Created
July 12, 2025 06:42
-
-
Save MaskRay/1a11d76b213ae3c3831d24b1d656cf83 to your computer and use it in GitHub Desktop.
Eurocom Blitz Ultra 2, Arch Linux, Oops: general protection fault, probably for non-canonical address
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jul 11 21:37:24 hacking kernel: Linux version 6.15.6-arch1-1 (linux@archlinux) (gcc (GCC) 15.1.1 20250425, GNU ld (GNU Binutils) 2.44.0) #1 SMP PREEMPT_DYNAMIC Thu, 10 Jul 2025 17:10:18 +0000 | |
Jul 11 21:37:24 hacking kernel: Command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2 | |
Jul 11 21:37:24 hacking kernel: x86/split lock detection: #AC: crashing the kernel on kernel split_locks and warning on user-space split_locks | |
Jul 11 21:37:24 hacking kernel: BIOS-provided physical RAM map: | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009efff] usable | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x000000000009f000-0x00000000000fffff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000000100000-0x000000005df8afff] usable | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x000000005df8b000-0x000000005e88afff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x000000005e88b000-0x00000000606befff] usable | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000606bf000-0x00000000626befff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000626bf000-0x0000000067ebefff] ACPI NVS | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000067ebf000-0x0000000067ffefff] ACPI data | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000067fff000-0x0000000067ffffff] usable | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000068000000-0x00000000787fffff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000c0000000-0x00000000cfffffff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000fe010000-0x00000000fe010fff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000fed20000-0x00000000fed7ffff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved | |
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087fffffff] usable | |
Jul 11 21:37:24 hacking kernel: NX (Execute Disable) protection: active | |
Jul 11 21:37:24 hacking kernel: APIC: Static calls initialized | |
Jul 11 21:37:24 hacking kernel: efi: EFI v2.9 by INSYDE Corp. | |
Jul 11 21:37:24 hacking kernel: efi: TPMFinalLog=0x67e17000 ACPI=0x67ffe000 ACPI 2.0=0x67ffe014 SMBIOS=0x60dea000 MEMATTR=0x595a9018 ESRT=0x5a526698 RNG=0x67f37f18 INITRD=0x58687f18 TPMEventLog=0x67f2e018 | |
Jul 11 21:37:24 hacking kernel: random: crng init done | |
Jul 11 21:37:24 hacking kernel: efi: Remove mem95: MMIO range=[0xc0000000-0xcfffffff] (256MB) from e820 map | |
Jul 11 21:37:24 hacking kernel: e820: remove [mem 0xc0000000-0xcfffffff] reserved | |
Jul 11 21:37:24 hacking kernel: efi: Not removing mem96: MMIO range=[0xfe010000-0xfe010fff] (4KB) from e820 map | |
Jul 11 21:37:24 hacking kernel: efi: Remove mem98: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map | |
Jul 11 21:37:24 hacking kernel: e820: remove [mem 0xff000000-0xffffffff] reserved | |
Jul 11 21:37:24 hacking kernel: SMBIOS 3.6 present. | |
Jul 11 21:37:24 hacking kernel: DMI: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:37:24 hacking kernel: DMI: Memory slots populated: 1/2 | |
Jul 11 21:37:24 hacking kernel: tsc: Detected 3700.000 MHz processor | |
Jul 11 21:37:24 hacking kernel: tsc: Detected 3686.400 MHz TSC | |
Jul 11 21:37:24 hacking kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved | |
Jul 11 21:37:24 hacking kernel: e820: remove [mem 0x000a0000-0x000fffff] usable | |
Jul 11 21:37:24 hacking kernel: last_pfn = 0x880000 max_arch_pfn = 0x400000000 | |
Jul 11 21:37:24 hacking kernel: MTRR map: 7 entries (3 fixed + 4 variable; max 23), built from 10 variable MTRRs | |
Jul 11 21:37:24 hacking kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT | |
Jul 11 21:37:24 hacking kernel: x2apic: enabled by BIOS, switching to x2apic ops | |
Jul 11 21:37:24 hacking kernel: last_pfn = 0x68000 max_arch_pfn = 0x400000000 | |
Jul 11 21:37:24 hacking kernel: esrt: Reserving ESRT space from 0x000000005a526698 to 0x000000005a526720. | |
Jul 11 21:37:24 hacking kernel: e820: update [mem 0x5a526000-0x5a526fff] usable ==> reserved | |
Jul 11 21:37:24 hacking kernel: Using GB pages for direct mapping | |
Jul 11 21:37:24 hacking kernel: Secure boot disabled | |
Jul 11 21:37:24 hacking kernel: RAMDISK: [mem 0x529c1000-0x547ddfff] | |
Jul 11 21:37:24 hacking kernel: ACPI: Early table checksum verification disabled | |
Jul 11 21:37:24 hacking kernel: ACPI: RSDP 0x0000000067FFE014 000024 (v02 INSYDE) | |
Jul 11 21:37:24 hacking kernel: ACPI: XSDT 0x0000000067FCF188 00014C (v01 INSYDE ARL 00000002 01000013) | |
Jul 11 21:37:24 hacking kernel: ACPI: FACP 0x0000000067FC2000 000114 (v06 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: DSDT 0x0000000067F45000 07944F (v02 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: FACS 0x0000000067DEC000 000040 | |
Jul 11 21:37:24 hacking kernel: ACPI: UEFI 0x0000000067E16000 0001CF (v01 INSYDE H2O BIOS 00000001 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FFC000 000770 (v02 PmRef Cpu0Ist 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FFB000 0005FB (v02 PmRef Cpu0Hwp 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FFA000 0001AB (v02 PmRef Cpu0Psd 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF9000 000394 (v02 PmRef Cpu0Cst 00003001 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF7000 001BAF (v02 PmRef ApIst 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF5000 001620 (v02 PmRef ApHwp 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF3000 001349 (v02 PmRef ApPsd 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF2000 000FBB (v02 PmRef ApCst 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FEE000 003BC8 (v02 CpuRef CpuSsdt 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: DTPR 0x0000000067FED000 000088 (v01 00000000 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FEA000 0021A0 (v02 INTEL IgfxSsdt 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FE0000 009A2C (v02 INTEL TcssSsdt 00001000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: ECDT 0x0000000067FDF000 000069 (v01 00000001 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FDE000 00077B (v02 INSYDE Tpm2Tabl 00001000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: TPM2 0x0000000067FDD000 00004C (v04 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FD2000 009168 (v02 DptfTb DptfTabl 00001000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: LPIT 0x0000000067FD1000 0000CC (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: WSMT 0x0000000067FD0000 000028 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FCD000 0015CD (v02 INSYDE PtidDevc 00001000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FC7000 005E42 (v02 INSYDE TbtTypeC 00000000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: DBGP 0x0000000067FFD000 000034 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: DBG2 0x0000000067FC6000 000054 (v00 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FC4000 00189A (v02 INSYDE UsbCTabl 00001000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: NHLT 0x0000000067FC3000 0002E3 (v00 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: HPET 0x0000000067FC1000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: APIC 0x0000000067FC0000 000358 (v05 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: MCFG 0x0000000067FBF000 00003C (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: DMAR 0x0000000067F44000 000098 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F42000 0010C3 (v02 INTEL xh_mtlpR 00000000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F3F000 00281A (v02 SocGpe SocGpe 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F3C000 0028D3 (v02 SocCmn SocCmn 00003000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F3B000 0000F8 (v02 INSYDE PcdTabl 00001000 INTL 20200717) | |
Jul 11 21:37:24 hacking kernel: ACPI: FPDT 0x0000000067F3A000 000044 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: PHAT 0x0000000067F38000 000790 (v01 INSYDE ARL 00000005 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: BGRT 0x0000000067F39000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000) | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving FACP table memory at [mem 0x67fc2000-0x67fc2113] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DSDT table memory at [mem 0x67f45000-0x67fbe44e] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving FACS table memory at [mem 0x67dec000-0x67dec03f] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving UEFI table memory at [mem 0x67e16000-0x67e161ce] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffc000-0x67ffc76f] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffb000-0x67ffb5fa] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffa000-0x67ffa1aa] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff9000-0x67ff9393] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff7000-0x67ff8bae] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff5000-0x67ff661f] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff3000-0x67ff4348] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff2000-0x67ff2fba] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fee000-0x67ff1bc7] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DTPR table memory at [mem 0x67fed000-0x67fed087] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fea000-0x67fec19f] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fe0000-0x67fe9a2b] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving ECDT table memory at [mem 0x67fdf000-0x67fdf068] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fde000-0x67fde77a] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving TPM2 table memory at [mem 0x67fdd000-0x67fdd04b] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fd2000-0x67fdb167] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving LPIT table memory at [mem 0x67fd1000-0x67fd10cb] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving WSMT table memory at [mem 0x67fd0000-0x67fd0027] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fcd000-0x67fce5cc] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc7000-0x67fcce41] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DBGP table memory at [mem 0x67ffd000-0x67ffd033] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DBG2 table memory at [mem 0x67fc6000-0x67fc6053] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc4000-0x67fc5899] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving NHLT table memory at [mem 0x67fc3000-0x67fc32e2] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving HPET table memory at [mem 0x67fc1000-0x67fc1037] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving APIC table memory at [mem 0x67fc0000-0x67fc0357] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving MCFG table memory at [mem 0x67fbf000-0x67fbf03b] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DMAR table memory at [mem 0x67f44000-0x67f44097] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f42000-0x67f430c2] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3f000-0x67f41819] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3c000-0x67f3e8d2] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3b000-0x67f3b0f7] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving FPDT table memory at [mem 0x67f3a000-0x67f3a043] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving PHAT table memory at [mem 0x67f38000-0x67f3878f] | |
Jul 11 21:37:24 hacking kernel: ACPI: Reserving BGRT table memory at [mem 0x67f39000-0x67f39037] | |
Jul 11 21:37:24 hacking kernel: APIC: Switched APIC routing to: cluster x2apic | |
Jul 11 21:37:24 hacking kernel: No NUMA configuration found | |
Jul 11 21:37:24 hacking kernel: Faking a node at [mem 0x0000000000000000-0x000000087fffffff] | |
Jul 11 21:37:24 hacking kernel: NODE_DATA(0) allocated [mem 0x87ffd5280-0x87fffffff] | |
Jul 11 21:37:24 hacking kernel: Zone ranges: | |
Jul 11 21:37:24 hacking kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] | |
Jul 11 21:37:24 hacking kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] | |
Jul 11 21:37:24 hacking kernel: Normal [mem 0x0000000100000000-0x000000087fffffff] | |
Jul 11 21:37:24 hacking kernel: Device empty | |
Jul 11 21:37:24 hacking kernel: Movable zone start for each node | |
Jul 11 21:37:24 hacking kernel: Early memory node ranges | |
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] | |
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000000100000-0x000000005df8afff] | |
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x000000005e88b000-0x00000000606befff] | |
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000067fff000-0x0000000067ffffff] | |
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000100000000-0x000000087fffffff] | |
Jul 11 21:37:24 hacking kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087fffffff] | |
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA: 1 pages in unavailable ranges | |
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA: 97 pages in unavailable ranges | |
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA32: 2304 pages in unavailable ranges | |
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA32: 31040 pages in unavailable ranges | |
Jul 11 21:37:24 hacking kernel: ACPI: PM-Timer IO Port: 0x1808 | |
Jul 11 21:37:24 hacking kernel: ACPI: X2APIC_NMI (uid[0xffffffff] high level lint[0x1]) | |
Jul 11 21:37:24 hacking kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 | |
Jul 11 21:37:24 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) | |
Jul 11 21:37:24 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) | |
Jul 11 21:37:24 hacking kernel: ACPI: Using ACPI (MADT) for SMP configuration information | |
Jul 11 21:37:24 hacking kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 | |
Jul 11 21:37:24 hacking kernel: e820: update [mem 0x5848d000-0x5851dfff] usable ==> reserved | |
Jul 11 21:37:24 hacking kernel: TSC deadline timer available | |
Jul 11 21:37:24 hacking kernel: CPU topo: Max. logical packages: 1 | |
Jul 11 21:37:24 hacking kernel: CPU topo: Max. logical dies: 1 | |
Jul 11 21:37:24 hacking kernel: CPU topo: Max. dies per package: 1 | |
Jul 11 21:37:24 hacking kernel: CPU topo: Max. threads per core: 1 | |
Jul 11 21:37:24 hacking kernel: CPU topo: Num. cores per package: 16 | |
Jul 11 21:37:24 hacking kernel: CPU topo: Num. threads per package: 16 | |
Jul 11 21:37:24 hacking kernel: CPU topo: Allowing 16 present CPUs plus 0 hotplug CPUs | |
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] | |
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x000fffff] | |
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5848d000-0x5851dfff] | |
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5a526000-0x5a526fff] | |
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5df8b000-0x5e88afff] | |
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x606bf000-0x67ffefff] | |
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x68000000-0xffffffff] | |
Jul 11 21:37:24 hacking kernel: [mem 0x78800000-0xfe00ffff] available for PCI devices | |
Jul 11 21:37:24 hacking kernel: Booting paravirtualized kernel on bare hardware | |
Jul 11 21:37:24 hacking kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns | |
Jul 11 21:37:24 hacking kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 | |
Jul 11 21:37:24 hacking kernel: percpu: Embedded 62 pages/cpu s217088 r8192 d28672 u262144 | |
Jul 11 21:37:24 hacking kernel: pcpu-alloc: s217088 r8192 d28672 u262144 alloc=1*2097152 | |
Jul 11 21:37:24 hacking kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 | |
Jul 11 21:37:24 hacking kernel: Kernel command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2 | |
Jul 11 21:37:24 hacking kernel: printk: log buffer data + meta data: 131072 + 458752 = 589824 bytes | |
Jul 11 21:37:24 hacking kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: software IO TLB: area num 16. | |
Jul 11 21:37:24 hacking kernel: Fallback order for Node 0: 0 | |
Jul 11 21:37:24 hacking kernel: Built 1 zonelists, mobility grouping on. Total pages: 8256862 | |
Jul 11 21:37:24 hacking kernel: Policy zone: Normal | |
Jul 11 21:37:24 hacking kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off | |
Jul 11 21:37:24 hacking kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 | |
Jul 11 21:37:24 hacking kernel: ftrace: allocating 55582 entries in 220 pages | |
Jul 11 21:37:24 hacking kernel: ftrace: allocated 220 pages with 5 groups | |
Jul 11 21:37:24 hacking kernel: Dynamic Preempt: full | |
Jul 11 21:37:24 hacking kernel: rcu: Preemptible hierarchical RCU implementation. | |
Jul 11 21:37:24 hacking kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=16. | |
Jul 11 21:37:24 hacking kernel: rcu: RCU priority boosting: priority 1 delay 500 ms. | |
Jul 11 21:37:24 hacking kernel: Trampoline variant of Tasks RCU enabled. | |
Jul 11 21:37:24 hacking kernel: Rude variant of Tasks RCU enabled. | |
Jul 11 21:37:24 hacking kernel: Tracing variant of Tasks RCU enabled. | |
Jul 11 21:37:24 hacking kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. | |
Jul 11 21:37:24 hacking kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 | |
Jul 11 21:37:24 hacking kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16. | |
Jul 11 21:37:24 hacking kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16. | |
Jul 11 21:37:24 hacking kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16. | |
Jul 11 21:37:24 hacking kernel: NR_IRQS: 524544, nr_irqs: 2184, preallocated irqs: 16 | |
Jul 11 21:37:24 hacking kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. | |
Jul 11 21:37:24 hacking kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) | |
Jul 11 21:37:24 hacking kernel: Console: colour dummy device 80x25 | |
Jul 11 21:37:24 hacking kernel: printk: legacy console [tty0] enabled | |
Jul 11 21:37:24 hacking kernel: ACPI: Core revision 20240827 | |
Jul 11 21:37:24 hacking kernel: hpet: HPET dysfunctional in PC10. Force disabled. | |
Jul 11 21:37:24 hacking kernel: APIC: Switch to symmetric I/O mode setup | |
Jul 11 21:37:24 hacking kernel: DMAR: Host address width 42 | |
Jul 11 21:37:24 hacking kernel: DMAR: DRHD base: 0x000000fc800000 flags: 0x0 | |
Jul 11 21:37:24 hacking kernel: DMAR: dmar0: reg_base_addr fc800000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0ef5e | |
Jul 11 21:37:24 hacking kernel: DMAR: DRHD base: 0x000000fc801000 flags: 0x1 | |
Jul 11 21:37:24 hacking kernel: DMAR: dmar1: reg_base_addr fc801000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0efde | |
Jul 11 21:37:24 hacking kernel: DMAR: SATC flags: 0x1 | |
Jul 11 21:37:24 hacking kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfc801000 IOMMU 1 | |
Jul 11 21:37:24 hacking kernel: DMAR-IR: HPET id 0 under DRHD base 0xfc801000 | |
Jul 11 21:37:24 hacking kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. | |
Jul 11 21:37:24 hacking kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode | |
Jul 11 21:37:24 hacking kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns | |
Jul 11 21:37:24 hacking kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7372.80 BogoMIPS (lpj=3686400) | |
Jul 11 21:37:24 hacking kernel: CPU0: Thermal monitoring enabled (TM1) | |
Jul 11 21:37:24 hacking kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated | |
Jul 11 21:37:24 hacking kernel: CET detected: Indirect Branch Tracking enabled | |
Jul 11 21:37:24 hacking kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 | |
Jul 11 21:37:24 hacking kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 | |
Jul 11 21:37:24 hacking kernel: process: using mwait in idle threads | |
Jul 11 21:37:24 hacking kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization | |
Jul 11 21:37:24 hacking kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS | |
Jul 11 21:37:24 hacking kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier | |
Jul 11 21:37:24 hacking kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl | |
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' | |
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' | |
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' | |
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' | |
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x800: 'Control-flow User registers' | |
Jul 11 21:37:24 hacking kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 | |
Jul 11 21:37:24 hacking kernel: x86/fpu: xstate_offset[9]: 832, xstate_sizes[9]: 8 | |
Jul 11 21:37:24 hacking kernel: x86/fpu: xstate_offset[11]: 840, xstate_sizes[11]: 16 | |
Jul 11 21:37:24 hacking kernel: x86/fpu: Enabled xstate features 0xa07, context size is 856 bytes, using 'compacted' format. | |
Jul 11 21:37:24 hacking kernel: Freeing SMP alternatives memory: 52K | |
Jul 11 21:37:24 hacking kernel: pid_max: default: 32768 minimum: 301 | |
Jul 11 21:37:24 hacking kernel: LSM: initializing lsm=capability,landlock,lockdown,yama,bpf | |
Jul 11 21:37:24 hacking kernel: landlock: Up and running. | |
Jul 11 21:37:24 hacking kernel: Yama: becoming mindful. | |
Jul 11 21:37:24 hacking kernel: LSM support for eBPF active | |
Jul 11 21:37:24 hacking kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: smpboot: CPU0: Intel(R) Core(TM) Ultra 7 255H (family: 0x6, model: 0xc5, stepping: 0x2) | |
Jul 11 21:37:24 hacking kernel: Performance Events: XSAVE Architectural LBR, PEBS fmt5+-baseline, AnyThread deprecated, ArrowLake-H Hybrid events, 32-deep LBR, full-width counters, Intel PMU driver. | |
Jul 11 21:37:24 hacking kernel: core: cpu_core PMU driver: | |
Jul 11 21:37:24 hacking kernel: ... version: 5 | |
Jul 11 21:37:24 hacking kernel: ... bit width: 48 | |
Jul 11 21:37:24 hacking kernel: ... generic registers: 10 | |
Jul 11 21:37:24 hacking kernel: ... value mask: 0000ffffffffffff | |
Jul 11 21:37:24 hacking kernel: ... max period: 00007fffffffffff | |
Jul 11 21:37:24 hacking kernel: ... fixed-purpose events: 4 | |
Jul 11 21:37:24 hacking kernel: ... event mask: 0001000f000003ff | |
Jul 11 21:37:24 hacking kernel: signal: max sigframe size: 3632 | |
Jul 11 21:37:24 hacking kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1411 | |
Jul 11 21:37:24 hacking kernel: rcu: Hierarchical SRCU implementation. | |
Jul 11 21:37:24 hacking kernel: rcu: Max phase no-delay instances is 400. | |
Jul 11 21:37:24 hacking kernel: Timer migration: 2 hierarchy levels; 8 children per group; 2 crossnode level | |
Jul 11 21:37:24 hacking kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. | |
Jul 11 21:37:24 hacking kernel: smp: Bringing up secondary CPUs ... | |
Jul 11 21:37:24 hacking kernel: smpboot: x86: Booting SMP configuration: | |
Jul 11 21:37:24 hacking kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 | |
Jul 11 21:37:24 hacking kernel: core: cpu_atom PMU driver: | |
Jul 11 21:37:24 hacking kernel: ... version: 5 | |
Jul 11 21:37:24 hacking kernel: ... bit width: 48 | |
Jul 11 21:37:24 hacking kernel: ... generic registers: 8 | |
Jul 11 21:37:24 hacking kernel: ... value mask: 0000ffffffffffff | |
Jul 11 21:37:24 hacking kernel: ... max period: 00007fffffffffff | |
Jul 11 21:37:24 hacking kernel: ... fixed-purpose events: 6 | |
Jul 11 21:37:24 hacking kernel: ... event mask: 00000077000000ff | |
Jul 11 21:37:24 hacking kernel: core: cpu_lowpower PMU driver: | |
Jul 11 21:37:24 hacking kernel: ... version: 5 | |
Jul 11 21:37:24 hacking kernel: ... bit width: 48 | |
Jul 11 21:37:24 hacking kernel: ... generic registers: 8 | |
Jul 11 21:37:24 hacking kernel: ... value mask: 0000ffffffffffff | |
Jul 11 21:37:24 hacking kernel: ... max period: 00007fffffffffff | |
Jul 11 21:37:24 hacking kernel: ... fixed-purpose events: 3 | |
Jul 11 21:37:24 hacking kernel: ... event mask: 00000007000000ff | |
Jul 11 21:37:24 hacking kernel: smp: Brought up 1 node, 16 CPUs | |
Jul 11 21:37:24 hacking kernel: smpboot: Total of 16 processors activated (117964.80 BogoMIPS) | |
Jul 11 21:37:24 hacking kernel: Memory: 32269756K/33027448K available (19692K kernel code, 2940K rwdata, 16528K rodata, 4640K init, 5028K bss, 729700K reserved, 0K cma-reserved) | |
Jul 11 21:37:24 hacking kernel: devtmpfs: initialized | |
Jul 11 21:37:24 hacking kernel: x86/mm: Memory block size: 128MB | |
Jul 11 21:37:24 hacking kernel: ACPI: PM: Registering ACPI NVS region [mem 0x626bf000-0x67ebefff] (92274688 bytes) | |
Jul 11 21:37:24 hacking kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns | |
Jul 11 21:37:24 hacking kernel: posixtimers hash table entries: 8192 (order: 5, 131072 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: pinctrl core: initialized pinctrl subsystem | |
Jul 11 21:37:24 hacking kernel: PM: RTC time: 04:37:21, date: 2025-07-12 | |
Jul 11 21:37:24 hacking kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family | |
Jul 11 21:37:24 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations | |
Jul 11 21:37:24 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations | |
Jul 11 21:37:24 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations | |
Jul 11 21:37:24 hacking kernel: audit: initializing netlink subsys (disabled) | |
Jul 11 21:37:24 hacking kernel: audit: type=2000 audit(1752295041.014:1): state=initialized audit_enabled=0 res=1 | |
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'fair_share' | |
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'bang_bang' | |
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'step_wise' | |
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'user_space' | |
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'power_allocator' | |
Jul 11 21:37:24 hacking kernel: cpuidle: using governor ladder | |
Jul 11 21:37:24 hacking kernel: cpuidle: using governor menu | |
Jul 11 21:37:24 hacking kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 | |
Jul 11 21:37:24 hacking kernel: PCI: ECAM [mem 0xc0000000-0xcfffffff] (base 0xc0000000) for domain 0000 [bus 00-ff] | |
Jul 11 21:37:24 hacking kernel: PCI: Using configuration type 1 for base access | |
Jul 11 21:37:24 hacking kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. | |
Jul 11 21:37:24 hacking kernel: HugeTLB: allocation took 0ms with hugepage_allocation_threads=4 | |
Jul 11 21:37:24 hacking kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages | |
Jul 11 21:37:24 hacking kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page | |
Jul 11 21:37:24 hacking kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages | |
Jul 11 21:37:24 hacking kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page | |
Jul 11 21:37:24 hacking kernel: raid6: skipped pq benchmark and selected avx2x4 | |
Jul 11 21:37:24 hacking kernel: raid6: using avx2x2 recovery algorithm | |
Jul 11 21:37:24 hacking kernel: ACPI: Added _OSI(Module Device) | |
Jul 11 21:37:24 hacking kernel: ACPI: Added _OSI(Processor Device) | |
Jul 11 21:37:24 hacking kernel: ACPI: Added _OSI(Processor Aggregator Device) | |
Jul 11 21:37:24 hacking kernel: ACPI: 21 ACPI AML tables successfully acquired and loaded | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: EC started | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: interrupt blocked | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: Boot ECDT EC used to handle transactions | |
Jul 11 21:37:24 hacking kernel: ACPI: USB4 _OSC: OS supports USB3+ DisplayPort+ PCIe+ XDomain+ | |
Jul 11 21:37:24 hacking kernel: ACPI: USB4 _OSC: OS controls USB3+ DisplayPort+ PCIe+ XDomain+ | |
Jul 11 21:37:24 hacking kernel: ACPI: Interpreter enabled | |
Jul 11 21:37:24 hacking kernel: ACPI: PM: (supports S0 S4 S5) | |
Jul 11 21:37:24 hacking kernel: ACPI: Using IOAPIC for interrupt routing | |
Jul 11 21:37:24 hacking kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug | |
Jul 11 21:37:24 hacking kernel: PCI: Ignoring E820 reservations for host bridge windows | |
Jul 11 21:37:24 hacking kernel: ACPI: Enabled 9 GPEs in block 00 to 7F | |
Jul 11 21:37:24 hacking kernel: ACPI: Enabled 8 GPEs in block 80 to DF | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.BTRT: New power resource | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.DBTR: New power resource | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.RP08.PXSX.WRST: New power resource | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.TBT0: New power resource | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.TBT1: New power resource | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.D3C_: New power resource | |
Jul 11 21:37:24 hacking kernel: ACPI: \PIN_: New power resource | |
Jul 11 21:37:24 hacking kernel: ACPI: PCI Root Bridge [PC00] (domain 0000 [bus 00-fe]) | |
Jul 11 21:37:24 hacking kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] | |
Jul 11 21:37:24 hacking kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] | |
Jul 11 21:37:24 hacking kernel: PCI host bridge to bus 0000:00 | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xbfffffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x4000000000-0x3ffbfffffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [bus 00-fe] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:00.0: [8086:7d06] type 00 class 0x060000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: [8086:7dd1] type 00 class 0x030000 PCIe Root Complex Integrated Endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: BAR 0 [mem 0x4818000000-0x4818ffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: BAR 2 [mem 0x4000000000-0x400fffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: DMAR: Skip IOMMU disabling for graphics | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: PME# supported from D0 D3hot | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x00ffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x06ffffff 64bit pref]: contains BAR 0 for 7 VFs | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:04.0: [8086:7d03] type 00 class 0x118000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:04.0: BAR 0 [mem 0x4819280000-0x481929ffff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: [8086:7ecb] type 01 class 0x060400 PCIe Root Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PME# supported from D0 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PTM enabled (root), 4ns granularity | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: [8086:7ec4] type 01 class 0x060400 PCIe Root Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PME# supported from D0 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PTM enabled (root), 4ns granularity | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:08.0: [8086:774c] type 00 class 0x088000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:08.0: BAR 0 [mem 0x48192bf000-0x48192bffff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: [8086:7d0d] type 00 class 0x118000 PCIe Root Complex Integrated Endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: BAR 0 [mem 0x4819240000-0x481927ffff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: enabling Extended Tags | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: [8086:7d1d] type 00 class 0x120000 PCIe Root Complex Integrated Endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: BAR 0 [mem 0x4810000000-0x4817ffffff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: BAR 4 [mem 0x48192be000-0x48192befff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: [8086:7ec0] type 00 class 0x0c0330 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: BAR 0 [mem 0x48192a0000-0x48192affff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: PME# supported from D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: [8086:7ec2] type 00 class 0x0c0340 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: BAR 0 [mem 0x4819200000-0x481923ffff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: BAR 2 [mem 0x48192bd000-0x48192bdfff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: supports D1 D2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: [8086:777d] type 00 class 0x0c0330 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: BAR 0 [mem 0x86320000-0x8632ffff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: [8086:777f] type 00 class 0x050000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: BAR 0 [mem 0x48192b4000-0x48192b7fff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: BAR 2 [mem 0x48192bc000-0x48192bcfff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: [8086:7778] type 00 class 0x0c8000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x00000000-0x00000fff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: [8086:7779] type 00 class 0x0c8000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x00000000-0x00000fff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: [8086:7770] type 00 class 0x078000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: BAR 0 [mem 0x48192b9000-0x48192b9fff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: PME# supported from D3hot | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: [8086:773d] type 01 class 0x060400 PCIe Root Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PTM enabled (root), 4ns granularity | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: [8086:773f] type 01 class 0x060400 PCIe Root Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PTM enabled (root), 4ns granularity | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.0: [8086:7702] type 00 class 0x060100 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: [8086:7728] type 00 class 0x040380 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: BAR 0 [mem 0x48192b0000-0x48192b3fff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: BAR 4 [mem 0x4819000000-0x48191fffff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: [8086:7722] type 00 class 0x0c0500 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: BAR 0 [mem 0x48192b8000-0x48192b80ff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: BAR 4 [io 0xefa0-0xefbf] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: [8086:7723] type 00 class 0x0c8000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: [8086:550a] type 00 class 0x020000 conventional PCI endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: BAR 0 [mem 0x86300000-0x8631ffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: PME# supported from D0 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:01:00.0: [144d:a80d] type 00 class 0x010802 PCIe Endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:01:00.0: BAR 0 [mem 0x86200000-0x86203fff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Upstream Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 00] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x0000-0x0fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: enabling Extended Tags | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: supports D1 D2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PTM enabled, 4ns granularity | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 00] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge window [io 0x0000-0x0fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: enabling Extended Tags | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: supports D1 D2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 00] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x0000-0x0fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: enabling Extended Tags | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: supports D1 D2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 00] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x0000-0x0fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: enabling Extended Tags | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: supports D1 D2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 00] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x0000-0x0fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: enabling Extended Tags | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: supports D1 D2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 00] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge window [io 0x0000-0x0fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: enabling Extended Tags | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: supports D1 D2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PME# supported from D0 D1 D2 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge configuration invalid ([bus 00-00]), reconfiguring | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04-2b] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:04: busn_res: [bus 04-2b] end is updated to 04 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-2b] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-2b] end is updated to 11 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-2b] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-2b] end is updated to 1e | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2b] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2b] end is updated to 2a | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] end is updated to 2b | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] end is updated to 2b | |
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: [1217:8621] type 00 class 0x080501 PCIe Endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: BAR 0 [mem 0x86101000-0x86101fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: BAR 1 [mem 0x86100000-0x861007ff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: PME# supported from D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c] | |
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: [8086:272b] type 00 class 0x028000 PCIe Endpoint | |
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: BAR 0 [mem 0x86000000-0x86003fff 64bit] | |
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: PME# supported from D0 D3hot D3cold | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d] | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PEPD: Duplicate LPS0 _DSM functions (mask: 0x1) | |
Jul 11 21:37:24 hacking kernel: Low-power S0 idle used by default for system suspend | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: interrupt unblocked | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: event unblocked | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 | |
Jul 11 21:37:24 hacking kernel: ACPI: EC: GPE=0x6e | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: Boot ECDT EC initialization complete | |
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: EC: Used to handle transactions and events | |
Jul 11 21:37:24 hacking kernel: iommu: Default domain type: Translated | |
Jul 11 21:37:24 hacking kernel: iommu: DMA domain TLB invalidation policy: lazy mode | |
Jul 11 21:37:24 hacking kernel: SCSI subsystem initialized | |
Jul 11 21:37:24 hacking kernel: libata version 3.00 loaded. | |
Jul 11 21:37:24 hacking kernel: ACPI: bus type USB registered | |
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver usbfs | |
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver hub | |
Jul 11 21:37:24 hacking kernel: usbcore: registered new device driver usb | |
Jul 11 21:37:24 hacking kernel: EDAC MC: Ver: 3.0.0 | |
Jul 11 21:37:24 hacking kernel: efivars: Registered efivars operations | |
Jul 11 21:37:24 hacking kernel: NetLabel: Initializing | |
Jul 11 21:37:24 hacking kernel: NetLabel: domain hash size = 128 | |
Jul 11 21:37:24 hacking kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO | |
Jul 11 21:37:24 hacking kernel: NetLabel: unlabeled traffic allowed by default | |
Jul 11 21:37:24 hacking kernel: mctp: management component transport protocol core | |
Jul 11 21:37:24 hacking kernel: NET: Registered PF_MCTP protocol family | |
Jul 11 21:37:24 hacking kernel: PCI: Using ACPI for IRQ routing | |
Jul 11 21:37:24 hacking kernel: PCI: pci_cache_line_size set to 64 bytes | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff]: can't claim; no compatible bridge window | |
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x0009f000-0x0009ffff] | |
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x5848d000-0x5bffffff] | |
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x5a526000-0x5bffffff] | |
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x5df8b000-0x5fffffff] | |
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x606bf000-0x63ffffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: vgaarb: bridge control possible | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none | |
Jul 11 21:37:24 hacking kernel: vgaarb: loaded | |
Jul 11 21:37:24 hacking kernel: clocksource: Switched to clocksource tsc-early | |
Jul 11 21:37:24 hacking kernel: VFS: Disk quotas dquot_6.6.0 | |
Jul 11 21:37:24 hacking kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) | |
Jul 11 21:37:24 hacking kernel: pnp: PnP ACPI init | |
Jul 11 21:37:24 hacking kernel: system 00:00: [io 0x3322-0x3323] has been reserved | |
Jul 11 21:37:24 hacking kernel: system 00:01: [io 0x1854-0x1857] has been reserved | |
Jul 11 21:37:24 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfedc0000-0xfedc7fff] has been reserved | |
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xc0000000-0xcfffffff] has been reserved | |
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfed20000-0xfed7ffff] could not be reserved | |
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfc800000-0xfc81ffff] could not be reserved | |
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfed45000-0xfed8ffff] could not be reserved | |
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfee00000-0xfeefffff] has been reserved | |
Jul 11 21:37:24 hacking kernel: system 00:04: [io 0x2000-0x20fe] has been reserved | |
Jul 11 21:37:24 hacking kernel: pnp: PnP ACPI: found 6 devices | |
Jul 11 21:37:24 hacking kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns | |
Jul 11 21:37:24 hacking kernel: NET: Registered PF_INET protocol family | |
Jul 11 21:37:24 hacking kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: TCP: Hash tables configured (established 262144 bind 65536) | |
Jul 11 21:37:24 hacking kernel: MPTCP token hash table entries: 32768 (order: 7, 786432 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: UDP hash table entries: 16384 (order: 8, 1048576 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: UDP-Lite hash table entries: 16384 (order: 8, 1048576 bytes, linear) | |
Jul 11 21:37:24 hacking kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family | |
Jul 11 21:37:24 hacking kernel: NET: Registered PF_XDP protocol family | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x1000-0x0fff] to [bus 05-11] add_size 1000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 05-11] add_size 200000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 05-11] add_size 200000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x1000-0x0fff] to [bus 12-1e] add_size 1000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 12-1e] add_size 200000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 12-1e] add_size 200000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x1000-0x0fff] to [bus 1f-2a] add_size 1000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 1f-2a] add_size 200000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 1f-2a] add_size 200000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x1000-0x0fff] to [bus 03-2b] add_size 3000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff 64bit pref] to [bus 03-2b] add_size 600000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff] to [bus 03-2b] add_size 600000 add_align 100000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 02-2b] add_size 4000 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x481a000000-0x4820ffffff 64bit pref]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x48192ba000-0x48192bafff 64bit]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x48192bb000-0x48192bbfff 64bit]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0x86330000-0x86330fff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff]: assigned | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-11] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-1e] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2a] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d] | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xbfffffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 8 [mem 0x4000000000-0x3ffbfffffff window] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:01: resource 1 [mem 0x86200000-0x862fffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:02: resource 0 [io 0x4000-0x7fff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:02: resource 1 [mem 0x80000000-0x85ffffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:02: resource 2 [mem 0x4010000000-0x480fffffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x6fff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: resource 1 [mem 0x80000000-0x808fffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: resource 2 [mem 0x4010000000-0x40108fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: resource 1 [mem 0x80000000-0x801fffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: resource 2 [mem 0x4010000000-0x40101fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: resource 0 [io 0x5000-0x5fff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: resource 1 [mem 0x80200000-0x803fffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: resource 2 [mem 0x4010200000-0x40103fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: resource 0 [io 0x6000-0x6fff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: resource 1 [mem 0x80400000-0x805fffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: resource 2 [mem 0x4010400000-0x40105fffff 64bit pref] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:2c: resource 1 [mem 0x86100000-0x861fffff] | |
Jul 11 21:37:24 hacking kernel: pci_bus 0000:2d: resource 1 [mem 0x86000000-0x860fffff] | |
Jul 11 21:37:24 hacking kernel: PCI: CLS 64 bytes, default 64 | |
Jul 11 21:37:24 hacking kernel: DMAR: Intel-IOMMU force enabled due to platform opt in | |
Jul 11 21:37:24 hacking kernel: DMAR: No RMRR found | |
Jul 11 21:37:24 hacking kernel: DMAR: No ATSR found | |
Jul 11 21:37:24 hacking kernel: DMAR: dmar0: Using Queued invalidation | |
Jul 11 21:37:24 hacking kernel: DMAR: dmar1: Using Queued invalidation | |
Jul 11 21:37:24 hacking kernel: Trying to unpack rootfs image as initramfs... | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: Adding to iommu group 0 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:00.0: Adding to iommu group 1 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:04.0: Adding to iommu group 2 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: Adding to iommu group 3 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: Adding to iommu group 4 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:08.0: Adding to iommu group 5 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: Adding to iommu group 6 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: Adding to iommu group 7 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: Adding to iommu group 8 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: Adding to iommu group 8 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: Adding to iommu group 9 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: Adding to iommu group 9 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: Adding to iommu group 10 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: Adding to iommu group 10 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: Adding to iommu group 11 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: Adding to iommu group 12 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: Adding to iommu group 13 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.0: Adding to iommu group 14 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: Adding to iommu group 14 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: Adding to iommu group 14 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: Adding to iommu group 14 | |
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: Adding to iommu group 14 | |
Jul 11 21:37:24 hacking kernel: pci 0000:01:00.0: Adding to iommu group 15 | |
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: Adding to iommu group 16 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: Adding to iommu group 17 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: Adding to iommu group 18 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: Adding to iommu group 19 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: Adding to iommu group 20 | |
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: Adding to iommu group 21 | |
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: Adding to iommu group 22 | |
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: Adding to iommu group 23 | |
Jul 11 21:37:24 hacking kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O | |
Jul 11 21:37:24 hacking kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) | |
Jul 11 21:37:24 hacking kernel: software IO TLB: mapped [mem 0x000000004e9c1000-0x00000000529c1000] (64MB) | |
Jul 11 21:37:24 hacking kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns | |
Jul 11 21:37:24 hacking kernel: clocksource: Switched to clocksource tsc | |
Jul 11 21:37:24 hacking kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) | |
Jul 11 21:37:24 hacking kernel: Initialise system trusted keyrings | |
Jul 11 21:37:24 hacking kernel: Key type blacklist registered | |
Jul 11 21:37:24 hacking kernel: workingset: timestamp_bits=36 max_order=23 bucket_order=0 | |
Jul 11 21:37:24 hacking kernel: fuse: init (API version 7.43) | |
Jul 11 21:37:24 hacking kernel: integrity: Platform Keyring initialized | |
Jul 11 21:37:24 hacking kernel: integrity: Machine keyring initialized | |
Jul 11 21:37:24 hacking kernel: xor: automatically using best checksumming function avx | |
Jul 11 21:37:24 hacking kernel: Key type asymmetric registered | |
Jul 11 21:37:24 hacking kernel: Asymmetric key parser 'x509' registered | |
Jul 11 21:37:24 hacking kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) | |
Jul 11 21:37:24 hacking kernel: io scheduler mq-deadline registered | |
Jul 11 21:37:24 hacking kernel: io scheduler kyber registered | |
Jul 11 21:37:24 hacking kernel: io scheduler bfq registered | |
Jul 11 21:37:24 hacking kernel: ledtrig-cpu: registered to indicate activity on CPUs | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:06.0: PME: Signaling with IRQ 122 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:06.0: AER: enabled with IRQ 122 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:07.0: PME: Signaling with IRQ 123 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:07.0: AER: enabled with IRQ 123 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 124 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 124 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.7: PME: Signaling with IRQ 125 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.7: AER: enabled with IRQ 125 | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:02:00.0: enabling device (0000 -> 0003) | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:01.0: enabling device (0000 -> 0003) | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:01.0: pciehp: Slot #1 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:02.0: enabling device (0000 -> 0003) | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:02.0: pciehp: Slot #2 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:03.0: enabling device (0000 -> 0003) | |
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:03.0: pciehp: Slot #3 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ | |
Jul 11 21:37:24 hacking kernel: Monitor-Mwait will be used to enter C-1 state | |
Jul 11 21:37:24 hacking kernel: Monitor-Mwait will be used to enter C-2 state | |
Jul 11 21:37:24 hacking kernel: Monitor-Mwait will be used to enter C-3 state | |
Jul 11 21:37:24 hacking kernel: intel_idle: max_cstate 2 reached | |
Jul 11 21:37:24 hacking kernel: ACPI: AC: AC Adapter [AC] (on-line) | |
Jul 11 21:37:24 hacking kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 | |
Jul 11 21:37:24 hacking kernel: ACPI: button: Power Button [PWRB] | |
Jul 11 21:37:24 hacking kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 | |
Jul 11 21:37:24 hacking kernel: ACPI: button: Sleep Button [SLPB] | |
Jul 11 21:37:24 hacking kernel: input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0D:00/input/input2 | |
Jul 11 21:37:24 hacking kernel: ACPI: button: Lid Switch [LID0] | |
Jul 11 21:37:24 hacking kernel: Freeing initrd memory: 30836K | |
Jul 11 21:37:24 hacking kernel: thermal LNXTHERM:00: registered as thermal_zone0 | |
Jul 11 21:37:24 hacking kernel: ACPI: thermal: Thermal Zone [TZ0] (56 C) | |
Jul 11 21:37:24 hacking kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled | |
Jul 11 21:37:24 hacking kernel: ACPI: battery: Slot [BAT0] (battery present) | |
Jul 11 21:37:24 hacking kernel: hpet_acpi_add: no address or irqs in _CRS | |
Jul 11 21:37:24 hacking kernel: Non-volatile memory driver v1.3 | |
Jul 11 21:37:24 hacking kernel: Linux agpgart interface v0.103 | |
Jul 11 21:37:24 hacking kernel: tpm_tis IFX1523:00: 2.0 TPM (device-id 0x1D, rev-id 54) | |
Jul 11 21:37:24 hacking kernel: ACPI: bus type drm_connector registered | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 1 | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810 | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 2 | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: Host supports USB 3.2 Enhanced SuperSpeed | |
Jul 11 21:37:24 hacking kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15 | |
Jul 11 21:37:24 hacking kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 11 21:37:24 hacking kernel: usb usb1: Product: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: usb usb1: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 11 21:37:24 hacking kernel: usb usb1: SerialNumber: 0000:00:0d.0 | |
Jul 11 21:37:24 hacking kernel: hub 1-0:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 1-0:1.0: 1 port detected | |
Jul 11 21:37:24 hacking kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15 | |
Jul 11 21:37:24 hacking kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 11 21:37:24 hacking kernel: usb usb2: Product: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: usb usb2: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 11 21:37:24 hacking kernel: usb usb2: SerialNumber: 0000:00:0d.0 | |
Jul 11 21:37:24 hacking kernel: hub 2-0:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 2-0:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 3 | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810 | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4 | |
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.2 Enhanced SuperSpeed | |
Jul 11 21:37:24 hacking kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15 | |
Jul 11 21:37:24 hacking kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 11 21:37:24 hacking kernel: usb usb3: Product: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: usb usb3: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 11 21:37:24 hacking kernel: usb usb3: SerialNumber: 0000:00:14.0 | |
Jul 11 21:37:24 hacking kernel: hub 3-0:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 3-0:1.0: 12 ports detected | |
Jul 11 21:37:24 hacking kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15 | |
Jul 11 21:37:24 hacking kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 | |
Jul 11 21:37:24 hacking kernel: usb usb4: Product: xHCI Host Controller | |
Jul 11 21:37:24 hacking kernel: usb usb4: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd | |
Jul 11 21:37:24 hacking kernel: usb usb4: SerialNumber: 0000:00:14.0 | |
Jul 11 21:37:24 hacking kernel: hub 4-0:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 4-0:1.0: 2 ports detected | |
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver usbserial_generic | |
Jul 11 21:37:24 hacking kernel: usbserial: USB Serial support registered for generic | |
Jul 11 21:37:24 hacking kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K] at 0x60,0x64 irq 1 | |
Jul 11 21:37:24 hacking kernel: i8042: PNP: PS/2 appears to have AUX port disabled, if this is incorrect please boot with i8042.nopnp | |
Jul 11 21:37:24 hacking kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 | |
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: RTC can wake from S4 | |
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: registered as rtc0 | |
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: setting system clock to 2025-07-12T04:37:21 UTC (1752295041) | |
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram | |
Jul 11 21:37:24 hacking kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input3 | |
Jul 11 21:37:24 hacking kernel: intel_pstate: Intel P-state driver initializing | |
Jul 11 21:37:24 hacking kernel: Hybrid CPU capacity scaling enabled | |
Jul 11 21:37:24 hacking kernel: intel_pstate: HWP enabled | |
Jul 11 21:37:24 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] Registered 1 planes with drm panic | |
Jul 11 21:37:24 hacking kernel: [drm] Initialized simpledrm 1.0.0 for simple-framebuffer.0 on minor 0 | |
Jul 11 21:37:24 hacking kernel: fbcon: Deferring console take-over | |
Jul 11 21:37:24 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] fb0: simpledrmdrmfb frame buffer device | |
Jul 11 21:37:24 hacking kernel: hid: raw HID events driver (C) Jiri Kosina | |
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver usbhid | |
Jul 11 21:37:24 hacking kernel: usbhid: USB HID core driver | |
Jul 11 21:37:24 hacking kernel: drop_monitor: Initializing network drop monitor service | |
Jul 11 21:37:24 hacking kernel: NET: Registered PF_INET6 protocol family | |
Jul 11 21:37:24 hacking kernel: Segment Routing with IPv6 | |
Jul 11 21:37:24 hacking kernel: RPL Segment Routing with IPv6 | |
Jul 11 21:37:24 hacking kernel: In-situ OAM (IOAM) with IPv6 | |
Jul 11 21:37:24 hacking kernel: NET: Registered PF_PACKET protocol family | |
Jul 11 21:37:24 hacking kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' | |
Jul 11 21:37:24 hacking kernel: microcode: Current revision: 0x00000118 | |
Jul 11 21:37:24 hacking kernel: microcode: Updated early from: 0x00000115 | |
Jul 11 21:37:24 hacking kernel: IPI shorthand broadcast: enabled | |
Jul 11 21:37:24 hacking kernel: sched_clock: Marking stable (660001705, 6079433)->(703124205, -37043067) | |
Jul 11 21:37:24 hacking kernel: registered taskstats version 1 | |
Jul 11 21:37:24 hacking kernel: Loading compiled-in X.509 certificates | |
Jul 11 21:37:24 hacking kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c92675c24f6b4bd17516ae0e98b61f2812601d04' | |
Jul 11 21:37:24 hacking kernel: zswap: loaded using pool zstd/zsmalloc | |
Jul 11 21:37:24 hacking kernel: Demotion targets for Node 0: null | |
Jul 11 21:37:24 hacking kernel: Key type .fscrypt registered | |
Jul 11 21:37:24 hacking kernel: Key type fscrypt-provisioning registered | |
Jul 11 21:37:24 hacking kernel: Btrfs loaded, zoned=yes, fsverity=yes | |
Jul 11 21:37:24 hacking kernel: Key type big_key registered | |
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' | |
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation: Windows UEFI CA 2023: aefc5fbbbe055d8f8daa585473499417ab5a5272' | |
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' | |
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft UEFI CA 2023: 81aa6b3244c935bce0d6628af39827421e32497d' | |
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Secure Certificate: 01dcc89619884ca147983429f8a4a1a0' | |
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db | |
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Cus CA: d6136d376b87ef934511c12ce2c3880c' | |
Jul 11 21:37:24 hacking kernel: PM: Magic number: 1:909:615 | |
Jul 11 21:37:24 hacking kernel: platform INTC1062:01: hash matches | |
Jul 11 21:37:24 hacking kernel: acpi INTC1062:01: hash matches | |
Jul 11 21:37:24 hacking kernel: RAS: Correctable Errors collector initialized. | |
Jul 11 21:37:24 hacking kernel: clk: Disabling unused clocks | |
Jul 11 21:37:24 hacking kernel: PM: genpd: Disabling unused power domains | |
Jul 11 21:37:24 hacking kernel: Freeing unused decrypted memory: 2028K | |
Jul 11 21:37:24 hacking kernel: Freeing unused kernel image (initmem) memory: 4640K | |
Jul 11 21:37:24 hacking kernel: Write protecting the kernel read-only data: 38912k | |
Jul 11 21:37:24 hacking kernel: Freeing unused kernel image (text/rodata gap) memory: 784K | |
Jul 11 21:37:24 hacking kernel: Freeing unused kernel image (rodata/data gap) memory: 1904K | |
Jul 11 21:37:24 hacking kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. | |
Jul 11 21:37:24 hacking kernel: rodata_test: all tests were successful | |
Jul 11 21:37:24 hacking kernel: Run /init as init process | |
Jul 11 21:37:24 hacking kernel: with arguments: | |
Jul 11 21:37:24 hacking kernel: /init | |
Jul 11 21:37:24 hacking kernel: with environment: | |
Jul 11 21:37:24 hacking kernel: HOME=/ | |
Jul 11 21:37:24 hacking kernel: TERM=linux | |
Jul 11 21:37:24 hacking kernel: fbcon: Taking over console | |
Jul 11 21:37:24 hacking kernel: Console: switching to colour frame buffer device 240x67 | |
Jul 11 21:37:24 hacking kernel: usb 3-6: new high-speed USB device number 2 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 2 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: Key type psk registered | |
Jul 11 21:37:24 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34 | |
Jul 11 21:37:24 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 2-1: Product: USB3.0 Hub | |
Jul 11 21:37:24 hacking kernel: usb 2-1: Manufacturer: Intel Corporation. | |
Jul 11 21:37:24 hacking kernel: hub 2-1:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 2-1:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: sdhci: Secure Digital Host Controller Interface driver | |
Jul 11 21:37:24 hacking kernel: sdhci: Copyright(c) Pierre Ossman | |
Jul 11 21:37:24 hacking kernel: nvme 0000:01:00.0: platform quirk: setting simple suspend | |
Jul 11 21:37:24 hacking kernel: nvme nvme0: pci function 0000:01:00.0 | |
Jul 11 21:37:24 hacking kernel: nvme nvme0: D3 entry latency set to 10 seconds | |
Jul 11 21:37:24 hacking kernel: nvme nvme0: allocated 64 MiB host memory buffer (16 segments). | |
Jul 11 21:37:24 hacking kernel: nvme nvme0: 16/0/0 default/read/poll queues | |
Jul 11 21:37:24 hacking kernel: nvme0n1: p1 p2 p3 | |
Jul 11 21:37:24 hacking kernel: sdhci-pci 0000:2c:00.0: SDHCI controller found [1217:8621] (rev 1) | |
Jul 11 21:37:24 hacking kernel: sdhci-pci 0000:2c:00.0: enabling device (0000 -> 0002) | |
Jul 11 21:37:24 hacking kernel: mmc0: SDHCI controller on PCI [0000:2c:00.0] using ADMA | |
Jul 11 21:37:24 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01 | |
Jul 11 21:37:24 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 3-6: Product: USB2.0 Hub | |
Jul 11 21:37:24 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc. | |
Jul 11 21:37:24 hacking kernel: hub 3-6:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 3-6:1.0: 6 ports detected | |
Jul 11 21:37:24 hacking kernel: usb 3-7: new high-speed USB device number 3 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Found meteorlake (device ID 7dd1) integrated display version 14.00 stepping D0 | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access | |
Jul 11 21:37:24 hacking kernel: Console: switching to colour dummy device 80x25 | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: vgaarb: deactivate vga console | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Using Transparent Hugepages | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/mtl_dmc.bin (v2.23) | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GuC firmware i915/mtl_guc_70.bin version 70.44.1 | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: submission enabled | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: RC enabled | |
Jul 11 21:37:24 hacking kernel: usb 3-7: New USB device found, idVendor=04f2, idProduct=b729, bcdDevice=27.39 | |
Jul 11 21:37:24 hacking kernel: usb 3-7: New USB device strings: Mfr=3, Product=1, SerialNumber=2 | |
Jul 11 21:37:24 hacking kernel: usb 3-7: Product: Chicony USB2.0 Camera | |
Jul 11 21:37:24 hacking kernel: usb 3-7: Manufacturer: CHICONY | |
Jul 11 21:37:24 hacking kernel: usb 3-7: SerialNumber: 200901010001 | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GuC firmware i915/mtl_guc_70.bin version 70.44.1 | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC firmware i915/mtl_huc_gsc.bin version 8.5.4 | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for clear media | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: submission enabled | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: SLPC enabled | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: RC enabled | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Protected Xe Path (PXP) protected content support initialized | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] *ERROR* [CRTC:82:pipe A] DSB 0 poll error | |
Jul 11 21:37:24 hacking kernel: [drm] Initialized i915 1.6.0 for 0000:00:02.0 on minor 1 | |
Jul 11 21:37:24 hacking kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no) | |
Jul 11 21:37:24 hacking kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input4 | |
Jul 11 21:37:24 hacking kernel: usb 3-10: new full-speed USB device number 4 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 3 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4: Product: USB3.2 Hub | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic | |
Jul 11 21:37:24 hacking kernel: hub 2-1.4:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 2-1.4:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: Loaded GSC firmware i915/mtl_gsc_1.bin (cv1.0, r102.1.15.1926, svn 1) | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for all workloads | |
Jul 11 21:37:24 hacking kernel: usb 3-10: New USB device found, idVendor=8087, idProduct=0036, bcdDevice= 0.00 | |
Jul 11 21:37:24 hacking kernel: usb 3-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.2: new full-speed USB device number 5 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.2: Product: S34C65T | |
Jul 11 21:37:24 hacking kernel: usb 3-6.2: Manufacturer: Samsung | |
Jul 11 21:37:24 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 4 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Manufacturer: Generic | |
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: new high-speed USB device number 6 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 5 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Product: USB2.1 Hub | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: new high-speed USB device number 7 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Manufacturer: Generic | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: fbcon: i915drmfb (fb0) is primary device | |
Jul 11 21:37:24 hacking kernel: Console: switching to colour frame buffer device 240x75 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 8 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: Device not responding to setup address. | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: USB disconnect, device number 6 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: USB disconnect, device number 7 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: USB disconnect, device number 4 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: USB disconnect, device number 5 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: Device not responding to setup address. | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4: reset SuperSpeed USB device number 3 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: device not accepting address 8, error -71 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: WARN: invalid context state for evaluate context command. | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1-port3: attempt power cycle | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 6 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Manufacturer: Generic | |
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 7 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6 | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek | |
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001 | |
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] fb0: i915drmfb frame buffer device | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: new high-speed USB device number 12 using xhci_hcd | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Product: USB2.1 Hub | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking kernel: EXT4-fs (nvme0n1p3): mounted filesystem 2403f944-7fdf-4185-8119-4f6fd8f7f887 r/w with ordered data mode. Quota mode: none. | |
Jul 11 21:37:24 hacking systemd[1]: systemd 257.7-1-arch running in system mode (+PAM +AUDIT -SELINUX -APPARMOR -IMA +IPE +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +BTF +XKBCOMMON +UTMP -SYSVINIT +LIBARCHIVE) | |
Jul 11 21:37:24 hacking systemd[1]: Detected architecture x86-64. | |
Jul 11 21:37:24 hacking systemd[1]: Hostname set to <hacking>. | |
Jul 11 21:37:24 hacking systemd[1]: bpf-restrict-fs: LSM BPF program attached | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: new high-speed USB device number 13 using xhci_hcd | |
Jul 11 21:37:24 hacking systemd[1]: Queued start job for default target Graphical Interface. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/dirmngr. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/getty. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent-browser. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent-extra. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent-ssh. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/keyboxd. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/modprobe. | |
Jul 11 21:37:24 hacking systemd[1]: Created slice User and Session Slice. | |
Jul 11 21:37:24 hacking systemd[1]: Started Dispatch Password Requests to Console Directory Watch. | |
Jul 11 21:37:24 hacking systemd[1]: Started Forward Password Requests to Wall Directory Watch. | |
Jul 11 21:37:24 hacking systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. | |
Jul 11 21:37:24 hacking systemd[1]: Expecting device /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7... | |
Jul 11 21:37:24 hacking systemd[1]: Expecting device /dev/disk/by-uuid/860B-DC20... | |
Jul 11 21:37:24 hacking systemd[1]: Reached target Local Encrypted Volumes. | |
Jul 11 21:37:24 hacking systemd[1]: Reached target Local Integrity Protected Volumes. | |
Jul 11 21:37:24 hacking systemd[1]: Reached target Path Units. | |
Jul 11 21:37:24 hacking systemd[1]: Reached target Remote File Systems. | |
Jul 11 21:37:24 hacking systemd[1]: Reached target Slice Units. | |
Jul 11 21:37:24 hacking systemd[1]: Reached target Local Verity Protected Volumes. | |
Jul 11 21:37:24 hacking systemd[1]: Listening on Device-mapper event daemon FIFOs. | |
Jul 11 21:37:24 hacking systemd[1]: Listening on Process Core Dump Socket. | |
Jul 11 21:37:24 hacking systemd[1]: Listening on Credential Encryption/Decryption. | |
Jul 11 21:37:24 hacking systemd[1]: Listening on Journal Socket (/dev/log). | |
Jul 11 21:37:24 hacking systemd[1]: Listening on Journal Sockets. | |
Jul 11 21:37:24 hacking systemd[1]: TPM PCR Measurements was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:24 hacking systemd[1]: Make TPM PCR Policy was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:24 hacking systemd[1]: Listening on udev Control Socket. | |
Jul 11 21:37:24 hacking systemd[1]: Listening on udev Kernel Socket. | |
Jul 11 21:37:24 hacking systemd[1]: Listening on User Database Manager Socket. | |
Jul 11 21:37:24 hacking systemd[1]: Mounting Huge Pages File System... | |
Jul 11 21:37:24 hacking systemd[1]: Mounting POSIX Message Queue File System... | |
Jul 11 21:37:24 hacking systemd[1]: Mounting Kernel Debug File System... | |
Jul 11 21:37:24 hacking systemd[1]: Mounting Kernel Trace File System... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Create List of Static Device Nodes... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module configfs... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module dm_mod... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module drm... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module fuse... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module loop... | |
Jul 11 21:37:24 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). | |
Jul 11 21:37:24 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). | |
Jul 11 21:37:24 hacking kernel: device-mapper: uevent: version 1.0.3 | |
Jul 11 21:37:24 hacking kernel: device-mapper: ioctl: 4.49.0-ioctl (2025-01-17) initialised: [email protected] | |
Jul 11 21:37:24 hacking systemd[1]: Starting Journal Service... | |
Jul 11 21:37:24 hacking kernel: loop: module loaded | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Modules... | |
Jul 11 21:37:24 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:24 hacking systemd[1]: Starting Remount Root and Kernel File Systems... | |
Jul 11 21:37:24 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load udev Rules from Credentials... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Coldplug All udev Devices... | |
Jul 11 21:37:24 hacking systemd-journald[410]: Collecting audit messages is disabled. | |
Jul 11 21:37:24 hacking kernel: Asymmetric key parser 'pkcs8' registered | |
Jul 11 21:37:24 hacking systemd[1]: Mounted Huge Pages File System. | |
Jul 11 21:37:24 hacking systemd[1]: Mounted POSIX Message Queue File System. | |
Jul 11 21:37:24 hacking systemd[1]: Mounted Kernel Debug File System. | |
Jul 11 21:37:24 hacking systemd[1]: Mounted Kernel Trace File System. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Create List of Static Device Nodes. | |
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module configfs. | |
Jul 11 21:37:24 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module dm_mod. | |
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module drm. | |
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module fuse. | |
Jul 11 21:37:24 hacking kernel: EXT4-fs (nvme0n1p3): re-mounted 2403f944-7fdf-4185-8119-4f6fd8f7f887. | |
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module loop. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Modules. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Remount Root and Kernel File Systems. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load udev Rules from Credentials. | |
Jul 11 21:37:24 hacking systemd[1]: Mounting FUSE Control File System... | |
Jul 11 21:37:24 hacking systemd[1]: Mounting Kernel Configuration File System... | |
Jul 11 21:37:24 hacking systemd[1]: Rebuild Hardware Database was skipped because no trigger condition checks were met. | |
Jul 11 21:37:24 hacking systemd[1]: Starting Load/Save OS Random Seed... | |
Jul 11 21:37:24 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. | |
Jul 11 21:37:24 hacking systemd[1]: Starting Apply Kernel Variables... | |
Jul 11 21:37:24 hacking systemd[1]: Starting Create Static Device Nodes in /dev gracefully... | |
Jul 11 21:37:24 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:24 hacking systemd[1]: Mounted FUSE Control File System. | |
Jul 11 21:37:24 hacking systemd[1]: Mounted Kernel Configuration File System. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Load/Save OS Random Seed. | |
Jul 11 21:37:24 hacking systemd[1]: Finished Apply Kernel Variables. | |
Jul 11 21:37:24 hacking systemd[1]: Starting User Database Manager... | |
Jul 11 21:37:24 hacking systemd-journald[410]: Journal started | |
Jul 11 21:37:24 hacking systemd-journald[410]: Runtime Journal (/run/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 8M, max 1.5G, 1.5G free. | |
Jul 11 21:37:24 hacking systemd-modules-load[412]: Inserted module 'crypto_user' | |
Jul 11 21:37:24 hacking systemd-modules-load[412]: Inserted module 'pkcs8_key_parser' | |
Jul 11 21:37:24 hacking systemd[1]: Started Journal Service. | |
Jul 11 21:37:24 hacking systemd[1]: Starting Flush Journal to Persistent Storage... | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub | |
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Manufacturer: Generic | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: USB hub found | |
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected | |
Jul 11 21:37:24 hacking systemd-journald[410]: Time spent on flushing to /var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b is 14.702ms for 1099 entries. | |
Jul 11 21:37:24 hacking systemd-journald[410]: System Journal (/var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 80M, max 4G, 3.9G free. | |
Jul 11 21:37:25 hacking systemd-journald[410]: Received client request to flush runtime journal. | |
Jul 11 21:37:24 hacking systemd[1]: Started User Database Manager. | |
Jul 11 21:37:25 hacking systemd[1]: Finished Create Static Device Nodes in /dev gracefully. | |
Jul 11 21:37:25 hacking systemd[1]: Starting Create System Users... | |
Jul 11 21:37:25 hacking systemd[1]: Finished Coldplug All udev Devices. | |
Jul 11 21:37:25 hacking systemd[1]: Finished Flush Journal to Persistent Storage. | |
Jul 11 21:37:25 hacking systemd[1]: Finished Create System Users. | |
Jul 11 21:37:25 hacking systemd[1]: Starting Create Static Device Nodes in /dev... | |
Jul 11 21:37:25 hacking systemd[1]: Finished Create Static Device Nodes in /dev. | |
Jul 11 21:37:25 hacking systemd[1]: Reached target Preparation for Local File Systems. | |
Jul 11 21:37:25 hacking systemd[1]: Starting Rule-based Manager for Device Events and Files... | |
Jul 11 21:37:25 hacking systemd-udevd[461]: Using default interface naming scheme 'v257'. | |
Jul 11 21:37:25 hacking systemd[1]: Started Rule-based Manager for Device Events and Files. | |
Jul 11 21:37:25 hacking systemd[1]: Reached target Trusted Platform Module. | |
Jul 11 21:37:25 hacking kernel: tuxedo_compatibility_check: loading out-of-tree module taints kernel. | |
Jul 11 21:37:25 hacking kernel: tuxedo_compatibility_check: module verification failed: signature and/or required key missing - tainting kernel | |
Jul 11 21:37:25 hacking kernel: input: Intel HID events as /devices/platform/INTC10CB:00/input/input5 | |
Jul 11 21:37:25 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB swap\x20partition. | |
Jul 11 21:37:25 hacking kernel: tuxedo_keyboard: module init | |
Jul 11 21:37:25 hacking kernel: pci 0000:00:0b.0: Setting to D3hot | |
Jul 11 21:37:25 hacking kernel: resource: resource sanity check: requesting [mem 0x00000000fedc0000-0x00000000fedcffff], which spans more than pnp 00:03 [mem 0xfedc0000-0xfedc7fff] | |
Jul 11 21:37:25 hacking kernel: caller igen6_probe+0x155/0x81c [igen6_edac] mapping multiple BARs | |
Jul 11 21:37:25 hacking kernel: EDAC MC0: Giving out device to module igen6_edac controller Intel_client_SoC MC#0: DEV 0000:00:00.0 (INTERRUPT) | |
Jul 11 21:37:25 hacking kernel: EDAC igen6: Expected 2 mcs, but only 1 detected. | |
Jul 11 21:37:25 hacking kernel: EDAC igen6: v2.5.1 | |
Jul 11 21:37:25 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB EFI\x20system\x20partition. | |
Jul 11 21:37:25 hacking kernel: pps_core: LinuxPPS API ver. 1 registered | |
Jul 11 21:37:25 hacking kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <[email protected]> | |
Jul 11 21:37:25 hacking kernel: pci 0000:00:08.0: Setting to D3hot | |
Jul 11 21:37:25 hacking systemd[1]: Activating swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7... | |
Jul 11 21:37:25 hacking kernel: PTP clock support registered | |
Jul 11 21:37:25 hacking kernel: ACPI: bus type thunderbolt registered | |
Jul 11 21:37:25 hacking systemd[1]: Created slice Slice /system/systemd-backlight. | |
Jul 11 21:37:25 hacking kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set | |
Jul 11 21:37:25 hacking kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt | |
Jul 11 21:37:25 hacking kernel: e1000e: Intel(R) PRO/1000 Network Driver | |
Jul 11 21:37:25 hacking kernel: e1000e: Copyright(c) 1999 - 2015 Intel Corporation. | |
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode | |
Jul 11 21:37:25 hacking kernel: tuxedo_keyboard: Set keyboard backlight mode on CUSTOM | |
Jul 11 21:37:25 hacking kernel: intel_pmc_core INT33A1:00: Assuming a default substate order for this platform | |
Jul 11 21:37:25 hacking kernel: intel_pmc_core INT33A1:00: pmc_core: couldn't get DMU telem endpoint -6 | |
Jul 11 21:37:25 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Firmware: intel/vpu/vpu_37xx_v1.bin, version: 20250415*MTL_CLIENT_SILICON-release*1900*ci_tag_ud202518_vpu_rc_20250415_1900*7ef0f3fdb82 | |
Jul 11 21:37:25 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Scheduler mode: HW | |
Jul 11 21:37:25 hacking kernel: intel_pmc_core INT33A1:00: initialized | |
Jul 11 21:37:25 hacking kernel: ACPI: battery: new hook: TUXEDO Flexicharger Extension | |
Jul 11 21:37:25 hacking kernel: input: TUXEDO Keyboard as /devices/platform/tuxedo_keyboard/input/input6 | |
Jul 11 21:37:25 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of backlight:intel_backlight... | |
Jul 11 21:37:25 hacking kernel: clevo_acpi: interface initialized | |
Jul 11 21:37:25 hacking kernel: intel-lpss 0000:00:15.0: enabling device (0004 -> 0006) | |
Jul 11 21:37:25 hacking kernel: Adding 4194300k swap on /dev/nvme0n1p2. Priority:-2 extents:1 across:4194300k SS | |
Jul 11 21:37:25 hacking kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit | |
Jul 11 21:37:25 hacking systemd[1]: Activated swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7. | |
Jul 11 21:37:25 hacking systemd[1]: Reached target Swaps. | |
Jul 11 21:37:25 hacking kernel: input: PC Speaker as /devices/platform/pcspkr/input/input7 | |
Jul 11 21:37:25 hacking kernel: mc: Linux media interface: v0.10 | |
Jul 11 21:37:25 hacking kernel: clevo_wmi: interface initialized | |
Jul 11 21:37:25 hacking kernel: intel-lpss 0000:00:15.1: enabling device (0004 -> 0006) | |
Jul 11 21:37:25 hacking kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit | |
Jul 11 21:37:25 hacking kernel: iTCO_vendor_support: vendor-support=0 | |
Jul 11 21:37:25 hacking kernel: intel_rapl_msr: PL4 support detected. | |
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain package | |
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain core | |
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain uncore | |
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain psys | |
Jul 11 21:37:25 hacking kernel: mei_gsc_proxy 0000:00:16.0-0f73db04-97ab-4125-b893-e904ad0d5464: bound 0000:00:02.0 (ops i915_gsc_proxy_component_ops [i915]) | |
Jul 11 21:37:25 hacking systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. | |
Jul 11 21:37:25 hacking systemd[1]: Starting Virtual Console Setup... | |
Jul 11 21:37:25 hacking kernel: Bluetooth: Core ver 2.22 | |
Jul 11 21:37:25 hacking kernel: NET: Registered PF_BLUETOOTH protocol family | |
Jul 11 21:37:25 hacking kernel: Bluetooth: HCI device and connection manager initialized | |
Jul 11 21:37:25 hacking kernel: Bluetooth: HCI socket layer initialized | |
Jul 11 21:37:25 hacking kernel: Bluetooth: L2CAP socket layer initialized | |
Jul 11 21:37:25 hacking kernel: Bluetooth: SCO socket layer initialized | |
Jul 11 21:37:25 hacking kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database | |
Jul 11 21:37:25 hacking kernel: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' | |
Jul 11 21:37:25 hacking kernel: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' | |
Jul 11 21:37:25 hacking kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 | |
Jul 11 21:37:25 hacking kernel: cfg80211: failed to load regulatory.db | |
Jul 11 21:37:25 hacking systemd[1]: Finished Virtual Console Setup. | |
Jul 11 21:37:25 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 14 using xhci_hcd | |
Jul 11 21:37:25 hacking kernel: usb 3-6: USB disconnect, device number 2 | |
Jul 11 21:37:25 hacking kernel: usb 3-6.2: USB disconnect, device number 5 | |
Jul 11 21:37:25 hacking kernel: usb 3-6.4: USB disconnect, device number 12 | |
Jul 11 21:37:25 hacking kernel: usb 3-6.4.1: USB disconnect, device number 13 | |
Jul 11 21:37:25 hacking kernel: usb 3-6.4.1-port3: attempt power cycle | |
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input8 | |
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input9 | |
Jul 11 21:37:25 hacking kernel: hid-generic 0018:2808:0222.0001: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01 | |
Jul 11 21:37:25 hacking kernel: [drm] Initialized intel_vpu 1.0.0 for 0000:00:0b.0 on minor 0 | |
Jul 11 21:37:25 hacking kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer | |
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules | |
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain package 2^-14 Joules | |
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules | |
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain psys 2^-14 Joules | |
Jul 11 21:37:25 hacking kernel: videodev: Linux video capture interface: v2.00 | |
Jul 11 21:37:25 hacking kernel: usbcore: registered new device driver r8152-cfgselector | |
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain package | |
Jul 11 21:37:25 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Link Down | |
Jul 11 21:37:25 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Card not present | |
Jul 11 21:37:25 hacking kernel: pcieport 0000:03:03.0: Runtime PM usage count underflow! | |
Jul 11 21:37:25 hacking kernel: pcieport 0000:03:02.0: Runtime PM usage count underflow! | |
Jul 11 21:37:25 hacking kernel: pcieport 0000:03:01.0: Runtime PM usage count underflow! | |
Jul 11 21:37:25 hacking kernel: pci_bus 0000:04: busn_res: [bus 04] is released | |
Jul 11 21:37:25 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-11] is released | |
Jul 11 21:37:25 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-1e] is released | |
Jul 11 21:37:25 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2a] is released | |
Jul 11 21:37:25 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] is released | |
Jul 11 21:37:25 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] is released | |
Jul 11 21:37:25 hacking kernel: cryptd: max_cpu_qlen set to 1000 | |
Jul 11 21:37:25 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of leds:white:kbd_backlight... | |
Jul 11 21:37:25 hacking kernel: usb 2-1: USB disconnect, device number 2 | |
Jul 11 21:37:25 hacking kernel: usb 2-1.4: USB disconnect, device number 3 | |
Jul 11 21:37:25 hacking kernel: Intel(R) Wireless WiFi driver for Linux | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: enabling device (0000 -> 0002) | |
Jul 11 21:37:25 hacking kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) | |
Jul 11 21:37:25 hacking kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) | |
Jul 11 21:37:25 hacking kernel: r8152-cfgselector 2-1.4.4: Unknown version 0x0000 | |
Jul 11 21:37:25 hacking kernel: usb 2-1.4.1: USB disconnect, device number 6 | |
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver r8152 | |
Jul 11 21:37:25 hacking kernel: r8152-cfgselector 2-1.4.4: USB disconnect, device number 7 | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Detected crf-id 0x2001910, cnv-id 0x2001910 wfpm id 0x80000000 | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: PCI dev 272b/00f4, rev=0x472, rfid=0x112200 | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Detected Intel(R) Wi-Fi 7 BE200 320MHz | |
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver btusb | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: TLV_FW_FSEQ_VERSION: FSEQ Version: 0.0.4.196 | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: loaded firmware version 98.d661c37c.0 gl-c0-fm-c0-98.ucode op_mode iwlmld | |
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver cdc_ether | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware timestamp 2025.18 buildtype 1 build 82313 | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware SHA1: 0x81d88c7f | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: DSM reset method type: 0x01 | |
Jul 11 21:37:25 hacking kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) | |
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input11 | |
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input12 | |
Jul 11 21:37:25 hacking kernel: hid-multitouch 0018:2808:0222.0001: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01 | |
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver r8153_ecm | |
Jul 11 21:37:25 hacking kernel: usb 3-7: Found UVC 1.10 device Chicony USB2.0 Camera (04f2:b729) | |
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver uvcvideo | |
Jul 11 21:37:25 hacking kernel: mousedev: PS/2 mouse device common for all mice | |
Jul 11 21:37:25 hacking systemd[1]: Starting Load/Save RF Kill Switch Status... | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Found device firmware: intel/ibt-0291-0291.sfi | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Boot Address: 0x100800 | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware Version: 137-18.25 | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware already loaded | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Fseq status: Success (0x00) | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Fseq executed: 00.00.04.196 | |
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Fseq BT Top: 00.00.04.197 | |
Jul 11 21:37:25 hacking systemd[1]: Starting Load Kernel Module dm_mod... | |
Jul 11 21:37:25 hacking systemd[1]: Starting Load Kernel Module loop... | |
Jul 11 21:37:25 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). | |
Jul 11 21:37:25 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). | |
Jul 11 21:37:25 hacking systemd[1]: Rebuild Hardware Database was skipped because no trigger condition checks were met. | |
Jul 11 21:37:25 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:25 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:25 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:25 hacking systemd[1]: Started Load/Save RF Kill Switch Status. | |
Jul 11 21:37:25 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of leds:white:kbd_backlight. | |
Jul 11 21:37:25 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully. | |
Jul 11 21:37:25 hacking systemd[1]: Finished Load Kernel Module dm_mod. | |
Jul 11 21:37:25 hacking systemd[1]: [email protected]: Deactivated successfully. | |
Jul 11 21:37:25 hacking systemd[1]: Finished Load Kernel Module loop. | |
Jul 11 21:37:25 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. | |
Jul 11 21:37:25 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of backlight:intel_backlight. | |
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Detected RF FM, rfid=0x112200 | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: loaded PNVM version 752be616 | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: base HW address: 5c:b4:7e:c1:32:3e | |
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) d4:93:90:57:77:c4 | |
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection | |
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 eth0: MAC: 16, PHY: 12, PBA No: FFFFFF-0FF | |
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 enp0s31f6: renamed from eth0 | |
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Registered PHC clock: iwlwifi-PTP, with index: 1 | |
Jul 11 21:37:25 hacking systemd[1]: Mounting /boot... | |
Jul 11 21:37:25 hacking systemd[1]: Mounting Temporary Directory /tmp... | |
Jul 11 21:37:25 hacking systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). | |
Jul 11 21:37:25 hacking systemd[1]: Listening on Disk Image Download Service Socket. | |
Jul 11 21:37:25 hacking systemd[1]: Mounted Temporary Directory /tmp. | |
Jul 11 21:37:25 hacking kernel: FAT-fs (nvme0n1p1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. | |
Jul 11 21:37:25 hacking systemd[1]: Mounted /boot. | |
Jul 11 21:37:25 hacking systemd[1]: Reached target Local File Systems. | |
Jul 11 21:37:25 hacking systemd[1]: Listening on Boot Entries Service Socket. | |
Jul 11 21:37:25 hacking systemd[1]: Listening on System Extension Image Management. | |
Jul 11 21:37:25 hacking systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. | |
Jul 11 21:37:25 hacking systemd[1]: Starting Update Boot Loader Random Seed... | |
Jul 11 21:37:25 hacking systemd[1]: Starting Create System Files and Directories... | |
Jul 11 21:37:25 hacking bootctl[593]: ! Mount point '/boot' which backs the random seed file is world accessible, which is a security hole! ! | |
Jul 11 21:37:25 hacking bootctl[593]: ! Random seed file '/boot/loader/random-seed' is world accessible, which is a security hole! ! | |
Jul 11 21:37:25 hacking bootctl[593]: Random seed file /boot/loader/random-seed successfully refreshed (32 bytes). | |
Jul 11 21:37:25 hacking systemd[1]: Finished Update Boot Loader Random Seed. | |
Jul 11 21:37:26 hacking systemd[1]: Finished Create System Files and Directories. | |
Jul 11 21:37:26 hacking systemd[1]: Starting Rebuild Dynamic Linker Cache... | |
Jul 11 21:37:26 hacking systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). | |
Jul 11 21:37:26 hacking systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). | |
Jul 11 21:37:26 hacking systemd[1]: Starting Rebuild Journal Catalog... | |
Jul 11 21:37:26 hacking systemd[1]: Save Transient machine-id to Disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). | |
Jul 11 21:37:26 hacking systemd[1]: Starting Record System Boot/Shutdown in UTMP... | |
Jul 11 21:37:26 hacking systemd[1]: Finished Record System Boot/Shutdown in UTMP. | |
Jul 11 21:37:26 hacking systemd[1]: Finished Rebuild Journal Catalog. | |
Jul 11 21:37:26 hacking systemd[1]: Finished Rebuild Dynamic Linker Cache. | |
Jul 11 21:37:26 hacking systemd[1]: Starting Update is Completed... | |
Jul 11 21:37:26 hacking systemd[1]: Finished Update is Completed. | |
Jul 11 21:37:26 hacking systemd[1]: Reached target System Initialization. | |
Jul 11 21:37:26 hacking systemd[1]: Started Refresh existing PGP keys of archlinux-keyring regularly. | |
Jul 11 21:37:26 hacking systemd[1]: Started Daily man-db regeneration. | |
Jul 11 21:37:26 hacking systemd[1]: Started Daily verification of password and group files. | |
Jul 11 21:37:26 hacking systemd[1]: Started Daily Cleanup of Temporary Directories. | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Timer Units. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on D-Bus System Message Bus Socket. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG network certificate management daemon for /etc/pacman.d/gnupg. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers) for /etc/pacman.d/gnupg. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (restricted) for /etc/pacman.d/gnupg. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent (ssh-agent emulation) for /etc/pacman.d/gnupg. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache for /etc/pacman.d/gnupg. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG public key management service for /etc/pacman.d/gnupg. | |
Jul 11 21:37:26 hacking systemd[1]: Listening on OpenSSH Server Socket (systemd-ssh-generator, AF_UNIX Local). | |
Jul 11 21:37:26 hacking systemd[1]: Listening on Hostname Service Socket. | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Socket Units. | |
Jul 11 21:37:26 hacking systemd[1]: Starting D-Bus System Message Bus... | |
Jul 11 21:37:26 hacking systemd[1]: TPM PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:26 hacking systemd[1]: Started D-Bus System Message Bus. | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Basic System. | |
Jul 11 21:37:26 hacking systemd[1]: Starting Bluetooth service... | |
Jul 11 21:37:26 hacking dbus-broker-launch[611]: Ready | |
Jul 11 21:37:26 hacking systemd[1]: Starting Initialize hardware monitoring sensors... | |
Jul 11 21:37:26 hacking systemd[1]: Starting User Login Management... | |
Jul 11 21:37:26 hacking systemd[1]: TPM PCR Barrier (User) was skipped because of an unmet condition check (ConditionSecurity=measured-uki). | |
Jul 11 21:37:26 hacking systemd[1]: Starting Permit User Sessions... | |
Jul 11 21:37:26 hacking (modprobe)[615]: lm_sensors.service: Referenced but unset environment variable evaluates to an empty string: BUS_MODULES | |
Jul 11 21:37:26 hacking systemd[1]: Finished Permit User Sessions. | |
Jul 11 21:37:26 hacking systemd[1]: Started Getty on tty1. | |
Jul 11 21:37:26 hacking bluetoothd[613]: Bluetooth daemon 5.83 | |
Jul 11 21:37:26 hacking bluetoothd[613]: Starting SDP server | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Login Prompts. | |
Jul 11 21:37:26 hacking systemd[1]: Started Bluetooth service. | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Bluetooth Support. | |
Jul 11 21:37:26 hacking bluetoothd[613]: Bluetooth management interface 1.23 initialized | |
Jul 11 21:37:26 hacking bluetoothd[613]: Battery Provider Manager created | |
Jul 11 21:37:26 hacking kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 | |
Jul 11 21:37:26 hacking kernel: Bluetooth: BNEP filters: protocol multicast | |
Jul 11 21:37:26 hacking kernel: Bluetooth: BNEP socket layer initialized | |
Jul 11 21:37:26 hacking kernel: Bluetooth: MGMT ver 1.23 | |
Jul 11 21:37:26 hacking systemd[1]: Starting Hostname Service... | |
Jul 11 21:37:26 hacking systemd[1]: Finished Initialize hardware monitoring sensors. | |
Jul 11 21:37:26 hacking systemd-logind[616]: New seat seat0. | |
Jul 11 21:37:26 hacking kernel: NET: Registered PF_ALG protocol family | |
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event0 (Power Button) | |
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event2 (Lid Switch) | |
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event1 (Sleep Button) | |
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event5 (Intel HID events) | |
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event3 (AT Translated Set 2 keyboard) | |
Jul 11 21:37:26 hacking systemd[1]: Started User Login Management. | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Multi-User System. | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Graphical Interface. | |
Jul 11 21:37:26 hacking systemd[1]: Started Hostname Service. | |
Jul 11 21:37:26 hacking systemd[1]: Startup finished in 14.022s (firmware) + 5.087s (loader) + 3.825s (kernel) + 1.501s (userspace) = 24.437s. | |
Jul 11 21:37:26 hacking kernel: snd_hda_intel 0000:00:1f.3: bound 0000:00:02.0 (ops intel_audio_component_bind_ops [i915]) | |
Jul 11 21:37:26 hacking kernel: typec port0: bound usb3-port6 (ops connector_ops) | |
Jul 11 21:37:26 hacking kernel: typec port0: bound usb2-port1 (ops connector_ops) | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: ALC245: picked fixup for PCI SSID 1558:a763 | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC245: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:speaker | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x21/0x0/0x0/0x0/0x0) | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: inputs: | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Internal Mic=0x12 | |
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Headset Mic=0x19 | |
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input14 | |
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input15 | |
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input16 | |
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input17 | |
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input18 | |
Jul 11 21:37:26 hacking systemd[1]: Reached target Sound Card. | |
Jul 11 21:37:28 hacking kernel: thunderbolt 0-1: new device found, vendor=0x175 device=0x6534 | |
Jul 11 21:37:28 hacking kernel: thunderbolt 0-1: SAMSUNG ELECTRONICS CO.,LTD S34C65T | |
Jul 11 21:37:28 hacking kernel: thunderbolt 0-0:1.1: new retimer found, vendor=0x8087 device=0xd9c | |
Jul 11 21:37:28 hacking kernel: usb 3-6: new high-speed USB device number 18 using xhci_hcd | |
Jul 11 21:37:28 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01 | |
Jul 11 21:37:28 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:28 hacking kernel: usb 3-6: Product: USB2.0 Hub | |
Jul 11 21:37:28 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc. | |
Jul 11 21:37:28 hacking kernel: hub 3-6:1.0: USB hub found | |
Jul 11 21:37:28 hacking kernel: hub 3-6:1.0: 6 ports detected | |
Jul 11 21:37:29 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 8 using xhci_hcd | |
Jul 11 21:37:29 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34 | |
Jul 11 21:37:29 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:29 hacking kernel: usb 2-1: Product: USB3.0 Hub | |
Jul 11 21:37:29 hacking kernel: usb 2-1: Manufacturer: Intel Corporation. | |
Jul 11 21:37:29 hacking kernel: hub 2-1:1.0: USB hub found | |
Jul 11 21:37:29 hacking kernel: hub 2-1:1.0: 4 ports detected | |
Jul 11 21:37:29 hacking kernel: usb 3-6.2: new full-speed USB device number 19 using xhci_hcd | |
Jul 11 21:37:29 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46 | |
Jul 11 21:37:29 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 | |
Jul 11 21:37:29 hacking kernel: usb 3-6.2: Product: S34C65T | |
Jul 11 21:37:29 hacking kernel: usb 3-6.2: Manufacturer: Samsung | |
Jul 11 21:37:29 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00 | |
Jul 11 21:37:29 hacking kernel: usb 3-6.4: new high-speed USB device number 20 using xhci_hcd | |
Jul 11 21:37:29 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91 | |
Jul 11 21:37:29 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:29 hacking kernel: usb 3-6.4: Product: USB2.1 Hub | |
Jul 11 21:37:29 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic | |
Jul 11 21:37:29 hacking kernel: hub 3-6.4:1.0: USB hub found | |
Jul 11 21:37:29 hacking kernel: hub 3-6.4:1.0: 4 ports detected | |
Jul 11 21:37:29 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 9 using xhci_hcd | |
Jul 11 21:37:29 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91 | |
Jul 11 21:37:29 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:29 hacking kernel: usb 2-1.4: Product: USB3.2 Hub | |
Jul 11 21:37:29 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic | |
Jul 11 21:37:29 hacking kernel: hub 2-1.4:1.0: USB hub found | |
Jul 11 21:37:29 hacking kernel: hub 2-1.4:1.0: 4 ports detected | |
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: new high-speed USB device number 21 using xhci_hcd | |
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04 | |
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub | |
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: Manufacturer: Generic | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 10 using xhci_hcd | |
Jul 11 21:37:30 hacking kernel: hub 3-6.4.1:1.0: USB hub found | |
Jul 11 21:37:30 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04 | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: Manufacturer: Generic | |
Jul 11 21:37:30 hacking kernel: hub 2-1.4.1:1.0: USB hub found | |
Jul 11 21:37:30 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 11 using xhci_hcd | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00 | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6 | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek | |
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001 | |
Jul 11 21:37:30 hacking kernel: r8152-cfgselector 2-1.4.4: reset SuperSpeed USB device number 11 using xhci_hcd | |
Jul 11 21:37:30 hacking kernel: r8152 2-1.4.4:1.0 eth0: v1.12.13 | |
Jul 11 21:37:30 hacking kernel: r8152 2-1.4.4:1.0 enp0s13f0u1u4u4: renamed from eth0 | |
Jul 11 21:37:30 hacking systemd[1]: systemd-rfkill.service: Deactivated successfully. | |
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 23 using xhci_hcd | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13 | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0 | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4 | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals | |
Jul 11 21:37:31 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0002/input/input19 | |
Jul 11 21:37:31 hacking kernel: hid-generic 0003:1A7C:0191.0002: input,hidraw1: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0 | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 24 using xhci_hcd | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02 | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard | |
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX | |
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0003/input/input20 | |
Jul 11 21:37:31 hacking kernel: hid-generic 0003:2EFD:2130.0003: input,hidraw2: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0 | |
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0004/input/input21 | |
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0004/input/input22 | |
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0004/input/input23 | |
Jul 11 21:37:31 hacking kernel: hid-generic 0003:2EFD:2130.0004: input,hidraw3: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input1 | |
Jul 11 21:37:31 hacking systemd-logind[616]: Watching system buttons on /dev/input/event16 (SONiX USB Keyboard) | |
Jul 11 21:37:31 hacking systemd-logind[616]: Watching system buttons on /dev/input/event18 (SONiX USB Keyboard System Control) | |
Jul 11 21:37:31 hacking systemd-logind[616]: Watching system buttons on /dev/input/event19 (SONiX USB Keyboard) | |
Jul 11 21:37:32 hacking dbus-broker-launch[611]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found. | |
Jul 11 21:37:34 hacking login[627]: pam_unix(login:session): session opened for user ray(uid=1000) by ray(uid=0) | |
Jul 11 21:37:34 hacking systemd-logind[616]: New session 1 of user ray. | |
Jul 11 21:37:34 hacking systemd[1]: Created slice User Slice of UID 1000. | |
Jul 11 21:37:34 hacking systemd[1]: Starting User Runtime Directory /run/user/1000... | |
Jul 11 21:37:34 hacking systemd[1]: Finished User Runtime Directory /run/user/1000. | |
Jul 11 21:37:34 hacking systemd[1]: Starting User Manager for UID 1000... | |
Jul 11 21:37:34 hacking (systemd)[684]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8002 service=[systemd-user] terminal=[] user=[ray] ruser=[<unknown>] rhost=[<unknown>] | |
Jul 11 21:37:34 hacking (systemd)[684]: pam_unix(systemd-user:session): session opened for user ray(uid=1000) by ray(uid=0) | |
Jul 11 21:37:34 hacking systemd-logind[616]: New session 2 of user ray. | |
Jul 11 21:37:34 hacking systemd[684]: Queued start job for default target Main User Target. | |
Jul 11 21:37:34 hacking systemd[684]: Created slice User Application Slice. | |
Jul 11 21:37:34 hacking systemd[684]: Started Break Encouragement. | |
Jul 11 21:37:34 hacking systemd[684]: Reached target Paths. | |
Jul 11 21:37:34 hacking systemd[684]: Reached target Timers. | |
Jul 11 21:37:34 hacking systemd[684]: Starting D-Bus User Message Bus Socket... | |
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG network certificate management daemon. | |
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). | |
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). | |
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent (ssh-agent emulation). | |
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent and passphrase cache. | |
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG public key management service. | |
Jul 11 21:37:34 hacking systemd[684]: Listening on p11-kit server. | |
Jul 11 21:37:34 hacking systemd[684]: Listening on PipeWire PulseAudio. | |
Jul 11 21:37:34 hacking systemd[684]: Listening on PipeWire Multimedia System Sockets. | |
Jul 11 21:37:34 hacking systemd[684]: Listening on D-Bus User Message Bus Socket. | |
Jul 11 21:37:34 hacking systemd[684]: Reached target Sockets. | |
Jul 11 21:37:34 hacking systemd[684]: Reached target Basic System. | |
Jul 11 21:37:34 hacking systemd[1]: Started User Manager for UID 1000. | |
Jul 11 21:37:34 hacking systemd[684]: Started Kanata keyboard remapper. | |
Jul 11 21:37:34 hacking systemd[684]: Reached target Main User Target. | |
Jul 11 21:37:34 hacking systemd[684]: Startup finished in 97ms. | |
Jul 11 21:37:34 hacking systemd[1]: Started Session 1 of User ray. | |
Jul 11 21:37:34 hacking login[627]: LOGIN ON tty1 BY ray | |
Jul 11 21:37:34 hacking sh[693]: /usr/bin/sh: line 1: /home/ray/.cargo/bin/kanata: No such file or directory | |
Jul 11 21:37:34 hacking systemd[684]: kanata.service: Main process exited, code=exited, status=127/n/a | |
Jul 11 21:37:34 hacking systemd[684]: kanata.service: Failed with result 'exit-code'. | |
Jul 11 21:37:42 hacking systemd[684]: Created slice User Core Session Slice. | |
Jul 11 21:37:42 hacking systemd[684]: Starting D-Bus User Message Bus... | |
Jul 11 21:37:42 hacking dbus-broker-launch[734]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored | |
Jul 11 21:37:42 hacking dbus-broker-launch[734]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored | |
Jul 11 21:37:42 hacking systemd[684]: Started D-Bus User Message Bus. | |
Jul 11 21:37:42 hacking dbus-broker-launch[734]: Ready | |
Jul 11 21:37:42 hacking systemd[684]: Started Flexible Input Method Framwork. | |
Jul 11 21:37:42 hacking systemd[684]: Started keynav. | |
Jul 11 21:37:42 hacking systemd[684]: Started notify-client -> notify-server -> notify-send. | |
Jul 11 21:37:42 hacking systemd[684]: Started Redshift display colour temperature adjustment (GUI). | |
Jul 11 21:37:42 hacking systemd[684]: Started Taskbar. | |
Jul 11 21:37:42 hacking systemd[684]: Started xscreensaver.service. | |
Jul 11 21:37:42 hacking (keynav)[740]: keynav.service: Unable to locate executable '/home/ray/.local/bin/keynav': No such file or directory | |
Jul 11 21:37:42 hacking (keynav)[740]: keynav.service: Failed at step EXEC spawning /home/ray/.local/bin/keynav: No such file or directory | |
Jul 11 21:37:42 hacking systemd[684]: Reached target Graphical Interface. | |
Jul 11 21:37:42 hacking (y-server)[741]: notify-server.service: Unable to locate executable '/home/ray/bin/notify-server': No such file or directory | |
Jul 11 21:37:42 hacking (y-server)[741]: notify-server.service: Failed at step EXEC spawning /home/ray/bin/notify-server: No such file or directory | |
Jul 11 21:37:42 hacking systemd[684]: keynav.service: Main process exited, code=exited, status=203/EXEC | |
Jul 11 21:37:42 hacking systemd[684]: keynav.service: Failed with result 'exit-code'. | |
Jul 11 21:37:42 hacking (hift-gtk)[742]: redshift-gtk.service: Unable to locate executable '/usr/bin/redshift-gtk': No such file or directory | |
Jul 11 21:37:42 hacking (hift-gtk)[742]: redshift-gtk.service: Failed at step EXEC spawning /usr/bin/redshift-gtk: No such file or directory | |
Jul 11 21:37:42 hacking systemd[684]: notify-server.service: Main process exited, code=exited, status=203/EXEC | |
Jul 11 21:37:42 hacking systemd[684]: notify-server.service: Failed with result 'exit-code'. | |
Jul 11 21:37:42 hacking systemd[684]: redshift-gtk.service: Main process exited, code=exited, status=203/EXEC | |
Jul 11 21:37:42 hacking systemd[684]: redshift-gtk.service: Failed with result 'exit-code'. | |
Jul 11 21:37:42 hacking (taskbar)[743]: taskbar.service: Unable to locate executable '/home/ray/bin/taskbar': No such file or directory | |
Jul 11 21:37:42 hacking (taskbar)[743]: taskbar.service: Failed at step EXEC spawning /home/ray/bin/taskbar: No such file or directory | |
Jul 11 21:37:42 hacking (eensaver)[744]: xscreensaver.service: Unable to locate executable '/usr/bin/xscreensaver': No such file or directory | |
Jul 11 21:37:42 hacking (eensaver)[744]: xscreensaver.service: Failed at step EXEC spawning /usr/bin/xscreensaver: No such file or directory | |
Jul 11 21:37:42 hacking systemd[684]: taskbar.service: Main process exited, code=exited, status=203/EXEC | |
Jul 11 21:37:42 hacking systemd[684]: taskbar.service: Failed with result 'exit-code'. | |
Jul 11 21:37:42 hacking systemd[684]: xscreensaver.service: Main process exited, code=exited, status=203/EXEC | |
Jul 11 21:37:42 hacking systemd[684]: xscreensaver.service: Failed with result 'exit-code'. | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.742661 instance.cpp:1400] Override Enabled Addons: {} | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.744787 instance.cpp:1401] Override Disabled Addons: {} | |
Jul 11 21:37:42 hacking fcitx5[739]: E2025-07-11 21:37:42.751233 waylandmodule.cpp:244] Failed to open wayland connection | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.751261 addonmanager.cpp:204] Loaded addon wayland | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.751548 addonmanager.cpp:204] Loaded addon imselector | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.754569 xcbconnection.cpp:199] Connecting to X11 display, display name::0. | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.754866 addonmanager.cpp:204] Loaded addon xcb | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.756580 addonmanager.cpp:204] Loaded addon quickphrase | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.757604 addonmanager.cpp:204] Loaded addon waylandim | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.758089 keyboard.cpp:226] Attempting to load keyboard from: ["/usr/share/X11/xkb"] Rule: evdev | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.760710 addonmanager.cpp:204] Loaded addon keyboard | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.761356 addonmanager.cpp:204] Loaded addon clipboard | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.761840 addonmanager.cpp:204] Loaded addon unicode | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.762726 addonmanager.cpp:204] Loaded addon dbus | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.763244 addonmanager.cpp:204] Loaded addon dbusfrontend | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.765885 addonmanager.cpp:204] Loaded addon fcitx4frontend | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.766511 addonmanager.cpp:204] Loaded addon ibusfrontend | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.767386 addonmanager.cpp:204] Loaded addon xim | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.784821 inputmethodmanager.cpp:210] Found 742 input method(s) in addon keyboard | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.796562 addonmanager.cpp:204] Loaded addon kimpanel | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.797034 addonmanager.cpp:204] Loaded addon virtualkeyboard | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.816692 classicui.cpp:90] Created classicui for x11 display::0 | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.816720 addonmanager.cpp:204] Loaded addon classicui | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.817234 addonmanager.cpp:204] Loaded addon notificationitem | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.817899 addonmanager.cpp:204] Loaded addon notifications | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.820011 dbusmodule.cpp:816] Service name change: org.fcitx.Fcitx5 :1.3 | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.820068 kimpanel.cpp:116] Kimpanel new owner: | |
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.820084 virtualkeyboard.cpp:218] VirtualKeyboard new owner: | |
Jul 11 21:37:43 hacking fcitx5[739]: I2025-07-11 21:37:43.889869 addonmanager.cpp:204] Loaded addon rime | |
Jul 11 21:37:56 hacking systemd[1]: systemd-hostnamed.service: Deactivated successfully. | |
Jul 11 21:38:10 hacking systemd[684]: Started tmux child pane 879 launched by process 811. | |
Jul 11 21:38:35 hacking sudo[947]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome | |
Jul 11 21:38:35 hacking sudo[947]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:38:35 hacking systemd[1]: Starting Wireless service... | |
Jul 11 21:38:35 hacking iwd[951]: Wireless daemon version 3.9 | |
Jul 11 21:38:35 hacking systemd[1]: Started Wireless service. | |
Jul 11 21:38:35 hacking systemd[1]: Reached target Network. | |
Jul 11 21:38:35 hacking sudo[947]: pam_unix(sudo:session): session closed for user root | |
Jul 11 21:38:35 hacking iwd[951]: station: Network configuration is disabled. | |
Jul 11 21:38:35 hacking iwd[951]: Wiphy: 0, Name: phy0 | |
Jul 11 21:38:35 hacking iwd[951]: Permanent Address: 5c:b4:7e:c1:32:3e | |
Jul 11 21:38:35 hacking iwd[951]: 2.4GHz Band: | |
Jul 11 21:38:35 hacking iwd[951]: Bitrates (non-HT): | |
Jul 11 21:38:35 hacking iwd[951]: 1.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 2.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 5.5 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 11.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 6.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 9.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 12.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 18.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 24.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 36.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 48.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 54.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: HT Capabilities: | |
Jul 11 21:38:35 hacking iwd[951]: HT40 | |
Jul 11 21:38:35 hacking iwd[951]: Short GI for 20Mhz | |
Jul 11 21:38:35 hacking iwd[951]: Short GI for 40Mhz | |
Jul 11 21:38:35 hacking iwd[951]: HT RX MCS indexes: | |
Jul 11 21:38:35 hacking iwd[951]: 0-15 | |
Jul 11 21:38:35 hacking iwd[951]: HE Capabilities | |
Jul 11 21:38:35 hacking iwd[951]: Interface Types: ap p2p-go | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Interface Types: station p2p-client | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: 5GHz Band: | |
Jul 11 21:38:35 hacking iwd[951]: Bitrates (non-HT): | |
Jul 11 21:38:35 hacking iwd[951]: 6.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 9.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 12.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 18.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 24.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 36.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 48.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 54.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: HT Capabilities: | |
Jul 11 21:38:35 hacking iwd[951]: HT40 | |
Jul 11 21:38:35 hacking iwd[951]: Short GI for 20Mhz | |
Jul 11 21:38:35 hacking iwd[951]: Short GI for 40Mhz | |
Jul 11 21:38:35 hacking iwd[951]: HT RX MCS indexes: | |
Jul 11 21:38:35 hacking iwd[951]: 0-15 | |
Jul 11 21:38:35 hacking iwd[951]: VHT Capabilities: | |
Jul 11 21:38:35 hacking iwd[951]: 160 Mhz operation | |
Jul 11 21:38:35 hacking iwd[951]: Short GI for 80Mhz | |
Jul 11 21:38:35 hacking iwd[951]: Short GI for 160 and 80 + 80 Mhz | |
Jul 11 21:38:35 hacking iwd[951]: Max RX MCS: 0-9 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max TX MCS: 0-9 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: HE Capabilities | |
Jul 11 21:38:35 hacking iwd[951]: Interface Types: ap p2p-go | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Interface Types: station p2p-client | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: 6GHz Band: | |
Jul 11 21:38:35 hacking iwd[951]: Bitrates (non-HT): | |
Jul 11 21:38:35 hacking iwd[951]: 6.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 9.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 12.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 18.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 24.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 36.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 48.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: 54.0 Mbps | |
Jul 11 21:38:35 hacking iwd[951]: HE Capabilities | |
Jul 11 21:38:35 hacking iwd[951]: Interface Types: ap p2p-go | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Interface Types: station p2p-client | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2 | |
Jul 11 21:38:35 hacking iwd[951]: Ciphers: BIP-GMAC-256 BIP-GMAC-128 GCMP-256 GCMP-128 | |
Jul 11 21:38:35 hacking iwd[951]: BIP-CMAC-128 CCMP-128 TKIP | |
Jul 11 21:38:35 hacking iwd[951]: Supported iftypes: ad-hoc station ap p2p-client p2p-go p2p-device | |
Jul 11 21:38:35 hacking kernel: ------------[ cut here ]------------ | |
Jul 11 21:38:35 hacking kernel: WARNING: CPU: 0 PID: 951 at net/wireless/nl80211.c:8819 nl80211_get_reg_do+0x1e4/0x210 [cfg80211] | |
Jul 11 21:38:35 hacking kernel: Modules linked in: ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet | |
Jul 11 21:38:35 hacking kernel: videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone | |
Jul 11 21:38:35 hacking kernel: acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi | |
Jul 11 21:38:35 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 11 21:38:35 hacking kernel: CPU: 0 UID: 0 PID: 951 Comm: iwd Tainted: G OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 11 21:38:35 hacking kernel: Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 11 21:38:35 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:38:35 hacking kernel: RIP: 0010:nl80211_get_reg_do+0x1e4/0x210 [cfg80211] | |
Jul 11 21:38:35 hacking kernel: Code: 4c 24 0c ba 04 00 00 00 be 9a 00 00 00 48 89 df c7 44 24 0c 01 00 00 00 e8 69 55 d6 ee 85 c0 0f 84 4f ff ff ff e9 18 ff ff ff <0f> 0b bd ea ff ff ff e9 11 ff ff ff 89 c5 e9 0f ff ff ff bd 97 ff | |
Jul 11 21:38:35 hacking kernel: RSP: 0018:ffffcf92046b3860 EFLAGS: 00010a02 | |
Jul 11 21:38:35 hacking kernel: RAX: 0000000000000000 RBX: ffff896681c23700 RCX: 0000000000000000 | |
Jul 11 21:38:35 hacking kernel: RDX: ffff896686af0000 RSI: 0000000000000000 RDI: ffff8966835183c0 | |
Jul 11 21:38:35 hacking kernel: RBP: ffffcf92046b38c0 R08: 0000000000000000 R09: ffff896683299014 | |
Jul 11 21:38:35 hacking kernel: R10: 0000000000000000 R11: ffffffffc1710bf0 R12: ffff896683299014 | |
Jul 11 21:38:35 hacking kernel: R13: ffff896681c23600 R14: ffff8966835183c0 R15: 0000000000000001 | |
Jul 11 21:38:35 hacking kernel: FS: 00007f671bb7eb80(0000) GS:ffff896e2d72d000(0000) knlGS:0000000000000000 | |
Jul 11 21:38:35 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:38:35 hacking kernel: CR2: 000055b8f4cf9a50 CR3: 0000000101899004 CR4: 0000000000f72ef0 | |
Jul 11 21:38:35 hacking kernel: PKRU: 55555554 | |
Jul 11 21:38:35 hacking kernel: Call Trace: | |
Jul 11 21:38:35 hacking kernel: <TASK> | |
Jul 11 21:38:35 hacking kernel: genl_family_rcv_msg_doit+0xfc/0x160 | |
Jul 11 21:38:35 hacking kernel: genl_rcv_msg+0x1aa/0x2b0 | |
Jul 11 21:38:35 hacking kernel: ? __pfx_nl80211_pre_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429] | |
Jul 11 21:38:35 hacking kernel: ? __pfx_nl80211_get_reg_do+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429] | |
Jul 11 21:38:35 hacking kernel: ? __pfx_nl80211_post_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429] | |
Jul 11 21:38:35 hacking kernel: ? __pfx_genl_rcv_msg+0x10/0x10 | |
Jul 11 21:38:35 hacking kernel: netlink_rcv_skb+0x59/0x110 | |
Jul 11 21:38:35 hacking kernel: genl_rcv+0x28/0x40 | |
Jul 11 21:38:35 hacking kernel: netlink_unicast+0x26f/0x3a0 | |
Jul 11 21:38:35 hacking kernel: netlink_sendmsg+0x207/0x440 | |
Jul 11 21:38:35 hacking kernel: __sys_sendto+0x1f4/0x200 | |
Jul 11 21:38:35 hacking kernel: __x64_sys_sendto+0x24/0x30 | |
Jul 11 21:38:35 hacking kernel: do_syscall_64+0x7b/0x810 | |
Jul 11 21:38:35 hacking kernel: ? ep_send_events+0x2a3/0x2f0 | |
Jul 11 21:38:35 hacking kernel: ? do_epoll_wait+0x19b/0x530 | |
Jul 11 21:38:35 hacking kernel: ? __x64_sys_epoll_wait+0x70/0x120 | |
Jul 11 21:38:35 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 11 21:38:35 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 11 21:38:35 hacking kernel: ? ksys_write+0xd0/0xe0 | |
Jul 11 21:38:35 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 11 21:38:35 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0 | |
Jul 11 21:38:35 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e | |
Jul 11 21:38:35 hacking kernel: RIP: 0033:0x7f671bc12006 | |
Jul 11 21:38:35 hacking kernel: Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08 | |
Jul 11 21:38:35 hacking kernel: RSP: 002b:00007ffd47eb0040 EFLAGS: 00000202 ORIG_RAX: 000000000000002c | |
Jul 11 21:38:35 hacking kernel: RAX: ffffffffffffffda RBX: 000055b923bb18f0 RCX: 00007f671bc12006 | |
Jul 11 21:38:35 hacking kernel: RDX: 000000000000001c RSI: 000055b923bbd4c0 RDI: 0000000000000004 | |
Jul 11 21:38:35 hacking kernel: RBP: 00007ffd47eb0060 R08: 0000000000000000 R09: 0000000000000000 | |
Jul 11 21:38:35 hacking kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 000055b923bbd4c0 | |
Jul 11 21:38:35 hacking kernel: R13: 000055b923bbcb70 R14: 0000000000000001 R15: 0000000000000000 | |
Jul 11 21:38:35 hacking kernel: </TASK> | |
Jul 11 21:38:35 hacking kernel: ---[ end trace 0000000000000000 ]--- | |
Jul 11 21:38:35 hacking sudo[1026]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0 | |
Jul 11 21:38:35 hacking sudo[1026]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:38:35 hacking dhcpcd[1030]: dhcpcd-10.2.4 starting | |
Jul 11 21:38:35 hacking dhcpcd[1033]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e | |
Jul 11 21:38:35 hacking kernel: 8021q: 802.1Q VLAN Support v1.8 | |
Jul 11 21:38:36 hacking iwd[951]: event: state, old: disconnected, new: autoconnect_quick | |
Jul 11 21:38:36 hacking dhcpcd[1033]: wlan0: interface not found | |
Jul 11 21:38:36 hacking dhcpcd[1033]: dhcpcd exited | |
Jul 11 21:38:36 hacking sudo[1026]: pam_unix(sudo:session): session closed for user root | |
Jul 11 21:38:36 hacking iwd[951]: udev interface=wlan0 ifindex=5 | |
Jul 11 21:38:36 hacking iwd[951]: event: state, old: autoconnect_quick, new: autoconnect_full | |
Jul 11 21:38:37 hacking sudo[1045]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome | |
Jul 11 21:38:37 hacking sudo[1045]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:38:37 hacking sudo[1045]: pam_unix(sudo:session): session closed for user root | |
Jul 11 21:38:37 hacking sudo[1049]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0 | |
Jul 11 21:38:37 hacking sudo[1049]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:38:37 hacking dhcpcd[1052]: dhcpcd-10.2.4 starting | |
Jul 11 21:38:37 hacking dhcpcd[1055]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e | |
Jul 11 21:38:37 hacking dhcpcd[1055]: wlan0: waiting for carrier | |
Jul 11 21:38:40 hacking dhcpcd[1055]: received SIGINT, stopping | |
Jul 11 21:38:40 hacking dhcpcd[1055]: wlan0: removing interface | |
Jul 11 21:38:40 hacking dhcpcd[1055]: dhcpcd exited | |
Jul 11 21:38:40 hacking sudo[1049]: pam_unix(sudo:session): session closed for user root | |
Jul 11 21:38:41 hacking sudo[1077]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome | |
Jul 11 21:38:41 hacking sudo[1077]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:38:41 hacking sudo[1077]: pam_unix(sudo:session): session closed for user root | |
Jul 11 21:38:41 hacking sudo[1081]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0 | |
Jul 11 21:38:41 hacking sudo[1081]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:38:41 hacking dhcpcd[1084]: dhcpcd-10.2.4 starting | |
Jul 11 21:38:41 hacking dhcpcd[1087]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e | |
Jul 11 21:38:41 hacking dhcpcd[1087]: wlan0: waiting for carrier | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ae:70:5d:9a:e6:01 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8c:76:3f:a4:76:24 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8e:76:3f:a4:76:24 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 96:76:3f:a4:76:24 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for de:ec:5e:56:33:a1 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 0e:93:7c:62:82:ec | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 1c:93:7c:62:82:ec | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 16:93:7c:62:82:ec | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ee:9f:80:7c:cd:dc | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8c:76:3f:a8:f7:a4 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 96:76:3f:a8:f7:a4 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 1c:93:7c:62:82:ed | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 0e:93:7c:62:82:ed | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 16:93:7c:62:82:ed | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 0a:93:7c:62:82:ed | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8c:76:3f:a4:76:25 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 12:93:7c:62:82:ed | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8e:76:3f:a4:76:25 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 96:76:3f:a4:76:25 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ee:79:0a:e6:ef:5b | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 92:76:3f:a4:76:25 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for f6:79:0a:e6:ef:5b | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8e:76:3f:a8:f7:a4 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ea:79:0a:e6:ef:5b | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for aa:70:5d:5b:d1:b9 | |
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for d8:ec:5e:56:33:a2 | |
Jul 11 21:38:42 hacking iwd[951]: event: connect-info, ssid: monkeyhome, bss: 8c:76:3f:a4:76:25, signal: -33, load: 0/255 | |
Jul 11 21:38:42 hacking iwd[951]: event: state, old: autoconnect_full, new: connecting (auto) | |
Jul 11 21:38:42 hacking kernel: wlan0: authenticate with 8c:76:3f:a4:76:25 (local address=5c:b4:7e:c1:32:3e) | |
Jul 11 21:38:42 hacking kernel: wlan0: send auth to 8c:76:3f:a4:76:25 (try 1/3) | |
Jul 11 21:38:42 hacking kernel: wlan0: authenticated | |
Jul 11 21:38:42 hacking kernel: wlan0: associate with 8c:76:3f:a4:76:25 (try 1/3) | |
Jul 11 21:38:42 hacking kernel: wlan0: RX AssocResp from 8c:76:3f:a4:76:25 (capab=0x1011 status=0 aid=2) | |
Jul 11 21:38:42 hacking kernel: wlan0: associated | |
Jul 11 21:38:42 hacking iwd[951]: event: state, old: connecting (auto), new: connected | |
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: carrier acquired | |
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: connected to Access Point: monkeyhome | |
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: IAID 7e:c1:32:3e | |
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: adding address fe80::3790:a395:9999:c66 | |
Jul 11 21:38:42 hacking kernel: wlan0: Limiting TX power to 30 (30 - 0) dBm as advertised by 8c:76:3f:a4:76:25 | |
Jul 11 21:38:43 hacking dhcpcd[1087]: wlan0: rebinding lease of 10.0.0.199 | |
Jul 11 21:38:43 hacking dhcpcd[1087]: wlan0: probing address 10.0.0.199/24 | |
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: soliciting an IPv6 router | |
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: Router Advertisement from fe80::8e76:3fff:fea4:7623 | |
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: adding address 2601:647:4700:79e0:a4d3:a029:3fe1:b2c0/64 | |
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: adding route to 2601:647:4700:79e0::/64 | |
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: adding default route via fe80::8e76:3fff:fea4:7623 | |
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: confirming prior DHCPv6 lease | |
Jul 11 21:38:45 hacking dhcpcd[1087]: wlan0: REPLY6 received from fe80::8e76:3fff:fea4:7623 | |
Jul 11 21:38:45 hacking dhcpcd[1087]: wlan0: adding address 2601:647:4700:79e0::c146/128 | |
Jul 11 21:38:45 hacking dhcpcd[1087]: wlan0: renew in 6640, rebind in 110320, expire in 179440 seconds | |
Jul 11 21:38:46 hacking sudo[1081]: pam_unix(sudo:session): session closed for user root | |
Jul 11 21:38:48 hacking dhcpcd[1087]: wlan0: leased 10.0.0.199 for 172800 seconds | |
Jul 11 21:38:48 hacking dhcpcd[1087]: wlan0: adding route to 10.0.0.0/24 | |
Jul 11 21:38:48 hacking dhcpcd[1087]: wlan0: adding default route via 10.0.0.1 | |
Jul 11 21:38:56 hacking sudo[1227]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/kanata --cfg /home/ray/.config/kanata/config.kbd | |
Jul 11 21:38:56 hacking sudo[1227]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:38:56 hacking kernel: input: kanata as /devices/virtual/input/input24 | |
Jul 11 21:38:57 hacking systemd-logind[616]: Watching system buttons on /dev/input/event20 (kanata) | |
Jul 11 21:39:36 hacking kernel: warning: `ThreadPoolForeg' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 | |
Jul 11 21:39:36 hacking systemd[684]: Starting Accessibility services bus... | |
Jul 11 21:39:36 hacking systemd[684]: Started Accessibility services bus. | |
Jul 11 21:39:36 hacking systemd[684]: Started app-com.google.Chrome-1466.scope. | |
Jul 11 21:39:48 hacking systemd[684]: Started PipeWire Multimedia Service. | |
Jul 11 21:39:48 hacking systemd[684]: Started Multimedia Service Session Manager. | |
Jul 11 21:39:48 hacking systemd[684]: Started PipeWire PulseAudio. | |
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1 | |
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit does not give us MinNiceLevel, using 0 | |
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1 | |
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1 | |
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit does not give us MinNiceLevel, using 0 | |
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1 | |
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1 | |
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit does not give us MinNiceLevel, using 0 | |
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown | |
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1 | |
Jul 11 21:39:48 hacking wireplumber[2381]: default: Failed to get percentage from UPower: org.freedesktop.DBus.Error.NameHasNoOwner | |
Jul 11 21:39:48 hacking kernel: Bluetooth: RFCOMM TTY layer initialized | |
Jul 11 21:39:48 hacking kernel: Bluetooth: RFCOMM socket layer initialized | |
Jul 11 21:39:48 hacking kernel: Bluetooth: RFCOMM ver 1.11 | |
Jul 11 21:39:48 hacking wireplumber[2381]: wp-device: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? | |
Jul 11 21:39:48 hacking wireplumber[2381]: s-monitors-libcamera: PipeWire's libcamera SPA plugin is missing or broken. Some camera types may not be supported. | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/ldac | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/aptx_hd | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_hd | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/aptx | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/aac | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aac | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/opus_g | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/opus_g | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/sbc | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/sbc | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_1 | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_0 | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1 | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0 | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/faststream | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/faststream_duplex | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/opus_05 | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/opus_05 | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/opus_05_duplex | |
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/opus_05_duplex | |
Jul 11 21:39:49 hacking wireplumber[2381]: m-portal-permissionstore: <WpPortalPermissionStorePlugin:0x55fb30c94b30> Lookup: The name is not activatable (org.freedesktop.DBus.Error.ServiceUnknown) | |
Jul 11 21:40:06 hacking chrome[1466]: [1466:1483:0711/214006.803944:INFO:chrome/browser/extensions/extension_garbage_collector.cc:184] Garbage collection for extensions on file thread is complete. | |
Jul 11 21:40:30 hacking systemd[684]: Started tmux child pane 3107 launched by process 811. | |
Jul 11 21:42:07 hacking sudo[3849]: ray : TTY=pts/4 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/rm /etc/modprobe.d/tuxedo_keyboard.conf | |
Jul 11 21:42:07 hacking sudo[3849]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000) | |
Jul 11 21:42:07 hacking sudo[3849]: pam_unix(sudo:session): session closed for user root | |
Jul 11 21:43:18 hacking kernel: Oops: general protection fault, probably for non-canonical address 0xd0000000b60018: 0000 [#1] SMP NOPTI | |
Jul 11 21:43:18 hacking kernel: CPU: 8 UID: 0 PID: 4291 Comm: dhcpcd-run-hook Tainted: G W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 11 21:43:18 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 11 21:43:18 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:43:18 hacking kernel: RIP: 0010:vma_interval_tree_insert+0x36/0xe0 | |
Jul 11 21:43:18 hacking kernel: Code: 48 8b 7f 50 49 89 f2 49 8b 40 08 49 2b 00 48 c1 e8 0c 48 8d 74 07 ff 49 8b 02 48 85 c0 74 70 41 b9 01 00 00 00 eb 03 48 89 d0 <48> 39 70 18 73 04 48 89 70 18 48 8d 48 10 48 3b 78 c8 72 07 48 8d | |
Jul 11 21:43:18 hacking kernel: RSP: 0018:ffffcf9224307a40 EFLAGS: 00010206 | |
Jul 11 21:43:18 hacking kernel: RAX: 00d0000000b60000 RBX: ffffcf9224307a78 RCX: ffff8967b8b154d0 | |
Jul 11 21:43:18 hacking kernel: RDX: 00d0000000b60000 RSI: 0000000000000038 RDI: 0000000000000001 | |
Jul 11 21:43:18 hacking kernel: RBP: ffff8966fdb298c0 R08: ffff8966fdb28240 R09: 0000000000000000 | |
Jul 11 21:43:18 hacking kernel: R10: ffff896689c9bdd0 R11: 0000000000000000 R12: ffff8966880b8000 | |
Jul 11 21:43:18 hacking kernel: R13: ffffcf9224307c98 R14: 00007fab9125f000 R15: 0000000000000000 | |
Jul 11 21:43:18 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d92d000(0000) knlGS:0000000000000000 | |
Jul 11 21:43:18 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:43:18 hacking kernel: CR2: 0000558766b3530c CR3: 00000001f1fe8002 CR4: 0000000000f72ef0 | |
Jul 11 21:43:18 hacking kernel: PKRU: 55555554 | |
Jul 11 21:43:18 hacking kernel: Call Trace: | |
Jul 11 21:43:18 hacking kernel: <TASK> | |
Jul 11 21:43:18 hacking kernel: vma_complete+0x45/0x300 | |
Jul 11 21:43:18 hacking kernel: __split_vma+0x24b/0x300 | |
Jul 11 21:43:18 hacking kernel: vms_gather_munmap_vmas+0x46/0x2c0 | |
Jul 11 21:43:18 hacking kernel: do_vmi_align_munmap+0xeb/0x1e0 | |
Jul 11 21:43:18 hacking kernel: do_vmi_munmap+0xd0/0x170 | |
Jul 11 21:43:18 hacking kernel: __vm_munmap+0xad/0x170 | |
Jul 11 21:43:18 hacking kernel: elf_load+0x20f/0x290 | |
Jul 11 21:43:18 hacking kernel: load_elf_binary+0xb35/0x1830 | |
Jul 11 21:43:18 hacking kernel: ? __kernel_read+0x1e1/0x300 | |
Jul 11 21:43:18 hacking kernel: bprm_execve+0x2a9/0x520 | |
Jul 11 21:43:18 hacking kernel: do_execveat_common.isra.0+0x194/0x1a0 | |
Jul 11 21:43:18 hacking kernel: __x64_sys_execve+0x38/0x50 | |
Jul 11 21:43:18 hacking kernel: do_syscall_64+0x7b/0x810 | |
Jul 11 21:43:18 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0 | |
Jul 11 21:43:18 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e | |
Jul 11 21:43:18 hacking kernel: RIP: 0033:0x7f94844f4bcb | |
Jul 11 21:43:18 hacking kernel: Code: Unable to access opcode bytes at 0x7f94844f4ba1. | |
Jul 11 21:43:18 hacking kernel: RSP: 002b:00007f9484cfde68 EFLAGS: 00000246 ORIG_RAX: 000000000000003b | |
Jul 11 21:43:18 hacking kernel: RAX: ffffffffffffffda RBX: 00007ffed6baa1c0 RCX: 00007f94844f4bcb | |
Jul 11 21:43:18 hacking kernel: RDX: 000055bd2fdc1ff0 RSI: 00007ffed6baa3d0 RDI: 000055bd1a4f3288 | |
Jul 11 21:43:18 hacking kernel: RBP: 00007f9484cfdff0 R08: 0000000000000000 R09: 0000000000000000 | |
Jul 11 21:43:18 hacking kernel: R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffed6ba9ef0 | |
Jul 11 21:43:18 hacking kernel: R13: 0000000000000040 R14: 0000000000000001 R15: 00007f9484cfdf20 | |
Jul 11 21:43:18 hacking kernel: </TASK> | |
Jul 11 21:43:18 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether | |
Jul 11 21:43:18 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry | |
Jul 11 21:43:18 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi | |
Jul 11 21:43:18 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 11 21:43:18 hacking kernel: ---[ end trace 0000000000000000 ]--- | |
Jul 11 21:43:18 hacking kernel: RIP: 0010:vma_interval_tree_insert+0x36/0xe0 | |
Jul 11 21:43:18 hacking kernel: Code: 48 8b 7f 50 49 89 f2 49 8b 40 08 49 2b 00 48 c1 e8 0c 48 8d 74 07 ff 49 8b 02 48 85 c0 74 70 41 b9 01 00 00 00 eb 03 48 89 d0 <48> 39 70 18 73 04 48 89 70 18 48 8d 48 10 48 3b 78 c8 72 07 48 8d | |
Jul 11 21:43:18 hacking kernel: RSP: 0018:ffffcf9224307a40 EFLAGS: 00010206 | |
Jul 11 21:43:18 hacking kernel: RAX: 00d0000000b60000 RBX: ffffcf9224307a78 RCX: ffff8967b8b154d0 | |
Jul 11 21:43:18 hacking kernel: RDX: 00d0000000b60000 RSI: 0000000000000038 RDI: 0000000000000001 | |
Jul 11 21:43:18 hacking kernel: RBP: ffff8966fdb298c0 R08: ffff8966fdb28240 R09: 0000000000000000 | |
Jul 11 21:43:18 hacking kernel: R10: ffff896689c9bdd0 R11: 0000000000000000 R12: ffff8966880b8000 | |
Jul 11 21:43:18 hacking kernel: R13: ffffcf9224307c98 R14: 00007fab9125f000 R15: 0000000000000000 | |
Jul 11 21:43:18 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d92d000(0000) knlGS:0000000000000000 | |
Jul 11 21:43:18 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:43:18 hacking kernel: CR2: 00007f94844f4ba1 CR3: 00000001f1fe8002 CR4: 0000000000f72ef0 | |
Jul 11 21:43:18 hacking kernel: PKRU: 55555554 | |
Jul 11 21:43:24 hacking kernel: watchdog: CPU10: Watchdog detected hard LOCKUP on cpu 10 | |
Jul 11 21:43:24 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether | |
Jul 11 21:43:24 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry | |
Jul 11 21:43:24 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi | |
Jul 11 21:43:24 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 11 21:43:24 hacking kernel: CPU: 10 UID: 0 PID: 0 Comm: swapper/10 Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 11 21:43:24 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 11 21:43:24 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:43:24 hacking kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x2c4/0x2f0 | |
Jul 11 21:43:24 hacking kernel: Code: 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 c0 5f 90 b2 48 03 04 f5 80 ff 2f b1 48 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 <85> c0 74 f7 48 8b 32 48 85 f6 0f 84 6c ff ff ff 0f 0d 0e e9 64 ff | |
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf9200430db0 EFLAGS: 00000046 | |
Jul 11 21:43:24 hacking kernel: RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffff896686d80e04 | |
Jul 11 21:43:24 hacking kernel: RDX: ffff896de02b2fc0 RSI: 0000000000000011 RDI: ffff896686d80e04 | |
Jul 11 21:43:24 hacking kernel: RBP: 0000000000000000 R08: 00000000002c0000 R09: ffff896e2d9ad000 | |
Jul 11 21:43:24 hacking kernel: R10: 00000000002c0000 R11: 0000000000000000 R12: ffff896686d80e04 | |
Jul 11 21:43:24 hacking kernel: R13: 0000000000000008 R14: 000000000000000a R15: ffff8966801d4200 | |
Jul 11 21:43:24 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d9ad000(0000) knlGS:0000000000000000 | |
Jul 11 21:43:24 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:43:24 hacking kernel: CR2: 000006ec01824100 CR3: 00000001cc41b003 CR4: 0000000000f72ef0 | |
Jul 11 21:43:24 hacking kernel: PKRU: 55555554 | |
Jul 11 21:43:24 hacking kernel: Call Trace: | |
Jul 11 21:43:24 hacking kernel: <IRQ> | |
Jul 11 21:43:24 hacking kernel: _raw_spin_lock_irqsave+0x3d/0x50 | |
Jul 11 21:43:24 hacking kernel: try_to_wake_up+0x53/0x740 | |
Jul 11 21:43:24 hacking kernel: ? sched_balance_rq+0x222/0x1070 | |
Jul 11 21:43:24 hacking kernel: ? rcu_sched_clock_irq+0x7b0/0xb60 | |
Jul 11 21:43:24 hacking kernel: kick_pool+0x5f/0x150 | |
Jul 11 21:43:24 hacking kernel: __queue_work+0x2b9/0x430 | |
Jul 11 21:43:24 hacking kernel: ? __pfx_delayed_work_timer_fn+0x10/0x10 | |
Jul 11 21:43:24 hacking kernel: call_timer_fn+0x26/0x120 | |
Jul 11 21:43:24 hacking kernel: ? __pfx_delayed_work_timer_fn+0x10/0x10 | |
Jul 11 21:43:24 hacking kernel: __run_timers+0x18a/0x280 | |
Jul 11 21:43:24 hacking kernel: run_timer_softirq+0xce/0xf0 | |
Jul 11 21:43:24 hacking kernel: handle_softirqs+0xe3/0x2a0 | |
Jul 11 21:43:24 hacking kernel: __irq_exit_rcu+0xcb/0xf0 | |
Jul 11 21:43:24 hacking kernel: sysvec_apic_timer_interrupt+0x71/0x90 | |
Jul 11 21:43:24 hacking kernel: </IRQ> | |
Jul 11 21:43:24 hacking kernel: <TASK> | |
Jul 11 21:43:24 hacking kernel: asm_sysvec_apic_timer_interrupt+0x1a/0x20 | |
Jul 11 21:43:24 hacking kernel: RIP: 0010:cpuidle_enter_state+0xbb/0x410 | |
Jul 11 21:43:24 hacking kernel: Code: 00 00 e8 f8 d6 0c ff e8 83 f1 ff ff 48 89 c5 0f 1f 44 00 00 31 ff e8 a4 48 0b ff 45 84 ff 0f 85 33 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 7c 01 00 00 49 63 ce 48 2b 2c 24 48 6b d1 68 48 89 | |
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf92001f7e78 EFLAGS: 00000246 | |
Jul 11 21:43:24 hacking kernel: RAX: ffff896e2d9ad000 RBX: 0000000000000002 RCX: 0000000000000000 | |
Jul 11 21:43:24 hacking kernel: RDX: 0000005227c071ae RSI: fffffffb8765c0cb RDI: 0000000000000000 | |
Jul 11 21:43:24 hacking kernel: RBP: 0000005227c071ae R08: 0000000000000000 R09: ffff896de02a0d60 | |
Jul 11 21:43:24 hacking kernel: R10: ffff896de02a0d00 R11: 0000000000000002 R12: ffffef91ffc81698 | |
Jul 11 21:43:24 hacking kernel: R13: ffffffffb1dede60 R14: 0000000000000002 R15: 0000000000000000 | |
Jul 11 21:43:24 hacking kernel: ? cpuidle_enter_state+0xac/0x410 | |
Jul 11 21:43:24 hacking kernel: cpuidle_enter+0x31/0x50 | |
Jul 11 21:43:24 hacking kernel: do_idle+0x1b1/0x210 | |
Jul 11 21:43:24 hacking kernel: cpu_startup_entry+0x29/0x30 | |
Jul 11 21:43:24 hacking kernel: start_secondary+0x119/0x140 | |
Jul 11 21:43:24 hacking kernel: common_startup_64+0x13e/0x141 | |
Jul 11 21:43:24 hacking kernel: </TASK> | |
Jul 11 21:43:24 hacking kernel: iwlwifi 0000:2d:00.0: Queue 3 is stuck 17902 17912 | |
Jul 11 21:43:24 hacking kernel: non-paged memory | |
Jul 11 21:43:24 hacking kernel: ------------[ cut here ]------------ | |
Jul 11 21:43:24 hacking kernel: list_del corruption. prev->next should be fffffbbe453b2988, but was fff3fbbe451f2988. (prev=fffffbbe48e26208) | |
Jul 11 21:43:24 hacking kernel: WARNING: CPU: 6 PID: 0 at lib/list_debug.c:62 __list_del_entry_valid_or_report+0xfa/0x10a | |
Jul 11 21:43:24 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether | |
Jul 11 21:43:24 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry | |
Jul 11 21:43:24 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi | |
Jul 11 21:43:24 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 11 21:43:24 hacking kernel: CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 11 21:43:24 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 11 21:43:24 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:43:24 hacking kernel: RIP: 0010:__list_del_entry_valid_or_report+0xfa/0x10a | |
Jul 11 21:43:24 hacking kernel: Code: e8 7b 30 11 00 0f 0b e9 77 ff ff ff 4c 89 e7 e8 6c 00 3d 00 49 8b 14 24 4c 89 e1 48 89 de 48 c7 c7 50 63 1f b1 e8 56 30 11 00 <0f> 0b e9 52 ff ff ff 5b 5d 41 5c c3 cc cc cc cc 48 89 df e8 1e fe | |
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf9200360c78 EFLAGS: 00010046 | |
Jul 11 21:43:24 hacking kernel: RAX: 0000000000000000 RBX: fffffbbe453b2988 RCX: 0000000000000027 | |
Jul 11 21:43:24 hacking kernel: RDX: ffff896de019cbc8 RSI: 0000000000000001 RDI: ffff896de019cbc0 | |
Jul 11 21:43:24 hacking kernel: RBP: ffff896de01b7fa0 R08: 0000000000000000 R09: 00000000ffffefff | |
Jul 11 21:43:24 hacking kernel: R10: ffffffffb1c60f20 R11: ffffcf9200360b10 R12: fffffbbe48e26208 | |
Jul 11 21:43:24 hacking kernel: R13: ffff896de01b7f80 R14: 0000000000000000 R15: 000000000000028b | |
Jul 11 21:43:24 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d8ad000(0000) knlGS:0000000000000000 | |
Jul 11 21:43:24 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:43:24 hacking kernel: CR2: 000008cc03e46000 CR3: 0000000117f42006 CR4: 0000000000f72ef0 | |
Jul 11 21:43:24 hacking kernel: PKRU: 55555554 | |
Jul 11 21:43:24 hacking kernel: Call Trace: | |
Jul 11 21:43:24 hacking kernel: <IRQ> | |
Jul 11 21:43:24 hacking kernel: free_pcppages_bulk.cold+0x17/0x2b | |
Jul 11 21:43:24 hacking kernel: free_frozen_page_commit+0x182/0x2f0 | |
Jul 11 21:43:24 hacking kernel: __free_frozen_pages+0x4db/0x5f0 | |
Jul 11 21:43:24 hacking kernel: __put_partials+0xf6/0x120 | |
Jul 11 21:43:24 hacking kernel: kmem_cache_free+0x40c/0x4d0 | |
Jul 11 21:43:24 hacking kernel: bio_free+0x2f/0x50 | |
Jul 11 21:43:24 hacking kernel: blk_mq_end_request_batch+0x114/0x540 | |
Jul 11 21:43:24 hacking kernel: nvme_irq+0x7a/0x90 [nvme 3bec3f65c0d9a7a5b2f55d5745cc486e5f920baf] | |
Jul 11 21:43:24 hacking kernel: ? __pfx_nvme_pci_complete_batch+0x10/0x10 [nvme 3bec3f65c0d9a7a5b2f55d5745cc486e5f920baf] | |
Jul 11 21:43:24 hacking kernel: __handle_irq_event_percpu+0x47/0x1b0 | |
Jul 11 21:43:24 hacking kernel: handle_irq_event+0x38/0x80 | |
Jul 11 21:43:24 hacking kernel: handle_edge_irq+0x8b/0x220 | |
Jul 11 21:43:24 hacking kernel: __common_interrupt+0x3e/0xa0 | |
Jul 11 21:43:24 hacking kernel: common_interrupt+0x80/0xa0 | |
Jul 11 21:43:24 hacking kernel: </IRQ> | |
Jul 11 21:43:24 hacking kernel: <TASK> | |
Jul 11 21:43:24 hacking kernel: asm_common_interrupt+0x26/0x40 | |
Jul 11 21:43:24 hacking kernel: RIP: 0010:cpuidle_enter_state+0xbb/0x410 | |
Jul 11 21:43:24 hacking kernel: Code: 00 00 e8 f8 d6 0c ff e8 83 f1 ff ff 48 89 c5 0f 1f 44 00 00 31 ff e8 a4 48 0b ff 45 84 ff 0f 85 33 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 7c 01 00 00 49 63 ce 48 2b 2c 24 48 6b d1 68 48 89 | |
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf92001d7e78 EFLAGS: 00000246 | |
Jul 11 21:43:24 hacking kernel: RAX: ffff896e2d8ad000 RBX: 0000000000000002 RCX: 0000000000000000 | |
Jul 11 21:43:24 hacking kernel: RDX: 00000054c780d693 RSI: fffffffb8765c0cb RDI: 0000000000000000 | |
Jul 11 21:43:24 hacking kernel: RBP: 00000054c780d693 R08: 0000000000000000 R09: 000000000000a46b | |
Jul 11 21:43:24 hacking kernel: R10: 00000000ffffffff R11: 00000000000000a8 R12: ffffef91ffb81698 | |
Jul 11 21:43:24 hacking kernel: R13: ffffffffb1dede60 R14: 0000000000000002 R15: 0000000000000000 | |
Jul 11 21:43:24 hacking kernel: ? cpuidle_enter_state+0xac/0x410 | |
Jul 11 21:43:24 hacking kernel: cpuidle_enter+0x31/0x50 | |
Jul 11 21:43:24 hacking kernel: do_idle+0x1b1/0x210 | |
Jul 11 21:43:24 hacking kernel: cpu_startup_entry+0x29/0x30 | |
Jul 11 21:43:24 hacking kernel: start_secondary+0x119/0x140 | |
Jul 11 21:43:24 hacking kernel: common_startup_64+0x13e/0x141 | |
Jul 11 21:43:24 hacking kernel: </TASK> | |
Jul 11 21:43:24 hacking kernel: ---[ end trace 0000000000000000 ]--- | |
Jul 11 21:43:25 hacking kernel: traps: chrome[1959] general protection fault ip:55b0dcc87f01 sp:7fffd5127fb0 error:0 in chrome[3a5ff01,55b0dbf7a000+c2eb000] | |
Jul 11 21:43:27 hacking kernel: traps: HangWatcher[2816] general protection fault ip:7f26bf0ecd39 sp:7f262c7eaff0 error:0 in libc.so.6[99d39,7f26bf077000+170000] | |
Jul 11 21:43:44 hacking kernel: watchdog: CPU5: Watchdog detected hard LOCKUP on cpu 5 | |
Jul 11 21:43:44 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether | |
Jul 11 21:43:44 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry | |
Jul 11 21:43:44 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi | |
Jul 11 21:43:44 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 11 21:43:44 hacking kernel: CPU: 5 UID: 0 PID: 127 Comm: khugepaged Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 11 21:43:44 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 11 21:43:44 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:43:44 hacking kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x64/0x2f0 | |
Jul 11 21:43:44 hacking kernel: Code: 77 79 f0 0f ba 29 08 0f 92 c2 8b 01 0f b6 d2 c1 e2 08 30 e4 09 d0 3d ff 00 00 00 77 55 85 c0 74 10 0f b6 01 84 c0 74 09 f3 90 <0f> b6 01 84 c0 75 f7 b8 01 00 00 00 66 89 01 65 48 ff 05 0d 11 fc | |
Jul 11 21:43:44 hacking kernel: RSP: 0018:ffffcf920062fd50 EFLAGS: 00000002 | |
Jul 11 21:43:44 hacking kernel: RAX: 0000000000000001 RBX: ffff896de02ac4e0 RCX: ffff896de02b1280 | |
Jul 11 21:43:44 hacking kernel: RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff896de02b1280 | |
Jul 11 21:43:44 hacking kernel: RBP: ffff896de02b1280 R08: ffffffffb1ed50a0 R09: ffffffffb28ef9f4 | |
Jul 11 21:43:44 hacking kernel: R10: 0000000000000009 R11: ffff896e2d96d000 R12: ffff8966802f4000 | |
Jul 11 21:43:44 hacking kernel: R13: 000000000000000a R14: 000000000000000a R15: ffff8966801d4200 | |
Jul 11 21:43:44 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d86d000(0000) knlGS:0000000000000000 | |
Jul 11 21:43:44 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:43:44 hacking kernel: CR2: 000055b0b8265000 CR3: 00000001ceaf8003 CR4: 0000000000f72ef0 | |
Jul 11 21:43:44 hacking kernel: PKRU: 55555554 | |
Jul 11 21:43:44 hacking kernel: Call Trace: | |
Jul 11 21:43:44 hacking kernel: <TASK> | |
Jul 11 21:43:44 hacking kernel: _raw_spin_lock+0x29/0x30 | |
Jul 11 21:43:44 hacking kernel: __queue_work+0xa5/0x430 | |
Jul 11 21:43:44 hacking kernel: queue_work_on+0x73/0x80 | |
Jul 11 21:43:44 hacking kernel: ? __pfx_khugepaged+0x10/0x10 | |
Jul 11 21:43:44 hacking kernel: __lru_add_drain_all+0x113/0x1f0 | |
Jul 11 21:43:44 hacking kernel: khugepaged+0x65/0x970 | |
Jul 11 21:43:44 hacking kernel: ? __pfx_autoremove_wake_function+0x10/0x10 | |
Jul 11 21:43:44 hacking kernel: ? __pfx_khugepaged+0x10/0x10 | |
Jul 11 21:43:44 hacking kernel: kthread+0xf9/0x240 | |
Jul 11 21:43:44 hacking kernel: ? __pfx_kthread+0x10/0x10 | |
Jul 11 21:43:44 hacking kernel: ret_from_fork+0x31/0x50 | |
Jul 11 21:43:44 hacking kernel: ? __pfx_kthread+0x10/0x10 | |
Jul 11 21:43:44 hacking kernel: ret_from_fork_asm+0x1a/0x30 | |
Jul 11 21:43:44 hacking kernel: </TASK> | |
Jul 11 21:43:44 hacking kernel: watchdog: BUG: soft lockup - CPU#2 stuck for 22s! [chrome:1929] | |
Jul 11 21:43:44 hacking kernel: CPU#2 Utilization every 4s during lockup: | |
Jul 11 21:43:44 hacking kernel: #1: 100% system, 0% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:44 hacking kernel: #2: 100% system, 0% softirq, 1% hardirq, 0% idle | |
Jul 11 21:43:44 hacking kernel: #3: 101% system, 0% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:44 hacking kernel: #4: 100% system, 0% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:44 hacking kernel: #5: 100% system, 0% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:44 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether | |
Jul 11 21:43:44 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry | |
Jul 11 21:43:44 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi | |
Jul 11 21:43:44 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 11 21:43:44 hacking kernel: CPU: 2 UID: 1000 PID: 1929 Comm: chrome Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 11 21:43:44 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE | |
Jul 11 21:43:44 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:43:44 hacking kernel: RIP: 0010:smp_call_function_many_cond+0x2c0/0x4a0 | |
Jul 11 21:43:44 hacking kernel: Code: 3d 6d 00 3b 05 b1 48 46 02 48 89 c2 0f 83 08 fe ff ff 48 63 c2 49 8b 4d 00 48 03 0c c5 80 ff 2f b1 8b 41 08 a8 01 74 09 f3 90 <8b> 41 08 a8 01 75 f7 83 c2 01 eb bb 48 85 db 0f 84 8d fd ff ff 48 | |
Jul 11 21:43:44 hacking kernel: RSP: 0018:ffffcf920c893778 EFLAGS: 00000202 | |
Jul 11 21:43:44 hacking kernel: RAX: 0000000000000011 RBX: 0000000000000202 RCX: ffff896de02b8cc0 | |
Jul 11 21:43:44 hacking kernel: RDX: 000000000000000a RSI: 0000000000000000 RDI: 000000000000000a | |
Jul 11 21:43:44 hacking kernel: RBP: ffff896de03f8cc0 R08: ffff896680ca3b00 R09: ffff896681113000 | |
Jul 11 21:43:44 hacking kernel: R10: ffff896680ca3118 R11: 0000000000000000 R12: 000000000000000f | |
Jul 11 21:43:44 hacking kernel: R13: ffff896de00b3480 R14: 0000000000000010 R15: 0000000000000010 | |
Jul 11 21:43:44 hacking kernel: FS: 00007f26be050540(0000) GS:ffff896e2d7ad000(0000) knlGS:0000000000000000 | |
Jul 11 21:43:44 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:43:44 hacking kernel: CR2: 000007e700091008 CR3: 00000001ae1e7005 CR4: 0000000000f72ef0 | |
Jul 11 21:43:44 hacking kernel: PKRU: 55555558 | |
Jul 11 21:43:44 hacking kernel: Call Trace: | |
Jul 11 21:43:44 hacking kernel: <TASK> | |
Jul 11 21:43:44 hacking kernel: ? __pfx_flush_tlb_func+0x10/0x10 | |
Jul 11 21:43:44 hacking kernel: on_each_cpu_cond_mask+0x24/0x40 | |
Jul 11 21:43:44 hacking kernel: flush_tlb_mm_range+0x1ba/0x5b0 | |
Jul 11 21:43:44 hacking kernel: tlb_finish_mmu+0x79/0x1e0 | |
Jul 11 21:43:44 hacking kernel: vms_clear_ptes+0x14d/0x160 | |
Jul 11 21:43:44 hacking kernel: vms_complete_munmap_vmas+0x61/0x180 | |
Jul 11 21:43:44 hacking kernel: do_vmi_align_munmap+0x15c/0x1e0 | |
Jul 11 21:43:44 hacking kernel: do_vmi_munmap+0xd0/0x170 | |
Jul 11 21:43:44 hacking kernel: __vm_munmap+0xad/0x170 | |
Jul 11 21:43:44 hacking kernel: __x64_sys_munmap+0x1b/0x30 | |
Jul 11 21:43:44 hacking kernel: do_syscall_64+0x7b/0x810 | |
Jul 11 21:43:44 hacking kernel: ? __smp_call_single_queue+0xb6/0x120 | |
Jul 11 21:43:44 hacking kernel: ? ttwu_queue_wakelist+0xf7/0x110 | |
Jul 11 21:43:44 hacking kernel: ? try_to_wake_up+0x309/0x740 | |
Jul 11 21:43:44 hacking kernel: ? ep_autoremove_wake_function+0x16/0x60 | |
Jul 11 21:43:44 hacking kernel: ? __wake_up_common+0x6f/0xa0 | |
Jul 11 21:43:44 hacking kernel: ? __wake_up+0x44/0x60 | |
Jul 11 21:43:44 hacking kernel: ? ep_poll_callback+0x2a2/0x2c0 | |
Jul 11 21:43:44 hacking kernel: ? __wake_up_common+0x6f/0xa0 | |
Jul 11 21:43:44 hacking kernel: ? eventfd_write+0xdd/0x210 | |
Jul 11 21:43:44 hacking kernel: ? arch_exit_to_user_mode_prepare.isra.0+0x7c/0x90 | |
Jul 11 21:43:44 hacking kernel: ? security_file_permission+0x48/0x130 | |
Jul 11 21:43:44 hacking kernel: ? vfs_write+0xef/0x470 | |
Jul 11 21:43:44 hacking kernel: ? __seccomp_filter+0x41/0x4e0 | |
Jul 11 21:43:44 hacking kernel: ? ksys_write+0xa8/0xe0 | |
Jul 11 21:43:44 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 11 21:43:44 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 11 21:43:44 hacking kernel: ? do_futex+0x11f/0x190 | |
Jul 11 21:43:44 hacking kernel: ? __x64_sys_futex+0x12d/0x210 | |
Jul 11 21:43:44 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 11 21:43:44 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 11 21:43:44 hacking kernel: ? handle_mm_fault+0x1d2/0x2d0 | |
Jul 11 21:43:44 hacking kernel: ? do_user_addr_fault+0x21a/0x690 | |
Jul 11 21:43:44 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0 | |
Jul 11 21:43:44 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e | |
Jul 11 21:43:44 hacking kernel: RIP: 0033:0x7f26bf168d6b | |
Jul 11 21:43:44 hacking kernel: Code: 73 01 c3 48 8b 0d a5 ff 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 75 ff 0c 00 f7 d8 64 89 01 48 | |
Jul 11 21:43:44 hacking kernel: RSP: 002b:00007fffd5127438 EFLAGS: 00000202 ORIG_RAX: 000000000000000b | |
Jul 11 21:43:44 hacking kernel: RAX: ffffffffffffffda RBX: 0000000000080000 RCX: 00007f26bf168d6b | |
Jul 11 21:43:44 hacking kernel: RDX: 0000000000080000 RSI: 0000000000080000 RDI: 0000193447218000 | |
Jul 11 21:43:44 hacking kernel: RBP: 00007fffd5127450 R08: 0000000000000004 R09: 0000000000000001 | |
Jul 11 21:43:44 hacking kernel: R10: 0000000000000020 R11: 0000000000000202 R12: 0000000000080000 | |
Jul 11 21:43:44 hacking kernel: R13: 000006ec019387a0 R14: 000055b0e8f85058 R15: 000006ec01938770 | |
Jul 11 21:43:44 hacking kernel: </TASK> | |
Jul 11 21:43:44 hacking kernel: watchdog: BUG: soft lockup - CPU#13 stuck for 22s! [chrome:3975] | |
Jul 11 21:43:44 hacking kernel: CPU#13 Utilization every 4s during lockup: | |
Jul 11 21:43:44 hacking kernel: #1: 100% system, 0% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:45 hacking kernel: #2: 100% system, 1% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:45 hacking kernel: #3: 100% system, 0% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:45 hacking kernel: #4: 100% system, 0% softirq, 0% hardirq, 0% idle | |
Jul 11 21:43:45 hacking kernel: #5: 101% system, 0% softirq, 1% hardirq, 0% idle | |
Jul 11 21:43:45 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether | |
Jul 11 21:43:45 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry | |
Jul 11 21:43:45 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi | |
Jul 11 21:43:45 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1 | |
Jul 11 21:43:45 hacking kernel: CPU: 13 UID: 1000 PID: 3975 Comm: chrome Tainted: G D W OEL 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d | |
Jul 11 21:43:45 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE, [L]=SOFTLOCKUP | |
Jul 11 21:43:45 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025 | |
Jul 11 21:43:45 hacking kernel: RIP: 0010:smp_call_function_many_cond+0x2be/0x4a0 | |
Jul 11 21:43:45 hacking kernel: Code: e8 77 3d 6d 00 3b 05 b1 48 46 02 48 89 c2 0f 83 08 fe ff ff 48 63 c2 49 8b 4d 00 48 03 0c c5 80 ff 2f b1 8b 41 08 a8 01 74 09 <f3> 90 8b 41 08 a8 01 75 f7 83 c2 01 eb bb 48 85 db 0f 84 8d fd ff | |
Jul 11 21:43:45 hacking kernel: RSP: 0018:ffffcf9224783938 EFLAGS: 00000202 | |
Jul 11 21:43:45 hacking kernel: RAX: 0000000000000011 RBX: 0000000000000202 RCX: ffff896de0178e20 | |
Jul 11 21:43:45 hacking kernel: RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000005 | |
Jul 11 21:43:45 hacking kernel: RBP: ffff896de0338e20 R08: ffff896680ca31d8 R09: ffff896681111c00 | |
Jul 11 21:43:45 hacking kernel: R10: ffff896680ca3598 R11: 0000000000000000 R12: 000000000000000c | |
Jul 11 21:43:45 hacking kernel: R13: ffff896de0373480 R14: 0000000000000010 R15: 0000000000000010 | |
Jul 11 21:43:45 hacking kernel: FS: 00007f26be050540(0000) GS:ffff896e2da6d000(0000) knlGS:0000000000000000 | |
Jul 11 21:43:45 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 | |
Jul 11 21:43:45 hacking kernel: CR2: 000055b0e4f24d30 CR3: 0000000184f30004 CR4: 0000000000f72ef0 | |
Jul 11 21:43:45 hacking kernel: PKRU: 55555558 | |
Jul 11 21:43:45 hacking kernel: Call Trace: | |
Jul 11 21:43:45 hacking kernel: <TASK> | |
Jul 11 21:43:45 hacking kernel: ? __pfx_flush_tlb_func+0x10/0x10 | |
Jul 11 21:43:45 hacking kernel: on_each_cpu_cond_mask+0x24/0x40 | |
Jul 11 21:43:45 hacking kernel: flush_tlb_mm_range+0x1ba/0x5b0 | |
Jul 11 21:43:45 hacking kernel: tlb_finish_mmu+0x79/0x1e0 | |
Jul 11 21:43:45 hacking kernel: vms_clear_ptes+0x14d/0x160 | |
Jul 11 21:43:45 hacking kernel: vms_complete_munmap_vmas+0x61/0x180 | |
Jul 11 21:43:45 hacking kernel: do_vmi_align_munmap+0x15c/0x1e0 | |
Jul 11 21:43:45 hacking kernel: do_vmi_munmap+0xd0/0x170 | |
Jul 11 21:43:45 hacking kernel: __vm_munmap+0xad/0x170 | |
Jul 11 21:43:45 hacking kernel: __x64_sys_munmap+0x1b/0x30 | |
Jul 11 21:43:45 hacking kernel: do_syscall_64+0x7b/0x810 | |
Jul 11 21:43:45 hacking kernel: ? ksys_write+0xa8/0xe0 | |
Jul 11 21:43:45 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0 | |
Jul 11 21:43:45 hacking kernel: ? do_syscall_64+0x87/0x810 | |
Jul 11 21:43:45 hacking kernel: ? __handle_mm_fault+0x7de/0xfd0 | |
Jul 11 21:43:45 hacking kernel: ? __count_memcg_events+0xb0/0x150 | |
Jul 11 21:43:45 hacking kernel: ? count_memcg_events.constprop.0+0x1a/0x30 | |
Jul 11 21:43:45 hacking kernel: ? handle_mm_fault+0x1d2/0x2d0 | |
Jul 11 21:43:45 hacking kernel: ? do_user_addr_fault+0x21a/0x690 | |
Jul 11 21:43:45 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0 | |
Jul 11 21:43:45 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e | |
Jul 11 21:43:45 hacking kernel: RIP: 0033:0x7f26bf168d6b | |
Jul 11 21:43:45 hacking kernel: Code: 73 01 c3 48 8b 0d a5 ff 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 75 ff 0c 00 f7 d8 64 89 01 48 | |
Jul 11 21:43:45 hacking kernel: RSP: 002b:00007fffd5127918 EFLAGS: 00000246 ORIG_RAX: 000000000000000b | |
Jul 11 21:43:45 hacking kernel: RAX: ffffffffffffffda RBX: 000006ec02b0fce8 RCX: 00007f26bf168d6b | |
Jul 11 21:43:45 hacking kernel: RDX: 0000000000401000 RSI: 0000000000401000 RDI: 00007f2620dff000 | |
Jul 11 21:43:45 hacking kernel: RBP: 00007fffd5127950 R08: 000006e80005ea01 R09: 0000000000000000 | |
Jul 11 21:43:45 hacking kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 000006ec02a89950 | |
Jul 11 21:43:45 hacking kernel: R13: 000006ec02a89970 R14: 000055b0e8cb1900 R15: 00007f2620dff000 | |
Jul 11 21:43:45 hacking kernel: </TASK> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment