Skip to content

Instantly share code, notes, and snippets.

@MaskRay
Created July 12, 2025 06:42
Show Gist options
  • Save MaskRay/1a11d76b213ae3c3831d24b1d656cf83 to your computer and use it in GitHub Desktop.
Save MaskRay/1a11d76b213ae3c3831d24b1d656cf83 to your computer and use it in GitHub Desktop.
Eurocom Blitz Ultra 2, Arch Linux, Oops: general protection fault, probably for non-canonical address
Jul 11 21:37:24 hacking kernel: Linux version 6.15.6-arch1-1 (linux@archlinux) (gcc (GCC) 15.1.1 20250425, GNU ld (GNU Binutils) 2.44.0) #1 SMP PREEMPT_DYNAMIC Thu, 10 Jul 2025 17:10:18 +0000
Jul 11 21:37:24 hacking kernel: Command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2
Jul 11 21:37:24 hacking kernel: x86/split lock detection: #AC: crashing the kernel on kernel split_locks and warning on user-space split_locks
Jul 11 21:37:24 hacking kernel: BIOS-provided physical RAM map:
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009efff] usable
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x000000000009f000-0x00000000000fffff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000000100000-0x000000005df8afff] usable
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x000000005df8b000-0x000000005e88afff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x000000005e88b000-0x00000000606befff] usable
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000606bf000-0x00000000626befff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000626bf000-0x0000000067ebefff] ACPI NVS
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000067ebf000-0x0000000067ffefff] ACPI data
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000067fff000-0x0000000067ffffff] usable
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000068000000-0x00000000787fffff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000c0000000-0x00000000cfffffff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000fe010000-0x00000000fe010fff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000fed20000-0x00000000fed7ffff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Jul 11 21:37:24 hacking kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087fffffff] usable
Jul 11 21:37:24 hacking kernel: NX (Execute Disable) protection: active
Jul 11 21:37:24 hacking kernel: APIC: Static calls initialized
Jul 11 21:37:24 hacking kernel: efi: EFI v2.9 by INSYDE Corp.
Jul 11 21:37:24 hacking kernel: efi: TPMFinalLog=0x67e17000 ACPI=0x67ffe000 ACPI 2.0=0x67ffe014 SMBIOS=0x60dea000 MEMATTR=0x595a9018 ESRT=0x5a526698 RNG=0x67f37f18 INITRD=0x58687f18 TPMEventLog=0x67f2e018
Jul 11 21:37:24 hacking kernel: random: crng init done
Jul 11 21:37:24 hacking kernel: efi: Remove mem95: MMIO range=[0xc0000000-0xcfffffff] (256MB) from e820 map
Jul 11 21:37:24 hacking kernel: e820: remove [mem 0xc0000000-0xcfffffff] reserved
Jul 11 21:37:24 hacking kernel: efi: Not removing mem96: MMIO range=[0xfe010000-0xfe010fff] (4KB) from e820 map
Jul 11 21:37:24 hacking kernel: efi: Remove mem98: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map
Jul 11 21:37:24 hacking kernel: e820: remove [mem 0xff000000-0xffffffff] reserved
Jul 11 21:37:24 hacking kernel: SMBIOS 3.6 present.
Jul 11 21:37:24 hacking kernel: DMI: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:37:24 hacking kernel: DMI: Memory slots populated: 1/2
Jul 11 21:37:24 hacking kernel: tsc: Detected 3700.000 MHz processor
Jul 11 21:37:24 hacking kernel: tsc: Detected 3686.400 MHz TSC
Jul 11 21:37:24 hacking kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Jul 11 21:37:24 hacking kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Jul 11 21:37:24 hacking kernel: last_pfn = 0x880000 max_arch_pfn = 0x400000000
Jul 11 21:37:24 hacking kernel: MTRR map: 7 entries (3 fixed + 4 variable; max 23), built from 10 variable MTRRs
Jul 11 21:37:24 hacking kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT
Jul 11 21:37:24 hacking kernel: x2apic: enabled by BIOS, switching to x2apic ops
Jul 11 21:37:24 hacking kernel: last_pfn = 0x68000 max_arch_pfn = 0x400000000
Jul 11 21:37:24 hacking kernel: esrt: Reserving ESRT space from 0x000000005a526698 to 0x000000005a526720.
Jul 11 21:37:24 hacking kernel: e820: update [mem 0x5a526000-0x5a526fff] usable ==> reserved
Jul 11 21:37:24 hacking kernel: Using GB pages for direct mapping
Jul 11 21:37:24 hacking kernel: Secure boot disabled
Jul 11 21:37:24 hacking kernel: RAMDISK: [mem 0x529c1000-0x547ddfff]
Jul 11 21:37:24 hacking kernel: ACPI: Early table checksum verification disabled
Jul 11 21:37:24 hacking kernel: ACPI: RSDP 0x0000000067FFE014 000024 (v02 INSYDE)
Jul 11 21:37:24 hacking kernel: ACPI: XSDT 0x0000000067FCF188 00014C (v01 INSYDE ARL 00000002 01000013)
Jul 11 21:37:24 hacking kernel: ACPI: FACP 0x0000000067FC2000 000114 (v06 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: DSDT 0x0000000067F45000 07944F (v02 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: FACS 0x0000000067DEC000 000040
Jul 11 21:37:24 hacking kernel: ACPI: UEFI 0x0000000067E16000 0001CF (v01 INSYDE H2O BIOS 00000001 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FFC000 000770 (v02 PmRef Cpu0Ist 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FFB000 0005FB (v02 PmRef Cpu0Hwp 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FFA000 0001AB (v02 PmRef Cpu0Psd 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF9000 000394 (v02 PmRef Cpu0Cst 00003001 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF7000 001BAF (v02 PmRef ApIst 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF5000 001620 (v02 PmRef ApHwp 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF3000 001349 (v02 PmRef ApPsd 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FF2000 000FBB (v02 PmRef ApCst 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FEE000 003BC8 (v02 CpuRef CpuSsdt 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: DTPR 0x0000000067FED000 000088 (v01 00000000 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FEA000 0021A0 (v02 INTEL IgfxSsdt 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FE0000 009A2C (v02 INTEL TcssSsdt 00001000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: ECDT 0x0000000067FDF000 000069 (v01 00000001 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FDE000 00077B (v02 INSYDE Tpm2Tabl 00001000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: TPM2 0x0000000067FDD000 00004C (v04 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FD2000 009168 (v02 DptfTb DptfTabl 00001000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: LPIT 0x0000000067FD1000 0000CC (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: WSMT 0x0000000067FD0000 000028 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FCD000 0015CD (v02 INSYDE PtidDevc 00001000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FC7000 005E42 (v02 INSYDE TbtTypeC 00000000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: DBGP 0x0000000067FFD000 000034 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: DBG2 0x0000000067FC6000 000054 (v00 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067FC4000 00189A (v02 INSYDE UsbCTabl 00001000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: NHLT 0x0000000067FC3000 0002E3 (v00 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: HPET 0x0000000067FC1000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: APIC 0x0000000067FC0000 000358 (v05 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: MCFG 0x0000000067FBF000 00003C (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: DMAR 0x0000000067F44000 000098 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F42000 0010C3 (v02 INTEL xh_mtlpR 00000000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F3F000 00281A (v02 SocGpe SocGpe 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F3C000 0028D3 (v02 SocCmn SocCmn 00003000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: SSDT 0x0000000067F3B000 0000F8 (v02 INSYDE PcdTabl 00001000 INTL 20200717)
Jul 11 21:37:24 hacking kernel: ACPI: FPDT 0x0000000067F3A000 000044 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: PHAT 0x0000000067F38000 000790 (v01 INSYDE ARL 00000005 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: BGRT 0x0000000067F39000 000038 (v01 INSYDE ARL 00000002 ACPI 00040000)
Jul 11 21:37:24 hacking kernel: ACPI: Reserving FACP table memory at [mem 0x67fc2000-0x67fc2113]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DSDT table memory at [mem 0x67f45000-0x67fbe44e]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving FACS table memory at [mem 0x67dec000-0x67dec03f]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving UEFI table memory at [mem 0x67e16000-0x67e161ce]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffc000-0x67ffc76f]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffb000-0x67ffb5fa]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ffa000-0x67ffa1aa]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff9000-0x67ff9393]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff7000-0x67ff8bae]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff5000-0x67ff661f]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff3000-0x67ff4348]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67ff2000-0x67ff2fba]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fee000-0x67ff1bc7]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DTPR table memory at [mem 0x67fed000-0x67fed087]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fea000-0x67fec19f]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fe0000-0x67fe9a2b]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving ECDT table memory at [mem 0x67fdf000-0x67fdf068]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fde000-0x67fde77a]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving TPM2 table memory at [mem 0x67fdd000-0x67fdd04b]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fd2000-0x67fdb167]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving LPIT table memory at [mem 0x67fd1000-0x67fd10cb]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving WSMT table memory at [mem 0x67fd0000-0x67fd0027]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fcd000-0x67fce5cc]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc7000-0x67fcce41]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DBGP table memory at [mem 0x67ffd000-0x67ffd033]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DBG2 table memory at [mem 0x67fc6000-0x67fc6053]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67fc4000-0x67fc5899]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving NHLT table memory at [mem 0x67fc3000-0x67fc32e2]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving HPET table memory at [mem 0x67fc1000-0x67fc1037]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving APIC table memory at [mem 0x67fc0000-0x67fc0357]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving MCFG table memory at [mem 0x67fbf000-0x67fbf03b]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving DMAR table memory at [mem 0x67f44000-0x67f44097]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f42000-0x67f430c2]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3f000-0x67f41819]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3c000-0x67f3e8d2]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving SSDT table memory at [mem 0x67f3b000-0x67f3b0f7]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving FPDT table memory at [mem 0x67f3a000-0x67f3a043]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving PHAT table memory at [mem 0x67f38000-0x67f3878f]
Jul 11 21:37:24 hacking kernel: ACPI: Reserving BGRT table memory at [mem 0x67f39000-0x67f39037]
Jul 11 21:37:24 hacking kernel: APIC: Switched APIC routing to: cluster x2apic
Jul 11 21:37:24 hacking kernel: No NUMA configuration found
Jul 11 21:37:24 hacking kernel: Faking a node at [mem 0x0000000000000000-0x000000087fffffff]
Jul 11 21:37:24 hacking kernel: NODE_DATA(0) allocated [mem 0x87ffd5280-0x87fffffff]
Jul 11 21:37:24 hacking kernel: Zone ranges:
Jul 11 21:37:24 hacking kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff]
Jul 11 21:37:24 hacking kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff]
Jul 11 21:37:24 hacking kernel: Normal [mem 0x0000000100000000-0x000000087fffffff]
Jul 11 21:37:24 hacking kernel: Device empty
Jul 11 21:37:24 hacking kernel: Movable zone start for each node
Jul 11 21:37:24 hacking kernel: Early memory node ranges
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000000001000-0x000000000009efff]
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000000100000-0x000000005df8afff]
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x000000005e88b000-0x00000000606befff]
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000067fff000-0x0000000067ffffff]
Jul 11 21:37:24 hacking kernel: node 0: [mem 0x0000000100000000-0x000000087fffffff]
Jul 11 21:37:24 hacking kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087fffffff]
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA32: 2304 pages in unavailable ranges
Jul 11 21:37:24 hacking kernel: On node 0, zone DMA32: 31040 pages in unavailable ranges
Jul 11 21:37:24 hacking kernel: ACPI: PM-Timer IO Port: 0x1808
Jul 11 21:37:24 hacking kernel: ACPI: X2APIC_NMI (uid[0xffffffff] high level lint[0x1])
Jul 11 21:37:24 hacking kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
Jul 11 21:37:24 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Jul 11 21:37:24 hacking kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Jul 11 21:37:24 hacking kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Jul 11 21:37:24 hacking kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Jul 11 21:37:24 hacking kernel: e820: update [mem 0x5848d000-0x5851dfff] usable ==> reserved
Jul 11 21:37:24 hacking kernel: TSC deadline timer available
Jul 11 21:37:24 hacking kernel: CPU topo: Max. logical packages: 1
Jul 11 21:37:24 hacking kernel: CPU topo: Max. logical dies: 1
Jul 11 21:37:24 hacking kernel: CPU topo: Max. dies per package: 1
Jul 11 21:37:24 hacking kernel: CPU topo: Max. threads per core: 1
Jul 11 21:37:24 hacking kernel: CPU topo: Num. cores per package: 16
Jul 11 21:37:24 hacking kernel: CPU topo: Num. threads per package: 16
Jul 11 21:37:24 hacking kernel: CPU topo: Allowing 16 present CPUs plus 0 hotplug CPUs
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff]
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x000fffff]
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5848d000-0x5851dfff]
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5a526000-0x5a526fff]
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x5df8b000-0x5e88afff]
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x606bf000-0x67ffefff]
Jul 11 21:37:24 hacking kernel: PM: hibernation: Registered nosave memory: [mem 0x68000000-0xffffffff]
Jul 11 21:37:24 hacking kernel: [mem 0x78800000-0xfe00ffff] available for PCI devices
Jul 11 21:37:24 hacking kernel: Booting paravirtualized kernel on bare hardware
Jul 11 21:37:24 hacking kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Jul 11 21:37:24 hacking kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1
Jul 11 21:37:24 hacking kernel: percpu: Embedded 62 pages/cpu s217088 r8192 d28672 u262144
Jul 11 21:37:24 hacking kernel: pcpu-alloc: s217088 r8192 d28672 u262144 alloc=1*2097152
Jul 11 21:37:24 hacking kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15
Jul 11 21:37:24 hacking kernel: Kernel command line: initrd=\intel-ucode.img initrd=\initramfs-linux.img root=UUID=2403f944-7fdf-4185-8119-4f6fd8f7f887 rw intel_idle.max_cstate=2
Jul 11 21:37:24 hacking kernel: printk: log buffer data + meta data: 131072 + 458752 = 589824 bytes
Jul 11 21:37:24 hacking kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear)
Jul 11 21:37:24 hacking kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear)
Jul 11 21:37:24 hacking kernel: software IO TLB: area num 16.
Jul 11 21:37:24 hacking kernel: Fallback order for Node 0: 0
Jul 11 21:37:24 hacking kernel: Built 1 zonelists, mobility grouping on. Total pages: 8256862
Jul 11 21:37:24 hacking kernel: Policy zone: Normal
Jul 11 21:37:24 hacking kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off
Jul 11 21:37:24 hacking kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1
Jul 11 21:37:24 hacking kernel: ftrace: allocating 55582 entries in 220 pages
Jul 11 21:37:24 hacking kernel: ftrace: allocated 220 pages with 5 groups
Jul 11 21:37:24 hacking kernel: Dynamic Preempt: full
Jul 11 21:37:24 hacking kernel: rcu: Preemptible hierarchical RCU implementation.
Jul 11 21:37:24 hacking kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=16.
Jul 11 21:37:24 hacking kernel: rcu: RCU priority boosting: priority 1 delay 500 ms.
Jul 11 21:37:24 hacking kernel: Trampoline variant of Tasks RCU enabled.
Jul 11 21:37:24 hacking kernel: Rude variant of Tasks RCU enabled.
Jul 11 21:37:24 hacking kernel: Tracing variant of Tasks RCU enabled.
Jul 11 21:37:24 hacking kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Jul 11 21:37:24 hacking kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16
Jul 11 21:37:24 hacking kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16.
Jul 11 21:37:24 hacking kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16.
Jul 11 21:37:24 hacking kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=16.
Jul 11 21:37:24 hacking kernel: NR_IRQS: 524544, nr_irqs: 2184, preallocated irqs: 16
Jul 11 21:37:24 hacking kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
Jul 11 21:37:24 hacking kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____)
Jul 11 21:37:24 hacking kernel: Console: colour dummy device 80x25
Jul 11 21:37:24 hacking kernel: printk: legacy console [tty0] enabled
Jul 11 21:37:24 hacking kernel: ACPI: Core revision 20240827
Jul 11 21:37:24 hacking kernel: hpet: HPET dysfunctional in PC10. Force disabled.
Jul 11 21:37:24 hacking kernel: APIC: Switch to symmetric I/O mode setup
Jul 11 21:37:24 hacking kernel: DMAR: Host address width 42
Jul 11 21:37:24 hacking kernel: DMAR: DRHD base: 0x000000fc800000 flags: 0x0
Jul 11 21:37:24 hacking kernel: DMAR: dmar0: reg_base_addr fc800000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0ef5e
Jul 11 21:37:24 hacking kernel: DMAR: DRHD base: 0x000000fc801000 flags: 0x1
Jul 11 21:37:24 hacking kernel: DMAR: dmar1: reg_base_addr fc801000 ver 7:0 cap c9de008cee690462 ecap 12ca9a00f0efde
Jul 11 21:37:24 hacking kernel: DMAR: SATC flags: 0x1
Jul 11 21:37:24 hacking kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfc801000 IOMMU 1
Jul 11 21:37:24 hacking kernel: DMAR-IR: HPET id 0 under DRHD base 0xfc801000
Jul 11 21:37:24 hacking kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping.
Jul 11 21:37:24 hacking kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode
Jul 11 21:37:24 hacking kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns
Jul 11 21:37:24 hacking kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7372.80 BogoMIPS (lpj=3686400)
Jul 11 21:37:24 hacking kernel: CPU0: Thermal monitoring enabled (TM1)
Jul 11 21:37:24 hacking kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated
Jul 11 21:37:24 hacking kernel: CET detected: Indirect Branch Tracking enabled
Jul 11 21:37:24 hacking kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0
Jul 11 21:37:24 hacking kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0
Jul 11 21:37:24 hacking kernel: process: using mwait in idle threads
Jul 11 21:37:24 hacking kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Jul 11 21:37:24 hacking kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS
Jul 11 21:37:24 hacking kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Jul 11 21:37:24 hacking kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
Jul 11 21:37:24 hacking kernel: x86/fpu: Supporting XSAVE feature 0x800: 'Control-flow User registers'
Jul 11 21:37:24 hacking kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
Jul 11 21:37:24 hacking kernel: x86/fpu: xstate_offset[9]: 832, xstate_sizes[9]: 8
Jul 11 21:37:24 hacking kernel: x86/fpu: xstate_offset[11]: 840, xstate_sizes[11]: 16
Jul 11 21:37:24 hacking kernel: x86/fpu: Enabled xstate features 0xa07, context size is 856 bytes, using 'compacted' format.
Jul 11 21:37:24 hacking kernel: Freeing SMP alternatives memory: 52K
Jul 11 21:37:24 hacking kernel: pid_max: default: 32768 minimum: 301
Jul 11 21:37:24 hacking kernel: LSM: initializing lsm=capability,landlock,lockdown,yama,bpf
Jul 11 21:37:24 hacking kernel: landlock: Up and running.
Jul 11 21:37:24 hacking kernel: Yama: becoming mindful.
Jul 11 21:37:24 hacking kernel: LSM support for eBPF active
Jul 11 21:37:24 hacking kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Jul 11 21:37:24 hacking kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Jul 11 21:37:24 hacking kernel: smpboot: CPU0: Intel(R) Core(TM) Ultra 7 255H (family: 0x6, model: 0xc5, stepping: 0x2)
Jul 11 21:37:24 hacking kernel: Performance Events: XSAVE Architectural LBR, PEBS fmt5+-baseline, AnyThread deprecated, ArrowLake-H Hybrid events, 32-deep LBR, full-width counters, Intel PMU driver.
Jul 11 21:37:24 hacking kernel: core: cpu_core PMU driver:
Jul 11 21:37:24 hacking kernel: ... version: 5
Jul 11 21:37:24 hacking kernel: ... bit width: 48
Jul 11 21:37:24 hacking kernel: ... generic registers: 10
Jul 11 21:37:24 hacking kernel: ... value mask: 0000ffffffffffff
Jul 11 21:37:24 hacking kernel: ... max period: 00007fffffffffff
Jul 11 21:37:24 hacking kernel: ... fixed-purpose events: 4
Jul 11 21:37:24 hacking kernel: ... event mask: 0001000f000003ff
Jul 11 21:37:24 hacking kernel: signal: max sigframe size: 3632
Jul 11 21:37:24 hacking kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1411
Jul 11 21:37:24 hacking kernel: rcu: Hierarchical SRCU implementation.
Jul 11 21:37:24 hacking kernel: rcu: Max phase no-delay instances is 400.
Jul 11 21:37:24 hacking kernel: Timer migration: 2 hierarchy levels; 8 children per group; 2 crossnode level
Jul 11 21:37:24 hacking kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter.
Jul 11 21:37:24 hacking kernel: smp: Bringing up secondary CPUs ...
Jul 11 21:37:24 hacking kernel: smpboot: x86: Booting SMP configuration:
Jul 11 21:37:24 hacking kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15
Jul 11 21:37:24 hacking kernel: core: cpu_atom PMU driver:
Jul 11 21:37:24 hacking kernel: ... version: 5
Jul 11 21:37:24 hacking kernel: ... bit width: 48
Jul 11 21:37:24 hacking kernel: ... generic registers: 8
Jul 11 21:37:24 hacking kernel: ... value mask: 0000ffffffffffff
Jul 11 21:37:24 hacking kernel: ... max period: 00007fffffffffff
Jul 11 21:37:24 hacking kernel: ... fixed-purpose events: 6
Jul 11 21:37:24 hacking kernel: ... event mask: 00000077000000ff
Jul 11 21:37:24 hacking kernel: core: cpu_lowpower PMU driver:
Jul 11 21:37:24 hacking kernel: ... version: 5
Jul 11 21:37:24 hacking kernel: ... bit width: 48
Jul 11 21:37:24 hacking kernel: ... generic registers: 8
Jul 11 21:37:24 hacking kernel: ... value mask: 0000ffffffffffff
Jul 11 21:37:24 hacking kernel: ... max period: 00007fffffffffff
Jul 11 21:37:24 hacking kernel: ... fixed-purpose events: 3
Jul 11 21:37:24 hacking kernel: ... event mask: 00000007000000ff
Jul 11 21:37:24 hacking kernel: smp: Brought up 1 node, 16 CPUs
Jul 11 21:37:24 hacking kernel: smpboot: Total of 16 processors activated (117964.80 BogoMIPS)
Jul 11 21:37:24 hacking kernel: Memory: 32269756K/33027448K available (19692K kernel code, 2940K rwdata, 16528K rodata, 4640K init, 5028K bss, 729700K reserved, 0K cma-reserved)
Jul 11 21:37:24 hacking kernel: devtmpfs: initialized
Jul 11 21:37:24 hacking kernel: x86/mm: Memory block size: 128MB
Jul 11 21:37:24 hacking kernel: ACPI: PM: Registering ACPI NVS region [mem 0x626bf000-0x67ebefff] (92274688 bytes)
Jul 11 21:37:24 hacking kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Jul 11 21:37:24 hacking kernel: posixtimers hash table entries: 8192 (order: 5, 131072 bytes, linear)
Jul 11 21:37:24 hacking kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear)
Jul 11 21:37:24 hacking kernel: pinctrl core: initialized pinctrl subsystem
Jul 11 21:37:24 hacking kernel: PM: RTC time: 04:37:21, date: 2025-07-12
Jul 11 21:37:24 hacking kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Jul 11 21:37:24 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations
Jul 11 21:37:24 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Jul 11 21:37:24 hacking kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Jul 11 21:37:24 hacking kernel: audit: initializing netlink subsys (disabled)
Jul 11 21:37:24 hacking kernel: audit: type=2000 audit(1752295041.014:1): state=initialized audit_enabled=0 res=1
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'fair_share'
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'bang_bang'
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'step_wise'
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'user_space'
Jul 11 21:37:24 hacking kernel: thermal_sys: Registered thermal governor 'power_allocator'
Jul 11 21:37:24 hacking kernel: cpuidle: using governor ladder
Jul 11 21:37:24 hacking kernel: cpuidle: using governor menu
Jul 11 21:37:24 hacking kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Jul 11 21:37:24 hacking kernel: PCI: ECAM [mem 0xc0000000-0xcfffffff] (base 0xc0000000) for domain 0000 [bus 00-ff]
Jul 11 21:37:24 hacking kernel: PCI: Using configuration type 1 for base access
Jul 11 21:37:24 hacking kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Jul 11 21:37:24 hacking kernel: HugeTLB: allocation took 0ms with hugepage_allocation_threads=4
Jul 11 21:37:24 hacking kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages
Jul 11 21:37:24 hacking kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page
Jul 11 21:37:24 hacking kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages
Jul 11 21:37:24 hacking kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page
Jul 11 21:37:24 hacking kernel: raid6: skipped pq benchmark and selected avx2x4
Jul 11 21:37:24 hacking kernel: raid6: using avx2x2 recovery algorithm
Jul 11 21:37:24 hacking kernel: ACPI: Added _OSI(Module Device)
Jul 11 21:37:24 hacking kernel: ACPI: Added _OSI(Processor Device)
Jul 11 21:37:24 hacking kernel: ACPI: Added _OSI(Processor Aggregator Device)
Jul 11 21:37:24 hacking kernel: ACPI: 21 ACPI AML tables successfully acquired and loaded
Jul 11 21:37:24 hacking kernel: ACPI: EC: EC started
Jul 11 21:37:24 hacking kernel: ACPI: EC: interrupt blocked
Jul 11 21:37:24 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 11 21:37:24 hacking kernel: ACPI: EC: Boot ECDT EC used to handle transactions
Jul 11 21:37:24 hacking kernel: ACPI: USB4 _OSC: OS supports USB3+ DisplayPort+ PCIe+ XDomain+
Jul 11 21:37:24 hacking kernel: ACPI: USB4 _OSC: OS controls USB3+ DisplayPort+ PCIe+ XDomain+
Jul 11 21:37:24 hacking kernel: ACPI: Interpreter enabled
Jul 11 21:37:24 hacking kernel: ACPI: PM: (supports S0 S4 S5)
Jul 11 21:37:24 hacking kernel: ACPI: Using IOAPIC for interrupt routing
Jul 11 21:37:24 hacking kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Jul 11 21:37:24 hacking kernel: PCI: Ignoring E820 reservations for host bridge windows
Jul 11 21:37:24 hacking kernel: ACPI: Enabled 9 GPEs in block 00 to 7F
Jul 11 21:37:24 hacking kernel: ACPI: Enabled 8 GPEs in block 80 to DF
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.BTRT: New power resource
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.XHCI.RHUB.HS10.DBTR: New power resource
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.RP08.PXSX.WRST: New power resource
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.TBT0: New power resource
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.TBT1: New power resource
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.D3C_: New power resource
Jul 11 21:37:24 hacking kernel: ACPI: \PIN_: New power resource
Jul 11 21:37:24 hacking kernel: ACPI: PCI Root Bridge [PC00] (domain 0000 [bus 00-fe])
Jul 11 21:37:24 hacking kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3]
Jul 11 21:37:24 hacking kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC]
Jul 11 21:37:24 hacking kernel: PCI host bridge to bus 0000:00
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xbfffffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [mem 0x4000000000-0x3ffbfffffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: root bus resource [bus 00-fe]
Jul 11 21:37:24 hacking kernel: pci 0000:00:00.0: [8086:7d06] type 00 class 0x060000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: [8086:7dd1] type 00 class 0x030000 PCIe Root Complex Integrated Endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: BAR 0 [mem 0x4818000000-0x4818ffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: BAR 2 [mem 0x4000000000-0x400fffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: DMAR: Skip IOMMU disabling for graphics
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: PME# supported from D0 D3hot
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x00ffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x00000000-0x06ffffff 64bit pref]: contains BAR 0 for 7 VFs
Jul 11 21:37:24 hacking kernel: pci 0000:00:04.0: [8086:7d03] type 00 class 0x118000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:04.0: BAR 0 [mem 0x4819280000-0x481929ffff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: [8086:7ecb] type 01 class 0x060400 PCIe Root Port
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01]
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PME# supported from D0 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PTM enabled (root), 4ns granularity
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: [8086:7ec4] type 01 class 0x060400 PCIe Root Port
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b]
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PME# supported from D0 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PTM enabled (root), 4ns granularity
Jul 11 21:37:24 hacking kernel: pci 0000:00:08.0: [8086:774c] type 00 class 0x088000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:08.0: BAR 0 [mem 0x48192bf000-0x48192bffff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: [8086:7d0d] type 00 class 0x118000 PCIe Root Complex Integrated Endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: BAR 0 [mem 0x4819240000-0x481927ffff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: enabling Extended Tags
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: [8086:7d1d] type 00 class 0x120000 PCIe Root Complex Integrated Endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: BAR 0 [mem 0x4810000000-0x4817ffffff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: BAR 4 [mem 0x48192be000-0x48192befff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: [8086:7ec0] type 00 class 0x0c0330 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: BAR 0 [mem 0x48192a0000-0x48192affff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: PME# supported from D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: [8086:7ec2] type 00 class 0x0c0340 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: BAR 0 [mem 0x4819200000-0x481923ffff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: BAR 2 [mem 0x48192bd000-0x48192bdfff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: supports D1 D2
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: PME# supported from D0 D1 D2 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: [8086:777d] type 00 class 0x0c0330 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: BAR 0 [mem 0x86320000-0x8632ffff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: [8086:777f] type 00 class 0x050000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: BAR 0 [mem 0x48192b4000-0x48192b7fff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: BAR 2 [mem 0x48192bc000-0x48192bcfff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: [8086:7778] type 00 class 0x0c8000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x00000000-0x00000fff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: [8086:7779] type 00 class 0x0c8000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x00000000-0x00000fff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: [8086:7770] type 00 class 0x078000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: BAR 0 [mem 0x48192b9000-0x48192b9fff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: PME# supported from D3hot
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: [8086:773d] type 01 class 0x060400 PCIe Root Port
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PTM enabled (root), 4ns granularity
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: [8086:773f] type 01 class 0x060400 PCIe Root Port
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PTM enabled (root), 4ns granularity
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.0: [8086:7702] type 00 class 0x060100 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: [8086:7728] type 00 class 0x040380 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: BAR 0 [mem 0x48192b0000-0x48192b3fff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: BAR 4 [mem 0x4819000000-0x48191fffff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: [8086:7722] type 00 class 0x0c0500 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: BAR 0 [mem 0x48192b8000-0x48192b80ff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: BAR 4 [io 0xefa0-0xefbf]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: [8086:7723] type 00 class 0x0c8000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: [8086:550a] type 00 class 0x020000 conventional PCI endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: BAR 0 [mem 0x86300000-0x8631ffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: PME# supported from D0 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:01:00.0: [144d:a80d] type 00 class 0x010802 PCIe Endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:01:00.0: BAR 0 [mem 0x86200000-0x86203fff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Upstream Port
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 00]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x0000-0x0fff]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: enabling Extended Tags
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: supports D1 D2
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PTM enabled, 4ns granularity
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 00]
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge window [io 0x0000-0x0fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: enabling Extended Tags
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: supports D1 D2
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 00]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x0000-0x0fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: enabling Extended Tags
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: supports D1 D2
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 00]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x0000-0x0fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: enabling Extended Tags
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: supports D1 D2
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 00]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x0000-0x0fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: enabling Extended Tags
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: supports D1 D2
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: [8086:0b26] type 01 class 0x060400 PCIe Switch Downstream Port
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 00]
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge window [io 0x0000-0x0fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge window [mem 0x00000000-0x000fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: enabling Extended Tags
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: supports D1 D2
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PME# supported from D0 D1 D2 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b]
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: bridge configuration invalid ([bus 00-00]), reconfiguring
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04-2b]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:04: busn_res: [bus 04-2b] end is updated to 04
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-2b]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-2b] end is updated to 11
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-2b]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-2b] end is updated to 1e
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2b]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2b] end is updated to 2a
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] end is updated to 2b
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] end is updated to 2b
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: [1217:8621] type 00 class 0x080501 PCIe Endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: BAR 0 [mem 0x86101000-0x86101fff]
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: BAR 1 [mem 0x86100000-0x861007ff]
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: PME# supported from D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c]
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: [8086:272b] type 00 class 0x028000 PCIe Endpoint
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: BAR 0 [mem 0x86000000-0x86003fff 64bit]
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: PME# supported from D0 D3hot D3cold
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d]
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PEPD: Duplicate LPS0 _DSM functions (mask: 0x1)
Jul 11 21:37:24 hacking kernel: Low-power S0 idle used by default for system suspend
Jul 11 21:37:24 hacking kernel: ACPI: EC: interrupt unblocked
Jul 11 21:37:24 hacking kernel: ACPI: EC: event unblocked
Jul 11 21:37:24 hacking kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 11 21:37:24 hacking kernel: ACPI: EC: GPE=0x6e
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: Boot ECDT EC initialization complete
Jul 11 21:37:24 hacking kernel: ACPI: \_SB_.PC00.LPCB.EC__: EC: Used to handle transactions and events
Jul 11 21:37:24 hacking kernel: iommu: Default domain type: Translated
Jul 11 21:37:24 hacking kernel: iommu: DMA domain TLB invalidation policy: lazy mode
Jul 11 21:37:24 hacking kernel: SCSI subsystem initialized
Jul 11 21:37:24 hacking kernel: libata version 3.00 loaded.
Jul 11 21:37:24 hacking kernel: ACPI: bus type USB registered
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver usbfs
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver hub
Jul 11 21:37:24 hacking kernel: usbcore: registered new device driver usb
Jul 11 21:37:24 hacking kernel: EDAC MC: Ver: 3.0.0
Jul 11 21:37:24 hacking kernel: efivars: Registered efivars operations
Jul 11 21:37:24 hacking kernel: NetLabel: Initializing
Jul 11 21:37:24 hacking kernel: NetLabel: domain hash size = 128
Jul 11 21:37:24 hacking kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
Jul 11 21:37:24 hacking kernel: NetLabel: unlabeled traffic allowed by default
Jul 11 21:37:24 hacking kernel: mctp: management component transport protocol core
Jul 11 21:37:24 hacking kernel: NET: Registered PF_MCTP protocol family
Jul 11 21:37:24 hacking kernel: PCI: Using ACPI for IRQ routing
Jul 11 21:37:24 hacking kernel: PCI: pci_cache_line_size set to 64 bytes
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0xfe010000-0xfe010fff]: can't claim; no compatible bridge window
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x0009f000-0x0009ffff]
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x5848d000-0x5bffffff]
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x5a526000-0x5bffffff]
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x5df8b000-0x5fffffff]
Jul 11 21:37:24 hacking kernel: e820: reserve RAM buffer [mem 0x606bf000-0x63ffffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: vgaarb: bridge control possible
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Jul 11 21:37:24 hacking kernel: vgaarb: loaded
Jul 11 21:37:24 hacking kernel: clocksource: Switched to clocksource tsc-early
Jul 11 21:37:24 hacking kernel: VFS: Disk quotas dquot_6.6.0
Jul 11 21:37:24 hacking kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jul 11 21:37:24 hacking kernel: pnp: PnP ACPI init
Jul 11 21:37:24 hacking kernel: system 00:00: [io 0x3322-0x3323] has been reserved
Jul 11 21:37:24 hacking kernel: system 00:01: [io 0x1854-0x1857] has been reserved
Jul 11 21:37:24 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pnp 00:03: disabling [mem 0x00000000-0x00000fff] because it overlaps 0000:00:02.0 BAR 7 [mem 0x00000000-0x06ffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfedc0000-0xfedc7fff] has been reserved
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xc0000000-0xcfffffff] has been reserved
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfed20000-0xfed7ffff] could not be reserved
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfc800000-0xfc81ffff] could not be reserved
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfed45000-0xfed8ffff] could not be reserved
Jul 11 21:37:24 hacking kernel: system 00:03: [mem 0xfee00000-0xfeefffff] has been reserved
Jul 11 21:37:24 hacking kernel: system 00:04: [io 0x2000-0x20fe] has been reserved
Jul 11 21:37:24 hacking kernel: pnp: PnP ACPI: found 6 devices
Jul 11 21:37:24 hacking kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Jul 11 21:37:24 hacking kernel: NET: Registered PF_INET protocol family
Jul 11 21:37:24 hacking kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jul 11 21:37:24 hacking kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear)
Jul 11 21:37:24 hacking kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Jul 11 21:37:24 hacking kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jul 11 21:37:24 hacking kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear)
Jul 11 21:37:24 hacking kernel: TCP: Hash tables configured (established 262144 bind 65536)
Jul 11 21:37:24 hacking kernel: MPTCP token hash table entries: 32768 (order: 7, 786432 bytes, linear)
Jul 11 21:37:24 hacking kernel: UDP hash table entries: 16384 (order: 8, 1048576 bytes, linear)
Jul 11 21:37:24 hacking kernel: UDP-Lite hash table entries: 16384 (order: 8, 1048576 bytes, linear)
Jul 11 21:37:24 hacking kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Jul 11 21:37:24 hacking kernel: NET: Registered PF_XDP protocol family
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x1000-0x0fff] to [bus 05-11] add_size 1000
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 05-11] add_size 200000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 05-11] add_size 200000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x1000-0x0fff] to [bus 12-1e] add_size 1000
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 12-1e] add_size 200000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 12-1e] add_size 200000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x1000-0x0fff] to [bus 1f-2a] add_size 1000
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 1f-2a] add_size 200000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 1f-2a] add_size 200000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x1000-0x0fff] to [bus 03-2b] add_size 3000
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff 64bit pref] to [bus 03-2b] add_size 600000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x00100000-0x003fffff] to [bus 03-2b] add_size 600000 add_align 100000
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 02-2b] add_size 4000
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: VF BAR 0 [mem 0x481a000000-0x4820ffffff 64bit pref]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: BAR 0 [mem 0x48192ba000-0x48192bafff 64bit]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: BAR 0 [mem 0x48192bb000-0x48192bbfff 64bit]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: BAR 0 [mem 0x86330000-0x86330fff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: PCI bridge to [bus 01]
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: bridge window [mem 0x86200000-0x862fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff]: assigned
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: PCI bridge to [bus 04]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: PCI bridge to [bus 05-11]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [io 0x4000-0x4fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x80000000-0x801fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: bridge window [mem 0x4010000000-0x40101fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: PCI bridge to [bus 12-1e]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [io 0x5000-0x5fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x80200000-0x803fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: bridge window [mem 0x4010200000-0x40103fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: PCI bridge to [bus 1f-2a]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [io 0x6000-0x6fff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x80400000-0x805fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: bridge window [mem 0x4010400000-0x40105fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: PCI bridge to [bus 2b]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: PCI bridge to [bus 03-2b]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [io 0x4000-0x6fff]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x80000000-0x808fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: bridge window [mem 0x4010000000-0x40108fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: PCI bridge to [bus 02-2b]
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [io 0x4000-0x7fff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x80000000-0x85ffffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: bridge window [mem 0x4010000000-0x480fffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: PCI bridge to [bus 2c]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: bridge window [mem 0x86100000-0x861fffff]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: PCI bridge to [bus 2d]
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: bridge window [mem 0x86000000-0x860fffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xbfffffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:00: resource 8 [mem 0x4000000000-0x3ffbfffffff window]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:01: resource 1 [mem 0x86200000-0x862fffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:02: resource 0 [io 0x4000-0x7fff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:02: resource 1 [mem 0x80000000-0x85ffffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:02: resource 2 [mem 0x4010000000-0x480fffffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x6fff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: resource 1 [mem 0x80000000-0x808fffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:03: resource 2 [mem 0x4010000000-0x40108fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: resource 1 [mem 0x80000000-0x801fffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:05: resource 2 [mem 0x4010000000-0x40101fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: resource 0 [io 0x5000-0x5fff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: resource 1 [mem 0x80200000-0x803fffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:12: resource 2 [mem 0x4010200000-0x40103fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: resource 0 [io 0x6000-0x6fff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: resource 1 [mem 0x80400000-0x805fffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:1f: resource 2 [mem 0x4010400000-0x40105fffff 64bit pref]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:2c: resource 1 [mem 0x86100000-0x861fffff]
Jul 11 21:37:24 hacking kernel: pci_bus 0000:2d: resource 1 [mem 0x86000000-0x860fffff]
Jul 11 21:37:24 hacking kernel: PCI: CLS 64 bytes, default 64
Jul 11 21:37:24 hacking kernel: DMAR: Intel-IOMMU force enabled due to platform opt in
Jul 11 21:37:24 hacking kernel: DMAR: No RMRR found
Jul 11 21:37:24 hacking kernel: DMAR: No ATSR found
Jul 11 21:37:24 hacking kernel: DMAR: dmar0: Using Queued invalidation
Jul 11 21:37:24 hacking kernel: DMAR: dmar1: Using Queued invalidation
Jul 11 21:37:24 hacking kernel: Trying to unpack rootfs image as initramfs...
Jul 11 21:37:24 hacking kernel: pci 0000:00:02.0: Adding to iommu group 0
Jul 11 21:37:24 hacking kernel: pci 0000:00:00.0: Adding to iommu group 1
Jul 11 21:37:24 hacking kernel: pci 0000:00:04.0: Adding to iommu group 2
Jul 11 21:37:24 hacking kernel: pci 0000:00:06.0: Adding to iommu group 3
Jul 11 21:37:24 hacking kernel: pci 0000:00:07.0: Adding to iommu group 4
Jul 11 21:37:24 hacking kernel: pci 0000:00:08.0: Adding to iommu group 5
Jul 11 21:37:24 hacking kernel: pci 0000:00:0a.0: Adding to iommu group 6
Jul 11 21:37:24 hacking kernel: pci 0000:00:0b.0: Adding to iommu group 7
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.0: Adding to iommu group 8
Jul 11 21:37:24 hacking kernel: pci 0000:00:0d.2: Adding to iommu group 8
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.0: Adding to iommu group 9
Jul 11 21:37:24 hacking kernel: pci 0000:00:14.2: Adding to iommu group 9
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.0: Adding to iommu group 10
Jul 11 21:37:24 hacking kernel: pci 0000:00:15.1: Adding to iommu group 10
Jul 11 21:37:24 hacking kernel: pci 0000:00:16.0: Adding to iommu group 11
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.0: Adding to iommu group 12
Jul 11 21:37:24 hacking kernel: pci 0000:00:1c.7: Adding to iommu group 13
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.0: Adding to iommu group 14
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.3: Adding to iommu group 14
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.4: Adding to iommu group 14
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.5: Adding to iommu group 14
Jul 11 21:37:24 hacking kernel: pci 0000:00:1f.6: Adding to iommu group 14
Jul 11 21:37:24 hacking kernel: pci 0000:01:00.0: Adding to iommu group 15
Jul 11 21:37:24 hacking kernel: pci 0000:02:00.0: Adding to iommu group 16
Jul 11 21:37:24 hacking kernel: pci 0000:03:00.0: Adding to iommu group 17
Jul 11 21:37:24 hacking kernel: pci 0000:03:01.0: Adding to iommu group 18
Jul 11 21:37:24 hacking kernel: pci 0000:03:02.0: Adding to iommu group 19
Jul 11 21:37:24 hacking kernel: pci 0000:03:03.0: Adding to iommu group 20
Jul 11 21:37:24 hacking kernel: pci 0000:03:04.0: Adding to iommu group 21
Jul 11 21:37:24 hacking kernel: pci 0000:2c:00.0: Adding to iommu group 22
Jul 11 21:37:24 hacking kernel: pci 0000:2d:00.0: Adding to iommu group 23
Jul 11 21:37:24 hacking kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O
Jul 11 21:37:24 hacking kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Jul 11 21:37:24 hacking kernel: software IO TLB: mapped [mem 0x000000004e9c1000-0x00000000529c1000] (64MB)
Jul 11 21:37:24 hacking kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6a464ae9873, max_idle_ns: 881590529744 ns
Jul 11 21:37:24 hacking kernel: clocksource: Switched to clocksource tsc
Jul 11 21:37:24 hacking kernel: platform rtc_cmos: registered platform RTC device (no PNP device found)
Jul 11 21:37:24 hacking kernel: Initialise system trusted keyrings
Jul 11 21:37:24 hacking kernel: Key type blacklist registered
Jul 11 21:37:24 hacking kernel: workingset: timestamp_bits=36 max_order=23 bucket_order=0
Jul 11 21:37:24 hacking kernel: fuse: init (API version 7.43)
Jul 11 21:37:24 hacking kernel: integrity: Platform Keyring initialized
Jul 11 21:37:24 hacking kernel: integrity: Machine keyring initialized
Jul 11 21:37:24 hacking kernel: xor: automatically using best checksumming function avx
Jul 11 21:37:24 hacking kernel: Key type asymmetric registered
Jul 11 21:37:24 hacking kernel: Asymmetric key parser 'x509' registered
Jul 11 21:37:24 hacking kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246)
Jul 11 21:37:24 hacking kernel: io scheduler mq-deadline registered
Jul 11 21:37:24 hacking kernel: io scheduler kyber registered
Jul 11 21:37:24 hacking kernel: io scheduler bfq registered
Jul 11 21:37:24 hacking kernel: ledtrig-cpu: registered to indicate activity on CPUs
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:06.0: PME: Signaling with IRQ 122
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:06.0: AER: enabled with IRQ 122
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:07.0: PME: Signaling with IRQ 123
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:07.0: AER: enabled with IRQ 123
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 124
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 124
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.7: PME: Signaling with IRQ 125
Jul 11 21:37:24 hacking kernel: pcieport 0000:00:1c.7: AER: enabled with IRQ 125
Jul 11 21:37:24 hacking kernel: pcieport 0000:02:00.0: enabling device (0000 -> 0003)
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:01.0: enabling device (0000 -> 0003)
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:01.0: pciehp: Slot #1 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:02.0: enabling device (0000 -> 0003)
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:02.0: pciehp: Slot #2 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:03.0: enabling device (0000 -> 0003)
Jul 11 21:37:24 hacking kernel: pcieport 0000:03:03.0: pciehp: Slot #3 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
Jul 11 21:37:24 hacking kernel: Monitor-Mwait will be used to enter C-1 state
Jul 11 21:37:24 hacking kernel: Monitor-Mwait will be used to enter C-2 state
Jul 11 21:37:24 hacking kernel: Monitor-Mwait will be used to enter C-3 state
Jul 11 21:37:24 hacking kernel: intel_idle: max_cstate 2 reached
Jul 11 21:37:24 hacking kernel: ACPI: AC: AC Adapter [AC] (on-line)
Jul 11 21:37:24 hacking kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0
Jul 11 21:37:24 hacking kernel: ACPI: button: Power Button [PWRB]
Jul 11 21:37:24 hacking kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1
Jul 11 21:37:24 hacking kernel: ACPI: button: Sleep Button [SLPB]
Jul 11 21:37:24 hacking kernel: input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0D:00/input/input2
Jul 11 21:37:24 hacking kernel: ACPI: button: Lid Switch [LID0]
Jul 11 21:37:24 hacking kernel: Freeing initrd memory: 30836K
Jul 11 21:37:24 hacking kernel: thermal LNXTHERM:00: registered as thermal_zone0
Jul 11 21:37:24 hacking kernel: ACPI: thermal: Thermal Zone [TZ0] (56 C)
Jul 11 21:37:24 hacking kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled
Jul 11 21:37:24 hacking kernel: ACPI: battery: Slot [BAT0] (battery present)
Jul 11 21:37:24 hacking kernel: hpet_acpi_add: no address or irqs in _CRS
Jul 11 21:37:24 hacking kernel: Non-volatile memory driver v1.3
Jul 11 21:37:24 hacking kernel: Linux agpgart interface v0.103
Jul 11 21:37:24 hacking kernel: tpm_tis IFX1523:00: 2.0 TPM (device-id 0x1D, rev-id 54)
Jul 11 21:37:24 hacking kernel: ACPI: bus type drm_connector registered
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 1
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: new USB bus registered, assigned bus number 2
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:0d.0: Host supports USB 3.2 Enhanced SuperSpeed
Jul 11 21:37:24 hacking kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15
Jul 11 21:37:24 hacking kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 11 21:37:24 hacking kernel: usb usb1: Product: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: usb usb1: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 11 21:37:24 hacking kernel: usb usb1: SerialNumber: 0000:00:0d.0
Jul 11 21:37:24 hacking kernel: hub 1-0:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 1-0:1.0: 1 port detected
Jul 11 21:37:24 hacking kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15
Jul 11 21:37:24 hacking kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 11 21:37:24 hacking kernel: usb usb2: Product: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: usb usb2: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 11 21:37:24 hacking kernel: usb usb2: SerialNumber: 0000:00:0d.0
Jul 11 21:37:24 hacking kernel: hub 2-0:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 2-0:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 3
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4
Jul 11 21:37:24 hacking kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.2 Enhanced SuperSpeed
Jul 11 21:37:24 hacking kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15
Jul 11 21:37:24 hacking kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 11 21:37:24 hacking kernel: usb usb3: Product: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: usb usb3: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 11 21:37:24 hacking kernel: usb usb3: SerialNumber: 0000:00:14.0
Jul 11 21:37:24 hacking kernel: hub 3-0:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 3-0:1.0: 12 ports detected
Jul 11 21:37:24 hacking kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15
Jul 11 21:37:24 hacking kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 11 21:37:24 hacking kernel: usb usb4: Product: xHCI Host Controller
Jul 11 21:37:24 hacking kernel: usb usb4: Manufacturer: Linux 6.15.6-arch1-1 xhci-hcd
Jul 11 21:37:24 hacking kernel: usb usb4: SerialNumber: 0000:00:14.0
Jul 11 21:37:24 hacking kernel: hub 4-0:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 4-0:1.0: 2 ports detected
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver usbserial_generic
Jul 11 21:37:24 hacking kernel: usbserial: USB Serial support registered for generic
Jul 11 21:37:24 hacking kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K] at 0x60,0x64 irq 1
Jul 11 21:37:24 hacking kernel: i8042: PNP: PS/2 appears to have AUX port disabled, if this is incorrect please boot with i8042.nopnp
Jul 11 21:37:24 hacking kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: RTC can wake from S4
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: registered as rtc0
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: setting system clock to 2025-07-12T04:37:21 UTC (1752295041)
Jul 11 21:37:24 hacking kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram
Jul 11 21:37:24 hacking kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input3
Jul 11 21:37:24 hacking kernel: intel_pstate: Intel P-state driver initializing
Jul 11 21:37:24 hacking kernel: Hybrid CPU capacity scaling enabled
Jul 11 21:37:24 hacking kernel: intel_pstate: HWP enabled
Jul 11 21:37:24 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] Registered 1 planes with drm panic
Jul 11 21:37:24 hacking kernel: [drm] Initialized simpledrm 1.0.0 for simple-framebuffer.0 on minor 0
Jul 11 21:37:24 hacking kernel: fbcon: Deferring console take-over
Jul 11 21:37:24 hacking kernel: simple-framebuffer simple-framebuffer.0: [drm] fb0: simpledrmdrmfb frame buffer device
Jul 11 21:37:24 hacking kernel: hid: raw HID events driver (C) Jiri Kosina
Jul 11 21:37:24 hacking kernel: usbcore: registered new interface driver usbhid
Jul 11 21:37:24 hacking kernel: usbhid: USB HID core driver
Jul 11 21:37:24 hacking kernel: drop_monitor: Initializing network drop monitor service
Jul 11 21:37:24 hacking kernel: NET: Registered PF_INET6 protocol family
Jul 11 21:37:24 hacking kernel: Segment Routing with IPv6
Jul 11 21:37:24 hacking kernel: RPL Segment Routing with IPv6
Jul 11 21:37:24 hacking kernel: In-situ OAM (IOAM) with IPv6
Jul 11 21:37:24 hacking kernel: NET: Registered PF_PACKET protocol family
Jul 11 21:37:24 hacking kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance'
Jul 11 21:37:24 hacking kernel: microcode: Current revision: 0x00000118
Jul 11 21:37:24 hacking kernel: microcode: Updated early from: 0x00000115
Jul 11 21:37:24 hacking kernel: IPI shorthand broadcast: enabled
Jul 11 21:37:24 hacking kernel: sched_clock: Marking stable (660001705, 6079433)->(703124205, -37043067)
Jul 11 21:37:24 hacking kernel: registered taskstats version 1
Jul 11 21:37:24 hacking kernel: Loading compiled-in X.509 certificates
Jul 11 21:37:24 hacking kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c92675c24f6b4bd17516ae0e98b61f2812601d04'
Jul 11 21:37:24 hacking kernel: zswap: loaded using pool zstd/zsmalloc
Jul 11 21:37:24 hacking kernel: Demotion targets for Node 0: null
Jul 11 21:37:24 hacking kernel: Key type .fscrypt registered
Jul 11 21:37:24 hacking kernel: Key type fscrypt-provisioning registered
Jul 11 21:37:24 hacking kernel: Btrfs loaded, zoned=yes, fsverity=yes
Jul 11 21:37:24 hacking kernel: Key type big_key registered
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53'
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation: Windows UEFI CA 2023: aefc5fbbbe055d8f8daa585473499417ab5a5272'
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4'
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Microsoft UEFI CA 2023: 81aa6b3244c935bce0d6628af39827421e32497d'
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Secure Certificate: 01dcc89619884ca147983429f8a4a1a0'
Jul 11 21:37:24 hacking kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 11 21:37:24 hacking kernel: integrity: Loaded X.509 cert 'Cus CA: d6136d376b87ef934511c12ce2c3880c'
Jul 11 21:37:24 hacking kernel: PM: Magic number: 1:909:615
Jul 11 21:37:24 hacking kernel: platform INTC1062:01: hash matches
Jul 11 21:37:24 hacking kernel: acpi INTC1062:01: hash matches
Jul 11 21:37:24 hacking kernel: RAS: Correctable Errors collector initialized.
Jul 11 21:37:24 hacking kernel: clk: Disabling unused clocks
Jul 11 21:37:24 hacking kernel: PM: genpd: Disabling unused power domains
Jul 11 21:37:24 hacking kernel: Freeing unused decrypted memory: 2028K
Jul 11 21:37:24 hacking kernel: Freeing unused kernel image (initmem) memory: 4640K
Jul 11 21:37:24 hacking kernel: Write protecting the kernel read-only data: 38912k
Jul 11 21:37:24 hacking kernel: Freeing unused kernel image (text/rodata gap) memory: 784K
Jul 11 21:37:24 hacking kernel: Freeing unused kernel image (rodata/data gap) memory: 1904K
Jul 11 21:37:24 hacking kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found.
Jul 11 21:37:24 hacking kernel: rodata_test: all tests were successful
Jul 11 21:37:24 hacking kernel: Run /init as init process
Jul 11 21:37:24 hacking kernel: with arguments:
Jul 11 21:37:24 hacking kernel: /init
Jul 11 21:37:24 hacking kernel: with environment:
Jul 11 21:37:24 hacking kernel: HOME=/
Jul 11 21:37:24 hacking kernel: TERM=linux
Jul 11 21:37:24 hacking kernel: fbcon: Taking over console
Jul 11 21:37:24 hacking kernel: Console: switching to colour frame buffer device 240x67
Jul 11 21:37:24 hacking kernel: usb 3-6: new high-speed USB device number 2 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 2 using xhci_hcd
Jul 11 21:37:24 hacking kernel: Key type psk registered
Jul 11 21:37:24 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34
Jul 11 21:37:24 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 2-1: Product: USB3.0 Hub
Jul 11 21:37:24 hacking kernel: usb 2-1: Manufacturer: Intel Corporation.
Jul 11 21:37:24 hacking kernel: hub 2-1:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 2-1:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: sdhci: Secure Digital Host Controller Interface driver
Jul 11 21:37:24 hacking kernel: sdhci: Copyright(c) Pierre Ossman
Jul 11 21:37:24 hacking kernel: nvme 0000:01:00.0: platform quirk: setting simple suspend
Jul 11 21:37:24 hacking kernel: nvme nvme0: pci function 0000:01:00.0
Jul 11 21:37:24 hacking kernel: nvme nvme0: D3 entry latency set to 10 seconds
Jul 11 21:37:24 hacking kernel: nvme nvme0: allocated 64 MiB host memory buffer (16 segments).
Jul 11 21:37:24 hacking kernel: nvme nvme0: 16/0/0 default/read/poll queues
Jul 11 21:37:24 hacking kernel: nvme0n1: p1 p2 p3
Jul 11 21:37:24 hacking kernel: sdhci-pci 0000:2c:00.0: SDHCI controller found [1217:8621] (rev 1)
Jul 11 21:37:24 hacking kernel: sdhci-pci 0000:2c:00.0: enabling device (0000 -> 0002)
Jul 11 21:37:24 hacking kernel: mmc0: SDHCI controller on PCI [0000:2c:00.0] using ADMA
Jul 11 21:37:24 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01
Jul 11 21:37:24 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 3-6: Product: USB2.0 Hub
Jul 11 21:37:24 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc.
Jul 11 21:37:24 hacking kernel: hub 3-6:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 3-6:1.0: 6 ports detected
Jul 11 21:37:24 hacking kernel: usb 3-7: new high-speed USB device number 3 using xhci_hcd
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Found meteorlake (device ID 7dd1) integrated display version 14.00 stepping D0
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access
Jul 11 21:37:24 hacking kernel: Console: switching to colour dummy device 80x25
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: vgaarb: deactivate vga console
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Using Transparent Hugepages
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/mtl_dmc.bin (v2.23)
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GuC firmware i915/mtl_guc_70.bin version 70.44.1
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: submission enabled
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT0: GUC: RC enabled
Jul 11 21:37:24 hacking kernel: usb 3-7: New USB device found, idVendor=04f2, idProduct=b729, bcdDevice=27.39
Jul 11 21:37:24 hacking kernel: usb 3-7: New USB device strings: Mfr=3, Product=1, SerialNumber=2
Jul 11 21:37:24 hacking kernel: usb 3-7: Product: Chicony USB2.0 Camera
Jul 11 21:37:24 hacking kernel: usb 3-7: Manufacturer: CHICONY
Jul 11 21:37:24 hacking kernel: usb 3-7: SerialNumber: 200901010001
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GuC firmware i915/mtl_guc_70.bin version 70.44.1
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC firmware i915/mtl_huc_gsc.bin version 8.5.4
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for clear media
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: submission enabled
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: SLPC enabled
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: GUC: RC enabled
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] Protected Xe Path (PXP) protected content support initialized
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] *ERROR* [CRTC:82:pipe A] DSB 0 poll error
Jul 11 21:37:24 hacking kernel: [drm] Initialized i915 1.6.0 for 0000:00:02.0 on minor 1
Jul 11 21:37:24 hacking kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no)
Jul 11 21:37:24 hacking kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input4
Jul 11 21:37:24 hacking kernel: usb 3-10: new full-speed USB device number 4 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 3 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91
Jul 11 21:37:24 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 2-1.4: Product: USB3.2 Hub
Jul 11 21:37:24 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic
Jul 11 21:37:24 hacking kernel: hub 2-1.4:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 2-1.4:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: Loaded GSC firmware i915/mtl_gsc_1.bin (cv1.0, r102.1.15.1926, svn 1)
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] GT1: HuC: authenticated for all workloads
Jul 11 21:37:24 hacking kernel: usb 3-10: New USB device found, idVendor=8087, idProduct=0036, bcdDevice= 0.00
Jul 11 21:37:24 hacking kernel: usb 3-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 3-6.2: new full-speed USB device number 5 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46
Jul 11 21:37:24 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 11 21:37:24 hacking kernel: usb 3-6.2: Product: S34C65T
Jul 11 21:37:24 hacking kernel: usb 3-6.2: Manufacturer: Samsung
Jul 11 21:37:24 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 4 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Manufacturer: Generic
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: usb 3-6.4: new high-speed USB device number 6 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 5 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Product: USB2.1 Hub
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: new high-speed USB device number 7 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Manufacturer: Generic
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: fbcon: i915drmfb (fb0) is primary device
Jul 11 21:37:24 hacking kernel: Console: switching to colour frame buffer device 240x75
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 8 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: Device not responding to setup address.
Jul 11 21:37:24 hacking kernel: usb 3-6.4: USB disconnect, device number 6
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: USB disconnect, device number 7
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: USB disconnect, device number 4
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: USB disconnect, device number 5
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: Device not responding to setup address.
Jul 11 21:37:24 hacking kernel: usb 2-1.4: reset SuperSpeed USB device number 3 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: device not accepting address 8, error -71
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1.3: WARN: invalid context state for evaluate context command.
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1-port3: attempt power cycle
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 6 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub
Jul 11 21:37:24 hacking kernel: usb 2-1.4.1: Manufacturer: Generic
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 7 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek
Jul 11 21:37:24 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001
Jul 11 21:37:24 hacking kernel: i915 0000:00:02.0: [drm] fb0: i915drmfb frame buffer device
Jul 11 21:37:24 hacking kernel: usb 3-6.4: new high-speed USB device number 12 using xhci_hcd
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91
Jul 11 21:37:24 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Product: USB2.1 Hub
Jul 11 21:37:24 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 3-6.4:1.0: 4 ports detected
Jul 11 21:37:24 hacking kernel: EXT4-fs (nvme0n1p3): mounted filesystem 2403f944-7fdf-4185-8119-4f6fd8f7f887 r/w with ordered data mode. Quota mode: none.
Jul 11 21:37:24 hacking systemd[1]: systemd 257.7-1-arch running in system mode (+PAM +AUDIT -SELINUX -APPARMOR -IMA +IPE +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +BTF +XKBCOMMON +UTMP -SYSVINIT +LIBARCHIVE)
Jul 11 21:37:24 hacking systemd[1]: Detected architecture x86-64.
Jul 11 21:37:24 hacking systemd[1]: Hostname set to <hacking>.
Jul 11 21:37:24 hacking systemd[1]: bpf-restrict-fs: LSM BPF program attached
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: new high-speed USB device number 13 using xhci_hcd
Jul 11 21:37:24 hacking systemd[1]: Queued start job for default target Graphical Interface.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/dirmngr.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/getty.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent-browser.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent-extra.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/gpg-agent-ssh.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/keyboxd.
Jul 11 21:37:24 hacking systemd[1]: Created slice Slice /system/modprobe.
Jul 11 21:37:24 hacking systemd[1]: Created slice User and Session Slice.
Jul 11 21:37:24 hacking systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
Jul 11 21:37:24 hacking systemd[1]: Started Forward Password Requests to Wall Directory Watch.
Jul 11 21:37:24 hacking systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point.
Jul 11 21:37:24 hacking systemd[1]: Expecting device /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7...
Jul 11 21:37:24 hacking systemd[1]: Expecting device /dev/disk/by-uuid/860B-DC20...
Jul 11 21:37:24 hacking systemd[1]: Reached target Local Encrypted Volumes.
Jul 11 21:37:24 hacking systemd[1]: Reached target Local Integrity Protected Volumes.
Jul 11 21:37:24 hacking systemd[1]: Reached target Path Units.
Jul 11 21:37:24 hacking systemd[1]: Reached target Remote File Systems.
Jul 11 21:37:24 hacking systemd[1]: Reached target Slice Units.
Jul 11 21:37:24 hacking systemd[1]: Reached target Local Verity Protected Volumes.
Jul 11 21:37:24 hacking systemd[1]: Listening on Device-mapper event daemon FIFOs.
Jul 11 21:37:24 hacking systemd[1]: Listening on Process Core Dump Socket.
Jul 11 21:37:24 hacking systemd[1]: Listening on Credential Encryption/Decryption.
Jul 11 21:37:24 hacking systemd[1]: Listening on Journal Socket (/dev/log).
Jul 11 21:37:24 hacking systemd[1]: Listening on Journal Sockets.
Jul 11 21:37:24 hacking systemd[1]: TPM PCR Measurements was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:24 hacking systemd[1]: Make TPM PCR Policy was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:24 hacking systemd[1]: Listening on udev Control Socket.
Jul 11 21:37:24 hacking systemd[1]: Listening on udev Kernel Socket.
Jul 11 21:37:24 hacking systemd[1]: Listening on User Database Manager Socket.
Jul 11 21:37:24 hacking systemd[1]: Mounting Huge Pages File System...
Jul 11 21:37:24 hacking systemd[1]: Mounting POSIX Message Queue File System...
Jul 11 21:37:24 hacking systemd[1]: Mounting Kernel Debug File System...
Jul 11 21:37:24 hacking systemd[1]: Mounting Kernel Trace File System...
Jul 11 21:37:24 hacking systemd[1]: Starting Create List of Static Device Nodes...
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module configfs...
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module dm_mod...
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module drm...
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module fuse...
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Module loop...
Jul 11 21:37:24 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Jul 11 21:37:24 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
Jul 11 21:37:24 hacking kernel: device-mapper: uevent: version 1.0.3
Jul 11 21:37:24 hacking kernel: device-mapper: ioctl: 4.49.0-ioctl (2025-01-17) initialised: [email protected]
Jul 11 21:37:24 hacking systemd[1]: Starting Journal Service...
Jul 11 21:37:24 hacking kernel: loop: module loaded
Jul 11 21:37:24 hacking systemd[1]: Starting Load Kernel Modules...
Jul 11 21:37:24 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:24 hacking systemd[1]: Starting Remount Root and Kernel File Systems...
Jul 11 21:37:24 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:24 hacking systemd[1]: Starting Load udev Rules from Credentials...
Jul 11 21:37:24 hacking systemd[1]: Starting Coldplug All udev Devices...
Jul 11 21:37:24 hacking systemd-journald[410]: Collecting audit messages is disabled.
Jul 11 21:37:24 hacking kernel: Asymmetric key parser 'pkcs8' registered
Jul 11 21:37:24 hacking systemd[1]: Mounted Huge Pages File System.
Jul 11 21:37:24 hacking systemd[1]: Mounted POSIX Message Queue File System.
Jul 11 21:37:24 hacking systemd[1]: Mounted Kernel Debug File System.
Jul 11 21:37:24 hacking systemd[1]: Mounted Kernel Trace File System.
Jul 11 21:37:24 hacking systemd[1]: Finished Create List of Static Device Nodes.
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module configfs.
Jul 11 21:37:24 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module dm_mod.
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module drm.
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module fuse.
Jul 11 21:37:24 hacking kernel: EXT4-fs (nvme0n1p3): re-mounted 2403f944-7fdf-4185-8119-4f6fd8f7f887.
Jul 11 21:37:24 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Module loop.
Jul 11 21:37:24 hacking systemd[1]: Finished Load Kernel Modules.
Jul 11 21:37:24 hacking systemd[1]: Finished Remount Root and Kernel File Systems.
Jul 11 21:37:24 hacking systemd[1]: Finished Load udev Rules from Credentials.
Jul 11 21:37:24 hacking systemd[1]: Mounting FUSE Control File System...
Jul 11 21:37:24 hacking systemd[1]: Mounting Kernel Configuration File System...
Jul 11 21:37:24 hacking systemd[1]: Rebuild Hardware Database was skipped because no trigger condition checks were met.
Jul 11 21:37:24 hacking systemd[1]: Starting Load/Save OS Random Seed...
Jul 11 21:37:24 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met.
Jul 11 21:37:24 hacking systemd[1]: Starting Apply Kernel Variables...
Jul 11 21:37:24 hacking systemd[1]: Starting Create Static Device Nodes in /dev gracefully...
Jul 11 21:37:24 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:24 hacking systemd[1]: Mounted FUSE Control File System.
Jul 11 21:37:24 hacking systemd[1]: Mounted Kernel Configuration File System.
Jul 11 21:37:24 hacking systemd[1]: Finished Load/Save OS Random Seed.
Jul 11 21:37:24 hacking systemd[1]: Finished Apply Kernel Variables.
Jul 11 21:37:24 hacking systemd[1]: Starting User Database Manager...
Jul 11 21:37:24 hacking systemd-journald[410]: Journal started
Jul 11 21:37:24 hacking systemd-journald[410]: Runtime Journal (/run/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 8M, max 1.5G, 1.5G free.
Jul 11 21:37:24 hacking systemd-modules-load[412]: Inserted module 'crypto_user'
Jul 11 21:37:24 hacking systemd-modules-load[412]: Inserted module 'pkcs8_key_parser'
Jul 11 21:37:24 hacking systemd[1]: Started Journal Service.
Jul 11 21:37:24 hacking systemd[1]: Starting Flush Journal to Persistent Storage...
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub
Jul 11 21:37:24 hacking kernel: usb 3-6.4.1: Manufacturer: Generic
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: USB hub found
Jul 11 21:37:24 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected
Jul 11 21:37:24 hacking systemd-journald[410]: Time spent on flushing to /var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b is 14.702ms for 1099 entries.
Jul 11 21:37:24 hacking systemd-journald[410]: System Journal (/var/log/journal/6958de16f0c44ae8b851e4e2f1f7b20b) is 80M, max 4G, 3.9G free.
Jul 11 21:37:25 hacking systemd-journald[410]: Received client request to flush runtime journal.
Jul 11 21:37:24 hacking systemd[1]: Started User Database Manager.
Jul 11 21:37:25 hacking systemd[1]: Finished Create Static Device Nodes in /dev gracefully.
Jul 11 21:37:25 hacking systemd[1]: Starting Create System Users...
Jul 11 21:37:25 hacking systemd[1]: Finished Coldplug All udev Devices.
Jul 11 21:37:25 hacking systemd[1]: Finished Flush Journal to Persistent Storage.
Jul 11 21:37:25 hacking systemd[1]: Finished Create System Users.
Jul 11 21:37:25 hacking systemd[1]: Starting Create Static Device Nodes in /dev...
Jul 11 21:37:25 hacking systemd[1]: Finished Create Static Device Nodes in /dev.
Jul 11 21:37:25 hacking systemd[1]: Reached target Preparation for Local File Systems.
Jul 11 21:37:25 hacking systemd[1]: Starting Rule-based Manager for Device Events and Files...
Jul 11 21:37:25 hacking systemd-udevd[461]: Using default interface naming scheme 'v257'.
Jul 11 21:37:25 hacking systemd[1]: Started Rule-based Manager for Device Events and Files.
Jul 11 21:37:25 hacking systemd[1]: Reached target Trusted Platform Module.
Jul 11 21:37:25 hacking kernel: tuxedo_compatibility_check: loading out-of-tree module taints kernel.
Jul 11 21:37:25 hacking kernel: tuxedo_compatibility_check: module verification failed: signature and/or required key missing - tainting kernel
Jul 11 21:37:25 hacking kernel: input: Intel HID events as /devices/platform/INTC10CB:00/input/input5
Jul 11 21:37:25 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB swap\x20partition.
Jul 11 21:37:25 hacking kernel: tuxedo_keyboard: module init
Jul 11 21:37:25 hacking kernel: pci 0000:00:0b.0: Setting to D3hot
Jul 11 21:37:25 hacking kernel: resource: resource sanity check: requesting [mem 0x00000000fedc0000-0x00000000fedcffff], which spans more than pnp 00:03 [mem 0xfedc0000-0xfedc7fff]
Jul 11 21:37:25 hacking kernel: caller igen6_probe+0x155/0x81c [igen6_edac] mapping multiple BARs
Jul 11 21:37:25 hacking kernel: EDAC MC0: Giving out device to module igen6_edac controller Intel_client_SoC MC#0: DEV 0000:00:00.0 (INTERRUPT)
Jul 11 21:37:25 hacking kernel: EDAC igen6: Expected 2 mcs, but only 1 detected.
Jul 11 21:37:25 hacking kernel: EDAC igen6: v2.5.1
Jul 11 21:37:25 hacking systemd[1]: Found device Samsung SSD 990 EVO 1TB EFI\x20system\x20partition.
Jul 11 21:37:25 hacking kernel: pps_core: LinuxPPS API ver. 1 registered
Jul 11 21:37:25 hacking kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <[email protected]>
Jul 11 21:37:25 hacking kernel: pci 0000:00:08.0: Setting to D3hot
Jul 11 21:37:25 hacking systemd[1]: Activating swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7...
Jul 11 21:37:25 hacking kernel: PTP clock support registered
Jul 11 21:37:25 hacking kernel: ACPI: bus type thunderbolt registered
Jul 11 21:37:25 hacking systemd[1]: Created slice Slice /system/systemd-backlight.
Jul 11 21:37:25 hacking kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set
Jul 11 21:37:25 hacking kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt
Jul 11 21:37:25 hacking kernel: e1000e: Intel(R) PRO/1000 Network Driver
Jul 11 21:37:25 hacking kernel: e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode
Jul 11 21:37:25 hacking kernel: tuxedo_keyboard: Set keyboard backlight mode on CUSTOM
Jul 11 21:37:25 hacking kernel: intel_pmc_core INT33A1:00: Assuming a default substate order for this platform
Jul 11 21:37:25 hacking kernel: intel_pmc_core INT33A1:00: pmc_core: couldn't get DMU telem endpoint -6
Jul 11 21:37:25 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Firmware: intel/vpu/vpu_37xx_v1.bin, version: 20250415*MTL_CLIENT_SILICON-release*1900*ci_tag_ud202518_vpu_rc_20250415_1900*7ef0f3fdb82
Jul 11 21:37:25 hacking kernel: intel_vpu 0000:00:0b.0: [drm] Scheduler mode: HW
Jul 11 21:37:25 hacking kernel: intel_pmc_core INT33A1:00: initialized
Jul 11 21:37:25 hacking kernel: ACPI: battery: new hook: TUXEDO Flexicharger Extension
Jul 11 21:37:25 hacking kernel: input: TUXEDO Keyboard as /devices/platform/tuxedo_keyboard/input/input6
Jul 11 21:37:25 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of backlight:intel_backlight...
Jul 11 21:37:25 hacking kernel: clevo_acpi: interface initialized
Jul 11 21:37:25 hacking kernel: intel-lpss 0000:00:15.0: enabling device (0004 -> 0006)
Jul 11 21:37:25 hacking kernel: Adding 4194300k swap on /dev/nvme0n1p2. Priority:-2 extents:1 across:4194300k SS
Jul 11 21:37:25 hacking kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit
Jul 11 21:37:25 hacking systemd[1]: Activated swap /dev/disk/by-uuid/024924b2-5cd4-47ba-8e69-62935a55c1f7.
Jul 11 21:37:25 hacking systemd[1]: Reached target Swaps.
Jul 11 21:37:25 hacking kernel: input: PC Speaker as /devices/platform/pcspkr/input/input7
Jul 11 21:37:25 hacking kernel: mc: Linux media interface: v0.10
Jul 11 21:37:25 hacking kernel: clevo_wmi: interface initialized
Jul 11 21:37:25 hacking kernel: intel-lpss 0000:00:15.1: enabling device (0004 -> 0006)
Jul 11 21:37:25 hacking kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit
Jul 11 21:37:25 hacking kernel: iTCO_vendor_support: vendor-support=0
Jul 11 21:37:25 hacking kernel: intel_rapl_msr: PL4 support detected.
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain package
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain core
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain uncore
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain psys
Jul 11 21:37:25 hacking kernel: mei_gsc_proxy 0000:00:16.0-0f73db04-97ab-4125-b893-e904ad0d5464: bound 0000:00:02.0 (ops i915_gsc_proxy_component_ops [i915])
Jul 11 21:37:25 hacking systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch.
Jul 11 21:37:25 hacking systemd[1]: Starting Virtual Console Setup...
Jul 11 21:37:25 hacking kernel: Bluetooth: Core ver 2.22
Jul 11 21:37:25 hacking kernel: NET: Registered PF_BLUETOOTH protocol family
Jul 11 21:37:25 hacking kernel: Bluetooth: HCI device and connection manager initialized
Jul 11 21:37:25 hacking kernel: Bluetooth: HCI socket layer initialized
Jul 11 21:37:25 hacking kernel: Bluetooth: L2CAP socket layer initialized
Jul 11 21:37:25 hacking kernel: Bluetooth: SCO socket layer initialized
Jul 11 21:37:25 hacking kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database
Jul 11 21:37:25 hacking kernel: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Jul 11 21:37:25 hacking kernel: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600'
Jul 11 21:37:25 hacking kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
Jul 11 21:37:25 hacking kernel: cfg80211: failed to load regulatory.db
Jul 11 21:37:25 hacking systemd[1]: Finished Virtual Console Setup.
Jul 11 21:37:25 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 14 using xhci_hcd
Jul 11 21:37:25 hacking kernel: usb 3-6: USB disconnect, device number 2
Jul 11 21:37:25 hacking kernel: usb 3-6.2: USB disconnect, device number 5
Jul 11 21:37:25 hacking kernel: usb 3-6.4: USB disconnect, device number 12
Jul 11 21:37:25 hacking kernel: usb 3-6.4.1: USB disconnect, device number 13
Jul 11 21:37:25 hacking kernel: usb 3-6.4.1-port3: attempt power cycle
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input8
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input9
Jul 11 21:37:25 hacking kernel: hid-generic 0018:2808:0222.0001: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01
Jul 11 21:37:25 hacking kernel: [drm] Initialized intel_vpu 1.0.0 for 0000:00:0b.0 on minor 0
Jul 11 21:37:25 hacking kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain package 2^-14 Joules
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules
Jul 11 21:37:25 hacking kernel: RAPL PMU: hw unit of domain psys 2^-14 Joules
Jul 11 21:37:25 hacking kernel: videodev: Linux video capture interface: v2.00
Jul 11 21:37:25 hacking kernel: usbcore: registered new device driver r8152-cfgselector
Jul 11 21:37:25 hacking kernel: intel_rapl_common: Found RAPL domain package
Jul 11 21:37:25 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Link Down
Jul 11 21:37:25 hacking kernel: pcieport 0000:00:07.0: pciehp: Slot(12): Card not present
Jul 11 21:37:25 hacking kernel: pcieport 0000:03:03.0: Runtime PM usage count underflow!
Jul 11 21:37:25 hacking kernel: pcieport 0000:03:02.0: Runtime PM usage count underflow!
Jul 11 21:37:25 hacking kernel: pcieport 0000:03:01.0: Runtime PM usage count underflow!
Jul 11 21:37:25 hacking kernel: pci_bus 0000:04: busn_res: [bus 04] is released
Jul 11 21:37:25 hacking kernel: pci_bus 0000:05: busn_res: [bus 05-11] is released
Jul 11 21:37:25 hacking kernel: pci_bus 0000:12: busn_res: [bus 12-1e] is released
Jul 11 21:37:25 hacking kernel: pci_bus 0000:1f: busn_res: [bus 1f-2a] is released
Jul 11 21:37:25 hacking kernel: pci_bus 0000:2b: busn_res: [bus 2b] is released
Jul 11 21:37:25 hacking kernel: pci_bus 0000:03: busn_res: [bus 03-2b] is released
Jul 11 21:37:25 hacking kernel: cryptd: max_cpu_qlen set to 1000
Jul 11 21:37:25 hacking systemd[1]: Starting Load/Save Screen Backlight Brightness of leds:white:kbd_backlight...
Jul 11 21:37:25 hacking kernel: usb 2-1: USB disconnect, device number 2
Jul 11 21:37:25 hacking kernel: usb 2-1.4: USB disconnect, device number 3
Jul 11 21:37:25 hacking kernel: Intel(R) Wireless WiFi driver for Linux
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: enabling device (0000 -> 0002)
Jul 11 21:37:25 hacking kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400)
Jul 11 21:37:25 hacking kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
Jul 11 21:37:25 hacking kernel: r8152-cfgselector 2-1.4.4: Unknown version 0x0000
Jul 11 21:37:25 hacking kernel: usb 2-1.4.1: USB disconnect, device number 6
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver r8152
Jul 11 21:37:25 hacking kernel: r8152-cfgselector 2-1.4.4: USB disconnect, device number 7
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Detected crf-id 0x2001910, cnv-id 0x2001910 wfpm id 0x80000000
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: PCI dev 272b/00f4, rev=0x472, rfid=0x112200
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Detected Intel(R) Wi-Fi 7 BE200 320MHz
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver btusb
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: TLV_FW_FSEQ_VERSION: FSEQ Version: 0.0.4.196
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: loaded firmware version 98.d661c37c.0 gl-c0-fm-c0-98.ucode op_mode iwlmld
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver cdc_ether
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware timestamp 2025.18 buildtype 1 build 82313
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware SHA1: 0x81d88c7f
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: DSM reset method type: 0x01
Jul 11 21:37:25 hacking kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002)
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Mouse as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input11
Jul 11 21:37:25 hacking kernel: input: FTCS1000:01 2808:0222 Touchpad as /devices/pci0000:00/0000:00:15.0/i2c_designware.0/i2c-14/i2c-FTCS1000:01/0018:2808:0222.0001/input/input12
Jul 11 21:37:25 hacking kernel: hid-multitouch 0018:2808:0222.0001: input,hidraw0: I2C HID v1.00 Mouse [FTCS1000:01 2808:0222] on i2c-FTCS1000:01
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver r8153_ecm
Jul 11 21:37:25 hacking kernel: usb 3-7: Found UVC 1.10 device Chicony USB2.0 Camera (04f2:b729)
Jul 11 21:37:25 hacking kernel: usbcore: registered new interface driver uvcvideo
Jul 11 21:37:25 hacking kernel: mousedev: PS/2 mouse device common for all mice
Jul 11 21:37:25 hacking systemd[1]: Starting Load/Save RF Kill Switch Status...
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Found device firmware: intel/ibt-0291-0291.sfi
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Boot Address: 0x100800
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware Version: 137-18.25
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Firmware already loaded
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Fseq status: Success (0x00)
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Fseq executed: 00.00.04.196
Jul 11 21:37:25 hacking kernel: Bluetooth: hci0: Fseq BT Top: 00.00.04.197
Jul 11 21:37:25 hacking systemd[1]: Starting Load Kernel Module dm_mod...
Jul 11 21:37:25 hacking systemd[1]: Starting Load Kernel Module loop...
Jul 11 21:37:25 hacking systemd[1]: File System Check on Root Device was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Jul 11 21:37:25 hacking systemd[1]: Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
Jul 11 21:37:25 hacking systemd[1]: Rebuild Hardware Database was skipped because no trigger condition checks were met.
Jul 11 21:37:25 hacking systemd[1]: TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:25 hacking systemd[1]: Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:25 hacking systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:25 hacking systemd[1]: Started Load/Save RF Kill Switch Status.
Jul 11 21:37:25 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of leds:white:kbd_backlight.
Jul 11 21:37:25 hacking systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 11 21:37:25 hacking systemd[1]: Finished Load Kernel Module dm_mod.
Jul 11 21:37:25 hacking systemd[1]: [email protected]: Deactivated successfully.
Jul 11 21:37:25 hacking systemd[1]: Finished Load Kernel Module loop.
Jul 11 21:37:25 hacking systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met.
Jul 11 21:37:25 hacking systemd[1]: Finished Load/Save Screen Backlight Brightness of backlight:intel_backlight.
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Detected RF FM, rfid=0x112200
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: loaded PNVM version 752be616
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: base HW address: 5c:b4:7e:c1:32:3e
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) d4:93:90:57:77:c4
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 eth0: MAC: 16, PHY: 12, PBA No: FFFFFF-0FF
Jul 11 21:37:25 hacking kernel: e1000e 0000:00:1f.6 enp0s31f6: renamed from eth0
Jul 11 21:37:25 hacking kernel: iwlwifi 0000:2d:00.0: Registered PHC clock: iwlwifi-PTP, with index: 1
Jul 11 21:37:25 hacking systemd[1]: Mounting /boot...
Jul 11 21:37:25 hacking systemd[1]: Mounting Temporary Directory /tmp...
Jul 11 21:37:25 hacking systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Jul 11 21:37:25 hacking systemd[1]: Listening on Disk Image Download Service Socket.
Jul 11 21:37:25 hacking systemd[1]: Mounted Temporary Directory /tmp.
Jul 11 21:37:25 hacking kernel: FAT-fs (nvme0n1p1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
Jul 11 21:37:25 hacking systemd[1]: Mounted /boot.
Jul 11 21:37:25 hacking systemd[1]: Reached target Local File Systems.
Jul 11 21:37:25 hacking systemd[1]: Listening on Boot Entries Service Socket.
Jul 11 21:37:25 hacking systemd[1]: Listening on System Extension Image Management.
Jul 11 21:37:25 hacking systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met.
Jul 11 21:37:25 hacking systemd[1]: Starting Update Boot Loader Random Seed...
Jul 11 21:37:25 hacking systemd[1]: Starting Create System Files and Directories...
Jul 11 21:37:25 hacking bootctl[593]: ! Mount point '/boot' which backs the random seed file is world accessible, which is a security hole! !
Jul 11 21:37:25 hacking bootctl[593]: ! Random seed file '/boot/loader/random-seed' is world accessible, which is a security hole! !
Jul 11 21:37:25 hacking bootctl[593]: Random seed file /boot/loader/random-seed successfully refreshed (32 bytes).
Jul 11 21:37:25 hacking systemd[1]: Finished Update Boot Loader Random Seed.
Jul 11 21:37:26 hacking systemd[1]: Finished Create System Files and Directories.
Jul 11 21:37:26 hacking systemd[1]: Starting Rebuild Dynamic Linker Cache...
Jul 11 21:37:26 hacking systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes).
Jul 11 21:37:26 hacking systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes).
Jul 11 21:37:26 hacking systemd[1]: Starting Rebuild Journal Catalog...
Jul 11 21:37:26 hacking systemd[1]: Save Transient machine-id to Disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id).
Jul 11 21:37:26 hacking systemd[1]: Starting Record System Boot/Shutdown in UTMP...
Jul 11 21:37:26 hacking systemd[1]: Finished Record System Boot/Shutdown in UTMP.
Jul 11 21:37:26 hacking systemd[1]: Finished Rebuild Journal Catalog.
Jul 11 21:37:26 hacking systemd[1]: Finished Rebuild Dynamic Linker Cache.
Jul 11 21:37:26 hacking systemd[1]: Starting Update is Completed...
Jul 11 21:37:26 hacking systemd[1]: Finished Update is Completed.
Jul 11 21:37:26 hacking systemd[1]: Reached target System Initialization.
Jul 11 21:37:26 hacking systemd[1]: Started Refresh existing PGP keys of archlinux-keyring regularly.
Jul 11 21:37:26 hacking systemd[1]: Started Daily man-db regeneration.
Jul 11 21:37:26 hacking systemd[1]: Started Daily verification of password and group files.
Jul 11 21:37:26 hacking systemd[1]: Started Daily Cleanup of Temporary Directories.
Jul 11 21:37:26 hacking systemd[1]: Reached target Timer Units.
Jul 11 21:37:26 hacking systemd[1]: Listening on D-Bus System Message Bus Socket.
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG network certificate management daemon for /etc/pacman.d/gnupg.
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers) for /etc/pacman.d/gnupg.
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache (restricted) for /etc/pacman.d/gnupg.
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent (ssh-agent emulation) for /etc/pacman.d/gnupg.
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG cryptographic agent and passphrase cache for /etc/pacman.d/gnupg.
Jul 11 21:37:26 hacking systemd[1]: Listening on GnuPG public key management service for /etc/pacman.d/gnupg.
Jul 11 21:37:26 hacking systemd[1]: Listening on OpenSSH Server Socket (systemd-ssh-generator, AF_UNIX Local).
Jul 11 21:37:26 hacking systemd[1]: Listening on Hostname Service Socket.
Jul 11 21:37:26 hacking systemd[1]: Reached target Socket Units.
Jul 11 21:37:26 hacking systemd[1]: Starting D-Bus System Message Bus...
Jul 11 21:37:26 hacking systemd[1]: TPM PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:26 hacking systemd[1]: Started D-Bus System Message Bus.
Jul 11 21:37:26 hacking systemd[1]: Reached target Basic System.
Jul 11 21:37:26 hacking systemd[1]: Starting Bluetooth service...
Jul 11 21:37:26 hacking dbus-broker-launch[611]: Ready
Jul 11 21:37:26 hacking systemd[1]: Starting Initialize hardware monitoring sensors...
Jul 11 21:37:26 hacking systemd[1]: Starting User Login Management...
Jul 11 21:37:26 hacking systemd[1]: TPM PCR Barrier (User) was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
Jul 11 21:37:26 hacking systemd[1]: Starting Permit User Sessions...
Jul 11 21:37:26 hacking (modprobe)[615]: lm_sensors.service: Referenced but unset environment variable evaluates to an empty string: BUS_MODULES
Jul 11 21:37:26 hacking systemd[1]: Finished Permit User Sessions.
Jul 11 21:37:26 hacking systemd[1]: Started Getty on tty1.
Jul 11 21:37:26 hacking bluetoothd[613]: Bluetooth daemon 5.83
Jul 11 21:37:26 hacking bluetoothd[613]: Starting SDP server
Jul 11 21:37:26 hacking systemd[1]: Reached target Login Prompts.
Jul 11 21:37:26 hacking systemd[1]: Started Bluetooth service.
Jul 11 21:37:26 hacking systemd[1]: Reached target Bluetooth Support.
Jul 11 21:37:26 hacking bluetoothd[613]: Bluetooth management interface 1.23 initialized
Jul 11 21:37:26 hacking bluetoothd[613]: Battery Provider Manager created
Jul 11 21:37:26 hacking kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3
Jul 11 21:37:26 hacking kernel: Bluetooth: BNEP filters: protocol multicast
Jul 11 21:37:26 hacking kernel: Bluetooth: BNEP socket layer initialized
Jul 11 21:37:26 hacking kernel: Bluetooth: MGMT ver 1.23
Jul 11 21:37:26 hacking systemd[1]: Starting Hostname Service...
Jul 11 21:37:26 hacking systemd[1]: Finished Initialize hardware monitoring sensors.
Jul 11 21:37:26 hacking systemd-logind[616]: New seat seat0.
Jul 11 21:37:26 hacking kernel: NET: Registered PF_ALG protocol family
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event0 (Power Button)
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event2 (Lid Switch)
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event1 (Sleep Button)
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event5 (Intel HID events)
Jul 11 21:37:26 hacking systemd-logind[616]: Watching system buttons on /dev/input/event3 (AT Translated Set 2 keyboard)
Jul 11 21:37:26 hacking systemd[1]: Started User Login Management.
Jul 11 21:37:26 hacking systemd[1]: Reached target Multi-User System.
Jul 11 21:37:26 hacking systemd[1]: Reached target Graphical Interface.
Jul 11 21:37:26 hacking systemd[1]: Started Hostname Service.
Jul 11 21:37:26 hacking systemd[1]: Startup finished in 14.022s (firmware) + 5.087s (loader) + 3.825s (kernel) + 1.501s (userspace) = 24.437s.
Jul 11 21:37:26 hacking kernel: snd_hda_intel 0000:00:1f.3: bound 0000:00:02.0 (ops intel_audio_component_bind_ops [i915])
Jul 11 21:37:26 hacking kernel: typec port0: bound usb3-port6 (ops connector_ops)
Jul 11 21:37:26 hacking kernel: typec port0: bound usb2-port1 (ops connector_ops)
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: ALC245: picked fixup for PCI SSID 1558:a763
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC245: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:speaker
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0)
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x21/0x0/0x0/0x0/0x0)
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: inputs:
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Internal Mic=0x12
Jul 11 21:37:26 hacking kernel: snd_hda_codec_realtek hdaudioC0D0: Headset Mic=0x19
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input14
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input15
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input16
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input17
Jul 11 21:37:26 hacking kernel: input: HDA Intel PCH HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input18
Jul 11 21:37:26 hacking systemd[1]: Reached target Sound Card.
Jul 11 21:37:28 hacking kernel: thunderbolt 0-1: new device found, vendor=0x175 device=0x6534
Jul 11 21:37:28 hacking kernel: thunderbolt 0-1: SAMSUNG ELECTRONICS CO.,LTD S34C65T
Jul 11 21:37:28 hacking kernel: thunderbolt 0-0:1.1: new retimer found, vendor=0x8087 device=0xd9c
Jul 11 21:37:28 hacking kernel: usb 3-6: new high-speed USB device number 18 using xhci_hcd
Jul 11 21:37:28 hacking kernel: usb 3-6: New USB device found, idVendor=1d5c, idProduct=5801, bcdDevice= 1.01
Jul 11 21:37:28 hacking kernel: usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:28 hacking kernel: usb 3-6: Product: USB2.0 Hub
Jul 11 21:37:28 hacking kernel: usb 3-6: Manufacturer: Fresco Logic, Inc.
Jul 11 21:37:28 hacking kernel: hub 3-6:1.0: USB hub found
Jul 11 21:37:28 hacking kernel: hub 3-6:1.0: 6 ports detected
Jul 11 21:37:29 hacking kernel: usb 2-1: new SuperSpeed Plus Gen 2x1 USB device number 8 using xhci_hcd
Jul 11 21:37:29 hacking kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0b40, bcdDevice=12.34
Jul 11 21:37:29 hacking kernel: usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:29 hacking kernel: usb 2-1: Product: USB3.0 Hub
Jul 11 21:37:29 hacking kernel: usb 2-1: Manufacturer: Intel Corporation.
Jul 11 21:37:29 hacking kernel: hub 2-1:1.0: USB hub found
Jul 11 21:37:29 hacking kernel: hub 2-1:1.0: 4 ports detected
Jul 11 21:37:29 hacking kernel: usb 3-6.2: new full-speed USB device number 19 using xhci_hcd
Jul 11 21:37:29 hacking kernel: usb 3-6.2: New USB device found, idVendor=04e8, idProduct=20e9, bcdDevice=17.46
Jul 11 21:37:29 hacking kernel: usb 3-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 11 21:37:29 hacking kernel: usb 3-6.2: Product: S34C65T
Jul 11 21:37:29 hacking kernel: usb 3-6.2: Manufacturer: Samsung
Jul 11 21:37:29 hacking kernel: usb 3-6.2: SerialNumber: 11AD1D0ABAB17E0E19120B00
Jul 11 21:37:29 hacking kernel: usb 3-6.4: new high-speed USB device number 20 using xhci_hcd
Jul 11 21:37:29 hacking kernel: usb 3-6.4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91
Jul 11 21:37:29 hacking kernel: usb 3-6.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:29 hacking kernel: usb 3-6.4: Product: USB2.1 Hub
Jul 11 21:37:29 hacking kernel: usb 3-6.4: Manufacturer: GenesysLogic
Jul 11 21:37:29 hacking kernel: hub 3-6.4:1.0: USB hub found
Jul 11 21:37:29 hacking kernel: hub 3-6.4:1.0: 4 ports detected
Jul 11 21:37:29 hacking kernel: usb 2-1.4: new SuperSpeed USB device number 9 using xhci_hcd
Jul 11 21:37:29 hacking kernel: usb 2-1.4: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91
Jul 11 21:37:29 hacking kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:29 hacking kernel: usb 2-1.4: Product: USB3.2 Hub
Jul 11 21:37:29 hacking kernel: usb 2-1.4: Manufacturer: GenesysLogic
Jul 11 21:37:29 hacking kernel: hub 2-1.4:1.0: USB hub found
Jul 11 21:37:29 hacking kernel: hub 2-1.4:1.0: 4 ports detected
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: new high-speed USB device number 21 using xhci_hcd
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: New USB device found, idVendor=0bda, idProduct=5411, bcdDevice= 1.04
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: Product: 4-Port USB 2.0 Hub
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1: Manufacturer: Generic
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: new SuperSpeed USB device number 10 using xhci_hcd
Jul 11 21:37:30 hacking kernel: hub 3-6.4.1:1.0: USB hub found
Jul 11 21:37:30 hacking kernel: hub 3-6.4.1:1.0: 4 ports detected
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: New USB device found, idVendor=0bda, idProduct=0411, bcdDevice= 1.04
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: Product: 4-Port USB 3.0 Hub
Jul 11 21:37:30 hacking kernel: usb 2-1.4.1: Manufacturer: Generic
Jul 11 21:37:30 hacking kernel: hub 2-1.4.1:1.0: USB hub found
Jul 11 21:37:30 hacking kernel: hub 2-1.4.1:1.0: 4 ports detected
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: new SuperSpeed USB device number 11 using xhci_hcd
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: Product: USB 10/100/1000 LAN
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: Manufacturer: Realtek
Jul 11 21:37:30 hacking kernel: usb 2-1.4.4: SerialNumber: 001000001
Jul 11 21:37:30 hacking kernel: r8152-cfgselector 2-1.4.4: reset SuperSpeed USB device number 11 using xhci_hcd
Jul 11 21:37:30 hacking kernel: r8152 2-1.4.4:1.0 eth0: v1.12.13
Jul 11 21:37:30 hacking kernel: r8152 2-1.4.4:1.0 enp0s13f0u1u4u4: renamed from eth0
Jul 11 21:37:30 hacking systemd[1]: systemd-rfkill.service: Deactivated successfully.
Jul 11 21:37:30 hacking kernel: usb 3-6.4.1.3: new full-speed USB device number 23 using xhci_hcd
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: New USB device found, idVendor=1a7c, idProduct=0191, bcdDevice= 1.13
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: New USB device strings: Mfr=1, Product=5, SerialNumber=0
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: Product: Evoluent VerticalMouse 4
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.3: Manufacturer: Kingsis Peripherals
Jul 11 21:37:31 hacking kernel: input: Kingsis Peripherals Evoluent VerticalMouse 4 as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.3/3-6.4.1.3:1.0/0003:1A7C:0191.0002/input/input19
Jul 11 21:37:31 hacking kernel: hid-generic 0003:1A7C:0191.0002: input,hidraw1: USB HID v1.11 Mouse [Kingsis Peripherals Evoluent VerticalMouse 4] on usb-0000:00:14.0-6.4.1.3/input0
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: new full-speed USB device number 24 using xhci_hcd
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: New USB device found, idVendor=2efd, idProduct=2130, bcdDevice= 0.02
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: Product: USB Keyboard
Jul 11 21:37:31 hacking kernel: usb 3-6.4.1.4: Manufacturer: SONiX
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.0/0003:2EFD:2130.0003/input/input20
Jul 11 21:37:31 hacking kernel: hid-generic 0003:2EFD:2130.0003: input,hidraw2: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input0
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0004/input/input21
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0004/input/input22
Jul 11 21:37:31 hacking kernel: input: SONiX USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-6/3-6.4/3-6.4.1/3-6.4.1.4/3-6.4.1.4:1.1/0003:2EFD:2130.0004/input/input23
Jul 11 21:37:31 hacking kernel: hid-generic 0003:2EFD:2130.0004: input,hidraw3: USB HID v1.11 Keyboard [SONiX USB Keyboard] on usb-0000:00:14.0-6.4.1.4/input1
Jul 11 21:37:31 hacking systemd-logind[616]: Watching system buttons on /dev/input/event16 (SONiX USB Keyboard)
Jul 11 21:37:31 hacking systemd-logind[616]: Watching system buttons on /dev/input/event18 (SONiX USB Keyboard System Control)
Jul 11 21:37:31 hacking systemd-logind[616]: Watching system buttons on /dev/input/event19 (SONiX USB Keyboard)
Jul 11 21:37:32 hacking dbus-broker-launch[611]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found.
Jul 11 21:37:34 hacking login[627]: pam_unix(login:session): session opened for user ray(uid=1000) by ray(uid=0)
Jul 11 21:37:34 hacking systemd-logind[616]: New session 1 of user ray.
Jul 11 21:37:34 hacking systemd[1]: Created slice User Slice of UID 1000.
Jul 11 21:37:34 hacking systemd[1]: Starting User Runtime Directory /run/user/1000...
Jul 11 21:37:34 hacking systemd[1]: Finished User Runtime Directory /run/user/1000.
Jul 11 21:37:34 hacking systemd[1]: Starting User Manager for UID 1000...
Jul 11 21:37:34 hacking (systemd)[684]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8002 service=[systemd-user] terminal=[] user=[ray] ruser=[<unknown>] rhost=[<unknown>]
Jul 11 21:37:34 hacking (systemd)[684]: pam_unix(systemd-user:session): session opened for user ray(uid=1000) by ray(uid=0)
Jul 11 21:37:34 hacking systemd-logind[616]: New session 2 of user ray.
Jul 11 21:37:34 hacking systemd[684]: Queued start job for default target Main User Target.
Jul 11 21:37:34 hacking systemd[684]: Created slice User Application Slice.
Jul 11 21:37:34 hacking systemd[684]: Started Break Encouragement.
Jul 11 21:37:34 hacking systemd[684]: Reached target Paths.
Jul 11 21:37:34 hacking systemd[684]: Reached target Timers.
Jul 11 21:37:34 hacking systemd[684]: Starting D-Bus User Message Bus Socket...
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG network certificate management daemon.
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers).
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent and passphrase cache (restricted).
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent (ssh-agent emulation).
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG cryptographic agent and passphrase cache.
Jul 11 21:37:34 hacking systemd[684]: Listening on GnuPG public key management service.
Jul 11 21:37:34 hacking systemd[684]: Listening on p11-kit server.
Jul 11 21:37:34 hacking systemd[684]: Listening on PipeWire PulseAudio.
Jul 11 21:37:34 hacking systemd[684]: Listening on PipeWire Multimedia System Sockets.
Jul 11 21:37:34 hacking systemd[684]: Listening on D-Bus User Message Bus Socket.
Jul 11 21:37:34 hacking systemd[684]: Reached target Sockets.
Jul 11 21:37:34 hacking systemd[684]: Reached target Basic System.
Jul 11 21:37:34 hacking systemd[1]: Started User Manager for UID 1000.
Jul 11 21:37:34 hacking systemd[684]: Started Kanata keyboard remapper.
Jul 11 21:37:34 hacking systemd[684]: Reached target Main User Target.
Jul 11 21:37:34 hacking systemd[684]: Startup finished in 97ms.
Jul 11 21:37:34 hacking systemd[1]: Started Session 1 of User ray.
Jul 11 21:37:34 hacking login[627]: LOGIN ON tty1 BY ray
Jul 11 21:37:34 hacking sh[693]: /usr/bin/sh: line 1: /home/ray/.cargo/bin/kanata: No such file or directory
Jul 11 21:37:34 hacking systemd[684]: kanata.service: Main process exited, code=exited, status=127/n/a
Jul 11 21:37:34 hacking systemd[684]: kanata.service: Failed with result 'exit-code'.
Jul 11 21:37:42 hacking systemd[684]: Created slice User Core Session Slice.
Jul 11 21:37:42 hacking systemd[684]: Starting D-Bus User Message Bus...
Jul 11 21:37:42 hacking dbus-broker-launch[734]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored
Jul 11 21:37:42 hacking dbus-broker-launch[734]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored
Jul 11 21:37:42 hacking systemd[684]: Started D-Bus User Message Bus.
Jul 11 21:37:42 hacking dbus-broker-launch[734]: Ready
Jul 11 21:37:42 hacking systemd[684]: Started Flexible Input Method Framwork.
Jul 11 21:37:42 hacking systemd[684]: Started keynav.
Jul 11 21:37:42 hacking systemd[684]: Started notify-client -> notify-server -> notify-send.
Jul 11 21:37:42 hacking systemd[684]: Started Redshift display colour temperature adjustment (GUI).
Jul 11 21:37:42 hacking systemd[684]: Started Taskbar.
Jul 11 21:37:42 hacking systemd[684]: Started xscreensaver.service.
Jul 11 21:37:42 hacking (keynav)[740]: keynav.service: Unable to locate executable '/home/ray/.local/bin/keynav': No such file or directory
Jul 11 21:37:42 hacking (keynav)[740]: keynav.service: Failed at step EXEC spawning /home/ray/.local/bin/keynav: No such file or directory
Jul 11 21:37:42 hacking systemd[684]: Reached target Graphical Interface.
Jul 11 21:37:42 hacking (y-server)[741]: notify-server.service: Unable to locate executable '/home/ray/bin/notify-server': No such file or directory
Jul 11 21:37:42 hacking (y-server)[741]: notify-server.service: Failed at step EXEC spawning /home/ray/bin/notify-server: No such file or directory
Jul 11 21:37:42 hacking systemd[684]: keynav.service: Main process exited, code=exited, status=203/EXEC
Jul 11 21:37:42 hacking systemd[684]: keynav.service: Failed with result 'exit-code'.
Jul 11 21:37:42 hacking (hift-gtk)[742]: redshift-gtk.service: Unable to locate executable '/usr/bin/redshift-gtk': No such file or directory
Jul 11 21:37:42 hacking (hift-gtk)[742]: redshift-gtk.service: Failed at step EXEC spawning /usr/bin/redshift-gtk: No such file or directory
Jul 11 21:37:42 hacking systemd[684]: notify-server.service: Main process exited, code=exited, status=203/EXEC
Jul 11 21:37:42 hacking systemd[684]: notify-server.service: Failed with result 'exit-code'.
Jul 11 21:37:42 hacking systemd[684]: redshift-gtk.service: Main process exited, code=exited, status=203/EXEC
Jul 11 21:37:42 hacking systemd[684]: redshift-gtk.service: Failed with result 'exit-code'.
Jul 11 21:37:42 hacking (taskbar)[743]: taskbar.service: Unable to locate executable '/home/ray/bin/taskbar': No such file or directory
Jul 11 21:37:42 hacking (taskbar)[743]: taskbar.service: Failed at step EXEC spawning /home/ray/bin/taskbar: No such file or directory
Jul 11 21:37:42 hacking (eensaver)[744]: xscreensaver.service: Unable to locate executable '/usr/bin/xscreensaver': No such file or directory
Jul 11 21:37:42 hacking (eensaver)[744]: xscreensaver.service: Failed at step EXEC spawning /usr/bin/xscreensaver: No such file or directory
Jul 11 21:37:42 hacking systemd[684]: taskbar.service: Main process exited, code=exited, status=203/EXEC
Jul 11 21:37:42 hacking systemd[684]: taskbar.service: Failed with result 'exit-code'.
Jul 11 21:37:42 hacking systemd[684]: xscreensaver.service: Main process exited, code=exited, status=203/EXEC
Jul 11 21:37:42 hacking systemd[684]: xscreensaver.service: Failed with result 'exit-code'.
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.742661 instance.cpp:1400] Override Enabled Addons: {}
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.744787 instance.cpp:1401] Override Disabled Addons: {}
Jul 11 21:37:42 hacking fcitx5[739]: E2025-07-11 21:37:42.751233 waylandmodule.cpp:244] Failed to open wayland connection
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.751261 addonmanager.cpp:204] Loaded addon wayland
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.751548 addonmanager.cpp:204] Loaded addon imselector
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.754569 xcbconnection.cpp:199] Connecting to X11 display, display name::0.
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.754866 addonmanager.cpp:204] Loaded addon xcb
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.756580 addonmanager.cpp:204] Loaded addon quickphrase
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.757604 addonmanager.cpp:204] Loaded addon waylandim
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.758089 keyboard.cpp:226] Attempting to load keyboard from: ["/usr/share/X11/xkb"] Rule: evdev
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.760710 addonmanager.cpp:204] Loaded addon keyboard
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.761356 addonmanager.cpp:204] Loaded addon clipboard
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.761840 addonmanager.cpp:204] Loaded addon unicode
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.762726 addonmanager.cpp:204] Loaded addon dbus
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.763244 addonmanager.cpp:204] Loaded addon dbusfrontend
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.765885 addonmanager.cpp:204] Loaded addon fcitx4frontend
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.766511 addonmanager.cpp:204] Loaded addon ibusfrontend
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.767386 addonmanager.cpp:204] Loaded addon xim
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.784821 inputmethodmanager.cpp:210] Found 742 input method(s) in addon keyboard
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.796562 addonmanager.cpp:204] Loaded addon kimpanel
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.797034 addonmanager.cpp:204] Loaded addon virtualkeyboard
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.816692 classicui.cpp:90] Created classicui for x11 display::0
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.816720 addonmanager.cpp:204] Loaded addon classicui
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.817234 addonmanager.cpp:204] Loaded addon notificationitem
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.817899 addonmanager.cpp:204] Loaded addon notifications
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.820011 dbusmodule.cpp:816] Service name change: org.fcitx.Fcitx5 :1.3
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.820068 kimpanel.cpp:116] Kimpanel new owner:
Jul 11 21:37:42 hacking fcitx5[739]: I2025-07-11 21:37:42.820084 virtualkeyboard.cpp:218] VirtualKeyboard new owner:
Jul 11 21:37:43 hacking fcitx5[739]: I2025-07-11 21:37:43.889869 addonmanager.cpp:204] Loaded addon rime
Jul 11 21:37:56 hacking systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 11 21:38:10 hacking systemd[684]: Started tmux child pane 879 launched by process 811.
Jul 11 21:38:35 hacking sudo[947]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome
Jul 11 21:38:35 hacking sudo[947]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:38:35 hacking systemd[1]: Starting Wireless service...
Jul 11 21:38:35 hacking iwd[951]: Wireless daemon version 3.9
Jul 11 21:38:35 hacking systemd[1]: Started Wireless service.
Jul 11 21:38:35 hacking systemd[1]: Reached target Network.
Jul 11 21:38:35 hacking sudo[947]: pam_unix(sudo:session): session closed for user root
Jul 11 21:38:35 hacking iwd[951]: station: Network configuration is disabled.
Jul 11 21:38:35 hacking iwd[951]: Wiphy: 0, Name: phy0
Jul 11 21:38:35 hacking iwd[951]: Permanent Address: 5c:b4:7e:c1:32:3e
Jul 11 21:38:35 hacking iwd[951]: 2.4GHz Band:
Jul 11 21:38:35 hacking iwd[951]: Bitrates (non-HT):
Jul 11 21:38:35 hacking iwd[951]: 1.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 2.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 5.5 Mbps
Jul 11 21:38:35 hacking iwd[951]: 11.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 6.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 9.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 12.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 18.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 24.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 36.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 48.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 54.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: HT Capabilities:
Jul 11 21:38:35 hacking iwd[951]: HT40
Jul 11 21:38:35 hacking iwd[951]: Short GI for 20Mhz
Jul 11 21:38:35 hacking iwd[951]: Short GI for 40Mhz
Jul 11 21:38:35 hacking iwd[951]: HT RX MCS indexes:
Jul 11 21:38:35 hacking iwd[951]: 0-15
Jul 11 21:38:35 hacking iwd[951]: HE Capabilities
Jul 11 21:38:35 hacking iwd[951]: Interface Types: ap p2p-go
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Interface Types: station p2p-client
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: 5GHz Band:
Jul 11 21:38:35 hacking iwd[951]: Bitrates (non-HT):
Jul 11 21:38:35 hacking iwd[951]: 6.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 9.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 12.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 18.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 24.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 36.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 48.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 54.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: HT Capabilities:
Jul 11 21:38:35 hacking iwd[951]: HT40
Jul 11 21:38:35 hacking iwd[951]: Short GI for 20Mhz
Jul 11 21:38:35 hacking iwd[951]: Short GI for 40Mhz
Jul 11 21:38:35 hacking iwd[951]: HT RX MCS indexes:
Jul 11 21:38:35 hacking iwd[951]: 0-15
Jul 11 21:38:35 hacking iwd[951]: VHT Capabilities:
Jul 11 21:38:35 hacking iwd[951]: 160 Mhz operation
Jul 11 21:38:35 hacking iwd[951]: Short GI for 80Mhz
Jul 11 21:38:35 hacking iwd[951]: Short GI for 160 and 80 + 80 Mhz
Jul 11 21:38:35 hacking iwd[951]: Max RX MCS: 0-9 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max TX MCS: 0-9 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: HE Capabilities
Jul 11 21:38:35 hacking iwd[951]: Interface Types: ap p2p-go
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Interface Types: station p2p-client
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: 6GHz Band:
Jul 11 21:38:35 hacking iwd[951]: Bitrates (non-HT):
Jul 11 21:38:35 hacking iwd[951]: 6.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 9.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 12.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 18.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 24.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 36.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 48.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: 54.0 Mbps
Jul 11 21:38:35 hacking iwd[951]: HE Capabilities
Jul 11 21:38:35 hacking iwd[951]: Interface Types: ap p2p-go
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Interface Types: station p2p-client
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 80MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE RX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Max HE TX <= 160MHz MCS: 0-11 for NSS: 2
Jul 11 21:38:35 hacking iwd[951]: Ciphers: BIP-GMAC-256 BIP-GMAC-128 GCMP-256 GCMP-128
Jul 11 21:38:35 hacking iwd[951]: BIP-CMAC-128 CCMP-128 TKIP
Jul 11 21:38:35 hacking iwd[951]: Supported iftypes: ad-hoc station ap p2p-client p2p-go p2p-device
Jul 11 21:38:35 hacking kernel: ------------[ cut here ]------------
Jul 11 21:38:35 hacking kernel: WARNING: CPU: 0 PID: 951 at net/wireless/nl80211.c:8819 nl80211_get_reg_do+0x1e4/0x210 [cfg80211]
Jul 11 21:38:35 hacking kernel: Modules linked in: ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet
Jul 11 21:38:35 hacking kernel: videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone
Jul 11 21:38:35 hacking kernel: acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:38:35 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:38:35 hacking kernel: CPU: 0 UID: 0 PID: 951 Comm: iwd Tainted: G OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:38:35 hacking kernel: Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:38:35 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:38:35 hacking kernel: RIP: 0010:nl80211_get_reg_do+0x1e4/0x210 [cfg80211]
Jul 11 21:38:35 hacking kernel: Code: 4c 24 0c ba 04 00 00 00 be 9a 00 00 00 48 89 df c7 44 24 0c 01 00 00 00 e8 69 55 d6 ee 85 c0 0f 84 4f ff ff ff e9 18 ff ff ff <0f> 0b bd ea ff ff ff e9 11 ff ff ff 89 c5 e9 0f ff ff ff bd 97 ff
Jul 11 21:38:35 hacking kernel: RSP: 0018:ffffcf92046b3860 EFLAGS: 00010a02
Jul 11 21:38:35 hacking kernel: RAX: 0000000000000000 RBX: ffff896681c23700 RCX: 0000000000000000
Jul 11 21:38:35 hacking kernel: RDX: ffff896686af0000 RSI: 0000000000000000 RDI: ffff8966835183c0
Jul 11 21:38:35 hacking kernel: RBP: ffffcf92046b38c0 R08: 0000000000000000 R09: ffff896683299014
Jul 11 21:38:35 hacking kernel: R10: 0000000000000000 R11: ffffffffc1710bf0 R12: ffff896683299014
Jul 11 21:38:35 hacking kernel: R13: ffff896681c23600 R14: ffff8966835183c0 R15: 0000000000000001
Jul 11 21:38:35 hacking kernel: FS: 00007f671bb7eb80(0000) GS:ffff896e2d72d000(0000) knlGS:0000000000000000
Jul 11 21:38:35 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:38:35 hacking kernel: CR2: 000055b8f4cf9a50 CR3: 0000000101899004 CR4: 0000000000f72ef0
Jul 11 21:38:35 hacking kernel: PKRU: 55555554
Jul 11 21:38:35 hacking kernel: Call Trace:
Jul 11 21:38:35 hacking kernel: <TASK>
Jul 11 21:38:35 hacking kernel: genl_family_rcv_msg_doit+0xfc/0x160
Jul 11 21:38:35 hacking kernel: genl_rcv_msg+0x1aa/0x2b0
Jul 11 21:38:35 hacking kernel: ? __pfx_nl80211_pre_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429]
Jul 11 21:38:35 hacking kernel: ? __pfx_nl80211_get_reg_do+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429]
Jul 11 21:38:35 hacking kernel: ? __pfx_nl80211_post_doit+0x10/0x10 [cfg80211 a576ba9b96370ab577fbfc53bd914db582fc7429]
Jul 11 21:38:35 hacking kernel: ? __pfx_genl_rcv_msg+0x10/0x10
Jul 11 21:38:35 hacking kernel: netlink_rcv_skb+0x59/0x110
Jul 11 21:38:35 hacking kernel: genl_rcv+0x28/0x40
Jul 11 21:38:35 hacking kernel: netlink_unicast+0x26f/0x3a0
Jul 11 21:38:35 hacking kernel: netlink_sendmsg+0x207/0x440
Jul 11 21:38:35 hacking kernel: __sys_sendto+0x1f4/0x200
Jul 11 21:38:35 hacking kernel: __x64_sys_sendto+0x24/0x30
Jul 11 21:38:35 hacking kernel: do_syscall_64+0x7b/0x810
Jul 11 21:38:35 hacking kernel: ? ep_send_events+0x2a3/0x2f0
Jul 11 21:38:35 hacking kernel: ? do_epoll_wait+0x19b/0x530
Jul 11 21:38:35 hacking kernel: ? __x64_sys_epoll_wait+0x70/0x120
Jul 11 21:38:35 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 11 21:38:35 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 11 21:38:35 hacking kernel: ? ksys_write+0xd0/0xe0
Jul 11 21:38:35 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 11 21:38:35 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 11 21:38:35 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0
Jul 11 21:38:35 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jul 11 21:38:35 hacking kernel: RIP: 0033:0x7f671bc12006
Jul 11 21:38:35 hacking kernel: Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08
Jul 11 21:38:35 hacking kernel: RSP: 002b:00007ffd47eb0040 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
Jul 11 21:38:35 hacking kernel: RAX: ffffffffffffffda RBX: 000055b923bb18f0 RCX: 00007f671bc12006
Jul 11 21:38:35 hacking kernel: RDX: 000000000000001c RSI: 000055b923bbd4c0 RDI: 0000000000000004
Jul 11 21:38:35 hacking kernel: RBP: 00007ffd47eb0060 R08: 0000000000000000 R09: 0000000000000000
Jul 11 21:38:35 hacking kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 000055b923bbd4c0
Jul 11 21:38:35 hacking kernel: R13: 000055b923bbcb70 R14: 0000000000000001 R15: 0000000000000000
Jul 11 21:38:35 hacking kernel: </TASK>
Jul 11 21:38:35 hacking kernel: ---[ end trace 0000000000000000 ]---
Jul 11 21:38:35 hacking sudo[1026]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0
Jul 11 21:38:35 hacking sudo[1026]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:38:35 hacking dhcpcd[1030]: dhcpcd-10.2.4 starting
Jul 11 21:38:35 hacking dhcpcd[1033]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e
Jul 11 21:38:35 hacking kernel: 8021q: 802.1Q VLAN Support v1.8
Jul 11 21:38:36 hacking iwd[951]: event: state, old: disconnected, new: autoconnect_quick
Jul 11 21:38:36 hacking dhcpcd[1033]: wlan0: interface not found
Jul 11 21:38:36 hacking dhcpcd[1033]: dhcpcd exited
Jul 11 21:38:36 hacking sudo[1026]: pam_unix(sudo:session): session closed for user root
Jul 11 21:38:36 hacking iwd[951]: udev interface=wlan0 ifindex=5
Jul 11 21:38:36 hacking iwd[951]: event: state, old: autoconnect_quick, new: autoconnect_full
Jul 11 21:38:37 hacking sudo[1045]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome
Jul 11 21:38:37 hacking sudo[1045]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:38:37 hacking sudo[1045]: pam_unix(sudo:session): session closed for user root
Jul 11 21:38:37 hacking sudo[1049]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0
Jul 11 21:38:37 hacking sudo[1049]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:38:37 hacking dhcpcd[1052]: dhcpcd-10.2.4 starting
Jul 11 21:38:37 hacking dhcpcd[1055]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e
Jul 11 21:38:37 hacking dhcpcd[1055]: wlan0: waiting for carrier
Jul 11 21:38:40 hacking dhcpcd[1055]: received SIGINT, stopping
Jul 11 21:38:40 hacking dhcpcd[1055]: wlan0: removing interface
Jul 11 21:38:40 hacking dhcpcd[1055]: dhcpcd exited
Jul 11 21:38:40 hacking sudo[1049]: pam_unix(sudo:session): session closed for user root
Jul 11 21:38:41 hacking sudo[1077]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/iwctl station wlan0 connect monkeyhome
Jul 11 21:38:41 hacking sudo[1077]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:38:41 hacking sudo[1077]: pam_unix(sudo:session): session closed for user root
Jul 11 21:38:41 hacking sudo[1081]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/dhcpcd wlan0
Jul 11 21:38:41 hacking sudo[1081]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:38:41 hacking dhcpcd[1084]: dhcpcd-10.2.4 starting
Jul 11 21:38:41 hacking dhcpcd[1087]: DUID 00:01:00:01:30:02:1a:43:5c:b4:7e:c1:32:3e
Jul 11 21:38:41 hacking dhcpcd[1087]: wlan0: waiting for carrier
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ae:70:5d:9a:e6:01
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8c:76:3f:a4:76:24
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8e:76:3f:a4:76:24
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 96:76:3f:a4:76:24
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for de:ec:5e:56:33:a1
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 0e:93:7c:62:82:ec
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 1c:93:7c:62:82:ec
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 16:93:7c:62:82:ec
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ee:9f:80:7c:cd:dc
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8c:76:3f:a8:f7:a4
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 96:76:3f:a8:f7:a4
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 1c:93:7c:62:82:ed
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 0e:93:7c:62:82:ed
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 16:93:7c:62:82:ed
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 0a:93:7c:62:82:ed
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8c:76:3f:a4:76:25
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 12:93:7c:62:82:ed
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8e:76:3f:a4:76:25
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 96:76:3f:a4:76:25
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ee:79:0a:e6:ef:5b
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 92:76:3f:a4:76:25
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for f6:79:0a:e6:ef:5b
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for 8e:76:3f:a8:f7:a4
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for ea:79:0a:e6:ef:5b
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for aa:70:5d:5b:d1:b9
Jul 11 21:38:42 hacking iwd[951]: invalid HE capabilities for d8:ec:5e:56:33:a2
Jul 11 21:38:42 hacking iwd[951]: event: connect-info, ssid: monkeyhome, bss: 8c:76:3f:a4:76:25, signal: -33, load: 0/255
Jul 11 21:38:42 hacking iwd[951]: event: state, old: autoconnect_full, new: connecting (auto)
Jul 11 21:38:42 hacking kernel: wlan0: authenticate with 8c:76:3f:a4:76:25 (local address=5c:b4:7e:c1:32:3e)
Jul 11 21:38:42 hacking kernel: wlan0: send auth to 8c:76:3f:a4:76:25 (try 1/3)
Jul 11 21:38:42 hacking kernel: wlan0: authenticated
Jul 11 21:38:42 hacking kernel: wlan0: associate with 8c:76:3f:a4:76:25 (try 1/3)
Jul 11 21:38:42 hacking kernel: wlan0: RX AssocResp from 8c:76:3f:a4:76:25 (capab=0x1011 status=0 aid=2)
Jul 11 21:38:42 hacking kernel: wlan0: associated
Jul 11 21:38:42 hacking iwd[951]: event: state, old: connecting (auto), new: connected
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: carrier acquired
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: connected to Access Point: monkeyhome
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: IAID 7e:c1:32:3e
Jul 11 21:38:42 hacking dhcpcd[1087]: wlan0: adding address fe80::3790:a395:9999:c66
Jul 11 21:38:42 hacking kernel: wlan0: Limiting TX power to 30 (30 - 0) dBm as advertised by 8c:76:3f:a4:76:25
Jul 11 21:38:43 hacking dhcpcd[1087]: wlan0: rebinding lease of 10.0.0.199
Jul 11 21:38:43 hacking dhcpcd[1087]: wlan0: probing address 10.0.0.199/24
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: soliciting an IPv6 router
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: Router Advertisement from fe80::8e76:3fff:fea4:7623
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: adding address 2601:647:4700:79e0:a4d3:a029:3fe1:b2c0/64
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: adding route to 2601:647:4700:79e0::/64
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: adding default route via fe80::8e76:3fff:fea4:7623
Jul 11 21:38:44 hacking dhcpcd[1087]: wlan0: confirming prior DHCPv6 lease
Jul 11 21:38:45 hacking dhcpcd[1087]: wlan0: REPLY6 received from fe80::8e76:3fff:fea4:7623
Jul 11 21:38:45 hacking dhcpcd[1087]: wlan0: adding address 2601:647:4700:79e0::c146/128
Jul 11 21:38:45 hacking dhcpcd[1087]: wlan0: renew in 6640, rebind in 110320, expire in 179440 seconds
Jul 11 21:38:46 hacking sudo[1081]: pam_unix(sudo:session): session closed for user root
Jul 11 21:38:48 hacking dhcpcd[1087]: wlan0: leased 10.0.0.199 for 172800 seconds
Jul 11 21:38:48 hacking dhcpcd[1087]: wlan0: adding route to 10.0.0.0/24
Jul 11 21:38:48 hacking dhcpcd[1087]: wlan0: adding default route via 10.0.0.1
Jul 11 21:38:56 hacking sudo[1227]: ray : TTY=pts/1 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/kanata --cfg /home/ray/.config/kanata/config.kbd
Jul 11 21:38:56 hacking sudo[1227]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:38:56 hacking kernel: input: kanata as /devices/virtual/input/input24
Jul 11 21:38:57 hacking systemd-logind[616]: Watching system buttons on /dev/input/event20 (kanata)
Jul 11 21:39:36 hacking kernel: warning: `ThreadPoolForeg' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211
Jul 11 21:39:36 hacking systemd[684]: Starting Accessibility services bus...
Jul 11 21:39:36 hacking systemd[684]: Started Accessibility services bus.
Jul 11 21:39:36 hacking systemd[684]: Started app-com.google.Chrome-1466.scope.
Jul 11 21:39:48 hacking systemd[684]: Started PipeWire Multimedia Service.
Jul 11 21:39:48 hacking systemd[684]: Started Multimedia Service Session Manager.
Jul 11 21:39:48 hacking systemd[684]: Started PipeWire PulseAudio.
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit does not give us MinNiceLevel, using 0
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking wireplumber[2381]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit does not give us MinNiceLevel, using 0
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit does not give us MaxRealtimePriority, using 1
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking pipewire-pulse[2382]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit does not give us MinNiceLevel, using 0
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit error: org.freedesktop.DBus.Error.ServiceUnknown
Jul 11 21:39:48 hacking pipewire[2380]: mod.rt: RTKit does not give us RTTimeUSecMax, using -1
Jul 11 21:39:48 hacking wireplumber[2381]: default: Failed to get percentage from UPower: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 11 21:39:48 hacking kernel: Bluetooth: RFCOMM TTY layer initialized
Jul 11 21:39:48 hacking kernel: Bluetooth: RFCOMM socket layer initialized
Jul 11 21:39:48 hacking kernel: Bluetooth: RFCOMM ver 1.11
Jul 11 21:39:48 hacking wireplumber[2381]: wp-device: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 11 21:39:48 hacking wireplumber[2381]: s-monitors-libcamera: PipeWire's libcamera SPA plugin is missing or broken. Some camera types may not be supported.
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/ldac
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/aptx_hd
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_hd
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/aptx
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/aac
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aac
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/opus_g
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/opus_g
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/sbc
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/sbc
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_1
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_0
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/faststream
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/faststream_duplex
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/opus_05
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/opus_05
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/opus_05_duplex
Jul 11 21:39:48 hacking bluetoothd[613]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/opus_05_duplex
Jul 11 21:39:49 hacking wireplumber[2381]: m-portal-permissionstore: <WpPortalPermissionStorePlugin:0x55fb30c94b30> Lookup: The name is not activatable (org.freedesktop.DBus.Error.ServiceUnknown)
Jul 11 21:40:06 hacking chrome[1466]: [1466:1483:0711/214006.803944:INFO:chrome/browser/extensions/extension_garbage_collector.cc:184] Garbage collection for extensions on file thread is complete.
Jul 11 21:40:30 hacking systemd[684]: Started tmux child pane 3107 launched by process 811.
Jul 11 21:42:07 hacking sudo[3849]: ray : TTY=pts/4 ; PWD=/home/ray ; USER=root ; COMMAND=/usr/bin/rm /etc/modprobe.d/tuxedo_keyboard.conf
Jul 11 21:42:07 hacking sudo[3849]: pam_unix(sudo:session): session opened for user root(uid=0) by ray(uid=1000)
Jul 11 21:42:07 hacking sudo[3849]: pam_unix(sudo:session): session closed for user root
Jul 11 21:43:18 hacking kernel: Oops: general protection fault, probably for non-canonical address 0xd0000000b60018: 0000 [#1] SMP NOPTI
Jul 11 21:43:18 hacking kernel: CPU: 8 UID: 0 PID: 4291 Comm: dhcpcd-run-hook Tainted: G W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:18 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:18 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:18 hacking kernel: RIP: 0010:vma_interval_tree_insert+0x36/0xe0
Jul 11 21:43:18 hacking kernel: Code: 48 8b 7f 50 49 89 f2 49 8b 40 08 49 2b 00 48 c1 e8 0c 48 8d 74 07 ff 49 8b 02 48 85 c0 74 70 41 b9 01 00 00 00 eb 03 48 89 d0 <48> 39 70 18 73 04 48 89 70 18 48 8d 48 10 48 3b 78 c8 72 07 48 8d
Jul 11 21:43:18 hacking kernel: RSP: 0018:ffffcf9224307a40 EFLAGS: 00010206
Jul 11 21:43:18 hacking kernel: RAX: 00d0000000b60000 RBX: ffffcf9224307a78 RCX: ffff8967b8b154d0
Jul 11 21:43:18 hacking kernel: RDX: 00d0000000b60000 RSI: 0000000000000038 RDI: 0000000000000001
Jul 11 21:43:18 hacking kernel: RBP: ffff8966fdb298c0 R08: ffff8966fdb28240 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: ffff896689c9bdd0 R11: 0000000000000000 R12: ffff8966880b8000
Jul 11 21:43:18 hacking kernel: R13: ffffcf9224307c98 R14: 00007fab9125f000 R15: 0000000000000000
Jul 11 21:43:18 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d92d000(0000) knlGS:0000000000000000
Jul 11 21:43:18 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:18 hacking kernel: CR2: 0000558766b3530c CR3: 00000001f1fe8002 CR4: 0000000000f72ef0
Jul 11 21:43:18 hacking kernel: PKRU: 55555554
Jul 11 21:43:18 hacking kernel: Call Trace:
Jul 11 21:43:18 hacking kernel: <TASK>
Jul 11 21:43:18 hacking kernel: vma_complete+0x45/0x300
Jul 11 21:43:18 hacking kernel: __split_vma+0x24b/0x300
Jul 11 21:43:18 hacking kernel: vms_gather_munmap_vmas+0x46/0x2c0
Jul 11 21:43:18 hacking kernel: do_vmi_align_munmap+0xeb/0x1e0
Jul 11 21:43:18 hacking kernel: do_vmi_munmap+0xd0/0x170
Jul 11 21:43:18 hacking kernel: __vm_munmap+0xad/0x170
Jul 11 21:43:18 hacking kernel: elf_load+0x20f/0x290
Jul 11 21:43:18 hacking kernel: load_elf_binary+0xb35/0x1830
Jul 11 21:43:18 hacking kernel: ? __kernel_read+0x1e1/0x300
Jul 11 21:43:18 hacking kernel: bprm_execve+0x2a9/0x520
Jul 11 21:43:18 hacking kernel: do_execveat_common.isra.0+0x194/0x1a0
Jul 11 21:43:18 hacking kernel: __x64_sys_execve+0x38/0x50
Jul 11 21:43:18 hacking kernel: do_syscall_64+0x7b/0x810
Jul 11 21:43:18 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0
Jul 11 21:43:18 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jul 11 21:43:18 hacking kernel: RIP: 0033:0x7f94844f4bcb
Jul 11 21:43:18 hacking kernel: Code: Unable to access opcode bytes at 0x7f94844f4ba1.
Jul 11 21:43:18 hacking kernel: RSP: 002b:00007f9484cfde68 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
Jul 11 21:43:18 hacking kernel: RAX: ffffffffffffffda RBX: 00007ffed6baa1c0 RCX: 00007f94844f4bcb
Jul 11 21:43:18 hacking kernel: RDX: 000055bd2fdc1ff0 RSI: 00007ffed6baa3d0 RDI: 000055bd1a4f3288
Jul 11 21:43:18 hacking kernel: RBP: 00007f9484cfdff0 R08: 0000000000000000 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffed6ba9ef0
Jul 11 21:43:18 hacking kernel: R13: 0000000000000040 R14: 0000000000000001 R15: 00007f9484cfdf20
Jul 11 21:43:18 hacking kernel: </TASK>
Jul 11 21:43:18 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:18 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:18 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:18 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:18 hacking kernel: ---[ end trace 0000000000000000 ]---
Jul 11 21:43:18 hacking kernel: RIP: 0010:vma_interval_tree_insert+0x36/0xe0
Jul 11 21:43:18 hacking kernel: Code: 48 8b 7f 50 49 89 f2 49 8b 40 08 49 2b 00 48 c1 e8 0c 48 8d 74 07 ff 49 8b 02 48 85 c0 74 70 41 b9 01 00 00 00 eb 03 48 89 d0 <48> 39 70 18 73 04 48 89 70 18 48 8d 48 10 48 3b 78 c8 72 07 48 8d
Jul 11 21:43:18 hacking kernel: RSP: 0018:ffffcf9224307a40 EFLAGS: 00010206
Jul 11 21:43:18 hacking kernel: RAX: 00d0000000b60000 RBX: ffffcf9224307a78 RCX: ffff8967b8b154d0
Jul 11 21:43:18 hacking kernel: RDX: 00d0000000b60000 RSI: 0000000000000038 RDI: 0000000000000001
Jul 11 21:43:18 hacking kernel: RBP: ffff8966fdb298c0 R08: ffff8966fdb28240 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: ffff896689c9bdd0 R11: 0000000000000000 R12: ffff8966880b8000
Jul 11 21:43:18 hacking kernel: R13: ffffcf9224307c98 R14: 00007fab9125f000 R15: 0000000000000000
Jul 11 21:43:18 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d92d000(0000) knlGS:0000000000000000
Jul 11 21:43:18 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:18 hacking kernel: CR2: 00007f94844f4ba1 CR3: 00000001f1fe8002 CR4: 0000000000f72ef0
Jul 11 21:43:18 hacking kernel: PKRU: 55555554
Jul 11 21:43:24 hacking kernel: watchdog: CPU10: Watchdog detected hard LOCKUP on cpu 10
Jul 11 21:43:24 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:24 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:24 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:24 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:24 hacking kernel: CPU: 10 UID: 0 PID: 0 Comm: swapper/10 Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:24 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:24 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:24 hacking kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x2c4/0x2f0
Jul 11 21:43:24 hacking kernel: Code: 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 c0 5f 90 b2 48 03 04 f5 80 ff 2f b1 48 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 <85> c0 74 f7 48 8b 32 48 85 f6 0f 84 6c ff ff ff 0f 0d 0e e9 64 ff
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf9200430db0 EFLAGS: 00000046
Jul 11 21:43:24 hacking kernel: RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffff896686d80e04
Jul 11 21:43:24 hacking kernel: RDX: ffff896de02b2fc0 RSI: 0000000000000011 RDI: ffff896686d80e04
Jul 11 21:43:24 hacking kernel: RBP: 0000000000000000 R08: 00000000002c0000 R09: ffff896e2d9ad000
Jul 11 21:43:24 hacking kernel: R10: 00000000002c0000 R11: 0000000000000000 R12: ffff896686d80e04
Jul 11 21:43:24 hacking kernel: R13: 0000000000000008 R14: 000000000000000a R15: ffff8966801d4200
Jul 11 21:43:24 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d9ad000(0000) knlGS:0000000000000000
Jul 11 21:43:24 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:24 hacking kernel: CR2: 000006ec01824100 CR3: 00000001cc41b003 CR4: 0000000000f72ef0
Jul 11 21:43:24 hacking kernel: PKRU: 55555554
Jul 11 21:43:24 hacking kernel: Call Trace:
Jul 11 21:43:24 hacking kernel: <IRQ>
Jul 11 21:43:24 hacking kernel: _raw_spin_lock_irqsave+0x3d/0x50
Jul 11 21:43:24 hacking kernel: try_to_wake_up+0x53/0x740
Jul 11 21:43:24 hacking kernel: ? sched_balance_rq+0x222/0x1070
Jul 11 21:43:24 hacking kernel: ? rcu_sched_clock_irq+0x7b0/0xb60
Jul 11 21:43:24 hacking kernel: kick_pool+0x5f/0x150
Jul 11 21:43:24 hacking kernel: __queue_work+0x2b9/0x430
Jul 11 21:43:24 hacking kernel: ? __pfx_delayed_work_timer_fn+0x10/0x10
Jul 11 21:43:24 hacking kernel: call_timer_fn+0x26/0x120
Jul 11 21:43:24 hacking kernel: ? __pfx_delayed_work_timer_fn+0x10/0x10
Jul 11 21:43:24 hacking kernel: __run_timers+0x18a/0x280
Jul 11 21:43:24 hacking kernel: run_timer_softirq+0xce/0xf0
Jul 11 21:43:24 hacking kernel: handle_softirqs+0xe3/0x2a0
Jul 11 21:43:24 hacking kernel: __irq_exit_rcu+0xcb/0xf0
Jul 11 21:43:24 hacking kernel: sysvec_apic_timer_interrupt+0x71/0x90
Jul 11 21:43:24 hacking kernel: </IRQ>
Jul 11 21:43:24 hacking kernel: <TASK>
Jul 11 21:43:24 hacking kernel: asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jul 11 21:43:24 hacking kernel: RIP: 0010:cpuidle_enter_state+0xbb/0x410
Jul 11 21:43:24 hacking kernel: Code: 00 00 e8 f8 d6 0c ff e8 83 f1 ff ff 48 89 c5 0f 1f 44 00 00 31 ff e8 a4 48 0b ff 45 84 ff 0f 85 33 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 7c 01 00 00 49 63 ce 48 2b 2c 24 48 6b d1 68 48 89
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf92001f7e78 EFLAGS: 00000246
Jul 11 21:43:24 hacking kernel: RAX: ffff896e2d9ad000 RBX: 0000000000000002 RCX: 0000000000000000
Jul 11 21:43:24 hacking kernel: RDX: 0000005227c071ae RSI: fffffffb8765c0cb RDI: 0000000000000000
Jul 11 21:43:24 hacking kernel: RBP: 0000005227c071ae R08: 0000000000000000 R09: ffff896de02a0d60
Jul 11 21:43:24 hacking kernel: R10: ffff896de02a0d00 R11: 0000000000000002 R12: ffffef91ffc81698
Jul 11 21:43:24 hacking kernel: R13: ffffffffb1dede60 R14: 0000000000000002 R15: 0000000000000000
Jul 11 21:43:24 hacking kernel: ? cpuidle_enter_state+0xac/0x410
Jul 11 21:43:24 hacking kernel: cpuidle_enter+0x31/0x50
Jul 11 21:43:24 hacking kernel: do_idle+0x1b1/0x210
Jul 11 21:43:24 hacking kernel: cpu_startup_entry+0x29/0x30
Jul 11 21:43:24 hacking kernel: start_secondary+0x119/0x140
Jul 11 21:43:24 hacking kernel: common_startup_64+0x13e/0x141
Jul 11 21:43:24 hacking kernel: </TASK>
Jul 11 21:43:24 hacking kernel: iwlwifi 0000:2d:00.0: Queue 3 is stuck 17902 17912
Jul 11 21:43:24 hacking kernel: non-paged memory
Jul 11 21:43:24 hacking kernel: ------------[ cut here ]------------
Jul 11 21:43:24 hacking kernel: list_del corruption. prev->next should be fffffbbe453b2988, but was fff3fbbe451f2988. (prev=fffffbbe48e26208)
Jul 11 21:43:24 hacking kernel: WARNING: CPU: 6 PID: 0 at lib/list_debug.c:62 __list_del_entry_valid_or_report+0xfa/0x10a
Jul 11 21:43:24 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:24 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:24 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:24 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:24 hacking kernel: CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:24 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:24 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:24 hacking kernel: RIP: 0010:__list_del_entry_valid_or_report+0xfa/0x10a
Jul 11 21:43:24 hacking kernel: Code: e8 7b 30 11 00 0f 0b e9 77 ff ff ff 4c 89 e7 e8 6c 00 3d 00 49 8b 14 24 4c 89 e1 48 89 de 48 c7 c7 50 63 1f b1 e8 56 30 11 00 <0f> 0b e9 52 ff ff ff 5b 5d 41 5c c3 cc cc cc cc 48 89 df e8 1e fe
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf9200360c78 EFLAGS: 00010046
Jul 11 21:43:24 hacking kernel: RAX: 0000000000000000 RBX: fffffbbe453b2988 RCX: 0000000000000027
Jul 11 21:43:24 hacking kernel: RDX: ffff896de019cbc8 RSI: 0000000000000001 RDI: ffff896de019cbc0
Jul 11 21:43:24 hacking kernel: RBP: ffff896de01b7fa0 R08: 0000000000000000 R09: 00000000ffffefff
Jul 11 21:43:24 hacking kernel: R10: ffffffffb1c60f20 R11: ffffcf9200360b10 R12: fffffbbe48e26208
Jul 11 21:43:24 hacking kernel: R13: ffff896de01b7f80 R14: 0000000000000000 R15: 000000000000028b
Jul 11 21:43:24 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d8ad000(0000) knlGS:0000000000000000
Jul 11 21:43:24 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:24 hacking kernel: CR2: 000008cc03e46000 CR3: 0000000117f42006 CR4: 0000000000f72ef0
Jul 11 21:43:24 hacking kernel: PKRU: 55555554
Jul 11 21:43:24 hacking kernel: Call Trace:
Jul 11 21:43:24 hacking kernel: <IRQ>
Jul 11 21:43:24 hacking kernel: free_pcppages_bulk.cold+0x17/0x2b
Jul 11 21:43:24 hacking kernel: free_frozen_page_commit+0x182/0x2f0
Jul 11 21:43:24 hacking kernel: __free_frozen_pages+0x4db/0x5f0
Jul 11 21:43:24 hacking kernel: __put_partials+0xf6/0x120
Jul 11 21:43:24 hacking kernel: kmem_cache_free+0x40c/0x4d0
Jul 11 21:43:24 hacking kernel: bio_free+0x2f/0x50
Jul 11 21:43:24 hacking kernel: blk_mq_end_request_batch+0x114/0x540
Jul 11 21:43:24 hacking kernel: nvme_irq+0x7a/0x90 [nvme 3bec3f65c0d9a7a5b2f55d5745cc486e5f920baf]
Jul 11 21:43:24 hacking kernel: ? __pfx_nvme_pci_complete_batch+0x10/0x10 [nvme 3bec3f65c0d9a7a5b2f55d5745cc486e5f920baf]
Jul 11 21:43:24 hacking kernel: __handle_irq_event_percpu+0x47/0x1b0
Jul 11 21:43:24 hacking kernel: handle_irq_event+0x38/0x80
Jul 11 21:43:24 hacking kernel: handle_edge_irq+0x8b/0x220
Jul 11 21:43:24 hacking kernel: __common_interrupt+0x3e/0xa0
Jul 11 21:43:24 hacking kernel: common_interrupt+0x80/0xa0
Jul 11 21:43:24 hacking kernel: </IRQ>
Jul 11 21:43:24 hacking kernel: <TASK>
Jul 11 21:43:24 hacking kernel: asm_common_interrupt+0x26/0x40
Jul 11 21:43:24 hacking kernel: RIP: 0010:cpuidle_enter_state+0xbb/0x410
Jul 11 21:43:24 hacking kernel: Code: 00 00 e8 f8 d6 0c ff e8 83 f1 ff ff 48 89 c5 0f 1f 44 00 00 31 ff e8 a4 48 0b ff 45 84 ff 0f 85 33 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 7c 01 00 00 49 63 ce 48 2b 2c 24 48 6b d1 68 48 89
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf92001d7e78 EFLAGS: 00000246
Jul 11 21:43:24 hacking kernel: RAX: ffff896e2d8ad000 RBX: 0000000000000002 RCX: 0000000000000000
Jul 11 21:43:24 hacking kernel: RDX: 00000054c780d693 RSI: fffffffb8765c0cb RDI: 0000000000000000
Jul 11 21:43:24 hacking kernel: RBP: 00000054c780d693 R08: 0000000000000000 R09: 000000000000a46b
Jul 11 21:43:24 hacking kernel: R10: 00000000ffffffff R11: 00000000000000a8 R12: ffffef91ffb81698
Jul 11 21:43:24 hacking kernel: R13: ffffffffb1dede60 R14: 0000000000000002 R15: 0000000000000000
Jul 11 21:43:24 hacking kernel: ? cpuidle_enter_state+0xac/0x410
Jul 11 21:43:24 hacking kernel: cpuidle_enter+0x31/0x50
Jul 11 21:43:24 hacking kernel: do_idle+0x1b1/0x210
Jul 11 21:43:24 hacking kernel: cpu_startup_entry+0x29/0x30
Jul 11 21:43:24 hacking kernel: start_secondary+0x119/0x140
Jul 11 21:43:24 hacking kernel: common_startup_64+0x13e/0x141
Jul 11 21:43:24 hacking kernel: </TASK>
Jul 11 21:43:24 hacking kernel: ---[ end trace 0000000000000000 ]---
Jul 11 21:43:25 hacking kernel: traps: chrome[1959] general protection fault ip:55b0dcc87f01 sp:7fffd5127fb0 error:0 in chrome[3a5ff01,55b0dbf7a000+c2eb000]
Jul 11 21:43:27 hacking kernel: traps: HangWatcher[2816] general protection fault ip:7f26bf0ecd39 sp:7f262c7eaff0 error:0 in libc.so.6[99d39,7f26bf077000+170000]
Jul 11 21:43:44 hacking kernel: watchdog: CPU5: Watchdog detected hard LOCKUP on cpu 5
Jul 11 21:43:44 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:44 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:44 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:44 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:44 hacking kernel: CPU: 5 UID: 0 PID: 127 Comm: khugepaged Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:44 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:44 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:44 hacking kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x64/0x2f0
Jul 11 21:43:44 hacking kernel: Code: 77 79 f0 0f ba 29 08 0f 92 c2 8b 01 0f b6 d2 c1 e2 08 30 e4 09 d0 3d ff 00 00 00 77 55 85 c0 74 10 0f b6 01 84 c0 74 09 f3 90 <0f> b6 01 84 c0 75 f7 b8 01 00 00 00 66 89 01 65 48 ff 05 0d 11 fc
Jul 11 21:43:44 hacking kernel: RSP: 0018:ffffcf920062fd50 EFLAGS: 00000002
Jul 11 21:43:44 hacking kernel: RAX: 0000000000000001 RBX: ffff896de02ac4e0 RCX: ffff896de02b1280
Jul 11 21:43:44 hacking kernel: RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff896de02b1280
Jul 11 21:43:44 hacking kernel: RBP: ffff896de02b1280 R08: ffffffffb1ed50a0 R09: ffffffffb28ef9f4
Jul 11 21:43:44 hacking kernel: R10: 0000000000000009 R11: ffff896e2d96d000 R12: ffff8966802f4000
Jul 11 21:43:44 hacking kernel: R13: 000000000000000a R14: 000000000000000a R15: ffff8966801d4200
Jul 11 21:43:44 hacking kernel: FS: 0000000000000000(0000) GS:ffff896e2d86d000(0000) knlGS:0000000000000000
Jul 11 21:43:44 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:44 hacking kernel: CR2: 000055b0b8265000 CR3: 00000001ceaf8003 CR4: 0000000000f72ef0
Jul 11 21:43:44 hacking kernel: PKRU: 55555554
Jul 11 21:43:44 hacking kernel: Call Trace:
Jul 11 21:43:44 hacking kernel: <TASK>
Jul 11 21:43:44 hacking kernel: _raw_spin_lock+0x29/0x30
Jul 11 21:43:44 hacking kernel: __queue_work+0xa5/0x430
Jul 11 21:43:44 hacking kernel: queue_work_on+0x73/0x80
Jul 11 21:43:44 hacking kernel: ? __pfx_khugepaged+0x10/0x10
Jul 11 21:43:44 hacking kernel: __lru_add_drain_all+0x113/0x1f0
Jul 11 21:43:44 hacking kernel: khugepaged+0x65/0x970
Jul 11 21:43:44 hacking kernel: ? __pfx_autoremove_wake_function+0x10/0x10
Jul 11 21:43:44 hacking kernel: ? __pfx_khugepaged+0x10/0x10
Jul 11 21:43:44 hacking kernel: kthread+0xf9/0x240
Jul 11 21:43:44 hacking kernel: ? __pfx_kthread+0x10/0x10
Jul 11 21:43:44 hacking kernel: ret_from_fork+0x31/0x50
Jul 11 21:43:44 hacking kernel: ? __pfx_kthread+0x10/0x10
Jul 11 21:43:44 hacking kernel: ret_from_fork_asm+0x1a/0x30
Jul 11 21:43:44 hacking kernel: </TASK>
Jul 11 21:43:44 hacking kernel: watchdog: BUG: soft lockup - CPU#2 stuck for 22s! [chrome:1929]
Jul 11 21:43:44 hacking kernel: CPU#2 Utilization every 4s during lockup:
Jul 11 21:43:44 hacking kernel: #1: 100% system, 0% softirq, 0% hardirq, 0% idle
Jul 11 21:43:44 hacking kernel: #2: 100% system, 0% softirq, 1% hardirq, 0% idle
Jul 11 21:43:44 hacking kernel: #3: 101% system, 0% softirq, 0% hardirq, 0% idle
Jul 11 21:43:44 hacking kernel: #4: 100% system, 0% softirq, 0% hardirq, 0% idle
Jul 11 21:43:44 hacking kernel: #5: 100% system, 0% softirq, 0% hardirq, 0% idle
Jul 11 21:43:44 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:44 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:44 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:44 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:44 hacking kernel: CPU: 2 UID: 1000 PID: 1929 Comm: chrome Tainted: G D W OE 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:44 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:44 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:44 hacking kernel: RIP: 0010:smp_call_function_many_cond+0x2c0/0x4a0
Jul 11 21:43:44 hacking kernel: Code: 3d 6d 00 3b 05 b1 48 46 02 48 89 c2 0f 83 08 fe ff ff 48 63 c2 49 8b 4d 00 48 03 0c c5 80 ff 2f b1 8b 41 08 a8 01 74 09 f3 90 <8b> 41 08 a8 01 75 f7 83 c2 01 eb bb 48 85 db 0f 84 8d fd ff ff 48
Jul 11 21:43:44 hacking kernel: RSP: 0018:ffffcf920c893778 EFLAGS: 00000202
Jul 11 21:43:44 hacking kernel: RAX: 0000000000000011 RBX: 0000000000000202 RCX: ffff896de02b8cc0
Jul 11 21:43:44 hacking kernel: RDX: 000000000000000a RSI: 0000000000000000 RDI: 000000000000000a
Jul 11 21:43:44 hacking kernel: RBP: ffff896de03f8cc0 R08: ffff896680ca3b00 R09: ffff896681113000
Jul 11 21:43:44 hacking kernel: R10: ffff896680ca3118 R11: 0000000000000000 R12: 000000000000000f
Jul 11 21:43:44 hacking kernel: R13: ffff896de00b3480 R14: 0000000000000010 R15: 0000000000000010
Jul 11 21:43:44 hacking kernel: FS: 00007f26be050540(0000) GS:ffff896e2d7ad000(0000) knlGS:0000000000000000
Jul 11 21:43:44 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:44 hacking kernel: CR2: 000007e700091008 CR3: 00000001ae1e7005 CR4: 0000000000f72ef0
Jul 11 21:43:44 hacking kernel: PKRU: 55555558
Jul 11 21:43:44 hacking kernel: Call Trace:
Jul 11 21:43:44 hacking kernel: <TASK>
Jul 11 21:43:44 hacking kernel: ? __pfx_flush_tlb_func+0x10/0x10
Jul 11 21:43:44 hacking kernel: on_each_cpu_cond_mask+0x24/0x40
Jul 11 21:43:44 hacking kernel: flush_tlb_mm_range+0x1ba/0x5b0
Jul 11 21:43:44 hacking kernel: tlb_finish_mmu+0x79/0x1e0
Jul 11 21:43:44 hacking kernel: vms_clear_ptes+0x14d/0x160
Jul 11 21:43:44 hacking kernel: vms_complete_munmap_vmas+0x61/0x180
Jul 11 21:43:44 hacking kernel: do_vmi_align_munmap+0x15c/0x1e0
Jul 11 21:43:44 hacking kernel: do_vmi_munmap+0xd0/0x170
Jul 11 21:43:44 hacking kernel: __vm_munmap+0xad/0x170
Jul 11 21:43:44 hacking kernel: __x64_sys_munmap+0x1b/0x30
Jul 11 21:43:44 hacking kernel: do_syscall_64+0x7b/0x810
Jul 11 21:43:44 hacking kernel: ? __smp_call_single_queue+0xb6/0x120
Jul 11 21:43:44 hacking kernel: ? ttwu_queue_wakelist+0xf7/0x110
Jul 11 21:43:44 hacking kernel: ? try_to_wake_up+0x309/0x740
Jul 11 21:43:44 hacking kernel: ? ep_autoremove_wake_function+0x16/0x60
Jul 11 21:43:44 hacking kernel: ? __wake_up_common+0x6f/0xa0
Jul 11 21:43:44 hacking kernel: ? __wake_up+0x44/0x60
Jul 11 21:43:44 hacking kernel: ? ep_poll_callback+0x2a2/0x2c0
Jul 11 21:43:44 hacking kernel: ? __wake_up_common+0x6f/0xa0
Jul 11 21:43:44 hacking kernel: ? eventfd_write+0xdd/0x210
Jul 11 21:43:44 hacking kernel: ? arch_exit_to_user_mode_prepare.isra.0+0x7c/0x90
Jul 11 21:43:44 hacking kernel: ? security_file_permission+0x48/0x130
Jul 11 21:43:44 hacking kernel: ? vfs_write+0xef/0x470
Jul 11 21:43:44 hacking kernel: ? __seccomp_filter+0x41/0x4e0
Jul 11 21:43:44 hacking kernel: ? ksys_write+0xa8/0xe0
Jul 11 21:43:44 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 11 21:43:44 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 11 21:43:44 hacking kernel: ? do_futex+0x11f/0x190
Jul 11 21:43:44 hacking kernel: ? __x64_sys_futex+0x12d/0x210
Jul 11 21:43:44 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 11 21:43:44 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 11 21:43:44 hacking kernel: ? handle_mm_fault+0x1d2/0x2d0
Jul 11 21:43:44 hacking kernel: ? do_user_addr_fault+0x21a/0x690
Jul 11 21:43:44 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0
Jul 11 21:43:44 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jul 11 21:43:44 hacking kernel: RIP: 0033:0x7f26bf168d6b
Jul 11 21:43:44 hacking kernel: Code: 73 01 c3 48 8b 0d a5 ff 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 75 ff 0c 00 f7 d8 64 89 01 48
Jul 11 21:43:44 hacking kernel: RSP: 002b:00007fffd5127438 EFLAGS: 00000202 ORIG_RAX: 000000000000000b
Jul 11 21:43:44 hacking kernel: RAX: ffffffffffffffda RBX: 0000000000080000 RCX: 00007f26bf168d6b
Jul 11 21:43:44 hacking kernel: RDX: 0000000000080000 RSI: 0000000000080000 RDI: 0000193447218000
Jul 11 21:43:44 hacking kernel: RBP: 00007fffd5127450 R08: 0000000000000004 R09: 0000000000000001
Jul 11 21:43:44 hacking kernel: R10: 0000000000000020 R11: 0000000000000202 R12: 0000000000080000
Jul 11 21:43:44 hacking kernel: R13: 000006ec019387a0 R14: 000055b0e8f85058 R15: 000006ec01938770
Jul 11 21:43:44 hacking kernel: </TASK>
Jul 11 21:43:44 hacking kernel: watchdog: BUG: soft lockup - CPU#13 stuck for 22s! [chrome:3975]
Jul 11 21:43:44 hacking kernel: CPU#13 Utilization every 4s during lockup:
Jul 11 21:43:44 hacking kernel: #1: 100% system, 0% softirq, 0% hardirq, 0% idle
Jul 11 21:43:45 hacking kernel: #2: 100% system, 1% softirq, 0% hardirq, 0% idle
Jul 11 21:43:45 hacking kernel: #3: 100% system, 0% softirq, 0% hardirq, 0% idle
Jul 11 21:43:45 hacking kernel: #4: 100% system, 0% softirq, 0% hardirq, 0% idle
Jul 11 21:43:45 hacking kernel: #5: 101% system, 0% softirq, 1% hardirq, 0% idle
Jul 11 21:43:45 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:45 hacking kernel: sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:45 hacking kernel: tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:45 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:45 hacking kernel: CPU: 13 UID: 1000 PID: 3975 Comm: chrome Tainted: G D W OEL 6.15.6-arch1-1 #1 PREEMPT(full) a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:45 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE, [L]=SOFTLOCKUP
Jul 11 21:43:45 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:45 hacking kernel: RIP: 0010:smp_call_function_many_cond+0x2be/0x4a0
Jul 11 21:43:45 hacking kernel: Code: e8 77 3d 6d 00 3b 05 b1 48 46 02 48 89 c2 0f 83 08 fe ff ff 48 63 c2 49 8b 4d 00 48 03 0c c5 80 ff 2f b1 8b 41 08 a8 01 74 09 <f3> 90 8b 41 08 a8 01 75 f7 83 c2 01 eb bb 48 85 db 0f 84 8d fd ff
Jul 11 21:43:45 hacking kernel: RSP: 0018:ffffcf9224783938 EFLAGS: 00000202
Jul 11 21:43:45 hacking kernel: RAX: 0000000000000011 RBX: 0000000000000202 RCX: ffff896de0178e20
Jul 11 21:43:45 hacking kernel: RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000005
Jul 11 21:43:45 hacking kernel: RBP: ffff896de0338e20 R08: ffff896680ca31d8 R09: ffff896681111c00
Jul 11 21:43:45 hacking kernel: R10: ffff896680ca3598 R11: 0000000000000000 R12: 000000000000000c
Jul 11 21:43:45 hacking kernel: R13: ffff896de0373480 R14: 0000000000000010 R15: 0000000000000010
Jul 11 21:43:45 hacking kernel: FS: 00007f26be050540(0000) GS:ffff896e2da6d000(0000) knlGS:0000000000000000
Jul 11 21:43:45 hacking kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:45 hacking kernel: CR2: 000055b0e4f24d30 CR3: 0000000184f30004 CR4: 0000000000f72ef0
Jul 11 21:43:45 hacking kernel: PKRU: 55555558
Jul 11 21:43:45 hacking kernel: Call Trace:
Jul 11 21:43:45 hacking kernel: <TASK>
Jul 11 21:43:45 hacking kernel: ? __pfx_flush_tlb_func+0x10/0x10
Jul 11 21:43:45 hacking kernel: on_each_cpu_cond_mask+0x24/0x40
Jul 11 21:43:45 hacking kernel: flush_tlb_mm_range+0x1ba/0x5b0
Jul 11 21:43:45 hacking kernel: tlb_finish_mmu+0x79/0x1e0
Jul 11 21:43:45 hacking kernel: vms_clear_ptes+0x14d/0x160
Jul 11 21:43:45 hacking kernel: vms_complete_munmap_vmas+0x61/0x180
Jul 11 21:43:45 hacking kernel: do_vmi_align_munmap+0x15c/0x1e0
Jul 11 21:43:45 hacking kernel: do_vmi_munmap+0xd0/0x170
Jul 11 21:43:45 hacking kernel: __vm_munmap+0xad/0x170
Jul 11 21:43:45 hacking kernel: __x64_sys_munmap+0x1b/0x30
Jul 11 21:43:45 hacking kernel: do_syscall_64+0x7b/0x810
Jul 11 21:43:45 hacking kernel: ? ksys_write+0xa8/0xe0
Jul 11 21:43:45 hacking kernel: ? syscall_exit_to_user_mode+0x37/0x1c0
Jul 11 21:43:45 hacking kernel: ? do_syscall_64+0x87/0x810
Jul 11 21:43:45 hacking kernel: ? __handle_mm_fault+0x7de/0xfd0
Jul 11 21:43:45 hacking kernel: ? __count_memcg_events+0xb0/0x150
Jul 11 21:43:45 hacking kernel: ? count_memcg_events.constprop.0+0x1a/0x30
Jul 11 21:43:45 hacking kernel: ? handle_mm_fault+0x1d2/0x2d0
Jul 11 21:43:45 hacking kernel: ? do_user_addr_fault+0x21a/0x690
Jul 11 21:43:45 hacking kernel: ? irqentry_exit_to_user_mode+0x2c/0x1b0
Jul 11 21:43:45 hacking kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jul 11 21:43:45 hacking kernel: RIP: 0033:0x7f26bf168d6b
Jul 11 21:43:45 hacking kernel: Code: 73 01 c3 48 8b 0d a5 ff 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 75 ff 0c 00 f7 d8 64 89 01 48
Jul 11 21:43:45 hacking kernel: RSP: 002b:00007fffd5127918 EFLAGS: 00000246 ORIG_RAX: 000000000000000b
Jul 11 21:43:45 hacking kernel: RAX: ffffffffffffffda RBX: 000006ec02b0fce8 RCX: 00007f26bf168d6b
Jul 11 21:43:45 hacking kernel: RDX: 0000000000401000 RSI: 0000000000401000 RDI: 00007f2620dff000
Jul 11 21:43:45 hacking kernel: RBP: 00007fffd5127950 R08: 000006e80005ea01 R09: 0000000000000000
Jul 11 21:43:45 hacking kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 000006ec02a89950
Jul 11 21:43:45 hacking kernel: R13: 000006ec02a89970 R14: 000055b0e8cb1900 R15: 00007f2620dff000
Jul 11 21:43:45 hacking kernel: </TASK>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment