 Hub | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic | |
Jul 12 15:12:19 hacking kernel: hub 3-6.4:1.0: USB hub found | |
Jul 12 15:12:19 hacking kernel: hub 3-6.4:1.0: 4 ports detected | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 9 using xhci_hcd | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91 | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4: Product: USB3.2 Hub | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic | |
Jul 12 15:12:19 hacking kernel: hub 2-1.4:1.0: USB hub found | |
Jul 12 15:12:19 hacking kernel: hub 2-1.4:1.0: 4 ports detected | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: new high-speed USB device number 17 using xhci_hcd | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04 | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub | |
Jul 12 15:12:19 hacking kernel: usb 3-6.4.1: Manufacturer: Generic | |
Jul 12 15:12:19 hacking kernel: hub 3-6.4.1:1.0: USB hub found | |
Jul 12 15:12:19 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 10 using xhci_hcd | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04 | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.1: Manufacturer: Generic | |
Jul 12 15:12:19 hacking kernel: hub 2-1.4.1:1.0: USB hub found | |
Jul 12 15:12:19 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 11 using xhci_hcd | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00 | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6 | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek | |
Jul 12 15:12:19 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001 | |
Jul 12 15:12:19 hacking kernel: r8152-cfgselector 2-1.4.4: reset SuperSpeed USB device number 11 using xhci_hcd | |
Jul 12 15:12:19 hacking kernel: r8152 2-1.4.4:1.0 eth0: v1.12.13 | |
Jul 12 15:12:19 hacking kernel: r8152 2-1.4.4:1.0 enp0s13f0u1u4u4: renamed from eth0 | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 19 using xhci_hcd | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13 | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0 | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4 | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals | |
Jul 12 15:12:20 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0007/input/input26 | |
Jul 12 15:12:20 hacking kernel: hid-generic 0003:1A7C:0191.0007: input,hidraw1: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0 | |
Jul 12 15:12:20 hacking systemd[1]: systemd-rfkill.service: Deactivated successfully. | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 20 using xhci_hcd | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02 | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard | |
Jul 12 15:12:20 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX | |
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0008/input/input27 | |
Jul 12 15:12:20 hacking kernel: hid-generic 0003:2EFD:2130.0008: input,hidraw2: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0 | |
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0009/input/input28 | |
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0009/input/input29 | |
Jul 12 15:12:20 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0009/input/input30 | |
Jul 12 15:12:20 hacking kernel: hid-generic 0003:2EFD:2130.0009: input,hidraw3: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input1 | |
Jul 12 15:12:20 hacking systemd-logind[640]: Watching system buttons on /dev/input/event16 (SONiX USB Keyboard) | |
Jul 12 15:12:20 hacking systemd-logind[640]: Watching system buttons on /dev/input/event18 (SONiX USB Keyboard System Control) | |
Jul 12 15:12:20 hacking systemd-logind[640]: Watching system buttons on /dev/input/event19 (SONiX USB Keyboard) | |
Jul 12 15:12:23 hacking dbus-broker-launch[634]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found. | |
Jul 12 15:12:24 hacking login[656]: pam_unix(login:session): session opened for user ray(uid=1000) by ray(uid=0) | |
Jul 12 15:12:24 hacking systemd[1]: Created slice User Slice of UID 1000. | |
Jul 12 15:12:24 hacking systemd[1]: Starting User Runtime Directory /run/user/1000... | |
Jul 12 15:12:24 hacking systemd-logind[640]: New session 1 of user ray. | |
Jul 12 15:12:24 hacking systemd[1]: Finished User Runtime Directory /run/user/1000. | |
Jul 12 15:12:24 hacking systemd[1]: Starting User Manager for UID 1000... | |
Jul 12 15:12:24 hacking (systemd)[707]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8002 service=[systemd-user] terminal=[] user=[ray] ruser=[<unknown>] rhost=[<unknown>] | |
Jul 12 15:12:24 hacking (systemd)[707]: pam_unix(systemd-user:session): session opened for user ray(uid=1000) by ray(uid=0) | |
Jul 12 15:12:24 hacking systemd-logind[640]: New session 2 of user ray. | |
Jul 12 15:12:24 hacking systemd[707]: Queued start job for default target Main User Target. | |
Jul 12 15:12:24 hacking systemd[707]: Created slice User Application Slice. | |
Jul 12 15:12:24 hacking systemd[707]: Started Break Encouragement. | |
Jul 12 15:12:24 hacking systemd[707]: Reached target Paths. | |
Jul 12 15:12:24 hacking systemd[707]: Reached target Timers. | |
Jul 12 15:12:24 hacking systemd[707]: Starting D-Bus User Message Bus Socket... | |
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG network certificate management daemon. | |
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). | |
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). | |
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent (ssh-agent emulation). | |
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG cryptographic agent and passphrase cache. | |
Jul 12 15:12:24 hacking systemd[707]: Listening on GnuPG public key management service. | |
Jul 12 15:12:24 hacking systemd[707]: Listening on p11-kit server. | |
Jul 12 15:12:24 hacking systemd[707]: Listening on PipeWire PulseAudio. | |
Jul 12 15:12:24 hacking systemd[707]: Listening on PipeWire Multimedia System Sockets. | |
Jul 12 15:12:24 hacking systemd[707]: Listening on D-Bus User Message Bus Socket. | |
Jul 12 15:12:24 hacking systemd[707]: Reached target Sockets. | |
Jul 12 15:12:24 hacking systemd[707]: Reached target Basic System. | |
Jul 12 15:12:24 hacking systemd[1]: Started User Manager for UID 1000. | |
Jul 12 15:12:24 hacking systemd[707]: Started Kanata keyboard remapper. | |
Jul 12 15:12:24 hacking systemd[707]: Reached target Main User Target. | |
Jul 12 15:12:24 hacking systemd[707]: Startup finished in 79ms. | |
Jul 12 15:12:24 hacking systemd[1]: Started Session 1 of User ray. | |
Jul 12 15:12:24 hacking login[656]: LOGIN ON tty1 BY ray | |
Jul 12 15:12:24 hacking sh[717]: /usr/bin/sh: line 1: /home/ray/.cargo/bin/kanata: No such file or directory | |
Jul 12 15:12:24 hacking systemd[707]: kanata.service: Main process exited, code=exited, status=127/n/a | |
Jul 12 15:12:24 hacking systemd[707]: kanata.service: Failed with result 'exit-code'. | |
Jul 12 15:12:29 hacking systemd[707]: Created slice User Core Session Slice. | |
Jul 12 15:12:29 hacking systemd[707]: Starting D-Bus User Message Bus... | |
Jul 12 15:12:29 hacking dbus-broker-launch[754]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored | |
Jul 12 15:12:29 hacking dbus-broker-launch[754]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored | |
Jul 12 15:12:29 hacking systemd[707]: Started D-Bus User Message Bus. | |
Jul 12 15:12:29 hacking dbus-broker-launch[754]: Ready | |
Jul 12 15:12:29 hacking systemd[707]: keynav.service: Failed to open /home/ray/.config/systemd/user/keynav.service: No such file or directory | |
Jul 12 15:12:29 hacking systemd[707]: Started Flexible Input Method Framwork. | |
Jul 12 15:12:29 hacking systemd[707]: Started notify-client -> notify-server -> notify-send. | |
Jul 12 15:12:29 hacking systemd[707]: Started Redshift display colour temperature adjustment (GUI). | |
Jul 12 15:12:29 hacking systemd[707]: Started Taskbar. | |
Jul 12 15:12:29 hacking systemd[707]: Started xscreensaver.service. | |
Jul 12 15:12:29 hacking systemd[707]: Reached target Graphical Interface. | |
Jul 12 15:12:29 hacking (y-server)[760]: notify-server.service: Unable to locate executable '/home/ray/bin/notify-server': No such file or directory | |
Jul 12 15:12:29 hacking (y-server)[760]: notify-server.service: Failed at step EXEC spawning /home/ray/bin/notify-server: No such file or directory | |
Jul 12 15:12:29 hacking systemd[707]: notify-server.service: Main process exited, code=exited, status=203/EXEC | |
Jul 12 15:12:29 hacking systemd[707]: notify-server.service: Failed with result 'exit-code'. | |
Jul 12 15:12:29 hacking (hift-gtk)[761]: redshift-gtk.service: Unable to locate executable '/usr/bin/redshift-gtk': No such file or directory | |
Jul 12 15:12:29 hacking (hift-gtk)[761]: redshift-gtk.service: Failed at step EXEC spawning /usr/bin/redshift-gtk: No such file or directory | |
Jul 12 15:12:29 hacking systemd[707]: redshift-gtk.service: Main process exited, code=exited, status=203/EXEC | |
Jul 12 15:12:29 hacking systemd[707]: redshift-gtk.service: Failed with result 'exit-code'. | |
Jul 12 15:12:29 hacking (taskbar)[762]: taskbar.service: Unable to locate executable '/home/ray/bin/taskbar': No such file or directory | |
Jul 12 15:12:29 hacking (taskbar)[762]: taskbar.service: Failed at step EXEC spawning /home/ray/bin/taskbar: No such file or directory | |
Jul 12 15:12:29 hacking systemd[707]: taskbar.service: Main process exited, code=exited, status=203/EXEC | |
Jul 12 15:12:29 hacking systemd[707]: taskbar.service: Failed with result 'exit-code'. | |
Jul 12 15:12:29 hacking (eensaver)[763]: xscreensaver.service: Unable to locate executable '/usr/bin/xscreensaver': No such file or directory | |
Jul 12 15:12:29 hacking (eensaver)[763]: xscreensaver.service: Failed at step EXEC spawning /usr/bin/xscreensaver: No such file or directory | |
Jul 12 15:12:29 hacking systemd[707]: xscreensaver.service: Main process exited, code=exited, status=203/EXEC | |
Jul 12 15:12:29 hacking systemd[707]: xscreensaver.service: Failed with result 'exit-code'. | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.625948 instance.cpp:1400] Override Enabled Addons: {} | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.628372 instance.cpp:1401] Override Disabled Addons: {} | |
Jul 12 15:12:29 hacking fcitx5[759]: E2025-07-12 15:12:29.634534 waylandmodule.cpp:244] Failed to open wayland connection | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.634552 addonmanager.cpp:204] Loaded addon wayland | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.634811 addonmanager.cpp:204] Loaded addon imselector | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.638163 xcbconnection.cpp:199] Connecting to X11 display, display name::0. | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.638289 addonmanager.cpp:204] Loaded addon xcb | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.640007 addonmanager.cpp:204] Loaded addon quickphrase | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.640701 addonmanager.cpp:204] Loaded addon waylandim | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.641156 keyboard.cpp:226] Attempting to load keyboard from: ["/usr/share/X11/xkb"] Rule: evdev | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.643797 addonmanager.cpp:204] Loaded addon keyboard | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.644475 addonmanager.cpp:204] Loaded addon clipboard | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.645018 addonmanager.cpp:204] Loaded addon unicode | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.645745 addonmanager.cpp:204] Loaded addon dbus | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.646267 addonmanager.cpp:204] Loaded addon dbusfrontend | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.649307 addonmanager.cpp:204] Loaded addon fcitx4frontend | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.649945 addonmanager.cpp:204] Loaded addon ibusfrontend | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.650643 addonmanager.cpp:204] Loaded addon xim | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.668862 inputmethodmanager.cpp:210] Found 742 input method(s) in addon keyboard | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.679992 addonmanager.cpp:204] Loaded addon kimpanel | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.681043 addonmanager.cpp:204] Loaded addon virtualkeyboard | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.700620 classicui.cpp:90] Created classicui for x11 display::0 | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.700671 addonmanager.cpp:204] Loaded addon classicui | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.701500 addonmanager.cpp:204] Loaded addon notificationitem | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.702123 addonmanager.cpp:204] Loaded addon notifications | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.706425 dbusmodule.cpp:816] Service name change: org.fcitx.Fcitx5 :1.3 | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.706521 kimpanel.cpp:116] Kimpanel new owner: | |
Jul 12 15:12:29 hacking fcitx5[759]: I2025-07-12 15:12:29.706558 virtualkeyboard.cpp:218] VirtualKeyboard new owner: | |
Jul 12 15:12:30 hacking fcitx5[759]: I2025-07-12 15:12:30.775163 addonmanager.cpp:204] Loaded addon rime | |
Jul 12 15:12:30 hacking systemd[707]: Started tmux child pane 889 launched by process 821. | |
Jul 12 15:12:44 hacking systemd[707]: Starting Accessibility services bus... | |
Jul 12 15:12:44 hacking systemd[707]: Started Accessibility services bus. | |
Jul 12 15:12:44 hacking systemd[707]: Started app-com.google.Chrome-977.scope. | |
Jul 12 15:12:45 hacking systemd[1]: systemd-hostnamed.service: Deactivated successfully. | |
Jul 12 15:13:14 hacking chrome[977]: [977:994:0712/151314.699900:INFO:chrome/browser/extensions/extension_garbage_collector.cc:184] Garbage collection for extensions on file thread is complete. | |
Jul 12 15:15:08 hacking systemd[707]: Started tmux child pane 1724 launched by process 821. | |
Jul 12 15:15:48 hacking systemd[707]: Started tmux child pane 1846 launched by process 821. | |
Jul 12 15:15:49 hacking sudo[1863]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome | |
Jul 12 15:15:49 hacking sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 12 15:15:49 hacking systemd[1]: Starting Wireless service... | |
Jul 12 15:15:49 hacking iwd[1867]: Wireless daemon version 3.9 | |
Jul 12 15:15:49 hacking systemd[1]: Started Wireless service. | |
Jul 12 15:15:49 hacking systemd[1]: Reached target Network. | |
Jul 12 15:15:49 hacking sudo[1863]: pam_unix(sudo:session): session closed for user root | |
Jul 12 15:15:49 hacking iwd[1867]: station: Network configuration is disabled. | |
Jul 12 15:15:49 hacking iwd[1867]: Wiphy: 0, Name: phy0 | |
Jul 12 15:15:49 hacking iwd[1867]: Permanent Address: 5c:b4:7e:c1:32:3e | |
Jul 12 15:15:49 hacking iwd[1867]: 2.4GHz Band: | |
Jul 12 15:15:49 hacking iwd[1867]: Bitrates (non-HT): | |
Jul 12 15:15:49 hacking iwd[1867]: 1.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 2.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 5.5 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 11.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 6.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 9.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 12.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 18.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 24.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 36.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 48.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 54.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: HT Capabilities: | |
Jul 12 15:15:49 hacking iwd[1867]: HT40 | |
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 20Mhz | |
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 40Mhz | |
Jul 12 15:15:49 hacking iwd[1867]: HT RX MCS indexes: | |
Jul 12 15:15:49 hacking iwd[1867]: 0-15 | |
Jul 12 15:15:49 hacking iwd[1867]: HE Capabilities | |
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: ap p2p-go | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: station p2p-client | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: 5GHz Band: | |
Jul 12 15:15:49 hacking iwd[1867]: Bitrates (non-HT): | |
Jul 12 15:15:49 hacking iwd[1867]: 6.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 9.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 12.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 18.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 24.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 36.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 48.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 54.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: HT Capabilities: | |
Jul 12 15:15:49 hacking iwd[1867]: HT40 | |
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 20Mhz | |
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 40Mhz | |
Jul 12 15:15:49 hacking iwd[1867]: HT RX MCS indexes: | |
Jul 12 15:15:49 hacking iwd[1867]: 0-15 | |
Jul 12 15:15:49 hacking iwd[1867]: VHT Capabilities: | |
Jul 12 15:15:49 hacking iwd[1867]: 160 Mhz operation | |
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 80Mhz | |
Jul 12 15:15:49 hacking iwd[1867]: Short GI for 160 and 80 + 80 Mhz | |
Jul 12 15:15:49 hacking iwd[1867]: Max RX MCS: 0-9 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max TX MCS: 0-9 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: HE Capabilities | |
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: ap p2p-go | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: station p2p-client | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: 6GHz Band: | |
Jul 12 15:15:49 hacking iwd[1867]: Bitrates (non-HT): | |
Jul 12 15:15:49 hacking iwd[1867]: 6.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 9.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 12.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 18.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 24.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 36.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 48.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: 54.0 Mbps | |
Jul 12 15:15:49 hacking iwd[1867]: HE Capabilities | |
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: ap p2p-go | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Interface Types: station p2p-client | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 12 15:15:49 hacking iwd[1867]: Ciphers: BIP-GMAC-256 BIP-GMAC-128 GCMP-256 GCMP-128 | |
Jul 12 15:15:49 hacking iwd[1867]: BIP-CMAC-128 CCMP-128 TKIP | |
Jul 12 15:15:49 hacking iwd[1867]: Supported iftypes: ad-hoc station ap p2p-client p2p-go p2p-device | |
Jul 12 15:15:49 hacking kernel: ------------[ cut here ]------------ | |
Jul 12 15:15:49 hacking kernel: WARNING: CPU: 11 PID: 1867 at net/wireless/nl80211.c:8819 nl80211_get_reg_do+0x1e4/0x210 [cfg80211] | |
Jul 12 15:15:49 hacking kernel: Modules linked in: ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 cmac algif_hash algif_skcipher af_alg snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component ac97_bus snd_pcm_dmaengine crc8 bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp iwlmld kvm_intel mac80211 kvm libarc4 irqbypass snd_hda_intel polyval_clmulni snd_intel_dspcfg snd_intel_sdw_acpi polyval_generic ghash_clmulni_intel uvcvideo snd_hda_codec btusb processor_thermal_device_pci sha512_ssse3 processor_thermal_device | |
Jul 12 15:15:49 hacking kernel: videobuf2_vmalloc btrtl hid_multitouch r8153_ecm sha256_ssse3 processor_thermal_wt_hint uvc snd_hda_core btintel cdc_ether iwlwifi videobuf2_memops sha1_ssse3 videobuf2_v4l2 aesni_intel usbnet btbcm snd_hwdep videobuf2_common crypto_simd iTCO_wdt btmtk videodev intel_pmc_bxt snd_pcm cryptd processor_thermal_rfim cfg80211 mei_gsc_proxy intel_rapl_msr bluetooth iTCO_vendor_support e1000e mc mousedev r8152 rapl intel_lpss_pci processor_thermal_rapl intel_cstate snd_timer ptp intel_lpss intel_rapl_common mii ucsi_acpi intel_uncore libphy typec_ucsi joydev wmi_bmof pcspkr clevo_wmi(OE) mei_me rfkill pps_core processor_thermal_wt_req idma64 snd i2c_i801 thunderbolt intel_vpu typec processor_thermal_power_floor i2c_smbus mei clevo_acpi(OE) soundcore i2c_mux processor_thermal_mbox igen6_edac roles tuxedo_io(OE) intel_pmc_core int3403_thermal i2c_hid_acpi tuxedo_keyboard(OE) int340x_thermal_zone int3400_thermal i2c_hid pmt_telemetry tuxedo_compatibility_check(OE) intel_hid acpi_thermal_rel acpi_tad | |
Jul 12 15:15:49 hacking kernel: led_class_multicolor acpi_pad pmt_class pinctrl_meteorlake sparse_keymap mac_hid pkcs8_key_parser dm_mod crypto_user loop nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit drm_buddy sdhci_uhs2 nvme ttm sdhci nvme_core cqhci intel_gtt nvme_keyring mmc_core drm_display_helper serio_raw nvme_auth intel_vsec video cec wmi | |
Jul 12 15:15:49 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 12 15:15:49 hacking kernel: CPU: 11 UID: 0 PID: 1867 Comm: iwd Tainted: G OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 12 15:15:49 hacking kernel: Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 12 15:15:49 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 12 15:15:49 hacking kernel: RIP: 0010:nl80211_get_reg_do+0x1e4/0x210 [cfg80211] | |
Jul 12 15:15:49 hacking kernel: Code: 4c 24 0c ba 04 00 00 00 be 9a 00 00 00 48 89 df c7 44 24 0c 01 00 00 00 e8 69 55 d6 e5 85 c0 0f 84 4f ff ff ff e9 18 ff ff ff <0f> 0b bd ea ff ff ff e9 11 ff ff ff 89 c5 e9 0f ff ff ff bd 97 ff | |
Jul 12 15:15:49 hacking kernel: RSP: 0018:ffffcbfb0bb879a0 EFLAGS: 00010202 | |
Jul 12 15:15:49 hacking kernel: RAX: 0000000000000000 RBX: ffff8b5f6bfcb400 RCX: 0000000000000000 | |
Jul 12 15:15:49 hacking kernel: RDX: ffff8b5f70603680 RSI: 0000000000000000 RDI: ffff8b5f0c6003c0 | |
Jul 12 15:15:49 hacking kernel: RBP: ffffcbfb0bb87a00 R08: 0000000000000000 R09: ffff8b5f17618014 | |
Jul 12 15:15:49 hacking kernel: R10: 0000000000000000 R11: ffffffffc1891bf0 R12: ffff8b5f17618014 | |
Jul 12 15:15:49 hacking kernel: R13: ffff8b5f6bfca500 R14: ffff8b5f0c6003c0 R15: 0000000000000001 | |
Jul 12 15:15:49 hacking kernel: FS: 00007f645c53db80(0000) GS:ffff8b66b67ed000(0000) knlGS:0000000000000000 | |
Jul 12 15:15:49 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 12 15:15:49 hacking kernel: CR2: 00005642ab32ba50 CR3: 0000000184e6e005 CR4: 0000000000f72ef0 | |
Jul 12 15:15:49 hacking kernel: PKRU: 55555554 | |
Jul 12 15:15:49 hacking kernel: Call Trace: | |
Jul 12 15:15:49 hacking kernel: <TASK> | |
Jul 12 15:15:49 hacking kernel: genl_family_rcv_msg_doit+0xfc/0x160 | |
Jul 12 15:15:49 hacking kernel: genl_rcv_msg+0x1aa/0x2b0 | |
Jul 12 15:15:49 hacking kernel: ? __pfx_nl80211_pre_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429] | |
Jul 12 15:15:49 hacking kernel: ? __pfx_nl80211_get_reg_do+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429] | |
Jul 12 15:15:49 hacking kernel: ? __pfx_nl80211_post_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429] | |
Jul 12 15:15:49 hacking kernel: ? __pfx_genl_rcv_msg+0x10/0x10 | |
Jul 12 15:15:49 hacking kernel: netlink_rcv_skb+0x59/0x110 | |
Jul 12 15:15:49 hacking kernel: genl_rcv+0x28/0x40 | |
Jul 12 15:15:49 hacking kernel: netlink_unicast+0x26f/0x3a0 | |
Jul 12 15:15:49 hacking kernel: netlink_sendmsg+0x207/0x440 | |
Jul 12 15:15:49 hacking kernel: __sys_sendto+0x1f4/0x200 | |
Jul 12 15:15:49 hacking kernel: __x64_sys_sendto+0x24/0x30 | |
Jul 12 15:15:49 hacking kernel: do_syscall_64+0x7b/0x810 | |
Jul 12 15:15:49 hacking kernel: ? __sys_recvmsg+0x89/0xe0 | |
Jul 12 15:15:49 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 12 15:15:49 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 12 15:15:49 hacking kernel: ? __x64_sys_epoll_wait+0x70/0x120 | |
Jul 12 15:15:49 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 12 15:15:49 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 12 15:15:49 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0 | |
Jul 12 15:15:49 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e | |
Jul 12 15:15:49 hacking kernel: RIP: 0033:0x7f645c5d1006 | |
Jul 12 15:15:49 hacking kernel: Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08 | |
Jul 12 15:15:49 hacking kernel: RSP: 002b:00007ffd350140d0 EFLAGS: 00000202 ORIG_RAX: 000000000000002c | |
Jul 12 15:15:49 hacking kernel: RAX: ffffffffffffffda RBX: 00005642b8f388f0 RCX: 00007f645c5d1006 | |
Jul 12 15:15:49 hacking kernel: RDX: 000000000000001c RSI: 00005642b8f444c0 RDI: 0000000000000004 | |
Jul 12 15:15:49 hacking kernel: RBP: 00007ffd350140f0 R08: 0000000000000000 R09: 0000000000000000 | |
Jul 12 15:15:49 hacking kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 00005642b8f444c0 | |
Jul 12 15:15:49 hacking kernel: R13: 00005642b8f43b70 R14: 0000000000000001 R15: 0000000000000000 | |
Jul 12 15:15:49 hacking kernel: </TASK> | |
Jul 12 15:15:49 hacking kernel: ---[ end trace 0000000000000000 ]--- | |
Jul 12 15:15:49 hacking sudo[1942]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0 | |
Jul 12 15:15:49 hacking sudo[1942]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 12 15:15:49 hacking dhcpcd[1946]: dhcpcd-10.2.4 starting | |
Jul 12 15:15:49 hacking dhcpcd[1949]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e | |
Jul 12 15:15:49 hacking kernel: 8021q: 802.1Q VLAN Support v1.8 | |
Jul 12 15:15:50 hacking iwd[1867]: event: state, old: disconnected, new: autoconnect_quick | |
Jul 12 15:15:50 hacking dhcpcd[1949]: wlan0: interface not found | |
Jul 12 15:15:50 hacking sudo[1942]: pam_unix(sudo:session): session closed for user root | |
Jul 12 15:15:50 hacking iwd[1867]: udev interface=wlan0 ifindex=7 | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for a8:70:5d:9a:e6:02 | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8c:76:3f:a8:f7:a4 | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8c:76:3f:a4:76:25 | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8a:76:3f:a4:76:25 | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 92:76:3f:a4:76:25 | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 8a:76:3f:a8:f7:a4 | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 1c:93:7c:62:82:ed | |
Jul 12 15:15:50 hacking iwd[1867]: invalid HE capabilities for 0a:93:7c:62:82:ed | |
Jul 12 15:15:50 hacking iwd[1867]: event: connect-info, ssid: monkeyhome, bss: 8c:76:3f:a4:76:25, signal: -35, load: 0/255 | |
Jul 12 15:15:50 hacking iwd[1867]: event: state, old: autoconnect_quick, new: connecting (auto) | |
Jul 12 15:15:50 hacking kernel: wlan0: authenticate with 8c:76:3f:a4:76:25 (local address=5c:b4:7e:c1:32:3e) | |
Jul 12 15:15:50 hacking kernel: wlan0: send auth to 8c:76:3f:a4:76:25 (try 1/3) | |
Jul 12 15:15:50 hacking kernel: wlan0: authenticated | |
Jul 12 15:15:50 hacking kernel: wlan0: associate with 8c:76:3f:a4:76:25 (try 1/3) | |
Jul 12 15:15:50 hacking kernel: wlan0: RX AssocResp from 8c:76:3f:a4:76:25 (capab=0x1011 status=0 aid=10) | |
Jul 12 15:15:50 hacking kernel: wlan0: associated | |
Jul 12 15:15:50 hacking kernel: wlan0: Limiting TX power to 30 (30 - 0) dBm as advertised by 8c:76:3f:a4:76:25 | |
Jul 12 15:15:50 hacking iwd[1867]: event: state, old: connecting (auto), new: connected | |
Jul 12 15:15:52 hacking kernel: warning: `ThreadPoolForeg' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 | |
Jul 12 15:15:52 hacking sudo[1974]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome | |
Jul 12 15:15:52 hacking sudo[1974]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 12 15:15:52 hacking sudo[1974]: pam_unix(sudo:session): session closed for user root | |
Jul 12 15:15:52 hacking sudo[1978]: ray : TTY=pts/3 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0 | |
Jul 12 15:15:52 hacking sudo[1978]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 12 15:15:52 hacking dhcpcd[1981]: dhcpcd-10.2.4 starting | |
Jul 12 15:15:52 hacking dhcpcd[1984]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e | |
Jul 12 15:15:52 hacking dhcpcd[1984]: dhcp6_openudp: Cannot assign requested address | |
Jul 12 15:15:52 hacking dhcpcd[1984]: ps_inet_listenin6: Cannot assign requested address | |
Jul 12 15:15:52 hacking dhcpcd[1984]: ps_root_recvmsg: Cannot assign requested address | |
Jul 12 15:15:52 hacking dhcpcd[1984]: wlan0: DHCP6 proxy 2601:647:4700:79e0:5eb4:7eff:fec1:323e exited unexpectedly from PID 1987, code=1 | |
Jul 12 15:15:52 hacking dhcpcd[1984]: wlan0: connected to Access Point: monkeyhome | |
Jul 12 15:15:52 hacking dhcpcd[1984]: wlan0: IAID 7e:c1:32:3e | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: soliciting an IPv6 router | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: rebinding lease of 10.0.0.199 | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: probing address 10.0.0.199/24 | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: Router Advertisement from fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: adding address 2601:647:4700:79e0:a4d3:a029:3fe1:b2c0/64 | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: adding route to 2601:647:4700:79e0::/64 | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: adding default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:15:53 hacking dhcpcd[1984]: wlan0: confirming prior DHCPv6 lease | |
Jul 12 15:15:54 hacking dhcpcd[1984]: wlan0: REPLY6 received from fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:15:54 hacking dhcpcd[1984]: wlan0: adding address 2601:647:4700:79e0::c146/128 | |
Jul 12 15:15:54 hacking dhcpcd[1984]: wlan0: renew in 116350, rebind in 220030, expire in 289150 seconds | |
Jul 12 15:15:55 hacking sudo[1978]: pam_unix(sudo:session): session closed for user root | |
Jul 12 15:15:59 hacking dhcpcd[1984]: wlan0: leased 10.0.0.199 for 172800 seconds | |
Jul 12 15:15:59 hacking dhcpcd[1984]: wlan0: adding route to 10.0.0.0/24 | |
Jul 12 15:15:59 hacking dhcpcd[1984]: wlan0: adding default route via 10.0.0.1 | |
Jul 12 15:16:01 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:16:01 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:16:10 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:16:10 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:16:19 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:16:19 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:16:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:16:28 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:16:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:16:40 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:16:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:16:49 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:16:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:16:58 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:17:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:17:07 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:17:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:17:16 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:17:25 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:17:25 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:17:37 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:17:37 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:17:43 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:17:43 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:17:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:17:52 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:17:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:17:58 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:04 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:18:04 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:13 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:18:13 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:18:22 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:18:31 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:18:40 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:18:49 hacking dhcpcd[1984]: wlan0: changing default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:54 hacking dhcpcd[1984]: wlan0: pid 0 deleted default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:18:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:19:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:19:19 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:19:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:19:37 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:19:46 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:19:55 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:20:04 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:20:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:20:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:20:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:20:42 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:20:46 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:20:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:01 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:10 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:34 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:37 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:21:55 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:22:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:22:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:22:25 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:22:28 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:22:34 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:22:43 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:22:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:23:01 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:23:13 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:23:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:23:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:23:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:23:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:23:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:06 hacking systemd[707]: Started PipeWire Multimedia Service. | |
Jul 12 15:24:06 hacking systemd[707]: Started Multimedia Service Session Manager. | |
Jul 12 15:24:06 hacking systemd[707]: Started PipeWire PulseAudio. | |
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1 | |
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit does not give us MinNiceLevel, using 0 | |
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking pipewire[5576]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1 | |
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1 | |
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit does not give us MinNiceLevel, using 0 | |
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking wireplumber[5577]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1 | |
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1 | |
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit does not give us MinNiceLevel, using 0 | |
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 12 15:24:06 hacking pipewire-pulse[5578]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1 | |
Jul 12 15:24:06 hacking wireplumber[5577]: default: Failed to get percentage from UPower: org.freedesktop.DBus.Error.NameHasNoOwner | |
Jul 12 15:24:06 hacking wireplumber[5577]: wp-device: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? | |
Jul 12 15:24:06 hacking wireplumber[5577]: s-monitors-libcamera: PipeWire's libcamera SPA plugin is missing or broken. Some camera types may not be supported. | |
Jul 12 15:24:06 hacking kernel: Bluetooth: RFCOMM TTY layer initialized | |
Jul 12 15:24:06 hacking kernel: Bluetooth: RFCOMM socket layer initialized | |
Jul 12 15:24:06 hacking kernel: Bluetooth: RFCOMM ver 1.11 | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/ldac | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/aptx_hd | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_hd | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/aptx | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/aac | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aac | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/opus_g | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/opus_g | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/sbc | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/sbc | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_1 | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_0 | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1 | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0 | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/faststream | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/faststream_duplex | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/opus_05 | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/opus_05 | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSink/opus_05_duplex | |
Jul 12 15:24:06 hacking bluetoothd[637]: Endpoint registered: sender=:1.25 path=/MediaEndpoint/A2DPSource/opus_05_duplex | |
Jul 12 15:24:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:08 hacking wireplumber[5577]: m-portal-permissionstore: <WpPortalPermissionStorePlugin:0x55f931060150> Lookup: The name is not activatable (org.freedesktop.DBus.Error.ServiceUnknown) | |
Jul 12 15:24:16 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:25 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:34 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:43 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:49 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:24:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:07 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:13 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:22 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:31 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:40 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:52 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:58 hacking dhcpcd[1984]: wlan0: changing route to 2601:647:4700:79e0::/64 | |
Jul 12 15:25:59 hacking kernel: ------------[ cut here ]------------ | |
Jul 12 15:25:59 hacking kernel: frame on invalid queue - is on 8 and indicates 6 | |
Jul 12 15:25:59 hacking kernel: WARNING: CPU: 7 PID: 590 at drivers/net/wireless/intel/iwlwifi/pcie/rx.c:1335 iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi] | |
Jul 12 15:25:59 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 cmac algif_hash algif_skcipher af_alg snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component ac97_bus snd_pcm_dmaengine crc8 bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp iwlmld kvm_intel mac80211 kvm libarc4 irqbypass snd_hda_intel polyval_clmulni snd_intel_dspcfg snd_intel_sdw_acpi polyval_generic ghash_clmulni_intel uvcvideo snd_hda_codec | |
Jul 12 15:25:59 hacking kernel: btusb processor_thermal_device_pci sha512_ssse3 processor_thermal_device videobuf2_vmalloc btrtl hid_multitouch r8153_ecm sha256_ssse3 processor_thermal_wt_hint uvc snd_hda_core btintel cdc_ether iwlwifi videobuf2_memops sha1_ssse3 videobuf2_v4l2 aesni_intel usbnet btbcm snd_hwdep videobuf2_common crypto_simd iTCO_wdt btmtk videodev intel_pmc_bxt snd_pcm cryptd processor_thermal_rfim cfg80211 mei_gsc_proxy intel_rapl_msr bluetooth iTCO_vendor_support e1000e mc mousedev r8152 rapl intel_lpss_pci processor_thermal_rapl intel_cstate snd_timer ptp intel_lpss intel_rapl_common mii ucsi_acpi intel_uncore libphy typec_ucsi joydev wmi_bmof pcspkr clevo_wmi(OE) mei_me rfkill pps_core processor_thermal_wt_req idma64 snd i2c_i801 thunderbolt intel_vpu typec processor_thermal_power_floor i2c_smbus mei clevo_acpi(OE) soundcore i2c_mux processor_thermal_mbox igen6_edac roles tuxedo_io(OE) intel_pmc_core int3403_thermal i2c_hid_acpi tuxedo_keyboard(OE) int340x_thermal_zone int3400_thermal i2c_hid pmt_telemetry | |
Jul 12 15:25:59 hacking kernel: tuxedo_compatibility_check(OE) intel_hid acpi_thermal_rel acpi_tad led_class_multicolor acpi_pad pmt_class pinctrl_meteorlake sparse_keymap mac_hid pkcs8_key_parser dm_mod crypto_user loop nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit drm_buddy sdhci_uhs2 nvme ttm sdhci nvme_core cqhci intel_gtt nvme_keyring mmc_core drm_display_helper serio_raw nvme_auth intel_vsec video cec wmi | |
Jul 12 15:25:59 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 12 15:25:59 hacking kernel: CPU: 7 UID: 0 PID: 590 Comm: irq/189-iwlwifi Tainted: G W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 12 15:25:59 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 12 15:25:59 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 12 15:25:59 hacking kernel: RIP: 0010:iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi] | |
Jul 12 15:25:59 hacking kernel: Code: 1f 84 00 00 00 00 00 90 48 83 c0 01 48 39 c8 0f 84 06 ff ff ff 38 10 75 ef e9 02 ff ff ff 48 c7 c7 d8 49 98 c1 e8 ae 70 43 e5 <0f> 0b e9 54 fe ff ff 8b 6c 24 3c 4c 8b 54 24 10 4c 8b 7c 24 40 80 | |
Jul 12 15:25:59 hacking kernel: RSP: 0018:ffffcbfb00394d90 EFLAGS: 00010246 | |
Jul 12 15:25:59 hacking kernel: RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000027 | |
Jul 12 15:25:59 hacking kernel: RDX: ffff8b66601dcbc8 RSI: 0000000000000001 RDI: ffff8b66601dcbc0 | |
Jul 12 15:25:59 hacking kernel: RBP: 000000000000057e R08: 0000000000000000 R09: 00000000ffffefff | |
Jul 12 15:25:59 hacking kernel: R10: ffffffffa8e60f20 R11: ffffcbfb00394c28 R12: ffff8b5f048c8028 | |
Jul 12 15:25:59 hacking kernel: R13: 0000000000000000 R14: ffff8b5f21eb5380 R15: ffff8b5f06d8b000 | |
Jul 12 15:25:59 hacking kernel: FS: 0000000000000000(0000) GS:ffff8b66b66ed000(0000) knlGS:0000000000000000 | |
Jul 12 15:25:59 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 12 15:25:59 hacking kernel: CR2: 00007f5070fe09ac CR3: 0000000103bd4002 CR4: 0000000000f72ef0 | |
Jul 12 15:25:59 hacking kernel: PKRU: 55555554 | |
Jul 12 15:25:59 hacking kernel: Call Trace: | |
Jul 12 15:25:59 hacking kernel: <IRQ> | |
Jul 12 15:25:59 hacking kernel: iwl_pcie_napi_poll_msix+0x38/0xd0 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27] | |
Jul 12 15:25:59 hacking kernel: __napi_poll+0x2e/0x1e0 | |
Jul 12 15:25:59 hacking kernel: net_rx_action+0x341/0x3e0 | |
Jul 12 15:25:59 hacking kernel: ? enqueue_task+0xce/0x170 | |
Jul 12 15:25:59 hacking kernel: handle_softirqs+0xe3/0x2a0 | |
Jul 12 15:25:59 hacking kernel: ? handle_edge_irq+0x8b/0x220 | |
Jul 12 15:25:59 hacking kernel: ? __pfx_irq_thread_fn+0x10/0x10 | |
Jul 12 15:25:59 hacking kernel: do_softirq.part.0+0x3b/0x60 | |
Jul 12 15:25:59 hacking kernel: </IRQ> | |
Jul 12 15:25:59 hacking kernel: <TASK> | |
Jul 12 15:25:59 hacking kernel: __local_bh_enable_ip+0x60/0x70 | |
Jul 12 15:25:59 hacking kernel: iwl_pcie_irq_rx_msix_handler+0xcc/0x180 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27] | |
Jul 12 15:25:59 hacking kernel: irq_thread_fn+0x22/0x60 | |
Jul 12 15:25:59 hacking kernel: irq_thread+0x1b0/0x310 | |
Jul 12 15:25:59 hacking kernel: ? __pfx_irq_thread_dtor+0x10/0x10 | |
Jul 12 15:25:59 hacking kernel: ? __pfx_irq_thread+0x10/0x10 | |
Jul 12 15:25:59 hacking kernel: kthread+0xf9/0x240 | |
Jul 12 15:25:59 hacking kernel: ? __pfx_kthread+0x10/0x10 | |
Jul 12 15:25:59 hacking kernel: ret_from_fork+0x31/0x50 | |
Jul 12 15:25:59 hacking kernel: ? __pfx_kthread+0x10/0x10 | |
Jul 12 15:25:59 hacking kernel: ret_from_fork_asm+0x1a/0x30 | |
Jul 12 15:25:59 hacking kernel: </TASK> | |
Jul 12 15:25:59 hacking kernel: ---[ end trace 0000000000000000 ]--- | |
Jul 12 15:27:15 hacking systemd[1]: Starting Cleanup of Temporary Directories... | |
Jul 12 15:27:15 hacking systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. | |
Jul 12 15:27:15 hacking systemd[1]: Finished Cleanup of Temporary Directories. | |
Jul 12 15:27:26 hacking systemd-logind[640]: Lid closed. | |
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: fe80::8e76:3fff:fea4:7623: router expired | |
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: part of a Router Advertisement expired | |
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: deleting default route via fe80::8e76:3fff:fea4:7623 | |
Jul 12 15:30:34 hacking kernel: i915 0000:00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment