Mar 22 16:00:01 jik5.kamens.us CRON[203288]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:00:01 jik5.kamens.us CRON[203287]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:00:01 jik5.kamens.us CRON[203289]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:00:01 jik5.kamens.us CRON[203291]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:00:01 jik5.kamens.us CRON[203292]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:00:01 jik5.kamens.us CRON[203301]: (jik) CMD ($HOME/scripts/see-other-mailboxes.pl) Mar 22 16:00:01 jik5.kamens.us CRON[203302]: (jik) CMD ($HOME/scripts/prune-known-hosts) Mar 22 16:00:01 jik5.kamens.us CRON[203303]: (jik) CMD (PATH=/usr/local/bin:$PATH r2e run &>/dev/null) Mar 22 16:00:01 jik5.kamens.us CRON[203304]: (jik) CMD (find ~/CloudStation -name '*_Conflict') Mar 22 16:00:01 jik5.kamens.us CRON[203305]: (jik) CMD (curl --silent 'https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=bygbfafv' &>/dev/null) Mar 22 16:00:01 jik5.kamens.us CRON[203291]: pam_unix(cron:session): session closed for user jik Mar 22 16:00:01 jik5.kamens.us CRON[203292]: pam_unix(cron:session): session closed for user jik Mar 22 16:00:06 jik5.kamens.us CRON[203288]: pam_unix(cron:session): session closed for user jik Mar 22 16:00:08 jik5.kamens.us CRON[203289]: pam_unix(cron:session): session closed for user jik Mar 22 16:00:13 jik5.kamens.us systemd-logind[2079]: The system will reboot now! Mar 22 16:00:13 jik5.kamens.us audit[2005]: USER_AVC pid=2005 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_signal" bus="system" path="/org/freedesktop/login1" interface="org.freedesktop.login1.Manager" member="PrepareForShutdown" name=":1.13" mask="receive" pid=156337 label="snap.snapd-desktop-integration.snapd-desktop-integration" peer_pid=2079 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:00:13 jik5.kamens.us kernel: audit: type=1107 audit(1679515213.207:246): pid=2005 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_signal" bus="system" path="/org/freedesktop/login1" interface="org.freedesktop.login1.Manager" member="PrepareForShutdown" name=":1.13" mask="receive" pid=156337 label="snap.snapd-desktop-integration.snapd-desktop-integration" peer_pid=2079 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:00:13 jik5.kamens.us kernel: audit: type=1420 audit(1679515213.207:247): subj_apparmor=unconfined Mar 22 16:00:13 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:00:13 jik5.kamens.us sshd[156342]: Received disconnect from 108.26.214.208 port 58782:11: disconnected by user Mar 22 16:00:13 jik5.kamens.us sshd[156342]: Disconnected from user root 108.26.214.208 port 58782 Mar 22 16:00:13 jik5.kamens.us sshd[156342]: pam_unix(sshd:session): session closed for user root Mar 22 16:00:13 jik5.kamens.us systemd[1]: session-1620.scope: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: session-1620.scope: Consumed 2min 54.678s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd-logind[2079]: Session 1620 logged out. Waiting for processes to exit. Mar 22 16:00:13 jik5.kamens.us systemd-logind[2079]: Removed session 1620. Mar 22 16:00:13 jik5.kamens.us systemd-logind[2079]: System is rebooting. Mar 22 16:00:13 jik5.kamens.us systemd[1]: unattended-upgrades.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping session-310.scope - Session 310 of User jik... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping session-6.scope - Session 6 of User jik... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Removed slice system-getty.slice - Slice /system/getty. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Removed slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target bluetooth.target - Bluetooth Support. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target getty-pre.target - Preparation for Logins. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target graphical.target - Graphical Interface. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target multi-user.target - Multi-User System. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target getty.target - Login Prompts. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target rpc_pipefs.target. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target rpcbind.target - RPC Port Mapper. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target sound.target - Sound Card. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped target timers.target - Timer Units. Mar 22 16:00:13 jik5.kamens.us systemd[1]: anacron.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped anacron.timer - Trigger anacron every hour. Mar 22 16:00:13 jik5.kamens.us systemd[1]: apport-autoreport.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us gnome-shell[26094]: X connection to :0 broken (explicit kill or server shutdown). Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card1) Notifying display power state: on Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped apport-autoreport.timer - Process error reports when automatic reporting is enabled (timer based). Mar 22 16:00:13 jik5.kamens.us dbus-daemon[25454]: [session uid=1000 pid=25454] Activating via systemd: service name='org.freedesktop.impl.portal.desktop.gnome' unit='xdg-desktop-portal-gnome.service' requested by ':1.36' (uid=1000 pid=26054 comm="/usr/libexec/xdg-desktop-portal" label="unconfined") Mar 22 16:00:13 jik5.kamens.us synology-drive-autostart.desktop[29780]: The X11 connection broke (error 1). Did the X11 server die? Mar 22 16:00:13 jik5.kamens.us synology-drive-autostart.desktop[29780]: QThread: Destroyed while thread is still running Mar 22 16:00:13 jik5.kamens.us at-spi-bus-launcher[26116]: X connection to :0 broken (explicit kill or server shutdown). Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card2) Notifying display power state: on Mar 22 16:00:13 jik5.kamens.us kernel: rfkill: input handler enabled Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "49" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event2 - Power Button: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "52" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event1 - Power Button: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "53" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event0 - Sleep Button: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "55" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event4 - Jabra Link 370: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "56" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event6 - Logitech M510: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "57" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event9 - HD Pro Webcam C920: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "58" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event5 - Metadot - Das Keyboard Das Keyboard: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "59" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event7 - Metadot - Das Keyboard Das Keyboard System Control: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "60" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event8 - Metadot - Das Keyboard Das Keyboard Consumer Control: device removed Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (**) Option "fd" "109" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) event19 - Jabra Evolve 75: device removed Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card2) Notifying display power state: off Mar 22 16:00:13 jik5.kamens.us systemd[1]: apt-daily-upgrade.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us ModemManager[2141]: caught signal, shutting down... Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] /usr/sbin/mariadbd (initiated by: unknown): Normal shutdown Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] InnoDB: FTS optimize thread exiting. Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] InnoDB: Starting shutdown... Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] InnoDB: Dumping buffer pool(s) to /var/lib/mysql/ib_buffer_pool Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] InnoDB: Restricted to 2016 pages due to innodb_buf_pool_dump_pct=25 Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] InnoDB: Buffer pool(s) dump completed at 230322 16:00:13 Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:13 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:83 Mar 22 16:00:13 jik5.kamens.us dockerd[3450]: time="2023-03-22T16:00:13.629690321-04:00" level=info msg="Processing signal 'terminated'" Mar 22 16:00:13 jik5.kamens.us snapd[71117]: main.go:155: Exiting on terminated signal. Mar 22 16:00:13 jik5.kamens.us snapd[71117]: overlord.go:512: Released state lock file Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped apt-daily-upgrade.timer - Daily apt upgrade and clean activities. Mar 22 16:00:13 jik5.kamens.us ModemManager[2141]: ModemManager is shut down Mar 22 16:00:13 jik5.kamens.us systemd[1]: apt-daily.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Terminating Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped apt-daily.timer - Daily apt download activities. Mar 22 16:00:13 jik5.kamens.us nvidia-persistenced[2055]: Received signal 15 Mar 22 16:00:13 jik5.kamens.us systemd[1]: dpkg-db-backup.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us su[204809]: (to jik) root on none Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card1) Notifying display power state: off Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card1) Disconnected from Task 25445 (DesktopManagerE) of process 25404 (DisplayLinkMana) Mar 22 16:00:13 jik5.kamens.us blkdeactivate[204794]: Deactivating block devices: Mar 22 16:00:13 jik5.kamens.us blkdeactivate[204794]: [SKIP]: unmount of ubuntu--vg-swap_1 (dm-2) mounted on [SWAP] Mar 22 16:00:13 jik5.kamens.us blkdeactivate[204794]: [SKIP]: unmount of ubuntu--vg-root (dm-1) mounted on / Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped dpkg-db-backup.timer - Daily dpkg database backup timer. Mar 22 16:00:13 jik5.kamens.us rsyslogd[2178]: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="2178" x-info="https://www.rsyslog.com"] exiting on signal 15. Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card1) Removing i2c adapter bus number 6 Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 25445 (DesktopManagerE) of process 25404 (DisplayLinkMana) Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card2) Disconnected from Task 25445 (DesktopManagerE) of process 25404 (DisplayLinkMana) Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card2) Removing i2c adapter bus number 7 Mar 22 16:00:13 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 25445 (DesktopManagerE) of process 25404 (DisplayLinkMana) Mar 22 16:00:13 jik5.kamens.us systemd[1]: e2scrub_all.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us dockerd[3450]: time="2023-03-22T16:00:13.859604969-04:00" level=error msg="Failed to get event" error="rpc error: code = Unavailable desc = transport is closing" module=libcontainerd namespace=moby Mar 22 16:00:13 jik5.kamens.us dockerd[3450]: time="2023-03-22T16:00:13.866016016-04:00" level=info msg="Daemon shutdown complete" Mar 22 16:00:13 jik5.kamens.us postfix[204813]: Postfix is using backwards-compatible default settings Mar 22 16:00:13 jik5.kamens.us inotify-canary[204800]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args pre inotify-canary-pause.service Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped e2scrub_all.timer - Periodic ext4 Online Metadata Check for All Filesystems. Mar 22 16:00:13 jik5.kamens.us postfix[204813]: See http://www.postfix.org/COMPATIBILITY_README.html for details Mar 22 16:00:13 jik5.kamens.us systemd[1]: fstrim.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us postfix[204813]: To disable backwards compatibility use "postconf compatibility_level=3.6" and "postfix reload" Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped fstrim.timer - Discard unused blocks once a week. Mar 22 16:00:13 jik5.kamens.us CRON[203287]: pam_unix(cron:session): session closed for user jik Mar 22 16:00:13 jik5.kamens.us systemd[1]: fwupd-refresh.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us sshd[3419]: Received signal 15; terminating. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped fwupd-refresh.timer - Refresh fwupd metadata regularly. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/ldac Mar 22 16:00:13 jik5.kamens.us systemd[1]: logrotate.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSink/aptx_hd Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped logrotate.timer - Daily rotation of log files. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/aptx_hd Mar 22 16:00:13 jik5.kamens.us systemd[1]: man-db.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSink/aptx Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped man-db.timer - Daily man-db regeneration. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/aptx Mar 22 16:00:13 jik5.kamens.us systemd[1]: motd-news.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSink/sbc Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped motd-news.timer - Message of the Day. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/sbc Mar 22 16:00:13 jik5.kamens.us systemd[1]: plocate-updatedb.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSink/sbc_xq Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped plocate-updatedb.timer - Update the plocate database daily. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/sbc_xq Mar 22 16:00:13 jik5.kamens.us systemd[1]: systemd-tmpfiles-clean.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/aptx_ll_1 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/aptx_ll_0 Mar 22 16:00:13 jik5.kamens.us systemd[1]: ua-timer.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped ua-timer.timer - Ubuntu Advantage Timer for running repeated jobs. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0 Mar 22 16:00:13 jik5.kamens.us systemd[1]: update-notifier-download.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/faststream Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped update-notifier-download.timer - Download data for packages that failed at package install time. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/faststream_duplex Mar 22 16:00:13 jik5.kamens.us systemd[1]: update-notifier-motd.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us kernel: traps: VBoxSVC[134063] trap int3 ip:7fd67d9276bf sp:7fff344d0e80 error:0 in VBoxXPCOMIPCC.so[7fd67d921000+13000] Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSink/opus_05 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped update-notifier-motd.timer - Check to see whether there is a new version of Ubuntu available. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/opus_05 Mar 22 16:00:13 jik5.kamens.us systemd[1]: yubikey-monitor.timer: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSink/opus_05_duplex Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped yubikey-monitor.timer - Check for inserted Yubikey every minute. Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Endpoint unregistered: sender=:1.78 path=/MediaEndpoint/A2DPSource/opus_05_duplex Mar 22 16:00:13 jik5.kamens.us systemd[1]: lvm2-lvmpolld.socket: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[1]: Closed lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[1]: systemd-rfkill.socket: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[1]: Closed systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target gnome-session-x11@ubuntu.target - GNOME X11 Session (session: ubuntu). Mar 22 16:00:13 jik5.kamens.us kernel: device enp2s0 left promiscuous mode Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] InnoDB: Removed temporary tablespace data file: "./ibtmp1" Mar 22 16:00:13 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] InnoDB: Shutdown completed; log sequence number 2563290250; transaction id 2957935 Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target gnome-session.target - GNOME Session. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target gnome-session-x11.target - GNOME X11 Session. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target gnome-session@ubuntu.target - GNOME Session (session: ubuntu). Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.A11ySettings.target - GNOME accessibility target. Mar 22 16:00:13 jik5.kamens.us kernel: vboxnetflt: 171 out of 641648 packets were not sent (directed to host) Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Color.target - GNOME color management target. Mar 22 16:00:13 jik5.kamens.us pwrstatd[204817]: * Stopping pwrstatd 1.3.2 Mar 22 16:00:13 jik5.kamens.us pwrstatd[204817]: ...done. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Datetime.target - GNOME date & time target. Mar 22 16:00:14 jik5.kamens.us mariadbd[2393]: 2023-03-22 16:00:13 0 [Note] /usr/sbin/mariadbd: Shutdown complete Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Housekeeping.target - GNOME maintenance of expirable data target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Keyboard.target - GNOME keyboard configuration target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.MediaKeys.target - GNOME keyboard shortcuts target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Power.target - GNOME power management target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.PrintNotifications.target - GNOME printer notifications target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Rfkill.target - GNOME RFKill support target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.ScreensaverProxy.target - GNOME FreeDesktop screensaver target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Sharing.target - GNOME file sharing target. Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.78" (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.11" (uid=0 pid=2004 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Smartcard.target - GNOME smartcard target. Mar 22 16:00:13 jik5.kamens.us nvidia-persistenced[2055]: Socket closed. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Sound.target - GNOME sound sample caching target. Mar 22 16:00:13 jik5.kamens.us nvidia-persistenced[2055]: PID file unlocked. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.Wacom.target - GNOME Wacom tablet support target. Mar 22 16:00:13 jik5.kamens.us nvidia-persistenced[2055]: PID file closed. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target org.gnome.SettingsDaemon.XSettings.target - GNOME XSettings target. Mar 22 16:00:13 jik5.kamens.us nvidia-persistenced[2055]: The daemon no longer has permission to remove its runtime data directory /var/run/nvidia-persistenced Mar 22 16:00:13 jik5.kamens.us systemd[1]: Unmounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:00:13 jik5.kamens.us nvidia-persistenced[2055]: Shutdown (2055) Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping ModemManager.service - Modem Manager... Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Activating via systemd: service name='org.freedesktop.network1' unit='dbus-org.freedesktop.network1.service' requested by ':1.651' (uid=0 pid=204854 comm="networkctl" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping accounts-daemon.service - Accounts Service... Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Stopping SDP server Mar 22 16:00:13 jik5.kamens.us NetworkManager[2122]: [1679515213.5177] modem-manager: ModemManager no longer available Mar 22 16:00:13 jik5.kamens.us bluetoothd[2004]: Exit Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping alsa-restore.service - Save/Restore Sound Card State... Mar 22 16:00:13 jik5.kamens.us dbus-daemon[2005]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' requested by ':1.78' (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.freedesktop.IBus.session.GNOME.service - IBus Daemon for GNOME... Mar 22 16:00:13 jik5.kamens.us thermald[2082]: Terminating ... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.A11ySettings.service - GNOME accessibility service... Mar 22 16:00:13 jik5.kamens.us postfix/postfix-script[204890]: stopping the Postfix mail system Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Color.service - GNOME color management service... Mar 22 16:00:13 jik5.kamens.us postfix/master[3916]: terminating on signal 15 Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Datetime.service - GNOME date & time service... Mar 22 16:00:13 jik5.kamens.us systemd[156196]: pam_unix(systemd-user:session): session closed for user root Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Housekeeping.service - GNOME maintenance of expirable data service... Mar 22 16:00:13 jik5.kamens.us polkitd(authority=local)[2049]: Unregistered Authentication Agent for unix-session:6 (system bus name :1.89, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) (disconnected from bus) Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping apache2.service - The Apache HTTP Server... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping apport.service - automatic crash report generation... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping atd.service - Deferred execution scheduler... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Keyboard.service - GNOME keyboard configuration service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.MediaKeys.service - GNOME keyboard shortcuts service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Power.service - GNOME power management service... Mar 22 16:00:14 jik5.kamens.us dbus-daemon[2005]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.network1.service': Unit dbus-org.freedesktop.network1.service not found. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.PrintNotifications.service - GNOME printer notifications service... Mar 22 16:00:14 jik5.kamens.us dbus-daemon[2005]: [system] Activation via systemd failed for unit 'dbus-org.bluez.service': Transaction for bluetooth.service/start is destructive (systemd-update-utmp.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Rfkill.service - GNOME RFKill support service... Mar 22 16:00:14 jik5.kamens.us dbus-daemon[2005]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' requested by ':1.78' (uid=1000 pid=25430 comm="/usr/bin/wireplumber" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping blk-availability.service - Availability of block devices... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.ScreensaverProxy.service - GNOME FreeDesktop screensaver service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Sharing.service - GNOME file sharing service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Smartcard.service - GNOME smartcard service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Sound.service - GNOME sound sample caching service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.Wacom.service - GNOME Wacom tablet support service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping org.gnome.SettingsDaemon.XSettings.service - GNOME XSettings service... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping bluetooth.service - Bluetooth service... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping colord.service - Manage, Install and Generate Color Profiles... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping cron.service - Regular background program processing daemon... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping cups-browsed.service - Make remote CUPS printers available locally... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping ddclient.service - Update dynamic domain name service entries... Mar 22 16:00:14 jik5.kamens.us thunderbird.desktop[133016]: Exiting due to channel error. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping displaylink-driver.service - DisplayLink Driver Service... Mar 22 16:00:14 jik5.kamens.us thunderbird.desktop[134516]: Exiting due to channel error. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping docker.service - Docker Application Container Engine... Mar 22 16:00:14 jik5.kamens.us thunderbird.desktop[133094]: Exiting due to channel error. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping fail2ban.service - Fail2Ban Service... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping geoclue.service - Location Lookup Service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: xdg-desktop-portal-gnome.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:14 jik5.kamens.us dbus-daemon[2005]: [system] Activation via systemd failed for unit 'dbus-org.bluez.service': Transaction for bluetooth.service/start is destructive (systemd-sysusers.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:13 jik5.kamens.us systemd[25417]: xdg-desktop-portal-gnome.service: Failed with result 'exit-code'. Mar 22 16:00:14 jik5.kamens.us avahi-daemon[2003]: Got SIGTERM, quitting. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: xdg-desktop-portal-gtk.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:14 jik5.kamens.us avahi-daemon[2003]: Leaving mDNS multicast group on interface docker0.IPv4 with address 172.17.0.1. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: xdg-desktop-portal-gtk.service: Failed with result 'exit-code'. Mar 22 16:00:14 jik5.kamens.us avahi-daemon[2003]: Leaving mDNS multicast group on interface enp2s0.IPv6 with address fe80::86a3:4d63:740b:50a6. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.freedesktop.IBus.session.GNOME.service: Killing process 26334 (pool-spawner) with signal SIGKILL. Mar 22 16:00:14 jik5.kamens.us avahi-daemon[2003]: Leaving mDNS multicast group on interface enp2s0.IPv4 with address 192.168.4.11. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping inotify-canary-pause.service - Pause inotify canary on shutdown... Mar 22 16:00:14 jik5.kamens.us avahi-daemon[2003]: Leaving mDNS multicast group on interface lo.IPv6 with address ::1. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping irqbalance.service - irqbalance daemon... Mar 22 16:00:14 jik5.kamens.us avahi-daemon[2003]: Leaving mDNS multicast group on interface lo.IPv4 with address 127.0.0.1. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping kerneloops.service - Tool to automatically collect and submit kernel crash signatures... Mar 22 16:00:14 jik5.kamens.us su[204809]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping mariadb.service - MariaDB 10.11.2 database server... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping mongod.service - MongoDB Database Server... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping networkd-dispatcher.service - Dispatcher daemon for systemd-networkd... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping nvidia-persistenced.service - NVIDIA Persistence Daemon... Mar 22 16:00:13 jik5.kamens.us systemd[1]: openvpn.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped openvpn.service - OpenVPN service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping packagekit.service - PackageKit Daemon... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping pcscd.service - PC/SC Smart Card Daemon... Mar 22 16:00:13 jik5.kamens.us systemd[1]: plymouth-quit-wait.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us containerd[2210]: time="2023-03-22T16:00:14.104997786-04:00" level=info msg="Stop CRI service" Mar 22 16:00:14 jik5.kamens.us containerd[2210]: time="2023-03-22T16:00:14.108026814-04:00" level=info msg="Stop CRI service" Mar 22 16:00:14 jik5.kamens.us dbus-daemon[2005]: [system] Activating via systemd: service name='org.freedesktop.Accounts' unit='accounts-daemon.service' requested by ':1.66' (uid=0 pid=25396 comm="/usr/sbin/gdm3" label="unconfined") Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped plymouth-quit-wait.service - Hold until boot process finishes up. Mar 22 16:00:14 jik5.kamens.us dbus-daemon[2005]: [system] Activation via systemd failed for unit 'accounts-daemon.service': Transaction for accounts-daemon.service/start is destructive (proc-sys-fs-binfmt_misc.automount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:13 jik5.kamens.us systemd[1]: postfix.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us gdm3[25396]: Gdm: Failed to contact accountsservice: Error calling StartServiceByName for org.freedesktop.Accounts: Transaction for accounts-daemon.service/start is destructive (proc-sys-fs-binfmt_misc.automount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped postfix.service - Postfix Mail Transport Agent. Mar 22 16:00:14 jik5.kamens.us avahi-daemon[2003]: avahi-daemon 0.8 exiting. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping postfix@-.service - Postfix Mail Transport Agent (instance -)... Mar 22 16:00:13 jik5.kamens.us systemd[1]: postgresql.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped postgresql.service - PostgreSQL RDBMS. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping postgresql@11-main.service - PostgreSQL Cluster 11-main... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping postgresql@12-main.service - PostgreSQL Cluster 12-main... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping postgresql@13-main.service - PostgreSQL Cluster 13-main... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping postgresql@14-main.service - PostgreSQL Cluster 14-main... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Color.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping postgresql@15-main.service - PostgreSQL Cluster 15-main... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Keyboard.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping power-profiles-daemon.service - Power Profiles daemon... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.MediaKeys.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping pwrstatd.service - LSB: The monitor UPS software.... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping rpc-statd.service - NFS status monitor for NFSv2/3 locking.... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping rsyslog.service - System Logging Service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Power.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Wacom.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.XSettings.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.A11ySettings.service - GNOME accessibility service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.freedesktop.IBus.session.GNOME.service - IBus Daemon for GNOME. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.freedesktop.IBus.session.GNOME.service: Consumed 4.992s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: app-gnome-yubioath\x2ddesktop-26812.scope: Consumed 6min 43.205s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: app-gnome-update\x2dnotifier-31411.scope: Consumed 15.886s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping rtkit-daemon.service - RealtimeKit Scheduling Policy Service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: app-gnome-org.gnome.Evolution\x2dalarm\x2dnotify-26364.scope: Consumed 1.037s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping snap.cups.cups-browsed.service - Service for snap application cups.cups-browsed... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping snap.cups.cupsd.service - Service for snap application cups.cupsd... Mar 22 16:00:13 jik5.kamens.us systemd[1]: snapd.seeded.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped snapd.seeded.service - Wait until snapd is fully seeded. Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:72 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping snapd.service - Snap Daemon... Mar 22 16:00:13 jik5.kamens.us systemd[1]: snapd.system-shutdown.service - Ubuntu core (all-snaps) system shutdown helper setup service was skipped because no trigger condition checks were met. Mar 22 16:00:14 jik5.kamens.us kernel: audit: type=1107 audit(1679515214.155:248): pid=2005 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/" interface="org.freedesktop.DBus.Peer" member="Ping" mask="send" name="org.freedesktop.Avahi" pid=2855 label="snap.cups.cupsd" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:00:14 jik5.kamens.us kernel: audit: type=1420 audit(1679515214.155:249): subj_apparmor=unconfined Mar 22 16:00:14 jik5.kamens.us audit[2005]: USER_AVC pid=2005 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/" interface="org.freedesktop.DBus.Peer" member="Ping" mask="send" name="org.freedesktop.Avahi" pid=2855 label="snap.cups.cupsd" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:00:14 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping ssh.service - OpenBSD Secure Shell server... Mar 22 16:00:14 jik5.kamens.us kernel: [drm:nv_drm_master_set [nvidia_drm]] *ERROR* [nvidia-drm] [GPU ID 0x00000100] Failed to grab modeset ownership Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 204993 (plymouthd) of process 204993 (plymouthd) Mar 22 16:00:14 jik5.kamens.us su[204809]: pam_systemd(su:session): Failed to create session: Transaction for session-c4.scope/start is destructive (shutdown.target has 'start' job queued, but 'stop' is included in transaction). Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:00:14 jik5.kamens.us named[2189]: received control channel command 'stop' Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping teamviewerd.service - TeamViewer remote control daemon... Mar 22 16:00:14 jik5.kamens.us named[2189]: no longer listening on 127.0.0.1#53 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping thermald.service - Thermal Daemon Service... Mar 22 16:00:14 jik5.kamens.us named[2189]: no longer listening on ::1#53 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping ubuntu-fan.service - Ubuntu FAN network setup... Mar 22 16:00:14 jik5.kamens.us named[2189]: no longer listening on 192.168.4.11#53 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping udisks2.service - Disk Manager... Mar 22 16:00:14 jik5.kamens.us named[2189]: no longer listening on 192.168.4.17#53 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping upower.service - Daemon for power management... Mar 22 16:00:14 jik5.kamens.us named[2189]: no longer listening on fe80::86a3:4d63:740b:50a6%2#53 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping user@0.service - User Manager for UID 0... Mar 22 16:00:14 jik5.kamens.us named[2189]: no longer listening on 172.17.0.1#53 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping uuidd.service - Daemon for generating UUIDs... Mar 22 16:00:14 jik5.kamens.us named[2189]: shutting down: flushing changes Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping vboxautostart-service.service... Mar 22 16:00:14 jik5.kamens.us named[2189]: stopping command channel on 127.0.0.1#953 Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping vboxballoonctrl-service.service... Mar 22 16:00:14 jik5.kamens.us named[2189]: stopping command channel on ::1#953 Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Activating special unit exit.target... Mar 22 16:00:14 jik5.kamens.us named[2189]: exiting Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Removed slice background.slice - User Background Tasks Slice. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped target default.target - Main User Target. Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:71 Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopping appimagelauncherd.service - AppImageLauncher daemon... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping vboxweb-service.service... Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopping virtualbox.service - LSB: VirtualBox Linux kernel module... Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopping dbus.service - D-Bus User Message Bus... Mar 22 16:00:13 jik5.kamens.us unknown[2083]: udisks daemon version 2.9.4 exiting Mar 22 16:00:13 jik5.kamens.us NetworkManager[2122]: [1679515213.7271] device (7C:D9:5C:BA:3D:76): state change: disconnected -> unmanaged (reason 'removed', sys-iface-state: 'removed') Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopping snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration... Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopping xdg-document-portal.service - flatpak document portal service... Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopping xdg-permission-store.service - sandboxed app permission store... Mar 22 16:00:13 jik5.kamens.us systemd[1]: run-user-0-doc.mount: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Unmounted run-user-0-doc.mount - /run/user/0/doc. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped appimagelauncherd.service - AppImageLauncher daemon. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped dbus.service - D-Bus User Message Bus. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: xdg-document-portal.service: Main process exited, code=exited, status=20/n/a Mar 22 16:00:13 jik5.kamens.us systemd[156195]: xdg-permission-store.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:13 jik5.kamens.us systemd[156195]: xdg-permission-store.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped xdg-permission-store.service - sandboxed app permission store. Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:69 Mar 22 16:00:13 jik5.kamens.us systemd[156195]: xdg-document-portal.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped xdg-document-portal.service - flatpak document portal service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: accounts-daemon.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped accounts-daemon.service - Accounts Service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: accounts-daemon.service: Consumed 7.341s CPU time. Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:73 Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:70 Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:68 Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:64 Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:65 Mar 22 16:00:13 jik5.kamens.us systemd[1]: bluetooth.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped bluetooth.service - Bluetooth service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: irqbalance.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped irqbalance.service - irqbalance daemon. Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) UnloadModule: "libinput" Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) systemd-logind: releasing fd for 13:66 Mar 22 16:00:13 jik5.kamens.us systemd[1]: irqbalance.service: Consumed 14.647s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: networkd-dispatcher.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped networkd-dispatcher.service - Dispatcher daemon for systemd-networkd. Mar 22 16:00:13 jik5.kamens.us systemd[1]: power-profiles-daemon.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped power-profiles-daemon.service - Power Profiles daemon. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Removed slice session.slice - User Core Session Slice. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Color.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[1]: udisks2.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped udisks2.service - Disk Manager. Mar 22 16:00:13 jik5.kamens.us systemd[1]: udisks2.service: Consumed 46.137s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: ModemManager.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped ModemManager.service - Modem Manager. Mar 22 16:00:13 jik5.kamens.us systemd[1]: rsyslog.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped rsyslog.service - System Logging Service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: rsyslog.service: Consumed 4.984s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: colord.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped colord.service - Manage, Install and Generate Color Profiles. Mar 22 16:00:13 jik5.kamens.us systemd[1]: colord.service: Consumed 1.155s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: ssh.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: ssh.service: Unit process 192799 (sshd) remains running after unit stopped. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped ssh.service - OpenBSD Secure Shell server. Mar 22 16:00:13 jik5.kamens.us systemd[1]: ssh.service: Consumed 3min 56.600s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: docker.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Color.service - GNOME color management service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Color.service: Consumed 2.539s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Keyboard.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Keyboard.service - GNOME keyboard configuration service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.MediaKeys.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.MediaKeys.service - GNOME keyboard shortcuts service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.MediaKeys.service: Consumed 1.597s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Power.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Power.service - GNOME power management service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Power.service: Consumed 1.984s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Smartcard.service - GNOME smartcard service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped docker.service - Docker Application Container Engine. Mar 22 16:00:13 jik5.kamens.us systemd[1]: docker.service: Consumed 18.742s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Wacom.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Wacom.service - GNOME Wacom tablet support service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: ddclient.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.XSettings.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped ddclient.service - Update dynamic domain name service entries. Mar 22 16:00:13 jik5.kamens.us systemd[1]: ddclient.service: Consumed 12.519s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.XSettings.service - GNOME XSettings service. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: snap.snapd-desktop-integration.snapd-desktop-integration.service: Main process exited, code=exited, status=143/n/a Mar 22 16:00:13 jik5.kamens.us systemd[156195]: snap.snapd-desktop-integration.snapd-desktop-integration.service: Failed with result 'exit-code'. Mar 22 16:00:13 jik5.kamens.us systemd[1]: rpc-statd.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped target basic.target - Basic System. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped target paths.target - Paths. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped rpc-statd.service - NFS status monitor for NFSv2/3 locking.. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Datetime.service - GNOME date & time service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Housekeeping.service - GNOME maintenance of expirable data service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: org.gnome.SettingsDaemon.Housekeeping.service: Consumed 31.092s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: cron.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.ScreensaverProxy.service - GNOME FreeDesktop screensaver service. Mar 22 16:00:13 jik5.kamens.us gnome-remote-de[26044]: RDP server stopped Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped cron.service - Regular background program processing daemon. Mar 22 16:00:13 jik5.kamens.us systemd[1]: cron.service: Consumed 11min 40.247s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: atd.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped atd.service - Deferred execution scheduler. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Rfkill.service - GNOME RFKill support service. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Sharing.service - GNOME file sharing service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: rtkit-daemon.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped rtkit-daemon.service - RealtimeKit Scheduling Policy Service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: rtkit-daemon.service: Consumed 1.554s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.Sound.service - GNOME sound sample caching service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: upower.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped upower.service - Daemon for power management. Mar 22 16:00:13 jik5.kamens.us systemd[1]: upower.service: Consumed 3.872s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: app-gnome-slack-132518.scope: Consumed 4min 40.323s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: snap.snap-store.snap-store.9dd572fb-348f-4a45-acc5-f781af3eea08.scope: Consumed 20.777s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped ubuntu-report.path - Pending report trigger for Ubuntu Report. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped target sockets.target - Sockets. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Stopped target timers.target - Timers. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed dbus.socket - D-Bus User Message Bus Socket. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed dirmngr.socket - GnuPG network certificate management daemon. Mar 22 16:00:13 jik5.kamens.us systemd[1]: geoclue.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed gcr-ssh-agent.socket - GCR ssh-agent wrapper. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed gnome-keyring-daemon.socket - GNOME Keyring daemon. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped geoclue.service - Location Lookup Service. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed gpg-agent-browser.socket - GnuPG cryptographic agent and passphrase cache (access for web browsers). Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed gpg-agent-extra.socket - GnuPG cryptographic agent and passphrase cache (restricted). Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed gpg-agent-ssh.socket - GnuPG cryptographic agent (ssh-agent emulation). Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed gpg-agent.socket - GnuPG cryptographic agent and passphrase cache. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed pk-debconf-helper.socket - debconf communication socket. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Closed snapd.session-agent.socket - REST API socket for snapd user session agent. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: app-gnome-dropbox-26404.scope: Consumed 7min 3.767s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Removed slice app.slice - User Application Slice. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Reached target shutdown.target - Shutdown. Mar 22 16:00:13 jik5.kamens.us systemd[1]: pcscd.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Finished systemd-exit.service - Exit the Session. Mar 22 16:00:13 jik5.kamens.us systemd[156195]: Reached target exit.target - Exit the Session. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped pcscd.service - PC/SC Smart Card Daemon. Mar 22 16:00:13 jik5.kamens.us systemd[1]: pcscd.service: Consumed 9.475s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: uuidd.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped uuidd.service - Daemon for generating UUIDs. Mar 22 16:00:13 jik5.kamens.us systemd[1]: snapd.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped snapd.service - Snap Daemon. Mar 22 16:00:13 jik5.kamens.us systemd[1]: snapd.service: Consumed 20.565s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: packagekit.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped packagekit.service - PackageKit Daemon. Mar 22 16:00:13 jik5.kamens.us systemd[1]: run-rpc_pipefs.mount: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Unmounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:00:13 jik5.kamens.us systemd[1]: alsa-restore.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped alsa-restore.service - Save/Restore Sound Card State. Mar 22 16:00:13 jik5.kamens.us systemd[1]: apport.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped apport.service - automatic crash report generation. Mar 22 16:00:13 jik5.kamens.us systemd[1]: blk-availability.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped blk-availability.service - Availability of block devices. Mar 22 16:00:13 jik5.kamens.us systemd[1]: run-snapd-ns-cups.mnt.mount: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Unmounted run-snapd-ns-cups.mnt.mount - /run/snapd/ns/cups.mnt. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped gnome-session-monitor.service - Monitor Session leader for GNOME Session. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target gnome-session-x11-services.target - GNOME session X11 services. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped target graphical-session.target - Current graphical user session. Mar 22 16:00:13 jik5.kamens.us systemd[1]: user@0.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped user@0.service - User Manager for UID 0. Mar 22 16:00:13 jik5.kamens.us systemd[1]: user@0.service: Consumed 1.042s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: postfix@-.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped postfix@-.service - Postfix Mail Transport Agent (instance -). Mar 22 16:00:13 jik5.kamens.us systemd[1]: postfix@-.service: Consumed 4.244s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[1]: systemd-random-seed.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:00:13 jik5.kamens.us systemd[1]: vboxautostart-service.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped vboxautostart-service.service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: vboxballoonctrl-service.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped vboxballoonctrl-service.service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: vboxweb-service.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped vboxweb-service.service. Mar 22 16:00:13 jik5.kamens.us systemd[1]: nvidia-persistenced.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped nvidia-persistenced.service - NVIDIA Persistence Daemon. Mar 22 16:00:13 jik5.kamens.us systemd[1]: kerneloops.service: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped kerneloops.service - Tool to automatically collect and submit kernel crash signatures. Mar 22 16:00:13 jik5.kamens.us systemd[1]: session-310.scope: Deactivated successfully. Mar 22 16:00:13 jik5.kamens.us systemd[1]: Stopped session-310.scope - Session 310 of User jik. Mar 22 16:00:13 jik5.kamens.us systemd[1]: session-310.scope: Consumed 32.028s CPU time. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopped update-notifier-release.path - Path trigger for new release of Ubuntu notifications. Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping gvfs-daemon.service - Virtual filesystem service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping gvfs-metadata.service - Virtual filesystem metadata service... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor... Mar 22 16:00:13 jik5.kamens.us systemd[25417]: Stopping gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor... Mar 22 16:00:13 jik5.kamens.us tracker-miner-f[25588]: Owner of volume monitor org.gtk.vfs.GoaVolumeMonitor disconnected from the bus; removing drives/volumes/mounts Mar 22 16:00:13 jik5.kamens.us tracker-miner-f[25588]: Owner of volume monitor org.gtk.vfs.MTPVolumeMonitor disconnected from the bus; removing drives/volumes/mounts Mar 22 16:00:13 jik5.kamens.us tracker-miner-f[25588]: Owner of volume monitor org.gtk.vfs.AfcVolumeMonitor disconnected from the bus; removing drives/volumes/mounts Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) NVIDIA(GPU-0): Deleting GPU-0 Mar 22 16:00:13 jik5.kamens.us tracker-miner-f[25588]: Owner of volume monitor org.gtk.vfs.GPhoto2VolumeMonitor disconnected from the bus; removing drives/volumes/mounts Mar 22 16:00:13 jik5.kamens.us tracker-miner-f[25588]: Owner of volume monitor org.gtk.vfs.UDisks2VolumeMonitor disconnected from the bus; removing drives/volumes/mounts Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Starting xdg-desktop-portal-gnome.service - Portal service (GNOME implementation)... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping xdg-desktop-portal.service - Portal service... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping xdg-document-portal.service - flatpak document portal service... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping xdg-permission-store.service - sandboxed app permission store... Mar 22 16:00:14 jik5.kamens.us systemd[1]: run-user-1000-gvfs.mount: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Unmounted run-user-1000-gvfs.mount - /run/user/1000/gvfs. Mar 22 16:00:14 jik5.kamens.us systemd[1]: run-user-1000-doc.mount: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Unmounted run-user-1000-doc.mount - /run/user/1000/doc. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gvfs-daemon.service - Virtual filesystem service. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: gvfs-daemon.service: Consumed 3.197s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: mariadb.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped mariadb.service - MariaDB 10.11.2 database server. Mar 22 16:00:14 jik5.kamens.us systemd[1]: mariadb.service: Consumed 30.521s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: mongod.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped mongod.service - MongoDB Database Server. Mar 22 16:00:14 jik5.kamens.us systemd[1]: mongod.service: Consumed 19min 11.379s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped xdg-document-portal.service - flatpak document portal service. Mar 22 16:00:14 jik5.kamens.us systemd[1]: apache2.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped apache2.service - The Apache HTTP Server. Mar 22 16:00:14 jik5.kamens.us systemd[1]: apache2.service: Consumed 8.348s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped xdg-permission-store.service - sandboxed app permission store. Mar 22 16:00:14 jik5.kamens.us systemd[1]: pwrstatd.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped pwrstatd.service - LSB: The monitor UPS software.. Mar 22 16:00:14 jik5.kamens.us systemd[1]: pwrstatd.service: Consumed 23.326s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: gvfs-udisks2-volume-monitor.service: Consumed 2min 26.457s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: gvfs-afc-volume-monitor.service: Consumed 5.942s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped xdg-desktop-portal.service - Portal service. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: xdg-desktop-portal.service: Consumed 3.429s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gvfs-metadata.service - Virtual filesystem metadata service. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for bluetooth.service/start is destructive (systemd-update-utmp.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:14 jik5.kamens.us systemd-logind[2079]: Removed session 310. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Removed slice system-postfix.slice - Slice /system/postfix. Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (WW) xf86CloseConsole: KDSETMODE failed: Input/output error Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (WW) xf86CloseConsole: VT_GETMODE failed: Input/output error Mar 22 16:00:14 jik5.kamens.us /usr/libexec/gdm-x-session[25590]: (II) Server terminated successfully (0). Closing log file. Mar 22 16:00:14 jik5.kamens.us systemd[1]: system-postfix.slice: Consumed 4.244s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped target nss-lookup.target - Host and Network Name Lookups. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped target time-set.target - System Time Set. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping containerd.service - containerd container runtime... Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping named.service - BIND Domain Name Server... Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping polkit.service - Authorization Manager... Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping user-runtime-dir@0.service - User Runtime Directory /run/user/0... Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping vboxdrv.service - VirtualBox Linux kernel module... Mar 22 16:00:14 jik5.kamens.us systemd[1]: cups-browsed.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped cups-browsed.service - Make remote CUPS printers available locally. Mar 22 16:00:14 jik5.kamens.us systemd[1]: ubuntu-fan.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped ubuntu-fan.service - Ubuntu FAN network setup. Mar 22 16:00:14 jik5.kamens.us systemd[1]: virtualbox.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped virtualbox.service - LSB: VirtualBox Linux kernel module. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for bluetooth.service/start is destructive (systemd-sysusers.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:14 jik5.kamens.us systemd[1]: polkit.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped polkit.service - Authorization Manager. Mar 22 16:00:14 jik5.kamens.us systemd[1]: polkit.service: Consumed 24.469s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping avahi-daemon.service - Avahi mDNS/DNS-SD Stack... Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping cups.service - CUPS Scheduler... Mar 22 16:00:14 jik5.kamens.us systemd-logind[2079]: Session 6 logged out. Waiting for processes to exit. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped org.gnome.SettingsDaemon.PrintNotifications.service - GNOME printer notifications service. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped org.gnome.Shell@x11.service - GNOME Shell on X11. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: org.gnome.Shell@x11.service: Consumed 3h 24min 53.758s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target gnome-session-initialized.target - GNOME Session is initialized. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target gnome-session-manager.target - GNOME Session Manager is ready. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target org.gnome.Shell.target - GNOME Shell. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping gnome-session-manager@ubuntu.service - GNOME Session Manager (session: ubuntu)... Mar 22 16:00:14 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for accounts-daemon.service/start is destructive (proc-sys-fs-binfmt_misc.automount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:14 jik5.kamens.us systemd[1]: gdm.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:14 jik5.kamens.us systemd[1]: gdm.service: Failed with result 'exit-code'. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped gdm.service - GNOME Display Manager. Mar 22 16:00:14 jik5.kamens.us systemd[1]: gdm.service: Triggering OnFailure= dependencies. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: app-gnome-thunderbird-132823.scope: Consumed 3min 23.681s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for plymouth-quit.service/start is destructive (proc-sys-fs-binfmt_misc.automount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:14 jik5.kamens.us systemd[1]: gdm.service: Failed to enqueue OnFailure= job, ignoring: Transaction for plymouth-quit.service/start is destructive (proc-sys-fs-binfmt_misc.automount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:14 jik5.kamens.us systemd[1]: avahi-daemon.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped avahi-daemon.service - Avahi mDNS/DNS-SD Stack. Mar 22 16:00:14 jik5.kamens.us systemd[1]: avahi-daemon.service: Consumed 9.994s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: containerd.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped containerd.service - containerd container runtime. Mar 22 16:00:14 jik5.kamens.us systemd[1]: containerd.service: Consumed 1min 31.169s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Starting plymouth-reboot.service - Show Plymouth Reboot Screen... Mar 22 16:00:14 jik5.kamens.us systemd[1]: rc-local.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped rc-local.service - /etc/rc.local Compatibility. Mar 22 16:00:14 jik5.kamens.us systemd[1]: rc-local.service: Consumed 1min 14.207s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping switcheroo-control.service - Switcheroo Control Proxy service... Mar 22 16:00:14 jik5.kamens.us systemd[1]: cups.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped cups.service - CUPS Scheduler. Mar 22 16:00:14 jik5.kamens.us systemd[1]: cups.service: Consumed 13.281s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: switcheroo-control.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped switcheroo-control.service - Switcheroo Control Proxy service. Mar 22 16:00:14 jik5.kamens.us systemd[1]: user-runtime-dir@0.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped user-runtime-dir@0.service - User Runtime Directory /run/user/0. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Received SIGRTMIN+20 from PID 204993 (plymouthd). Mar 22 16:00:14 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for session-c4.scope/start is destructive (shutdown.target has 'start' job queued, but 'stop' is included in transaction). Mar 22 16:00:14 jik5.kamens.us systemd-logind[2079]: Failed to start session scope session-c4.scope: Transaction for session-c4.scope/start is destructive (shutdown.target has 'start' job queued, but 'stop' is included in transaction). Mar 22 16:00:14 jik5.kamens.us systemd[1]: Removed slice user-0.slice - User Slice of UID 0. Mar 22 16:00:14 jik5.kamens.us systemd[1]: user-0.slice: Consumed 2min 55.795s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Started plymouth-reboot.service - Show Plymouth Reboot Screen. Mar 22 16:00:14 jik5.kamens.us systemd[1]: plymouth-switch-root-initramfs.service - Tell Plymouth To Jump To initramfs was skipped because of an unmet condition check (ConditionPathExists=/run/initramfs/bin/sh). Mar 22 16:00:14 jik5.kamens.us systemd[1]: named.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped named.service - BIND Domain Name Server. Mar 22 16:00:14 jik5.kamens.us systemd[1]: named.service: Consumed 32.406s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Mar 22 16:00:14 jik5.kamens.us unknown[204945]: cannot open display: :0 Mar 22 16:00:14 jik5.kamens.us systemd[25417]: xdg-desktop-portal-gnome.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:00:14 jik5.kamens.us systemd[25417]: xdg-desktop-portal-gnome.service: Failed with result 'exit-code'. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Failed to start xdg-desktop-portal-gnome.service - Portal service (GNOME implementation). Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 25590 (Xorg) of process 25590 (Xorg) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 25590 (Xorg) of process 25590 (Xorg) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 25590 (Xorg) of process 25590 (Xorg) Mar 22 16:00:14 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 25590 (Xorg) of process 25590 (Xorg) Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + [ -f /var/snap/cups/872/var/run/stop-cups-browsed.lock ] Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + touch /var/snap/cups/872/var/run/stop-cups-browsed.lock Mar 22 16:00:14 jik5.kamens.us cups.cupsd[204827]: + [ -f /var/snap/cups/872/var/run/stop-cupsd.lock ] Mar 22 16:00:14 jik5.kamens.us cups.cupsd[204827]: + echo ==> We are already shutting down cupsd Mar 22 16:00:14 jik5.kamens.us cups.cupsd[204827]: ==> We are already shutting down cupsd Mar 22 16:00:14 jik5.kamens.us cups.cupsd[204827]: + exit 0 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + echo ==> Shutting down cups-browsed Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: ==> Shutting down cups-browsed Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[205031]: + cat /var/snap/cups/872/var/run/cups-browsed.pid Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + PID=3013 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + [ -n 3013 ] Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + kill -0 3013 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + kill -TERM 3013 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + DEAD=0 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[205038]: + seq 300 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + kill -0 3013 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + DEAD=1 Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + break Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + [ 1 = 0 ] Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + rm -f /var/snap/cups/872/var/run/cups-browsed.pid Mar 22 16:00:14 jik5.kamens.us cups.cups-browsed[204825]: + rm -f /var/snap/cups/872/var/run/stop-cups-browsed.lock Mar 22 16:00:14 jik5.kamens.us su[204809]: pam_unix(su:session): session closed for user jik Mar 22 16:00:14 jik5.kamens.us inotify-canary[204800]: /etc/NetworkManager/dispatcher.d/inotify-canary: cmcli list failed Mar 22 16:00:14 jik5.kamens.us inotify-canary[204800]: /etc/NetworkManager/dispatcher.d/inotify-canary: giving up Mar 22 16:00:14 jik5.kamens.us fail2ban-client[204796]: Shutdown successful Mar 22 16:00:14 jik5.kamens.us systemd[1]: snap.cups.cups-browsed.service: Main process exited, code=exited, status=143/n/a Mar 22 16:00:14 jik5.kamens.us systemd[1]: fail2ban.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped fail2ban.service - Fail2Ban Service. Mar 22 16:00:14 jik5.kamens.us systemd[1]: fail2ban.service: Consumed 1min 3.033s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: inotify-canary-pause.service: Control process exited, code=exited, status=1/FAILURE Mar 22 16:00:14 jik5.kamens.us systemd[1]: inotify-canary-pause.service: Failed with result 'exit-code'. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped inotify-canary-pause.service - Pause inotify canary on shutdown. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@11-main.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped postgresql@11-main.service - PostgreSQL Cluster 11-main. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@11-main.service: Consumed 30.133s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@12-main.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped postgresql@12-main.service - PostgreSQL Cluster 12-main. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@12-main.service: Consumed 31.159s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@13-main.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped postgresql@13-main.service - PostgreSQL Cluster 13-main. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@13-main.service: Consumed 30.471s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@14-main.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped postgresql@14-main.service - PostgreSQL Cluster 14-main. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@14-main.service: Consumed 27.811s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@15-main.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped postgresql@15-main.service - PostgreSQL Cluster 15-main. Mar 22 16:00:14 jik5.kamens.us systemd[1]: postgresql@15-main.service: Consumed 24.070s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: snap.cups.cups-browsed.service: Failed with result 'exit-code'. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped snap.cups.cups-browsed.service - Service for snap application cups.cups-browsed. Mar 22 16:00:14 jik5.kamens.us systemd[1]: session-6.scope: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped session-6.scope - Session 6 of User jik. Mar 22 16:00:14 jik5.kamens.us systemd[1]: session-6.scope: Consumed 1min 39.081s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Removed slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:00:14 jik5.kamens.us systemd[1]: system-postgresql.slice: Consumed 2min 23.644s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping systemd-logind.service - User Login Management... Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopping user@1000.service - User Manager for UID 1000... Mar 22 16:00:14 jik5.kamens.us systemd-logind[2079]: Removed session 6. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Activating special unit exit.target... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping app-gnome-org.gnome.SettingsDaemon.DiskUtilityNotify-26405.scope - Application launched by gnome-session-binary... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping app-gnome-synology\x2ddrive\x2dautostart-26395.scope - Application launched by gnome-session-binary... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped app-gnome-user\x2ddirs\x2dupdate\x2dgtk-26426.scope - Application launched by gnome-session-binary. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping app-gnome-zeitgeist\x2ddatahub-31198.scope - Application launched by gnome-session-binary... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped vte-spawn-85194279-c0fc-42b3-bc81-223bbf8ad891.scope - VTE child process 132185 launched by gnome-terminal-server process 132161. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: vte-spawn-85194279-c0fc-42b3-bc81-223bbf8ad891.scope: Consumed 1min 13.428s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Removed slice app-org.gnome.Terminal.slice - Slice /app/org.gnome.Terminal. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: app-org.gnome.Terminal.slice: Consumed 1min 15.332s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target default.target - Main User Target. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping appimagelauncherd.service - AppImageLauncher daemon... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping dbus.service - D-Bus User Message Bus... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping dconf.service - User preferences database... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping eruv.service - Eruv status checker... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping evolution-addressbook-factory.service - Evolution address book service... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping evolution-calendar-factory.service - Evolution calendar service... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping evolution-source-registry.service - Evolution source registry... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping gnome-remote-desktop.service - GNOME Remote Desktop... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping pipewire-pulse.service - PipeWire PulseAudio... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping synology-inotify.service - Force hard-linked files to sync to Synology Drive... Mar 22 16:00:14 jik5.kamens.us gnome-session-binary[26058]: WARNING: Lost name on bus: org.gnome.SessionManager Mar 22 16:00:14 jik5.kamens.us kernel: audit: type=1326 audit(1679515214.603:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=2854 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7f103486c39b code=0x50000 Mar 22 16:00:14 jik5.kamens.us audit[2854]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=2854 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7f103486c39b code=0x50000 Mar 22 16:00:14 jik5.kamens.us gnome-session[26058]: gnome-session-binary[26058]: WARNING: Lost name on bus: org.gnome.SessionManager Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping tracker-miner-fs-3.service - Tracker file system data miner... Mar 22 16:00:14 jik5.kamens.us zeitgeist-daemon[31216]: [20:00:14.589367 WARNING] zeitgeist-daemon.vala:453: The connection is closed Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping x10-transceiver.service - X10 transceiver... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping zeitgeist-fts.service - Zeitgeist full-text search indexer... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping zeitgeist.service - Zeitgeist activity log service... Mar 22 16:00:14 jik5.kamens.us zeitgeist-fts[31225]: Error releasing name org.gnome.zeitgeist.SimpleIndexer: The connection is closed Mar 22 16:00:14 jik5.kamens.us zeitgeist-fts[31225]: zeitgeist-fts.vala:252: The connection is closed Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped appimagelauncherd.service - AppImageLauncher daemon. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: appimagelauncherd.service: Consumed 1min 37.540s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped eruv.service - Eruv status checker. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped synology-inotify.service - Force hard-linked files to sync to Synology Drive. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: synology-inotify.service: Consumed 1min 29.174s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped pipewire-pulse.service - PipeWire PulseAudio. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: pipewire-pulse.service: Consumed 19.172s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped x10-transceiver.service - X10 transceiver. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: x10-transceiver.service: Consumed 46.733s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped dbus.service - D-Bus User Message Bus. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: dbus.service: Consumed 14.765s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gnome-keyring-daemon.service - GNOME Keyring daemon. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: gnome-keyring-daemon.service: Consumed 1.590s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped evolution-source-registry.service - Evolution source registry. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: evolution-source-registry.service: Consumed 1.227s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped dconf.service - User preferences database. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped zeitgeist.service - Zeitgeist activity log service. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped zeitgeist-fts.service - Zeitgeist full-text search indexer. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped app-gnome-zeitgeist\x2ddatahub-31198.scope - Application launched by gnome-session-binary. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: app-gnome-zeitgeist\x2ddatahub-31198.scope: Consumed 2.744s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped app-gnome-org.gnome.SettingsDaemon.DiskUtilityNotify-26405.scope - Application launched by gnome-session-binary. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: app-gnome-org.gnome.SettingsDaemon.DiskUtilityNotify-26405.scope: Consumed 1.897s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping wireplumber.service - Multimedia Service Session Manager... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped evolution-calendar-factory.service - Evolution calendar service. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: evolution-calendar-factory.service: Consumed 19.149s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped evolution-addressbook-factory.service - Evolution address book service. Mar 22 16:00:14 jik5.kamens.us gnome-session-f[205080]: Cannot open display: Mar 22 16:00:14 jik5.kamens.us wireplumber[25430]: stopped by signal: Terminated Mar 22 16:00:14 jik5.kamens.us wireplumber[25430]: disconnected from pipewire Mar 22 16:00:14 jik5.kamens.us thermald[2082]: terminating on user request .. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped wireplumber.service - Multimedia Service Session Manager. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: wireplumber.service: Consumed 4.366s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: systemd-logind.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped systemd-logind.service - User Login Management. Mar 22 16:00:14 jik5.kamens.us systemd[1]: systemd-logind.service: Consumed 6.989s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gnome-remote-desktop.service - GNOME Remote Desktop. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: gnome-remote-desktop.service: Consumed 1min 18.476s CPU time. Mar 22 16:00:14 jik5.kamens.us gnome-session-c[205090]: Couldn't connect to session bus: Error receiving data: Connection reset by peer Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping pipewire.service - PipeWire Multimedia Service... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gnome-session-manager@ubuntu.service - GNOME Session Manager (session: ubuntu). Mar 22 16:00:14 jik5.kamens.us systemd[25417]: gnome-session-manager@ubuntu.service: Consumed 1.024s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[1]: tmp-snap.rootfs_UzbjCC.mount: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Removed slice app-gnome\x2dsession\x2dmanager.slice - Slice /app/gnome-session-manager. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: app-gnome\x2dsession\x2dmanager.slice: Consumed 1.024s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target gnome-session-pre.target - Tasks to be run before GNOME Session starts. Mar 22 16:00:14 jik5.kamens.us systemd[1]: run-user-0.mount: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target graphical-session-pre.target - Session services which should run early before the graphical session is brought up. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Unmounted run-user-0.mount - /run/user/0. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Reached target gnome-session-shutdown.target - Shutdown running GNOME Session. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping gcr-ssh-agent.service - GCR ssh-agent wrapper... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Starting gnome-session-restart-dbus.service - Restart DBus after GNOME Session shutdown... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopping ssh-agent.service - OpenSSH Agent... Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped pipewire.service - PipeWire Multimedia Service. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: pipewire.service: Consumed 16.792s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped gcr-ssh-agent.service - GCR ssh-agent wrapper. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: ssh-agent.service: Main process exited, code=exited, status=2/INVALIDARGUMENT Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Removed slice session.slice - User Core Session Slice. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: session.slice: Consumed 3h 29min 13.591s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target gnome-session-shutdown.target - Shutdown running GNOME Session. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Started gnome-session-restart-dbus.service - Restart DBus after GNOME Session shutdown. Mar 22 16:00:14 jik5.kamens.us gnome-session-c[205104]: Couldn't connect to session bus: Error sending credentials: Error sending message: Broken pipe Mar 22 16:00:14 jik5.kamens.us agent-launch[205108]: dbus-update-activation-environment: error: unable to connect to D-Bus: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: ssh-agent.service: Control process exited, code=exited, status=71/OSERR Mar 22 16:00:14 jik5.kamens.us systemd[25417]: ssh-agent.service: Failed with result 'exit-code'. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped ssh-agent.service - OpenSSH Agent. Mar 22 16:00:14 jik5.kamens.us vboxdrv.sh[204980]: vboxdrv.sh: Stopping VirtualBox services. Mar 22 16:00:14 jik5.kamens.us vboxdrv.sh[205143]: Stopping VirtualBox services. Mar 22 16:00:14 jik5.kamens.us tracker-miner-fs-3[25588]: OK Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped tracker-miner-fs-3.service - Tracker file system data miner. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: tracker-miner-fs-3.service: Consumed 3.373s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Removed slice background.slice - User Background Tasks Slice. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: background.slice: Consumed 4.209s CPU time. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target basic.target - Basic System. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target paths.target - Paths. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped ubuntu-report.path - Pending report trigger for Ubuntu Report. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target sockets.target - Sockets. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Stopped target timers.target - Timers. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed dbus.socket - D-Bus User Message Bus Socket. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed dirmngr.socket - GnuPG network certificate management daemon. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed gcr-ssh-agent.socket - GCR ssh-agent wrapper. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed gnome-keyring-daemon.socket - GNOME Keyring daemon. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed gpg-agent-browser.socket - GnuPG cryptographic agent and passphrase cache (access for web browsers). Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed gpg-agent-extra.socket - GnuPG cryptographic agent and passphrase cache (restricted). Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed gpg-agent-ssh.socket - GnuPG cryptographic agent (ssh-agent emulation). Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed gpg-agent.socket - GnuPG cryptographic agent and passphrase cache. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed pipewire.socket - PipeWire Multimedia System Socket. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed pk-debconf-helper.socket - debconf communication socket. Mar 22 16:00:14 jik5.kamens.us systemd[25417]: Closed snapd.session-agent.socket - REST API socket for snapd user session agent. Mar 22 16:00:14 jik5.kamens.us vboxdrv.sh[205158]: VirtualBox services stopped. Mar 22 16:00:14 jik5.kamens.us systemd[1]: vboxdrv.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped vboxdrv.service - VirtualBox Linux kernel module. Mar 22 16:00:14 jik5.kamens.us systemd[1]: snap.cups.cupsd.service: Deactivated successfully. Mar 22 16:00:14 jik5.kamens.us systemd[1]: Stopped snap.cups.cupsd.service - Service for snap application cups.cupsd. Mar 22 16:00:14 jik5.kamens.us systemd[1]: snap.cups.cupsd.service: Consumed 4.852s CPU time. Mar 22 16:00:15 jik5.kamens.us systemd[1]: thermald.service: Deactivated successfully. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopped thermald.service - Thermal Daemon Service. Mar 22 16:00:15 jik5.kamens.us systemd[1]: thermald.service: Consumed 11.897s CPU time. Mar 22 16:00:15 jik5.kamens.us systemd[25417]: Stopped app-gnome-synology\x2ddrive\x2dautostart-26395.scope - Application launched by gnome-session-binary. Mar 22 16:00:15 jik5.kamens.us systemd[25417]: app-gnome-synology\x2ddrive\x2dautostart-26395.scope: Consumed 8min 56.195s CPU time. Mar 22 16:00:15 jik5.kamens.us systemd[25417]: Removed slice app.slice - User Application Slice. Mar 22 16:00:15 jik5.kamens.us systemd[25417]: app.slice: Consumed 1h 14min 37.220s CPU time. Mar 22 16:00:15 jik5.kamens.us systemd[25417]: Reached target shutdown.target - Shutdown. Mar 22 16:00:15 jik5.kamens.us systemd[25417]: Finished systemd-exit.service - Exit the Session. Mar 22 16:00:15 jik5.kamens.us systemd[25417]: Reached target exit.target - Exit the Session. Mar 22 16:00:15 jik5.kamens.us systemd[1]: user@1000.service: Killing process 132247 (TeamViewer) with signal SIGKILL. Mar 22 16:00:15 jik5.kamens.us systemd[1]: user@1000.service: Killing process 204778 (TeamViewer) with signal SIGKILL. Mar 22 16:00:15 jik5.kamens.us systemd[1]: user@1000.service: Killing process 204786 (bzip2) with signal SIGKILL. Mar 22 16:00:15 jik5.kamens.us systemd[1]: user@1000.service: Killing process 132314 (QQuickPixmapRea) with signal SIGKILL. Mar 22 16:00:15 jik5.kamens.us systemd[1]: teamviewerd.service: Deactivated successfully. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopped teamviewerd.service - TeamViewer remote control daemon. Mar 22 16:00:15 jik5.kamens.us systemd[1]: teamviewerd.service: Consumed 38.109s CPU time. Mar 22 16:00:15 jik5.kamens.us systemd[1]: user@1000.service: Deactivated successfully. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopped user@1000.service - User Manager for UID 1000. Mar 22 16:00:15 jik5.kamens.us systemd[1]: user@1000.service: Consumed 4h 44min 9.584s CPU time. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopping systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopping systemd-user-sessions.service - Permit User Sessions... Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopping user-runtime-dir@1000.service - User Runtime Directory /run/user/1000... Mar 22 16:00:15 jik5.kamens.us systemd[1]: systemd-oomd.service: Deactivated successfully. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopped systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:00:15 jik5.kamens.us systemd[1]: systemd-oomd.service: Consumed 4min 1.723s CPU time. Mar 22 16:00:15 jik5.kamens.us systemd[1]: systemd-user-sessions.service: Deactivated successfully. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopped systemd-user-sessions.service - Permit User Sessions. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopped target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Stopped target remote-fs.target - Remote File Systems. Mar 22 16:00:15 jik5.kamens.us systemd[1]: Unmounting home-jik-ogg.mount - /home/jik/ogg... Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounting home-jik-pictures.mount - /home/jik/pictures... Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes... Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-music.mount - /mnt/nas/nfs/music... Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo... Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-video.mount - /mnt/nas/nfs/video... Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounting mnt-video.mount - /mnt/video... Mar 22 16:00:16 jik5.kamens.us systemd[1]: run-user-1000.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted run-user-1000.mount - /run/user/1000. Mar 22 16:00:16 jik5.kamens.us systemd[1]: user-runtime-dir@1000.service: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped user-runtime-dir@1000.service - User Runtime Directory /run/user/1000. Mar 22 16:00:16 jik5.kamens.us systemd[1]: home-jik-ogg.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted home-jik-ogg.mount - /home/jik/ogg. Mar 22 16:00:16 jik5.kamens.us systemd[1]: home-jik-pictures.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted home-jik-pictures.mount - /home/jik/pictures. Mar 22 16:00:16 jik5.kamens.us systemd[1]: mnt-nas-nfs-photo.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo. Mar 22 16:00:16 jik5.kamens.us systemd[1]: mnt-video.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted mnt-video.mount - /mnt/video. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Removed slice user-1000.slice - User Slice of UID 1000. Mar 22 16:00:16 jik5.kamens.us systemd[1]: user-1000.slice: Consumed 4h 46min 27.845s CPU time. Mar 22 16:00:16 jik5.kamens.us systemd[1]: mnt-nas-nfs-homes.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes. Mar 22 16:00:16 jik5.kamens.us systemd[1]: mnt-nas-nfs-music.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-music.mount - /mnt/nas/nfs/music. Mar 22 16:00:16 jik5.kamens.us systemd[1]: mnt-nas-nfs-video.mount: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-video.mount - /mnt/nas/nfs/video. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped target network-online.target - Network is Online. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped target network.target - Network. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped target nfs-client.target - NFS client services. Mar 22 16:00:16 jik5.kamens.us systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped NetworkManager-wait-online.service - Network Manager Wait Online. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopping NetworkManager.service - Network Manager... Mar 22 16:00:16 jik5.kamens.us NetworkManager[2122]: [1679515216.3309] caught SIGTERM, shutting down normally. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopping wpa_supplicant.service - WPA supplicant... Mar 22 16:00:16 jik5.kamens.us NetworkManager[2122]: [1679515216.3317] manager: NetworkManager state is now CONNECTED_SITE Mar 22 16:00:16 jik5.kamens.us dbus-daemon[2005]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.15' (uid=0 pid=2122 comm="/usr/sbin/NetworkManager --no-daemon" label="unconfined") Mar 22 16:00:16 jik5.kamens.us NetworkManager[2122]: [1679515216.3327] device (wlp3s0): state change: unavailable -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Mar 22 16:00:16 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for NetworkManager-dispatcher.service/start is destructive (home-macback-home-macback-backup.mount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:16 jik5.kamens.us dbus-daemon[2005]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.nm-dispatcher.service': Transaction for NetworkManager-dispatcher.service/start is destructive (home-macback-home-macback-backup.mount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:00:16 jik5.kamens.us systemd[1]: wpa_supplicant.service: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped wpa_supplicant.service - WPA supplicant. Mar 22 16:00:16 jik5.kamens.us NetworkManager[2122]: [1679515216.3764] exiting (success) Mar 22 16:00:16 jik5.kamens.us systemd[1]: NetworkManager.service: Deactivated successfully. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped NetworkManager.service - Network Manager. Mar 22 16:00:16 jik5.kamens.us systemd[1]: NetworkManager.service: Consumed 18.442s CPU time. Mar 22 16:00:16 jik5.kamens.us systemd[1]: Stopped target network-pre.target - Preparation for Network. Mar 22 16:00:18 jik5.kamens.us systemd[1]: displaylink-driver.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped displaylink-driver.service - DisplayLink Driver Service. Mar 22 16:00:18 jik5.kamens.us systemd[1]: displaylink-driver.service: Consumed 16min 38.876s CPU time. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target basic.target - Basic System. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-ask-password-plymouth.path: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target paths.target - Path Units. Mar 22 16:00:18 jik5.kamens.us systemd[1]: apport-autoreport.path: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped apport-autoreport.path - Process error reports when automatic reporting is enabled (file watch). Mar 22 16:00:18 jik5.kamens.us systemd[1]: cups.path: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped cups.path - CUPS Scheduler. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-ask-password-wall.path: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Mar 22 16:00:18 jik5.kamens.us systemd[1]: whoopsie.path: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped whoopsie.path - Start whoopsie on modification of the /var/crash directory. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target slices.target - Slice Units. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Removed slice user.slice - User and Session Slice. Mar 22 16:00:18 jik5.kamens.us systemd[1]: user.slice: Consumed 4h 53min 1.251s CPU time. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target sockets.target - Socket Units. Mar 22 16:00:18 jik5.kamens.us systemd[1]: avahi-daemon.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed avahi-daemon.socket - Avahi mDNS/DNS-SD Stack Activation Socket. Mar 22 16:00:18 jik5.kamens.us systemd[1]: cups.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed cups.socket - CUPS Scheduler. Mar 22 16:00:18 jik5.kamens.us systemd[1]: docker.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed docker.socket - Docker Socket for the API. Mar 22 16:00:18 jik5.kamens.us systemd[1]: pcscd.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed pcscd.socket - PC/SC Smart Card Daemon Activation Socket. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snapd.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed snapd.socket - Socket activation for snappy daemon. Mar 22 16:00:18 jik5.kamens.us systemd[1]: spice-vdagentd.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed spice-vdagentd.socket - Activation socket for spice guest agent daemon. Mar 22 16:00:18 jik5.kamens.us systemd[1]: ssh.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed ssh.socket - OpenBSD Secure Shell server socket. Mar 22 16:00:18 jik5.kamens.us systemd[1]: syslog.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed syslog.socket - Syslog Socket. Mar 22 16:00:18 jik5.kamens.us systemd[1]: uuidd.socket: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Closed uuidd.socket - UUID daemon activation socket. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target sysinit.target - System Initialization. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target integritysetup.target - Local Integrity Protected Volumes. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target veritysetup.target - Local Verity Protected Volumes. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopping systemd-binfmt.service - Set Up Additional Binary Formats... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopping systemd-resolved.service - Network Name Resolution... Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopping systemd-timesyncd.service - Network Time Synchronization... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopping systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-credentials-systemd\x2dsysctl.service.mount - /run/credentials/systemd-sysctl.service. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-resolved.service - Network Name Resolution. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-resolved.service: Consumed 11.020s CPU time. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-timesyncd.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-timesyncd.service - Network Time Synchronization. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-binfmt.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-binfmt.service - Set Up Additional Binary Formats. Mar 22 16:00:18 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.automount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unset automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Mar 22 16:00:18 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-update-utmp.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target local-fs.target - Local File Systems. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target snapd.mounts.target - Mounted snaps. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting boot-efi.mount - /boot/efi... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting home-macback-home-macback-backup.mount - /home/macback/home/macback/backup... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-credentials-systemd\x2dsysusers.service.mount - /run/credentials/systemd-sysusers.service... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount - /run/credentials/systemd-tmpfiles-setup.service... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount - /run/credentials/systemd-tmpfiles-setup-dev.service... Mar 22 16:00:18 jik5.kamens.us umount[205186]: umount: /run/credentials/systemd-tmpfiles-setup.service: no mount point specified. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-snapd-ns-canonical\x2dlivepatch.mnt.mount - /run/snapd/ns/canonical-livepatch.mnt... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-snapd-ns-firefox.mnt.mount - /run/snapd/ns/firefox.mnt... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-snapd-ns-snap\x2dstore.mnt.mount - /run/snapd/ns/snap-store.mnt... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-snapd-ns-snapd\x2ddesktop\x2dintegration.mnt.mount - /run/snapd/ns/snapd-desktop-integration.mnt... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-bare-5.mount - Mount unit for bare, revision 5... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-bw-45.mount - Mount unit for bw, revision 45... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-bw-46.mount - Mount unit for bw, revision 46... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-chromium-2381.mount - Mount unit for chromium, revision 2381... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-chromium-2392.mount - Mount unit for chromium, revision 2392... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core-14784.mount - Mount unit for core, revision 14784... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core-14946.mount - Mount unit for core, revision 14946... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core18-2708.mount - Mount unit for core18, revision 2708... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core18-2714.mount - Mount unit for core18, revision 2714... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core20-1828.mount - Mount unit for core20, revision 1828... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core20-1852.mount - Mount unit for core20, revision 1852... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core22-522.mount - Mount unit for core22, revision 522... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-core22-547.mount - Mount unit for core22, revision 547... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-cups-836.mount - Mount unit for cups, revision 836... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-cups-872.mount - Mount unit for cups, revision 872... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-firefox-2432.mount - Mount unit for firefox, revision 2432... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-firefox-2487.mount - Mount unit for firefox, revision 2487... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-vault-1930.mount - Mount unit for vault, revision 1930... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting snap-vault-1958.mount - Mount unit for vault, revision 1958... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control... Mar 22 16:00:18 jik5.kamens.us systemd[1]: boot-efi.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted boot-efi.mount - /boot/efi. Mar 22 16:00:18 jik5.kamens.us systemd[1]: home-jik4back-home-jik4back-backup.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup. Mar 22 16:00:18 jik5.kamens.us systemd[1]: home-macback-home-macback-backup.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted home-macback-home-macback-backup.mount - /home/macback/home/macback/backup. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-credentials-systemd\x2dsysusers.service.mount - /run/credentials/systemd-sysusers.service. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Failed with result 'exit-code'. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount - /run/credentials/systemd-tmpfiles-setup.service. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount - /run/credentials/systemd-tmpfiles-setup-dev.service. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-snapd-ns-canonical\x2dlivepatch.mnt.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-snapd-ns-canonical\x2dlivepatch.mnt.mount - /run/snapd/ns/canonical-livepatch.mnt. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-snapd-ns-firefox.mnt.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-snapd-ns-firefox.mnt.mount - /run/snapd/ns/firefox.mnt. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-snapd-ns-snap\x2dstore.mnt.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-snapd-ns-snap\x2dstore.mnt.mount - /run/snapd/ns/snap-store.mnt. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-snapd-ns-snapd\x2ddesktop\x2dintegration.mnt.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted run-snapd-ns-snapd\x2ddesktop\x2dintegration.mnt.mount - /run/snapd/ns/snapd-desktop-integration.mnt. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-bare-5.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-bare-5.mount - Mount unit for bare, revision 5. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-bitcoin\x2dcore-120.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-bitcoin\x2dcore-126.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-bw-45.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-bw-45.mount - Mount unit for bw, revision 45. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-bw-46.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-bw-46.mount - Mount unit for bw, revision 46. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-canonical\x2dlivepatch-146.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-canonical\x2dlivepatch-164.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-chromium-2381.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-chromium-2381.mount - Mount unit for chromium, revision 2381. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-chromium-2392.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-chromium-2392.mount - Mount unit for chromium, revision 2392. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-chromium\x2dffmpeg-28.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-chromium\x2dffmpeg-30.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core-14784.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core-14784.mount - Mount unit for core, revision 14784. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core-14946.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core-14946.mount - Mount unit for core, revision 14946. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core18-2708.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core18-2708.mount - Mount unit for core18, revision 2708. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core18-2714.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core18-2714.mount - Mount unit for core18, revision 2714. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core20-1828.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core20-1828.mount - Mount unit for core20, revision 1828. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core20-1852.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core20-1852.mount - Mount unit for core20, revision 1852. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core22-522.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core22-522.mount - Mount unit for core22, revision 522. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-core22-547.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-core22-547.mount - Mount unit for core22, revision 547. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-cups-836.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-cups-836.mount - Mount unit for cups, revision 836. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-cups-872.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-cups-872.mount - Mount unit for cups, revision 872. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-firefox-2432.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-firefox-2432.mount - Mount unit for firefox, revision 2432. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-firefox-2487.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-firefox-2487.mount - Mount unit for firefox, revision 2487. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d26\x2d1604-102.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d26\x2d1604-104.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d28\x2d1804-145.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d28\x2d1804-161.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d34\x2d1804-72.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d34\x2d1804-77.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d38\x2d2004-115.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d3\x2d38\x2d2004-119.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d42\x2d2204-56.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2d42\x2d2204-65.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2dsystem\x2dmonitor-178.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gnome\x2dsystem\x2dmonitor-181.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gtk\x2dcommon\x2dthemes-1534.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-gtk\x2dcommon\x2dthemes-1535.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-snap\x2dstore-599.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-snap\x2dstore-638.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-snapd\x2ddesktop\x2dintegration-49.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-snapd\x2ddesktop\x2dintegration-71.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-vault-1930.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-vault-1930.mount - Mount unit for vault, revision 1930. Mar 22 16:00:18 jik5.kamens.us systemd[1]: snap-vault-1958.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted snap-vault-1958.mount - Mount unit for vault, revision 1958. Mar 22 16:00:18 jik5.kamens.us systemd[1]: var-snap-firefox-common-host\x2dhunspell.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target snapd.mounts-pre.target - Mounting snaps. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting boot.mount - /boot... Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounting run-snapd-ns.mount - /run/snapd/ns... Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5. Mar 22 16:00:18 jik5.kamens.us umount[205275]: umount: /run/snapd/ns: target is busy. Mar 22 16:00:18 jik5.kamens.us systemd[1]: run-snapd-ns.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:00:18 jik5.kamens.us systemd[1]: Failed unmounting run-snapd-ns.mount - /run/snapd/ns. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target swap.target - Swaps. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Deactivating swap dev-disk-by\x2did-dm\x2dname\x2dubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/disk/by-id/dm-name-ubuntu--vg-swap_1... Mar 22 16:00:18 jik5.kamens.us kernel: EXT4-fs (sdc2): unmounting filesystem. Mar 22 16:00:18 jik5.kamens.us systemd[1]: dev-ubuntu\x2dvg-swap_1.swap: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Deactivated swap dev-ubuntu\x2dvg-swap_1.swap - /dev/ubuntu-vg/swap_1. Mar 22 16:00:18 jik5.kamens.us systemd[1]: dev-disk-by\x2did-dm\x2duuid\x2dLVM\x2doYZBFLLoJL23j8Ioe96kFOzxfqEda3UDMKdOUBWqi0Pdbkr0l5AzRSdYmlhCyoS5.swap: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Deactivated swap dev-disk-by\x2did-dm\x2duuid\x2dLVM\x2doYZBFLLoJL23j8Ioe96kFOzxfqEda3UDMKdOUBWqi0Pdbkr0l5AzRSdYmlhCyoS5.swap - /dev/disk/by-id/dm-uuid-LVM-oYZBFLLoJL23j8Ioe96kFOzxfqEda3UDMKdOUBWqi0Pdbkr0l5AzRSdYmlhCyoS5. Mar 22 16:00:18 jik5.kamens.us systemd[1]: dev-disk-by\x2duuid-cbe84b9f\x2d903d\x2d4107\x2d91f5\x2d35d5b38a70af.swap: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Deactivated swap dev-disk-by\x2duuid-cbe84b9f\x2d903d\x2d4107\x2d91f5\x2d35d5b38a70af.swap - /dev/disk/by-uuid/cbe84b9f-903d-4107-91f5-35d5b38a70af. Mar 22 16:00:18 jik5.kamens.us systemd[1]: dev-disk-by\x2did-dm\x2dname\x2dubuntu\x2d\x2dvg\x2dswap_1.swap: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Deactivated swap dev-disk-by\x2did-dm\x2dname\x2dubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/disk/by-id/dm-name-ubuntu--vg-swap_1. Mar 22 16:00:18 jik5.kamens.us systemd[1]: dev-dm\x2d2.swap: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Deactivated swap dev-dm\x2d2.swap - /dev/dm-2. Mar 22 16:00:18 jik5.kamens.us systemd[1]: dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Deactivated swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:00:18 jik5.kamens.us systemd[1]: boot.mount: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Unmounted boot.mount - /boot. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Reached target umount.target - Unmount All Filesystems. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Removed slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped target local-fs-pre.target - Preparation for Local File Systems. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopping lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-sysusers.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-sysusers.service - Create System Users. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-remount-fs.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped systemd-remount-fs.service - Remount Root and Kernel File Systems. Mar 22 16:00:18 jik5.kamens.us lvm[205278]: 2 logical volume(s) in volume group "ubuntu-vg" unmonitored Mar 22 16:00:18 jik5.kamens.us systemd[1]: lvm2-monitor.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Stopped lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Reached target shutdown.target - System Shutdown. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Reached target final.target - Late Shutdown Services. Mar 22 16:00:18 jik5.kamens.us systemd[1]: systemd-reboot.service: Deactivated successfully. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Finished systemd-reboot.service - System Reboot. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Reached target reboot.target - System Reboot. Mar 22 16:00:18 jik5.kamens.us systemd[1]: Shutting down. Mar 22 16:00:18 jik5.kamens.us systemd-shutdown[1]: Syncing filesystems and block devices. Mar 22 16:00:19 jik5.kamens.us systemd-shutdown[1]: Sending SIGTERM to remaining processes... Mar 22 16:00:19 jik5.kamens.us systemd-journald[715]: Received SIGTERM from PID 1 (systemd-shutdow). Mar 22 16:00:19 jik5.kamens.us systemd-journald[715]: Journal stopped -- Boot f310597cea31437597e3c57d9cd0cf6d -- Mar 22 16:01:00 jik5.kamens.us kernel: microcode: microcode updated early to revision 0xf0, date = 2021-11-12 Mar 22 16:01:00 jik5.kamens.us kernel: Linux version 6.2.0-18-generic (buildd@lcy02-amd64-099) (x86_64-linux-gnu-gcc-12 (Ubuntu 12.2.0-17ubuntu1) 12.2.0, GNU ld (GNU Binutils for Ubuntu) 2.40) #18-Ubuntu SMP PREEMPT_DYNAMIC Thu Mar 16 00:09:48 UTC 2023 (Ubuntu 6.2.0-18.18-generic 6.2.6) Mar 22 16:01:00 jik5.kamens.us kernel: Command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 Mar 22 16:01:00 jik5.kamens.us kernel: KERNEL supported cpus: Mar 22 16:01:00 jik5.kamens.us kernel: Intel GenuineIntel Mar 22 16:01:00 jik5.kamens.us kernel: AMD AuthenticAMD Mar 22 16:01:00 jik5.kamens.us kernel: Hygon HygonGenuine Mar 22 16:01:00 jik5.kamens.us kernel: Centaur CentaurHauls Mar 22 16:01:00 jik5.kamens.us kernel: zhaoxin Shanghai Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Mar 22 16:01:00 jik5.kamens.us kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Mar 22 16:01:00 jik5.kamens.us kernel: signal: max sigframe size: 2032 Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-provided physical RAM map: Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000100000-0x000000008a870fff] usable Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:01:00 jik5.kamens.us kernel: NX (Execute Disable) protection: active Mar 22 16:01:00 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:01:00 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:01:00 jik5.kamens.us kernel: extended physical RAM map: Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000089217017] usable Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089217018-0x0000000089238c57] usable Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089238c58-0x000000008a870fff] usable Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:01:00 jik5.kamens.us kernel: efi: EFI v2.40 by Acer Inc. Mar 22 16:01:00 jik5.kamens.us kernel: efi: ESRT=0x8f9afe98 ACPI=0x8eff2000 ACPI 2.0=0x8eff2000 SMBIOS=0x8f9ae000 SMBIOS 3.0=0x8f9ad000 MOKvar=0x8f71f000 RNG=0x8eff1f98 TPMEventLog=0x8a91c018 Mar 22 16:01:00 jik5.kamens.us kernel: random: crng init done Mar 22 16:01:00 jik5.kamens.us kernel: TPM Final Events table not present Mar 22 16:01:00 jik5.kamens.us kernel: efi: Remove mem41: MMIO range=[0xe0000000-0xefffffff] (256MB) from e820 map Mar 22 16:01:00 jik5.kamens.us kernel: e820: remove [mem 0xe0000000-0xefffffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: efi: Not removing mem42: MMIO range=[0xfe000000-0xfe010fff] (68KB) from e820 map Mar 22 16:01:00 jik5.kamens.us kernel: efi: Not removing mem43: MMIO range=[0xfec00000-0xfec00fff] (4KB) from e820 map Mar 22 16:01:00 jik5.kamens.us kernel: efi: Not removing mem44: MMIO range=[0xfee00000-0xfee00fff] (4KB) from e820 map Mar 22 16:01:00 jik5.kamens.us kernel: efi: Remove mem45: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map Mar 22 16:01:00 jik5.kamens.us kernel: e820: remove [mem 0xff000000-0xffffffff] reserved Mar 22 16:01:00 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:01:00 jik5.kamens.us kernel: SMBIOS 3.0.0 present. Mar 22 16:01:00 jik5.kamens.us kernel: DMI: Acer Predator G6-710/Predator G6-710, BIOS R01-A4 05/18/2016 Mar 22 16:01:00 jik5.kamens.us kernel: tsc: Detected 4000.000 MHz processor Mar 22 16:01:00 jik5.kamens.us kernel: tsc: Detected 3999.984 MHz TSC Mar 22 16:01:00 jik5.kamens.us kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 22 16:01:00 jik5.kamens.us kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 22 16:01:00 jik5.kamens.us kernel: last_pfn = 0x46f000 max_arch_pfn = 0x400000000 Mar 22 16:01:00 jik5.kamens.us kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 22 16:01:00 jik5.kamens.us kernel: last_pfn = 0x8faff max_arch_pfn = 0x400000000 Mar 22 16:01:00 jik5.kamens.us kernel: esrt: Reserving ESRT space from 0x000000008f9afe98 to 0x000000008f9afed0. Mar 22 16:01:00 jik5.kamens.us kernel: Using GB pages for direct mapping Mar 22 16:01:00 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:01:00 jik5.kamens.us kernel: RAMDISK: [mem 0x6ceaf000-0x7503cfff] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Early table checksum verification disabled Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: RSDP 0x000000008EFF2000 000024 (v02 ACRSYS) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: XSDT 0x000000008EFF20A8 0000CC (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: FACP 0x000000008F016C80 00010C (v05 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: DSDT 0x000000008EFF2200 024A7F (v02 ACRSYS ACRPRDCT 01072009 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: FACS 0x000000008F560F80 000040 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: APIC 0x000000008F016D90 0000BC (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: FPDT 0x000000008F016E50 000044 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: FIDT 0x000000008F016E98 00009C (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: MCFG 0x000000008F016F38 00003C (v01 ACRSYS ACRPRDCT 01072009 MSFT 00000097) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: HPET 0x000000008F016F78 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI. 0005000B) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F016FB0 00036D (v01 SataRe SataTabl 00001000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LPIT 0x000000008F017320 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F0173B8 000248 (v02 INTEL sensrhub 00000000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F017600 002BAE (v02 INTEL PtidDevc 00001000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01A1B0 000BE3 (v02 INTEL Ther_Rvp 00001000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: DBGP 0x000000008F01AD98 000034 (v01 INTEL 00000000 MSFT 0000005F) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: DBG2 0x000000008F01ADD0 000054 (v00 INTEL 00000000 MSFT 0000005F) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01AE28 000613 (v02 INTEL xh_rvp08 00000000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: MSDM 0x000000008F01B440 000055 (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01B498 00546C (v02 SaSsdt SaSsdt 00003000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: UEFI 0x000000008F020908 000042 (v01 00000000 00000000) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F020950 000E73 (v02 CpuRef CpuSsdt 00003000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: DMAR 0x000000008F0217C8 000070 (v01 INTEL SKL 00000001 INTL 00000001) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: TPM2 0x000000008F021838 000034 (v03 Tpm2Tabl 00000001 AMI 00000000) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: ASF! 0x000000008F021870 0000A5 (v32 INTEL HCG 00000001 TFSM 000F4240) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving FACP table memory at [mem 0x8f016c80-0x8f016d8b] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving DSDT table memory at [mem 0x8eff2200-0x8f016c7e] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving FACS table memory at [mem 0x8f560f80-0x8f560fbf] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving APIC table memory at [mem 0x8f016d90-0x8f016e4b] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving FPDT table memory at [mem 0x8f016e50-0x8f016e93] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving FIDT table memory at [mem 0x8f016e98-0x8f016f33] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving MCFG table memory at [mem 0x8f016f38-0x8f016f73] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving HPET table memory at [mem 0x8f016f78-0x8f016faf] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f016fb0-0x8f01731c] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving LPIT table memory at [mem 0x8f017320-0x8f0173b3] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f0173b8-0x8f0175ff] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f017600-0x8f01a1ad] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01a1b0-0x8f01ad92] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving DBGP table memory at [mem 0x8f01ad98-0x8f01adcb] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving DBG2 table memory at [mem 0x8f01add0-0x8f01ae23] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01ae28-0x8f01b43a] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving MSDM table memory at [mem 0x8f01b440-0x8f01b494] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01b498-0x8f020903] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving UEFI table memory at [mem 0x8f020908-0x8f020949] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f020950-0x8f0217c2] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving DMAR table memory at [mem 0x8f0217c8-0x8f021837] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving TPM2 table memory at [mem 0x8f021838-0x8f02186b] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Reserving ASF! table memory at [mem 0x8f021870-0x8f021914] Mar 22 16:01:00 jik5.kamens.us kernel: No NUMA configuration found Mar 22 16:01:00 jik5.kamens.us kernel: Faking a node at [mem 0x0000000000000000-0x000000046effffff] Mar 22 16:01:00 jik5.kamens.us kernel: NODE_DATA(0) allocated [mem 0x46efd5000-0x46effffff] Mar 22 16:01:00 jik5.kamens.us kernel: Zone ranges: Mar 22 16:01:00 jik5.kamens.us kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 22 16:01:00 jik5.kamens.us kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 22 16:01:00 jik5.kamens.us kernel: Normal [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:01:00 jik5.kamens.us kernel: Device empty Mar 22 16:01:00 jik5.kamens.us kernel: Movable zone start for each node Mar 22 16:01:00 jik5.kamens.us kernel: Early memory node ranges Mar 22 16:01:00 jik5.kamens.us kernel: node 0: [mem 0x0000000000001000-0x0000000000057fff] Mar 22 16:01:00 jik5.kamens.us kernel: node 0: [mem 0x0000000000059000-0x000000000009dfff] Mar 22 16:01:00 jik5.kamens.us kernel: node 0: [mem 0x0000000000100000-0x000000008a870fff] Mar 22 16:01:00 jik5.kamens.us kernel: node 0: [mem 0x000000008a8bc000-0x000000008e52bfff] Mar 22 16:01:00 jik5.kamens.us kernel: node 0: [mem 0x000000008fafe000-0x000000008fafefff] Mar 22 16:01:00 jik5.kamens.us kernel: node 0: [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:01:00 jik5.kamens.us kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000046effffff] Mar 22 16:01:00 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:01:00 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:01:00 jik5.kamens.us kernel: On node 0, zone DMA: 98 pages in unavailable ranges Mar 22 16:01:00 jik5.kamens.us kernel: On node 0, zone DMA32: 75 pages in unavailable ranges Mar 22 16:01:00 jik5.kamens.us kernel: On node 0, zone DMA32: 5586 pages in unavailable ranges Mar 22 16:01:00 jik5.kamens.us kernel: On node 0, zone Normal: 1281 pages in unavailable ranges Mar 22 16:01:00 jik5.kamens.us kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PM-Timer IO Port: 0x1808 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Mar 22 16:01:00 jik5.kamens.us kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 Mar 22 16:01:00 jik5.kamens.us kernel: TSC deadline timer available Mar 22 16:01:00 jik5.kamens.us kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00058000-0x00058fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009ffff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89217000-0x89217fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89238000-0x89238fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a871000-0x8a871fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a872000-0x8a8bbfff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8e52c000-0x8efe5fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8efe6000-0x8f021fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f022000-0x8f583fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f584000-0x8fafdfff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8faff000-0x8fafffff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fb00000-0x8fbfffff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fc00000-0xfdffffff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xfebfffff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec00000-0xfec00fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec01000-0xfedfffff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee00000-0xfee00fff] Mar 22 16:01:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee01000-0xffffffff] Mar 22 16:01:00 jik5.kamens.us kernel: [mem 0x8fc00000-0xfdffffff] available for PCI devices Mar 22 16:01:00 jik5.kamens.us kernel: Booting paravirtualized kernel on bare hardware Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Mar 22 16:01:00 jik5.kamens.us kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 22 16:01:00 jik5.kamens.us kernel: percpu: Embedded 61 pages/cpu s212992 r8192 d28672 u262144 Mar 22 16:01:00 jik5.kamens.us kernel: pcpu-alloc: s212992 r8192 d28672 u262144 alloc=1*2097152 Mar 22 16:01:00 jik5.kamens.us kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 22 16:01:00 jik5.kamens.us kernel: Fallback order for Node 0: 0 Mar 22 16:01:00 jik5.kamens.us kernel: Built 1 zonelists, mobility grouping on. Total pages: 4117646 Mar 22 16:01:00 jik5.kamens.us kernel: Policy zone: Normal Mar 22 16:01:00 jik5.kamens.us kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 Mar 22 16:01:00 jik5.kamens.us kernel: Unknown kernel command line parameters "splash BOOT_IMAGE=/vmlinuz-6.2.0-18-generic", will be passed to user space. Mar 22 16:01:00 jik5.kamens.us kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off Mar 22 16:01:00 jik5.kamens.us kernel: software IO TLB: area num 8. Mar 22 16:01:00 jik5.kamens.us kernel: Memory: 16105600K/16732664K available (20480K kernel code, 4148K rwdata, 13464K rodata, 4644K init, 17664K bss, 626804K reserved, 0K cma-reserved) Mar 22 16:01:00 jik5.kamens.us kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 22 16:01:00 jik5.kamens.us kernel: Kernel/User page tables isolation: enabled Mar 22 16:01:00 jik5.kamens.us kernel: ftrace: allocating 53106 entries in 208 pages Mar 22 16:01:00 jik5.kamens.us kernel: ftrace: allocated 208 pages with 3 groups Mar 22 16:01:00 jik5.kamens.us kernel: Dynamic Preempt: voluntary Mar 22 16:01:00 jik5.kamens.us kernel: rcu: Preemptible hierarchical RCU implementation. Mar 22 16:01:00 jik5.kamens.us kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 22 16:01:00 jik5.kamens.us kernel: Trampoline variant of Tasks RCU enabled. Mar 22 16:01:00 jik5.kamens.us kernel: Rude variant of Tasks RCU enabled. Mar 22 16:01:00 jik5.kamens.us kernel: Tracing variant of Tasks RCU enabled. Mar 22 16:01:00 jik5.kamens.us kernel: rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. Mar 22 16:01:00 jik5.kamens.us kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 22 16:01:00 jik5.kamens.us kernel: NR_IRQS: 524544, nr_irqs: 2048, preallocated irqs: 16 Mar 22 16:01:00 jik5.kamens.us kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 22 16:01:00 jik5.kamens.us kernel: spurious 8259A interrupt: IRQ7. Mar 22 16:01:00 jik5.kamens.us kernel: Console: colour dummy device 80x25 Mar 22 16:01:00 jik5.kamens.us kernel: printk: console [tty0] enabled Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Core revision 20221020 Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Mar 22 16:01:00 jik5.kamens.us kernel: APIC: Switch to symmetric I/O mode setup Mar 22 16:01:00 jik5.kamens.us kernel: DMAR: Host address width 39 Mar 22 16:01:00 jik5.kamens.us kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x1 Mar 22 16:01:00 jik5.kamens.us kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap d2008c40660462 ecap f050da Mar 22 16:01:00 jik5.kamens.us kernel: DMAR: RMRR base: 0x0000008ed60000 end: 0x0000008ed7ffff Mar 22 16:01:00 jik5.kamens.us kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed90000 IOMMU 0 Mar 22 16:01:00 jik5.kamens.us kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed90000 Mar 22 16:01:00 jik5.kamens.us kernel: DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. Mar 22 16:01:00 jik5.kamens.us kernel: DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. Mar 22 16:01:00 jik5.kamens.us kernel: DMAR-IR: Enabled IRQ remapping in xapic mode Mar 22 16:01:00 jik5.kamens.us kernel: x2apic: IRQ remapping doesn't support X2APIC mode Mar 22 16:01:00 jik5.kamens.us kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x73509d9fa88, max_idle_ns: 881590914879 ns Mar 22 16:01:00 jik5.kamens.us kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7999.96 BogoMIPS (lpj=15999936) Mar 22 16:01:00 jik5.kamens.us kernel: pid_max: default: 32768 minimum: 301 Mar 22 16:01:00 jik5.kamens.us kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor Mar 22 16:01:00 jik5.kamens.us kernel: landlock: Up and running. Mar 22 16:01:00 jik5.kamens.us kernel: Yama: becoming mindful. Mar 22 16:01:00 jik5.kamens.us kernel: AppArmor: AppArmor initialized Mar 22 16:01:00 jik5.kamens.us kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: x86/cpu: SGX disabled by BIOS. Mar 22 16:01:00 jik5.kamens.us kernel: CPU0: Thermal monitoring enabled (TM1) Mar 22 16:01:00 jik5.kamens.us kernel: process: using mwait in idle threads Mar 22 16:01:00 jik5.kamens.us kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 22 16:01:00 jik5.kamens.us kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Mar 22 16:01:00 jik5.kamens.us kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 22 16:01:00 jik5.kamens.us kernel: Spectre V2 : Mitigation: IBRS Mar 22 16:01:00 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 22 16:01:00 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 22 16:01:00 jik5.kamens.us kernel: RETBleed: Mitigation: IBRS Mar 22 16:01:00 jik5.kamens.us kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 22 16:01:00 jik5.kamens.us kernel: Spectre V2 : User space: Mitigation: STIBP via prctl Mar 22 16:01:00 jik5.kamens.us kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 22 16:01:00 jik5.kamens.us kernel: MDS: Mitigation: Clear CPU buffers Mar 22 16:01:00 jik5.kamens.us kernel: TAA: Mitigation: TSX disabled Mar 22 16:01:00 jik5.kamens.us kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Mar 22 16:01:00 jik5.kamens.us kernel: SRBDS: Mitigation: Microcode Mar 22 16:01:00 jik5.kamens.us kernel: Freeing SMP alternatives memory: 44K Mar 22 16:01:00 jik5.kamens.us kernel: smpboot: CPU0: Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz (family: 0x6, model: 0x5e, stepping: 0x3) Mar 22 16:01:00 jik5.kamens.us kernel: cblist_init_generic: Setting adjustable number of callback queues. Mar 22 16:01:00 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:01:00 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:01:00 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:01:00 jik5.kamens.us kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Mar 22 16:01:00 jik5.kamens.us kernel: ... version: 4 Mar 22 16:01:00 jik5.kamens.us kernel: ... bit width: 48 Mar 22 16:01:00 jik5.kamens.us kernel: ... generic registers: 4 Mar 22 16:01:00 jik5.kamens.us kernel: ... value mask: 0000ffffffffffff Mar 22 16:01:00 jik5.kamens.us kernel: ... max period: 00007fffffffffff Mar 22 16:01:00 jik5.kamens.us kernel: ... fixed-purpose events: 3 Mar 22 16:01:00 jik5.kamens.us kernel: ... event mask: 000000070000000f Mar 22 16:01:00 jik5.kamens.us kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1024 Mar 22 16:01:00 jik5.kamens.us kernel: rcu: Hierarchical SRCU implementation. Mar 22 16:01:00 jik5.kamens.us kernel: rcu: Max phase no-delay instances is 1000. Mar 22 16:01:00 jik5.kamens.us kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Mar 22 16:01:00 jik5.kamens.us kernel: smp: Bringing up secondary CPUs ... Mar 22 16:01:00 jik5.kamens.us kernel: x86: Booting SMP configuration: Mar 22 16:01:00 jik5.kamens.us kernel: .... node #0, CPUs: #1 #2 #3 #4 Mar 22 16:01:00 jik5.kamens.us kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 22 16:01:00 jik5.kamens.us kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 22 16:01:00 jik5.kamens.us kernel: #5 #6 #7 Mar 22 16:01:00 jik5.kamens.us kernel: smp: Brought up 1 node, 8 CPUs Mar 22 16:01:00 jik5.kamens.us kernel: smpboot: Max logical packages: 1 Mar 22 16:01:00 jik5.kamens.us kernel: smpboot: Total of 8 processors activated (63999.74 BogoMIPS) Mar 22 16:01:00 jik5.kamens.us kernel: devtmpfs: initialized Mar 22 16:01:00 jik5.kamens.us kernel: x86/mm: Memory block size: 128MB Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8a871000-0x8a871fff] (4096 bytes) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8f022000-0x8f583fff] (5644288 bytes) Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Mar 22 16:01:00 jik5.kamens.us kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: pinctrl core: initialized pinctrl subsystem Mar 22 16:01:00 jik5.kamens.us kernel: PM: RTC time: 20:00:44, date: 2023-03-22 Mar 22 16:01:00 jik5.kamens.us kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 22 16:01:00 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Mar 22 16:01:00 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 22 16:01:00 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 22 16:01:00 jik5.kamens.us kernel: audit: initializing netlink subsys (disabled) Mar 22 16:01:00 jik5.kamens.us kernel: audit: type=2000 audit(1679515244.060:1): state=initialized audit_enabled=0 res=1 Mar 22 16:01:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 22 16:01:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'bang_bang' Mar 22 16:01:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 22 16:01:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'user_space' Mar 22 16:01:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'power_allocator' Mar 22 16:01:00 jik5.kamens.us kernel: EISA bus registered Mar 22 16:01:00 jik5.kamens.us kernel: cpuidle: using governor ladder Mar 22 16:01:00 jik5.kamens.us kernel: cpuidle: using governor menu Mar 22 16:01:00 jik5.kamens.us kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 22 16:01:00 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:01:00 jik5.kamens.us kernel: PCI: not using MMCONFIG Mar 22 16:01:00 jik5.kamens.us kernel: PCI: Using configuration type 1 for base access Mar 22 16:01:00 jik5.kamens.us kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Mar 22 16:01:00 jik5.kamens.us kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 22 16:01:00 jik5.kamens.us kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 22 16:01:00 jik5.kamens.us kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 22 16:01:00 jik5.kamens.us kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 22 16:01:00 jik5.kamens.us kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 22 16:01:00 jik5.kamens.us kernel: fbcon: Taking over console Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Added _OSI(Module Device) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Device) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: 8 ACPI AML tables successfully acquired and loaded Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8DEE40BCA000 0007AA (v02 PmRef Cpu0Ist 00003000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8DEE40BD4000 00037F (v02 PmRef Cpu0Cst 00003001 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8DEE40BCB000 0005AA (v02 PmRef ApIst 00003000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8DEE41A04400 000119 (v02 PmRef ApCst 00003000 INTL 20120913) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Interpreter enabled Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Using IOAPIC for interrupt routing Mar 22 16:01:00 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:01:00 jik5.kamens.us kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved as ACPI motherboard resource Mar 22 16:01:00 jik5.kamens.us kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 22 16:01:00 jik5.kamens.us kernel: PCI: Using E820 reservations for host bridge windows Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: Enabled 8 GPEs in block 00 to 7F Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG0.PG00: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG1.PG01: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG2.PG02: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP09.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP10.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP11.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP12.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP13.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP01.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP02.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP03.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP04.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP05.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP06.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP07.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP17.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP18.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP19.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP20.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP14.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP15.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP16.PXSX.WRST: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN00: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN01: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN02: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN03: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN04: New power resource Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Mar 22 16:01:00 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 22 16:01:00 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] Mar 22 16:01:00 jik5.kamens.us kernel: PCI host bridge to bus 0000:00 Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000effff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:00.0: [8086:191f] type 00 class 0x060000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:14.0: [8086:a12f] type 00 class 0x0c0330 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:14.0: reg 0x10: [mem 0xdf310000-0xdf31ffff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:14.2: [8086:a131] type 00 class 0x118000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:14.2: reg 0x10: [mem 0xdf32e000-0xdf32efff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:16.0: [8086:a13a] type 00 class 0x078000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:16.0: reg 0x10: [mem 0xdf32d000-0xdf32dfff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:16.0: PME# supported from D3hot Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: [8086:a102] type 00 class 0x010601 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x10: [mem 0xdf328000-0xdf329fff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x14: [mem 0xdf32c000-0xdf32c0ff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x18: [io 0xf050-0xf057] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x1c: [io 0xf040-0xf043] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x20: [io 0xf020-0xf03f] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x24: [mem 0xdf32b000-0xdf32b7ff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:17.0: PME# supported from D3hot Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: [8086:a114] type 01 class 0x060400 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.5: [8086:a115] type 01 class 0x060400 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.6: [8086:a116] type 01 class 0x060400 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.0: [8086:a145] type 00 class 0x060100 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.2: [8086:a121] type 00 class 0x058000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.2: reg 0x10: [mem 0xdf324000-0xdf327fff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.3: [8086:a170] type 00 class 0x040300 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xdf320000-0xdf323fff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x20: [mem 0xdf300000-0xdf30ffff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.4: [8086:a123] type 00 class 0x0c0500 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x10: [mem 0xdf32a000-0xdf32a0ff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x20: [io 0xf000-0xf01f] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: [10de:13c2] type 00 class 0x030000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x10: [mem 0xde000000-0xdeffffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x14: [mem 0xc0000000-0xcfffffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xd0000000-0xd1ffffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x30: [mem 0xdf000000-0xdf07ffff pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: 32.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s PCIe x16 link at 0000:00:01.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.1: [10de:0fbb] type 00 class 0x040300 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.1: reg 0x10: [mem 0xdf080000-0xdf083fff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: ASPM: current common clock configuration is inconsistent, reconfiguring Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:02:00.0: [10ec:8168] type 00 class 0x020000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x10: [io 0xd000-0xd0ff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x18: [mem 0xdf200000-0xdf200fff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x20: [mem 0xd2100000-0xd2103fff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:02:00.0: supports D1 D2 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:03:00.0: [8086:095a] type 00 class 0x028000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:03:00.0: reg 0x10: [mem 0xdf100000-0xdf101fff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 11 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 11 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 11 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 22 16:01:00 jik5.kamens.us kernel: iommu: Default domain type: Translated Mar 22 16:01:00 jik5.kamens.us kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 22 16:01:00 jik5.kamens.us kernel: SCSI subsystem initialized Mar 22 16:01:00 jik5.kamens.us kernel: libata version 3.00 loaded. Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: bus type USB registered Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver usbfs Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver hub Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new device driver usb Mar 22 16:01:00 jik5.kamens.us kernel: pps_core: LinuxPPS API ver. 1 registered Mar 22 16:01:00 jik5.kamens.us kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 22 16:01:00 jik5.kamens.us kernel: PTP clock support registered Mar 22 16:01:00 jik5.kamens.us kernel: EDAC MC: Ver: 3.0.0 Mar 22 16:01:00 jik5.kamens.us kernel: Registered efivars operations Mar 22 16:01:00 jik5.kamens.us kernel: NetLabel: Initializing Mar 22 16:01:00 jik5.kamens.us kernel: NetLabel: domain hash size = 128 Mar 22 16:01:00 jik5.kamens.us kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 22 16:01:00 jik5.kamens.us kernel: NetLabel: unlabeled traffic allowed by default Mar 22 16:01:00 jik5.kamens.us kernel: mctp: management component transport protocol core Mar 22 16:01:00 jik5.kamens.us kernel: NET: Registered PF_MCTP protocol family Mar 22 16:01:00 jik5.kamens.us kernel: PCI: Using ACPI for IRQ routing Mar 22 16:01:00 jik5.kamens.us kernel: PCI: pci_cache_line_size set to 64 bytes Mar 22 16:01:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] Mar 22 16:01:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] Mar 22 16:01:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x89217018-0x8bffffff] Mar 22 16:01:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8a871000-0x8bffffff] Mar 22 16:01:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8e52c000-0x8fffffff] Mar 22 16:01:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8faff000-0x8fffffff] Mar 22 16:01:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x46f000000-0x46fffffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: setting as boot VGA device Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: bridge control possible Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 22 16:01:00 jik5.kamens.us kernel: vgaarb: loaded Mar 22 16:01:00 jik5.kamens.us kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Mar 22 16:01:00 jik5.kamens.us kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc-early Mar 22 16:01:00 jik5.kamens.us kernel: VFS: Disk quotas dquot_6.6.0 Mar 22 16:01:00 jik5.kamens.us kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 22 16:01:00 jik5.kamens.us kernel: AppArmor: AppArmor Filesystem Enabled Mar 22 16:01:00 jik5.kamens.us kernel: pnp: PnP ACPI init Mar 22 16:01:00 jik5.kamens.us kernel: system 00:00: [io 0x0a00-0x0a1f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:00: [io 0x0a40-0x0a4f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:00: [io 0x0a50-0x0a5f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:03: [io 0x0680-0x069f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:03: [io 0x1800-0x18fe] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:03: [io 0x164e-0x164f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:04: [io 0x0800-0x087f] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:06: [io 0x1854-0x1857] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed10000-0xfed17fff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed18000-0xfed18fff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed19000-0xfed19fff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xe0000000-0xefffffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed20000-0xfed3ffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed90000-0xfed93fff] could not be reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed45000-0xfed8ffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xfee00000-0xfeefffff] could not be reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:07: [mem 0xdffe0000-0xdfffffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:08: [mem 0xfd000000-0xfdabffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:08: [mem 0xfdad0000-0xfdadffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:08: [mem 0xfdb00000-0xfdffffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe000000-0xfe01ffff] could not be reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe036000-0xfe03bfff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe03d000-0xfe3fffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe410000-0xfe7fffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:09: [io 0xff00-0xfffe] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:0a: [mem 0xfdaf0000-0xfdafffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:0a: [mem 0xfdae0000-0xfdaeffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: system 00:0a: [mem 0xfdac0000-0xfdacffff] has been reserved Mar 22 16:01:00 jik5.kamens.us kernel: pnp: PnP ACPI: found 11 devices Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 22 16:01:00 jik5.kamens.us kernel: NET: Registered PF_INET protocol family Mar 22 16:01:00 jik5.kamens.us kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: TCP: Hash tables configured (established 131072 bind 65536) Mar 22 16:01:00 jik5.kamens.us kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:01:00 jik5.kamens.us kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 22 16:01:00 jik5.kamens.us kernel: NET: Registered PF_XDP protocol family Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000effff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 8 [mem 0xfd000000-0xfe7fffff window] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:01: resource 1 [mem 0xde000000-0xdf0fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:01: resource 2 [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:02: resource 0 [io 0xd000-0xdfff] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:02: resource 1 [mem 0xdf200000-0xdf2fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:02: resource 2 [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:01:00 jik5.kamens.us kernel: pci_bus 0000:03: resource 1 [mem 0xdf100000-0xdf1fffff] Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:14.0: quirk_usb_early_handoff+0x0/0x190 took 19233 usecs Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0 Mar 22 16:01:00 jik5.kamens.us kernel: PCI: CLS 0 bytes, default 64 Mar 22 16:01:00 jik5.kamens.us kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 22 16:01:00 jik5.kamens.us kernel: software IO TLB: mapped [mem 0x0000000085217000-0x0000000089217000] (64MB) Mar 22 16:01:00 jik5.kamens.us kernel: Trying to unpack rootfs image as initramfs... Mar 22 16:01:00 jik5.kamens.us kernel: Initialise system trusted keyrings Mar 22 16:01:00 jik5.kamens.us kernel: Key type blacklist registered Mar 22 16:01:00 jik5.kamens.us kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Mar 22 16:01:00 jik5.kamens.us kernel: zbud: loaded Mar 22 16:01:00 jik5.kamens.us kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 22 16:01:00 jik5.kamens.us kernel: fuse: init (API version 7.38) Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Platform Keyring initialized Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Machine keyring initialized Mar 22 16:01:00 jik5.kamens.us kernel: Key type asymmetric registered Mar 22 16:01:00 jik5.kamens.us kernel: Asymmetric key parser 'x509' registered Mar 22 16:01:00 jik5.kamens.us kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) Mar 22 16:01:00 jik5.kamens.us kernel: io scheduler mq-deadline registered Mar 22 16:01:00 jik5.kamens.us kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Mar 22 16:01:00 jik5.kamens.us kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 122 Mar 22 16:01:00 jik5.kamens.us kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 122 Mar 22 16:01:00 jik5.kamens.us kernel: pcieport 0000:00:1c.5: PME: Signaling with IRQ 123 Mar 22 16:01:00 jik5.kamens.us kernel: pcieport 0000:00:1c.5: AER: enabled with IRQ 123 Mar 22 16:01:00 jik5.kamens.us kernel: pcieport 0000:00:1c.6: PME: Signaling with IRQ 124 Mar 22 16:01:00 jik5.kamens.us kernel: pcieport 0000:00:1c.6: AER: enabled with IRQ 124 Mar 22 16:01:00 jik5.kamens.us kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 22 16:01:00 jik5.kamens.us kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: button: Sleep Button [SLPB] Mar 22 16:01:00 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: button: Power Button [PWRB] Mar 22 16:01:00 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: button: Power Button [PWRF] Mar 22 16:01:00 jik5.kamens.us kernel: thermal LNXTHERM:00: registered as thermal_zone0 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Mar 22 16:01:00 jik5.kamens.us kernel: thermal LNXTHERM:01: registered as thermal_zone1 Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ01] (30 C) Mar 22 16:01:00 jik5.kamens.us kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Mar 22 16:01:00 jik5.kamens.us kernel: Linux agpgart interface v0.103 Mar 22 16:01:00 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:01:00 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:01:00 jik5.kamens.us kernel: loop: module loaded Mar 22 16:01:00 jik5.kamens.us kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 22 16:01:00 jik5.kamens.us kernel: PPP generic driver version 2.4.2 Mar 22 16:01:00 jik5.kamens.us kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 Mar 22 16:01:00 jik5.kamens.us kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 22 16:01:00 jik5.kamens.us kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 22 16:01:00 jik5.kamens.us kernel: mousedev: PS/2 mouse device common for all mice Mar 22 16:01:00 jik5.kamens.us kernel: rtc_cmos 00:05: RTC can wake from S4 Mar 22 16:01:00 jik5.kamens.us kernel: rtc_cmos 00:05: registered as rtc0 Mar 22 16:01:00 jik5.kamens.us kernel: rtc_cmos 00:05: setting system clock to 2023-03-22T20:00:44 UTC (1679515244) Mar 22 16:01:00 jik5.kamens.us kernel: rtc_cmos 00:05: alarms up to one month, y3k, 242 bytes nvram Mar 22 16:01:00 jik5.kamens.us kernel: i2c_dev: i2c /dev entries driver Mar 22 16:01:00 jik5.kamens.us kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 22 16:01:00 jik5.kamens.us kernel: device-mapper: uevent: version 1.0.3 Mar 22 16:01:00 jik5.kamens.us kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Probing EISA bus 0 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 1 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 2 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 3 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 4 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 5 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 6 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 7 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 8 Mar 22 16:01:00 jik5.kamens.us kernel: platform eisa.0: EISA: Detected 0 cards Mar 22 16:01:00 jik5.kamens.us kernel: intel_pstate: Intel P-state driver initializing Mar 22 16:01:00 jik5.kamens.us kernel: intel_pstate: HWP enabled Mar 22 16:01:00 jik5.kamens.us kernel: ledtrig-cpu: registered to indicate activity on CPUs Mar 22 16:01:00 jik5.kamens.us kernel: intel_pmc_core INT33A1:00: initialized Mar 22 16:01:00 jik5.kamens.us kernel: drop_monitor: Initializing network drop monitor service Mar 22 16:01:00 jik5.kamens.us kernel: NET: Registered PF_INET6 protocol family Mar 22 16:01:00 jik5.kamens.us kernel: Freeing initrd memory: 132664K Mar 22 16:01:00 jik5.kamens.us kernel: Segment Routing with IPv6 Mar 22 16:01:00 jik5.kamens.us kernel: In-situ OAM (IOAM) with IPv6 Mar 22 16:01:00 jik5.kamens.us kernel: NET: Registered PF_PACKET protocol family Mar 22 16:01:00 jik5.kamens.us kernel: Key type dns_resolver registered Mar 22 16:01:00 jik5.kamens.us kernel: microcode: Microcode Update Driver: v2.2. Mar 22 16:01:00 jik5.kamens.us kernel: IPI shorthand broadcast: enabled Mar 22 16:01:00 jik5.kamens.us kernel: sched_clock: Marking stable (880803572, 411396)->(884876465, -3661497) Mar 22 16:01:00 jik5.kamens.us kernel: registered taskstats version 1 Mar 22 16:01:00 jik5.kamens.us kernel: Loading compiled-in X.509 certificates Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Loading compiled-in revocation X.509 certificates Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' Mar 22 16:01:00 jik5.kamens.us kernel: zswap: loaded using pool lzo/zbud Mar 22 16:01:00 jik5.kamens.us kernel: Key type .fscrypt registered Mar 22 16:01:00 jik5.kamens.us kernel: Key type fscrypt-provisioning registered Mar 22 16:01:00 jik5.kamens.us kernel: Key type trusted registered Mar 22 16:01:00 jik5.kamens.us kernel: Key type encrypted registered Mar 22 16:01:00 jik5.kamens.us kernel: AppArmor: AppArmor sha1 policy hashing enabled Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer: c4f0474ae6b5e67a509d99132f49a4ec13f7ac68' Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer Database: 84f00f5841571abd2cc11a8c26d5c9c8d2b6b0b5' Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Acer Database Forbidden: 9de028a2638669f109745d3e2a7ad5c9e64ed392' Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:01:00 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Debian Secure Boot Signer: 00a7468def' Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:01:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:01:00 jik5.kamens.us kernel: Loading compiled-in module X.509 certificates Mar 22 16:01:00 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:01:00 jik5.kamens.us kernel: ima: Allocated hash algorithm: sha1 Mar 22 16:01:00 jik5.kamens.us kernel: ima: No architecture policies found Mar 22 16:01:00 jik5.kamens.us kernel: evm: Initialising EVM extended attributes: Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.selinux Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.SMACK64 Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.SMACK64EXEC Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.SMACK64TRANSMUTE Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.SMACK64MMAP Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.apparmor Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.ima Mar 22 16:01:00 jik5.kamens.us kernel: evm: security.capability Mar 22 16:01:00 jik5.kamens.us kernel: evm: HMAC attrs: 0x1 Mar 22 16:01:00 jik5.kamens.us kernel: PM: Magic number: 15:717:43 Mar 22 16:01:00 jik5.kamens.us kernel: memory memory79: hash matches Mar 22 16:01:00 jik5.kamens.us kernel: RAS: Correctable Errors collector initialized. Mar 22 16:01:00 jik5.kamens.us kernel: Freeing unused decrypted memory: 2036K Mar 22 16:01:00 jik5.kamens.us kernel: Freeing unused kernel image (initmem) memory: 4644K Mar 22 16:01:00 jik5.kamens.us kernel: Write protecting the kernel read-only data: 34816k Mar 22 16:01:00 jik5.kamens.us kernel: Freeing unused kernel image (rodata/data gap) memory: 872K Mar 22 16:01:00 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:01:00 jik5.kamens.us kernel: x86/mm: Checking user space page tables Mar 22 16:01:00 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:01:00 jik5.kamens.us kernel: Run /init as init process Mar 22 16:01:00 jik5.kamens.us kernel: with arguments: Mar 22 16:01:00 jik5.kamens.us kernel: /init Mar 22 16:01:00 jik5.kamens.us kernel: splash Mar 22 16:01:00 jik5.kamens.us kernel: with environment: Mar 22 16:01:00 jik5.kamens.us kernel: HOME=/ Mar 22 16:01:00 jik5.kamens.us kernel: TERM=linux Mar 22 16:01:00 jik5.kamens.us kernel: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic Mar 22 16:01:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:01:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Mar 22 16:01:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810 Mar 22 16:01:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:01:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Mar 22 16:01:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed Mar 22 16:01:00 jik5.kamens.us kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.02 Mar 22 16:01:00 jik5.kamens.us kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:01:00 jik5.kamens.us kernel: usb usb1: Product: xHCI Host Controller Mar 22 16:01:00 jik5.kamens.us kernel: usb usb1: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb usb1: SerialNumber: 0000:00:14.0 Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-0:1.0: USB hub found Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-0:1.0: 16 ports detected Mar 22 16:01:00 jik5.kamens.us kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.02 Mar 22 16:01:00 jik5.kamens.us kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:01:00 jik5.kamens.us kernel: usb usb2: Product: xHCI Host Controller Mar 22 16:01:00 jik5.kamens.us kernel: usb usb2: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb usb2: SerialNumber: 0000:00:14.0 Mar 22 16:01:00 jik5.kamens.us kernel: hub 2-0:1.0: USB hub found Mar 22 16:01:00 jik5.kamens.us kernel: hub 2-0:1.0: 10 ports detected Mar 22 16:01:00 jik5.kamens.us kernel: usb: port power management may be unreliable Mar 22 16:01:00 jik5.kamens.us kernel: cryptd: max_cpu_qlen set to 1000 Mar 22 16:01:00 jik5.kamens.us kernel: ahci 0000:00:17.0: version 3.0 Mar 22 16:01:00 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Mar 22 16:01:00 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.1: [8086:a120] type 00 class 0x058000 Mar 22 16:01:00 jik5.kamens.us kernel: pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] Mar 22 16:01:00 jik5.kamens.us kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Mar 22 16:01:00 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x51 Mar 22 16:01:00 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x53 Mar 22 16:01:00 jik5.kamens.us kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 5 ports 6 Gbps 0x3d impl SATA mode Mar 22 16:01:00 jik5.kamens.us kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst Mar 22 16:01:00 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: RTL8168g/8111g, 98:ee:cb:23:9d:15, XID 4c0, IRQ 127 Mar 22 16:01:00 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] Mar 22 16:01:00 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: renamed from eth0 Mar 22 16:01:00 jik5.kamens.us kernel: scsi host0: ahci Mar 22 16:01:00 jik5.kamens.us kernel: scsi host1: ahci Mar 22 16:01:00 jik5.kamens.us kernel: scsi host2: ahci Mar 22 16:01:00 jik5.kamens.us kernel: scsi host3: ahci Mar 22 16:01:00 jik5.kamens.us kernel: scsi host4: ahci Mar 22 16:01:00 jik5.kamens.us kernel: scsi host5: ahci Mar 22 16:01:00 jik5.kamens.us kernel: ata1: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b100 irq 126 Mar 22 16:01:00 jik5.kamens.us kernel: ata2: DUMMY Mar 22 16:01:00 jik5.kamens.us kernel: ata3: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b200 irq 126 Mar 22 16:01:00 jik5.kamens.us kernel: ata4: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b280 irq 126 Mar 22 16:01:00 jik5.kamens.us kernel: ata5: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b300 irq 126 Mar 22 16:01:00 jik5.kamens.us kernel: ata6: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b380 irq 126 Mar 22 16:01:00 jik5.kamens.us kernel: tsc: Refined TSC clocksource calibration: 4007.999 MHz Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39c5e149d3a, max_idle_ns: 440795336434 ns Mar 22 16:01:00 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: ata6: SATA link up 3.0 Gbps (SStatus 123 SControl 300) Mar 22 16:01:00 jik5.kamens.us kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:01:00 jik5.kamens.us kernel: ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:01:00 jik5.kamens.us kernel: ata4: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Mar 22 16:01:00 jik5.kamens.us kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:01:00 jik5.kamens.us kernel: ata3.00: ATA-9: ST1000DM003-1ER162, CC45, max UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: ata6.00: ATA-8: WDC WD5001AALS-00L3B2, 01.03B01, max UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: ata3.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:01:00 jik5.kamens.us kernel: ata6.00: 976773168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:01:00 jik5.kamens.us kernel: ata4.00: ATAPI: HL-DT-ST DVDRAM GHC0N, 1.00, max UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: ATA-9: Samsung SSD 850 EVO 1TB, EMT01B6Q, max UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: ata3.00: configured for UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: ata6.00: configured for UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: ata1.00: ATA-9: LITEON CV1-8B128, G871201, max UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: ata1.00: 250069680 sectors, multi 2: LBA48 NCQ (depth 32), AA Mar 22 16:01:00 jik5.kamens.us kernel: ata1.00: Features: Dev-Sleep Mar 22 16:01:00 jik5.kamens.us kernel: ata1.00: configured for UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: scsi 0:0:0:0: Direct-Access ATA LITEON CV1-8B128 201 PQ: 0 ANSI: 5 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-1: New USB device found, idVendor=04f9, idProduct=03b9, bcdDevice= 1.00 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-1: Product: ADS-2800W Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-1: Manufacturer: Brother Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-1: SerialNumber: U64278M7G198321 Mar 22 16:01:00 jik5.kamens.us kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 Mar 22 16:01:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] 250069680 512-byte logical blocks: (128 GB/119 GiB) Mar 22 16:01:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 22 16:01:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Mar 22 16:01:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:01:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes Mar 22 16:01:00 jik5.kamens.us kernel: scsi 2:0:0:0: Direct-Access ATA ST1000DM003-1ER1 CC45 PQ: 0 ANSI: 5 Mar 22 16:01:00 jik5.kamens.us kernel: ata4.00: configured for UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 4096-byte physical blocks Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write Protect is off Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: 1953525168 sectors, multi 1: LBA48 NCQ (depth 32), AA Mar 22 16:01:00 jik5.kamens.us kernel: scsi 3:0:0:0: CD-ROM HL-DT-ST DVDRAM GHC0N 1.00 PQ: 0 ANSI: 5 Mar 22 16:01:00 jik5.kamens.us kernel: sda: Mar 22 16:01:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: Features: Trust Dev-Sleep Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:01:00 jik5.kamens.us kernel: ata5.00: configured for UDMA/133 Mar 22 16:01:00 jik5.kamens.us kernel: sdb: Mar 22 16:01:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Attached SCSI disk Mar 22 16:01:00 jik5.kamens.us kernel: sr 3:0:0:0: [sr0] scsi3-mmc drive: 40x/12x writer dvd-ram cd/rw xa/form2 cdda tray Mar 22 16:01:00 jik5.kamens.us kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 22 16:01:00 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi CD-ROM sr0 Mar 22 16:01:00 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi generic sg2 type 5 Mar 22 16:01:00 jik5.kamens.us kernel: scsi 4:0:0:0: Direct-Access ATA Samsung SSD 850 1B6Q PQ: 0 ANSI: 5 Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: Attached scsi generic sg3 type 0 Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write Protect is off Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Mode Sense: 00 3a 00 00 Mar 22 16:01:00 jik5.kamens.us kernel: scsi 5:0:0:0: Direct-Access ATA WDC WD5001AALS-0 3B01 PQ: 0 ANSI: 5 Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Preferred minimum I/O size 512 bytes Mar 22 16:01:00 jik5.kamens.us kernel: sd 5:0:0:0: Attached scsi generic sg4 type 0 Mar 22 16:01:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] 976773168 512-byte logical blocks: (500 GB/466 GiB) Mar 22 16:01:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write Protect is off Mar 22 16:01:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Mode Sense: 00 3a 00 00 Mar 22 16:01:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:01:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Preferred minimum I/O size 512 bytes Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5: new SuperSpeed USB device number 2 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Attached SCSI disk Mar 22 16:01:00 jik5.kamens.us kernel: sdc: sdc1 sdc2 sdc3 Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] supports TCG Opal Mar 22 16:01:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Attached SCSI disk Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5: New USB device found, idVendor=2109, idProduct=8110, bcdDevice=90.95 Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5: Product: USB3.0 Hub Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5: Manufacturer: VIA Labs, Inc. Mar 22 16:01:00 jik5.kamens.us kernel: hub 2-5:1.0: USB hub found Mar 22 16:01:00 jik5.kamens.us kernel: hub 2-5:1.0: 4 ports detected Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-2: new full-speed USB device number 3 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-2: New USB device found, idVendor=0b0e, idProduct=2467, bcdDevice= 2.10 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-2: New USB device strings: Mfr=0, Product=2, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-2: Product: Jabra Evolve 75 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-3: new full-speed USB device number 4 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-3: New USB device found, idVendor=0764, idProduct=0501, bcdDevice= 2.00 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-3: New USB device strings: Mfr=3, Product=1, SerialNumber=2 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-3: Product: AVRG750U Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-3: Manufacturer: CPS Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-3: SerialNumber: BHBGV2000445 Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5.1: new SuperSpeed USB device number 3 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5.1: New USB device found, idVendor=17e9, idProduct=4323, bcdDevice=31.00 Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5.1: Product: Plugable UD-3900 Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5.1: Manufacturer: DisplayLink Mar 22 16:01:00 jik5.kamens.us kernel: usb 2-5.1: SerialNumber: 20175067 Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ether Mar 22 16:01:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: MAC-Address: 8c:ae:4c:dc:cf:46 Mar 22 16:01:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting rx_max = 16384 Mar 22 16:01:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting tx_max = 16384 Mar 22 16:01:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 eth0: register 'cdc_ncm' at usb-0000:00:14.0-5.1, CDC NCM (SEND ZLP), 8c:ae:4c:dc:cf:46 Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ncm Mar 22 16:01:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 enx8cae4cdccf46: renamed from eth0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-6: new low-speed USB device number 5 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-6: New USB device found, idVendor=0bc7, idProduct=0002, bcdDevice= 1.00 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-6: Product: USB Transceiver Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-6: Manufacturer: X10 Wireless Technology Inc Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7: new high-speed USB device number 6 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7: New USB device found, idVendor=2109, idProduct=2811, bcdDevice=90.90 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7: Product: USB2.0 Hub Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7: Manufacturer: VIA Labs, Inc. Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7:1.0: USB hub found Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7:1.0: 4 ports detected Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-9: new high-speed USB device number 7 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-9: New USB device found, idVendor=0bda, idProduct=0153, bcdDevice=57.13 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-9: Product: USB2.0-CRW Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-9: Manufacturer: Generic Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-9: SerialNumber: 20120926571200000 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4: new high-speed USB device number 8 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4: Product: USB 2.0 Hub Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7.4:1.0: USB hub found Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7.4:1.0: 4 ports detected Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-10: new full-speed USB device number 9 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-10: New USB device found, idVendor=8087, idProduct=0a2a, bcdDevice= 0.01 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: hid: raw HID events driver (C) Jiri Kosina Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver usb-storage Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver uas Mar 22 16:01:00 jik5.kamens.us kernel: ums-realtek 1-9:1.0: USB Mass Storage device detected Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver usbhid Mar 22 16:01:00 jik5.kamens.us kernel: usbhid: USB HID core driver Mar 22 16:01:00 jik5.kamens.us kernel: scsi host6: usb-storage 1-9:1.0 Mar 22 16:01:00 jik5.kamens.us kernel: usbcore: registered new interface driver ums-realtek Mar 22 16:01:00 jik5.kamens.us kernel: hid-generic 0003:0764:0501.0002: hiddev0,hidraw0: USB HID v1.10 Device [CPS AVRG750U] on usb-0000:00:14.0-3/input0 Mar 22 16:01:00 jik5.kamens.us kernel: input: Jabra Evolve 75 as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0/0003:0B0E:2467.0001/input/input6 Mar 22 16:01:00 jik5.kamens.us kernel: jabra 0003:0B0E:2467.0001: input,hiddev1,hidraw1: USB HID v1.11 Device [Jabra Evolve 75] on usb-0000:00:14.0-2/input0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1: new high-speed USB device number 10 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1: Product: USB 2.0 Hub Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7.4.1:1.0: USB hub found Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7.4.1:1.0: 4 ports detected Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.3: new high-speed USB device number 11 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.1: new full-speed USB device number 12 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: scsi 6:0:0:0: Direct-Access Generic- SD/MMC/MS PRO 1.00 PQ: 0 ANSI: 4 Mar 22 16:01:00 jik5.kamens.us kernel: sd 6:0:0:0: Attached scsi generic sg5 type 0 Mar 22 16:01:00 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Media removed, stopped polling Mar 22 16:01:00 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Attached SCSI removable disk Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device found, idVendor=0b0e, idProduct=245d, bcdDevice= 1.48 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.1: Product: Jabra Link 370 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.1: SerialNumber: 70BF92C25E96 Mar 22 16:01:00 jik5.kamens.us kernel: input: Jabra Link 370 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.3/0003:0B0E:245D.0003/input/input7 Mar 22 16:01:00 jik5.kamens.us kernel: jabra 0003:0B0E:245D.0003: input,hiddev2,hidraw2: USB HID v1.11 Device [Jabra Link 370] on usb-0000:00:14.0-7.4.1.1/input3 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.4: new full-speed USB device number 13 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device found, idVendor=046d, idProduct=c52b, bcdDevice=12.10 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.4: Product: USB Receiver Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.1.4: Manufacturer: Logitech Mar 22 16:01:00 jik5.kamens.us kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.0/0003:046D:C52B.0004/input/input8 Mar 22 16:01:00 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0004: input,hidraw3: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input0 Mar 22 16:01:00 jik5.kamens.us kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0005/input/input9 Mar 22 16:01:00 jik5.kamens.us kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0005/input/input10 Mar 22 16:01:00 jik5.kamens.us kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0005/input/input11 Mar 22 16:01:00 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0005: input,hiddev3,hidraw4: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input1 Mar 22 16:01:00 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0006: hiddev4,hidraw5: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.3: New USB device found, idVendor=046d, idProduct=082d, bcdDevice= 0.11 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.3: New USB device strings: Mfr=0, Product=2, SerialNumber=1 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.3: Product: HD Pro Webcam C920 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.3: SerialNumber: ED48865F Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4: new high-speed USB device number 14 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4: New USB device found, idVendor=058f, idProduct=6254, bcdDevice= 1.00 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7.4.4:1.0: USB hub found Mar 22 16:01:00 jik5.kamens.us kernel: hub 1-7.4.4:1.0: 4 ports detected Mar 22 16:01:00 jik5.kamens.us kernel: logitech-djreceiver 0003:046D:C52B.0006: hiddev3,hidraw3: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4.1: new full-speed USB device number 15 using xhci_hcd Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device found, idVendor=24f0, idProduct=0142, bcdDevice= 1.00 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4.1: Product: Das Keyboard Mar 22 16:01:00 jik5.kamens.us kernel: usb 1-7.4.4.1: Manufacturer: Metadot - Das Keyboard Mar 22 16:01:00 jik5.kamens.us kernel: input: Logitech Wireless Device PID:4051 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0007/input/input13 Mar 22 16:01:00 jik5.kamens.us kernel: hid-generic 0003:046D:4051.0007: input,hidraw4: USB HID v1.11 Mouse [Logitech Wireless Device PID:4051] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:01:00 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.0/0003:24F0:0142.0008/input/input17 Mar 22 16:01:00 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0008: input,hidraw5: USB HID v1.10 Keyboard [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input0 Mar 22 16:01:00 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0009/input/input18 Mar 22 16:01:00 jik5.kamens.us kernel: input: Logitech M510 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0007/input/input20 Mar 22 16:01:00 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0009/input/input19 Mar 22 16:01:00 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0009: input,hidraw4: USB HID v1.10 Device [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input1 Mar 22 16:01:00 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0007: input,hidraw6: USB HID v1.11 Mouse [Logitech M510] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:01:00 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:01:00 jik5.kamens.us kernel: EXT4-fs (sdc2): unmounting filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:01:00 jik5.kamens.us kernel: EXT4-fs (dm-1): mounted filesystem e07a02bb-3dad-40e5-945b-111535c44f3a with ordered data mode. Quota mode: none. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Inserted module 'autofs4' Mar 22 16:01:00 jik5.kamens.us systemd[1]: systemd 252.5-2ubuntu2 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 22 16:01:00 jik5.kamens.us systemd[1]: Detected architecture x86-64. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Hostname set to . Mar 22 16:01:00 jik5.kamens.us systemd[1]: Queued start job for default target graphical.target. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Created slice system-postfix.slice - Slice /system/postfix. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Created slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Created slice user.slice - User and Session Slice. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Reached target slices.target - Slice Units. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on rpcbind.socket - RPCbind Server Activation Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on syslog.socket - Syslog Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-journald.socket - Journal Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-oomd.socket - Userspace Out-Of-Memory (OOM) Killer Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Mar 22 16:01:00 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-journald.service - Journal Service... Mar 22 16:01:00 jik5.kamens.us systemd[1]: auth-rpcgss-module.service - Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished blk-availability.service - Availability of block devices. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Mar 22 16:01:00 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Mar 22 16:01:00 jik5.kamens.us kernel: pstore: Using crash dump compression: deflate Mar 22 16:01:00 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Mar 22 16:01:00 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:01:00 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:01:00 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:01:00 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Unnecessary job was removed for dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - /dev/disk/by-uuid/c531070b-52cc-405a-8abe-8ac4be2d75f4. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Mar 22 16:01:00 jik5.kamens.us systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Mar 22 16:01:00 jik5.kamens.us systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:01:00 jik5.kamens.us kernel: pstore: Registered efi_pstore as persistent store backend Mar 22 16:01:00 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:01:00 jik5.kamens.us kernel: EXT4-fs (dm-1): re-mounted e07a02bb-3dad-40e5-945b-111535c44f3a. Quota mode: none. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Mar 22 16:01:00 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:01:00 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-sysusers.service - Create System Users... Mar 22 16:01:00 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:01:00 jik5.kamens.us kernel: ACPI: bus type drm_connector registered Mar 22 16:01:00 jik5.kamens.us systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Mar 22 16:01:00 jik5.kamens.us kernel: lp: driver loaded but no devices found Mar 22 16:01:00 jik5.kamens.us kernel: ppdev: user-space parallel port driver Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:01:00 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished systemd-sysusers.service - Create System Users. Mar 22 16:01:00 jik5.kamens.us systemd-journald[647]: Journal started Mar 22 16:01:00 jik5.kamens.us systemd-journald[647]: Runtime Journal (/run/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 8.0M, max 159.4M, 151.4M free. Mar 22 16:01:00 jik5.kamens.us systemd-modules-load[663]: Inserted module 'lp' Mar 22 16:01:00 jik5.kamens.us systemd-modules-load[663]: Inserted module 'ppdev' Mar 22 16:01:00 jik5.kamens.us systemd-modules-load[663]: Inserted module 'parport_pc' Mar 22 16:01:00 jik5.kamens.us mount[644]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:01:00 jik5.kamens.us mount[644]: dmesg(1) may have more information after failed mount system call. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout. Mar 22 16:01:00 jik5.kamens.us umount[671]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Mar 22 16:01:00 jik5.kamens.us systemd[1]: Started systemd-journald.service - Journal Service. Mar 22 16:01:00 jik5.kamens.us lvm[651]: 2 logical volume(s) in volume group "ubuntu-vg" monitored Mar 22 16:01:00 jik5.kamens.us systemd-journald[647]: Time spent on flushing to /var/log/journal/dca43d426a4043fd96f7351cc9f080c2 is 696.505ms for 1084 entries. Mar 22 16:01:00 jik5.kamens.us systemd-journald[647]: System Journal (/var/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 1.3G, max 4.0G, 2.6G free. Mar 22 16:01:02 jik5.kamens.us systemd-journald[647]: Received client request to flush runtime journal. Mar 22 16:01:02 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_wdm Mar 22 16:01:02 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_mbim Mar 22 16:01:02 jik5.kamens.us kernel: nvidia: loading out-of-tree module taints kernel. Mar 22 16:01:02 jik5.kamens.us kernel: nvidia: module license 'NVIDIA' taints kernel. Mar 22 16:01:02 jik5.kamens.us kernel: Disabling lock debugging due to kernel taint Mar 22 16:01:02 jik5.kamens.us kernel: Adding 999420k swap on /dev/mapper/ubuntu--vg-swap_1. Priority:-2 extents:1 across:999420k SSFS Mar 22 16:01:02 jik5.kamens.us kernel: nvidia-nvlink: Nvlink Core is being initialized, major device number 238 Mar 22 16:01:02 jik5.kamens.us kernel: Mar 22 16:01:02 jik5.kamens.us kernel: nvidia 0000:01:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem Mar 22 16:01:02 jik5.kamens.us kernel: NVRM: loading NVIDIA UNIX x86_64 Kernel Module 515.86.01 Wed Oct 26 09:12:38 UTC 2022 Mar 22 16:01:02 jik5.kamens.us kernel: EDAC ie31200: No ECC support Mar 22 16:01:02 jik5.kamens.us kernel: ee1004 0-0051: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:01:02 jik5.kamens.us kernel: ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:01:02 jik5.kamens.us kernel: acer_wmi: Acer Laptop ACPI-WMI Extras Mar 22 16:01:02 jik5.kamens.us kernel: acer_wmi: No WMID device detection method found Mar 22 16:01:02 jik5.kamens.us kernel: mc: Linux media interface: v0.10 Mar 22 16:01:02 jik5.kamens.us kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) Mar 22 16:01:02 jik5.kamens.us kernel: nvidia-modeset: Loading NVIDIA Kernel Mode Setting Driver for UNIX platforms 515.86.01 Wed Oct 26 09:02:01 UTC 2022 Mar 22 16:01:02 jik5.kamens.us kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Mar 22 16:01:02 jik5.kamens.us kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Mar 22 16:01:02 jik5.kamens.us kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Mar 22 16:01:02 jik5.kamens.us kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Mar 22 16:01:02 jik5.kamens.us kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Mar 22 16:01:02 jik5.kamens.us kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Mar 22 16:01:02 jik5.kamens.us kernel: Bluetooth: Core ver 2.22 Mar 22 16:01:02 jik5.kamens.us kernel: NET: Registered PF_BLUETOOTH protocol family Mar 22 16:01:02 jik5.kamens.us kernel: Bluetooth: HCI device and connection manager initialized Mar 22 16:01:02 jik5.kamens.us kernel: Bluetooth: HCI socket layer initialized Mar 22 16:01:02 jik5.kamens.us kernel: Bluetooth: L2CAP socket layer initialized Mar 22 16:01:02 jik5.kamens.us kernel: Bluetooth: SCO socket layer initialized Mar 22 16:01:02 jik5.kamens.us kernel: [drm] [nvidia-drm] [GPU ID 0x00000100] Loading driver Mar 22 16:01:02 jik5.kamens.us kernel: videodev: Linux video capture interface: v2.00 Mar 22 16:01:02 jik5.kamens.us kernel: Intel(R) Wireless WiFi driver for Linux Mar 22 16:01:02 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: enabling device (0000 -> 0002) Mar 22 16:01:02 jik5.kamens.us kernel: loop0: detected capacity change from 0 to 8 Mar 22 16:01:02 jik5.kamens.us kernel: loop1: detected capacity change from 0 to 232672 Mar 22 16:01:02 jik5.kamens.us kernel: loop2: detected capacity change from 0 to 235144 Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug destination: EXTERNAL_DRAM Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug configuration: 0 Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: loaded firmware version 29.4063824552.0 7265D-29.ucode op_mode iwlmvm Mar 22 16:01:02 jik5.kamens.us kernel: loop3: detected capacity change from 0 to 46048 Mar 22 16:01:02 jik5.kamens.us kernel: loop4: detected capacity change from 0 to 47368 Mar 22 16:01:02 jik5.kamens.us kernel: loop5: detected capacity change from 0 to 18352 Mar 22 16:01:02 jik5.kamens.us kernel: loop6: detected capacity change from 0 to 304168 Mar 22 16:01:02 jik5.kamens.us kernel: loop7: detected capacity change from 0 to 304168 Mar 22 16:01:02 jik5.kamens.us kernel: loop8: detected capacity change from 0 to 55568 Mar 22 16:01:02 jik5.kamens.us kernel: loop9: detected capacity change from 0 to 239128 Mar 22 16:01:02 jik5.kamens.us kernel: loop10: detected capacity change from 0 to 239176 Mar 22 16:01:02 jik5.kamens.us kernel: loop11: detected capacity change from 0 to 113896 Mar 22 16:01:02 jik5.kamens.us kernel: loop12: detected capacity change from 0 to 18352 Mar 22 16:01:02 jik5.kamens.us kernel: loop13: detected capacity change from 0 to 113888 Mar 22 16:01:02 jik5.kamens.us kernel: loop14: detected capacity change from 0 to 129608 Mar 22 16:01:02 jik5.kamens.us kernel: loop15: detected capacity change from 0 to 37776 Mar 22 16:01:01 jik5.kamens.us mtp-probe[751]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-2" Mar 22 16:01:01 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Mar 22 16:01:02 jik5.kamens.us kernel: loop16: detected capacity change from 0 to 129672 Mar 22 16:01:02 jik5.kamens.us kernel: usbcore: registered new interface driver btusb Mar 22 16:01:02 jik5.kamens.us kernel: usb 1-7.4.3: Found UVC 1.00 device HD Pro Webcam C920 (046d:082d) Mar 22 16:01:02 jik5.kamens.us kernel: Bluetooth: hci0: Legacy ROM 2.5 revision 1.0 build 3 week 17 2014 Mar 22 16:01:02 jik5.kamens.us kernel: Bluetooth: hci0: Intel device is already patched. patch num: 32 Mar 22 16:01:02 jik5.kamens.us kernel: input: HD Pro Webcam C920 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0/input/input21 Mar 22 16:01:02 jik5.kamens.us kernel: usbcore: registered new interface driver uvcvideo Mar 22 16:01:02 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=511), cval->res is probably wrong. Mar 22 16:01:02 jik5.kamens.us kernel: usb 2-5.1: [15] FU [Plugable Audio Playback Volume] ch = 6, val = -8176/0/16 Mar 22 16:01:02 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=767), cval->res is probably wrong. Mar 22 16:01:02 jik5.kamens.us kernel: usb 2-5.1: [12] FU [Mic Capture Volume] ch = 2, val = -4592/7680/16 Mar 22 16:01:02 jik5.kamens.us kernel: usb 1-7.4.1.1: 1:1: cannot set freq 48000 to ep 0x3 Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: enabling device (0000 -> 0002) Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Disabling MSI Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client Mar 22 16:01:02 jik5.kamens.us kernel: loop17: detected capacity change from 0 to 149312 Mar 22 16:01:01 jik5.kamens.us mtp-probe[753]: checking bus 1, device 7: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" Mar 22 16:01:01 jik5.kamens.us systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Mar 22 16:01:01 jik5.kamens.us mtp-probe[753]: bus: 1, device: 7 was not an MTP device Mar 22 16:01:01 jik5.kamens.us systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 22 16:01:01 jik5.kamens.us mtp-probe[751]: bus: 1, device: 3 was not an MTP device Mar 22 16:01:01 jik5.kamens.us systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Mar 22 16:01:01 jik5.kamens.us mtp-probe[781]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1" Mar 22 16:01:01 jik5.kamens.us systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Mar 22 16:01:01 jik5.kamens.us mtp-probe[781]: bus: 2, device: 3 was not an MTP device Mar 22 16:01:01 jik5.kamens.us systemd-udevd[681]: Using default interface naming scheme 'v252'. Mar 22 16:01:01 jik5.kamens.us mtp-probe[835]: checking bus 1, device 12: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1" Mar 22 16:01:02 jik5.kamens.us systemd-fsck[1157]: fsck.fat 4.2 (2021-01-31) Mar 22 16:01:02 jik5.kamens.us systemd-fsck[1157]: /dev/sdc1: 11 files, 1554/130812 clusters Mar 22 16:01:01 jik5.kamens.us systemd-udevd[681]: Configuration file /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:01:01 jik5.kamens.us mtp-probe[835]: bus: 1, device: 12 was not an MTP device Mar 22 16:01:02 jik5.kamens.us systemd-fsck[1156]: /dev/sdc2: clean, 327/46848 files, 118926/187392 blocks Mar 22 16:01:01 jik5.kamens.us systemd-udevd[681]: /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules:9 Invalid key 'SYSFS' Mar 22 16:01:01 jik5.kamens.us mtp-probe[839]: checking bus 1, device 15: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1" Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Detected Intel(R) Dual Band Wireless AC 7265, REV=0x210 Mar 22 16:01:02 jik5.kamens.us kernel: thermal thermal_zone4: failed to read out thermal zone (-61) Mar 22 16:01:02 jik5.kamens.us kernel: loop18: detected capacity change from 0 to 112704 Mar 22 16:01:02 jik5.kamens.us kernel: intel_tcc_cooling: Programmable TCC Offset detected Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: autoconfig for ALC662 rev3: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: mono: mono_out=0x0 Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: inputs: Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: Front Mic=0x19 Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: Rear Mic=0x18 Mar 22 16:01:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC2D0: Line=0x1a Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Applying debug destination EXTERNAL_DRAM Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Allocated 0x00400000 bytes for firmware monitor. Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: base HW address: 4c:34:88:9c:4f:cd, OTP minor version: 0x0 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card3/input22 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card3/input23 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card3/input24 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card3/input25 Mar 22 16:01:02 jik5.kamens.us kernel: loop19: detected capacity change from 0 to 149312 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1f.3/sound/card2/input26 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1f.3/sound/card2/input27 Mar 22 16:01:02 jik5.kamens.us kernel: loop20: detected capacity change from 0 to 491264 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1f.3/sound/card2/input28 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1f.3/sound/card2/input29 Mar 22 16:01:02 jik5.kamens.us kernel: loop21: detected capacity change from 0 to 112848 Mar 22 16:01:02 jik5.kamens.us kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card2/input30 Mar 22 16:01:02 jik5.kamens.us kernel: loop22: detected capacity change from 0 to 494824 Mar 22 16:01:01 jik5.kamens.us systemd-udevd[681]: /etc/udev/rules.d/60-brother-libsane-type1.rules:17 Invalid key 'SYSFS' Mar 22 16:01:01 jik5.kamens.us mtp-probe[839]: bus: 1, device: 15 was not an MTP device Mar 22 16:01:01 jik5.kamens.us systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Mar 22 16:01:01 jik5.kamens.us mtp-probe[841]: checking bus 1, device 13: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4" Mar 22 16:01:01 jik5.kamens.us lvm[714]: PV /dev/dm-0 online, VG ubuntu-vg is complete. Mar 22 16:01:01 jik5.kamens.us mtp-probe[841]: bus: 1, device: 13 was not an MTP device Mar 22 16:01:02 jik5.kamens.us mount[1211]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:01:02 jik5.kamens.us mount[1211]: dmesg(1) may have more information after failed mount system call. Mar 22 16:01:01 jik5.kamens.us lvm[714]: VG ubuntu-vg finished Mar 22 16:01:01 jik5.kamens.us mtp-probe[954]: checking bus 1, device 5: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-6" Mar 22 16:01:01 jik5.kamens.us systemd-udevd[712]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatch /module/rfkill 0:0' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us mtp-probe[960]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-3" Mar 22 16:01:01 jik5.kamens.us systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Mar 22 16:01:01 jik5.kamens.us mtp-probe[954]: bus: 1, device: 5 was not an MTP device Mar 22 16:01:01 jik5.kamens.us systemd-udevd[712]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatchd /module/rfkill 0:0' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us mtp-probe[960]: bus: 1, device: 4 was not an MTP device Mar 22 16:01:01 jik5.kamens.us systemd-udevd[712]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /module/rfkill 0:0' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us mtp-probe[1033]: checking bus 1, device 11: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3" Mar 22 16:01:01 jik5.kamens.us systemd-udevd[712]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /module/rfkill 0:0' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us mtp-probe[1033]: bus: 1, device: 11 was not an MTP device Mar 22 16:01:01 jik5.kamens.us systemd-udevd[705]: event_source: Failed to get device name: No such file or directory Mar 22 16:01:01 jik5.kamens.us systemd-udevd[691]: dm-1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-1' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Mar 22 16:01:01 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:01:01 jik5.kamens.us systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[694]: dm-2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-2' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[703]: sdc: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[688]: sde: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sde' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[692]: sdd: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdd' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[713]: sda: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Found device dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.device - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Activating swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1... Mar 22 16:01:01 jik5.kamens.us systemd-udevd[707]: sdb: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Activated swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:01:02 jik5.kamens.us kernel: ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' Mar 22 16:01:02 jik5.kamens.us kernel: loop24: detected capacity change from 0 to 333552 Mar 22 16:01:01 jik5.kamens.us systemd[1]: Reached target swap.target - Swaps. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[698]: dm-0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-0' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[703]: sdc1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc1' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[687]: sdc3: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc3' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd-udevd[688]: sdc2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc2' failed with exit code 1. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - Samsung_SSD_850_EVO_1TB 3. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.device - Samsung_SSD_850_EVO_1TB 2. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-F41C\x2d35B5.device - Samsung_SSD_850_EVO_1TB EFI\x20System\x20Partition. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5... Mar 22 16:01:01 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2... Mar 22 16:01:01 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:01:01 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:01:01 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:01:01 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:01:01 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:01:01 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:01:01 jik5.kamens.us systemd[1]: Started systemd-fsckd.service - File System Check Daemon to report status. Mar 22 16:01:01 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:01:02 jik5.kamens.us kernel: loop23: detected capacity change from 0 to 288120 Mar 22 16:01:01 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:01:01 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting home-macback-home-macback-backup.mount - /home/macback/home/macback/backup... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-bare-5.mount - Mount unit for bare, revision 5... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-bw-45.mount - Mount unit for bw, revision 45... Mar 22 16:01:02 jik5.kamens.us kernel: loop26: detected capacity change from 0 to 337424 Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-bw-46.mount - Mount unit for bw, revision 46... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-chromium-2381.mount - Mount unit for chromium, revision 2381... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-chromium-2392.mount - Mount unit for chromium, revision 2392... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core-14784.mount - Mount unit for core, revision 14784... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core-14946.mount - Mount unit for core, revision 14946... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core18-2708.mount - Mount unit for core18, revision 2708... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core18-2714.mount - Mount unit for core18, revision 2714... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core20-1828.mount - Mount unit for core20, revision 1828... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core20-1852.mount - Mount unit for core20, revision 1852... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core22-522.mount - Mount unit for core22, revision 522... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[704]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[704]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /class/video4linux 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[683]: sr0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sr0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-core22-547.mount - Mount unit for core22, revision 547... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[704]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_firefox /class/video4linux 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-cups-836.mount - Mount unit for cups, revision 836... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-cups-872.mount - Mount unit for cups, revision 872... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-firefox-2432.mount - Mount unit for firefox, revision 2432... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[704]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_geckodriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-firefox-2487.mount - Mount unit for firefox, revision 2487... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[703]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[703]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[688]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[688]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[711]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[711]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[699]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[699]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[713]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[713]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119... Mar 22 16:01:02 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain package Mar 22 16:01:02 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain core Mar 22 16:01:02 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain dram Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[703]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[703]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65... Mar 22 16:01:02 jik5.kamens.us kernel: loop25: detected capacity change from 0 to 288072 Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178... Mar 22 16:01:02 jik5.kamens.us kernel: loop27: detected capacity change from 0 to 448512 Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2... Mar 22 16:01:02 jik5.kamens.us systemd-udevd[692]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[692]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638... Mar 22 16:01:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0 wlp3s0: renamed from wlan0 Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-vault-1930.mount - Mount unit for vault, revision 1930... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting snap-vault-1958.mount - Mount unit for vault, revision 1958... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control... Mar 22 16:01:02 jik5.kamens.us kernel: loop30: detected capacity change from 0 to 709216 Mar 22 16:01:02 jik5.kamens.us kernel: loop29: detected capacity change from 0 to 448512 Mar 22 16:01:02 jik5.kamens.us kernel: loop28: detected capacity change from 0 to 709280 Mar 22 16:01:02 jik5.kamens.us kernel: loop31: detected capacity change from 0 to 926512 Mar 22 16:01:02 jik5.kamens.us kernel: loop32: detected capacity change from 0 to 5208 Mar 22 16:01:02 jik5.kamens.us kernel: loop35: detected capacity change from 0 to 166424 Mar 22 16:01:02 jik5.kamens.us kernel: loop33: detected capacity change from 0 to 942640 Mar 22 16:01:02 jik5.kamens.us kernel: loop41: detected capacity change from 0 to 864 Mar 22 16:01:02 jik5.kamens.us kernel: loop37: detected capacity change from 0 to 187776 Mar 22 16:01:02 jik5.kamens.us kernel: loop40: detected capacity change from 0 to 608 Mar 22 16:01:02 jik5.kamens.us kernel: loop39: detected capacity change from 0 to 94064 Mar 22 16:01:02 jik5.kamens.us kernel: loop43: detected capacity change from 0 to 594024 Mar 22 16:01:02 jik5.kamens.us kernel: loop34: detected capacity change from 0 to 3048 Mar 22 16:01:02 jik5.kamens.us kernel: loop38: detected capacity change from 0 to 94056 Mar 22 16:01:02 jik5.kamens.us kernel: loop42: detected capacity change from 0 to 594024 Mar 22 16:01:02 jik5.kamens.us kernel: loop36: detected capacity change from 0 to 75960 Mar 22 16:01:02 jik5.kamens.us systemd-udevd[690]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[690]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted home-macback-home-macback-backup.mount - /home/macback/home/macback/backup. Mar 22 16:01:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:01:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:01:02 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-bare-5.mount - Mount unit for bare, revision 5. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-bw-45.mount - Mount unit for bw, revision 45. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-bw-46.mount - Mount unit for bw, revision 46. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-chromium-2381.mount - Mount unit for chromium, revision 2381. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-chromium-2392.mount - Mount unit for chromium, revision 2392. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core-14784.mount - Mount unit for core, revision 14784. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core-14946.mount - Mount unit for core, revision 14946. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core18-2708.mount - Mount unit for core18, revision 2708. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core18-2714.mount - Mount unit for core18, revision 2714. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core20-1828.mount - Mount unit for core20, revision 1828. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core20-1852.mount - Mount unit for core20, revision 1852. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core22-522.mount - Mount unit for core22, revision 522. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-core22-547.mount - Mount unit for core22, revision 547. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-cups-836.mount - Mount unit for cups, revision 836. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-cups-872.mount - Mount unit for cups, revision 872. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-firefox-2432.mount - Mount unit for firefox, revision 2432. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-firefox-2487.mount - Mount unit for firefox, revision 2487. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119. Mar 22 16:01:02 jik5.kamens.us kernel: usbcore: registered new interface driver snd-usb-audio Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-vault-1930.mount - Mount unit for vault, revision 1930. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted snap-vault-1958.mount - Mount unit for vault, revision 1958. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[703]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[683]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[703]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[713]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[683]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[713]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[688]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd-udevd[688]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:01:02 jik5.kamens.us systemd[1]: Reached target snapd.mounts.target - Mounted snaps. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting boot.mount - /boot... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:01:02 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:01:02 jik5.kamens.us mount[1478]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:01:02 jik5.kamens.us mount[1478]: dmesg(1) may have more information after failed mount system call. Mar 22 16:01:02 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:01:02 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted boot.mount - /boot. Mar 22 16:01:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:01:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:01:02 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:01:02 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting boot-efi.mount - /boot/efi... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting systemd-rfkill.service - Load/Save RF Kill Switch Status... Mar 22 16:01:02 jik5.kamens.us umount[1484]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:01:02 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounted boot-efi.mount - /boot/efi. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Started systemd-rfkill.service - Load/Save RF Kill Switch Status. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Reached target local-fs.target - Local File Systems. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting apparmor.service - Load AppArmor profiles... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting console-setup.service - Set console font and keymap... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting systemd-binfmt.service - Set Up Additional Binary Formats... Mar 22 16:01:02 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting ufw.service - Uncomplicated firewall... Mar 22 16:01:02 jik5.kamens.us apparmor.systemd[1490]: Restarting AppArmor Mar 22 16:01:02 jik5.kamens.us apparmor.systemd[1490]: Reloading AppArmor profiles Mar 22 16:01:02 jik5.kamens.us systemd[1]: Finished console-setup.service - Set console font and keymap. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Received SIGRTMIN+20 from PID 487 (plymouthd). Mar 22 16:01:02 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 1496 (systemd-binfmt) Mar 22 16:01:02 jik5.kamens.us apparmor.systemd[1512]: Skipping profile in /etc/apparmor.d/disable: usr.bin.firefox Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Mar 22 16:01:02 jik5.kamens.us systemd[1]: Mounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting rpcbind.service - RPC bind portmap service... Mar 22 16:01:02 jik5.kamens.us systemd[1]: Starting systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:01:03 jik5.kamens.us systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Mar 22 16:01:03 jik5.kamens.us systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Mar 22 16:01:03 jik5.kamens.us systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Mar 22 16:01:03 jik5.kamens.us audit[1516]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1516 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us systemd[1]: Started rpcbind.service - RPC bind portmap service. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Mounted proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System. Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.028:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1516 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us systemd[1]: Reached target rpcbind.target - RPC Port Mapper. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Finished systemd-binfmt.service - Set Up Additional Binary Formats. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Starting binfmt-support.service - Enable support for additional executable binary formats... Mar 22 16:01:03 jik5.kamens.us kernel: RPC: Registered named UNIX socket transport module. Mar 22 16:01:03 jik5.kamens.us kernel: RPC: Registered udp transport module. Mar 22 16:01:03 jik5.kamens.us kernel: RPC: Registered tcp transport module. Mar 22 16:01:03 jik5.kamens.us kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Mounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Reached target rpc_pipefs.target. Mar 22 16:01:03 jik5.kamens.us systemd[1]: rpc-gssd.service - RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:01:03 jik5.kamens.us systemd[1]: Reached target nfs-client.target - NFS client services. Mar 22 16:01:03 jik5.kamens.us audit[1515]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1515 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.084:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1515 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1509]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1509 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1509]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1509 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.100:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1509 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.100:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1509 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1508]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1508 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.112:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1508 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us systemd[1]: Finished binfmt-support.service - Enable support for additional executable binary formats. Mar 22 16:01:03 jik5.kamens.us audit[1513]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1513 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1513]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1513 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1513]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1513 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.140:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1513 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.140:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1513 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.140:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1513 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1546]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1546 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.148:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1546 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us systemd-resolved[1530]: Positive Trust Anchors: Mar 22 16:01:03 jik5.kamens.us systemd-resolved[1530]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 22 16:01:03 jik5.kamens.us systemd-resolved[1530]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 22 16:01:03 jik5.kamens.us systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Reached target time-set.target - System Time Set. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Started systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:01:03 jik5.kamens.us audit[1510]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1510 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1510]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=1510 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1510]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1510 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1510]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/{,usr/}sbin/dhclient" pid=1510 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us kernel: audit: type=1400 audit(1679515263.288:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1510 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us systemd-resolved[1530]: Using system hostname 'jik5.kamens.us'. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Started systemd-resolved.service - Network Name Resolution. Mar 22 16:01:03 jik5.kamens.us audit[1514]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1514 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us apparmor.systemd[1575]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Mar 22 16:01:03 jik5.kamens.us audit[1550]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1550 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1554]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="named" pid=1554 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us systemd[1]: Finished ufw.service - Uncomplicated firewall. Mar 22 16:01:03 jik5.kamens.us systemd[1]: Reached target network-pre.target - Preparation for Network. Mar 22 16:01:03 jik5.kamens.us audit[1549]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine" pid=1549 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1549]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1549 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1574]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="rsyslogd" pid=1574 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1575]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=1575 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us apparmor.systemd[1575]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 60): Caching disabled for: 'usr.sbin.sssd' due to force complain Mar 22 16:01:03 jik5.kamens.us audit[1551]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1551 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1551]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd" pid=1551 comm="apparmor_parser" Mar 22 16:01:03 jik5.kamens.us audit[1551]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd//third_party" pid=1551 comm="apparmor_parser" Mar 22 16:01:05 jik5.kamens.us audit[1511]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince" pid=1511 comm="apparmor_parser" Mar 22 16:01:05 jik5.kamens.us audit[1511]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince//sanitized_helper" pid=1511 comm="apparmor_parser" Mar 22 16:01:05 jik5.kamens.us audit[1511]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer" pid=1511 comm="apparmor_parser" Mar 22 16:01:05 jik5.kamens.us audit[1511]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer//sanitized_helper" pid=1511 comm="apparmor_parser" Mar 22 16:01:05 jik5.kamens.us audit[1511]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-thumbnailer" pid=1511 comm="apparmor_parser" Mar 22 16:01:06 jik5.kamens.us audit[1534]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice" pid=1534 comm="apparmor_parser" Mar 22 16:01:06 jik5.kamens.us audit[1534]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice//gpg" pid=1534 comm="apparmor_parser" Mar 22 16:01:06 jik5.kamens.us systemd[1]: Finished apparmor.service - Load AppArmor profiles. Mar 22 16:01:07 jik5.kamens.us systemd[1]: Starting snapd.apparmor.service - Load AppArmor profiles managed internally by snapd... Mar 22 16:01:07 jik5.kamens.us audit[1607]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bw" pid=1607 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1610]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.core" pid=1610 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1608]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=1608 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1606]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=1606 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1616]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.vault" pid=1616 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1611]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.cups" pid=1611 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1617]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.cli" pid=1617 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1618]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.daemon" pid=1618 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1605]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=1605 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1605]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1605 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1620]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.tx" pid=1620 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us systemd[1]: systemd-rfkill.service: Deactivated successfully. Mar 22 16:01:07 jik5.kamens.us audit[1621]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.util" pid=1621 comm="apparmor_parser" Mar 22 16:01:07 jik5.kamens.us audit[1622]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.wallet" pid=1622 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1619]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.qt" pid=1619 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: kauditd_printk_skb: 33 callbacks suppressed Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.148:45): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.qt" pid=1619 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1623]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bw.bw" pid=1623 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.292:46): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bw.bw" pid=1623 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1624]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=1624 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.436:47): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=1624 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1612]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.firefox" pid=1612 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.532:48): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.firefox" pid=1612 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1609]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.chromium" pid=1609 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.576:49): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.chromium" pid=1609 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1614]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snap-store" pid=1614 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.592:50): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snap-store" pid=1614 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1626]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=1626 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.616:51): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=1626 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1625]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=1625 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.672:52): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=1625 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1613]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=1613 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.684:53): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=1613 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1627]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=1627 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us kernel: audit: type=1400 audit(1679515268.712:54): apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=1627 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1615]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=1615 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1628]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=1628 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1629]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=1629 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1633]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.core.hook.configure" pid=1633 comm="apparmor_parser" Mar 22 16:01:08 jik5.kamens.us audit[1634]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.accept" pid=1634 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1632]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.hook.configure" pid=1632 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1635]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cancel" pid=1635 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1637]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsaccept" pid=1637 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1636]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cups-browsed" pid=1636 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1638]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsctl" pid=1638 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1639]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsd" pid=1639 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1640]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsdisable" pid=1640 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1641]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsenable" pid=1641 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1643]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsreject" pid=1643 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1642]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsfilter" pid=1642 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1644]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupstestppd" pid=1644 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1646]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.gs" pid=1646 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1645]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.driverless" pid=1645 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1647]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippeveprinter" pid=1647 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1648]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippfind" pid=1648 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1650]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lp" pid=1650 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1649]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ipptool" pid=1649 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1651]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpadmin" pid=1651 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1652]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpc" pid=1652 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1653]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpinfo" pid=1653 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1655]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpq" pid=1655 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1654]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpoptions" pid=1654 comm="apparmor_parser" Mar 22 16:01:09 jik5.kamens.us audit[1656]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpr" pid=1656 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1657]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lprm" pid=1657 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1658]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpstat" pid=1658 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1659]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.reject" pid=1659 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1662]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.configure" pid=1662 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1663]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=1663 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1664]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=1664 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1665]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=1665 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1631]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromium" pid=1631 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1667]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=1667 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1630]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromedriver" pid=1630 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1668]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.hook.configure" pid=1668 comm="apparmor_parser" Mar 22 16:01:10 jik5.kamens.us audit[1672]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=1672 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1674]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.vault.vault" pid=1674 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1669]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.snap-store" pid=1669 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1666]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=1666 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1673]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=1673 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1671]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=1671 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1670]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=1670 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1660]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.firefox" pid=1660 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us audit[1661]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.geckodriver" pid=1661 comm="apparmor_parser" Mar 22 16:01:11 jik5.kamens.us systemd[1]: Finished snapd.apparmor.service - Load AppArmor profiles managed internally by snapd. Mar 22 16:01:32 jik5.kamens.us systemd[1]: systemd-fsckd.service: Deactivated successfully. Mar 22 16:02:02 jik5.kamens.us systemd-udevd[681]: 0000:01:00.0: Worker [710] processing SEQNUM=3809 is taking a long time Mar 22 16:02:02 jik5.kamens.us systemd-udevd[682]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1298] is taking longer than 59s to complete Mar 22 16:02:02 jik5.kamens.us systemd-udevd[695]: 2-5.1:1.0: Spawned process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' [1072] is taking longer than 59s to complete Mar 22 16:02:02 jik5.kamens.us systemd-udevd[681]: nvidia: Worker [682] processing SEQNUM=4292 is taking a long time Mar 22 16:02:02 jik5.kamens.us systemd-udevd[681]: 2-5.1:1.0: Worker [695] processing SEQNUM=3861 is taking a long time Mar 22 16:02:30 jik5.kamens.us systemd[1]: systemd-modules-load.service: start operation timed out. Terminating. Mar 22 16:04:01 jik5.kamens.us systemd[1]: systemd-modules-load.service: State 'stop-sigterm' timed out. Killing. Mar 22 16:04:01 jik5.kamens.us systemd[1]: systemd-modules-load.service: Killing process 663 (systemd-modules) with signal SIGKILL. Mar 22 16:04:02 jik5.kamens.us systemd-udevd[681]: 0000:01:00.0: Worker [710] processing SEQNUM=3809 killed Mar 22 16:04:02 jik5.kamens.us systemd-udevd[695]: 2-5.1:1.0: Spawned process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' [1072] timed out after 2min 59s, killing Mar 22 16:04:02 jik5.kamens.us systemd-udevd[682]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1298] timed out after 2min 59s, killing Mar 22 16:04:02 jik5.kamens.us systemd-udevd[681]: nvidia: Worker [682] processing SEQNUM=4292 killed Mar 22 16:04:02 jik5.kamens.us systemd-udevd[695]: 2-5.1:1.0: Process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' terminated by signal KILL. Mar 22 16:04:02 jik5.kamens.us systemd-udevd[695]: 2-5.1:1.0: Failed to wait for spawned command '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003': Input/output error Mar 22 16:04:02 jik5.kamens.us systemd-udevd[695]: 2-5.1:1.0: Failed to execute '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003', ignoring: Input/output error Mar 22 16:04:02 jik5.kamens.us systemd-udevd[681]: 2-5.1:1.0: Worker [695] processing SEQNUM=3861 killed Mar 22 16:04:02 jik5.kamens.us systemd-udevd[681]: 0000:01:00.0: Worker [710] terminated by signal 9 (KILL). Mar 22 16:04:02 jik5.kamens.us systemd-udevd[681]: nvidia: Worker [682] terminated by signal 9 (KILL). Mar 22 16:04:02 jik5.kamens.us systemd-udevd[681]: Worker [695] terminated by signal 9 (KILL). Mar 22 16:04:46 jik5.kamens.us kernel: INFO: task systemd-modules:663 blocked for more than 120 seconds. Mar 22 16:04:46 jik5.kamens.us kernel: Tainted: P O 6.2.0-18-generic #18-Ubuntu Mar 22 16:04:46 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:04:46 jik5.kamens.us kernel: task:systemd-modules state:D stack:0 pid:663 ppid:1 flags:0x00004006 Mar 22 16:04:46 jik5.kamens.us kernel: Call Trace: Mar 22 16:04:46 jik5.kamens.us kernel: Mar 22 16:04:46 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:04:46 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:04:46 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:04:46 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:04:46 jik5.kamens.us kernel: ? __kmem_cache_alloc_node+0x19d/0x340 Mar 22 16:04:46 jik5.kamens.us kernel: ? nv_drm_calloc+0x1e/0x40 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:04:46 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:04:46 jik5.kamens.us kernel: __nv_drm_connector_detect_internal+0x15c/0x2f0 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: nv_drm_connector_detect+0xe/0x20 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: drm_helper_probe_detect_ctx+0xa0/0x120 [drm_kms_helper] Mar 22 16:04:46 jik5.kamens.us kernel: check_connector_changed+0x52/0x200 [drm_kms_helper] Mar 22 16:04:46 jik5.kamens.us kernel: drm_helper_hpd_irq_event+0xbc/0x170 [drm_kms_helper] Mar 22 16:04:46 jik5.kamens.us kernel: nv_drm_load+0x2e7/0x480 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: ? __pfx_nv_drm_event_callback+0x10/0x10 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: drm_dev_register+0x10b/0x250 [drm] Mar 22 16:04:46 jik5.kamens.us kernel: nv_drm_probe_devices+0x111/0x200 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: ? __pfx_init_module+0x10/0x10 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: nv_drm_init+0x1e/0x60 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: nv_linux_drm_init+0xe/0xff0 [nvidia_drm] Mar 22 16:04:46 jik5.kamens.us kernel: do_one_initcall+0x5b/0x250 Mar 22 16:04:46 jik5.kamens.us kernel: do_init_module+0x7b/0x260 Mar 22 16:04:46 jik5.kamens.us kernel: load_module+0xc76/0xd60 Mar 22 16:04:46 jik5.kamens.us kernel: __do_sys_finit_module+0xc4/0x140 Mar 22 16:04:46 jik5.kamens.us kernel: ? __do_sys_finit_module+0xc4/0x140 Mar 22 16:04:46 jik5.kamens.us kernel: __x64_sys_finit_module+0x18/0x30 Mar 22 16:04:46 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:04:46 jik5.kamens.us kernel: ? ksys_mmap_pgoff+0x120/0x260 Mar 22 16:04:46 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:04:46 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:04:46 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:04:46 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:04:46 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:04:46 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:04:46 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:04:46 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:04:46 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:04:46 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:04:46 jik5.kamens.us kernel: RIP: 0033:0x7f0a28b1581d Mar 22 16:04:46 jik5.kamens.us kernel: RSP: 002b:00007ffc5dfaf1f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 Mar 22 16:04:46 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 0000559ebe43c1b0 RCX: 00007f0a28b1581d Mar 22 16:04:46 jik5.kamens.us kernel: RDX: 0000000000000000 RSI: 0000559ebe43cb10 RDI: 000000000000000b Mar 22 16:04:46 jik5.kamens.us kernel: RBP: 0000559ebe43cb10 R08: 0000000000000000 R09: 0000559ebe431970 Mar 22 16:04:46 jik5.kamens.us kernel: R10: 000000000000000b R11: 0000000000000246 R12: 0000000000020000 Mar 22 16:04:46 jik5.kamens.us kernel: R13: 0000559ebe4317c0 R14: 0000000000000000 R15: 0000559ebe43cee0 Mar 22 16:04:46 jik5.kamens.us kernel: Mar 22 16:05:31 jik5.kamens.us systemd[1]: systemd-modules-load.service: Processes still around after SIGKILL. Ignoring. -- Boot 5159dc5f00104106b2144421ebec1278 -- Mar 22 16:07:00 jik5.kamens.us kernel: microcode: microcode updated early to revision 0xf0, date = 2021-11-12 Mar 22 16:07:00 jik5.kamens.us kernel: Linux version 6.2.0-18-generic (buildd@lcy02-amd64-099) (x86_64-linux-gnu-gcc-12 (Ubuntu 12.2.0-17ubuntu1) 12.2.0, GNU ld (GNU Binutils for Ubuntu) 2.40) #18-Ubuntu SMP PREEMPT_DYNAMIC Thu Mar 16 00:09:48 UTC 2023 (Ubuntu 6.2.0-18.18-generic 6.2.6) Mar 22 16:07:00 jik5.kamens.us kernel: Command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:07:00 jik5.kamens.us kernel: KERNEL supported cpus: Mar 22 16:07:00 jik5.kamens.us kernel: Intel GenuineIntel Mar 22 16:07:00 jik5.kamens.us kernel: AMD AuthenticAMD Mar 22 16:07:00 jik5.kamens.us kernel: Hygon HygonGenuine Mar 22 16:07:00 jik5.kamens.us kernel: Centaur CentaurHauls Mar 22 16:07:00 jik5.kamens.us kernel: zhaoxin Shanghai Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Mar 22 16:07:00 jik5.kamens.us kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Mar 22 16:07:00 jik5.kamens.us kernel: signal: max sigframe size: 2032 Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-provided physical RAM map: Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000100000-0x000000008a870fff] usable Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:07:00 jik5.kamens.us kernel: NX (Execute Disable) protection: active Mar 22 16:07:00 jik5.kamens.us kernel: e820: update [mem 0x8920f018-0x89230c57] usable ==> usable Mar 22 16:07:00 jik5.kamens.us kernel: e820: update [mem 0x8920f018-0x89230c57] usable ==> usable Mar 22 16:07:00 jik5.kamens.us kernel: extended physical RAM map: Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000100000-0x000000008920f017] usable Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008920f018-0x0000000089230c57] usable Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089230c58-0x000000008a870fff] usable Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:07:00 jik5.kamens.us kernel: efi: EFI v2.40 by Acer Inc. Mar 22 16:07:00 jik5.kamens.us kernel: efi: ESRT=0x8f9afe98 ACPI=0x8eff2000 ACPI 2.0=0x8eff2000 SMBIOS=0x8f9ae000 SMBIOS 3.0=0x8f9ad000 MOKvar=0x8f71f000 RNG=0x8eff1f98 TPMEventLog=0x89231018 Mar 22 16:07:00 jik5.kamens.us kernel: random: crng init done Mar 22 16:07:00 jik5.kamens.us kernel: TPM Final Events table not present Mar 22 16:07:00 jik5.kamens.us kernel: efi: Remove mem41: MMIO range=[0xe0000000-0xefffffff] (256MB) from e820 map Mar 22 16:07:00 jik5.kamens.us kernel: e820: remove [mem 0xe0000000-0xefffffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: efi: Not removing mem42: MMIO range=[0xfe000000-0xfe010fff] (68KB) from e820 map Mar 22 16:07:00 jik5.kamens.us kernel: efi: Not removing mem43: MMIO range=[0xfec00000-0xfec00fff] (4KB) from e820 map Mar 22 16:07:00 jik5.kamens.us kernel: efi: Not removing mem44: MMIO range=[0xfee00000-0xfee00fff] (4KB) from e820 map Mar 22 16:07:00 jik5.kamens.us kernel: efi: Remove mem45: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map Mar 22 16:07:00 jik5.kamens.us kernel: e820: remove [mem 0xff000000-0xffffffff] reserved Mar 22 16:07:00 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:07:00 jik5.kamens.us kernel: SMBIOS 3.0.0 present. Mar 22 16:07:00 jik5.kamens.us kernel: DMI: Acer Predator G6-710/Predator G6-710, BIOS R01-A4 05/18/2016 Mar 22 16:07:00 jik5.kamens.us kernel: tsc: Detected 4000.000 MHz processor Mar 22 16:07:00 jik5.kamens.us kernel: tsc: Detected 3999.984 MHz TSC Mar 22 16:07:00 jik5.kamens.us kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 22 16:07:00 jik5.kamens.us kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 22 16:07:00 jik5.kamens.us kernel: last_pfn = 0x46f000 max_arch_pfn = 0x400000000 Mar 22 16:07:00 jik5.kamens.us kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 22 16:07:00 jik5.kamens.us kernel: last_pfn = 0x8faff max_arch_pfn = 0x400000000 Mar 22 16:07:00 jik5.kamens.us kernel: esrt: Reserving ESRT space from 0x000000008f9afe98 to 0x000000008f9afed0. Mar 22 16:07:00 jik5.kamens.us kernel: Using GB pages for direct mapping Mar 22 16:07:00 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:07:00 jik5.kamens.us kernel: RAMDISK: [mem 0x6cbef000-0x74d7cfff] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Early table checksum verification disabled Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: RSDP 0x000000008EFF2000 000024 (v02 ACRSYS) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: XSDT 0x000000008EFF20A8 0000CC (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: FACP 0x000000008F016C80 00010C (v05 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: DSDT 0x000000008EFF2200 024A7F (v02 ACRSYS ACRPRDCT 01072009 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: FACS 0x000000008F560F80 000040 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: APIC 0x000000008F016D90 0000BC (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: FPDT 0x000000008F016E50 000044 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: FIDT 0x000000008F016E98 00009C (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: MCFG 0x000000008F016F38 00003C (v01 ACRSYS ACRPRDCT 01072009 MSFT 00000097) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: HPET 0x000000008F016F78 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI. 0005000B) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F016FB0 00036D (v01 SataRe SataTabl 00001000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LPIT 0x000000008F017320 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F0173B8 000248 (v02 INTEL sensrhub 00000000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F017600 002BAE (v02 INTEL PtidDevc 00001000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01A1B0 000BE3 (v02 INTEL Ther_Rvp 00001000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: DBGP 0x000000008F01AD98 000034 (v01 INTEL 00000000 MSFT 0000005F) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: DBG2 0x000000008F01ADD0 000054 (v00 INTEL 00000000 MSFT 0000005F) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01AE28 000613 (v02 INTEL xh_rvp08 00000000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: MSDM 0x000000008F01B440 000055 (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01B498 00546C (v02 SaSsdt SaSsdt 00003000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: UEFI 0x000000008F020908 000042 (v01 00000000 00000000) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F020950 000E73 (v02 CpuRef CpuSsdt 00003000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: DMAR 0x000000008F0217C8 000070 (v01 INTEL SKL 00000001 INTL 00000001) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: TPM2 0x000000008F021838 000034 (v03 Tpm2Tabl 00000001 AMI 00000000) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: ASF! 0x000000008F021870 0000A5 (v32 INTEL HCG 00000001 TFSM 000F4240) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving FACP table memory at [mem 0x8f016c80-0x8f016d8b] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving DSDT table memory at [mem 0x8eff2200-0x8f016c7e] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving FACS table memory at [mem 0x8f560f80-0x8f560fbf] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving APIC table memory at [mem 0x8f016d90-0x8f016e4b] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving FPDT table memory at [mem 0x8f016e50-0x8f016e93] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving FIDT table memory at [mem 0x8f016e98-0x8f016f33] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving MCFG table memory at [mem 0x8f016f38-0x8f016f73] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving HPET table memory at [mem 0x8f016f78-0x8f016faf] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f016fb0-0x8f01731c] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving LPIT table memory at [mem 0x8f017320-0x8f0173b3] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f0173b8-0x8f0175ff] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f017600-0x8f01a1ad] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01a1b0-0x8f01ad92] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving DBGP table memory at [mem 0x8f01ad98-0x8f01adcb] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving DBG2 table memory at [mem 0x8f01add0-0x8f01ae23] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01ae28-0x8f01b43a] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving MSDM table memory at [mem 0x8f01b440-0x8f01b494] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01b498-0x8f020903] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving UEFI table memory at [mem 0x8f020908-0x8f020949] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f020950-0x8f0217c2] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving DMAR table memory at [mem 0x8f0217c8-0x8f021837] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving TPM2 table memory at [mem 0x8f021838-0x8f02186b] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Reserving ASF! table memory at [mem 0x8f021870-0x8f021914] Mar 22 16:07:00 jik5.kamens.us kernel: No NUMA configuration found Mar 22 16:07:00 jik5.kamens.us kernel: Faking a node at [mem 0x0000000000000000-0x000000046effffff] Mar 22 16:07:00 jik5.kamens.us kernel: NODE_DATA(0) allocated [mem 0x46efd5000-0x46effffff] Mar 22 16:07:00 jik5.kamens.us kernel: Zone ranges: Mar 22 16:07:00 jik5.kamens.us kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 22 16:07:00 jik5.kamens.us kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 22 16:07:00 jik5.kamens.us kernel: Normal [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:07:00 jik5.kamens.us kernel: Device empty Mar 22 16:07:00 jik5.kamens.us kernel: Movable zone start for each node Mar 22 16:07:00 jik5.kamens.us kernel: Early memory node ranges Mar 22 16:07:00 jik5.kamens.us kernel: node 0: [mem 0x0000000000001000-0x0000000000057fff] Mar 22 16:07:00 jik5.kamens.us kernel: node 0: [mem 0x0000000000059000-0x000000000009dfff] Mar 22 16:07:00 jik5.kamens.us kernel: node 0: [mem 0x0000000000100000-0x000000008a870fff] Mar 22 16:07:00 jik5.kamens.us kernel: node 0: [mem 0x000000008a8bc000-0x000000008e52bfff] Mar 22 16:07:00 jik5.kamens.us kernel: node 0: [mem 0x000000008fafe000-0x000000008fafefff] Mar 22 16:07:00 jik5.kamens.us kernel: node 0: [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:07:00 jik5.kamens.us kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000046effffff] Mar 22 16:07:00 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:07:00 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:07:00 jik5.kamens.us kernel: On node 0, zone DMA: 98 pages in unavailable ranges Mar 22 16:07:00 jik5.kamens.us kernel: On node 0, zone DMA32: 75 pages in unavailable ranges Mar 22 16:07:00 jik5.kamens.us kernel: On node 0, zone DMA32: 5586 pages in unavailable ranges Mar 22 16:07:00 jik5.kamens.us kernel: On node 0, zone Normal: 1281 pages in unavailable ranges Mar 22 16:07:00 jik5.kamens.us kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PM-Timer IO Port: 0x1808 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Mar 22 16:07:00 jik5.kamens.us kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 Mar 22 16:07:00 jik5.kamens.us kernel: TSC deadline timer available Mar 22 16:07:00 jik5.kamens.us kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00058000-0x00058fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009ffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8920f000-0x8920ffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89230000-0x89230fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a871000-0x8a871fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a872000-0x8a8bbfff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8e52c000-0x8efe5fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8efe6000-0x8f021fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f022000-0x8f583fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f584000-0x8fafdfff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8faff000-0x8fafffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fb00000-0x8fbfffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fc00000-0xfdffffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xfebfffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec00000-0xfec00fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec01000-0xfedfffff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee00000-0xfee00fff] Mar 22 16:07:00 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee01000-0xffffffff] Mar 22 16:07:00 jik5.kamens.us kernel: [mem 0x8fc00000-0xfdffffff] available for PCI devices Mar 22 16:07:00 jik5.kamens.us kernel: Booting paravirtualized kernel on bare hardware Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Mar 22 16:07:00 jik5.kamens.us kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 22 16:07:00 jik5.kamens.us kernel: percpu: Embedded 61 pages/cpu s212992 r8192 d28672 u262144 Mar 22 16:07:00 jik5.kamens.us kernel: pcpu-alloc: s212992 r8192 d28672 u262144 alloc=1*2097152 Mar 22 16:07:00 jik5.kamens.us kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 22 16:07:00 jik5.kamens.us kernel: Fallback order for Node 0: 0 Mar 22 16:07:00 jik5.kamens.us kernel: Built 1 zonelists, mobility grouping on. Total pages: 4117646 Mar 22 16:07:00 jik5.kamens.us kernel: Policy zone: Normal Mar 22 16:07:00 jik5.kamens.us kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:07:00 jik5.kamens.us kernel: Unknown kernel command line parameters "splash BOOT_IMAGE=/vmlinuz-6.2.0-18-generic", will be passed to user space. Mar 22 16:07:00 jik5.kamens.us kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off Mar 22 16:07:00 jik5.kamens.us kernel: software IO TLB: area num 8. Mar 22 16:07:00 jik5.kamens.us kernel: Memory: 16105600K/16732664K available (20480K kernel code, 4148K rwdata, 13464K rodata, 4644K init, 17664K bss, 626804K reserved, 0K cma-reserved) Mar 22 16:07:00 jik5.kamens.us kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 22 16:07:00 jik5.kamens.us kernel: Kernel/User page tables isolation: enabled Mar 22 16:07:00 jik5.kamens.us kernel: ftrace: allocating 53106 entries in 208 pages Mar 22 16:07:00 jik5.kamens.us kernel: ftrace: allocated 208 pages with 3 groups Mar 22 16:07:00 jik5.kamens.us kernel: Dynamic Preempt: voluntary Mar 22 16:07:00 jik5.kamens.us kernel: rcu: Preemptible hierarchical RCU implementation. Mar 22 16:07:00 jik5.kamens.us kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 22 16:07:00 jik5.kamens.us kernel: Trampoline variant of Tasks RCU enabled. Mar 22 16:07:00 jik5.kamens.us kernel: Rude variant of Tasks RCU enabled. Mar 22 16:07:00 jik5.kamens.us kernel: Tracing variant of Tasks RCU enabled. Mar 22 16:07:00 jik5.kamens.us kernel: rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. Mar 22 16:07:00 jik5.kamens.us kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 22 16:07:00 jik5.kamens.us kernel: NR_IRQS: 524544, nr_irqs: 2048, preallocated irqs: 16 Mar 22 16:07:00 jik5.kamens.us kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 22 16:07:00 jik5.kamens.us kernel: spurious 8259A interrupt: IRQ7. Mar 22 16:07:00 jik5.kamens.us kernel: Console: colour dummy device 80x25 Mar 22 16:07:00 jik5.kamens.us kernel: printk: console [tty0] enabled Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Core revision 20221020 Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Mar 22 16:07:00 jik5.kamens.us kernel: APIC: Switch to symmetric I/O mode setup Mar 22 16:07:00 jik5.kamens.us kernel: DMAR: Host address width 39 Mar 22 16:07:00 jik5.kamens.us kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x1 Mar 22 16:07:00 jik5.kamens.us kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap d2008c40660462 ecap f050da Mar 22 16:07:00 jik5.kamens.us kernel: DMAR: RMRR base: 0x0000008ed60000 end: 0x0000008ed7ffff Mar 22 16:07:00 jik5.kamens.us kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed90000 IOMMU 0 Mar 22 16:07:00 jik5.kamens.us kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed90000 Mar 22 16:07:00 jik5.kamens.us kernel: DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. Mar 22 16:07:00 jik5.kamens.us kernel: DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. Mar 22 16:07:00 jik5.kamens.us kernel: DMAR-IR: Enabled IRQ remapping in xapic mode Mar 22 16:07:00 jik5.kamens.us kernel: x2apic: IRQ remapping doesn't support X2APIC mode Mar 22 16:07:00 jik5.kamens.us kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x73509d9fa88, max_idle_ns: 881590914879 ns Mar 22 16:07:00 jik5.kamens.us kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7999.96 BogoMIPS (lpj=15999936) Mar 22 16:07:00 jik5.kamens.us kernel: pid_max: default: 32768 minimum: 301 Mar 22 16:07:00 jik5.kamens.us kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor Mar 22 16:07:00 jik5.kamens.us kernel: landlock: Up and running. Mar 22 16:07:00 jik5.kamens.us kernel: Yama: becoming mindful. Mar 22 16:07:00 jik5.kamens.us kernel: AppArmor: AppArmor initialized Mar 22 16:07:00 jik5.kamens.us kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: x86/cpu: SGX disabled by BIOS. Mar 22 16:07:00 jik5.kamens.us kernel: CPU0: Thermal monitoring enabled (TM1) Mar 22 16:07:00 jik5.kamens.us kernel: process: using mwait in idle threads Mar 22 16:07:00 jik5.kamens.us kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 22 16:07:00 jik5.kamens.us kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Mar 22 16:07:00 jik5.kamens.us kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 22 16:07:00 jik5.kamens.us kernel: Spectre V2 : Mitigation: IBRS Mar 22 16:07:00 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 22 16:07:00 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 22 16:07:00 jik5.kamens.us kernel: RETBleed: Mitigation: IBRS Mar 22 16:07:00 jik5.kamens.us kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 22 16:07:00 jik5.kamens.us kernel: Spectre V2 : User space: Mitigation: STIBP via prctl Mar 22 16:07:00 jik5.kamens.us kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 22 16:07:00 jik5.kamens.us kernel: MDS: Mitigation: Clear CPU buffers Mar 22 16:07:00 jik5.kamens.us kernel: TAA: Mitigation: TSX disabled Mar 22 16:07:00 jik5.kamens.us kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Mar 22 16:07:00 jik5.kamens.us kernel: SRBDS: Mitigation: Microcode Mar 22 16:07:00 jik5.kamens.us kernel: Freeing SMP alternatives memory: 44K Mar 22 16:07:00 jik5.kamens.us kernel: smpboot: CPU0: Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz (family: 0x6, model: 0x5e, stepping: 0x3) Mar 22 16:07:00 jik5.kamens.us kernel: cblist_init_generic: Setting adjustable number of callback queues. Mar 22 16:07:00 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:07:00 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:07:00 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:07:00 jik5.kamens.us kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Mar 22 16:07:00 jik5.kamens.us kernel: ... version: 4 Mar 22 16:07:00 jik5.kamens.us kernel: ... bit width: 48 Mar 22 16:07:00 jik5.kamens.us kernel: ... generic registers: 4 Mar 22 16:07:00 jik5.kamens.us kernel: ... value mask: 0000ffffffffffff Mar 22 16:07:00 jik5.kamens.us kernel: ... max period: 00007fffffffffff Mar 22 16:07:00 jik5.kamens.us kernel: ... fixed-purpose events: 3 Mar 22 16:07:00 jik5.kamens.us kernel: ... event mask: 000000070000000f Mar 22 16:07:00 jik5.kamens.us kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1024 Mar 22 16:07:00 jik5.kamens.us kernel: rcu: Hierarchical SRCU implementation. Mar 22 16:07:00 jik5.kamens.us kernel: rcu: Max phase no-delay instances is 1000. Mar 22 16:07:00 jik5.kamens.us kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Mar 22 16:07:00 jik5.kamens.us kernel: smp: Bringing up secondary CPUs ... Mar 22 16:07:00 jik5.kamens.us kernel: x86: Booting SMP configuration: Mar 22 16:07:00 jik5.kamens.us kernel: .... node #0, CPUs: #1 #2 #3 #4 Mar 22 16:07:00 jik5.kamens.us kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 22 16:07:00 jik5.kamens.us kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 22 16:07:00 jik5.kamens.us kernel: #5 #6 #7 Mar 22 16:07:00 jik5.kamens.us kernel: smp: Brought up 1 node, 8 CPUs Mar 22 16:07:00 jik5.kamens.us kernel: smpboot: Max logical packages: 1 Mar 22 16:07:00 jik5.kamens.us kernel: smpboot: Total of 8 processors activated (63999.74 BogoMIPS) Mar 22 16:07:00 jik5.kamens.us kernel: devtmpfs: initialized Mar 22 16:07:00 jik5.kamens.us kernel: x86/mm: Memory block size: 128MB Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8a871000-0x8a871fff] (4096 bytes) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8f022000-0x8f583fff] (5644288 bytes) Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Mar 22 16:07:00 jik5.kamens.us kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: pinctrl core: initialized pinctrl subsystem Mar 22 16:07:00 jik5.kamens.us kernel: PM: RTC time: 20:06:44, date: 2023-03-22 Mar 22 16:07:00 jik5.kamens.us kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 22 16:07:00 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Mar 22 16:07:00 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 22 16:07:00 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 22 16:07:00 jik5.kamens.us kernel: audit: initializing netlink subsys (disabled) Mar 22 16:07:00 jik5.kamens.us kernel: audit: type=2000 audit(1679515604.060:1): state=initialized audit_enabled=0 res=1 Mar 22 16:07:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 22 16:07:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'bang_bang' Mar 22 16:07:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 22 16:07:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'user_space' Mar 22 16:07:00 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'power_allocator' Mar 22 16:07:00 jik5.kamens.us kernel: EISA bus registered Mar 22 16:07:00 jik5.kamens.us kernel: cpuidle: using governor ladder Mar 22 16:07:00 jik5.kamens.us kernel: cpuidle: using governor menu Mar 22 16:07:00 jik5.kamens.us kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 22 16:07:00 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:07:00 jik5.kamens.us kernel: PCI: not using MMCONFIG Mar 22 16:07:00 jik5.kamens.us kernel: PCI: Using configuration type 1 for base access Mar 22 16:07:00 jik5.kamens.us kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Mar 22 16:07:00 jik5.kamens.us kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 22 16:07:00 jik5.kamens.us kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 22 16:07:00 jik5.kamens.us kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 22 16:07:00 jik5.kamens.us kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 22 16:07:00 jik5.kamens.us kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 22 16:07:00 jik5.kamens.us kernel: fbcon: Taking over console Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Added _OSI(Module Device) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Device) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: 8 ACPI AML tables successfully acquired and loaded Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFFA0B700EEF000 0007AA (v02 PmRef Cpu0Ist 00003000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFFA0B70130D800 00037F (v02 PmRef Cpu0Cst 00003001 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFFA0B700EE9000 0005AA (v02 PmRef ApIst 00003000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: SSDT 0xFFFFA0B7002D7C00 000119 (v02 PmRef ApCst 00003000 INTL 20120913) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Interpreter enabled Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Using IOAPIC for interrupt routing Mar 22 16:07:00 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:07:00 jik5.kamens.us kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved as ACPI motherboard resource Mar 22 16:07:00 jik5.kamens.us kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 22 16:07:00 jik5.kamens.us kernel: PCI: Using E820 reservations for host bridge windows Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: Enabled 8 GPEs in block 00 to 7F Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG0.PG00: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG1.PG01: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG2.PG02: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP09.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP10.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP11.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP12.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP13.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP01.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP02.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP03.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP04.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP05.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP06.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP07.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP17.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP18.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP19.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP20.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP14.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP15.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP16.PXSX.WRST: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN00: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN01: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN02: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN03: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: \_TZ_.FN04: New power resource Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Mar 22 16:07:00 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 22 16:07:00 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] Mar 22 16:07:00 jik5.kamens.us kernel: PCI host bridge to bus 0000:00 Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000effff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:00.0: [8086:191f] type 00 class 0x060000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:14.0: [8086:a12f] type 00 class 0x0c0330 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:14.0: reg 0x10: [mem 0xdf310000-0xdf31ffff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:14.2: [8086:a131] type 00 class 0x118000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:14.2: reg 0x10: [mem 0xdf32e000-0xdf32efff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:16.0: [8086:a13a] type 00 class 0x078000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:16.0: reg 0x10: [mem 0xdf32d000-0xdf32dfff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:16.0: PME# supported from D3hot Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: [8086:a102] type 00 class 0x010601 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x10: [mem 0xdf328000-0xdf329fff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x14: [mem 0xdf32c000-0xdf32c0ff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x18: [io 0xf050-0xf057] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x1c: [io 0xf040-0xf043] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x20: [io 0xf020-0xf03f] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x24: [mem 0xdf32b000-0xdf32b7ff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:17.0: PME# supported from D3hot Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: [8086:a114] type 01 class 0x060400 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.5: [8086:a115] type 01 class 0x060400 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.6: [8086:a116] type 01 class 0x060400 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.0: [8086:a145] type 00 class 0x060100 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.2: [8086:a121] type 00 class 0x058000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.2: reg 0x10: [mem 0xdf324000-0xdf327fff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.3: [8086:a170] type 00 class 0x040300 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xdf320000-0xdf323fff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x20: [mem 0xdf300000-0xdf30ffff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.4: [8086:a123] type 00 class 0x0c0500 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x10: [mem 0xdf32a000-0xdf32a0ff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x20: [io 0xf000-0xf01f] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: [10de:13c2] type 00 class 0x030000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x10: [mem 0xde000000-0xdeffffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x14: [mem 0xc0000000-0xcfffffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xd0000000-0xd1ffffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x30: [mem 0xdf000000-0xdf07ffff pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: 32.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s PCIe x16 link at 0000:00:01.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.1: [10de:0fbb] type 00 class 0x040300 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.1: reg 0x10: [mem 0xdf080000-0xdf083fff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: ASPM: current common clock configuration is inconsistent, reconfiguring Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:02:00.0: [10ec:8168] type 00 class 0x020000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x10: [io 0xd000-0xd0ff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x18: [mem 0xdf200000-0xdf200fff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x20: [mem 0xd2100000-0xd2103fff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:02:00.0: supports D1 D2 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:03:00.0: [8086:095a] type 00 class 0x028000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:03:00.0: reg 0x10: [mem 0xdf100000-0xdf101fff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 11 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 11 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 11 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 22 16:07:00 jik5.kamens.us kernel: iommu: Default domain type: Translated Mar 22 16:07:00 jik5.kamens.us kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 22 16:07:00 jik5.kamens.us kernel: SCSI subsystem initialized Mar 22 16:07:00 jik5.kamens.us kernel: libata version 3.00 loaded. Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: bus type USB registered Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver usbfs Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver hub Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new device driver usb Mar 22 16:07:00 jik5.kamens.us kernel: pps_core: LinuxPPS API ver. 1 registered Mar 22 16:07:00 jik5.kamens.us kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 22 16:07:00 jik5.kamens.us kernel: PTP clock support registered Mar 22 16:07:00 jik5.kamens.us kernel: EDAC MC: Ver: 3.0.0 Mar 22 16:07:00 jik5.kamens.us kernel: Registered efivars operations Mar 22 16:07:00 jik5.kamens.us kernel: NetLabel: Initializing Mar 22 16:07:00 jik5.kamens.us kernel: NetLabel: domain hash size = 128 Mar 22 16:07:00 jik5.kamens.us kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 22 16:07:00 jik5.kamens.us kernel: NetLabel: unlabeled traffic allowed by default Mar 22 16:07:00 jik5.kamens.us kernel: mctp: management component transport protocol core Mar 22 16:07:00 jik5.kamens.us kernel: NET: Registered PF_MCTP protocol family Mar 22 16:07:00 jik5.kamens.us kernel: PCI: Using ACPI for IRQ routing Mar 22 16:07:00 jik5.kamens.us kernel: PCI: pci_cache_line_size set to 64 bytes Mar 22 16:07:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] Mar 22 16:07:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] Mar 22 16:07:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8920f018-0x8bffffff] Mar 22 16:07:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8a871000-0x8bffffff] Mar 22 16:07:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8e52c000-0x8fffffff] Mar 22 16:07:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8faff000-0x8fffffff] Mar 22 16:07:00 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x46f000000-0x46fffffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: setting as boot VGA device Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: bridge control possible Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 22 16:07:00 jik5.kamens.us kernel: vgaarb: loaded Mar 22 16:07:00 jik5.kamens.us kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Mar 22 16:07:00 jik5.kamens.us kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc-early Mar 22 16:07:00 jik5.kamens.us kernel: VFS: Disk quotas dquot_6.6.0 Mar 22 16:07:00 jik5.kamens.us kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 22 16:07:00 jik5.kamens.us kernel: AppArmor: AppArmor Filesystem Enabled Mar 22 16:07:00 jik5.kamens.us kernel: pnp: PnP ACPI init Mar 22 16:07:00 jik5.kamens.us kernel: system 00:00: [io 0x0a00-0x0a1f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:00: [io 0x0a40-0x0a4f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:00: [io 0x0a50-0x0a5f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:03: [io 0x0680-0x069f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:03: [io 0x1800-0x18fe] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:03: [io 0x164e-0x164f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:04: [io 0x0800-0x087f] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:06: [io 0x1854-0x1857] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed10000-0xfed17fff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed18000-0xfed18fff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed19000-0xfed19fff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xe0000000-0xefffffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed20000-0xfed3ffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed90000-0xfed93fff] could not be reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xfed45000-0xfed8ffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xfee00000-0xfeefffff] could not be reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:07: [mem 0xdffe0000-0xdfffffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:08: [mem 0xfd000000-0xfdabffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:08: [mem 0xfdad0000-0xfdadffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:08: [mem 0xfdb00000-0xfdffffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe000000-0xfe01ffff] could not be reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe036000-0xfe03bfff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe03d000-0xfe3fffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:08: [mem 0xfe410000-0xfe7fffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:09: [io 0xff00-0xfffe] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:0a: [mem 0xfdaf0000-0xfdafffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:0a: [mem 0xfdae0000-0xfdaeffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: system 00:0a: [mem 0xfdac0000-0xfdacffff] has been reserved Mar 22 16:07:00 jik5.kamens.us kernel: pnp: PnP ACPI: found 11 devices Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 22 16:07:00 jik5.kamens.us kernel: NET: Registered PF_INET protocol family Mar 22 16:07:00 jik5.kamens.us kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: TCP: Hash tables configured (established 131072 bind 65536) Mar 22 16:07:00 jik5.kamens.us kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:07:00 jik5.kamens.us kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 22 16:07:00 jik5.kamens.us kernel: NET: Registered PF_XDP protocol family Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000effff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:00: resource 8 [mem 0xfd000000-0xfe7fffff window] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:01: resource 1 [mem 0xde000000-0xdf0fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:01: resource 2 [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:02: resource 0 [io 0xd000-0xdfff] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:02: resource 1 [mem 0xdf200000-0xdf2fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:02: resource 2 [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:07:00 jik5.kamens.us kernel: pci_bus 0000:03: resource 1 [mem 0xdf100000-0xdf1fffff] Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:14.0: quirk_usb_early_handoff+0x0/0x190 took 17181 usecs Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0 Mar 22 16:07:00 jik5.kamens.us kernel: PCI: CLS 0 bytes, default 64 Mar 22 16:07:00 jik5.kamens.us kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 22 16:07:00 jik5.kamens.us kernel: software IO TLB: mapped [mem 0x000000008520f000-0x000000008920f000] (64MB) Mar 22 16:07:00 jik5.kamens.us kernel: Trying to unpack rootfs image as initramfs... Mar 22 16:07:00 jik5.kamens.us kernel: Initialise system trusted keyrings Mar 22 16:07:00 jik5.kamens.us kernel: Key type blacklist registered Mar 22 16:07:00 jik5.kamens.us kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Mar 22 16:07:00 jik5.kamens.us kernel: zbud: loaded Mar 22 16:07:00 jik5.kamens.us kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 22 16:07:00 jik5.kamens.us kernel: fuse: init (API version 7.38) Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Platform Keyring initialized Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Machine keyring initialized Mar 22 16:07:00 jik5.kamens.us kernel: Key type asymmetric registered Mar 22 16:07:00 jik5.kamens.us kernel: Asymmetric key parser 'x509' registered Mar 22 16:07:00 jik5.kamens.us kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) Mar 22 16:07:00 jik5.kamens.us kernel: io scheduler mq-deadline registered Mar 22 16:07:00 jik5.kamens.us kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Mar 22 16:07:00 jik5.kamens.us kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 122 Mar 22 16:07:00 jik5.kamens.us kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 122 Mar 22 16:07:00 jik5.kamens.us kernel: pcieport 0000:00:1c.5: PME: Signaling with IRQ 123 Mar 22 16:07:00 jik5.kamens.us kernel: pcieport 0000:00:1c.5: AER: enabled with IRQ 123 Mar 22 16:07:00 jik5.kamens.us kernel: pcieport 0000:00:1c.6: PME: Signaling with IRQ 124 Mar 22 16:07:00 jik5.kamens.us kernel: pcieport 0000:00:1c.6: AER: enabled with IRQ 124 Mar 22 16:07:00 jik5.kamens.us kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 22 16:07:00 jik5.kamens.us kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: button: Sleep Button [SLPB] Mar 22 16:07:00 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: button: Power Button [PWRB] Mar 22 16:07:00 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: button: Power Button [PWRF] Mar 22 16:07:00 jik5.kamens.us kernel: thermal LNXTHERM:00: registered as thermal_zone0 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Mar 22 16:07:00 jik5.kamens.us kernel: thermal LNXTHERM:01: registered as thermal_zone1 Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ01] (30 C) Mar 22 16:07:00 jik5.kamens.us kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Mar 22 16:07:00 jik5.kamens.us kernel: Linux agpgart interface v0.103 Mar 22 16:07:00 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:07:00 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:07:00 jik5.kamens.us kernel: loop: module loaded Mar 22 16:07:00 jik5.kamens.us kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 22 16:07:00 jik5.kamens.us kernel: PPP generic driver version 2.4.2 Mar 22 16:07:00 jik5.kamens.us kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 Mar 22 16:07:00 jik5.kamens.us kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 22 16:07:00 jik5.kamens.us kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 22 16:07:00 jik5.kamens.us kernel: mousedev: PS/2 mouse device common for all mice Mar 22 16:07:00 jik5.kamens.us kernel: rtc_cmos 00:05: RTC can wake from S4 Mar 22 16:07:00 jik5.kamens.us kernel: rtc_cmos 00:05: registered as rtc0 Mar 22 16:07:00 jik5.kamens.us kernel: rtc_cmos 00:05: setting system clock to 2023-03-22T20:06:44 UTC (1679515604) Mar 22 16:07:00 jik5.kamens.us kernel: rtc_cmos 00:05: alarms up to one month, y3k, 242 bytes nvram Mar 22 16:07:00 jik5.kamens.us kernel: i2c_dev: i2c /dev entries driver Mar 22 16:07:00 jik5.kamens.us kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 22 16:07:00 jik5.kamens.us kernel: device-mapper: uevent: version 1.0.3 Mar 22 16:07:00 jik5.kamens.us kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Probing EISA bus 0 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 1 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 2 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 3 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 4 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 5 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 6 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 7 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 8 Mar 22 16:07:00 jik5.kamens.us kernel: platform eisa.0: EISA: Detected 0 cards Mar 22 16:07:00 jik5.kamens.us kernel: intel_pstate: Intel P-state driver initializing Mar 22 16:07:00 jik5.kamens.us kernel: intel_pstate: HWP enabled Mar 22 16:07:00 jik5.kamens.us kernel: ledtrig-cpu: registered to indicate activity on CPUs Mar 22 16:07:00 jik5.kamens.us kernel: intel_pmc_core INT33A1:00: initialized Mar 22 16:07:00 jik5.kamens.us kernel: drop_monitor: Initializing network drop monitor service Mar 22 16:07:00 jik5.kamens.us kernel: NET: Registered PF_INET6 protocol family Mar 22 16:07:00 jik5.kamens.us kernel: Freeing initrd memory: 132664K Mar 22 16:07:00 jik5.kamens.us kernel: Segment Routing with IPv6 Mar 22 16:07:00 jik5.kamens.us kernel: In-situ OAM (IOAM) with IPv6 Mar 22 16:07:00 jik5.kamens.us kernel: NET: Registered PF_PACKET protocol family Mar 22 16:07:00 jik5.kamens.us kernel: Key type dns_resolver registered Mar 22 16:07:00 jik5.kamens.us kernel: microcode: Microcode Update Driver: v2.2. Mar 22 16:07:00 jik5.kamens.us kernel: IPI shorthand broadcast: enabled Mar 22 16:07:00 jik5.kamens.us kernel: sched_clock: Marking stable (881354122, 414730)->(885957759, -4188907) Mar 22 16:07:00 jik5.kamens.us kernel: registered taskstats version 1 Mar 22 16:07:00 jik5.kamens.us kernel: Loading compiled-in X.509 certificates Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Loading compiled-in revocation X.509 certificates Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' Mar 22 16:07:00 jik5.kamens.us kernel: zswap: loaded using pool lzo/zbud Mar 22 16:07:00 jik5.kamens.us kernel: Key type .fscrypt registered Mar 22 16:07:00 jik5.kamens.us kernel: Key type fscrypt-provisioning registered Mar 22 16:07:00 jik5.kamens.us kernel: Key type trusted registered Mar 22 16:07:00 jik5.kamens.us kernel: Key type encrypted registered Mar 22 16:07:00 jik5.kamens.us kernel: AppArmor: AppArmor sha1 policy hashing enabled Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer: c4f0474ae6b5e67a509d99132f49a4ec13f7ac68' Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer Database: 84f00f5841571abd2cc11a8c26d5c9c8d2b6b0b5' Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Acer Database Forbidden: 9de028a2638669f109745d3e2a7ad5c9e64ed392' Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:07:00 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Debian Secure Boot Signer: 00a7468def' Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:07:00 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:07:00 jik5.kamens.us kernel: Loading compiled-in module X.509 certificates Mar 22 16:07:00 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:07:00 jik5.kamens.us kernel: ima: Allocated hash algorithm: sha1 Mar 22 16:07:00 jik5.kamens.us kernel: ima: No architecture policies found Mar 22 16:07:00 jik5.kamens.us kernel: evm: Initialising EVM extended attributes: Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.selinux Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.SMACK64 Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.SMACK64EXEC Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.SMACK64TRANSMUTE Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.SMACK64MMAP Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.apparmor Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.ima Mar 22 16:07:00 jik5.kamens.us kernel: evm: security.capability Mar 22 16:07:00 jik5.kamens.us kernel: evm: HMAC attrs: 0x1 Mar 22 16:07:00 jik5.kamens.us kernel: PM: Magic number: 15:820:144 Mar 22 16:07:00 jik5.kamens.us kernel: acpi device:15: hash matches Mar 22 16:07:00 jik5.kamens.us kernel: RAS: Correctable Errors collector initialized. Mar 22 16:07:00 jik5.kamens.us kernel: Freeing unused decrypted memory: 2036K Mar 22 16:07:00 jik5.kamens.us kernel: Freeing unused kernel image (initmem) memory: 4644K Mar 22 16:07:00 jik5.kamens.us kernel: Write protecting the kernel read-only data: 34816k Mar 22 16:07:00 jik5.kamens.us kernel: Freeing unused kernel image (rodata/data gap) memory: 872K Mar 22 16:07:00 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:07:00 jik5.kamens.us kernel: x86/mm: Checking user space page tables Mar 22 16:07:00 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:07:00 jik5.kamens.us kernel: Run /init as init process Mar 22 16:07:00 jik5.kamens.us kernel: with arguments: Mar 22 16:07:00 jik5.kamens.us kernel: /init Mar 22 16:07:00 jik5.kamens.us kernel: splash Mar 22 16:07:00 jik5.kamens.us kernel: with environment: Mar 22 16:07:00 jik5.kamens.us kernel: HOME=/ Mar 22 16:07:00 jik5.kamens.us kernel: TERM=linux Mar 22 16:07:00 jik5.kamens.us kernel: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic Mar 22 16:07:00 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Mar 22 16:07:00 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.1: [8086:a120] type 00 class 0x058000 Mar 22 16:07:00 jik5.kamens.us kernel: pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] Mar 22 16:07:00 jik5.kamens.us kernel: ahci 0000:00:17.0: version 3.0 Mar 22 16:07:00 jik5.kamens.us kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Mar 22 16:07:00 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x51 Mar 22 16:07:00 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x53 Mar 22 16:07:00 jik5.kamens.us kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 5 ports 6 Gbps 0x3d impl SATA mode Mar 22 16:07:00 jik5.kamens.us kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst Mar 22 16:07:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:07:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Mar 22 16:07:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810 Mar 22 16:07:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:07:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Mar 22 16:07:00 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed Mar 22 16:07:00 jik5.kamens.us kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.02 Mar 22 16:07:00 jik5.kamens.us kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:07:00 jik5.kamens.us kernel: usb usb1: Product: xHCI Host Controller Mar 22 16:07:00 jik5.kamens.us kernel: usb usb1: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb usb1: SerialNumber: 0000:00:14.0 Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-0:1.0: USB hub found Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-0:1.0: 16 ports detected Mar 22 16:07:00 jik5.kamens.us kernel: cryptd: max_cpu_qlen set to 1000 Mar 22 16:07:00 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: RTL8168g/8111g, 98:ee:cb:23:9d:15, XID 4c0, IRQ 127 Mar 22 16:07:00 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] Mar 22 16:07:00 jik5.kamens.us kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.02 Mar 22 16:07:00 jik5.kamens.us kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:07:00 jik5.kamens.us kernel: usb usb2: Product: xHCI Host Controller Mar 22 16:07:00 jik5.kamens.us kernel: usb usb2: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb usb2: SerialNumber: 0000:00:14.0 Mar 22 16:07:00 jik5.kamens.us kernel: hub 2-0:1.0: USB hub found Mar 22 16:07:00 jik5.kamens.us kernel: hub 2-0:1.0: 10 ports detected Mar 22 16:07:00 jik5.kamens.us kernel: usb: port power management may be unreliable Mar 22 16:07:00 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: renamed from eth0 Mar 22 16:07:00 jik5.kamens.us kernel: scsi host0: ahci Mar 22 16:07:00 jik5.kamens.us kernel: scsi host1: ahci Mar 22 16:07:00 jik5.kamens.us kernel: scsi host2: ahci Mar 22 16:07:00 jik5.kamens.us kernel: scsi host3: ahci Mar 22 16:07:00 jik5.kamens.us kernel: scsi host4: ahci Mar 22 16:07:00 jik5.kamens.us kernel: scsi host5: ahci Mar 22 16:07:00 jik5.kamens.us kernel: ata1: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b100 irq 125 Mar 22 16:07:00 jik5.kamens.us kernel: ata2: DUMMY Mar 22 16:07:00 jik5.kamens.us kernel: ata3: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b200 irq 125 Mar 22 16:07:00 jik5.kamens.us kernel: ata4: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b280 irq 125 Mar 22 16:07:00 jik5.kamens.us kernel: ata5: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b300 irq 125 Mar 22 16:07:00 jik5.kamens.us kernel: ata6: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b380 irq 125 Mar 22 16:07:00 jik5.kamens.us kernel: tsc: Refined TSC clocksource calibration: 4008.013 MHz Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39c5ed82f20, max_idle_ns: 440795221313 ns Mar 22 16:07:00 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:07:00 jik5.kamens.us kernel: ata4: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Mar 22 16:07:00 jik5.kamens.us kernel: ata6: SATA link up 3.0 Gbps (SStatus 123 SControl 300) Mar 22 16:07:00 jik5.kamens.us kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:07:00 jik5.kamens.us kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: ATA-9: Samsung SSD 850 EVO 1TB, EMT01B6Q, max UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata3.00: ATA-9: ST1000DM003-1ER162, CC45, max UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata6.00: ATA-8: WDC WD5001AALS-00L3B2, 01.03B01, max UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata3.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:07:00 jik5.kamens.us kernel: ata6.00: 976773168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:07:00 jik5.kamens.us kernel: ata3.00: configured for UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata6.00: configured for UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata1.00: ATA-9: LITEON CV1-8B128, G871201, max UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata1.00: 250069680 sectors, multi 2: LBA48 NCQ (depth 32), AA Mar 22 16:07:00 jik5.kamens.us kernel: ata1.00: Features: Dev-Sleep Mar 22 16:07:00 jik5.kamens.us kernel: ata4.00: ATAPI: HL-DT-ST DVDRAM GHC0N, 1.00, max UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata1.00: configured for UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: scsi 0:0:0:0: Direct-Access ATA LITEON CV1-8B128 201 PQ: 0 ANSI: 5 Mar 22 16:07:00 jik5.kamens.us kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 Mar 22 16:07:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] 250069680 512-byte logical blocks: (128 GB/119 GiB) Mar 22 16:07:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 22 16:07:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Mar 22 16:07:00 jik5.kamens.us kernel: scsi 2:0:0:0: Direct-Access ATA ST1000DM003-1ER1 CC45 PQ: 0 ANSI: 5 Mar 22 16:07:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:07:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 4096-byte physical blocks Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write Protect is off Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Mar 22 16:07:00 jik5.kamens.us kernel: ata4.00: configured for UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: 1953525168 sectors, multi 1: LBA48 NCQ (depth 32), AA Mar 22 16:07:00 jik5.kamens.us kernel: scsi 3:0:0:0: CD-ROM HL-DT-ST DVDRAM GHC0N 1.00 PQ: 0 ANSI: 5 Mar 22 16:07:00 jik5.kamens.us kernel: sda: Mar 22 16:07:00 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: Features: Trust Dev-Sleep Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:07:00 jik5.kamens.us kernel: sdb: Mar 22 16:07:00 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Attached SCSI disk Mar 22 16:07:00 jik5.kamens.us kernel: ata5.00: configured for UDMA/133 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-1: New USB device found, idVendor=04f9, idProduct=03b9, bcdDevice= 1.00 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-1: Product: ADS-2800W Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-1: Manufacturer: Brother Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-1: SerialNumber: U64278M7G198321 Mar 22 16:07:00 jik5.kamens.us kernel: sr 3:0:0:0: [sr0] scsi3-mmc drive: 40x/12x writer dvd-ram cd/rw xa/form2 cdda tray Mar 22 16:07:00 jik5.kamens.us kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 22 16:07:00 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi CD-ROM sr0 Mar 22 16:07:00 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi generic sg2 type 5 Mar 22 16:07:00 jik5.kamens.us kernel: scsi 4:0:0:0: Direct-Access ATA Samsung SSD 850 1B6Q PQ: 0 ANSI: 5 Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: Attached scsi generic sg3 type 0 Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write Protect is off Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Mode Sense: 00 3a 00 00 Mar 22 16:07:00 jik5.kamens.us kernel: scsi 5:0:0:0: Direct-Access ATA WDC WD5001AALS-0 3B01 PQ: 0 ANSI: 5 Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Preferred minimum I/O size 512 bytes Mar 22 16:07:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] 976773168 512-byte logical blocks: (500 GB/466 GiB) Mar 22 16:07:00 jik5.kamens.us kernel: sd 5:0:0:0: Attached scsi generic sg4 type 0 Mar 22 16:07:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write Protect is off Mar 22 16:07:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Mode Sense: 00 3a 00 00 Mar 22 16:07:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:07:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Preferred minimum I/O size 512 bytes Mar 22 16:07:00 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Attached SCSI disk Mar 22 16:07:00 jik5.kamens.us kernel: sdc: sdc1 sdc2 sdc3 Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] supports TCG Opal Mar 22 16:07:00 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Attached SCSI disk Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5: new SuperSpeed USB device number 2 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5: New USB device found, idVendor=2109, idProduct=8110, bcdDevice=90.95 Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5: Product: USB3.0 Hub Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5: Manufacturer: VIA Labs, Inc. Mar 22 16:07:00 jik5.kamens.us kernel: hub 2-5:1.0: USB hub found Mar 22 16:07:00 jik5.kamens.us kernel: hub 2-5:1.0: 4 ports detected Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-3: new full-speed USB device number 3 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-3: New USB device found, idVendor=0764, idProduct=0501, bcdDevice= 2.00 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-3: New USB device strings: Mfr=3, Product=1, SerialNumber=2 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-3: Product: AVRG750U Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-3: Manufacturer: CPS Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-3: SerialNumber: BHBGV2000445 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-6: new low-speed USB device number 4 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-6: New USB device found, idVendor=0bc7, idProduct=0002, bcdDevice= 1.00 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-6: Product: USB Transceiver Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-6: Manufacturer: X10 Wireless Technology Inc Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5.1: new SuperSpeed USB device number 3 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5.1: New USB device found, idVendor=17e9, idProduct=4323, bcdDevice=31.00 Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5.1: Product: Plugable UD-3900 Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5.1: Manufacturer: DisplayLink Mar 22 16:07:00 jik5.kamens.us kernel: usb 2-5.1: SerialNumber: 20175067 Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ether Mar 22 16:07:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: MAC-Address: 8c:ae:4c:dc:cf:46 Mar 22 16:07:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting rx_max = 16384 Mar 22 16:07:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting tx_max = 16384 Mar 22 16:07:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 eth0: register 'cdc_ncm' at usb-0000:00:14.0-5.1, CDC NCM (SEND ZLP), 8c:ae:4c:dc:cf:46 Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ncm Mar 22 16:07:00 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 enx8cae4cdccf46: renamed from eth0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7: new high-speed USB device number 5 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7: New USB device found, idVendor=2109, idProduct=2811, bcdDevice=90.90 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7: Product: USB2.0 Hub Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7: Manufacturer: VIA Labs, Inc. Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7:1.0: USB hub found Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7:1.0: 4 ports detected Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-9: new high-speed USB device number 6 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-9: New USB device found, idVendor=0bda, idProduct=0153, bcdDevice=57.13 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-9: Product: USB2.0-CRW Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-9: Manufacturer: Generic Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-9: SerialNumber: 20120926571200000 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4: new high-speed USB device number 7 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4: Product: USB 2.0 Hub Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7.4:1.0: USB hub found Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7.4:1.0: 4 ports detected Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-10: new full-speed USB device number 8 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-10: New USB device found, idVendor=8087, idProduct=0a2a, bcdDevice= 0.01 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver usb-storage Mar 22 16:07:00 jik5.kamens.us kernel: hid: raw HID events driver (C) Jiri Kosina Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver uas Mar 22 16:07:00 jik5.kamens.us kernel: ums-realtek 1-9:1.0: USB Mass Storage device detected Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver usbhid Mar 22 16:07:00 jik5.kamens.us kernel: usbhid: USB HID core driver Mar 22 16:07:00 jik5.kamens.us kernel: scsi host6: usb-storage 1-9:1.0 Mar 22 16:07:00 jik5.kamens.us kernel: usbcore: registered new interface driver ums-realtek Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:0764:0501.0001: hiddev0,hidraw0: USB HID v1.10 Device [CPS AVRG750U] on usb-0000:00:14.0-3/input0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1: new high-speed USB device number 9 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1: Product: USB 2.0 Hub Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7.4.1:1.0: USB hub found Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7.4.1:1.0: 4 ports detected Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.3: new high-speed USB device number 10 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.1: new full-speed USB device number 11 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: scsi 6:0:0:0: Direct-Access Generic- SD/MMC/MS PRO 1.00 PQ: 0 ANSI: 4 Mar 22 16:07:00 jik5.kamens.us kernel: sd 6:0:0:0: Attached scsi generic sg5 type 0 Mar 22 16:07:00 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Media removed, stopped polling Mar 22 16:07:00 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Attached SCSI removable disk Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device found, idVendor=0b0e, idProduct=245d, bcdDevice= 1.48 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.1: Product: Jabra Link 370 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.1: SerialNumber: 70BF92C25E96 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.4: new full-speed USB device number 12 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device found, idVendor=046d, idProduct=c52b, bcdDevice=12.10 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.4: Product: USB Receiver Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.1.4: Manufacturer: Logitech Mar 22 16:07:00 jik5.kamens.us kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.0/0003:046D:C52B.0003/input/input6 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0003: input,hidraw1: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input0 Mar 22 16:07:00 jik5.kamens.us kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0004/input/input7 Mar 22 16:07:00 jik5.kamens.us kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0004/input/input8 Mar 22 16:07:00 jik5.kamens.us kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0004/input/input9 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0004: input,hiddev1,hidraw2: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input1 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0005: hiddev2,hidraw3: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.3: New USB device found, idVendor=046d, idProduct=082d, bcdDevice= 0.11 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.3: New USB device strings: Mfr=0, Product=2, SerialNumber=1 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.3: Product: HD Pro Webcam C920 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.3: SerialNumber: ED48865F Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4: new high-speed USB device number 13 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4: New USB device found, idVendor=058f, idProduct=6254, bcdDevice= 1.00 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7.4.4:1.0: USB hub found Mar 22 16:07:00 jik5.kamens.us kernel: hub 1-7.4.4:1.0: 4 ports detected Mar 22 16:07:00 jik5.kamens.us kernel: input: Jabra Link 370 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.3/0003:0B0E:245D.0002/input/input11 Mar 22 16:07:00 jik5.kamens.us kernel: jabra 0003:0B0E:245D.0002: input,hiddev3,hidraw4: USB HID v1.11 Device [Jabra Link 370] on usb-0000:00:14.0-7.4.1.1/input3 Mar 22 16:07:00 jik5.kamens.us kernel: logitech-djreceiver 0003:046D:C52B.0005: hiddev2,hidraw1: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:07:00 jik5.kamens.us kernel: input: Logitech Wireless Device PID:4051 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0005/0003:046D:4051.0006/input/input12 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:046D:4051.0006: input,hidraw2: USB HID v1.11 Mouse [Logitech Wireless Device PID:4051] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.1: new full-speed USB device number 14 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: input: Logitech M510 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0005/0003:046D:4051.0006/input/input16 Mar 22 16:07:00 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0006: input,hidraw2: USB HID v1.11 Mouse [Logitech M510] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device found, idVendor=24f0, idProduct=0142, bcdDevice= 1.00 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.1: Product: Das Keyboard Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.1: Manufacturer: Metadot - Das Keyboard Mar 22 16:07:00 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.0/0003:24F0:0142.0007/input/input17 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0007: input,hidraw3: USB HID v1.10 Keyboard [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input0 Mar 22 16:07:00 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0008/input/input18 Mar 22 16:07:00 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0008/input/input19 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0008: input,hidraw5: USB HID v1.10 Device [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input1 Mar 22 16:07:00 jik5.kamens.us kernel: EXT4-fs (sdc2): INFO: recovery required on readonly filesystem Mar 22 16:07:00 jik5.kamens.us kernel: EXT4-fs (sdc2): write access will be enabled during recovery Mar 22 16:07:00 jik5.kamens.us kernel: EXT4-fs (sdc2): recovery complete Mar 22 16:07:00 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:07:00 jik5.kamens.us kernel: EXT4-fs (sdc2): unmounting filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.3: new full-speed USB device number 15 using xhci_hcd Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.3: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 5.43 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.3: Product: YubiKey OTP+FIDO+CCID Mar 22 16:07:00 jik5.kamens.us kernel: usb 1-7.4.4.3: Manufacturer: Yubico Mar 22 16:07:00 jik5.kamens.us kernel: input: Yubico YubiKey OTP+FIDO+CCID as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3/1-7.4.4.3:1.0/0003:1050:0407.0009/input/input20 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:1050:0407.0009: input,hidraw6: USB HID v1.10 Keyboard [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.4.4.3/input0 Mar 22 16:07:00 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000A: hiddev1,hidraw7: USB HID v1.10 Device [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.4.4.3/input1 Mar 22 16:07:00 jik5.kamens.us kernel: EXT4-fs (dm-1): mounted filesystem e07a02bb-3dad-40e5-945b-111535c44f3a with ordered data mode. Quota mode: none. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Inserted module 'autofs4' Mar 22 16:07:00 jik5.kamens.us systemd[1]: systemd 252.5-2ubuntu2 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 22 16:07:00 jik5.kamens.us systemd[1]: Detected architecture x86-64. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Hostname set to . Mar 22 16:07:00 jik5.kamens.us systemd[1]: Queued start job for default target graphical.target. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Created slice system-postfix.slice - Slice /system/postfix. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Created slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Created slice user.slice - User and Session Slice. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Reached target slices.target - Slice Units. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on rpcbind.socket - RPCbind Server Activation Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on syslog.socket - Syslog Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-journald.socket - Journal Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-oomd.socket - Userspace Out-Of-Memory (OOM) Killer Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Mar 22 16:07:00 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-journald.service - Journal Service... Mar 22 16:07:00 jik5.kamens.us systemd[1]: auth-rpcgss-module.service - Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished blk-availability.service - Availability of block devices. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Mar 22 16:07:00 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Mar 22 16:07:00 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:07:00 jik5.kamens.us kernel: pstore: Using crash dump compression: deflate Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Mar 22 16:07:00 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:07:00 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:07:00 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:07:00 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Unnecessary job was removed for dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - /dev/disk/by-uuid/c531070b-52cc-405a-8abe-8ac4be2d75f4. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Mar 22 16:07:00 jik5.kamens.us kernel: pstore: Registered efi_pstore as persistent store backend Mar 22 16:07:00 jik5.kamens.us systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Mar 22 16:07:00 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:07:00 jik5.kamens.us systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:07:00 jik5.kamens.us kernel: EXT4-fs (dm-1): re-mounted e07a02bb-3dad-40e5-945b-111535c44f3a. Quota mode: none. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Mar 22 16:07:00 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:07:00 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:00 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-sysusers.service - Create System Users... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:07:00 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:00 jik5.kamens.us kernel: ACPI: bus type drm_connector registered Mar 22 16:07:00 jik5.kamens.us systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Mar 22 16:07:00 jik5.kamens.us kernel: lp: driver loaded but no devices found Mar 22 16:07:00 jik5.kamens.us kernel: ppdev: user-space parallel port driver Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished systemd-sysusers.service - Create System Users. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout. Mar 22 16:07:00 jik5.kamens.us systemd-journald[669]: Journal started Mar 22 16:07:00 jik5.kamens.us systemd-journald[669]: Runtime Journal (/run/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 8.0M, max 159.4M, 151.4M free. Mar 22 16:07:00 jik5.kamens.us systemd-modules-load[685]: Inserted module 'lp' Mar 22 16:07:00 jik5.kamens.us systemd-modules-load[685]: Inserted module 'ppdev' Mar 22 16:07:00 jik5.kamens.us systemd-modules-load[685]: Inserted module 'parport_pc' Mar 22 16:07:00 jik5.kamens.us mount[666]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:07:00 jik5.kamens.us mount[666]: dmesg(1) may have more information after failed mount system call. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Mar 22 16:07:00 jik5.kamens.us umount[694]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Started systemd-journald.service - Journal Service. Mar 22 16:07:00 jik5.kamens.us lvm[673]: 2 logical volume(s) in volume group "ubuntu-vg" monitored Mar 22 16:07:00 jik5.kamens.us systemd-journald[669]: Time spent on flushing to /var/log/journal/dca43d426a4043fd96f7351cc9f080c2 is 8.054ms for 1089 entries. Mar 22 16:07:00 jik5.kamens.us systemd-journald[669]: System Journal (/var/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 1.3G, max 4.0G, 2.6G free. Mar 22 16:07:00 jik5.kamens.us systemd-journald[669]: Received client request to flush runtime journal. Mar 22 16:07:00 jik5.kamens.us systemd-journald[669]: File /var/log/journal/dca43d426a4043fd96f7351cc9f080c2/system.journal corrupted or uncleanly shut down, renaming and replacing. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Mar 22 16:07:00 jik5.kamens.us systemd-udevd[705]: Using default interface naming scheme 'v252'. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 22 16:07:00 jik5.kamens.us systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Mar 22 16:07:00 jik5.kamens.us systemd-udevd[705]: Configuration file /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:07:00 jik5.kamens.us systemd-udevd[705]: /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules:9 Invalid key 'SYSFS' Mar 22 16:07:00 jik5.kamens.us systemd-udevd[705]: /etc/udev/rules.d/60-brother-libsane-type1.rules:17 Invalid key 'SYSFS' Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting home-macback-home-macback-backup.mount - /home/macback/home/macback/backup... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-bare-5.mount - Mount unit for bare, revision 5... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120... Mar 22 16:07:00 jik5.kamens.us kernel: loop0: detected capacity change from 0 to 8 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126... Mar 22 16:07:00 jik5.kamens.us kernel: loop1: detected capacity change from 0 to 232672 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-bw-45.mount - Mount unit for bw, revision 45... Mar 22 16:07:00 jik5.kamens.us kernel: loop2: detected capacity change from 0 to 235144 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-bw-46.mount - Mount unit for bw, revision 46... Mar 22 16:07:00 jik5.kamens.us kernel: loop3: detected capacity change from 0 to 46048 Mar 22 16:07:00 jik5.kamens.us kernel: loop4: detected capacity change from 0 to 47368 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164... Mar 22 16:07:00 jik5.kamens.us kernel: loop5: detected capacity change from 0 to 18352 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-chromium-2381.mount - Mount unit for chromium, revision 2381... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-chromium-2392.mount - Mount unit for chromium, revision 2392... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28... Mar 22 16:07:00 jik5.kamens.us kernel: loop6: detected capacity change from 0 to 18352 Mar 22 16:07:00 jik5.kamens.us kernel: loop7: detected capacity change from 0 to 304168 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30... Mar 22 16:07:00 jik5.kamens.us kernel: loop8: detected capacity change from 0 to 55568 Mar 22 16:07:00 jik5.kamens.us kernel: loop9: detected capacity change from 0 to 304168 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core-14784.mount - Mount unit for core, revision 14784... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core-14946.mount - Mount unit for core, revision 14946... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core18-2708.mount - Mount unit for core18, revision 2708... Mar 22 16:07:00 jik5.kamens.us kernel: loop10: detected capacity change from 0 to 37776 Mar 22 16:07:00 jik5.kamens.us kernel: loop11: detected capacity change from 0 to 239176 Mar 22 16:07:00 jik5.kamens.us kernel: loop12: detected capacity change from 0 to 239128 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core18-2714.mount - Mount unit for core18, revision 2714... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core20-1828.mount - Mount unit for core20, revision 1828... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core20-1852.mount - Mount unit for core20, revision 1852... Mar 22 16:07:00 jik5.kamens.us kernel: loop13: detected capacity change from 0 to 113896 Mar 22 16:07:00 jik5.kamens.us kernel: loop15: detected capacity change from 0 to 129608 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core22-522.mount - Mount unit for core22, revision 522... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-core22-547.mount - Mount unit for core22, revision 547... Mar 22 16:07:00 jik5.kamens.us kernel: loop14: detected capacity change from 0 to 113888 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-cups-836.mount - Mount unit for cups, revision 836... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-cups-872.mount - Mount unit for cups, revision 872... Mar 22 16:07:00 jik5.kamens.us kernel: loop16: detected capacity change from 0 to 129672 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-firefox-2432.mount - Mount unit for firefox, revision 2432... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-firefox-2487.mount - Mount unit for firefox, revision 2487... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102... Mar 22 16:07:00 jik5.kamens.us systemd-udevd[730]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatch /module/rfkill 0:0' failed with exit code 1. Mar 22 16:07:00 jik5.kamens.us kernel: loop17: detected capacity change from 0 to 149312 Mar 22 16:07:00 jik5.kamens.us systemd-udevd[730]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatchd /module/rfkill 0:0' failed with exit code 1. Mar 22 16:07:00 jik5.kamens.us systemd-udevd[730]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /module/rfkill 0:0' failed with exit code 1. Mar 22 16:07:00 jik5.kamens.us systemd-udevd[730]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /module/rfkill 0:0' failed with exit code 1. Mar 22 16:07:00 jik5.kamens.us kernel: loop18: detected capacity change from 0 to 112848 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104... Mar 22 16:07:00 jik5.kamens.us kernel: loop19: detected capacity change from 0 to 112704 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145... Mar 22 16:07:00 jik5.kamens.us kernel: loop20: detected capacity change from 0 to 149312 Mar 22 16:07:00 jik5.kamens.us kernel: loop21: detected capacity change from 0 to 494824 Mar 22 16:07:00 jik5.kamens.us kernel: loop22: detected capacity change from 0 to 288072 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72... Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77... Mar 22 16:07:00 jik5.kamens.us kernel: loop23: detected capacity change from 0 to 491264 Mar 22 16:07:00 jik5.kamens.us kernel: loop25: detected capacity change from 0 to 337424 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115... Mar 22 16:07:00 jik5.kamens.us kernel: loop26: detected capacity change from 0 to 333552 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119... Mar 22 16:07:00 jik5.kamens.us kernel: loop24: detected capacity change from 0 to 288120 Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56... Mar 22 16:07:00 jik5.kamens.us lvm[782]: PV /dev/dm-0 online, VG ubuntu-vg is complete. Mar 22 16:07:00 jik5.kamens.us lvm[782]: VG ubuntu-vg finished Mar 22 16:07:00 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65... Mar 22 16:07:01 jik5.kamens.us systemd-udevd[733]: dm-1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-1' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[745]: dm-2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-2' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178... Mar 22 16:07:01 jik5.kamens.us kernel: nvidia: loading out-of-tree module taints kernel. Mar 22 16:07:01 jik5.kamens.us kernel: nvidia: module license 'NVIDIA' taints kernel. Mar 22 16:07:01 jik5.kamens.us kernel: Disabling lock debugging due to kernel taint Mar 22 16:07:01 jik5.kamens.us kernel: loop27: detected capacity change from 0 to 448512 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534... Mar 22 16:07:01 jik5.kamens.us kernel: loop28: detected capacity change from 0 to 448512 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535... Mar 22 16:07:01 jik5.kamens.us kernel: loop29: detected capacity change from 0 to 709216 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2... Mar 22 16:07:01 jik5.kamens.us kernel: loop30: detected capacity change from 0 to 709280 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599... Mar 22 16:07:01 jik5.kamens.us kernel: loop31: detected capacity change from 0 to 926512 Mar 22 16:07:01 jik5.kamens.us mtp-probe[818]: checking bus 1, device 6: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49... Mar 22 16:07:01 jik5.kamens.us kernel: loop33: detected capacity change from 0 to 5208 Mar 22 16:07:01 jik5.kamens.us kernel: loop32: detected capacity change from 0 to 942640 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71... Mar 22 16:07:01 jik5.kamens.us systemd-udevd[742]: event_source: Failed to get device name: No such file or directory Mar 22 16:07:01 jik5.kamens.us mtp-probe[818]: bus: 1, device: 6 was not an MTP device Mar 22 16:07:01 jik5.kamens.us kernel: nvidia-nvlink: Nvlink Core is being initialized, major device number 238 Mar 22 16:07:01 jik5.kamens.us kernel: Mar 22 16:07:01 jik5.kamens.us kernel: nvidia 0000:01:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem Mar 22 16:07:01 jik5.kamens.us kernel: loop35: detected capacity change from 0 to 3048 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-vault-1930.mount - Mount unit for vault, revision 1930... Mar 22 16:07:01 jik5.kamens.us systemd-udevd[728]: dm-0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting snap-vault-1958.mount - Mount unit for vault, revision 1958... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control... Mar 22 16:07:01 jik5.kamens.us systemd-udevd[730]: sdc: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us kernel: loop34: detected capacity change from 0 to 166424 Mar 22 16:07:01 jik5.kamens.us systemd-udevd[726]: sda: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us kernel: loop37: detected capacity change from 0 to 94056 Mar 22 16:07:01 jik5.kamens.us mtp-probe[875]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1" Mar 22 16:07:01 jik5.kamens.us kernel: loop36: detected capacity change from 0 to 187776 Mar 22 16:07:01 jik5.kamens.us kernel: loop39: detected capacity change from 0 to 94064 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Mar 22 16:07:01 jik5.kamens.us kernel: loop38: detected capacity change from 0 to 75960 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Mar 22 16:07:01 jik5.kamens.us kernel: loop40: detected capacity change from 0 to 608 Mar 22 16:07:01 jik5.kamens.us kernel: loop41: detected capacity change from 0 to 594024 Mar 22 16:07:01 jik5.kamens.us kernel: loop42: detected capacity change from 0 to 864 Mar 22 16:07:01 jik5.kamens.us mtp-probe[875]: bus: 2, device: 3 was not an MTP device Mar 22 16:07:01 jik5.kamens.us systemd-udevd[728]: sdc3: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc3' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us kernel: loop43: detected capacity change from 0 to 594024 Mar 22 16:07:01 jik5.kamens.us systemd-udevd[752]: sdc2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc2' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[730]: sdc1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc1' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us kernel: NVRM: loading NVIDIA UNIX x86_64 Kernel Module 515.86.01 Wed Oct 26 09:12:38 UTC 2022 Mar 22 16:07:01 jik5.kamens.us systemd-udevd[727]: sdb: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[722]: sde: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sde' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup. Mar 22 16:07:01 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_wdm Mar 22 16:07:01 jik5.kamens.us systemd-udevd[720]: sdd: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdd' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_mbim Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted home-macback-home-macback-backup.mount - /home/macback/home/macback/backup. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-bare-5.mount - Mount unit for bare, revision 5. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-bw-45.mount - Mount unit for bw, revision 45. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-bw-46.mount - Mount unit for bw, revision 46. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-chromium-2381.mount - Mount unit for chromium, revision 2381. Mar 22 16:07:01 jik5.kamens.us mtp-probe[951]: checking bus 1, device 11: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1" Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-chromium-2392.mount - Mount unit for chromium, revision 2392. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core-14784.mount - Mount unit for core, revision 14784. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core-14946.mount - Mount unit for core, revision 14946. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core18-2708.mount - Mount unit for core18, revision 2708. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core18-2714.mount - Mount unit for core18, revision 2714. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core20-1828.mount - Mount unit for core20, revision 1828. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core20-1852.mount - Mount unit for core20, revision 1852. Mar 22 16:07:01 jik5.kamens.us kernel: nvidia-modeset: Loading NVIDIA Kernel Mode Setting Driver for UNIX platforms 515.86.01 Wed Oct 26 09:02:01 UTC 2022 Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core22-522.mount - Mount unit for core22, revision 522. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-core22-547.mount - Mount unit for core22, revision 547. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-cups-836.mount - Mount unit for cups, revision 836. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-cups-872.mount - Mount unit for cups, revision 872. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-firefox-2432.mount - Mount unit for firefox, revision 2432. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-firefox-2487.mount - Mount unit for firefox, revision 2487. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-vault-1930.mount - Mount unit for vault, revision 1930. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted snap-vault-1958.mount - Mount unit for vault, revision 1958. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control. Mar 22 16:07:01 jik5.kamens.us mtp-probe[951]: bus: 1, device: 11 was not an MTP device Mar 22 16:07:01 jik5.kamens.us mtp-probe[955]: checking bus 1, device 14: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1" Mar 22 16:07:01 jik5.kamens.us mtp-probe[955]: bus: 1, device: 14 was not an MTP device Mar 22 16:07:01 jik5.kamens.us mtp-probe[958]: checking bus 1, device 15: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3" Mar 22 16:07:01 jik5.kamens.us systemd[1]: Found device dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.device - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:07:01 jik5.kamens.us mtp-probe[957]: checking bus 1, device 12: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4" Mar 22 16:07:01 jik5.kamens.us kernel: [drm] [nvidia-drm] [GPU ID 0x00000100] Loading driver Mar 22 16:07:01 jik5.kamens.us mtp-probe[957]: bus: 1, device: 12 was not an MTP device Mar 22 16:07:01 jik5.kamens.us mtp-probe[958]: bus: 1, device: 15 was not an MTP device Mar 22 16:07:01 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - Samsung_SSD_850_EVO_1TB 3. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.device - Samsung_SSD_850_EVO_1TB 2. Mar 22 16:07:01 jik5.kamens.us kernel: EDAC ie31200: No ECC support Mar 22 16:07:01 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-F41C\x2d35B5.device - Samsung_SSD_850_EVO_1TB EFI\x20System\x20Partition. Mar 22 16:07:01 jik5.kamens.us mtp-probe[1034]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-6" Mar 22 16:07:01 jik5.kamens.us mtp-probe[1034]: bus: 1, device: 4 was not an MTP device Mar 22 16:07:01 jik5.kamens.us mtp-probe[1057]: checking bus 1, device 10: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3" Mar 22 16:07:01 jik5.kamens.us mtp-probe[1057]: bus: 1, device: 10 was not an MTP device Mar 22 16:07:01 jik5.kamens.us systemd[1]: Reached target snapd.mounts.target - Mounted snaps. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Activating swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:01 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:07:01 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2... Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:07:01 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:07:01 jik5.kamens.us mtp-probe[1152]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-3" Mar 22 16:07:01 jik5.kamens.us mtp-probe[1152]: bus: 1, device: 3 was not an MTP device Mar 22 16:07:01 jik5.kamens.us systemd[1]: Started systemd-fsckd.service - File System Check Daemon to report status. Mar 22 16:07:01 jik5.kamens.us kernel: Adding 999420k swap on /dev/mapper/ubuntu--vg-swap_1. Priority:-2 extents:1 across:999420k SSFS Mar 22 16:07:01 jik5.kamens.us systemd[1]: Activated swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Reached target swap.target - Swaps. Mar 22 16:07:01 jik5.kamens.us kernel: mc: Linux media interface: v0.10 Mar 22 16:07:01 jik5.kamens.us kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) Mar 22 16:07:01 jik5.kamens.us systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:07:01 jik5.kamens.us systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: fsck.fat 4.2 (2021-01-31) Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: There are differences between boot sector and its backup. Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: This is mostly harmless. Differences: (offset:original/backup) Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: 65:01/00 Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: Not automatically fixing this. Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: Automatically removing dirty bit. Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: *** Filesystem was changed *** Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: Writing changes. Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1191]: /dev/sdc1: 11 files, 1554/130812 clusters Mar 22 16:07:01 jik5.kamens.us systemd-fsck[1192]: /dev/sdc2: clean, 327/46848 files, 118926/187392 blocks Mar 22 16:07:01 jik5.kamens.us kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Mar 22 16:07:01 jik5.kamens.us kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Mar 22 16:07:01 jik5.kamens.us kernel: videodev: Linux video capture interface: v2.00 Mar 22 16:07:01 jik5.kamens.us kernel: Intel(R) Wireless WiFi driver for Linux Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: enabling device (0000 -> 0002) Mar 22 16:07:01 jik5.kamens.us kernel: Bluetooth: Core ver 2.22 Mar 22 16:07:01 jik5.kamens.us kernel: NET: Registered PF_BLUETOOTH protocol family Mar 22 16:07:01 jik5.kamens.us kernel: Bluetooth: HCI device and connection manager initialized Mar 22 16:07:01 jik5.kamens.us kernel: Bluetooth: HCI socket layer initialized Mar 22 16:07:01 jik5.kamens.us kernel: Bluetooth: L2CAP socket layer initialized Mar 22 16:07:01 jik5.kamens.us kernel: Bluetooth: SCO socket layer initialized Mar 22 16:07:01 jik5.kamens.us kernel: ee1004 0-0051: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:07:01 jik5.kamens.us kernel: ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:07:01 jik5.kamens.us kernel: usb 1-7.4.3: Found UVC 1.00 device HD Pro Webcam C920 (046d:082d) Mar 22 16:07:01 jik5.kamens.us systemd-udevd[750]: sr0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sr0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:01 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting boot.mount - /boot... Mar 22 16:07:01 jik5.kamens.us kernel: acer_wmi: Acer Laptop ACPI-WMI Extras Mar 22 16:07:01 jik5.kamens.us kernel: acer_wmi: No WMID device detection method found Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:07:01 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:07:01 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:07:01 jik5.kamens.us mount[1245]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:07:01 jik5.kamens.us mount[1245]: dmesg(1) may have more information after failed mount system call. Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug destination: EXTERNAL_DRAM Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug configuration: 0 Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: loaded firmware version 29.4063824552.0 7265D-29.ucode op_mode iwlmvm Mar 22 16:07:01 jik5.kamens.us kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Mar 22 16:07:01 jik5.kamens.us kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Mar 22 16:07:01 jik5.kamens.us kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Mar 22 16:07:01 jik5.kamens.us kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Mar 22 16:07:01 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:07:01 jik5.kamens.us kernel: input: HD Pro Webcam C920 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0/input/input21 Mar 22 16:07:01 jik5.kamens.us kernel: usbcore: registered new interface driver uvcvideo Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted boot.mount - /boot. Mar 22 16:07:01 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:07:01 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:07:01 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounting boot-efi.mount - /boot/efi... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:07:01 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:07:01 jik5.kamens.us umount[1281]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:07:01 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:07:01 jik5.kamens.us kernel: usbcore: registered new interface driver btusb Mar 22 16:07:01 jik5.kamens.us systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:07:01 jik5.kamens.us kernel: Bluetooth: hci0: Legacy ROM 2.5 revision 1.0 build 3 week 17 2014 Mar 22 16:07:01 jik5.kamens.us kernel: Bluetooth: hci0: Intel Bluetooth firmware file: intel/ibt-hw-37.8.10-fw-1.10.3.11.e.bseq Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Detected Intel(R) Dual Band Wireless AC 7265, REV=0x210 Mar 22 16:07:01 jik5.kamens.us kernel: thermal thermal_zone3: failed to read out thermal zone (-61) Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Applying debug destination EXTERNAL_DRAM Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Allocated 0x00400000 bytes for firmware monitor. Mar 22 16:07:01 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: base HW address: 4c:34:88:9c:4f:cd, OTP minor version: 0x0 Mar 22 16:07:01 jik5.kamens.us kernel: intel_tcc_cooling: Programmable TCC Offset detected Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: enabling device (0000 -> 0002) Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Disabling MSI Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client Mar 22 16:07:01 jik5.kamens.us systemd[1]: Starting systemd-rfkill.service - Load/Save RF Kill Switch Status... Mar 22 16:07:01 jik5.kamens.us systemd[1]: Mounted boot-efi.mount - /boot/efi. Mar 22 16:07:01 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=511), cval->res is probably wrong. Mar 22 16:07:01 jik5.kamens.us kernel: usb 2-5.1: [15] FU [Plugable Audio Playback Volume] ch = 6, val = -8176/0/16 Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC662 rev3: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: inputs: Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Front Mic=0x19 Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 Mar 22 16:07:01 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Line=0x1a Mar 22 16:07:01 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=767), cval->res is probably wrong. Mar 22 16:07:01 jik5.kamens.us kernel: usb 2-5.1: [12] FU [Mic Capture Volume] ch = 2, val = -4592/7680/16 Mar 22 16:07:01 jik5.kamens.us kernel: usb 1-7.4.1.1: 1:1: cannot set freq 48000 to ep 0x3 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input22 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input23 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input24 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input25 Mar 22 16:07:01 jik5.kamens.us kernel: ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' Mar 22 16:07:01 jik5.kamens.us systemd[1]: Reached target local-fs.target - Local File Systems. Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input26 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input27 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1f.3/sound/card0/input28 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1f.3/sound/card0/input29 Mar 22 16:07:01 jik5.kamens.us kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input30 Mar 22 16:07:01 jik5.kamens.us systemd-udevd[738]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[738]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /class/video4linux 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[738]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_firefox /class/video4linux 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[738]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_geckodriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[742]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[742]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[722]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[722]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[751]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain package Mar 22 16:07:01 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain core Mar 22 16:07:01 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain dram Mar 22 16:07:01 jik5.kamens.us systemd-udevd[737]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[723]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[731]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[751]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[723]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[737]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[731]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[750]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd-udevd[750]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:07:01 jik5.kamens.us systemd[1]: Starting apparmor.service - Load AppArmor profiles... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting console-setup.service - Set console font and keymap... Mar 22 16:07:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0 wlp3s0: renamed from wlan0 Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting systemd-binfmt.service - Set Up Additional Binary Formats... Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting ufw.service - Uncomplicated firewall... Mar 22 16:07:02 jik5.kamens.us apparmor.systemd[1448]: Restarting AppArmor Mar 22 16:07:02 jik5.kamens.us apparmor.systemd[1448]: Reloading AppArmor profiles Mar 22 16:07:02 jik5.kamens.us systemd[1]: Started systemd-rfkill.service - Load/Save RF Kill Switch Status. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished console-setup.service - Set console font and keymap. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Received SIGRTMIN+20 from PID 472 (plymouthd). Mar 22 16:07:02 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 1470 (systemd-binfmt) Mar 22 16:07:02 jik5.kamens.us kernel: Bluetooth: hci0: Intel BT fw patch 0x32 completed & activated Mar 22 16:07:02 jik5.kamens.us apparmor.systemd[1490]: Skipping profile in /etc/apparmor.d/disable: usr.bin.firefox Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Mar 22 16:07:02 jik5.kamens.us audit[1486]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1486 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1494]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1494 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1487]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1487 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1487]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1487 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1491]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1491 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1491]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1491 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1491]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1491 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.038:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1486 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.038:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1494 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.038:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1487 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.038:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1487 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.038:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1491 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.038:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1491 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.038:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1491 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1493]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1493 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.042:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1493 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1492]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1492 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1496]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1496 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1498]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1498 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us apparmor.systemd[1507]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Mar 22 16:07:02 jik5.kamens.us audit[1497]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine" pid=1497 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1497]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1497 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1488]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1488 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1488]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=1488 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1488]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1488 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1488]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/{,usr/}sbin/dhclient" pid=1488 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.054:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1492 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us kernel: audit: type=1400 audit(1679515622.054:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1496 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1506]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="rsyslogd" pid=1506 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1505]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="named" pid=1505 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1499]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1499 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1499]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd" pid=1499 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1499]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd//third_party" pid=1499 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:07:02 jik5.kamens.us audit[1489]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince" pid=1489 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1489]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince//sanitized_helper" pid=1489 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1489]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer" pid=1489 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1489]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer//sanitized_helper" pid=1489 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1489]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-thumbnailer" pid=1489 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1495]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice" pid=1495 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1495]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice//gpg" pid=1495 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us systemd[1]: Mounting proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Mounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:07:02 jik5.kamens.us mount[1525]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:07:02 jik5.kamens.us mount[1525]: dmesg(1) may have more information after failed mount system call. Mar 22 16:07:02 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting rpcbind.service - RPC bind portmap service... Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:02 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Started rpcbind.service - RPC bind portmap service. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Mounted proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System. Mar 22 16:07:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:07:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:07:02 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished systemd-binfmt.service - Set Up Additional Binary Formats. Mar 22 16:07:02 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[750]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[750]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us kernel: RPC: Registered named UNIX socket transport module. Mar 22 16:07:02 jik5.kamens.us kernel: RPC: Registered udp transport module. Mar 22 16:07:02 jik5.kamens.us kernel: RPC: Registered tcp transport module. Mar 22 16:07:02 jik5.kamens.us kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 22 16:07:02 jik5.kamens.us audit[1507]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=1507 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us apparmor.systemd[1507]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 60): Caching disabled for: 'usr.sbin.sssd' due to force complain Mar 22 16:07:02 jik5.kamens.us kernel: usbcore: registered new interface driver snd-usb-audio Mar 22 16:07:02 jik5.kamens.us systemd-udevd[750]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[750]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Mounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[730]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished apparmor.service - Load AppArmor profiles. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[742]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[730]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[742]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:07:02 jik5.kamens.us systemd[1]: Reached target rpc_pipefs.target. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Reached target rpcbind.target - RPC Port Mapper. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting binfmt-support.service - Enable support for additional executable binary formats... Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:07:02 jik5.kamens.us systemd[1]: rpc-gssd.service - RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:07:02 jik5.kamens.us systemd[1]: Reached target nfs-client.target - NFS client services. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Starting snapd.apparmor.service - Load AppArmor profiles managed internally by snapd... Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:02 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:07:02 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:07:02 jik5.kamens.us systemd-udevd[750]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd-udevd[750]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished binfmt-support.service - Enable support for additional executable binary formats. Mar 22 16:07:02 jik5.kamens.us audit[1615]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=1615 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1617]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=1617 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1616]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bw" pid=1616 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1619]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.core" pid=1619 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1620]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.cups" pid=1620 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1614]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=1614 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1614]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1614 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1621]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.firefox" pid=1621 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1628]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.cli" pid=1628 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1618]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.chromium" pid=1618 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1627]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.vault" pid=1627 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1623]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snap-store" pid=1623 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1624]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=1624 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1631]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.daemon" pid=1631 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished ufw.service - Uncomplicated firewall. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Reached target network-pre.target - Preparation for Network. Mar 22 16:07:02 jik5.kamens.us audit[1636]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.wallet" pid=1636 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1634]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.util" pid=1634 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1632]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.qt" pid=1632 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1637]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bw.bw" pid=1637 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1639]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=1639 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1622]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=1622 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1633]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.tx" pid=1633 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1640]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=1640 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1638]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=1638 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1641]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=1641 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1643]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=1643 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1642]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=1642 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1647]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.core.hook.configure" pid=1647 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1648]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.accept" pid=1648 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1649]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cancel" pid=1649 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1650]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cups-browsed" pid=1650 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1652]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsctl" pid=1652 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1644]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromedriver" pid=1644 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1651]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsaccept" pid=1651 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1645]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromium" pid=1645 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us systemd[1]: Started systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:07:02 jik5.kamens.us audit[1646]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.hook.configure" pid=1646 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us systemd-resolved[1533]: Positive Trust Anchors: Mar 22 16:07:02 jik5.kamens.us systemd-resolved[1533]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 22 16:07:02 jik5.kamens.us systemd-resolved[1533]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 22 16:07:02 jik5.kamens.us audit[1654]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsdisable" pid=1654 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1655]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsenable" pid=1655 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1658]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupstestppd" pid=1658 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1660]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.gs" pid=1660 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1656]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsfilter" pid=1656 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1657]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsreject" pid=1657 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Reached target time-set.target - System Time Set. Mar 22 16:07:02 jik5.kamens.us audit[1653]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsd" pid=1653 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1659]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.driverless" pid=1659 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1661]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippeveprinter" pid=1661 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1663]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ipptool" pid=1663 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1662]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippfind" pid=1662 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1665]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpadmin" pid=1665 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1666]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpc" pid=1666 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1664]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lp" pid=1664 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1668]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpinfo" pid=1668 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1669]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpoptions" pid=1669 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1670]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpq" pid=1670 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1672]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lprm" pid=1672 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1674]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.reject" pid=1674 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1671]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpr" pid=1671 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1673]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpstat" pid=1673 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1678]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=1678 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1680]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=1680 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1679]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=1679 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1677]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.configure" pid=1677 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1676]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.geckodriver" pid=1676 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1675]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.firefox" pid=1675 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1682]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=1682 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1683]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.hook.configure" pid=1683 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1681]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=1681 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1684]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.snap-store" pid=1684 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1689]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.vault.vault" pid=1689 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1685]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=1685 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1687]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=1687 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1686]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=1686 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us audit[1688]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=1688 comm="apparmor_parser" Mar 22 16:07:02 jik5.kamens.us systemd[1]: Finished snapd.apparmor.service - Load AppArmor profiles managed internally by snapd. Mar 22 16:07:02 jik5.kamens.us systemd-resolved[1533]: Using system hostname 'jik5.kamens.us'. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Started systemd-resolved.service - Network Name Resolution. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:07:02 jik5.kamens.us mount[1690]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:07:02 jik5.kamens.us mount[1690]: dmesg(1) may have more information after failed mount system call. Mar 22 16:07:02 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:07:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:07:02 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:07:02 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:07:02 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:07:02 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:07:02 jik5.kamens.us umount[1691]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:07:02 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:07:07 jik5.kamens.us systemd[1]: systemd-rfkill.service: Deactivated successfully. Mar 22 16:07:31 jik5.kamens.us systemd[1]: systemd-fsckd.service: Deactivated successfully. Mar 22 16:08:01 jik5.kamens.us systemd-udevd[743]: 1-7.4.4.3: Spawned process '/bin/systemctl start yubikey-monitor.service' [1004] is taking longer than 59s to complete Mar 22 16:08:01 jik5.kamens.us systemd-udevd[756]: 2-5.1:1.0: Spawned process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' [1109] is taking longer than 59s to complete Mar 22 16:08:01 jik5.kamens.us systemd-udevd[705]: 1-7.4.4.3: Worker [743] processing SEQNUM=3297 is taking a long time Mar 22 16:08:01 jik5.kamens.us systemd-udevd[705]: 2-5.1:1.0: Worker [756] processing SEQNUM=3873 is taking a long time Mar 22 16:08:01 jik5.kamens.us systemd-udevd[705]: 0000:01:00.0: Worker [752] processing SEQNUM=3817 is taking a long time Mar 22 16:08:02 jik5.kamens.us systemd-udevd[705]: nvidia: Worker [754] processing SEQNUM=4358 is taking a long time Mar 22 16:08:02 jik5.kamens.us systemd-udevd[754]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1441] is taking longer than 59s to complete -- Boot 0dd7fdb63f0d458d9ac32d8587959e9d -- Mar 22 16:09:11 jik5.kamens.us kernel: microcode: microcode updated early to revision 0xf0, date = 2021-11-12 Mar 22 16:09:11 jik5.kamens.us kernel: Linux version 6.2.0-18-generic (buildd@lcy02-amd64-099) (x86_64-linux-gnu-gcc-12 (Ubuntu 12.2.0-17ubuntu1) 12.2.0, GNU ld (GNU Binutils for Ubuntu) 2.40) #18-Ubuntu SMP PREEMPT_DYNAMIC Thu Mar 16 00:09:48 UTC 2023 (Ubuntu 6.2.0-18.18-generic 6.2.6) Mar 22 16:09:11 jik5.kamens.us kernel: Command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:09:11 jik5.kamens.us kernel: KERNEL supported cpus: Mar 22 16:09:11 jik5.kamens.us kernel: Intel GenuineIntel Mar 22 16:09:11 jik5.kamens.us kernel: AMD AuthenticAMD Mar 22 16:09:11 jik5.kamens.us kernel: Hygon HygonGenuine Mar 22 16:09:11 jik5.kamens.us kernel: Centaur CentaurHauls Mar 22 16:09:11 jik5.kamens.us kernel: zhaoxin Shanghai Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Mar 22 16:09:11 jik5.kamens.us kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Mar 22 16:09:11 jik5.kamens.us kernel: signal: max sigframe size: 2032 Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-provided physical RAM map: Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000100000-0x000000008a870fff] usable Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:09:11 jik5.kamens.us kernel: NX (Execute Disable) protection: active Mar 22 16:09:11 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:09:11 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:09:11 jik5.kamens.us kernel: extended physical RAM map: Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000089217017] usable Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089217018-0x0000000089238c57] usable Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089238c58-0x000000008a870fff] usable Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:09:11 jik5.kamens.us kernel: efi: EFI v2.40 by Acer Inc. Mar 22 16:09:11 jik5.kamens.us kernel: efi: ESRT=0x8f9afe98 ACPI=0x8eff2000 ACPI 2.0=0x8eff2000 SMBIOS=0x8f9ae000 SMBIOS 3.0=0x8f9ad000 MOKvar=0x8f71e000 RNG=0x8eff1f98 TPMEventLog=0x8a91c018 Mar 22 16:09:11 jik5.kamens.us kernel: random: crng init done Mar 22 16:09:11 jik5.kamens.us kernel: TPM Final Events table not present Mar 22 16:09:11 jik5.kamens.us kernel: efi: Remove mem41: MMIO range=[0xe0000000-0xefffffff] (256MB) from e820 map Mar 22 16:09:11 jik5.kamens.us kernel: e820: remove [mem 0xe0000000-0xefffffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: efi: Not removing mem42: MMIO range=[0xfe000000-0xfe010fff] (68KB) from e820 map Mar 22 16:09:11 jik5.kamens.us kernel: efi: Not removing mem43: MMIO range=[0xfec00000-0xfec00fff] (4KB) from e820 map Mar 22 16:09:11 jik5.kamens.us kernel: efi: Not removing mem44: MMIO range=[0xfee00000-0xfee00fff] (4KB) from e820 map Mar 22 16:09:11 jik5.kamens.us kernel: efi: Remove mem45: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map Mar 22 16:09:11 jik5.kamens.us kernel: e820: remove [mem 0xff000000-0xffffffff] reserved Mar 22 16:09:11 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:09:11 jik5.kamens.us kernel: SMBIOS 3.0.0 present. Mar 22 16:09:11 jik5.kamens.us kernel: DMI: Acer Predator G6-710/Predator G6-710, BIOS R01-A4 05/18/2016 Mar 22 16:09:11 jik5.kamens.us kernel: tsc: Detected 4000.000 MHz processor Mar 22 16:09:11 jik5.kamens.us kernel: tsc: Detected 3999.984 MHz TSC Mar 22 16:09:11 jik5.kamens.us kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 22 16:09:11 jik5.kamens.us kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 22 16:09:11 jik5.kamens.us kernel: last_pfn = 0x46f000 max_arch_pfn = 0x400000000 Mar 22 16:09:11 jik5.kamens.us kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 22 16:09:11 jik5.kamens.us kernel: last_pfn = 0x8faff max_arch_pfn = 0x400000000 Mar 22 16:09:11 jik5.kamens.us kernel: esrt: Reserving ESRT space from 0x000000008f9afe98 to 0x000000008f9afed0. Mar 22 16:09:11 jik5.kamens.us kernel: Using GB pages for direct mapping Mar 22 16:09:11 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:09:11 jik5.kamens.us kernel: RAMDISK: [mem 0x6c174000-0x74301fff] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Early table checksum verification disabled Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: RSDP 0x000000008EFF2000 000024 (v02 ACRSYS) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: XSDT 0x000000008EFF20A8 0000D4 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: FACP 0x000000008F016C90 00010C (v05 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: DSDT 0x000000008EFF2210 024A7F (v02 ACRSYS ACRPRDCT 01072009 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: FACS 0x000000008F560F80 000040 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: APIC 0x000000008F016DA0 0000BC (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: FPDT 0x000000008F016E60 000044 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: FIDT 0x000000008F016EA8 00009C (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: MCFG 0x000000008F016F48 00003C (v01 ACRSYS ACRPRDCT 01072009 MSFT 00000097) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: HPET 0x000000008F016F88 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI. 0005000B) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F016FC0 00036D (v01 SataRe SataTabl 00001000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LPIT 0x000000008F017330 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F0173C8 000248 (v02 INTEL sensrhub 00000000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F017610 002BAE (v02 INTEL PtidDevc 00001000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01A1C0 000BE3 (v02 INTEL Ther_Rvp 00001000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: DBGP 0x000000008F01ADA8 000034 (v01 INTEL 00000000 MSFT 0000005F) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: DBG2 0x000000008F01ADE0 000054 (v00 INTEL 00000000 MSFT 0000005F) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01AE38 000613 (v02 INTEL xh_rvp08 00000000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: MSDM 0x000000008F01B450 000055 (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01B4A8 00546C (v02 SaSsdt SaSsdt 00003000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: UEFI 0x000000008F020918 000042 (v01 00000000 00000000) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F020960 000E73 (v02 CpuRef CpuSsdt 00003000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: BGRT 0x000000008F0217D8 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: DMAR 0x000000008F021810 000070 (v01 INTEL SKL 00000001 INTL 00000001) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: TPM2 0x000000008F021880 000034 (v03 Tpm2Tabl 00000001 AMI 00000000) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: ASF! 0x000000008F0218B8 0000A5 (v32 INTEL HCG 00000001 TFSM 000F4240) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving FACP table memory at [mem 0x8f016c90-0x8f016d9b] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving DSDT table memory at [mem 0x8eff2210-0x8f016c8e] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving FACS table memory at [mem 0x8f560f80-0x8f560fbf] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving APIC table memory at [mem 0x8f016da0-0x8f016e5b] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving FPDT table memory at [mem 0x8f016e60-0x8f016ea3] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving FIDT table memory at [mem 0x8f016ea8-0x8f016f43] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving MCFG table memory at [mem 0x8f016f48-0x8f016f83] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving HPET table memory at [mem 0x8f016f88-0x8f016fbf] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f016fc0-0x8f01732c] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving LPIT table memory at [mem 0x8f017330-0x8f0173c3] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f0173c8-0x8f01760f] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f017610-0x8f01a1bd] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01a1c0-0x8f01ada2] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving DBGP table memory at [mem 0x8f01ada8-0x8f01addb] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving DBG2 table memory at [mem 0x8f01ade0-0x8f01ae33] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01ae38-0x8f01b44a] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving MSDM table memory at [mem 0x8f01b450-0x8f01b4a4] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01b4a8-0x8f020913] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving UEFI table memory at [mem 0x8f020918-0x8f020959] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f020960-0x8f0217d2] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving BGRT table memory at [mem 0x8f0217d8-0x8f02180f] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving DMAR table memory at [mem 0x8f021810-0x8f02187f] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving TPM2 table memory at [mem 0x8f021880-0x8f0218b3] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Reserving ASF! table memory at [mem 0x8f0218b8-0x8f02195c] Mar 22 16:09:11 jik5.kamens.us kernel: No NUMA configuration found Mar 22 16:09:11 jik5.kamens.us kernel: Faking a node at [mem 0x0000000000000000-0x000000046effffff] Mar 22 16:09:11 jik5.kamens.us kernel: NODE_DATA(0) allocated [mem 0x46efd5000-0x46effffff] Mar 22 16:09:11 jik5.kamens.us kernel: Zone ranges: Mar 22 16:09:11 jik5.kamens.us kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 22 16:09:11 jik5.kamens.us kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 22 16:09:11 jik5.kamens.us kernel: Normal [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:09:11 jik5.kamens.us kernel: Device empty Mar 22 16:09:11 jik5.kamens.us kernel: Movable zone start for each node Mar 22 16:09:11 jik5.kamens.us kernel: Early memory node ranges Mar 22 16:09:11 jik5.kamens.us kernel: node 0: [mem 0x0000000000001000-0x0000000000057fff] Mar 22 16:09:11 jik5.kamens.us kernel: node 0: [mem 0x0000000000059000-0x000000000009dfff] Mar 22 16:09:11 jik5.kamens.us kernel: node 0: [mem 0x0000000000100000-0x000000008a870fff] Mar 22 16:09:11 jik5.kamens.us kernel: node 0: [mem 0x000000008a8bc000-0x000000008e52bfff] Mar 22 16:09:11 jik5.kamens.us kernel: node 0: [mem 0x000000008fafe000-0x000000008fafefff] Mar 22 16:09:11 jik5.kamens.us kernel: node 0: [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:09:11 jik5.kamens.us kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000046effffff] Mar 22 16:09:11 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:09:11 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:09:11 jik5.kamens.us kernel: On node 0, zone DMA: 98 pages in unavailable ranges Mar 22 16:09:11 jik5.kamens.us kernel: On node 0, zone DMA32: 75 pages in unavailable ranges Mar 22 16:09:11 jik5.kamens.us kernel: On node 0, zone DMA32: 5586 pages in unavailable ranges Mar 22 16:09:11 jik5.kamens.us kernel: On node 0, zone Normal: 1281 pages in unavailable ranges Mar 22 16:09:11 jik5.kamens.us kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PM-Timer IO Port: 0x1808 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Mar 22 16:09:11 jik5.kamens.us kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 Mar 22 16:09:11 jik5.kamens.us kernel: e820: update [mem 0x8c99e000-0x8ca91fff] usable ==> reserved Mar 22 16:09:11 jik5.kamens.us kernel: TSC deadline timer available Mar 22 16:09:11 jik5.kamens.us kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00058000-0x00058fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009ffff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89217000-0x89217fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89238000-0x89238fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a871000-0x8a871fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a872000-0x8a8bbfff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8c99e000-0x8ca91fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8e52c000-0x8efe5fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8efe6000-0x8f021fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f022000-0x8f583fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f584000-0x8fafdfff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8faff000-0x8fafffff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fb00000-0x8fbfffff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fc00000-0xfdffffff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xfebfffff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec00000-0xfec00fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec01000-0xfedfffff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee00000-0xfee00fff] Mar 22 16:09:11 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee01000-0xffffffff] Mar 22 16:09:11 jik5.kamens.us kernel: [mem 0x8fc00000-0xfdffffff] available for PCI devices Mar 22 16:09:11 jik5.kamens.us kernel: Booting paravirtualized kernel on bare hardware Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Mar 22 16:09:11 jik5.kamens.us kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 22 16:09:11 jik5.kamens.us kernel: percpu: Embedded 61 pages/cpu s212992 r8192 d28672 u262144 Mar 22 16:09:11 jik5.kamens.us kernel: pcpu-alloc: s212992 r8192 d28672 u262144 alloc=1*2097152 Mar 22 16:09:11 jik5.kamens.us kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 22 16:09:11 jik5.kamens.us kernel: Fallback order for Node 0: 0 Mar 22 16:09:11 jik5.kamens.us kernel: Built 1 zonelists, mobility grouping on. Total pages: 4117646 Mar 22 16:09:11 jik5.kamens.us kernel: Policy zone: Normal Mar 22 16:09:11 jik5.kamens.us kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:09:11 jik5.kamens.us kernel: Unknown kernel command line parameters "splash BOOT_IMAGE=/vmlinuz-6.2.0-18-generic", will be passed to user space. Mar 22 16:09:11 jik5.kamens.us kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off Mar 22 16:09:11 jik5.kamens.us kernel: software IO TLB: area num 8. Mar 22 16:09:11 jik5.kamens.us kernel: Memory: 16105600K/16732664K available (20480K kernel code, 4148K rwdata, 13464K rodata, 4644K init, 17664K bss, 626804K reserved, 0K cma-reserved) Mar 22 16:09:11 jik5.kamens.us kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 22 16:09:11 jik5.kamens.us kernel: Kernel/User page tables isolation: enabled Mar 22 16:09:11 jik5.kamens.us kernel: ftrace: allocating 53106 entries in 208 pages Mar 22 16:09:11 jik5.kamens.us kernel: ftrace: allocated 208 pages with 3 groups Mar 22 16:09:11 jik5.kamens.us kernel: Dynamic Preempt: voluntary Mar 22 16:09:11 jik5.kamens.us kernel: rcu: Preemptible hierarchical RCU implementation. Mar 22 16:09:11 jik5.kamens.us kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 22 16:09:11 jik5.kamens.us kernel: Trampoline variant of Tasks RCU enabled. Mar 22 16:09:11 jik5.kamens.us kernel: Rude variant of Tasks RCU enabled. Mar 22 16:09:11 jik5.kamens.us kernel: Tracing variant of Tasks RCU enabled. Mar 22 16:09:11 jik5.kamens.us kernel: rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. Mar 22 16:09:11 jik5.kamens.us kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 22 16:09:11 jik5.kamens.us kernel: NR_IRQS: 524544, nr_irqs: 2048, preallocated irqs: 16 Mar 22 16:09:11 jik5.kamens.us kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 22 16:09:11 jik5.kamens.us kernel: spurious 8259A interrupt: IRQ7. Mar 22 16:09:11 jik5.kamens.us kernel: Console: colour dummy device 80x25 Mar 22 16:09:11 jik5.kamens.us kernel: printk: console [tty0] enabled Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Core revision 20221020 Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Mar 22 16:09:11 jik5.kamens.us kernel: APIC: Switch to symmetric I/O mode setup Mar 22 16:09:11 jik5.kamens.us kernel: DMAR: Host address width 39 Mar 22 16:09:11 jik5.kamens.us kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x1 Mar 22 16:09:11 jik5.kamens.us kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap d2008c40660462 ecap f050da Mar 22 16:09:11 jik5.kamens.us kernel: DMAR: RMRR base: 0x0000008ed60000 end: 0x0000008ed7ffff Mar 22 16:09:11 jik5.kamens.us kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed90000 IOMMU 0 Mar 22 16:09:11 jik5.kamens.us kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed90000 Mar 22 16:09:11 jik5.kamens.us kernel: DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. Mar 22 16:09:11 jik5.kamens.us kernel: DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. Mar 22 16:09:11 jik5.kamens.us kernel: DMAR-IR: Enabled IRQ remapping in xapic mode Mar 22 16:09:11 jik5.kamens.us kernel: x2apic: IRQ remapping doesn't support X2APIC mode Mar 22 16:09:11 jik5.kamens.us kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x73509d9fa88, max_idle_ns: 881590914879 ns Mar 22 16:09:11 jik5.kamens.us kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7999.96 BogoMIPS (lpj=15999936) Mar 22 16:09:11 jik5.kamens.us kernel: pid_max: default: 32768 minimum: 301 Mar 22 16:09:11 jik5.kamens.us kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor Mar 22 16:09:11 jik5.kamens.us kernel: landlock: Up and running. Mar 22 16:09:11 jik5.kamens.us kernel: Yama: becoming mindful. Mar 22 16:09:11 jik5.kamens.us kernel: AppArmor: AppArmor initialized Mar 22 16:09:11 jik5.kamens.us kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: x86/cpu: SGX disabled by BIOS. Mar 22 16:09:11 jik5.kamens.us kernel: CPU0: Thermal monitoring enabled (TM1) Mar 22 16:09:11 jik5.kamens.us kernel: process: using mwait in idle threads Mar 22 16:09:11 jik5.kamens.us kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 22 16:09:11 jik5.kamens.us kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Mar 22 16:09:11 jik5.kamens.us kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 22 16:09:11 jik5.kamens.us kernel: Spectre V2 : Mitigation: IBRS Mar 22 16:09:11 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 22 16:09:11 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 22 16:09:11 jik5.kamens.us kernel: RETBleed: Mitigation: IBRS Mar 22 16:09:11 jik5.kamens.us kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 22 16:09:11 jik5.kamens.us kernel: Spectre V2 : User space: Mitigation: STIBP via prctl Mar 22 16:09:11 jik5.kamens.us kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 22 16:09:11 jik5.kamens.us kernel: MDS: Mitigation: Clear CPU buffers Mar 22 16:09:11 jik5.kamens.us kernel: TAA: Mitigation: TSX disabled Mar 22 16:09:11 jik5.kamens.us kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Mar 22 16:09:11 jik5.kamens.us kernel: SRBDS: Mitigation: Microcode Mar 22 16:09:11 jik5.kamens.us kernel: Freeing SMP alternatives memory: 44K Mar 22 16:09:11 jik5.kamens.us kernel: smpboot: CPU0: Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz (family: 0x6, model: 0x5e, stepping: 0x3) Mar 22 16:09:11 jik5.kamens.us kernel: cblist_init_generic: Setting adjustable number of callback queues. Mar 22 16:09:11 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:09:11 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:09:11 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:09:11 jik5.kamens.us kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Mar 22 16:09:11 jik5.kamens.us kernel: ... version: 4 Mar 22 16:09:11 jik5.kamens.us kernel: ... bit width: 48 Mar 22 16:09:11 jik5.kamens.us kernel: ... generic registers: 4 Mar 22 16:09:11 jik5.kamens.us kernel: ... value mask: 0000ffffffffffff Mar 22 16:09:11 jik5.kamens.us kernel: ... max period: 00007fffffffffff Mar 22 16:09:11 jik5.kamens.us kernel: ... fixed-purpose events: 3 Mar 22 16:09:11 jik5.kamens.us kernel: ... event mask: 000000070000000f Mar 22 16:09:11 jik5.kamens.us kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1024 Mar 22 16:09:11 jik5.kamens.us kernel: rcu: Hierarchical SRCU implementation. Mar 22 16:09:11 jik5.kamens.us kernel: rcu: Max phase no-delay instances is 1000. Mar 22 16:09:11 jik5.kamens.us kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Mar 22 16:09:11 jik5.kamens.us kernel: smp: Bringing up secondary CPUs ... Mar 22 16:09:11 jik5.kamens.us kernel: x86: Booting SMP configuration: Mar 22 16:09:11 jik5.kamens.us kernel: .... node #0, CPUs: #1 #2 #3 #4 Mar 22 16:09:11 jik5.kamens.us kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 22 16:09:11 jik5.kamens.us kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 22 16:09:11 jik5.kamens.us kernel: #5 #6 #7 Mar 22 16:09:11 jik5.kamens.us kernel: smp: Brought up 1 node, 8 CPUs Mar 22 16:09:11 jik5.kamens.us kernel: smpboot: Max logical packages: 1 Mar 22 16:09:11 jik5.kamens.us kernel: smpboot: Total of 8 processors activated (63999.74 BogoMIPS) Mar 22 16:09:11 jik5.kamens.us kernel: devtmpfs: initialized Mar 22 16:09:11 jik5.kamens.us kernel: x86/mm: Memory block size: 128MB Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8a871000-0x8a871fff] (4096 bytes) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8f022000-0x8f583fff] (5644288 bytes) Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Mar 22 16:09:11 jik5.kamens.us kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: pinctrl core: initialized pinctrl subsystem Mar 22 16:09:11 jik5.kamens.us kernel: PM: RTC time: 20:08:55, date: 2023-03-22 Mar 22 16:09:11 jik5.kamens.us kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 22 16:09:11 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Mar 22 16:09:11 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 22 16:09:11 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 22 16:09:11 jik5.kamens.us kernel: audit: initializing netlink subsys (disabled) Mar 22 16:09:11 jik5.kamens.us kernel: audit: type=2000 audit(1679515735.060:1): state=initialized audit_enabled=0 res=1 Mar 22 16:09:11 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 22 16:09:11 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'bang_bang' Mar 22 16:09:11 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 22 16:09:11 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'user_space' Mar 22 16:09:11 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'power_allocator' Mar 22 16:09:11 jik5.kamens.us kernel: EISA bus registered Mar 22 16:09:11 jik5.kamens.us kernel: cpuidle: using governor ladder Mar 22 16:09:11 jik5.kamens.us kernel: cpuidle: using governor menu Mar 22 16:09:11 jik5.kamens.us kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 22 16:09:11 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:09:11 jik5.kamens.us kernel: PCI: not using MMCONFIG Mar 22 16:09:11 jik5.kamens.us kernel: PCI: Using configuration type 1 for base access Mar 22 16:09:11 jik5.kamens.us kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Mar 22 16:09:11 jik5.kamens.us kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 22 16:09:11 jik5.kamens.us kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 22 16:09:11 jik5.kamens.us kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 22 16:09:11 jik5.kamens.us kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 22 16:09:11 jik5.kamens.us kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 22 16:09:11 jik5.kamens.us kernel: fbcon: Taking over console Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Added _OSI(Module Device) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Device) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: 8 ACPI AML tables successfully acquired and loaded Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF934A40EEE000 0007AA (v02 PmRef Cpu0Ist 00003000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF934A4130D800 00037F (v02 PmRef Cpu0Cst 00003001 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF934A40EEF800 0005AA (v02 PmRef ApIst 00003000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF934A402D5A00 000119 (v02 PmRef ApCst 00003000 INTL 20120913) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Interpreter enabled Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Using IOAPIC for interrupt routing Mar 22 16:09:11 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:09:11 jik5.kamens.us kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved as ACPI motherboard resource Mar 22 16:09:11 jik5.kamens.us kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 22 16:09:11 jik5.kamens.us kernel: PCI: Using E820 reservations for host bridge windows Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: Enabled 8 GPEs in block 00 to 7F Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG0.PG00: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG1.PG01: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG2.PG02: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP09.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP10.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP11.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP12.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP13.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP01.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP02.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP03.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP04.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP05.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP06.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP07.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP17.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP18.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP19.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP20.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP14.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP15.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP16.PXSX.WRST: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_TZ_.FN00: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_TZ_.FN01: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_TZ_.FN02: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_TZ_.FN03: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: \_TZ_.FN04: New power resource Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Mar 22 16:09:11 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 22 16:09:11 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] Mar 22 16:09:11 jik5.kamens.us kernel: PCI host bridge to bus 0000:00 Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000effff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:00.0: [8086:191f] type 00 class 0x060000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:14.0: [8086:a12f] type 00 class 0x0c0330 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:14.0: reg 0x10: [mem 0xdf310000-0xdf31ffff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:14.2: [8086:a131] type 00 class 0x118000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:14.2: reg 0x10: [mem 0xdf32e000-0xdf32efff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:16.0: [8086:a13a] type 00 class 0x078000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:16.0: reg 0x10: [mem 0xdf32d000-0xdf32dfff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:16.0: PME# supported from D3hot Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: [8086:a102] type 00 class 0x010601 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x10: [mem 0xdf328000-0xdf329fff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x14: [mem 0xdf32c000-0xdf32c0ff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x18: [io 0xf050-0xf057] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x1c: [io 0xf040-0xf043] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x20: [io 0xf020-0xf03f] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x24: [mem 0xdf32b000-0xdf32b7ff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:17.0: PME# supported from D3hot Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: [8086:a114] type 01 class 0x060400 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.5: [8086:a115] type 01 class 0x060400 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.6: [8086:a116] type 01 class 0x060400 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.0: [8086:a145] type 00 class 0x060100 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.2: [8086:a121] type 00 class 0x058000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.2: reg 0x10: [mem 0xdf324000-0xdf327fff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.3: [8086:a170] type 00 class 0x040300 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xdf320000-0xdf323fff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x20: [mem 0xdf300000-0xdf30ffff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.4: [8086:a123] type 00 class 0x0c0500 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x10: [mem 0xdf32a000-0xdf32a0ff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x20: [io 0xf000-0xf01f] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: [10de:13c2] type 00 class 0x030000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x10: [mem 0xde000000-0xdeffffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x14: [mem 0xc0000000-0xcfffffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xd0000000-0xd1ffffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x30: [mem 0xdf000000-0xdf07ffff pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: BAR 1: assigned to efifb Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: 32.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s PCIe x16 link at 0000:00:01.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.1: [10de:0fbb] type 00 class 0x040300 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.1: reg 0x10: [mem 0xdf080000-0xdf083fff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: ASPM: current common clock configuration is inconsistent, reconfiguring Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:02:00.0: [10ec:8168] type 00 class 0x020000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x10: [io 0xd000-0xd0ff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x18: [mem 0xdf200000-0xdf200fff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x20: [mem 0xd2100000-0xd2103fff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:02:00.0: supports D1 D2 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:03:00.0: [8086:095a] type 00 class 0x028000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:03:00.0: reg 0x10: [mem 0xdf100000-0xdf101fff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 11 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 11 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 11 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 22 16:09:11 jik5.kamens.us kernel: iommu: Default domain type: Translated Mar 22 16:09:11 jik5.kamens.us kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 22 16:09:11 jik5.kamens.us kernel: SCSI subsystem initialized Mar 22 16:09:11 jik5.kamens.us kernel: libata version 3.00 loaded. Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: bus type USB registered Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver usbfs Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver hub Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new device driver usb Mar 22 16:09:11 jik5.kamens.us kernel: pps_core: LinuxPPS API ver. 1 registered Mar 22 16:09:11 jik5.kamens.us kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 22 16:09:11 jik5.kamens.us kernel: PTP clock support registered Mar 22 16:09:11 jik5.kamens.us kernel: EDAC MC: Ver: 3.0.0 Mar 22 16:09:11 jik5.kamens.us kernel: Registered efivars operations Mar 22 16:09:11 jik5.kamens.us kernel: NetLabel: Initializing Mar 22 16:09:11 jik5.kamens.us kernel: NetLabel: domain hash size = 128 Mar 22 16:09:11 jik5.kamens.us kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 22 16:09:11 jik5.kamens.us kernel: NetLabel: unlabeled traffic allowed by default Mar 22 16:09:11 jik5.kamens.us kernel: mctp: management component transport protocol core Mar 22 16:09:11 jik5.kamens.us kernel: NET: Registered PF_MCTP protocol family Mar 22 16:09:11 jik5.kamens.us kernel: PCI: Using ACPI for IRQ routing Mar 22 16:09:11 jik5.kamens.us kernel: PCI: pci_cache_line_size set to 64 bytes Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x89217018-0x8bffffff] Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8a871000-0x8bffffff] Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8c99e000-0x8fffffff] Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8e52c000-0x8fffffff] Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8faff000-0x8fffffff] Mar 22 16:09:11 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x46f000000-0x46fffffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: setting as boot VGA device Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: bridge control possible Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 22 16:09:11 jik5.kamens.us kernel: vgaarb: loaded Mar 22 16:09:11 jik5.kamens.us kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Mar 22 16:09:11 jik5.kamens.us kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc-early Mar 22 16:09:11 jik5.kamens.us kernel: VFS: Disk quotas dquot_6.6.0 Mar 22 16:09:11 jik5.kamens.us kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 22 16:09:11 jik5.kamens.us kernel: AppArmor: AppArmor Filesystem Enabled Mar 22 16:09:11 jik5.kamens.us kernel: pnp: PnP ACPI init Mar 22 16:09:11 jik5.kamens.us kernel: system 00:00: [io 0x0a00-0x0a1f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:00: [io 0x0a40-0x0a4f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:00: [io 0x0a50-0x0a5f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:03: [io 0x0680-0x069f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:03: [io 0x1800-0x18fe] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:03: [io 0x164e-0x164f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:04: [io 0x0800-0x087f] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:06: [io 0x1854-0x1857] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xfed10000-0xfed17fff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xfed18000-0xfed18fff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xfed19000-0xfed19fff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xe0000000-0xefffffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xfed20000-0xfed3ffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xfed90000-0xfed93fff] could not be reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xfed45000-0xfed8ffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xfee00000-0xfeefffff] could not be reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:07: [mem 0xdffe0000-0xdfffffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:08: [mem 0xfd000000-0xfdabffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:08: [mem 0xfdad0000-0xfdadffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:08: [mem 0xfdb00000-0xfdffffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:08: [mem 0xfe000000-0xfe01ffff] could not be reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:08: [mem 0xfe036000-0xfe03bfff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:08: [mem 0xfe03d000-0xfe3fffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:08: [mem 0xfe410000-0xfe7fffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:09: [io 0xff00-0xfffe] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:0a: [mem 0xfdaf0000-0xfdafffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:0a: [mem 0xfdae0000-0xfdaeffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: system 00:0a: [mem 0xfdac0000-0xfdacffff] has been reserved Mar 22 16:09:11 jik5.kamens.us kernel: pnp: PnP ACPI: found 11 devices Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 22 16:09:11 jik5.kamens.us kernel: NET: Registered PF_INET protocol family Mar 22 16:09:11 jik5.kamens.us kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: TCP: Hash tables configured (established 131072 bind 65536) Mar 22 16:09:11 jik5.kamens.us kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:09:11 jik5.kamens.us kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 22 16:09:11 jik5.kamens.us kernel: NET: Registered PF_XDP protocol family Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000effff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:00: resource 8 [mem 0xfd000000-0xfe7fffff window] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:01: resource 1 [mem 0xde000000-0xdf0fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:01: resource 2 [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:02: resource 0 [io 0xd000-0xdfff] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:02: resource 1 [mem 0xdf200000-0xdf2fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:02: resource 2 [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:09:11 jik5.kamens.us kernel: pci_bus 0000:03: resource 1 [mem 0xdf100000-0xdf1fffff] Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:14.0: quirk_usb_early_handoff+0x0/0x190 took 141676 usecs Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0 Mar 22 16:09:11 jik5.kamens.us kernel: PCI: CLS 0 bytes, default 64 Mar 22 16:09:11 jik5.kamens.us kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 22 16:09:11 jik5.kamens.us kernel: software IO TLB: mapped [mem 0x0000000085217000-0x0000000089217000] (64MB) Mar 22 16:09:11 jik5.kamens.us kernel: Trying to unpack rootfs image as initramfs... Mar 22 16:09:11 jik5.kamens.us kernel: Initialise system trusted keyrings Mar 22 16:09:11 jik5.kamens.us kernel: Key type blacklist registered Mar 22 16:09:11 jik5.kamens.us kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Mar 22 16:09:11 jik5.kamens.us kernel: zbud: loaded Mar 22 16:09:11 jik5.kamens.us kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 22 16:09:11 jik5.kamens.us kernel: fuse: init (API version 7.38) Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Platform Keyring initialized Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Machine keyring initialized Mar 22 16:09:11 jik5.kamens.us kernel: Key type asymmetric registered Mar 22 16:09:11 jik5.kamens.us kernel: Asymmetric key parser 'x509' registered Mar 22 16:09:11 jik5.kamens.us kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) Mar 22 16:09:11 jik5.kamens.us kernel: io scheduler mq-deadline registered Mar 22 16:09:11 jik5.kamens.us kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Mar 22 16:09:11 jik5.kamens.us kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 122 Mar 22 16:09:11 jik5.kamens.us kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 122 Mar 22 16:09:11 jik5.kamens.us kernel: pcieport 0000:00:1c.5: PME: Signaling with IRQ 123 Mar 22 16:09:11 jik5.kamens.us kernel: pcieport 0000:00:1c.5: AER: enabled with IRQ 123 Mar 22 16:09:11 jik5.kamens.us kernel: pcieport 0000:00:1c.6: PME: Signaling with IRQ 124 Mar 22 16:09:11 jik5.kamens.us kernel: pcieport 0000:00:1c.6: AER: enabled with IRQ 124 Mar 22 16:09:11 jik5.kamens.us kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 22 16:09:11 jik5.kamens.us kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: button: Sleep Button [SLPB] Mar 22 16:09:11 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: button: Power Button [PWRB] Mar 22 16:09:11 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: button: Power Button [PWRF] Mar 22 16:09:11 jik5.kamens.us kernel: thermal LNXTHERM:00: registered as thermal_zone0 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Mar 22 16:09:11 jik5.kamens.us kernel: thermal LNXTHERM:01: registered as thermal_zone1 Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ01] (30 C) Mar 22 16:09:11 jik5.kamens.us kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Mar 22 16:09:11 jik5.kamens.us kernel: Linux agpgart interface v0.103 Mar 22 16:09:11 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:09:11 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:09:11 jik5.kamens.us kernel: loop: module loaded Mar 22 16:09:11 jik5.kamens.us kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 22 16:09:11 jik5.kamens.us kernel: PPP generic driver version 2.4.2 Mar 22 16:09:11 jik5.kamens.us kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 Mar 22 16:09:11 jik5.kamens.us kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 22 16:09:11 jik5.kamens.us kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 22 16:09:11 jik5.kamens.us kernel: mousedev: PS/2 mouse device common for all mice Mar 22 16:09:11 jik5.kamens.us kernel: rtc_cmos 00:05: RTC can wake from S4 Mar 22 16:09:11 jik5.kamens.us kernel: rtc_cmos 00:05: registered as rtc0 Mar 22 16:09:11 jik5.kamens.us kernel: rtc_cmos 00:05: setting system clock to 2023-03-22T20:08:55 UTC (1679515735) Mar 22 16:09:11 jik5.kamens.us kernel: rtc_cmos 00:05: alarms up to one month, y3k, 242 bytes nvram Mar 22 16:09:11 jik5.kamens.us kernel: i2c_dev: i2c /dev entries driver Mar 22 16:09:11 jik5.kamens.us kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 22 16:09:11 jik5.kamens.us kernel: device-mapper: uevent: version 1.0.3 Mar 22 16:09:11 jik5.kamens.us kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Probing EISA bus 0 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 1 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 2 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 3 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 4 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 5 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 6 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 7 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 8 Mar 22 16:09:11 jik5.kamens.us kernel: platform eisa.0: EISA: Detected 0 cards Mar 22 16:09:11 jik5.kamens.us kernel: intel_pstate: Intel P-state driver initializing Mar 22 16:09:11 jik5.kamens.us kernel: intel_pstate: HWP enabled Mar 22 16:09:11 jik5.kamens.us kernel: ledtrig-cpu: registered to indicate activity on CPUs Mar 22 16:09:11 jik5.kamens.us kernel: efifb: probing for efifb Mar 22 16:09:11 jik5.kamens.us kernel: efifb: showing boot graphics Mar 22 16:09:11 jik5.kamens.us kernel: efifb: framebuffer at 0xc0000000, using 8640k, total 8640k Mar 22 16:09:11 jik5.kamens.us kernel: efifb: mode is 1920x1080x32, linelength=8192, pages=1 Mar 22 16:09:11 jik5.kamens.us kernel: efifb: scrolling: redraw Mar 22 16:09:11 jik5.kamens.us kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 22 16:09:11 jik5.kamens.us kernel: Console: switching to colour frame buffer device 240x67 Mar 22 16:09:11 jik5.kamens.us kernel: fb0: EFI VGA frame buffer device Mar 22 16:09:11 jik5.kamens.us kernel: intel_pmc_core INT33A1:00: initialized Mar 22 16:09:11 jik5.kamens.us kernel: drop_monitor: Initializing network drop monitor service Mar 22 16:09:11 jik5.kamens.us kernel: NET: Registered PF_INET6 protocol family Mar 22 16:09:11 jik5.kamens.us kernel: Freeing initrd memory: 132664K Mar 22 16:09:11 jik5.kamens.us kernel: Segment Routing with IPv6 Mar 22 16:09:11 jik5.kamens.us kernel: In-situ OAM (IOAM) with IPv6 Mar 22 16:09:11 jik5.kamens.us kernel: NET: Registered PF_PACKET protocol family Mar 22 16:09:11 jik5.kamens.us kernel: Key type dns_resolver registered Mar 22 16:09:11 jik5.kamens.us kernel: microcode: Microcode Update Driver: v2.2. Mar 22 16:09:11 jik5.kamens.us kernel: IPI shorthand broadcast: enabled Mar 22 16:09:11 jik5.kamens.us kernel: sched_clock: Marking stable (1012621819, 413357)->(1018615870, -5580694) Mar 22 16:09:11 jik5.kamens.us kernel: registered taskstats version 1 Mar 22 16:09:11 jik5.kamens.us kernel: Loading compiled-in X.509 certificates Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Loading compiled-in revocation X.509 certificates Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' Mar 22 16:09:11 jik5.kamens.us kernel: zswap: loaded using pool lzo/zbud Mar 22 16:09:11 jik5.kamens.us kernel: Key type .fscrypt registered Mar 22 16:09:11 jik5.kamens.us kernel: Key type fscrypt-provisioning registered Mar 22 16:09:11 jik5.kamens.us kernel: Key type trusted registered Mar 22 16:09:11 jik5.kamens.us kernel: Key type encrypted registered Mar 22 16:09:11 jik5.kamens.us kernel: AppArmor: AppArmor sha1 policy hashing enabled Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer: c4f0474ae6b5e67a509d99132f49a4ec13f7ac68' Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer Database: 84f00f5841571abd2cc11a8c26d5c9c8d2b6b0b5' Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Acer Database Forbidden: 9de028a2638669f109745d3e2a7ad5c9e64ed392' Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:09:11 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Debian Secure Boot Signer: 00a7468def' Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:09:11 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:09:11 jik5.kamens.us kernel: Loading compiled-in module X.509 certificates Mar 22 16:09:11 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:09:11 jik5.kamens.us kernel: ima: Allocated hash algorithm: sha1 Mar 22 16:09:11 jik5.kamens.us kernel: ima: No architecture policies found Mar 22 16:09:11 jik5.kamens.us kernel: evm: Initialising EVM extended attributes: Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.selinux Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.SMACK64 Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.SMACK64EXEC Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.SMACK64TRANSMUTE Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.SMACK64MMAP Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.apparmor Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.ima Mar 22 16:09:11 jik5.kamens.us kernel: evm: security.capability Mar 22 16:09:11 jik5.kamens.us kernel: evm: HMAC attrs: 0x1 Mar 22 16:09:11 jik5.kamens.us kernel: PM: Magic number: 15:820:144 Mar 22 16:09:11 jik5.kamens.us kernel: acpi device:15: hash matches Mar 22 16:09:11 jik5.kamens.us kernel: RAS: Correctable Errors collector initialized. Mar 22 16:09:11 jik5.kamens.us kernel: Freeing unused decrypted memory: 2036K Mar 22 16:09:11 jik5.kamens.us kernel: Freeing unused kernel image (initmem) memory: 4644K Mar 22 16:09:11 jik5.kamens.us kernel: Write protecting the kernel read-only data: 34816k Mar 22 16:09:11 jik5.kamens.us kernel: Freeing unused kernel image (rodata/data gap) memory: 872K Mar 22 16:09:11 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:09:11 jik5.kamens.us kernel: x86/mm: Checking user space page tables Mar 22 16:09:11 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:09:11 jik5.kamens.us kernel: Run /init as init process Mar 22 16:09:11 jik5.kamens.us kernel: with arguments: Mar 22 16:09:11 jik5.kamens.us kernel: /init Mar 22 16:09:11 jik5.kamens.us kernel: splash Mar 22 16:09:11 jik5.kamens.us kernel: with environment: Mar 22 16:09:11 jik5.kamens.us kernel: HOME=/ Mar 22 16:09:11 jik5.kamens.us kernel: TERM=linux Mar 22 16:09:11 jik5.kamens.us kernel: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic Mar 22 16:09:11 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:09:11 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Mar 22 16:09:11 jik5.kamens.us kernel: ahci 0000:00:17.0: version 3.0 Mar 22 16:09:11 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810 Mar 22 16:09:11 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Mar 22 16:09:11 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.1: [8086:a120] type 00 class 0x058000 Mar 22 16:09:11 jik5.kamens.us kernel: pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] Mar 22 16:09:11 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:09:11 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Mar 22 16:09:11 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed Mar 22 16:09:11 jik5.kamens.us kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.02 Mar 22 16:09:11 jik5.kamens.us kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:09:11 jik5.kamens.us kernel: usb usb1: Product: xHCI Host Controller Mar 22 16:09:11 jik5.kamens.us kernel: usb usb1: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb usb1: SerialNumber: 0000:00:14.0 Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-0:1.0: USB hub found Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-0:1.0: 16 ports detected Mar 22 16:09:11 jik5.kamens.us kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Mar 22 16:09:11 jik5.kamens.us kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 5 ports 6 Gbps 0x3d impl SATA mode Mar 22 16:09:11 jik5.kamens.us kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst Mar 22 16:09:11 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x51 Mar 22 16:09:11 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x53 Mar 22 16:09:11 jik5.kamens.us kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.02 Mar 22 16:09:11 jik5.kamens.us kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:09:11 jik5.kamens.us kernel: usb usb2: Product: xHCI Host Controller Mar 22 16:09:11 jik5.kamens.us kernel: usb usb2: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb usb2: SerialNumber: 0000:00:14.0 Mar 22 16:09:11 jik5.kamens.us kernel: hub 2-0:1.0: USB hub found Mar 22 16:09:11 jik5.kamens.us kernel: hub 2-0:1.0: 10 ports detected Mar 22 16:09:11 jik5.kamens.us kernel: usb: port power management may be unreliable Mar 22 16:09:11 jik5.kamens.us kernel: cryptd: max_cpu_qlen set to 1000 Mar 22 16:09:11 jik5.kamens.us kernel: scsi host0: ahci Mar 22 16:09:11 jik5.kamens.us kernel: scsi host1: ahci Mar 22 16:09:11 jik5.kamens.us kernel: scsi host2: ahci Mar 22 16:09:11 jik5.kamens.us kernel: scsi host3: ahci Mar 22 16:09:11 jik5.kamens.us kernel: scsi host4: ahci Mar 22 16:09:11 jik5.kamens.us kernel: scsi host5: ahci Mar 22 16:09:11 jik5.kamens.us kernel: ata1: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b100 irq 125 Mar 22 16:09:11 jik5.kamens.us kernel: ata2: DUMMY Mar 22 16:09:11 jik5.kamens.us kernel: ata3: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b200 irq 125 Mar 22 16:09:11 jik5.kamens.us kernel: ata4: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b280 irq 125 Mar 22 16:09:11 jik5.kamens.us kernel: ata5: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b300 irq 125 Mar 22 16:09:11 jik5.kamens.us kernel: ata6: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b380 irq 125 Mar 22 16:09:11 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: RTL8168g/8111g, 98:ee:cb:23:9d:15, XID 4c0, IRQ 127 Mar 22 16:09:11 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] Mar 22 16:09:11 jik5.kamens.us kernel: tsc: Refined TSC clocksource calibration: 4007.999 MHz Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39c5e149d3a, max_idle_ns: 440795336434 ns Mar 22 16:09:11 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: ata4: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Mar 22 16:09:11 jik5.kamens.us kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:09:11 jik5.kamens.us kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:09:11 jik5.kamens.us kernel: ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:09:11 jik5.kamens.us kernel: ata6: SATA link up 3.0 Gbps (SStatus 123 SControl 300) Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: ATA-9: Samsung SSD 850 EVO 1TB, EMT01B6Q, max UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: ata3.00: ATA-9: ST1000DM003-1ER162, CC45, max UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: ata6.00: ATA-8: WDC WD5001AALS-00L3B2, 01.03B01, max UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: ata3.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:09:11 jik5.kamens.us kernel: ata6.00: 976773168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:09:11 jik5.kamens.us kernel: ata3.00: configured for UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: ata1.00: ATA-9: LITEON CV1-8B128, G871201, max UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: ata1.00: 250069680 sectors, multi 2: LBA48 NCQ (depth 32), AA Mar 22 16:09:11 jik5.kamens.us kernel: ata6.00: configured for UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: ata4.00: ATAPI: HL-DT-ST DVDRAM GHC0N, 1.00, max UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: ata1.00: Features: Dev-Sleep Mar 22 16:09:11 jik5.kamens.us kernel: ata1.00: configured for UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: scsi 0:0:0:0: Direct-Access ATA LITEON CV1-8B128 201 PQ: 0 ANSI: 5 Mar 22 16:09:11 jik5.kamens.us kernel: ata4.00: configured for UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 Mar 22 16:09:11 jik5.kamens.us kernel: sd 0:0:0:0: [sda] 250069680 512-byte logical blocks: (128 GB/119 GiB) Mar 22 16:09:11 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 22 16:09:11 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Mar 22 16:09:11 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:09:11 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes Mar 22 16:09:11 jik5.kamens.us kernel: scsi 2:0:0:0: Direct-Access ATA ST1000DM003-1ER1 CC45 PQ: 0 ANSI: 5 Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 4096-byte physical blocks Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write Protect is off Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: 1953525168 sectors, multi 1: LBA48 NCQ (depth 32), AA Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Mar 22 16:09:11 jik5.kamens.us kernel: scsi 3:0:0:0: CD-ROM HL-DT-ST DVDRAM GHC0N 1.00 PQ: 0 ANSI: 5 Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: Features: Trust Dev-Sleep Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:09:11 jik5.kamens.us kernel: sda: Mar 22 16:09:11 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 22 16:09:11 jik5.kamens.us kernel: ata5.00: configured for UDMA/133 Mar 22 16:09:11 jik5.kamens.us kernel: sdb: Mar 22 16:09:11 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Attached SCSI disk Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-1: New USB device found, idVendor=04f9, idProduct=03b9, bcdDevice= 1.00 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-1: Product: ADS-2800W Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-1: Manufacturer: Brother Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-1: SerialNumber: U64278M7G198321 Mar 22 16:09:11 jik5.kamens.us kernel: sr 3:0:0:0: [sr0] scsi3-mmc drive: 40x/12x writer dvd-ram cd/rw xa/form2 cdda tray Mar 22 16:09:11 jik5.kamens.us kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 22 16:09:11 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi CD-ROM sr0 Mar 22 16:09:11 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi generic sg2 type 5 Mar 22 16:09:11 jik5.kamens.us kernel: scsi 4:0:0:0: Direct-Access ATA Samsung SSD 850 1B6Q PQ: 0 ANSI: 5 Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: Attached scsi generic sg3 type 0 Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write Protect is off Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Mode Sense: 00 3a 00 00 Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Preferred minimum I/O size 512 bytes Mar 22 16:09:11 jik5.kamens.us kernel: scsi 5:0:0:0: Direct-Access ATA WDC WD5001AALS-0 3B01 PQ: 0 ANSI: 5 Mar 22 16:09:11 jik5.kamens.us kernel: sd 5:0:0:0: Attached scsi generic sg4 type 0 Mar 22 16:09:11 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] 976773168 512-byte logical blocks: (500 GB/466 GiB) Mar 22 16:09:11 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write Protect is off Mar 22 16:09:11 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Mode Sense: 00 3a 00 00 Mar 22 16:09:11 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:09:11 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Preferred minimum I/O size 512 bytes Mar 22 16:09:11 jik5.kamens.us kernel: sdc: sdc1 sdc2 sdc3 Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] supports TCG Opal Mar 22 16:09:11 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Attached SCSI disk Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5: new SuperSpeed USB device number 2 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Attached SCSI disk Mar 22 16:09:11 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: renamed from eth0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5: New USB device found, idVendor=2109, idProduct=8110, bcdDevice=90.95 Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5: Product: USB3.0 Hub Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5: Manufacturer: VIA Labs, Inc. Mar 22 16:09:11 jik5.kamens.us kernel: hub 2-5:1.0: USB hub found Mar 22 16:09:11 jik5.kamens.us kernel: hub 2-5:1.0: 4 ports detected Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-3: new full-speed USB device number 3 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-3: New USB device found, idVendor=0764, idProduct=0501, bcdDevice= 2.00 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-3: New USB device strings: Mfr=3, Product=1, SerialNumber=2 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-3: Product: AVRG750U Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-3: Manufacturer: CPS Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-3: SerialNumber: BHBGV2000445 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-6: new low-speed USB device number 4 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-6: New USB device found, idVendor=0bc7, idProduct=0002, bcdDevice= 1.00 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-6: Product: USB Transceiver Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-6: Manufacturer: X10 Wireless Technology Inc Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5.1: new SuperSpeed USB device number 3 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5.1: New USB device found, idVendor=17e9, idProduct=4323, bcdDevice=31.00 Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5.1: Product: Plugable UD-3900 Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5.1: Manufacturer: DisplayLink Mar 22 16:09:11 jik5.kamens.us kernel: usb 2-5.1: SerialNumber: 20175067 Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ether Mar 22 16:09:11 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: MAC-Address: 8c:ae:4c:dc:cf:46 Mar 22 16:09:11 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting rx_max = 16384 Mar 22 16:09:11 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting tx_max = 16384 Mar 22 16:09:11 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 eth0: register 'cdc_ncm' at usb-0000:00:14.0-5.1, CDC NCM (SEND ZLP), 8c:ae:4c:dc:cf:46 Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ncm Mar 22 16:09:11 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 enx8cae4cdccf46: renamed from eth0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7: new high-speed USB device number 5 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7: New USB device found, idVendor=2109, idProduct=2811, bcdDevice=90.90 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7: Product: USB2.0 Hub Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7: Manufacturer: VIA Labs, Inc. Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7:1.0: USB hub found Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7:1.0: 4 ports detected Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-9: new high-speed USB device number 6 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-9: New USB device found, idVendor=0bda, idProduct=0153, bcdDevice=57.13 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-9: Product: USB2.0-CRW Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-9: Manufacturer: Generic Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-9: SerialNumber: 20120926571200000 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4: new high-speed USB device number 7 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4: Product: USB 2.0 Hub Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7.4:1.0: USB hub found Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7.4:1.0: 4 ports detected Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-10: new full-speed USB device number 8 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-10: New USB device found, idVendor=8087, idProduct=0a2a, bcdDevice= 0.01 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver usb-storage Mar 22 16:09:11 jik5.kamens.us kernel: hid: raw HID events driver (C) Jiri Kosina Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver uas Mar 22 16:09:11 jik5.kamens.us kernel: ums-realtek 1-9:1.0: USB Mass Storage device detected Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver usbhid Mar 22 16:09:11 jik5.kamens.us kernel: usbhid: USB HID core driver Mar 22 16:09:11 jik5.kamens.us kernel: scsi host6: usb-storage 1-9:1.0 Mar 22 16:09:11 jik5.kamens.us kernel: usbcore: registered new interface driver ums-realtek Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:0764:0501.0001: hiddev0,hidraw0: USB HID v1.10 Device [CPS AVRG750U] on usb-0000:00:14.0-3/input0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1: new high-speed USB device number 9 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1: Product: USB 2.0 Hub Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7.4.1:1.0: USB hub found Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7.4.1:1.0: 4 ports detected Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.3: new high-speed USB device number 10 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.1: new full-speed USB device number 11 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: scsi 6:0:0:0: Direct-Access Generic- SD/MMC/MS PRO 1.00 PQ: 0 ANSI: 4 Mar 22 16:09:11 jik5.kamens.us kernel: sd 6:0:0:0: Attached scsi generic sg5 type 0 Mar 22 16:09:11 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Media removed, stopped polling Mar 22 16:09:11 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Attached SCSI removable disk Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device found, idVendor=0b0e, idProduct=245d, bcdDevice= 1.48 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.1: Product: Jabra Link 370 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.1: SerialNumber: 70BF92C25E96 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.4: new full-speed USB device number 12 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device found, idVendor=046d, idProduct=c52b, bcdDevice=12.10 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.4: Product: USB Receiver Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.1.4: Manufacturer: Logitech Mar 22 16:09:11 jik5.kamens.us kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.0/0003:046D:C52B.0003/input/input6 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0003: input,hidraw1: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input0 Mar 22 16:09:11 jik5.kamens.us kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0004/input/input7 Mar 22 16:09:11 jik5.kamens.us kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0004/input/input8 Mar 22 16:09:11 jik5.kamens.us kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0004/input/input9 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0004: input,hiddev1,hidraw2: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input1 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0005: hiddev2,hidraw3: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.3: New USB device found, idVendor=046d, idProduct=082d, bcdDevice= 0.11 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.3: New USB device strings: Mfr=0, Product=2, SerialNumber=1 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.3: Product: HD Pro Webcam C920 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.3: SerialNumber: ED48865F Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4: new high-speed USB device number 13 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4: New USB device found, idVendor=058f, idProduct=6254, bcdDevice= 1.00 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7.4.4:1.0: USB hub found Mar 22 16:09:11 jik5.kamens.us kernel: hub 1-7.4.4:1.0: 4 ports detected Mar 22 16:09:11 jik5.kamens.us kernel: input: Jabra Link 370 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.3/0003:0B0E:245D.0002/input/input11 Mar 22 16:09:11 jik5.kamens.us kernel: jabra 0003:0B0E:245D.0002: input,hiddev3,hidraw4: USB HID v1.11 Device [Jabra Link 370] on usb-0000:00:14.0-7.4.1.1/input3 Mar 22 16:09:11 jik5.kamens.us kernel: logitech-djreceiver 0003:046D:C52B.0005: hiddev2,hidraw1: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.1: new full-speed USB device number 14 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: input: Logitech Wireless Device PID:4051 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0005/0003:046D:4051.0006/input/input12 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:046D:4051.0006: input,hidraw2: USB HID v1.11 Mouse [Logitech Wireless Device PID:4051] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device found, idVendor=24f0, idProduct=0142, bcdDevice= 1.00 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.1: Product: Das Keyboard Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.1: Manufacturer: Metadot - Das Keyboard Mar 22 16:09:11 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.0/0003:24F0:0142.0007/input/input16 Mar 22 16:09:11 jik5.kamens.us kernel: input: Logitech M510 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0005/0003:046D:4051.0006/input/input17 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0007: input,hidraw2: USB HID v1.10 Keyboard [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input0 Mar 22 16:09:11 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0006: input,hidraw3: USB HID v1.11 Mouse [Logitech M510] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:09:11 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0008/input/input18 Mar 22 16:09:11 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0008/input/input19 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0008: input,hidraw5: USB HID v1.10 Device [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input1 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.3: new full-speed USB device number 15 using xhci_hcd Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.3: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 5.43 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.3: Product: YubiKey OTP+FIDO+CCID Mar 22 16:09:11 jik5.kamens.us kernel: usb 1-7.4.4.3: Manufacturer: Yubico Mar 22 16:09:11 jik5.kamens.us kernel: input: Yubico YubiKey OTP+FIDO+CCID as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3/1-7.4.4.3:1.0/0003:1050:0407.0009/input/input20 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:1050:0407.0009: input,hidraw6: USB HID v1.10 Keyboard [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.4.4.3/input0 Mar 22 16:09:11 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000A: hiddev1,hidraw7: USB HID v1.10 Device [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.4.4.3/input1 Mar 22 16:09:11 jik5.kamens.us kernel: EXT4-fs (sdc2): INFO: recovery required on readonly filesystem Mar 22 16:09:11 jik5.kamens.us kernel: EXT4-fs (sdc2): write access will be enabled during recovery Mar 22 16:09:11 jik5.kamens.us kernel: EXT4-fs (sdc2): recovery complete Mar 22 16:09:11 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:09:11 jik5.kamens.us kernel: EXT4-fs (sdc2): unmounting filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:09:11 jik5.kamens.us kernel: EXT4-fs (dm-1): mounted filesystem e07a02bb-3dad-40e5-945b-111535c44f3a with ordered data mode. Quota mode: none. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Inserted module 'autofs4' Mar 22 16:09:11 jik5.kamens.us systemd[1]: systemd 252.5-2ubuntu2 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 22 16:09:11 jik5.kamens.us systemd[1]: Detected architecture x86-64. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Hostname set to . Mar 22 16:09:11 jik5.kamens.us systemd[1]: Queued start job for default target graphical.target. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Created slice system-postfix.slice - Slice /system/postfix. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Created slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Created slice user.slice - User and Session Slice. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Reached target slices.target - Slice Units. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on rpcbind.socket - RPCbind Server Activation Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on syslog.socket - Syslog Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-journald.socket - Journal Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-oomd.socket - Userspace Out-Of-Memory (OOM) Killer Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Mar 22 16:09:11 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-journald.service - Journal Service... Mar 22 16:09:11 jik5.kamens.us systemd[1]: auth-rpcgss-module.service - Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished blk-availability.service - Availability of block devices. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Mar 22 16:09:11 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:09:11 jik5.kamens.us kernel: pstore: Using crash dump compression: deflate Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Mar 22 16:09:11 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Mar 22 16:09:11 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:09:11 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:09:11 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:09:11 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Unnecessary job was removed for dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - /dev/disk/by-uuid/c531070b-52cc-405a-8abe-8ac4be2d75f4. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Mar 22 16:09:11 jik5.kamens.us systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Mar 22 16:09:11 jik5.kamens.us systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:09:11 jik5.kamens.us kernel: pstore: Registered efi_pstore as persistent store backend Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Mar 22 16:09:11 jik5.kamens.us kernel: EXT4-fs (dm-1): re-mounted e07a02bb-3dad-40e5-945b-111535c44f3a. Quota mode: none. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:09:11 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Mar 22 16:09:11 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:09:11 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:11 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-sysusers.service - Create System Users... Mar 22 16:09:11 jik5.kamens.us kernel: ACPI: bus type drm_connector registered Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:09:11 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:11 jik5.kamens.us systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Mar 22 16:09:11 jik5.kamens.us kernel: lp: driver loaded but no devices found Mar 22 16:09:11 jik5.kamens.us kernel: ppdev: user-space parallel port driver Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished systemd-sysusers.service - Create System Users. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Mar 22 16:09:11 jik5.kamens.us systemd-journald[672]: Journal started Mar 22 16:09:11 jik5.kamens.us systemd-journald[672]: Runtime Journal (/run/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 8.0M, max 159.3M, 151.3M free. Mar 22 16:09:11 jik5.kamens.us systemd-modules-load[688]: Inserted module 'lp' Mar 22 16:09:11 jik5.kamens.us systemd-modules-load[688]: Inserted module 'ppdev' Mar 22 16:09:11 jik5.kamens.us systemd-modules-load[688]: Inserted module 'parport_pc' Mar 22 16:09:11 jik5.kamens.us mount[669]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:09:11 jik5.kamens.us mount[669]: dmesg(1) may have more information after failed mount system call. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Started systemd-journald.service - Journal Service. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Mar 22 16:09:11 jik5.kamens.us umount[697]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:09:11 jik5.kamens.us lvm[676]: 2 logical volume(s) in volume group "ubuntu-vg" monitored Mar 22 16:09:11 jik5.kamens.us systemd-journald[672]: Time spent on flushing to /var/log/journal/dca43d426a4043fd96f7351cc9f080c2 is 13.677ms for 1102 entries. Mar 22 16:09:11 jik5.kamens.us systemd-journald[672]: System Journal (/var/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 1.3G, max 4.0G, 2.6G free. Mar 22 16:09:11 jik5.kamens.us systemd-journald[672]: Received client request to flush runtime journal. Mar 22 16:09:11 jik5.kamens.us systemd-journald[672]: File /var/log/journal/dca43d426a4043fd96f7351cc9f080c2/system.journal corrupted or uncleanly shut down, renaming and replacing. Mar 22 16:09:11 jik5.kamens.us kernel: loop0: detected capacity change from 0 to 8 Mar 22 16:09:11 jik5.kamens.us kernel: loop1: detected capacity change from 0 to 232672 Mar 22 16:09:11 jik5.kamens.us kernel: loop2: detected capacity change from 0 to 235144 Mar 22 16:09:11 jik5.kamens.us kernel: loop3: detected capacity change from 0 to 46048 Mar 22 16:09:11 jik5.kamens.us kernel: loop4: detected capacity change from 0 to 47368 Mar 22 16:09:11 jik5.kamens.us kernel: loop5: detected capacity change from 0 to 18352 Mar 22 16:09:11 jik5.kamens.us kernel: loop6: detected capacity change from 0 to 18352 Mar 22 16:09:11 jik5.kamens.us kernel: loop7: detected capacity change from 0 to 304168 Mar 22 16:09:11 jik5.kamens.us kernel: loop8: detected capacity change from 0 to 304168 Mar 22 16:09:11 jik5.kamens.us kernel: loop9: detected capacity change from 0 to 55568 Mar 22 16:09:11 jik5.kamens.us kernel: loop10: detected capacity change from 0 to 37776 Mar 22 16:09:11 jik5.kamens.us kernel: loop11: detected capacity change from 0 to 239128 Mar 22 16:09:11 jik5.kamens.us kernel: loop12: detected capacity change from 0 to 239176 Mar 22 16:09:11 jik5.kamens.us kernel: loop13: detected capacity change from 0 to 113896 Mar 22 16:09:11 jik5.kamens.us kernel: loop14: detected capacity change from 0 to 113888 Mar 22 16:09:11 jik5.kamens.us kernel: loop15: detected capacity change from 0 to 129608 Mar 22 16:09:11 jik5.kamens.us kernel: loop16: detected capacity change from 0 to 129672 Mar 22 16:09:11 jik5.kamens.us kernel: loop17: detected capacity change from 0 to 149312 Mar 22 16:09:11 jik5.kamens.us kernel: loop18: detected capacity change from 0 to 149312 Mar 22 16:09:11 jik5.kamens.us kernel: loop19: detected capacity change from 0 to 112848 Mar 22 16:09:11 jik5.kamens.us kernel: loop20: detected capacity change from 0 to 112704 Mar 22 16:09:11 jik5.kamens.us kernel: loop21: detected capacity change from 0 to 491264 Mar 22 16:09:11 jik5.kamens.us kernel: loop22: detected capacity change from 0 to 494824 Mar 22 16:09:11 jik5.kamens.us kernel: loop23: detected capacity change from 0 to 288072 Mar 22 16:09:11 jik5.kamens.us kernel: loop24: detected capacity change from 0 to 288120 Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout. Mar 22 16:09:11 jik5.kamens.us systemd-udevd[706]: Using default interface naming scheme 'v252'. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting home-macback-home-macback-backup.mount - /home/macback/home/macback/backup... Mar 22 16:09:11 jik5.kamens.us systemd-udevd[706]: Configuration file /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:09:11 jik5.kamens.us systemd-udevd[706]: /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules:9 Invalid key 'SYSFS' Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-bare-5.mount - Mount unit for bare, revision 5... Mar 22 16:09:11 jik5.kamens.us systemd-udevd[706]: /etc/udev/rules.d/60-brother-libsane-type1.rules:17 Invalid key 'SYSFS' Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-bw-45.mount - Mount unit for bw, revision 45... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-bw-46.mount - Mount unit for bw, revision 46... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-chromium-2381.mount - Mount unit for chromium, revision 2381... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-chromium-2392.mount - Mount unit for chromium, revision 2392... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core-14784.mount - Mount unit for core, revision 14784... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core-14946.mount - Mount unit for core, revision 14946... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core18-2708.mount - Mount unit for core18, revision 2708... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core18-2714.mount - Mount unit for core18, revision 2714... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core20-1828.mount - Mount unit for core20, revision 1828... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core20-1852.mount - Mount unit for core20, revision 1852... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core22-522.mount - Mount unit for core22, revision 522... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-core22-547.mount - Mount unit for core22, revision 547... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-cups-836.mount - Mount unit for cups, revision 836... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-cups-872.mount - Mount unit for cups, revision 872... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-firefox-2432.mount - Mount unit for firefox, revision 2432... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-firefox-2487.mount - Mount unit for firefox, revision 2487... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72... Mar 22 16:09:11 jik5.kamens.us kernel: loop25: detected capacity change from 0 to 333552 Mar 22 16:09:11 jik5.kamens.us kernel: loop26: detected capacity change from 0 to 337424 Mar 22 16:09:11 jik5.kamens.us kernel: loop27: detected capacity change from 0 to 448512 Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119... Mar 22 16:09:11 jik5.kamens.us kernel: loop28: detected capacity change from 0 to 709216 Mar 22 16:09:11 jik5.kamens.us kernel: loop29: detected capacity change from 0 to 448512 Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56... Mar 22 16:09:11 jik5.kamens.us kernel: loop30: detected capacity change from 0 to 709280 Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65... Mar 22 16:09:11 jik5.kamens.us kernel: loop31: detected capacity change from 0 to 926512 Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178... Mar 22 16:09:11 jik5.kamens.us kernel: loop32: detected capacity change from 0 to 942640 Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535... Mar 22 16:09:11 jik5.kamens.us kernel: loop33: detected capacity change from 0 to 5208 Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599... Mar 22 16:09:11 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638... Mar 22 16:09:12 jik5.kamens.us kernel: loop35: detected capacity change from 0 to 187776 Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49... Mar 22 16:09:12 jik5.kamens.us kernel: loop36: detected capacity change from 0 to 75960 Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71... Mar 22 16:09:12 jik5.kamens.us kernel: loop37: detected capacity change from 0 to 166424 Mar 22 16:09:12 jik5.kamens.us kernel: loop34: detected capacity change from 0 to 3048 Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting snap-vault-1930.mount - Mount unit for vault, revision 1930... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting snap-vault-1958.mount - Mount unit for vault, revision 1958... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control... Mar 22 16:09:12 jik5.kamens.us kernel: loop38: detected capacity change from 0 to 94056 Mar 22 16:09:12 jik5.kamens.us kernel: loop39: detected capacity change from 0 to 94064 Mar 22 16:09:12 jik5.kamens.us systemd-udevd[755]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatch /module/rfkill 0:0' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[755]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatchd /module/rfkill 0:0' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[755]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /module/rfkill 0:0' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[755]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /module/rfkill 0:0' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Mar 22 16:09:12 jik5.kamens.us kernel: loop40: detected capacity change from 0 to 608 Mar 22 16:09:12 jik5.kamens.us kernel: loop42: detected capacity change from 0 to 864 Mar 22 16:09:12 jik5.kamens.us kernel: loop41: detected capacity change from 0 to 594024 Mar 22 16:09:12 jik5.kamens.us kernel: loop43: detected capacity change from 0 to 594024 Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup. Mar 22 16:09:12 jik5.kamens.us lvm[801]: PV /dev/dm-0 online, VG ubuntu-vg is complete. Mar 22 16:09:12 jik5.kamens.us lvm[801]: VG ubuntu-vg finished Mar 22 16:09:12 jik5.kamens.us systemd-udevd[766]: dm-1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-1' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us kernel: nvidia: loading out-of-tree module taints kernel. Mar 22 16:09:12 jik5.kamens.us kernel: nvidia: module license 'NVIDIA' taints kernel. Mar 22 16:09:12 jik5.kamens.us kernel: Disabling lock debugging due to kernel taint Mar 22 16:09:12 jik5.kamens.us systemd-udevd[751]: dm-2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-2' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[762]: sda: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[770]: event_source: Failed to get device name: No such file or directory Mar 22 16:09:12 jik5.kamens.us mtp-probe[834]: checking bus 1, device 6: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" Mar 22 16:09:12 jik5.kamens.us mtp-probe[844]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1" Mar 22 16:09:12 jik5.kamens.us mtp-probe[844]: bus: 2, device: 3 was not an MTP device Mar 22 16:09:12 jik5.kamens.us mtp-probe[834]: bus: 1, device: 6 was not an MTP device Mar 22 16:09:12 jik5.kamens.us mtp-probe[899]: checking bus 1, device 11: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1" Mar 22 16:09:12 jik5.kamens.us mtp-probe[899]: bus: 1, device: 11 was not an MTP device Mar 22 16:09:12 jik5.kamens.us mtp-probe[903]: checking bus 1, device 12: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4" Mar 22 16:09:12 jik5.kamens.us mtp-probe[903]: bus: 1, device: 12 was not an MTP device Mar 22 16:09:12 jik5.kamens.us mtp-probe[905]: checking bus 1, device 14: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1" Mar 22 16:09:12 jik5.kamens.us mtp-probe[905]: bus: 1, device: 14 was not an MTP device Mar 22 16:09:12 jik5.kamens.us mtp-probe[907]: checking bus 1, device 15: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3" Mar 22 16:09:12 jik5.kamens.us mtp-probe[907]: bus: 1, device: 15 was not an MTP device Mar 22 16:09:12 jik5.kamens.us systemd-udevd[746]: sdb: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[758]: sdc: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us kernel: nvidia-nvlink: Nvlink Core is being initialized, major device number 238 Mar 22 16:09:12 jik5.kamens.us kernel: Mar 22 16:09:12 jik5.kamens.us kernel: nvidia 0000:01:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem Mar 22 16:09:12 jik5.kamens.us kernel: EDAC ie31200: No ECC support Mar 22 16:09:12 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_wdm Mar 22 16:09:12 jik5.kamens.us systemd-udevd[761]: sdd: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdd' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted home-macback-home-macback-backup.mount - /home/macback/home/macback/backup. Mar 22 16:09:12 jik5.kamens.us mtp-probe[1000]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-3" Mar 22 16:09:12 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_mbim Mar 22 16:09:12 jik5.kamens.us mtp-probe[1000]: bus: 1, device: 3 was not an MTP device Mar 22 16:09:12 jik5.kamens.us systemd-udevd[768]: sde: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sde' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-bare-5.mount - Mount unit for bare, revision 5. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-bw-45.mount - Mount unit for bw, revision 45. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-bw-46.mount - Mount unit for bw, revision 46. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-chromium-2381.mount - Mount unit for chromium, revision 2381. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-chromium-2392.mount - Mount unit for chromium, revision 2392. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core-14784.mount - Mount unit for core, revision 14784. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core-14946.mount - Mount unit for core, revision 14946. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[754]: sdc3: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc3' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core18-2708.mount - Mount unit for core18, revision 2708. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core18-2714.mount - Mount unit for core18, revision 2714. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core20-1828.mount - Mount unit for core20, revision 1828. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core20-1852.mount - Mount unit for core20, revision 1852. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core22-522.mount - Mount unit for core22, revision 522. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-core22-547.mount - Mount unit for core22, revision 547. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[758]: sdc1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc1' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-cups-836.mount - Mount unit for cups, revision 836. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-cups-872.mount - Mount unit for cups, revision 872. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-firefox-2432.mount - Mount unit for firefox, revision 2432. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-firefox-2487.mount - Mount unit for firefox, revision 2487. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-vault-1930.mount - Mount unit for vault, revision 1930. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted snap-vault-1958.mount - Mount unit for vault, revision 1958. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[775]: sdc2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc2' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Found device dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.device - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:09:12 jik5.kamens.us mtp-probe[1058]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-6" Mar 22 16:09:12 jik5.kamens.us kernel: NVRM: loading NVIDIA UNIX x86_64 Kernel Module 515.86.01 Wed Oct 26 09:12:38 UTC 2022 Mar 22 16:09:12 jik5.kamens.us mtp-probe[1058]: bus: 1, device: 4 was not an MTP device Mar 22 16:09:12 jik5.kamens.us mtp-probe[1102]: checking bus 1, device 10: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3" Mar 22 16:09:12 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - Samsung_SSD_850_EVO_1TB 3. Mar 22 16:09:12 jik5.kamens.us systemd-udevd[769]: dm-0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-0' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-F41C\x2d35B5.device - Samsung_SSD_850_EVO_1TB EFI\x20System\x20Partition. Mar 22 16:09:12 jik5.kamens.us mtp-probe[1102]: bus: 1, device: 10 was not an MTP device Mar 22 16:09:12 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.device - Samsung_SSD_850_EVO_1TB 2. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Reached target snapd.mounts.target - Mounted snaps. Mar 22 16:09:12 jik5.kamens.us kernel: nvidia-modeset: Loading NVIDIA Kernel Mode Setting Driver for UNIX platforms 515.86.01 Wed Oct 26 09:02:01 UTC 2022 Mar 22 16:09:12 jik5.kamens.us kernel: mc: Linux media interface: v0.10 Mar 22 16:09:12 jik5.kamens.us kernel: Bluetooth: Core ver 2.22 Mar 22 16:09:12 jik5.kamens.us kernel: NET: Registered PF_BLUETOOTH protocol family Mar 22 16:09:12 jik5.kamens.us kernel: Bluetooth: HCI device and connection manager initialized Mar 22 16:09:12 jik5.kamens.us kernel: Bluetooth: HCI socket layer initialized Mar 22 16:09:12 jik5.kamens.us kernel: Bluetooth: L2CAP socket layer initialized Mar 22 16:09:12 jik5.kamens.us kernel: Bluetooth: SCO socket layer initialized Mar 22 16:09:12 jik5.kamens.us kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) Mar 22 16:09:12 jik5.kamens.us kernel: [drm] [nvidia-drm] [GPU ID 0x00000100] Loading driver Mar 22 16:09:12 jik5.kamens.us systemd[1]: Activating swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:12 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2... Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:09:12 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:09:12 jik5.kamens.us kernel: ee1004 0-0051: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:09:12 jik5.kamens.us kernel: ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:12 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:09:12 jik5.kamens.us kernel: Adding 999420k swap on /dev/mapper/ubuntu--vg-swap_1. Priority:-2 extents:1 across:999420k SSFS Mar 22 16:09:12 jik5.kamens.us kernel: acer_wmi: Acer Laptop ACPI-WMI Extras Mar 22 16:09:12 jik5.kamens.us kernel: acer_wmi: No WMID device detection method found Mar 22 16:09:12 jik5.kamens.us systemd[1]: Started systemd-fsckd.service - File System Check Daemon to report status. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Activated swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Reached target swap.target - Swaps. Mar 22 16:09:12 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1226]: /dev/sdc2: clean, 327/46848 files, 118926/187392 blocks Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: fsck.fat 4.2 (2021-01-31) Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: There are differences between boot sector and its backup. Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: This is mostly harmless. Differences: (offset:original/backup) Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: 65:01/00 Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: Not automatically fixing this. Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: Automatically removing dirty bit. Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: *** Filesystem was changed *** Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: Writing changes. Mar 22 16:09:12 jik5.kamens.us systemd-fsck[1229]: /dev/sdc1: 11 files, 1554/130812 clusters Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:09:12 jik5.kamens.us systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting boot.mount - /boot... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:09:12 jik5.kamens.us mount[1233]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:09:12 jik5.kamens.us mount[1233]: dmesg(1) may have more information after failed mount system call. Mar 22 16:09:12 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:09:12 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:09:12 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:09:12 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:09:12 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted boot.mount - /boot. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting boot-efi.mount - /boot/efi... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:09:12 jik5.kamens.us umount[1242]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:09:12 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:09:12 jik5.kamens.us kernel: videodev: Linux video capture interface: v2.00 Mar 22 16:09:12 jik5.kamens.us kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Mar 22 16:09:12 jik5.kamens.us kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted boot-efi.mount - /boot/efi. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Reached target local-fs.target - Local File Systems. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting apparmor.service - Load AppArmor profiles... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting console-setup.service - Set console font and keymap... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-binfmt.service - Set Up Additional Binary Formats... Mar 22 16:09:12 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting ufw.service - Uncomplicated firewall... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished console-setup.service - Set console font and keymap. Mar 22 16:09:12 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 1274 (systemd-binfmt) Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: enabling device (0000 -> 0002) Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Disabling MSI Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System... Mar 22 16:09:12 jik5.kamens.us apparmor.systemd[1264]: Restarting AppArmor Mar 22 16:09:12 jik5.kamens.us apparmor.systemd[1264]: Reloading AppArmor profiles Mar 22 16:09:12 jik5.kamens.us kernel: usb 1-7.4.3: Found UVC 1.00 device HD Pro Webcam C920 (046d:082d) Mar 22 16:09:12 jik5.kamens.us kernel: input: HD Pro Webcam C920 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0/input/input21 Mar 22 16:09:12 jik5.kamens.us kernel: usbcore: registered new interface driver uvcvideo Mar 22 16:09:12 jik5.kamens.us kernel: Intel(R) Wireless WiFi driver for Linux Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System. Mar 22 16:09:12 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: enabling device (0000 -> 0002) Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input22 Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input23 Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input24 Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input25 Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished systemd-binfmt.service - Set Up Additional Binary Formats. Mar 22 16:09:12 jik5.kamens.us kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Mar 22 16:09:12 jik5.kamens.us kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Mar 22 16:09:12 jik5.kamens.us kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Mar 22 16:09:12 jik5.kamens.us kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Mar 22 16:09:12 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug destination: EXTERNAL_DRAM Mar 22 16:09:12 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug configuration: 0 Mar 22 16:09:12 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: loaded firmware version 29.4063824552.0 7265D-29.ucode op_mode iwlmvm Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC662 rev3: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: inputs: Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Front Mic=0x19 Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 Mar 22 16:09:12 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Line=0x1a Mar 22 16:09:12 jik5.kamens.us systemd-udevd[766]: sr0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sr0' failed with exit code 1. Mar 22 16:09:12 jik5.kamens.us apparmor.systemd[1326]: Skipping profile in /etc/apparmor.d/disable: usr.bin.firefox Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting binfmt-support.service - Enable support for additional executable binary formats... Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input26 Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input27 Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1f.3/sound/card0/input28 Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1f.3/sound/card0/input29 Mar 22 16:09:12 jik5.kamens.us kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input30 Mar 22 16:09:12 jik5.kamens.us kernel: usbcore: registered new interface driver btusb Mar 22 16:09:12 jik5.kamens.us kernel: Bluetooth: hci0: Legacy ROM 2.5 revision 1.0 build 3 week 17 2014 Mar 22 16:09:12 jik5.kamens.us kernel: Bluetooth: hci0: Intel Bluetooth firmware file: intel/ibt-hw-37.8.10-fw-1.10.3.11.e.bseq Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.844:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1323 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.844:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1323 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1323]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1323 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1323]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1323 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Mar 22 16:09:12 jik5.kamens.us audit[1331]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1331 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.848:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1331 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.852:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1327 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.852:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1327 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.852:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1327 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1327]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1327 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1327]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1327 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1327]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1327 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:09:12 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=511), cval->res is probably wrong. Mar 22 16:09:12 jik5.kamens.us kernel: usb 2-5.1: [15] FU [Plugable Audio Playback Volume] ch = 6, val = -8176/0/16 Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting rpcbind.service - RPC bind portmap service... Mar 22 16:09:12 jik5.kamens.us audit[1322]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1322 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.864:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1322 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.868:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1328 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=767), cval->res is probably wrong. Mar 22 16:09:12 jik5.kamens.us kernel: usb 2-5.1: [12] FU [Mic Capture Volume] ch = 2, val = -4592/7680/16 Mar 22 16:09:12 jik5.kamens.us kernel: usb 1-7.4.1.1: 1:1: cannot set freq 48000 to ep 0x3 Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.876:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1348 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: audit: type=1400 audit(1679515752.876:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1329 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1328]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1328 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1348]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1348 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1329]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1329 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1324]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1324 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1324]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=1324 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1324]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1324 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1324]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/{,usr/}sbin/dhclient" pid=1324 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1358]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1358 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1349]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine" pid=1349 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1349]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1349 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Mar 22 16:09:12 jik5.kamens.us apparmor.systemd[1368]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Mar 22 16:09:12 jik5.kamens.us systemd[1]: Started rpcbind.service - RPC bind portmap service. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished binfmt-support.service - Enable support for additional executable binary formats. Mar 22 16:09:12 jik5.kamens.us audit[1363]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1363 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1363]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd" pid=1363 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1363]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd//third_party" pid=1363 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Received SIGRTMIN+20 from PID 512 (plymouthd). Mar 22 16:09:12 jik5.kamens.us audit[1367]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="rsyslogd" pid=1367 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us systemd[1]: Reached target rpcbind.target - RPC Port Mapper. Mar 22 16:09:12 jik5.kamens.us audit[1366]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="named" pid=1366 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1325]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince" pid=1325 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1325]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince//sanitized_helper" pid=1325 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1325]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer" pid=1325 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1325]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer//sanitized_helper" pid=1325 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1325]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-thumbnailer" pid=1325 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us systemd[1]: Starting systemd-rfkill.service - Load/Save RF Kill Switch Status... Mar 22 16:09:12 jik5.kamens.us systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Mar 22 16:09:12 jik5.kamens.us audit[1347]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice" pid=1347 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us audit[1347]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice//gpg" pid=1347 comm="apparmor_parser" Mar 22 16:09:12 jik5.kamens.us kernel: RPC: Registered named UNIX socket transport module. Mar 22 16:09:12 jik5.kamens.us kernel: RPC: Registered udp transport module. Mar 22 16:09:12 jik5.kamens.us kernel: RPC: Registered tcp transport module. Mar 22 16:09:12 jik5.kamens.us kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Mounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:09:12 jik5.kamens.us systemd[1]: Reached target rpc_pipefs.target. Mar 22 16:09:13 jik5.kamens.us systemd[1]: rpc-gssd.service - RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:09:13 jik5.kamens.us systemd[1]: Reached target nfs-client.target - NFS client services. Mar 22 16:09:13 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Detected Intel(R) Dual Band Wireless AC 7265, REV=0x210 Mar 22 16:09:13 jik5.kamens.us kernel: thermal thermal_zone3: failed to read out thermal zone (-61) Mar 22 16:09:13 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Applying debug destination EXTERNAL_DRAM Mar 22 16:09:13 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Allocated 0x00400000 bytes for firmware monitor. Mar 22 16:09:13 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: base HW address: 4c:34:88:9c:4f:cd, OTP minor version: 0x0 Mar 22 16:09:13 jik5.kamens.us kernel: Bluetooth: hci0: Intel BT fw patch 0x32 completed & activated Mar 22 16:09:13 jik5.kamens.us kernel: ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' Mar 22 16:09:13 jik5.kamens.us systemd[1]: Started systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:09:13 jik5.kamens.us audit[1368]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=1368 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us apparmor.systemd[1368]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 60): Caching disabled for: 'usr.sbin.sssd' due to force complain Mar 22 16:09:13 jik5.kamens.us systemd[1]: Finished apparmor.service - Load AppArmor profiles. Mar 22 16:09:13 jik5.kamens.us kernel: intel_tcc_cooling: Programmable TCC Offset detected Mar 22 16:09:13 jik5.kamens.us systemd-udevd[778]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[778]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /class/video4linux 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[763]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[778]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_firefox /class/video4linux 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[778]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_geckodriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-resolved[1357]: Positive Trust Anchors: Mar 22 16:09:13 jik5.kamens.us systemd-resolved[1357]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 22 16:09:13 jik5.kamens.us systemd-resolved[1357]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 22 16:09:13 jik5.kamens.us systemd-udevd[763]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[745]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[747]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[745]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[758]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[778]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[758]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[747]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[778]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Starting snapd.apparmor.service - Load AppArmor profiles managed internally by snapd... Mar 22 16:09:13 jik5.kamens.us systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[758]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[758]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us kernel: usbcore: registered new interface driver snd-usb-audio Mar 22 16:09:13 jik5.kamens.us systemd-udevd[752]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[764]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[752]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[764]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us kernel: iwlwifi 0000:03:00.0 wlp3s0: renamed from wlan0 Mar 22 16:09:13 jik5.kamens.us systemd[1]: Started systemd-rfkill.service - Load/Save RF Kill Switch Status. Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:09:13 jik5.kamens.us systemd[1]: Reached target time-set.target - System Time Set. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:13 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:09:13 jik5.kamens.us audit[1562]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=1562 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1559]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=1559 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1565]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.core" pid=1565 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:09:13 jik5.kamens.us audit[1566]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.cups" pid=1566 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:09:13 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain package Mar 22 16:09:13 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain core Mar 22 16:09:13 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain dram Mar 22 16:09:13 jik5.kamens.us audit[1557]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=1557 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1557]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1557 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1572]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.vault" pid=1572 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1561]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bw" pid=1561 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1567]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.firefox" pid=1567 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1568]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=1568 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1570]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=1570 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1569]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snap-store" pid=1569 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1574]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.daemon" pid=1574 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1564]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.chromium" pid=1564 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1573]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.cli" pid=1573 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1575]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.qt" pid=1575 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1576]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.tx" pid=1576 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1579]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.util" pid=1579 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1580]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.wallet" pid=1580 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1583]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=1583 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1588]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=1588 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1591]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=1591 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1581]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bw.bw" pid=1581 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1590]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=1590 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1593]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=1593 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1600]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.core.hook.configure" pid=1600 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1587]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=1587 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1605]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cancel" pid=1605 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1603]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.accept" pid=1603 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd-resolved[1357]: Using system hostname 'jik5.kamens.us'. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Started systemd-resolved.service - Network Name Resolution. Mar 22 16:09:13 jik5.kamens.us audit[1599]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.hook.configure" pid=1599 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1610]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsctl" pid=1610 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1609]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsaccept" pid=1609 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1594]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromedriver" pid=1594 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us audit[1606]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cups-browsed" pid=1606 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us audit[1596]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromium" pid=1596 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1619]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsenable" pid=1619 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1618]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsdisable" pid=1618 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1620]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsfilter" pid=1620 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1617]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsd" pid=1617 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1621]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsreject" pid=1621 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1623]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupstestppd" pid=1623 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1626]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.gs" pid=1626 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1625]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.driverless" pid=1625 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1632]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpc" pid=1632 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd-udevd[746]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us audit[1628]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippfind" pid=1628 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1629]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ipptool" pid=1629 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1630]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lp" pid=1630 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd-udevd[768]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[746]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[762]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[768]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us systemd-udevd[762]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:09:13 jik5.kamens.us audit[1631]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpadmin" pid=1631 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1627]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippeveprinter" pid=1627 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1634]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpoptions" pid=1634 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1633]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpinfo" pid=1633 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1642]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpr" pid=1642 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1643]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lprm" pid=1643 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1641]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpq" pid=1641 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1644]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpstat" pid=1644 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1649]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.reject" pid=1649 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1655]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=1655 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1652]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.configure" pid=1652 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1658]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=1658 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1659]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=1659 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1650]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.firefox" pid=1650 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:09:13 jik5.kamens.us audit[1651]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.geckodriver" pid=1651 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1662]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.hook.configure" pid=1662 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1661]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=1661 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1660]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=1660 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1667]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=1667 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1663]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.snap-store" pid=1663 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1671]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.vault.vault" pid=1671 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1666]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=1666 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1665]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=1665 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us audit[1669]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=1669 comm="apparmor_parser" Mar 22 16:09:13 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:13 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Finished ufw.service - Uncomplicated firewall. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Finished snapd.apparmor.service - Load AppArmor profiles managed internally by snapd. Mar 22 16:09:13 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Reached target network-pre.target - Preparation for Network. Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:09:13 jik5.kamens.us systemd[1]: Mounting run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt... Mar 22 16:09:13 jik5.kamens.us mount[1683]: mount: /run/systemd/cryptsetup/keydev-sdc3_crypt: special device /keyless-entry does not exist. Mar 22 16:09:13 jik5.kamens.us mount[1683]: dmesg(1) may have more information after failed mount system call. Mar 22 16:09:13 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Mount process exited, code=exited, status=32/n/a Mar 22 16:09:13 jik5.kamens.us kernel: /keyless-entry: Can't open blockdev Mar 22 16:09:13 jik5.kamens.us systemd[1]: run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount: Failed with result 'exit-code'. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Failed to mount run-systemd-cryptsetup-keydev\x2dsdc3_crypt.mount - /run/systemd/cryptsetup/keydev-sdc3_crypt. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Dependency failed for systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Dependency failed for cryptsetup.target - Local Encrypted Volumes. Mar 22 16:09:13 jik5.kamens.us systemd[1]: cryptsetup.target: Job cryptsetup.target/start failed with result 'dependency'. Mar 22 16:09:13 jik5.kamens.us systemd[1]: systemd-cryptsetup@sdc3_crypt.service: Job systemd-cryptsetup@sdc3_crypt.service/start failed with result 'dependency'. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Started keydev-sdc3_crypt-umount.service. Mar 22 16:09:13 jik5.kamens.us systemd[1]: Stopped target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:09:13 jik5.kamens.us umount[1684]: umount: /run/systemd/cryptsetup/keydev-sdc3_crypt: not mounted. Mar 22 16:09:13 jik5.kamens.us systemd[1]: keydev-sdc3_crypt-umount.service: Deactivated successfully. Mar 22 16:09:18 jik5.kamens.us systemd[1]: systemd-rfkill.service: Deactivated successfully. Mar 22 16:09:42 jik5.kamens.us systemd[1]: systemd-fsckd.service: Deactivated successfully. Mar 22 16:10:13 jik5.kamens.us systemd-udevd[767]: 2-5.1:1.0: Spawned process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' [1122] is taking longer than 59s to complete Mar 22 16:10:13 jik5.kamens.us systemd-udevd[774]: 1-7.4.4.3: Spawned process '/bin/systemctl start yubikey-monitor.service' [958] is taking longer than 59s to complete Mar 22 16:10:13 jik5.kamens.us systemd-udevd[770]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1505] is taking longer than 59s to complete Mar 22 16:10:13 jik5.kamens.us systemd-udevd[706]: 1-7.4.4.3: Worker [774] processing SEQNUM=3302 is taking a long time Mar 22 16:10:13 jik5.kamens.us systemd-udevd[706]: nvidia: Worker [770] processing SEQNUM=4394 is taking a long time Mar 22 16:10:13 jik5.kamens.us systemd-udevd[706]: 2-5.1:1.0: Worker [767] processing SEQNUM=3878 is taking a long time Mar 22 16:10:13 jik5.kamens.us systemd-udevd[706]: 0000:01:00.0: Worker [748] processing SEQNUM=3822 is taking a long time Mar 22 16:10:41 jik5.kamens.us systemd[1]: systemd-modules-load.service: start operation timed out. Terminating. Mar 22 16:10:41 jik5.kamens.us systemd[1]: systemd-modules-load.service: Main process exited, code=killed, status=15/TERM Mar 22 16:10:41 jik5.kamens.us systemd[1]: systemd-modules-load.service: Failed with result 'timeout'. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Failed to start systemd-modules-load.service - Load Kernel Modules. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Reached target sysinit.target - System Initialization. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started apport-autoreport.path - Process error reports when automatic reporting is enabled (file watch). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started cups.path - CUPS Scheduler. Mar 22 16:10:41 jik5.kamens.us systemd[1]: tpm-udev.path - Handle dynamically added tpm devices was skipped because of an unmet condition check (ConditionVirtualization=container). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started whoopsie.path - Start whoopsie on modification of the /var/crash directory. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started anacron.timer - Trigger anacron every hour. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started apport-autoreport.timer - Process error reports when automatic reporting is enabled (timer based). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started apt-daily.timer - Daily apt download activities. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started apt-daily-upgrade.timer - Daily apt upgrade and clean activities. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started dpkg-db-backup.timer - Daily dpkg database backup timer. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started e2scrub_all.timer - Periodic ext4 Online Metadata Check for All Filesystems. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started fstrim.timer - Discard unused blocks once a week. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started fwupd-refresh.timer - Refresh fwupd metadata regularly. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started logrotate.timer - Daily rotation of log files. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started man-db.timer - Daily man-db regeneration. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started motd-news.timer - Message of the Day. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started plocate-updatedb.timer - Update the plocate database daily. Mar 22 16:10:41 jik5.kamens.us systemd[1]: snapd.snap-repair.timer - Timer to automatically fetch and run repair assertions was skipped because no trigger condition checks were met. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started ua-timer.timer - Ubuntu Advantage Timer for running repeated jobs. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started yubikey-monitor.timer - Check for inserted Yubikey every minute. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Reached target paths.target - Path Units. Mar 22 16:10:41 jik5.kamens.us systemd[1]: apport-forward.socket - Unix socket for apport crash forwarding was skipped because of an unmet condition check (ConditionVirtualization=container). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on avahi-daemon.socket - Avahi mDNS/DNS-SD Stack Activation Socket. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on cups.socket - CUPS Scheduler. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting docker.socket - Docker Socket for the API... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on pcscd.socket - PC/SC Smart Card Daemon Activation Socket. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting snapd.socket - Socket activation for snappy daemon... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on spice-vdagentd.socket - Activation socket for spice guest agent daemon. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on ssh.socket - OpenBSD Secure Shell server socket. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on uuidd.socket - UUID daemon activation socket. Mar 22 16:10:41 jik5.kamens.us systemd[1]: systemd-pcrphase-sysinit.service - TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on docker.socket - Docker Socket for the API. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Listening on snapd.socket - Socket activation for snappy daemon. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Reached target sockets.target - Socket Units. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Reached target basic.target - Basic System. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting accounts-daemon.service - Accounts Service... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting avahi-daemon.service - Avahi mDNS/DNS-SD Stack... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting bluetooth.service - Bluetooth service... Mar 22 16:10:41 jik5.kamens.us systemd[1693]: ConfigurationDirectory 'bluetooth' already exists but the mode is different. (File system: 755 ConfigurationDirectoryMode: 555) Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting dbus.service - D-Bus System Message Bus... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started dmesg.service - Save initial kernel messages after boot. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting e2scrub_reap.service - Remove Stale Online ext4 Metadata Check Snapshots... Mar 22 16:10:41 jik5.kamens.us systemd[1]: getty-static.service - getty on tty2-tty6 if dbus and logind are not available was skipped because of an unmet condition check (ConditionPathExists=!/usr/bin/dbus-daemon). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Reached target getty.target - Login Prompts. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Found user 'avahi' (UID 119) and group 'avahi' (GID 126). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting gpu-manager.service - Detect the available GPUs and deal with any system changes... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting grub-common.service - Record successful boot for GRUB... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started irqbalance.service - irqbalance daemon. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting networkd-dispatcher.service - Dispatcher daemon for systemd-networkd... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting polkit.service - Authorization Manager... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting power-profiles-daemon.service - Power Profiles daemon... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting pwrstatd.service - LSB: The monitor UPS software.... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting rsyslog.service - System Logging Service... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting secureboot-db.service - Secure Boot updates for DB and DBX... Mar 22 16:10:41 jik5.kamens.us systemd[1]: snapd.aa-prompt-listener.service - Userspace listener for prompt events was skipped because of an unmet condition check (ConditionPathExists=/sys/kernel/security/apparmor/.notify). Mar 22 16:10:41 jik5.kamens.us systemd[1]: snapd.core-fixup.service - Automatically repair incorrect owner/permissions on core devices was skipped because no trigger condition checks were met. Mar 22 16:10:41 jik5.kamens.us systemd[1]: snapd.recovery-chooser-trigger.service - Wait for the Ubuntu Core chooser trigger was skipped because of an unmet condition check (ConditionKernelCommandLine=snapd_recovery_mode). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Reached target getty-pre.target - Preparation for Logins. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting snapd.service - Snap Daemon... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting switcheroo-control.service - Switcheroo Control Proxy service... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting systemd-logind.service - User Login Management... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting thermald.service - Thermal Daemon Service... Mar 22 16:10:41 jik5.kamens.us systemd[1]: ua-reboot-cmds.service - Ubuntu Advantage reboot cmds was skipped because of an unmet condition check (ConditionPathExists=/var/lib/ubuntu-advantage/marker-reboot-cmds-required). Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting udisks2.service - Disk Manager... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting vboxdrv.service - VirtualBox Linux kernel module... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Successfully dropped root privileges. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: avahi-daemon 0.8 starting up. Mar 22 16:10:41 jik5.kamens.us udisksd[1731]: udisks daemon version 2.9.4 starting Mar 22 16:10:41 jik5.kamens.us systemd[1]: Reached target smartcard.target - Smart Card. Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: Filesystem keystore: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin [7085 bytes] Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: firmware keys: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: PK: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Platform Key Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: KEK: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation KEK CA 2011 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Key Exchange Key Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=TW/ST=Taiwan/O=Acer/OU=Acer/CN=Acer/emailAddress=Mephisto_Lai@acer.com.tw Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: db: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Windows Production PCA 2011 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Database Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=TW/ST=Taiwan/O=Acer/OU=Acer/CN=Acer/emailAddress=Mephisto_Lai@acer.com.tw Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: dbx: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 90aec5c4995674a849c1d1384463f3b02b5aa625a5c320fc4fe7d9bb58a62398 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: edd2cb55726e10abedec9de8ca5ded289ad793ab3b6919d163c875fec1209cd5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 284153e7d04a9f187e5c3dbfe17b2672ad2fbdd119f27bec789417b7919853ec Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 66d0803e2550d9e790829ae1b5f81547cc9bfbe69b51817068ecb5dabb7a89fc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1e918f170a796b4b0b1400bb9bdae75be1cf86705c2d0fc8fb9dd0c5016b933b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c3d65e174d47d3772cb431ea599bba76b8670bfaa51081895796432e2ef6461f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: af79b14064601bc0987d4747af1e914a228c05d622ceda03b7a4f67014fee767 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 48f4584de1c5ec650c25e6c623635ce101bd82617fc400d4150f0aee2355b4ca Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e060da09561ae00dcfb1769d6e8e846868a1e99a54b14aa5d0689f2840cec6df Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 007f4c95125713b112093e21663e2d23e3c1ae9ce4b5de0d58a297332336a2d8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5b89f1aa2435a03d18d9b203d17fb4fba4f8f5076cf1f9b8d6d9b826222235c1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 4cdae3920a512c9c052a8b4aba9096969b0a0197b614031e4c64a5d898cb09b9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e37ff3fc0eff20bfc1c060a4bf56885e1efd55a8e9ce3c5f4869444cacffad0b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: fabc379df395e6f52472b44fa5082f9f0e0da480f05198c66814b7055b03f446 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 47b31a1c7867644b2ee8093b2d5fbe21e21f77c1617a2c08812f57ace0850e9f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9959ed4e05e548b59f219308a45563ea85bb224c1ad96dec0e96c0e71ffccd81 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: dc8aff7faa9d1a00a3e32eefbf899b3059cbb313a48b82fa9c8d931fd58fb69d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 91721aa76266b5bb2f8009f1188510a36e54afd56e967387ea7d0b114d782089 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 23142e14424fb3ff4efc75d00b63867727841aba5005149070ee2417df8ab799 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d4241190cd5a369d8c344c660e24f3027fb8e7064fab33770e93fa765ffb152e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f5e892dd6ec4c2defa4a495c09219b621379b64da3d1b2e34adf4b5f1102bd39 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ef87be89a413657de8721498552cf9e0f3c1f71bc62dfa63b9f25bbc66e86494 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e6236dc1ee074c077c7a1c9b3965947430847be125f7aeb71d91a128133aea7f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e42572afac720f5d4a1c7aaaf802f094daceb682f4e92783b2bb3fa00862af7f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: dda0121dcf167db1e2622d10f454701837ac6af304a03ec06b3027904988c56b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d6ee8db782e36caffb4d9f8207900487de930aabcc1d196fa455fbfd6f37273d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: cb994b400590b66cbf55fc663555caf0d4f1ce267464d0452c2361e05ee1cd50 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bdd4086c019f5d388453c6d93475d39a576572baff75612c321b46a35a5329b1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: a608a87f51bdf7532b4b80fa95eadfdf1bf8b0cbb58a7d3939c9f11c12e71c85 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 99d7ada0d67e5233108dbd76702f4b168087cfc4ec65494d6ca8aba858febada Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5c2afe34bd8a7aebbb439c251dfb6a424f00e535ac4df61ec19745b6f10e893a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 4f0214fce4fa8897d0c80a46d6dab4124726d136fc2492efd01bfedfa3887a9c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 40d6cae02973789080cf4c3a9ad11b5a0a4d8bba4438ab96e276cc784454dee7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2ea4cb6a1f1eb1d3dce82d54fde26ded243ba3e18de7c6d211902a594fe56788 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 288878f12e8b9c6ccbf601c73d5f4e985cac0ff3fcb0c24e4414912b3eb91f15 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1142a0cc7c9004dff64c5948484d6a7ec3514e176f5ca6bdeed7a093940b93cc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 040b3bc339e9b6f9acd828b88f3482a5c3f64e67e5a714ba1da8a70453b34af6 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 540801dd345dc1c33ef431b35bf4c0e68bd319b577b9abe1a9cff1cbc39f548f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 408b8b3df5abb043521a493525023175ab1261b1de21064d6bf247ce142153b9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 37a480374daf6202ce790c318a2bb8aa3797311261160a8e30558b7dea78c7a6 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1f16078cce009df62edb9e7170e66caae670bce71b8f92d38280c56aa372031d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c805603c4fa038776e42f263c604b49d96840322e1922d5606a9b0bbb5bffe6f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f48e6dd8718e953b60a24f2cbea60a9521deae67db25425b7d3ace3c517dd9b7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f31fd461c5e99510403fc97c1da2d8a9cbe270597d32badf8fd66b77495f8d94 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f2a16d35b554694187a70d40ca682959f4f35c2ce0eab8fd64f7ac2ab9f5c24a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f1b4f6513b0d544a688d13adc291efa8c59f420ca5dcb23e0b5a06fa7e0d083d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: eed7e0eff2ed559e2a79ee361f9962af3b1e999131e30bb7fd07546fae0a7267 Mar 22 16:10:41 jik5.kamens.us dbus-daemon[1694]: dbus[1694]: Unknown group "power" in message bus configuration file Mar 22 16:10:41 jik5.kamens.us pwrstatd[1712]: * Starting pwrstatd 1.3.2 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ee83a566496109a74f6ac6e410df00bb29a290e0021516ae3b8a23288e7e2e72 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: eaff8c85c208ba4d5b6b8046f5d6081747d779bada7768e649d047ff9b1f660c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e6856f137f79992dc94fa2f43297ec32d2d9a76f7be66114c6a13efc3bcdf5c8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e39891f48bbcc593b8ed86ce82ce666fc1145b9fcbfd2b07bad0a89bf4c7bfbf Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e36dfc719d2114c2e39aea88849e2845ab326f6f7fe74e0e539b7e54d81f3631 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e051b788ecbaeda53046c70e6af6058f95222c046157b8c4c1b9c2cfc65f46e5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e051b788ecbaeda53046c70e6af6058f95222c046157b8c4c1b9c2cfc65f46e5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: df91ac85a94fcd0cfb8155bd7cbefaac14b8c5ee7397fe2cc85984459e2ea14e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: df02aab48387a9e1d4c65228089cb6abe196c8f4b396c7e4bbc395de136977f6 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: da3560fd0c32b54c83d4f2ff869003d2089369acf2c89608f8afa7436bfa4655 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d9668ab52785086786c134b5e4bddbf72452813b6973229ab92aa1a54d201bf5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d89a11d16c488dd4fbbc541d4b07faf8670d660994488fe54b1fbff2704e4288 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: cf13a243c1cd2e3c8ceb7e70100387cecbfb830525bbf9d0b70c79adf3e84128 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: cc8eec6eb9212cbf897a5ace7e8abeece1079f1a6def0a789591cb1547f1f084 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: cb340011afeb0d74c4a588b36ebaa441961608e8d2fa80dca8c13872c850796b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c69d64a5b839e41ba16742527e17056a18ce3c276fd26e34901a1bc7d0e32219 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c452ab846073df5ace25cca64d6b7a09d906308a1a65eb5240e3c4ebcaa9cc0c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c42d11c70ccf5e8cf3fb91fdf21d884021ad836ca68adf2cbb7995c10bf588d4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c3505bf3ec10a51dace417c76b8bd10939a065d1f34e75b8a3065ee31cc69b96 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c2469759c1947e14f4b65f72a9f5b3af8b6f6e727b68bb0d91385cbf42176a8a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bef7663be5ea4dbfd8686e24701e036f4c03fb7fcd67a6c566ed94ce09c44470 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: be435df7cd28aa2a7c8db4fc8173475b77e5abf392f76b7c76fa3f698cb71a9a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bdd01126e9d85710d3fe75af1cc1702a29f081b4f6fdf6a2b2135c0297a9cec5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bc75f910ff320f5cb5999e66bbd4034f4ae537a42fdfef35161c5348e366e216 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bb01da0333bb639c7e1c806db0561dc98a5316f22fef1090fb8d0be46dae499a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b93f0699598f8b20fa0dacc12cfcfc1f2568793f6e779e04795e6d7c22530f75 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b8d6b5e7857b45830e017c7be3d856adeb97c7290eb0665a3d473a4beb51dcf3 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ad3be589c0474e97de5bb2bf33534948b76bb80376dfdc58b1fed767b5a15bfc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: a924d3cad6da42b7399b96a095a06f18f6b1aba5b873b0d5f3a0ee2173b48b6c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: a4d978b7c4bda15435d508f8b9592ec2a5adfb12ea7bad146a35ecb53094642f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9ed33f0fbc180bc032f8909ca2c4ab3418edc33a45a50d2521a3b5876aa3ea2c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9dd2dcb72f5e741627f2e9e03ab18503a3403cf6a904a479a4db05d97e2250a9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9c259fcb301d5fc7397ed5759963e0ef6b36e42057fd73046e6bd08b149f751c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9baf4f76d76bf5d6a897bfbd5f429ba14d04e08b48c3ee8d76930a828fff3891 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9954a1a99d55e8b189ab1bca414b91f6a017191f6c40a86b6f3ef368dd860031 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 992d359aa7a5f789d268b94c11b9485a6b1ce64362b0edb4441ccc187c39647b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 992820e6ec8c41daae4bd8ab48f58268e943a670d35ca5e2bdcd3e7c4c94a072 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 97a8c5ba11d61fefbb5d6a05da4e15ba472dc4c6cd4972fc1a035de321342fe4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 97a51a094444620df38cd8c6512cac909a75fd437ae1e4d22929807661238127 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9783b5ee4492e9e891c655f1f48035959dad453c0e623af0fe7bf2c0a57885e3 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 96e4509450d380dac362ff8e295589128a1f1ce55885d20d89c27ba2a9d00909 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 947078f97c6196968c3ae99c9a5d58667e86882cf6c8c9d58967a496bb7af43c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 91971c1497bf8e5bc68439acc48d63ebb8faabfd764dcbe82f3ba977cac8cf6a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 91656aa4ef493b3824a0b7263248e4e2d657a5c8488d880cb65b01730932fb53 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9063f5fbc5e57ab6de6c9488146020e172b176d5ab57d4c89f0f600e17fe2de2 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8d93d60c691959651476e5dc464be12a85fa5280b6f524d4a1c3fcc9d048cfad Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8c0349d708571ae5aa21c11363482332073297d868f29058916529efc520ef70 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 894d7839368f3298cc915ae8742ef330d7a26699f459478cf22c2b6bb2850166 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 82acba48d5236ccff7659afc14594dee902bd6082ef1a30a0b9b508628cf34f4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 7f49ccb309323b1c7ab11c93c955b8c744f0a2b75c311f495e18906070500027 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 78b4edcaabc8d9093e20e217802caeb4f09e23a3394c4acc6e87e8f35395310f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 788383a4c733bb87d2bf51673dc73e92df15ab7d51dc715627ae77686d8d23bc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 781764102188a8b4b173d4a8f5ec94d828647156097f99357a581e624b377509 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 72c26f827ceb92989798961bc6ae748d141e05d3ebcfb65d9041b266c920be82 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 70a1450af2ad395569ad0afeb1d9c125324ee90aec39c258880134d4892d51ab Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6dead13257dfc3ccc6a4b37016ba91755fe9e0ec1f415030942e5abc47f07c88 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6dbbead23e8c860cf8b47f74fbfca5204de3e28b881313bb1d1eccdc4747934e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6873d2f61c29bd52e954eeff5977aa8367439997811a62ff212c948133c68d97 Mar 22 16:10:41 jik5.kamens.us systemd-journald[672]: Forwarding to syslog missed 24 messages. Mar 22 16:10:41 jik5.kamens.us systemd[1]: secureboot-db.service: Deactivated successfully. Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 66aa13a0edc219384d9c425d3927e6ed4a5d1940c5e7cd4dac88f5770103f2f1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 65b2e7cc18d903c331df1152df73ca0dc932d29f17997481c56f3087b2dd3147 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 631f0857b41845362c90c6980b4b10c4b628e23dbe24b6e96c128ae3dcb0d5ac Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 61cec4a377bf5902c0feaee37034bf97d5bc6e0615e23a1cdfbae6e3f5fb3cfd Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 61341e07697978220ea61e85dcd2421343f2c1bf35cc5b8d0ad2f0226f391479 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5d1e9acbbb4a7d024b6852df025970e2ced66ff622ee019cd0ed7fd841ccad02 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5890fa227121c76d90ed9e63c87e3a6533eea0f6f0a1a23f1fc445139bc6bcdf Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 57e6913afacc5222bd76cdaf31f8ed88895464255374ef097a82d7f59ad39596 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 47ff1b63b140b6fc04ed79131331e651da5b2e2f170f5daef4153dc2fbc532b1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 47ff1b63b140b6fc04ed79131331e651da5b2e2f170f5daef4153dc2fbc532b1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 4667bf250cd7c1a06b8474c613cdb1df648a7f58736fbf57d05d6f755dab67f4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 45876b4dd861d45b3a94800774027a5db45a48b2a729410908b6412f8a87e95d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 41d1eeb177c0324e17dd6557f384e532de0cf51a019a446b01efb351bc259d77 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 4185821f6dab5ba8347b78a22b5f9a0a7570ca5c93a74d478a793d83bac49805 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 400ac66d59b7b094a9e30b01a6bd013aff1d30570f83e7592f421dbe5ff4ba8f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3e3926f0b8a15ad5a14167bb647a843c3d4321e35dbc44dce8c837417f2d28b0 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3be8e7eb348d35c1928f19c769846788991641d1f6cf09514ca10269934f7359 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3ae76c45ca70e9180c1559981f42622dd251bca1fbe6b901c52ec11673b03514 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3a4f74beafae2b9383ad8215d233a6cf3d057fb3c7e213e897beef4255faee9d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 386d695cdf2d4576e01bcaccf5e49e78da51af9955c0b8fa7606373b007994b3 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3765d769c05bf98b427b3511903b2137e8a49b6f859d0af159ed6a86786aa634 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 367a31e5838831ad2c074647886a6cdff217e6b1ba910bff85dc7a87ae9b5e98 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 362ed31d20b1e00392281231a96f0a0acfde02618953e695c9ef2eb0bac37550 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 340da32b58331c8e2b561baf300ca9dfd6b91cd2270ee0e2a34958b1c6259e85 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 32ad3296829bc46dcfac5eddcb9dbf2c1eed5c11f83b2210cf9c6e60c798d4a7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 311a2ac55b50c09b30b3cc93b994a119153eeeac54ef892fc447bbbd96101aa1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2dcf8e8d817023d1e8e1451a3d68d6ec30d9bed94cbcb87f19ddc1cc0116ac1a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2b2298eaa26b9dc4a4558ae92e7bb0e4f85cf34bf848fdf636c0c11fbec49897 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 29cca4544ea330d61591c784695c149c6b040022ac7b5b89cbd72800d10840ea Mar 22 16:10:41 jik5.kamens.us systemd[1]: Finished secureboot-db.service - Secure Boot updates for DB and DBX. Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 270c84b29d86f16312b06aaae4ebb8dff8de7d080d825b8839ff1766274eff47 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1f179186efdf5ef2de018245ba0eae8134868601ba0d35ff3d9865c1537ced93 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1d8b58c1fdb8da8b33ccee1e5f973af734d90ef317e33f5db1573c2ba088a80c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1b909115a8d473e51328a87823bd621ce655dfae54fa2bfa72fdc0298611d6b8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 148fe18f715a9fcfe1a444ce0fff7f85869eb422330dc04b314c0f295d6da79e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 147730b42f11fe493fe902b6251e97cd2b6f34d36af59330f11d02a42f940d07 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0fa3a29ad05130d7fe5bf4d2596563cded1d874096aacc181069932a2e49519a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0c51d7906fc4931149765da88682426b2cfe9e6aa4f27253eab400111432e3a7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0a75ea0b1d70eaa4d3f374246db54fc7b43e7f596a353309b9c36b4fd975725e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 09f98aa90f85198c0d73f89ba77e87ec6f596c491350fb8f8bba80a62fbb914b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0928f0408bf725e61d67d87138a8eebc52962d2847f16e3587163b160e41b6ad Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 08bb2289e9e91b4d20ff3f1562516ab07e979b2c6cefe2ab70c6dfc1199f8da5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 06eb5badd26e4fae65f9a42358deef7c18e52cc05fbb7fc76776e69d1b982a14 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 05d87e15713454616f5b0ed7849ab5c1712ab84f02349478ec2a38f970c01489 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 03f64a29948a88beffdb035e0b09a7370ccf0cd9ce6bcf8e640c2107318fab87 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 804e354c6368bb27a90fae8e498a57052b293418259a019c4f53a2007254490f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5c5805196a85e93789457017d4f9eb6828b97c41cb9ba6d3dc1fcc115f527a55 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d372c0d0f4fdc9f52e9e1f23fc56ee72414a17f350d0cea6c26a35a6c3217a13 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9fa4d5023fd43ecaff4200ba7e8d4353259d2b7e5e72b5096eff8027d66d1043 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 992d359aa7a5f789d268b94c11b9485a6b1ce64362b0edb4441ccc187c39647b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8e53efdc15f852cee5a6e92931bc42e6163cd30ff649cca7e87252c3a459960b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 81a8b2c9751aeb1faba7dbde5ee9691dc0eaee2a31c38b1491a8146756a6b770 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 495300790e6c9bf2510daba59db3d57e9d2b85d7d7640434ec75baa3851c74e5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3a91f0f9e5287fa2994c7d930b2c1a5ee14ce8e1c8304ae495adc58cc4453c0c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0257ff710f2a16e489b37493c07604a7cda96129d8a8fd68d2b6af633904315d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: dccc3ce1c00ee4b0b10487d372a0fa47f5c26f57a359be7b27801e144eacbac4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e7681f153121ea1e67f74bbcb0cdc5e502702c1b8cc55fb65d702dfba948b5f4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 7eac80a915c84cd4afec638904d94eb168a8557951a4d539b0713028552b6b8c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e7c20b3ab481ec885501eca5293781d84b5a1ac24f88266b5270e7ecb4aa2538 Mar 22 16:10:41 jik5.kamens.us systemd[1]: grub-common.service: Deactivated successfully. Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e24b315a551671483d8b9073b32de11b4de1eb2eab211afd2d9c319ff55e08d0 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 68ee4632c7be1c66c83e89dd93eaee1294159abf45b4c2c72d7dc7499aa2a043 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3ece27cbb3ec4438cce523b927c4f05fdc5c593a3766db984c5e437a3ff6a16b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1cb4dccaf2c812cfa7b4938e1371fe2b96910fe407216fd95428672d6c7e7316 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e800395dbe0e045781e8005178b4baf5a257f06e159121a67c595f6ae22506fd Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 7bc9cb5463ce0f011fb5085eb8ba77d1acd283c43f4a57603cc113f22cebc579 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f1863ec8b7f43f94ad14fb0b8b4a69497a8c65ecbc2a55e0bb420e772b8cdc91 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c452ab846073df5ace25cca64d6b7a09d906308a1a65eb5240e3c4ebcaa9cc0c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: badff5e4f0fea711701ca8fb22e4c43821e31e210cf52d1d4f74dd50f1d039bc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 835881f2a5572d7059b5c8635018552892e945626f115fc9ca07acf7bde857a4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0dc24c75eb1aef56b9f13ab9de60e2eca1c4510034e290bbb36cf60a549b234c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f277af4f9bdc918ae89fa35cc1b34e34984c04ae9765322c3cb049574d36509c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d8d4e6ddf6e42d74a6a536ea62fd1217e4290b145c9e5c3695a31b42efb5f5a4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9d00ae4cd47a41c783dc48f342c076c2c16f3413f4d2df50d181ca3bb5ad859d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6efefe0b5b01478b7b944c10d3a8aca2cca4208888e2059f8a06cb5824d7bab0 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 02e6216acaef6401401fa555ecbed940b1a5f2569aed92956137ae58482ef1b7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 95049f0e4137c790b0d2767195e56f73807d123adcf8f6e7bf2d4d991d305f89 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0ce02100f67c7ef85f4eed368f02bf7092380a3c23ca91fd7f19430d94b00c19 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bb1dd16d530008636f232303a7a86f3dff969f848815c0574b12c2d787fec93f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2679650fe341f2cf1ea883460b3556aaaf77a70d6b8dc484c9301d1b746cf7b5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5b248e913d71853d3da5aedd8d9a4bc57a917126573817fb5fcb2d86a2f1c886 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 65f3c0a01b8402d362b9722e98f75e5e991e6c186e934f7b2b2e6be6dec800ec Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: dbaf9e056d3d5b38b68553304abc88827ebc00f80cb9c7e197cdbc5822cd316c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: dd59af56084406e38c63fbe0850f30a0cd1277462a2192590fb05bc259e61273 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9f1863ed5717c394b42ef10a6607b144a65ba11fb6579df94b8eb2f0c4cd60c1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b3e506340fbf6b5786973393079f24b66ba46507e35e911db0362a2acde97049 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c9ec350406f26e559affb4030de2ebde5435054c35a998605b8fcf04972d8d55 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 89f3d1f6e485c334cd059d0995e3cdfdc00571b1849854847a44dc5548e2dcfb Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 4b8668a5d465bcdd9000aa8dfcff42044fcbd0aece32fc7011a83e9160e89f09 Mar 22 16:10:41 jik5.kamens.us systemd[1]: Finished grub-common.service - Record successful boot for GRUB. Mar 22 16:10:41 jik5.kamens.us pwrstatd[1712]: ...done. Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 10d45fcba396aef3153ee8f6ecae58afe8476a280a2026fc71f6217dcf49ba2f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 32f5940ca29dd812a2c145e6fc89646628ffcc7c7a42cae512337d8d29c40bbd Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 39dbc2288ef44b5f95332cb777e31103e840dba680634aa806f5c9b100061802 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e19dae83c02e6f281358d4ebd11d7723b4f5ea0e357907d5443decc5f93c1e9d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b92af298dc08049b78c77492d6551b710cd72aada3d77be54609e43278ef6e4d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 81d8fb4c9e2e7a8225656b4b8273b7cba4b03ef2e9eb20e0a0291624eca1ba86 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /CN=Debian Secure Boot Signer Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=GB/ST=Isle of Man/O=Canonical Ltd./OU=Secure Boot/CN=Canonical Ltd. Secure Boot Signing Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 45c7c8ae750acfbb48fc37527d6412dd644daed8913ccd8a24c94d856967df8e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 64575bd912789a2e14ad56f6341f52af6bf80cf94400785975e9f04e2d64d745 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 939aeef4f5fa51e23340c3f2e49048ce8872526afdf752c3a7f3a3f2bc9f6049 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3b0287533e0cc3d0ec1aa823cbf0a941aad8721579d1c499802dd1c3a636b8a9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c83cb13922ad99f560744675dd37cc94dcad5a1fcba6472fee341171d939e884 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 77dd190fa30d88ff5e3b011a0ae61e6209780c130b535ecb87e6f0888a0b6b2f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 55b99b0de53dbcfe485aa9c737cf3fb616ef3d91fab599aa7cab19eda763b5ba Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ca171d614a8d7e121c93948cd0fe55d39981f9d11aa96e03450a415227c2c65b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: fecfb232d12e994b6d485d2c7167728aa5525984ad5ca61e7516221f079a1436 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: fe63a84f782cc9d3fcf2ccf9fc11fbd03760878758d26285ed12669bdc6e6d01 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: fddd6e3d29ea84c7743dad4a1bdbc700b5fec1b391f932409086acc71dd6dbd8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e92c22eb3b5642d65c1ec2caf247d2594738eebb7fb3841a44956f59e2b0d1fa Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d8cbeb9735f5672b367e4f96cdc74969615d17074ae96c724d42ce0216f8f3fa Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ce3bfabe59d67ce8ac8dfd4a16f7c43ef9c224513fbc655957d735fa29f540ce Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: cb6b858b40d3a098765815b592c1514a49604fafd60819da88d7a76e9778fef7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c90f336617b8e7f983975413c997f10b73eb267fd8a10cb9e3bdbfc667abdb8b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c617c1a8b1ee2a811c28b5a81b4c83d7c98b5b0c27281d610207ebe692c2967f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c409bdac4775add8db92aa22b5b718fb8c94a1462c1fe9a416b95d8a3388c2fc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bc87a668e81966489cb508ee805183c19e6acd24cf17799ca062d2e384da0ea7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b97a0889059c035ff1d54b6db53b11b9766668d9f955247c028b2837d7a04cd9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b8f078d983a24ac433216393883514cd932c33af18e7dd70884c8235f4275736 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b54f1ee636631fad68058d3b0937031ac1b90ccb17062a391cca68afdbe40d55 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: afe2030afb7d2cda13f9fa333a02e34f6751afec11b010dbcd441fdf4c4002b3 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: aeebae3151271273ed95aa2e671139ed31a98567303a332298f83709a9d55aa1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ad6826e1946d26d3eaf3685c88d97d85de3b4dcb3d0ee2ae81c70560d13c5720 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: a7f32f508d4eb0fead9a087ef94ed1ba0aec5de6f7ef6ff0a62b93bedf5d458d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: a6b5151f3655d3a2af0d472759796be4a4200e5495a7d869754c4848857408a7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9e4a69173161682e55fde8fef560eb88ec1ffedcaf04001f66c0caf707b2b734 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9998d363c491be16bd74ba10b94d9291001611736fdca643a36664bc0f315a42 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8d8ea289cfe70a1c07ab7365cb28ee51edd33cf2506de888fbadd60ebf80481c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8bf434b49e00ccf71502a2cd900865cb01ec3b3da03c35be505fdf7bd563f521 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8ad64859f195b5f58dafaa940b6a6167acd67a886e8f469364177221c55945b9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 895a9785f617ca1d7ed44fc1a1470b71f3f1223862d9ff9dcc3ae2df92163daf Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 82db3bceb4f60843ce9d97c3d187cd9b5941cd3de8100e586f2bda5637575f67 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 81a8b965bb84d3876b9429a95481cc955318cfaa1412d808c8a33bfd33fff0e4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 7827af99362cfaf0717dade4b1bfe0438ad171c15addc248b75bf8caa44bb2c5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 72e0bd1867cf5d9d56ab158adf3bddbc82bf32a8d8aa1d8c5e2f6df29428d6d8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 726b3eb654046a30f3f83d9b96ce03f670e9a806d1708a0371e62dc49d2c23c1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 71f2906fd222497e54a34662ab2497fcc81020770ff51368e9e3d9bfcbfd6375 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6f1428ff71c9db0ed5af1f2e7bbfcbab647cc265ddf5b293cdb626f50a3a785e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6c8854478dd559e29351b826c06cb8bfef2b94ad3538358772d193f82ed1ca11 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6b1d138078e4418aa68deb7bb35e066092cf479eeb8ce4cd12e7d072ccb42f66 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5ae949ea8855eb93e439dbc65bda2e42852c2fdf6789fa146736e3c3410f2b5c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 518831fe7382b514d03e15c621228b8ab65479bd0cbfa3c5c1d0f48d9c306135 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 47cc086127e2069a86e03a6bef2cd410f8c55a6d6bdb362168c31b2ce32a5adf Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 4397daca839e7f63077cb50c92df43bc2d2fb2a8f59f26fc7a0e4bd4d9751692 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3fce9b9fdf3ef09d5452b0f95ee481c2b7f06d743a737971558e70136ace3e73 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3841d221368d1583d75c0a02e62160394d6c4e0a6760b6f607b90362bc855b02 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3608edbaf5ad0f41a414a1777abf2faf5e670334675ec3995e6935829e0caad2 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 306628fa5477305728ba4a467de7d0387a54f569d3769fce5e75ec89d28d1593 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2e70916786a6f773511fa7181fab0f1d70b557c6322ea923b2a8d3b92b51af7d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2c73d93325ba6dcbe589d4a4c63c5b935559ef92fbf050ed50c4e2085206f17d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2bbf2ca7b8f1d91f27ee52b6fb2a5dd049b85a2b9b529c5d6662068104b055f8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2b99cf26422e92fe365fbf4bc30d27086c9ee14b7a6fff44fb2f6b9001699939 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 18333429ff0562ed9f97033e1148dceee52dbe2e496d5410b5cfd6c864d2d10f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 174e3a0b5b43c6a607bbd3404f05341e3dcf396267ce94f8b50e2e23a9da920c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 106faceacfecfd4e303b74f480a08098e2d0802b936f8ec774ce21f31686689c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0dc9f3fb99962148c3ca833632758d3ed4fc8d0b0007b95b31e6528f2acd5bfc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0d0dbeca6f29eca06f331a7d72e4884b12097fb348983a2a14a0d73f4f10140f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0c189339762df336ab3dd006a463df715a39cfb0f492465c600e6c6bd7bd898c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0bbb4392daac7ab89b30a4ac657531b97bfaab04f90b0dafe5f9b6eb90a06374 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 09df5f4e511208ec78b96d12d08125fdb603868de39f6f72927852599b659c26 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 07e6c6a858646fb1efc67903fe28b116011f2367fe92e6be2b36999eff39d09e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 075eea060589548ba060b2feed10da3c20c7fe9b17cd026b94e8a683b8115238 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 90fbe70e69d633408d3e170c6832dbb2d209e0272527dfb63d49d29572a6f44c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 29c6eb52b43c3aa18b2cd8ed6ea8607cef3cfae1bafe1165755cf2e614844a44 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d063ec28f67eba53f1642dbf7dff33c6a32add869f6013fe162e2c32f1cbe56d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d626157e1d6a718bc124ab8da27cbb65072ca03a7b6b257dbdcbbd60f65ef3d1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5391c3a2fb112102a6aa1edc25ae77e19f5d6f09cd09eeb2509922bfcd5992ea Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 58fb941aef95a25943b3fb5f2510a0df3fe44c58c95e0ab80487297568ab9771 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c3a99a460da464a057c3586d83cef5f4ae08b7103979ed8932742df0ed530c66 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e6ca68e94146629af03f69c2f86e6bef62f930b37c6fbcc878b78df98c0334e5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1aec84b84b6c65a51220a9be7181965230210d62d6d33c48999c6b295a2b0a06 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 363384d14d1f2e0b7815626484c459ad57a318ef4396266048d058c5a19bbf76 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c5d9d8a186e2c82d09afaa2a6f7f2e73870d3e64f72c4e08ef67796a840f0fbd Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f52f83a3fa9cfbd6920f722824dbe4034534d25b8507246b3b957dac6e1bce7a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 80b4d96931bf0d02fd91a61e19d14f1da452e66db2408ca8604d411f92659f0a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Database Forbidden Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: filesystem keys: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: PK: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: KEK: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: db: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: dbx: Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 45c7c8ae750acfbb48fc37527d6412dd644daed8913ccd8a24c94d856967df8e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 64575bd912789a2e14ad56f6341f52af6bf80cf94400785975e9f04e2d64d745 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 939aeef4f5fa51e23340c3f2e49048ce8872526afdf752c3a7f3a3f2bc9f6049 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3b0287533e0cc3d0ec1aa823cbf0a941aad8721579d1c499802dd1c3a636b8a9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c83cb13922ad99f560744675dd37cc94dcad5a1fcba6472fee341171d939e884 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 77dd190fa30d88ff5e3b011a0ae61e6209780c130b535ecb87e6f0888a0b6b2f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 55b99b0de53dbcfe485aa9c737cf3fb616ef3d91fab599aa7cab19eda763b5ba Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ca171d614a8d7e121c93948cd0fe55d39981f9d11aa96e03450a415227c2c65b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: fecfb232d12e994b6d485d2c7167728aa5525984ad5ca61e7516221f079a1436 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: fe63a84f782cc9d3fcf2ccf9fc11fbd03760878758d26285ed12669bdc6e6d01 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: fddd6e3d29ea84c7743dad4a1bdbc700b5fec1b391f932409086acc71dd6dbd8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e92c22eb3b5642d65c1ec2caf247d2594738eebb7fb3841a44956f59e2b0d1fa Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d8cbeb9735f5672b367e4f96cdc74969615d17074ae96c724d42ce0216f8f3fa Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ce3bfabe59d67ce8ac8dfd4a16f7c43ef9c224513fbc655957d735fa29f540ce Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: cb6b858b40d3a098765815b592c1514a49604fafd60819da88d7a76e9778fef7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c90f336617b8e7f983975413c997f10b73eb267fd8a10cb9e3bdbfc667abdb8b Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us systemd[1]: Starting grub-initrd-fallback.service - GRUB failed boot detection... Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c617c1a8b1ee2a811c28b5a81b4c83d7c98b5b0c27281d610207ebe692c2967f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c409bdac4775add8db92aa22b5b718fb8c94a1462c1fe9a416b95d8a3388c2fc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: bc87a668e81966489cb508ee805183c19e6acd24cf17799ca062d2e384da0ea7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b97a0889059c035ff1d54b6db53b11b9766668d9f955247c028b2837d7a04cd9 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b8f078d983a24ac433216393883514cd932c33af18e7dd70884c8235f4275736 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: b54f1ee636631fad68058d3b0937031ac1b90ccb17062a391cca68afdbe40d55 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: afe2030afb7d2cda13f9fa333a02e34f6751afec11b010dbcd441fdf4c4002b3 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: aeebae3151271273ed95aa2e671139ed31a98567303a332298f83709a9d55aa1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: ad6826e1946d26d3eaf3685c88d97d85de3b4dcb3d0ee2ae81c70560d13c5720 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: a7f32f508d4eb0fead9a087ef94ed1ba0aec5de6f7ef6ff0a62b93bedf5d458d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: a6b5151f3655d3a2af0d472759796be4a4200e5495a7d869754c4848857408a7 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9e4a69173161682e55fde8fef560eb88ec1ffedcaf04001f66c0caf707b2b734 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 9998d363c491be16bd74ba10b94d9291001611736fdca643a36664bc0f315a42 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8d8ea289cfe70a1c07ab7365cb28ee51edd33cf2506de888fbadd60ebf80481c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8bf434b49e00ccf71502a2cd900865cb01ec3b3da03c35be505fdf7bd563f521 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 8ad64859f195b5f58dafaa940b6a6167acd67a886e8f469364177221c55945b9 Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started pwrstatd.service - LSB: The monitor UPS software.. Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 895a9785f617ca1d7ed44fc1a1470b71f3f1223862d9ff9dcc3ae2df92163daf Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 82db3bceb4f60843ce9d97c3d187cd9b5941cd3de8100e586f2bda5637575f67 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 81a8b965bb84d3876b9429a95481cc955318cfaa1412d808c8a33bfd33fff0e4 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 7827af99362cfaf0717dade4b1bfe0438ad171c15addc248b75bf8caa44bb2c5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 72e0bd1867cf5d9d56ab158adf3bddbc82bf32a8d8aa1d8c5e2f6df29428d6d8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 726b3eb654046a30f3f83d9b96ce03f670e9a806d1708a0371e62dc49d2c23c1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 71f2906fd222497e54a34662ab2497fcc81020770ff51368e9e3d9bfcbfd6375 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6f1428ff71c9db0ed5af1f2e7bbfcbab647cc265ddf5b293cdb626f50a3a785e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6c8854478dd559e29351b826c06cb8bfef2b94ad3538358772d193f82ed1ca11 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 6b1d138078e4418aa68deb7bb35e066092cf479eeb8ce4cd12e7d072ccb42f66 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5ae949ea8855eb93e439dbc65bda2e42852c2fdf6789fa146736e3c3410f2b5c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 518831fe7382b514d03e15c621228b8ab65479bd0cbfa3c5c1d0f48d9c306135 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 47cc086127e2069a86e03a6bef2cd410f8c55a6d6bdb362168c31b2ce32a5adf Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 4397daca839e7f63077cb50c92df43bc2d2fb2a8f59f26fc7a0e4bd4d9751692 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3fce9b9fdf3ef09d5452b0f95ee481c2b7f06d743a737971558e70136ace3e73 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3841d221368d1583d75c0a02e62160394d6c4e0a6760b6f607b90362bc855b02 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 3608edbaf5ad0f41a414a1777abf2faf5e670334675ec3995e6935829e0caad2 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 306628fa5477305728ba4a467de7d0387a54f569d3769fce5e75ec89d28d1593 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2e70916786a6f773511fa7181fab0f1d70b557c6322ea923b2a8d3b92b51af7d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2c73d93325ba6dcbe589d4a4c63c5b935559ef92fbf050ed50c4e2085206f17d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2bbf2ca7b8f1d91f27ee52b6fb2a5dd049b85a2b9b529c5d6662068104b055f8 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 2b99cf26422e92fe365fbf4bc30d27086c9ee14b7a6fff44fb2f6b9001699939 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 18333429ff0562ed9f97033e1148dceee52dbe2e496d5410b5cfd6c864d2d10f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 174e3a0b5b43c6a607bbd3404f05341e3dcf396267ce94f8b50e2e23a9da920c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 106faceacfecfd4e303b74f480a08098e2d0802b936f8ec774ce21f31686689c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0dc9f3fb99962148c3ca833632758d3ed4fc8d0b0007b95b31e6528f2acd5bfc Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0d0dbeca6f29eca06f331a7d72e4884b12097fb348983a2a14a0d73f4f10140f Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0c189339762df336ab3dd006a463df715a39cfb0f492465c600e6c6bd7bd898c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 0bbb4392daac7ab89b30a4ac657531b97bfaab04f90b0dafe5f9b6eb90a06374 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 09df5f4e511208ec78b96d12d08125fdb603868de39f6f72927852599b659c26 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 07e6c6a858646fb1efc67903fe28b116011f2367fe92e6be2b36999eff39d09e Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 075eea060589548ba060b2feed10da3c20c7fe9b17cd026b94e8a683b8115238 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 90fbe70e69d633408d3e170c6832dbb2d209e0272527dfb63d49d29572a6f44c Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 29c6eb52b43c3aa18b2cd8ed6ea8607cef3cfae1bafe1165755cf2e614844a44 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d063ec28f67eba53f1642dbf7dff33c6a32add869f6013fe162e2c32f1cbe56d Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: d626157e1d6a718bc124ab8da27cbb65072ca03a7b6b257dbdcbbd60f65ef3d1 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 5391c3a2fb112102a6aa1edc25ae77e19f5d6f09cd09eeb2509922bfcd5992ea Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 58fb941aef95a25943b3fb5f2510a0df3fe44c58c95e0ab80487297568ab9771 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c3a99a460da464a057c3586d83cef5f4ae08b7103979ed8932742df0ed530c66 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: e6ca68e94146629af03f69c2f86e6bef62f930b37c6fbcc878b78df98c0334e5 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 1aec84b84b6c65a51220a9be7181965230210d62d6d33c48999c6b295a2b0a06 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 363384d14d1f2e0b7815626484c459ad57a318ef4396266048d058c5a19bbf76 Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: c5d9d8a186e2c82d09afaa2a6f7f2e73870d3e64f72c4e08ef67796a840f0fbd Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: f52f83a3fa9cfbd6920f722824dbe4034534d25b8507246b3b957dac6e1bce7a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: 80b4d96931bf0d02fd91a61e19d14f1da452e66db2408ca8604d411f92659f0a Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:10:41 jik5.kamens.us sbkeysync[1746]: New keys in filesystem: Mar 22 16:10:41 jik5.kamens.us systemd[1]: e2scrub_reap.service: Deactivated successfully. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Finished e2scrub_reap.service - Remove Stale Online ext4 Metadata Check Snapshots. Mar 22 16:10:41 jik5.kamens.us systemd[1]: grub-initrd-fallback.service: Deactivated successfully. Mar 22 16:10:41 jik5.kamens.us systemd[1]: Finished grub-initrd-fallback.service - GRUB failed boot detection. Mar 22 16:10:41 jik5.kamens.us bluetoothd[1693]: Bluetooth daemon 5.66 Mar 22 16:10:41 jik5.kamens.us dbus-daemon[1694]: [system] AppArmor D-Bus mediation is enabled Mar 22 16:10:41 jik5.kamens.us systemd[1]: Started dbus.service - D-Bus System Message Bus. Mar 22 16:10:41 jik5.kamens.us systemd-logind[1726]: New seat seat0. Mar 22 16:10:42 jik5.kamens.us kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 Mar 22 16:10:42 jik5.kamens.us kernel: Bluetooth: BNEP filters: protocol multicast Mar 22 16:10:42 jik5.kamens.us kernel: Bluetooth: BNEP socket layer initialized Mar 22 16:10:42 jik5.kamens.us kernel: Bluetooth: MGMT ver 1.22 Mar 22 16:10:42 jik5.kamens.us kernel: NET: Registered PF_ALG protocol family Mar 22 16:10:41 jik5.kamens.us systemd-logind[1726]: Watching system buttons on /dev/input/event2 (Power Button) Mar 22 16:10:41 jik5.kamens.us thermald[1728]: 22 CPUID levels; family:model:stepping 0x6:5e:3 (6:94:3) Mar 22 16:10:41 jik5.kamens.us systemd-logind[1726]: Watching system buttons on /dev/input/event1 (Power Button) Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Successfully called chroot(). Mar 22 16:10:41 jik5.kamens.us systemd-logind[1726]: Watching system buttons on /dev/input/event0 (Sleep Button) Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Successfully dropped remaining capabilities. Mar 22 16:10:41 jik5.kamens.us systemd-logind[1726]: Watching system buttons on /dev/input/event5 (Metadot - Das Keyboard Das Keyboard System Control) Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: No service file found in /etc/avahi/services. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting NetworkManager.service - Network Manager... Mar 22 16:10:41 jik5.kamens.us thermald[1728]: 22 CPUID levels; family:model:stepping 0x6:5e:3 (6:94:3) Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting wpa_supplicant.service - WPA supplicant... Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Joining mDNS multicast group on interface lo.IPv6 with address ::1. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: New relevant interface lo.IPv6 for mDNS. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: New relevant interface lo.IPv4 for mDNS. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Network interface enumeration completed. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Registering new address record for ::1 on lo.*. Mar 22 16:10:41 jik5.kamens.us avahi-daemon[1692]: Registering new address record for 127.0.0.1 on lo.IPv4. Mar 22 16:10:41 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.10' (uid=0 pid=1710 comm="/usr/libexec/power-profiles-daemon" label="unconfined") Mar 22 16:10:41 jik5.kamens.us thermald[1728]: sensor id 10 : No temp sysfs for reading raw temp Mar 22 16:10:41 jik5.kamens.us bluetoothd[1693]: Starting SDP server Mar 22 16:10:41 jik5.kamens.us thermald[1728]: sensor id 10 : No temp sysfs for reading raw temp Mar 22 16:10:41 jik5.kamens.us thermald[1728]: sensor id 10 : No temp sysfs for reading raw temp Mar 22 16:10:41 jik5.kamens.us thermald[1728]: Using config file /etc/thermald/thermal-conf.xml Mar 22 16:10:42 jik5.kamens.us bluetoothd[1693]: profiles/audio/vcp.c:vcp_init() D-Bus experimental not enabled Mar 22 16:10:42 jik5.kamens.us bluetoothd[1693]: src/plugin.c:plugin_init() Failed to init vcp plugin Mar 22 16:10:42 jik5.kamens.us bluetoothd[1693]: profiles/audio/mcp.c:mcp_init() D-Bus experimental not enabled Mar 22 16:10:42 jik5.kamens.us bluetoothd[1693]: src/plugin.c:plugin_init() Failed to init mcp plugin Mar 22 16:10:42 jik5.kamens.us bluetoothd[1693]: profiles/audio/bap.c:bap_init() D-Bus experimental not enabled Mar 22 16:10:42 jik5.kamens.us bluetoothd[1693]: src/plugin.c:plugin_init() Failed to init bap plugin Mar 22 16:10:42 jik5.kamens.us bluetoothd[1693]: Bluetooth management interface 1.22 initialized Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.4' (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:10:42 jik5.kamens.us polkitd[1708]: started daemon version 0.105 using authority implementation `local' version `0.105' Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started bluetooth.service - Bluetooth service. Mar 22 16:10:42 jik5.kamens.us thermald[1728]: Polling mode is enabled: 4 Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started avahi-daemon.service - Avahi mDNS/DNS-SD Stack. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started thermald.service - Thermal Daemon Service. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started switcheroo-control.service - Switcheroo Control Proxy service. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started systemd-logind.service - User Login Management. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started polkit.service - Authorization Manager. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started power-profiles-daemon.service - Power Profiles daemon. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Reached target bluetooth.target - Bluetooth Support. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting ModemManager.service - Modem Manager... Mar 22 16:10:42 jik5.kamens.us systemd[1]: alsa-state.service - Manage Sound Card State (restore and store) was skipped because of an unmet condition check (ConditionPathExists=/etc/alsa/state-daemon.conf). Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting alsa-restore.service - Save/Restore Sound Card State... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Mar 22 16:10:42 jik5.kamens.us udisksd[1731]: failed to load module mdraid: libbd_mdraid.so.2: cannot open shared object file: No such file or directory Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started wpa_supplicant.service - WPA supplicant. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Finished alsa-restore.service - Save/Restore Sound Card State. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Reached target sound.target - Sound Card. Mar 22 16:10:42 jik5.kamens.us wpa_supplicant[1851]: Successfully initialized wpa_supplicant Mar 22 16:10:42 jik5.kamens.us audit[1725]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="rsyslogd" pid=1725 comm="apparmor_parser" Mar 22 16:10:42 jik5.kamens.us kernel: kauditd_printk_skb: 91 callbacks suppressed Mar 22 16:10:42 jik5.kamens.us kernel: audit: type=1400 audit(1679515842.080:103): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="rsyslogd" pid=1725 comm="apparmor_parser" Mar 22 16:10:42 jik5.kamens.us udisksd[1731]: Failed to load the 'mdraid' libblockdev plugin Mar 22 16:10:42 jik5.kamens.us yubikey-monitor.sh[1734]: Triggered https://api.pushover.net/1/messages.json Mar 22 16:10:42 jik5.kamens.us rsyslogd[1879]: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] Mar 22 16:10:42 jik5.kamens.us rsyslogd[1879]: rsyslogd's groupid changed to 108 Mar 22 16:10:42 jik5.kamens.us rsyslogd[1879]: rsyslogd's userid changed to 103 Mar 22 16:10:42 jik5.kamens.us rsyslogd[1879]: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="1879" x-info="https://www.rsyslog.com"] start Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started rsyslog.service - System Logging Service. Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1421] NetworkManager (version 1.40.12) is starting... (boot:0dd7fdb6-3f0d-458d-9ac3-2d8587959e9d) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1422] Read config: /etc/NetworkManager/NetworkManager.conf (lib: 10-dns-resolved.conf, 20-connectivity-ubuntu.conf, no-mac-addr-change.conf) (run: 10-globally-managed-devices.conf) (etc: 10-ubuntu-fan.conf, default-wifi-powersave-on.conf) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1473] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started NetworkManager.service - Network Manager. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Reached target network.target - Network. Mar 22 16:10:42 jik5.kamens.us ModemManager[1859]: ModemManager (version 1.20.4) starting in system bus... Mar 22 16:10:42 jik5.kamens.us yubikey-monitor.sh[1734]: Delaying notification for 5 seconds Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1598] manager[0x5608caab1520]: monitoring kernel firmware directory '/lib/firmware'. Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1599] monitoring ifupdown state file '/run/network/ifstate'. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting NetworkManager-wait-online.service - Network Manager Wait Online... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting containerd.service - containerd container runtime... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting cups.service - CUPS Scheduler... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started fail2ban.service - Fail2Ban Service. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting mariadb.service - MariaDB 10.11.2 database server... Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.hostname1' Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting named.service - BIND Domain Name Server... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting openvpn.service - OpenVPN service... Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1957] hostname: hostname: using hostnamed Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1958] hostname: static hostname changed from (none) to "jik5.kamens.us" Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.1971] dns-mgr: init: dns=systemd-resolved rc-manager=unmanaged (auto), plugin=systemd-resolved Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting postgresql@11-main.service - PostgreSQL Cluster 11-main... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting postgresql@12-main.service - PostgreSQL Cluster 12-main... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting postgresql@13-main.service - PostgreSQL Cluster 13-main... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting postgresql@14-main.service - PostgreSQL Cluster 14-main... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting postgresql@15-main.service - PostgreSQL Cluster 15-main... Mar 22 16:10:42 jik5.kamens.us systemd[1]: rsync.service - fast remote file copy program daemon was skipped because of an unmet condition check (ConditionPathExists=/etc/rsyncd.conf). Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2081] rfkill1: found Wi-Fi radio killswitch (at /sys/devices/pci0000:00/0000:00:1c.5/0000:03:00.0/ieee80211/phy0/rfkill1) (driver iwlwifi) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2083] manager[0x5608caab1520]: rfkill: Wi-Fi hardware radio set disabled Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2083] manager[0x5608caab1520]: rfkill: WWAN hardware radio set enabled Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started snap.cups.cups-browsed.service - Service for snap application cups.cups-browsed. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started snap.cups.cupsd.service - Service for snap application cups.cupsd. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started unattended-upgrades.service - Unattended Upgrades Shutdown. Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2227] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-adsl.so) Mar 22 16:10:42 jik5.kamens.us systemd[1]: Finished openvpn.service - OpenVPN service. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started systemd-hostnamed.service - Hostname Service. Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2671] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-bluetooth.so) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2801] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-wifi.so) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2922] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-team.so) Mar 22 16:10:42 jik5.kamens.us named[1914]: starting BIND 9.18.12-1ubuntu1-Ubuntu (Extended Support Version) Mar 22 16:10:42 jik5.kamens.us snapd[1720]: overlord.go:268: Acquiring state lock file Mar 22 16:10:42 jik5.kamens.us snapd[1720]: overlord.go:273: Acquired state lock file Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2936] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-wwan.so) Mar 22 16:10:42 jik5.kamens.us named[1914]: running on Linux x86_64 6.2.0-18-generic #18-Ubuntu SMP PREEMPT_DYNAMIC Thu Mar 16 00:09:48 UTC 2023 Mar 22 16:10:42 jik5.kamens.us named[1914]: built with '--build=x86_64-linux-gnu' '--prefix=/usr' '--includedir=${prefix}/include' '--mandir=${prefix}/share/man' '--infodir=${prefix}/share/info' '--sysconfdir=/etc' '--localstatedir=/var' '--disable-option-checking' '--disable-silent-rules' '--libdir=${prefix}/lib/x86_64-linux-gnu' '--runstatedir=/run' '--disable-maintainer-mode' '--disable-dependency-tracking' '--libdir=/usr/lib/x86_64-linux-gnu' '--sysconfdir=/etc/bind' '--with-python=python3' '--localstatedir=/' '--enable-threads' '--enable-largefile' '--with-libtool' '--enable-shared' '--disable-static' '--with-gost=no' '--with-openssl=/usr' '--with-gssapi=yes' '--with-libidn2' '--with-json-c' '--with-lmdb=/usr' '--with-gnu-ld' '--with-maxminddb' '--with-atf=no' '--enable-ipv6' '--enable-rrl' '--enable-filter-aaaa' '--disable-native-pkcs11' 'build_alias=x86_64-linux-gnu' 'CFLAGS=-g -O2 -ffile-prefix-map=/build/bind9-Za0Td3/bind9-9.18.12=. -flto=auto -ffat-lto-objects -fstack-protector-strong -Wformat -Werror=format-security -fdebug-prefix-map=/build/bind9-Za0Td3/bind9-9.18.12=/usr/src/bind9-1:9.18.12-1ubuntu1 -fno-strict-aliasing -fno-delete-null-pointer-checks -DNO_VERSION_DATE -DDIG_SIGCHASE' 'LDFLAGS=-Wl,-Bsymbolic-functions -flto=auto -ffat-lto-objects -Wl,-z,relro -Wl,-z,now' 'CPPFLAGS=-Wdate-time -D_FORTIFY_SOURCE=2' Mar 22 16:10:42 jik5.kamens.us named[1914]: running as: named -f -u bind Mar 22 16:10:42 jik5.kamens.us named[1914]: compiled by GCC 12.2.0 Mar 22 16:10:42 jik5.kamens.us named[1914]: compiled with OpenSSL version: OpenSSL 3.0.8 7 Feb 2023 Mar 22 16:10:42 jik5.kamens.us named[1914]: linked to OpenSSL version: OpenSSL 3.0.8 7 Feb 2023 Mar 22 16:10:42 jik5.kamens.us named[1914]: compiled with libxml2 version: 2.9.14 Mar 22 16:10:42 jik5.kamens.us named[1914]: linked to libxml2 version: 20914 Mar 22 16:10:42 jik5.kamens.us named[1914]: compiled with json-c version: 0.16 Mar 22 16:10:42 jik5.kamens.us named[1914]: linked to json-c version: 0.16 Mar 22 16:10:42 jik5.kamens.us named[1914]: compiled with zlib version: 1.2.13 Mar 22 16:10:42 jik5.kamens.us named[1914]: linked to zlib version: 1.2.13 Mar 22 16:10:42 jik5.kamens.us named[1914]: ---------------------------------------------------- Mar 22 16:10:42 jik5.kamens.us named[1914]: BIND 9 is maintained by Internet Systems Consortium, Mar 22 16:10:42 jik5.kamens.us named[1914]: Inc. (ISC), a non-profit 501(c)(3) public-benefit Mar 22 16:10:42 jik5.kamens.us named[1914]: corporation. Support and training for BIND 9 are Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2961] manager: rfkill: Wi-Fi disabled by radio killswitch; disabled by state file Mar 22 16:10:42 jik5.kamens.us named[1914]: available at https://www.isc.org/support Mar 22 16:10:42 jik5.kamens.us named[1914]: ---------------------------------------------------- Mar 22 16:10:42 jik5.kamens.us named[1914]: adjusted limit on open files from 524288 to 1048576 Mar 22 16:10:42 jik5.kamens.us named[1914]: found 8 CPUs, using 8 worker threads Mar 22 16:10:42 jik5.kamens.us named[1914]: using 8 UDP listeners per interface Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2986] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.2987] manager: Networking is enabled by state file Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.14' (uid=0 pid=1823 comm="/usr/sbin/NetworkManager --no-daemon" label="unconfined") Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service... Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3095] settings: Loaded settings plugin: ifupdown ("/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-settings-plugin-ifupdown.so") Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3158] settings: Loaded settings plugin: keyfile (internal) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3158] ifupdown: management mode: unmanaged Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3197] ifupdown: interface-parser: parsing file /etc/network/interfaces Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3202] ifupdown: interface-parser: finished parsing file /etc/network/interfaces Mar 22 16:10:42 jik5.kamens.us named[1914]: DNSSEC algorithms: RSASHA1 NSEC3RSASHA1 RSASHA256 RSASHA512 ECDSAP256SHA256 ECDSAP384SHA384 ED25519 ED448 Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3322] dhcp: init: Using DHCP client 'internal' Mar 22 16:10:42 jik5.kamens.us named[1914]: DS algorithms: SHA-1 SHA-256 SHA-384 Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3322] device (lo): carrier: link connected Mar 22 16:10:42 jik5.kamens.us named[1914]: HMAC algorithms: HMAC-MD5 HMAC-SHA1 HMAC-SHA224 HMAC-SHA256 HMAC-SHA384 HMAC-SHA512 Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3325] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) Mar 22 16:10:42 jik5.kamens.us named[1914]: TKEY mode 2 support (Diffie-Hellman): yes Mar 22 16:10:42 jik5.kamens.us named[1914]: TKEY mode 3 support (GSS-API): yes Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3336] manager: (enp2s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.3340] device (enp2s0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service. Mar 22 16:10:42 jik5.kamens.us named[1914]: config.c: option 'trust-anchor-telemetry' is experimental and subject to change in the future Mar 22 16:10:42 jik5.kamens.us named[1914]: loading configuration from '/etc/bind/named.conf' Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started ModemManager.service - Modem Manager. Mar 22 16:10:42 jik5.kamens.us named[1914]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:10:42 jik5.kamens.us named[1914]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:10:42 jik5.kamens.us named[1914]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:10:42 jik5.kamens.us named[1914]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:10:42 jik5.kamens.us kernel: Generic FE-GE Realtek PHY r8169-0-200:00: attached PHY driver (mii_bus:phy_addr=r8169-0-200:00, irq=MAC) Mar 22 16:10:42 jik5.kamens.us nm-dispatcher[1986]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args none hostname Mar 22 16:10:42 jik5.kamens.us snapd[1720]: daemon.go:247: started snapd/2.58.3+23.04ubuntu1 (series 16; classic) ubuntu/23.04 (amd64) linux/6.2.0-18-generic. Mar 22 16:10:42 jik5.kamens.us nm-dispatcher[1986]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:10:42 jik5.kamens.us nm-dispatcher[1959]: req:1 'hostname', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: No valid path found for iw Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' requested by ':1.19' (uid=0 pid=1908 comm="/usr/sbin/cupsd -l" label="/usr/sbin/cupsd (enforce)") Mar 22 16:10:42 jik5.kamens.us kernel: loop44: detected capacity change from 0 to 8 Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.network1' unit='dbus-org.freedesktop.network1.service' requested by ':1.20' (uid=0 pid=2038 comm="/usr/bin/networkctl list --no-pager --no-legend" label="unconfined") Mar 22 16:10:42 jik5.kamens.us snapd[1720]: daemon.go:340: adjusting startup timeout by 2m25s (pessimistic estimate of 30s plus 5s per snap) Mar 22 16:10:42 jik5.kamens.us fail2ban-server[1909]: 2023-03-22 16:10:42,475 fail2ban.configreader [1909]: WARNING 'allowipv6' not defined in 'Definition'. Using default one: 'auto' Mar 22 16:10:42 jik5.kamens.us systemd[1]: Starting colord.service - Manage, Install and Generate Color Profiles... Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started udisks2.service - Disk Manager. Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.network1.service': Unit dbus-org.freedesktop.network1.service not found. Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[2038]: WARNING: systemd-networkd is not running, output will be incomplete. Mar 22 16:10:42 jik5.kamens.us udisksd[1731]: Acquired the name org.freedesktop.UDisks2 on the system message bus Mar 22 16:10:42 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: Link is Down Mar 22 16:10:42 jik5.kamens.us named[1914]: listening on IPv4 interface lo, 127.0.0.1#53 Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5777] manager: (enx8cae4cdccf46): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5786] settings: (enx8cae4cdccf46): created default wired connection 'Wired connection 2' Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5786] device (enx8cae4cdccf46): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:10:42 jik5.kamens.us named[1914]: IPv6 socket API is incomplete; explicitly binding to each IPv6 address separately Mar 22 16:10:42 jik5.kamens.us named[1914]: listening on IPv6 interface lo, ::1#53 Mar 22 16:10:42 jik5.kamens.us named[1914]: generating session key for dynamic DNS Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5841] device (wlp3s0): driver supports Access Point (AP) mode Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5847] manager: (wlp3s0): new 802.11 Wi-Fi device (/org/freedesktop/NetworkManager/Devices/4) Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5849] device (wlp3s0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:10:42 jik5.kamens.us named[1914]: sizing zone task pool based on 50 zones Mar 22 16:10:42 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.ColorManager' Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started colord.service - Manage, Install and Generate Color Profiles. Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5926] failed to open /run/network/ifstate Mar 22 16:10:42 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: ERROR:Unknown state for interface NetworkctlListState(idx=1, name='lo', type='loopback', operational='-', administrative='unmanaged'): - Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: Traceback (most recent call last): Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 298, in trigger_all Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: self.handle_state(iface_name, Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 348, in handle_state Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: raise UnknownState(operational_state) Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: UnknownState: - Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: ERROR:Unknown state for interface NetworkctlListState(idx=2, name='enp2s0', type='ether', operational='-', administrative='unmanaged'): - Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: Traceback (most recent call last): Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 298, in trigger_all Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: self.handle_state(iface_name, Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 348, in handle_state Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: raise UnknownState(operational_state) Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: UnknownState: - Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: ERROR:Unknown state for interface NetworkctlListState(idx=3, name='enx8cae4cdccf46', type='ether', operational='-', administrative='unmanaged'): - Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: Traceback (most recent call last): Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 298, in trigger_all Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: self.handle_state(iface_name, Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 348, in handle_state Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: raise UnknownState(operational_state) Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: UnknownState: - Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: ERROR:Unknown state for interface NetworkctlListState(idx=4, name='wlp3s0', type='wlan', operational='-', administrative='unmanaged'): - Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: Traceback (most recent call last): Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 298, in trigger_all Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: self.handle_state(iface_name, Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: File "/usr/bin/networkd-dispatcher", line 348, in handle_state Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: raise UnknownState(operational_state) Mar 22 16:10:42 jik5.kamens.us networkd-dispatcher[1705]: UnknownState: - Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started networkd-dispatcher.service - Dispatcher daemon for systemd-networkd. Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.5997] dispatcher: (1) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:10:42 jik5.kamens.us named[1914]: set up managed keys zone for view unrestricted, file 'unrestricted.mkeys' Mar 22 16:10:42 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:42 jik5.kamens.us named[1914]: set up managed keys zone for view opendns, file 'opendns.mkeys' Mar 22 16:10:42 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:42 jik5.kamens.us named[1914]: command channel listening on 127.0.0.1#953 Mar 22 16:10:42 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:42 jik5.kamens.us named[1914]: command channel listening on ::1#953 Mar 22 16:10:42 jik5.kamens.us named[1914]: managed-keys-zone/unrestricted: loaded serial 0 Mar 22 16:10:42 jik5.kamens.us named[1914]: managed-keys-zone/opendns: loaded serial 0 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 24.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.6116] manager: (7C:D9:5C:BA:3D:76): new Bluetooth device (/org/freedesktop/NetworkManager/Devices/5) Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 27.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.6118] device (7C:D9:5C:BA:3D:76): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.6121] modem-manager: ModemManager available Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.6123] device (7C:D9:5C:BA:3D:76): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed') Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 18.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 21.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 10.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 20.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 30.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 16.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us nm-dispatcher[2140]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args connectivity-change Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 19.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 22.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 22.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone localhost/IN/unrestricted: loaded serial 2 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 0.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone kamens.brookline.ma.us/IN/opendns: loaded serial 2022113000 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 16.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 17.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 23.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 25.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 127.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 18.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 19.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 28.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 31.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 29.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 10.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 127.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 21.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 26.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 17.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 24.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone kamens.brookline.ma.us/IN/unrestricted: loaded serial 2022113000 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 28.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 30.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 255.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 23.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 25.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 31.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 4.168.192.in-addr.arpa/IN/opendns: loaded serial 2022113000 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 0.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 29.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 168.192.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 20.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 168.192.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 255.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 4.168.192.in-addr.arpa/IN/unrestricted: loaded serial 2022113000 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 26.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone 27.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:10:42 jik5.kamens.us named[1914]: zone localhost/IN/opendns: loaded serial 2 Mar 22 16:10:42 jik5.kamens.us named[1914]: all zones loaded Mar 22 16:10:42 jik5.kamens.us named[1914]: running Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started named.service - BIND Domain Name Server. Mar 22 16:10:42 jik5.kamens.us systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Mar 22 16:10:42 jik5.kamens.us nm-dispatcher[2140]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:10:42 jik5.kamens.us NetworkManager[1823]: [1679515842.6359] dispatcher: (2) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:10:42 jik5.kamens.us nm-dispatcher[1959]: req:2 'connectivity-change', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:10:42 jik5.kamens.us snapd[1720]: backends.go:58: AppArmor status: apparmor is enabled and all features are available Mar 22 16:10:42 jik5.kamens.us accounts-daemon[1691]: started daemon version 22.08.8 Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started accounts-daemon.service - Accounts Service. Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] Starting MariaDB 10.11.2-MariaDB-1 source revision as process 2096 Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Warning] WSREP: Failed to guess base node address. Set it explicitly via wsrep_node_address. Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Warning] WSREP: Failed to guess base node address. Set it explicitly via wsrep_node_address. Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Warning] WSREP: Guessing address for incoming client connections failed. Try setting wsrep_node_incoming_address explicitly. Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] WSREP: Node addr: Mar 22 16:10:42 jik5.kamens.us audit[1908]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/sbin/cupsd" pid=1908 comm="cupsd" capability=12 capname="net_admin" Mar 22 16:10:42 jik5.kamens.us systemd[1]: Started cups.service - CUPS Scheduler. Mar 22 16:10:42 jik5.kamens.us kernel: audit: type=1400 audit(1679515842.892:104): apparmor="DENIED" operation="capable" class="cap" profile="/usr/sbin/cupsd" pid=1908 comm="cupsd" capability=12 capname="net_admin" Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] InnoDB: Compressed tables use zlib 1.2.13 Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] InnoDB: Number of transaction pools: 1 Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] InnoDB: Using crc32 + pclmulqdq instructions Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] InnoDB: Using liburing Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] InnoDB: Initializing buffer pool, total size = 128.000MiB, chunk size = 2.000MiB Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] InnoDB: Completed initialization of buffer pool Mar 22 16:10:42 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:42 0 [Note] InnoDB: File system buffers for log disabled (block size=512 bytes) Mar 22 16:10:42 jik5.kamens.us avahi-daemon[1692]: Server startup complete. Host name is jik5.local. Local service cookie is 3024106616. Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.015610409-04:00" level=info msg="starting containerd" revision= version=1.6.12-0ubuntu2 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.038640564-04:00" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.039692872-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.042871601-04:00" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.2.0-18-generic\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.042899241-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.043120060-04:00" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.043132585-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.043142413-04:00" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.043149699-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.043981094-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.046881557-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.047171948-04:00" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.047194285-04:00" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.047223960-04:00" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.047241443-04:00" level=info msg="metadata content store policy set" policy=shared Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049324166-04:00" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049351724-04:00" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049368879-04:00" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049414917-04:00" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049435480-04:00" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049452280-04:00" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049478497-04:00" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049496563-04:00" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049514780-04:00" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049549207-04:00" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049569681-04:00" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049584945-04:00" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049654724-04:00" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049712110-04:00" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049941795-04:00" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049975726-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.049991572-04:00" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050239143-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050255496-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050268810-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050281184-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050294481-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050311061-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050327817-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050350454-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.050370039-04:00" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051712994-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051736539-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051762672-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051780952-04:00" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051802504-04:00" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051821547-04:00" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051843232-04:00" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.051891128-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.053165666-04:00" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[BinaryName: CriuImagePath: CriuPath: CriuWorkPath: IoGid:0 IoUid:0 NoNewKeyring:false NoPivotRoot:false Root: ShimCgroup: SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.053223835-04:00" level=info msg="Connect containerd service" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.053258983-04:00" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.055695631-04:00" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056197318-04:00" level=info msg="Start subscribing containerd event" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056264717-04:00" level=info msg="Start recovering state" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056346728-04:00" level=info msg="Start event monitor" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056339334-04:00" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056364987-04:00" level=info msg="Start snapshots syncer" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056378657-04:00" level=info msg="Start cni network conf syncer for default" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056389546-04:00" level=info msg="Start streaming server" Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056402963-04:00" level=info msg=serving... address=/run/containerd/containerd.sock Mar 22 16:10:43 jik5.kamens.us containerd[1930]: time="2023-03-22T16:10:43.056455731-04:00" level=info msg="containerd successfully booted in 0.041772s" Mar 22 16:10:43 jik5.kamens.us systemd[1]: Started containerd.service - containerd container runtime. Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] InnoDB: 128 rollback segments are active. Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] InnoDB: Setting file './ibtmp1' size to 12.000MiB. Physically writing the file full; Please wait ... Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] InnoDB: File './ibtmp1' size is now 12.000MiB. Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] InnoDB: log sequence number 2563290250; transaction id 2957919 Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] InnoDB: Loading buffer pool(s) from /var/lib/mysql/ib_buffer_pool Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] Plugin 'FEEDBACK' is disabled. Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Warning] You need to use --log-bin to make --expire-logs-days or --binlog-expire-logs-seconds work. Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] Server socket created on IP: '0.0.0.0'. Mar 22 16:10:43 jik5.kamens.us kernel: usb 1-7.4.3: reset high-speed USB device number 10 using xhci_hcd Mar 22 16:10:43 jik5.kamens.us audit[2309]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=2309 comm="apparmor_parser" Mar 22 16:10:43 jik5.kamens.us audit[2309]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2309 comm="apparmor_parser" Mar 22 16:10:43 jik5.kamens.us kernel: audit: type=1400 audit(1679515843.268:105): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=2309 comm="apparmor_parser" Mar 22 16:10:43 jik5.kamens.us kernel: audit: type=1400 audit(1679515843.268:106): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2309 comm="apparmor_parser" Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] /usr/sbin/mariadbd: ready for connections. Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: Version: '10.11.2-MariaDB-1' socket: '/run/mysqld/mysqld.sock' port: 3306 Ubuntu 23.04 Mar 22 16:10:43 jik5.kamens.us vboxdrv.sh[1732]: vboxdrv.sh: Starting VirtualBox services. Mar 22 16:10:43 jik5.kamens.us kernel: usb 1-7.4.3: device firmware changed Mar 22 16:10:43 jik5.kamens.us kernel: usb 1-7.4.3: USB disconnect, device number 10 Mar 22 16:10:43 jik5.kamens.us vboxdrv.sh[2314]: Starting VirtualBox services. Mar 22 16:10:43 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:10:43 0 [Note] InnoDB: Buffer pool(s) load completed at 230322 16:10:43 Mar 22 16:10:43 jik5.kamens.us vboxdrv.sh[1732]: vboxdrv.sh: Building VirtualBox kernel modules. Mar 22 16:10:43 jik5.kamens.us vboxdrv.sh[2334]: Building VirtualBox kernel modules. Mar 22 16:10:43 jik5.kamens.us systemd[1]: Started mariadb.service - MariaDB 10.11.2 database server. Mar 22 16:10:43 jik5.kamens.us /etc/mysql/debian-start[2347]: Upgrading MySQL tables if necessary. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[747]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[747]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[756]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[756]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[762]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[762]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[768]: 1-7.4.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3 189:9' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us systemd-udevd[768]: 1-7.4.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3 189:9' failed with exit code 1. Mar 22 16:10:43 jik5.kamens.us /etc/mysql/debian-start[2351]: /usr/bin/mysql_upgrade: the '--basedir' option is always ignored Mar 22 16:10:43 jik5.kamens.us /etc/mysql/debian-start[2403]: Checking for insecure root accounts. Mar 22 16:10:43 jik5.kamens.us /etc/mysql/debian-start[2407]: Triggering myisam-recover for all MyISAM tables and aria-recover for all Aria tables Mar 22 16:10:43 jik5.kamens.us kernel: usb 1-7.4.3: new high-speed USB device number 16 using xhci_hcd Mar 22 16:10:43 jik5.kamens.us fail2ban-server[1909]: Server ready Mar 22 16:10:44 jik5.kamens.us audit[2399]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.chromium" pid=2399 comm="apparmor_parser" Mar 22 16:10:44 jik5.kamens.us kernel: audit: type=1400 audit(1679515844.796:107): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.chromium" pid=2399 comm="apparmor_parser" Mar 22 16:10:44 jik5.kamens.us audit[2400]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.firefox" pid=2400 comm="apparmor_parser" Mar 22 16:10:44 jik5.kamens.us kernel: audit: type=1400 audit(1679515844.816:108): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.firefox" pid=2400 comm="apparmor_parser" Mar 22 16:10:44 jik5.kamens.us audit[2401]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snap-store" pid=2401 comm="apparmor_parser" Mar 22 16:10:44 jik5.kamens.us kernel: audit: type=1400 audit(1679515844.872:109): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snap-store" pid=2401 comm="apparmor_parser" Mar 22 16:10:44 jik5.kamens.us ModemManager[1859]: [base-manager] couldn't check support for device '/sys/devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1': not supported by any plugin Mar 22 16:10:44 jik5.kamens.us ModemManager[1859]: [base-manager] couldn't check support for device '/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0': not supported by any plugin Mar 22 16:10:44 jik5.kamens.us ModemManager[1859]: [base-manager] couldn't check support for device '/sys/devices/pci0000:00/0000:00:1c.5/0000:03:00.0': not supported by any plugin Mar 22 16:10:44 jik5.kamens.us systemd[1]: Started postgresql@14-main.service - PostgreSQL Cluster 14-main. Mar 22 16:10:44 jik5.kamens.us audit[2398]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=2398 comm="apparmor_parser" Mar 22 16:10:44 jik5.kamens.us kernel: audit: type=1400 audit(1679515844.992:110): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=2398 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us systemd[1]: Started postgresql@13-main.service - PostgreSQL Cluster 13-main. Mar 22 16:10:45 jik5.kamens.us systemd[1]: Started postgresql@12-main.service - PostgreSQL Cluster 12-main. Mar 22 16:10:45 jik5.kamens.us audit[2402]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=2402 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us kernel: audit: type=1400 audit(1679515845.052:111): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=2402 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us systemd[1]: Started postgresql@11-main.service - PostgreSQL Cluster 11-main. Mar 22 16:10:45 jik5.kamens.us audit[2779]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.chromium.hook.configure" pid=2779 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us systemd[1]: Started postgresql@15-main.service - PostgreSQL Cluster 15-main. Mar 22 16:10:45 jik5.kamens.us kernel: audit: type=1400 audit(1679515845.072:112): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.chromium.hook.configure" pid=2779 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2780]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.firefox" pid=2780 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2775]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=2775 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2776]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=2776 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2777]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.chromium.chromedriver" pid=2777 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2783]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=2783 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2782]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.configure" pid=2782 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2784]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=2784 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2778]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.chromium.chromium" pid=2778 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2781]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.geckodriver" pid=2781 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2785]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=2785 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2786]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.core" pid=2786 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2788]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.cups" pid=2788 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2787]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.core.hook.configure" pid=2787 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2789]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.accept" pid=2789 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2792]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsaccept" pid=2792 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2791]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cups-browsed" pid=2791 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2793]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsctl" pid=2793 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2794]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsd" pid=2794 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2790]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cancel" pid=2790 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2795]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsdisable" pid=2795 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2796]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsenable" pid=2796 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2801]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.gs" pid=2801 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2798]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsreject" pid=2798 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2797]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsfilter" pid=2797 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2799]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupstestppd" pid=2799 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2800]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.driverless" pid=2800 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2802]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.ippeveprinter" pid=2802 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2804]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.ippfind" pid=2804 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2805]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.ipptool" pid=2805 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2806]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lp" pid=2806 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2809]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpinfo" pid=2809 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2807]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpadmin" pid=2807 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2811]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpq" pid=2811 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2813]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lprm" pid=2813 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2808]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpc" pid=2808 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2810]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpoptions" pid=2810 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2812]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpr" pid=2812 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us systemd[1]: Starting postgresql.service - PostgreSQL RDBMS... Mar 22 16:10:45 jik5.kamens.us audit[2816]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=2816 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2815]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.reject" pid=2815 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us systemd[1]: Finished postgresql.service - PostgreSQL RDBMS. Mar 22 16:10:45 jik5.kamens.us audit[2814]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpstat" pid=2814 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2821]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.util" pid=2821 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2817]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.cli" pid=2817 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2818]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.daemon" pid=2818 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2820]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.tx" pid=2820 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2819]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.qt" pid=2819 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2823]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.bw" pid=2823 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2822]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.wallet" pid=2822 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2825]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=2825 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2824]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bw.bw" pid=2824 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2828]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=2828 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2831]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=2831 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2829]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=2829 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2827]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=2827 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2830]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=2830 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2826]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=2826 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2832]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.hook.configure" pid=2832 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2838]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.vault" pid=2838 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2834]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=2834 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2836]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=2836 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2833]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.snap-store" pid=2833 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2839]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.vault.vault" pid=2839 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2837]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=2837 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us audit[2835]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=2835 comm="apparmor_parser" Mar 22 16:10:45 jik5.kamens.us systemd[1]: Started snapd.service - Snap Daemon. Mar 22 16:10:45 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' requested by ':1.26' (uid=0 pid=1720 comm="/usr/lib/snapd/snapd" label="unconfined") Mar 22 16:10:45 jik5.kamens.us systemd[1]: Starting snapd.seeded.service - Wait until snapd is fully seeded... Mar 22 16:10:45 jik5.kamens.us systemd[1]: Starting systemd-timedated.service - Time & Date Service... Mar 22 16:10:45 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: Link is Up - 1Gbps/Full - flow control rx/tx Mar 22 16:10:45 jik5.kamens.us kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0: link becomes ready Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3476] device (enp2s0): carrier: link connected Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3480] device (enp2s0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3487] policy: auto-activating connection 'Wired connection 1' (1214ff09-82f6-38e6-8d8b-fb7bb07ff6cb) Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3492] device (enp2s0): Activation: starting connection 'Wired connection 1' (1214ff09-82f6-38e6-8d8b-fb7bb07ff6cb) Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3493] device (enp2s0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3499] manager: NetworkManager state is now CONNECTING Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3501] device (enp2s0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3509] device (enp2s0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3528] policy: set 'Wired connection 1' (enp2s0) as default for IPv4 routing and DNS Mar 22 16:10:45 jik5.kamens.us systemd-resolved[1357]: enp2s0: Bus client set search domain list to: kamens.brookline.ma.us, kamens.us Mar 22 16:10:45 jik5.kamens.us systemd-resolved[1357]: enp2s0: Bus client set default route setting: yes Mar 22 16:10:45 jik5.kamens.us systemd-resolved[1357]: enp2s0: Bus client set DNS server list to: 127.0.0.1 Mar 22 16:10:45 jik5.kamens.us avahi-daemon[1692]: Joining mDNS multicast group on interface enp2s0.IPv4 with address 192.168.4.11. Mar 22 16:10:45 jik5.kamens.us avahi-daemon[1692]: New relevant interface enp2s0.IPv4 for mDNS. Mar 22 16:10:45 jik5.kamens.us avahi-daemon[1692]: Registering new address record for 192.168.4.11 on enp2s0.IPv4. Mar 22 16:10:45 jik5.kamens.us named[1914]: listening on IPv4 interface enp2s0, 192.168.4.11#53 Mar 22 16:10:45 jik5.kamens.us avahi-daemon[1692]: Registering new address record for 192.168.4.17 on enp2s0.IPv4. Mar 22 16:10:45 jik5.kamens.us avahi-daemon[1692]: Joining mDNS multicast group on interface enp2s0.IPv6 with address fe80::86a3:4d63:740b:50a6. Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3616] device (enp2s0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Mar 22 16:10:45 jik5.kamens.us avahi-daemon[1692]: New relevant interface enp2s0.IPv6 for mDNS. Mar 22 16:10:45 jik5.kamens.us avahi-daemon[1692]: Registering new address record for fe80::86a3:4d63:740b:50a6 on enp2s0.*. Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3650] device (enp2s0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3654] device (enp2s0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3659] manager: NetworkManager state is now CONNECTED_SITE Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.3664] device (enp2s0): Activation: successful, device activated. Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f871c00eb48 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/A/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f871c0129f8 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/AAAA/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f870402db58 192.168.4.16#38439 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/AAAA/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f8704030e78 192.168.4.16#38439 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/A/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f870c02a0a8 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/A/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f870c004f38 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/AAAA/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f870c004f38 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/A/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f870c02a0a8 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/AAAA/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f870c02a0a8 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/A/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: client @0x7f870c004f38 192.168.4.16#39377 (api.insight.synology.com): view opendns: query (cache) 'api.insight.synology.com/AAAA/IN' denied (allow-query-cache did not match) Mar 22 16:10:45 jik5.kamens.us named[1914]: listening on IPv4 interface enp2s0, 192.168.4.17#53 Mar 22 16:10:45 jik5.kamens.us named[1914]: listening on IPv6 interface enp2s0, fe80::86a3:4d63:740b:50a6%2#53 Mar 22 16:10:45 jik5.kamens.us named[1914]: received control channel command 'reconfig' Mar 22 16:10:45 jik5.kamens.us named[1914]: loading configuration from '/etc/bind/named.conf' Mar 22 16:10:45 jik5.kamens.us named[1914]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:10:45 jik5.kamens.us named[1914]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:10:45 jik5.kamens.us named[1914]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:10:45 jik5.kamens.us named[1914]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:10:45 jik5.kamens.us named[1914]: sizing zone task pool based on 50 zones Mar 22 16:10:45 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.timedate1' Mar 22 16:10:45 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:45 jik5.kamens.us systemd[1]: Started systemd-timedated.service - Time & Date Service. Mar 22 16:10:45 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:45 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:45 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:45 jik5.kamens.us named[1914]: reloading configuration succeeded Mar 22 16:10:45 jik5.kamens.us systemd[1]: Finished snapd.seeded.service - Wait until snapd is fully seeded. Mar 22 16:10:45 jik5.kamens.us systemd[1]: snapd.autoimport.service - Auto import assertions from block devices was skipped because no trigger condition checks were met. Mar 22 16:10:45 jik5.kamens.us named[1914]: scheduled loading new zones Mar 22 16:10:45 jik5.kamens.us audit[1925]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=1925 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:45 jik5.kamens.us audit[1925]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=1925 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:45 jik5.kamens.us audit[1928]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=1928 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:45 jik5.kamens.us audit[1928]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=1928 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:45 jik5.kamens.us named[1914]: any newly configured zones are now loaded Mar 22 16:10:45 jik5.kamens.us named[1914]: running Mar 22 16:10:45 jik5.kamens.us systemd[1]: Starting ssh.service - OpenBSD Secure Shell server... Mar 22 16:10:45 jik5.kamens.us sshd[2958]: Server listening on :: port 22. Mar 22 16:10:45 jik5.kamens.us NetworkManager[1823]: [1679515845.5935] manager: NetworkManager state is now CONNECTED_GLOBAL Mar 22 16:10:45 jik5.kamens.us sshd[2958]: Server listening on :: port 2223. Mar 22 16:10:45 jik5.kamens.us systemd[1]: Started ssh.service - OpenBSD Secure Shell server. Mar 22 16:10:45 jik5.kamens.us systemd[1]: tmp-snap.rootfs_ZDZpJk.mount: Deactivated successfully. Mar 22 16:10:45 jik5.kamens.us systemd[1]: tmp-snap.rootfs_mM24lq.mount: Deactivated successfully. Mar 22 16:10:45 jik5.kamens.us named[1914]: received control channel command 'reconfig' Mar 22 16:10:45 jik5.kamens.us named[1914]: loading configuration from '/etc/bind/named.conf' Mar 22 16:10:45 jik5.kamens.us named[1914]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:10:45 jik5.kamens.us named[1914]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:10:45 jik5.kamens.us named[1914]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:10:45 jik5.kamens.us named[1914]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:10:45 jik5.kamens.us named[1914]: sizing zone task pool based on 50 zones Mar 22 16:10:45 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:45 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:45 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:45 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:45 jik5.kamens.us named[1914]: reloading configuration succeeded Mar 22 16:10:45 jik5.kamens.us named[1914]: scheduled loading new zones Mar 22 16:10:45 jik5.kamens.us named[1914]: any newly configured zones are now loaded Mar 22 16:10:45 jik5.kamens.us named[1914]: running Mar 22 16:10:46 jik5.kamens.us kernel: usb 1-7.4.3: New USB device found, idVendor=046d, idProduct=082d, bcdDevice= 0.11 Mar 22 16:10:46 jik5.kamens.us kernel: usb 1-7.4.3: New USB device strings: Mfr=0, Product=2, SerialNumber=1 Mar 22 16:10:46 jik5.kamens.us kernel: usb 1-7.4.3: Product: HD Pro Webcam C920 Mar 22 16:10:46 jik5.kamens.us kernel: usb 1-7.4.3: SerialNumber: ED48865F Mar 22 16:10:46 jik5.kamens.us kernel: usb 1-7.4.3: Found UVC 1.00 device HD Pro Webcam C920 (046d:082d) Mar 22 16:10:46 jik5.kamens.us kernel: input: HD Pro Webcam C920 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0/input/input31 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + mkdir -p /var/snap/cups/872/var/log Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/872/var/run/certs Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + mkdir -p /var/snap/cups/872/var/cache Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + mkdir -p /var/snap/cups/872/var/run Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/872/var/log Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + mkdir -p /var/snap/cups/common/etc/cups Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/872/var/cache/fontconfig Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + CONF=/var/snap/cups/common/etc/cups/cups-browsed.conf Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + CLIENTCONF=/var/snap/cups/common/etc/cups/client.conf Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + DAEMON=cups-browsed Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + export LC_ALL=C.UTF-8 Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + export LANG=C.UTF-8 Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + TMPDIR=/var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + mkdir -p /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/common/etc/cups/ppd Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/common/etc/cups/ssl Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/common/run Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -m 0755 -p /run/cups Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + export LC_ALL=C.UTF-8 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + export LANG=C.UTF-8 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + export TMPDIR=/var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + CUPSSTARTED=0 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + CUPSTMPDIR=/var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ -d /var/snap/cups/872/tmp ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chown -R root.root /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[3189]: + seq 60 Mar 22 16:10:46 jik5.kamens.us mtp-probe[3191]: checking bus 1, device 16: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3" Mar 22 16:10:46 jik5.kamens.us mtp-probe[3191]: bus: 1, device: 16 was not an MTP device Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + [ -r /var/snap/cups/872/var/run/cupsd.pid ] Mar 22 16:10:46 jik5.kamens.us cups.cups-browsed[1926]: + sleep 1 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chmod -R u+rwX /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + rm -rf /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ -d /var/snap/cups/872/tmp ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ -d /var/snap/cups/872/var/spool/tmp ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chown -R root.root /var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chmod -R u+rwX /var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us systemd-udevd[762]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + rm -rf /var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ -d /var/snap/cups/872/var/spool/tmp ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chown -R root.root /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chmod -R 1777 /var/snap/cups/872/tmp Mar 22 16:10:46 jik5.kamens.us systemd-udevd[762]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mkdir -p /var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chown -R root.snap_daemon /var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chmod -R 1770 /var/snap/cups/872/var/spool/tmp Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + CUPSUSER=snap_daemon Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + ALTCUPSUSER=root Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + CUPSGROUP=snap_daemon Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + ALTCUPSGROUP=root Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + CUPSSYSTEMGROUP=lpadmin Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + ALTCUPSSYSTEMGROUP=adm Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + TESTFILE=/var/snap/cups/872/tmp/testfile Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + touch /var/snap/cups/872/tmp/testfile Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chown snap_daemon /var/snap/cups/872/tmp/testfile Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + chgrp snap_daemon /var/snap/cups/872/tmp/testfile Mar 22 16:10:46 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + rm -f /var/snap/cups/872/tmp/testfile Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + getent group lpadmin Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ ! -f /var/snap/cups/common/etc/cups/cups-files.conf ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + perl -p -i -e s:^(\s*\#)?\s*User\s+\S+\s*$:User snap_daemon\n:; -e s:^(\s*\#)?\s*Group\s+.*$:Group snap_daemon:; -e s:^(\s*\#)?\s*SystemGroup\s+.*$:SystemGroup lpadmin root:; -e s:^(\s*\#)?\s*AccessLog\s+.*$:AccessLog /var/snap/cups/872/var/log/access_log:; -e s:^(\s*\#)?\s*CacheDir\s+.*$:CacheDir /var/snap/cups/872/var/cache:; -e s:^(\s*\#)?\s*DataDir\s+.*$:DataDir /snap/cups/872/share/cups:; -e s:^(\s*\#)?\s*DocumentRoot\s+.*$:DocumentRoot /snap/cups/872/share/cups/doc:; -e s:^(\s*\#)?\s*ErrorLog\s+.*$:ErrorLog /var/snap/cups/872/var/log/error_log:; -e s:^(\s*\#)?\s*FontPath\s+.*$:\#FontPath (NOT SUPPORTED ANY MORE):; -e s:^(\s*\#)?\s*PageLog\s+.*$:PageLog /var/snap/cups/872/var/log/page_log:; -e s:^(\s*\#)?\s*Printcap\s+.*$:Printcap /var/snap/cups/common/etc/printcap:; -e s:^(\s*\#)?\s*RequestRoot\s+.*$:RequestRoot /var/snap/cups/872/var/spool:; -e s:^(\s*\#)?\s*ServerBin\s+.*$:ServerBin /snap/cups/872/lib/cups:; -e s:^(\s*\#)?\s*ServerRoot\s+.*$:ServerRoot /var/snap/cups/common/etc/cups:; -e s:^(\s*\#)?\s*StateDir\s+.*$:StateDir /var/snap/cups/872/var/run:; -e s:^(\s*\#)?\s*TempDir\s+.*$:TempDir /var/snap/cups/872/var/spool/tmp:; /var/snap/cups/common/etc/cups/cups-files.conf Mar 22 16:10:46 jik5.kamens.us systemd-udevd[756]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us systemd-udevd[756]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us systemd-udevd[768]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us mtp-probe[3271]: checking bus 1, device 16: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3" Mar 22 16:10:46 jik5.kamens.us mtp-probe[3271]: bus: 1, device: 16 was not an MTP device Mar 22 16:10:46 jik5.kamens.us systemd-udevd[768]: 1-7.4.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3 189:15' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us systemd-udevd[768]: 1-7.4.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3 189:15' failed with exit code 1. Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + PROXY_MODE=NO Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + SYSTEM_CUPS_SERVER= Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + rm -f /var/snap/cups/872/var/run/proxy-mode Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ ! -f /var/snap/cups/common/no-proxy ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ -r /etc/cups/cupsd.conf ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + touch /var/snap/cups/872/var/run/proxy-mode Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + PROXY_MODE=YES Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + SYSTEM_CUPS_SERVER=localhost:631 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3288]: + grep -E ^[ \t]*Listen[ \t]+/ /etc/cups/cupsd.conf Mar 22 16:10:46 jik5.kamens.us canonical-livepatch.canonical-livepatchd[1925]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + LINE=Listen /run/cups/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3291]: + echo Listen /run/cups/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3292]: + head -1 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3293]: + perl -p -e s:^\s*Listen\s+(\S+)\s*$:\1: Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + SYSTEM_CUPS_SERVER=/run/cups/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + PORT=631 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + ALTPORT=10631 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + DOMAINSOCKET=/run/cups/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ ! -d /run/cups ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + ALTDOMAINSOCKET=/var/snap/cups/common/run/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ YES = YES ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + PORT= Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + DOMAINSOCKET=/var/snap/cups/common/run/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ ! -f /var/snap/cups/common/etc/cups/cupsd.conf ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ YES = YES ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3295]: + cat /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3296]: + grep -v Listen Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3297]: + grep -v Port Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + mv /var/snap/cups/common/etc/cups/cupsd.conf.new /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + LISTENLINES= Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ /var/snap/cups/common/run/cups.sock = /var/snap/cups/common/run/cups.sock ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + LISTENLINES=Listen /var/snap/cups/common/run/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3300]: + cat /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3301]: + grep -v Listen Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + echo Listen /var/snap/cups/common/run/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + cat /var/snap/cups/common/etc/cups/cupsd.conf.new Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + rm -f /var/snap/cups/common/etc/cups/cupsd.conf.new Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + touch /var/snap/cups/common/etc/cups/client.conf Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3306]: + cat /var/snap/cups/common/etc/cups/client.conf Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3307]: + grep -v ServerName Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3305]: + true Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + echo ServerName /var/snap/cups/common/run/cups.sock Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + cat /var/snap/cups/common/etc/cups/client.conf.new Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + rm -f /var/snap/cups/common/etc/cups/client.conf.new Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ ! -f /var/snap/cups/common/etc/cups/snmp.conf ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3310]: + yes n Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3311]: + cp -ri /snap/cups/872/etc/cups/ppd /var/snap/cups/common/etc/cups/ Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3312]: + yes n Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3313]: + cp -ri /snap/cups/872/etc/cups/ssl /var/snap/cups/common/etc/cups/ Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + SCHEDULER=cupsd Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + CUPS_PID=3314 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + echo 3314 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + [ YES = YES ] Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + PROXY_DAEMON=cups-proxyd Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + PROXYD_PID=3315 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3315]: + Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + echo 3315 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3315]: exec Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3315]: cups-proxyd /var/snap/cups/common/run/cups.sock /run/cups/cups.sock -l --logdir /var/snap/cups/872/var/log Mar 22 16:10:46 jik5.kamens.us cups.cupsd[1928]: + wait 3314 Mar 22 16:10:46 jik5.kamens.us cups.cupsd[3314]: + exec cupsd -f -s /var/snap/cups/common/etc/cups/cups-files.conf -c /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:10:47 jik5.kamens.us audit[3314]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3314 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7fb13a0e839b code=0x50000 Mar 22 16:10:47 jik5.kamens.us kernel: kauditd_printk_skb: 67 callbacks suppressed Mar 22 16:10:47 jik5.kamens.us kernel: audit: type=1326 audit(1679515847.264:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3314 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7fb13a0e839b code=0x50000 Mar 22 16:10:47 jik5.kamens.us audit[1694]: USER_AVC pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/ColorManager/devices/cups_HP_Color_LaserJet_Pro_M478f_9f_3279B8" interface="org.freedesktop.ColorManager.Device" member="AddProfile" mask="send" name="org.freedesktop.ColorManager" pid=3314 label="snap.cups.cupsd" peer_pid=2070 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:10:47 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:10:47 jik5.kamens.us audit[1694]: USER_AVC pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/ColorManager/devices/cups_HP_Color_LaserJet_Pro_M478f_9f_3279B8" interface="org.freedesktop.ColorManager.Device" member="AddProfile" mask="send" name="org.freedesktop.ColorManager" pid=3314 label="snap.cups.cupsd" peer_pid=2070 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:10:47 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:10:47 jik5.kamens.us kernel: audit: type=1107 audit(1679515847.324:181): pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/ColorManager/devices/cups_HP_Color_LaserJet_Pro_M478f_9f_3279B8" interface="org.freedesktop.ColorManager.Device" member="AddProfile" mask="send" name="org.freedesktop.ColorManager" pid=3314 label="snap.cups.cupsd" peer_pid=2070 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:10:47 jik5.kamens.us kernel: audit: type=1420 audit(1679515847.324:182): subj_apparmor=unconfined Mar 22 16:10:47 jik5.kamens.us kernel: audit: type=1107 audit(1679515847.324:183): pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/ColorManager/devices/cups_HP_Color_LaserJet_Pro_M478f_9f_3279B8" interface="org.freedesktop.ColorManager.Device" member="AddProfile" mask="send" name="org.freedesktop.ColorManager" pid=3314 label="snap.cups.cupsd" peer_pid=2070 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:10:47 jik5.kamens.us kernel: audit: type=1420 audit(1679515847.324:184): subj_apparmor=unconfined Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + [ -r /var/snap/cups/872/var/run/cupsd.pid ] Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[3378]: + cat /var/snap/cups/872/var/run/cupsd.pid Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + PID=3314 Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + [ -n 3314 ] Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + kill -0 3314 Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + CUPSSTARTED=1 Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + break Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + [ 1 = 0 ] Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + PID= Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + [ ! -e /var/snap/cups/872/var/run/proxy-mode ] Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + PID=3380 Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[3380]: + Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[3380]: true Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: echo Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: 3380 Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[3380]: + sleep 3600 Mar 22 16:10:47 jik5.kamens.us cups.cups-browsed[1926]: + wait 3380 Mar 22 16:10:47 jik5.kamens.us yubikey-monitor.sh[1734]: {"status":1,"request":"86c43ed7-df00-4546-a698-2a3ce216473a"} Mar 22 16:10:47 jik5.kamens.us yubikey-monitor.sh[1734]: Triggered https://api.pushover.net/1/messages.json Mar 22 16:10:48 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 1. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:48 jik5.kamens.us canonical-livepatch.canonical-livepatchd[3473]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:48 jik5.kamens.us sshd[2982]: fatal: Access denied for user jik by PAM account configuration [preauth] Mar 22 16:10:48 jik5.kamens.us audit[3315]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3315 comm="cups-proxyd" exe="/snap/cups/872/sbin/cups-proxyd" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7fef5f21d73d code=0x50000 Mar 22 16:10:48 jik5.kamens.us kernel: audit: type=1326 audit(1679515848.292:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3315 comm="cups-proxyd" exe="/snap/cups/872/sbin/cups-proxyd" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7fef5f21d73d code=0x50000 Mar 22 16:10:48 jik5.kamens.us systemd[1]: dmesg.service: Deactivated successfully. Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 2. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:48 jik5.kamens.us audit[3502]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3502 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:48 jik5.kamens.us audit[3502]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3502 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:48 jik5.kamens.us kernel: audit: type=1400 audit(1679515848.500:186): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3502 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:48 jik5.kamens.us kernel: audit: type=1400 audit(1679515848.500:187): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3502 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:48 jik5.kamens.us canonical-livepatch.canonical-livepatchd[3502]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:48 jik5.kamens.us NetworkManager[1823]: [1679515848.5845] manager: startup complete Mar 22 16:10:48 jik5.kamens.us systemd[1]: Finished NetworkManager-wait-online.service - Network Manager Wait Online. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Reached target network-online.target - Network is Online. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started update-notifier-download.timer - Download data for packages that failed at package install time. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started update-notifier-motd.timer - Check to see whether there is a new version of Ubuntu available. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Reached target timers.target - Timer Units. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounting home-jik-ogg.mount - /home/jik/ogg... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounting home-jik-pictures.mount - /home/jik/pictures... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-music.mount - /mnt/nas/nfs/music... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-video.mount - /mnt/nas/nfs/video... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounting mnt-video.mount - /mnt/video... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started cups-browsed.service - Make remote CUPS printers available locally. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting ddclient.service - Update dynamic domain name service entries... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting docker.service - Docker Application Container Engine... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting inotify-canary-pause.service - Pause inotify canary on shutdown... Mar 22 16:10:48 jik5.kamens.us kernel: FS-Cache: Loaded Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started mongod.service - MongoDB Database Server. Mar 22 16:10:48 jik5.kamens.us inotify-canary[3569]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args post inotify-canary-pause.service Mar 22 16:10:48 jik5.kamens.us inotify-canary[3571]: /etc/NetworkManager/dispatcher.d/inotify-canary: forked from 3569 Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting postfix@-.service - Postfix Mail Transport Agent (instance -)... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting rc-local.service - /etc/rc.local Compatibility... Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting rpc-statd-notify.service - Notify NFS peers of a restart... Mar 22 16:10:48 jik5.kamens.us systemd[1]: ubuntu-advantage.service - Ubuntu Pro Background Auto Attach was skipped because no trigger condition checks were met. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting ubuntu-fan.service - Ubuntu FAN network setup... Mar 22 16:10:48 jik5.kamens.us sm-notify[3575]: Version 2.6.2 starting Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Finished inotify-canary-pause.service - Pause inotify canary on shutdown. Mar 22 16:10:48 jik5.kamens.us su[3573]: (to jik) root on none Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 3. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started rpc-statd-notify.service - Notify NFS peers of a restart. Mar 22 16:10:48 jik5.kamens.us su[3573]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:10:48 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.network1' unit='dbus-org.freedesktop.network1.service' requested by ':1.33' (uid=0 pid=3592 comm="networkctl" label="unconfined") Mar 22 16:10:48 jik5.kamens.us dbus-daemon[1694]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.network1.service': Unit dbus-org.freedesktop.network1.service not found. Mar 22 16:10:48 jik5.kamens.us audit[3587]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3587 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:48 jik5.kamens.us audit[3587]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3587 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:48 jik5.kamens.us kernel: audit: type=1400 audit(1679515848.728:188): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3587 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:48 jik5.kamens.us kernel: audit: type=1400 audit(1679515848.728:189): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3587 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:48 jik5.kamens.us systemd[1]: Finished ubuntu-fan.service - Ubuntu FAN network setup. Mar 22 16:10:48 jik5.kamens.us whoopsie[3581]: [16:10:48] Using lock path: /var/lock/whoopsie/lock Mar 22 16:10:48 jik5.kamens.us canonical-livepatch.canonical-livepatchd[3587]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:48 jik5.kamens.us kernel: Key type cifs.spnego registered Mar 22 16:10:48 jik5.kamens.us kernel: Key type cifs.idmap registered Mar 22 16:10:48 jik5.kamens.us kernel: CIFS: No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount. Mar 22 16:10:48 jik5.kamens.us kernel: CIFS: Attempting to mount \\nas.kamens.brookline.ma.us\video Mar 22 16:10:48 jik5.kamens.us systemd[1]: Created slice user-1000.slice - User Slice of UID 1000. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000... Mar 22 16:10:48 jik5.kamens.us kernel: NFS: Registering the id_resolver key type Mar 22 16:10:48 jik5.kamens.us kernel: Key type id_resolver registered Mar 22 16:10:48 jik5.kamens.us kernel: Key type id_legacy registered Mar 22 16:10:48 jik5.kamens.us systemd[1]: Started ddclient.service - Update dynamic domain name service entries. Mar 22 16:10:48 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:48 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:48 jik5.kamens.us nm-dispatcher[3673]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args enp2s0 up Mar 22 16:10:48 jik5.kamens.us nm-dispatcher[3673]: /etc/NetworkManager/dispatcher.d/inotify-canary: unpause mode Mar 22 16:10:48 jik5.kamens.us nm-dispatcher[3684]: /etc/NetworkManager/dispatcher.d/inotify-canary: forked from 3673 Mar 22 16:10:48 jik5.kamens.us systemd[1]: Finished user-runtime-dir@1000.service - User Runtime Directory /run/user/1000. Mar 22 16:10:48 jik5.kamens.us su[3685]: (to jik) root on none Mar 22 16:10:48 jik5.kamens.us nm-dispatcher[3689]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args connectivity-change Mar 22 16:10:48 jik5.kamens.us su[3685]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:10:48 jik5.kamens.us kernel: CIFS: Attempting to mount \\nas.kamens.brookline.ma.us\photo Mar 22 16:10:48 jik5.kamens.us nm-dispatcher[3689]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:10:48 jik5.kamens.us nm-dispatcher[1959]: req:5 'connectivity-change', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:10:48 jik5.kamens.us NetworkManager[1823]: [1679515848.9705] dispatcher: (5) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:10:48 jik5.kamens.us systemd[1]: Mounted mnt-video.mount - /mnt/video. Mar 22 16:10:49 jik5.kamens.us kernel: CIFS: Attempting to mount \\nas.kamens.brookline.ma.us\music Mar 22 16:10:49 jik5.kamens.us systemd[1]: Starting rpc-statd.service - NFS status monitor for NFSv2/3 locking.... Mar 22 16:10:49 jik5.kamens.us rpc.statd[3710]: Version 2.6.2 starting Mar 22 16:10:49 jik5.kamens.us rpc.statd[3710]: Flags: TI-RPC Mar 22 16:10:49 jik5.kamens.us systemd[1]: Mounted home-jik-ogg.mount - /home/jik/ogg. Mar 22 16:10:49 jik5.kamens.us systemd[1]: Mounted home-jik-pictures.mount - /home/jik/pictures. Mar 22 16:10:49 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 4. Mar 22 16:10:49 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:49 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:49 jik5.kamens.us systemd[1]: Started rpc-statd.service - NFS status monitor for NFSv2/3 locking.. Mar 22 16:10:49 jik5.kamens.us mount[3715]: Created symlink /run/systemd/system/remote-fs.target.wants/rpc-statd.service → /lib/systemd/system/rpc-statd.service. Mar 22 16:10:49 jik5.kamens.us systemd[1]: Reloading. Mar 22 16:10:49 jik5.kamens.us canonical-livepatch.canonical-livepatchd[3711]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:49 jik5.kamens.us audit[3314]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3314 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7fb13a0e839b code=0x50000 Mar 22 16:10:49 jik5.kamens.us ddclient[3789]: FAILED: updating Home: unexpected status (13) Mar 22 16:10:49 jik5.kamens.us ddclient[3791]: SUCCESS: updating : good: IP address set to 108.26.214.208 Mar 22 16:10:49 jik5.kamens.us ddclient[3793]: FAILED: updating : unexpected status (0) Mar 22 16:10:49 jik5.kamens.us ddclient[3795]: FAILED: was not updated because protocol is not supported. Mar 22 16:10:50 jik5.kamens.us nfsrahead[3892]: setting /mnt/nas/nfs/music readahead to 128 Mar 22 16:10:50 jik5.kamens.us nfsrahead[3893]: setting /mnt/nas/nfs/homes readahead to 128 Mar 22 16:10:50 jik5.kamens.us nfsrahead[3891]: setting /mnt/nas/nfs/video readahead to 128 Mar 22 16:10:50 jik5.kamens.us postfix[3894]: Postfix is using backwards-compatible default settings Mar 22 16:10:50 jik5.kamens.us postfix[3894]: See http://www.postfix.org/COMPATIBILITY_README.html for details Mar 22 16:10:50 jik5.kamens.us postfix[3894]: To disable backwards compatibility use "postconf compatibility_level=3.6" and "postfix reload" Mar 22 16:10:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-music.mount - /mnt/nas/nfs/music. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-video.mount - /mnt/nas/nfs/video. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Reached target remote-fs.target - Remote File Systems. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting apache2.service - The Apache HTTP Server... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting apport.service - automatic crash report generation... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting atd.service - Deferred execution scheduler... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started cron.service - Regular background program processing daemon. Mar 22 16:10:50 jik5.kamens.us cron[3905]: (CRON) INFO (pidfile fd = 3) Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting kerneloops.service - Tool to automatically collect and submit kernel crash signatures... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting nvidia-persistenced.service - NVIDIA Persistence Daemon... Mar 22 16:10:50 jik5.kamens.us systemd[1]: systemd-pcrphase.service - TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting virtualbox.service - LSB: VirtualBox Linux kernel module... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started atd.service - Deferred execution scheduler. Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: Verbose syslog connection opened Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: Now running with user ID 138 and group ID 151 Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: Started (3914) Mar 22 16:10:50 jik5.kamens.us systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting user@1000.service - User Manager for UID 1000... Mar 22 16:10:50 jik5.kamens.us cron[3905]: (quantobox) ORPHAN (no passwd entry) Mar 22 16:10:50 jik5.kamens.us systemd[1]: kerneloops.service: Found left-over process 3925 (kerneloops) in control group while starting unit. Ignoring. Mar 22 16:10:50 jik5.kamens.us cron[3905]: (CRON) INFO (Running @reboot jobs) Mar 22 16:10:50 jik5.kamens.us systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies. Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: Failed to query NVIDIA devices. Please ensure that the NVIDIA device files (/dev/nvidia*) exist, and that user 138 has read and write permissions for those files. Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: PID file unlocked. Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: PID file closed. Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: The daemon no longer has permission to remove its runtime data directory /var/run/nvidia-persistenced Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3914]: Shutdown (3914) Mar 22 16:10:50 jik5.kamens.us nvidia-persistenced[3907]: nvidia-persistenced failed to initialize. Check syslog for more details. Mar 22 16:10:50 jik5.kamens.us systemd[1]: nvidia-persistenced.service: Control process exited, code=exited, status=1/FAILURE Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started kerneloops.service - Tool to automatically collect and submit kernel crash signatures. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started virtualbox.service - LSB: VirtualBox Linux kernel module. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: pam_unix(systemd-user:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:10:50 jik5.kamens.us systemd[1]: nvidia-persistenced.service: Failed with result 'exit-code'. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Failed to start nvidia-persistenced.service - NVIDIA Persistence Daemon. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 5. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: Configuration file /etc/xdg/autostart/uwidgets-runner.desktop is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:10:50 jik5.kamens.us canonical-livepatch.canonical-livepatchd[3968]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: Exec binary '/usr/lib/x86_64-linux-gnu/indicator-application/indicator-application-service' does not exist: No such file or directory Mar 22 16:10:50 jik5.kamens.us sshd[3786]: Accepted publickey for jik from 108.26.214.208 port 42248 ssh2: RSA SHA256:7B5dW0NpivfauagjvRswW+qF9OUlKVJP3hIYA1A1/Rs Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: /etc/xdg/autostart/indicator-application.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: Exec binary '/usr/share/ibus-mozc/ibus-mozc-gnome-initial-setup.sh' does not exist: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: /etc/xdg/autostart/ibus-mozc-gnome-initial-setup.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: Exec binary '/usr/libexec/gnome-shell-overrides-migration.sh' does not exist: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: /etc/xdg/autostart/gnome-shell-overrides-migration.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: Exec binary 'nemo-desktop' does not exist: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: /etc/xdg/autostart/nemo-unity-autostart.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:50 jik5.kamens.us sshd[3786]: pam_unix(sshd:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: Exec binary 'gsettings-data-convert' does not exist: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd-xdg-autostart-generator[3952]: /etc/xdg/autostart/gsettings-data-convert.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started apache2.service - The Apache HTTP Server. Mar 22 16:10:50 jik5.kamens.us systemd-logind[1726]: New session 2 of user jik. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting apport-autoreport.service - Process error reports when automatic reporting is enabled... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Finished apport.service - automatic crash report generation. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 6. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us whoopsie[4098]: [16:10:50] Using lock path: /var/lock/whoopsie/lock Mar 22 16:10:50 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:10:50 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4099]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.497022584-04:00" level=info msg="Starting up" Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.502726510-04:00" level=info msg="detected 127.0.0.53 nameserver, assuming systemd-resolved, so using resolv.conf: /run/systemd/resolve/resolv.conf" Mar 22 16:10:50 jik5.kamens.us postfix/postfix-script[4211]: starting the Postfix mail system Mar 22 16:10:50 jik5.kamens.us postfix/master[4213]: daemon started -- version 3.7.4, configuration /etc/postfix Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started postfix@-.service - Postfix Mail Transport Agent (instance -). Mar 22 16:10:50 jik5.kamens.us audit[4186]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=4186 comm="apparmor_parser" Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.567262759-04:00" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.567285981-04:00" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.567311059-04:00" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.567327324-04:00" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.591185843-04:00" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.591208672-04:00" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.591228645-04:00" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.591246400-04:00" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 22 16:10:50 jik5.kamens.us systemd[1]: Starting postfix.service - Postfix Mail Transport Agent... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Finished postfix.service - Postfix Mail Transport Agent. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 7. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us audit[4228]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=4228 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:50 jik5.kamens.us audit[4228]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=4228 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:50 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4228]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.692033898-04:00" level=info msg="[graphdriver] using prior storage driver: overlay2" Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Queued start job for default target default.target. Mar 22 16:10:50 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:50.732758625-04:00" level=info msg="Loading containers: start." Mar 22 16:10:50 jik5.kamens.us kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 22 16:10:50 jik5.kamens.us kernel: Bridge firewalling registered Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Created slice app.slice - User Application Slice. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Created slice session.slice - User Core Session Slice. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Created slice background.slice - User Background Tasks Slice. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started ubuntu-report.path - Pending report trigger for Ubuntu Report. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Reached target paths.target - Paths. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Reached target timers.target - Timers. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Starting dbus.socket - D-Bus User Message Bus Socket... Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on dirmngr.socket - GnuPG network certificate management daemon. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on gcr-ssh-agent.socket - GCR ssh-agent wrapper. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on gnome-keyring-daemon.socket - GNOME Keyring daemon. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on gpg-agent-browser.socket - GnuPG cryptographic agent and passphrase cache (access for web browsers). Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on gpg-agent-extra.socket - GnuPG cryptographic agent and passphrase cache (restricted). Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on gpg-agent-ssh.socket - GnuPG cryptographic agent (ssh-agent emulation). Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on gpg-agent.socket - GnuPG cryptographic agent and passphrase cache. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on pipewire.socket - PipeWire Multimedia System Socket. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on pk-debconf-helper.socket - debconf communication socket. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on snapd.session-agent.socket - REST API socket for snapd user session agent. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 8. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Listening on dbus.socket - D-Bus User Message Bus Socket. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Reached target sockets.target - Sockets. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Reached target basic.target - Basic System. Mar 22 16:10:50 jik5.kamens.us whoopsie-upload-all[4094]: INFO:root: skipping, not a crash Mar 22 16:10:50 jik5.kamens.us kernel: Initializing XFRM netlink socket Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started appimagelauncherd.service - AppImageLauncher daemon. Mar 22 16:10:50 jik5.kamens.us whoopsie-upload-all[4094]: INFO:root:/var/crash/_usr_libexec_tracker-extract-3.1000.crash already marked for upload, skipping Mar 22 16:10:50 jik5.kamens.us whoopsie-upload-all[4094]: INFO:root:/var/crash/_usr_lib_x86_64-linux-gnu_indicator-messages_indicator-messages-service.1000.crash already marked for upload, skipping Mar 22 16:10:50 jik5.kamens.us whoopsie-upload-all[4094]: INFO:root:/var/crash/_usr_bin_gnome-shell.1000.crash already marked for upload, skipping Mar 22 16:10:50 jik5.kamens.us whoopsie-upload-all[4094]: INFO:root:/var/crash/_usr_bin_emacs-gtk.1000.crash already marked for upload, skipping Mar 22 16:10:50 jik5.kamens.us whoopsie-upload-all[4094]: INFO:root:Waiting for whoopsie to upload reports (timeout: 20 s) Mar 22 16:10:50 jik5.kamens.us whoopsie-upload-all[4094]: INFO:root:All reports uploaded successfully Mar 22 16:10:50 jik5.kamens.us named[1914]: listening on IPv4 interface docker0, 172.17.0.1#53 Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.8324] manager: (docker0): new Bridge device (/org/freedesktop/NetworkManager/Devices/6) Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started eruv.service - Eruv status checker. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started user@1000.service - User Manager for UID 1000. Mar 22 16:10:50 jik5.kamens.us systemd[1]: apport-autoreport.service: Deactivated successfully. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started pipewire.service - PipeWire Multimedia Service. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Finished apport-autoreport.service - Process error reports when automatic reporting is enabled. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started session-2.scope - Session 2 of User jik. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started session-c1.scope - Session c1 of User jik. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Starting synology-inotify.service - Force hard-linked files to sync to Synology Drive... Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started session-c2.scope - Session c2 of User jik. Mar 22 16:10:50 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Starting tracker-extract-3.service - Tracker metadata extractor... Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started wireplumber.service - Multimedia Service Session Manager. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started pipewire-pulse.service - PipeWire PulseAudio. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started x10-transceiver.service - X10 transceiver. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started synology-inotify.service - Force hard-linked files to sync to Synology Drive. Mar 22 16:10:50 jik5.kamens.us whoopsie[4324]: [16:10:50] Using lock path: /var/lock/whoopsie/lock Mar 22 16:10:50 jik5.kamens.us audit[4302]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=4302 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:10:50 jik5.kamens.us audit[4302]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=4302 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:50 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Starting dbus.service - D-Bus User Message Bus... Mar 22 16:10:50 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4302]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:50 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] AppArmor D-Bus mediation is enabled Mar 22 16:10:50 jik5.kamens.us pipewire[4316]: mod.rt: Can't find org.freedesktop.portal.Desktop. Is xdg-desktop-portal running? Mar 22 16:10:50 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.RealtimeKit1' unit='rtkit-daemon.service' requested by ':1.46' (uid=1000 pid=4331 comm="/usr/bin/pipewire-pulse" label="unconfined") Mar 22 16:10:50 jik5.kamens.us pipewire[4316]: mod.rt: found session bus but no portal Mar 22 16:10:50 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating systemd to hand-off: service name='org.freedesktop.portal.Documents' unit='xdg-document-portal.service' requested by ':1.3' (uid=1000 pid=4317 comm="/usr/bin/snap run snapd-desktop-integration" label="unconfined") Mar 22 16:10:50 jik5.kamens.us pipewire-pulse[4331]: mod.rt: Can't find org.freedesktop.portal.Desktop. Is xdg-desktop-portal running? Mar 22 16:10:50 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.freedesktop.systemd1' Mar 22 16:10:50 jik5.kamens.us pipewire-pulse[4331]: mod.rt: found session bus but no portal Mar 22 16:10:50 jik5.kamens.us avahi-daemon[1692]: Joining mDNS multicast group on interface docker0.IPv4 with address 172.17.0.1. Mar 22 16:10:50 jik5.kamens.us wireplumber[4326]: Can't find org.freedesktop.portal.Desktop. Is xdg-desktop-portal running? Mar 22 16:10:50 jik5.kamens.us avahi-daemon[1692]: New relevant interface docker0.IPv4 for mDNS. Mar 22 16:10:50 jik5.kamens.us wireplumber[4326]: found session bus but no portal Mar 22 16:10:50 jik5.kamens.us avahi-daemon[1692]: Registering new address record for 172.17.0.1 on docker0.IPv4. Mar 22 16:10:50 jik5.kamens.us systemd[3924]: Started dbus.service - D-Bus User Message Bus. Mar 22 16:10:50 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.5' (uid=1000 pid=4325 comm="/usr/libexec/tracker-extract-3" label="unconfined") Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9856] device (docker0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9864] device (docker0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9874] device (docker0): Activation: starting connection 'docker0' (69865f71-5dcc-41e9-9171-a46b135036ba) Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9877] device (docker0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9880] device (docker0): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9882] device (docker0): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9883] device (docker0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9905] device (docker0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9907] device (docker0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Mar 22 16:10:50 jik5.kamens.us NetworkManager[1823]: [1679515850.9915] device (docker0): Activation: successful, device activated. Mar 22 16:10:51 jik5.kamens.us systemd[1]: Starting rtkit-daemon.service - RealtimeKit Scheduling Policy Service... Mar 22 16:10:51 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.RealtimeKit1' Mar 22 16:10:51 jik5.kamens.us systemd[3924]: Starting xdg-document-portal.service - flatpak document portal service... Mar 22 16:10:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 9. Mar 22 16:10:51 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:51 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:51 jik5.kamens.us systemd[3924]: Starting gvfs-daemon.service - Virtual filesystem service... Mar 22 16:10:51 jik5.kamens.us systemd[1]: Started rtkit-daemon.service - RealtimeKit Scheduling Policy Service. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Successfully called chroot. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Successfully dropped privileges. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Successfully limited resources. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Running. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Watchdog thread running. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Canary thread running. Mar 22 16:10:51 jik5.kamens.us named[1914]: received control channel command 'reconfig' Mar 22 16:10:51 jik5.kamens.us named[1914]: loading configuration from '/etc/bind/named.conf' Mar 22 16:10:51 jik5.kamens.us named[1914]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:10:51 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.freedesktop.impl.portal.PermissionStore' unit='xdg-permission-store.service' requested by ':1.6' (uid=1000 pid=4499 comm="/usr/libexec/xdg-document-portal" label="unconfined") Mar 22 16:10:51 jik5.kamens.us named[1914]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:10:51 jik5.kamens.us named[1914]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:10:51 jik5.kamens.us named[1914]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:10:51 jik5.kamens.us named[1914]: sizing zone task pool based on 50 zones Mar 22 16:10:51 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:51 jik5.kamens.us named[1914]: none:99: 'max-cache-size 90%' - setting to 14345MB (out of 15939MB) Mar 22 16:10:51 jik5.kamens.us systemd[3924]: Starting xdg-permission-store.service - sandboxed app permission store... Mar 22 16:10:51 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:51 jik5.kamens.us named[1914]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:10:51 jik5.kamens.us named[1914]: reloading configuration succeeded Mar 22 16:10:51 jik5.kamens.us named[1914]: scheduled loading new zones Mar 22 16:10:51 jik5.kamens.us named[1914]: any newly configured zones are now loaded Mar 22 16:10:51 jik5.kamens.us named[1914]: running Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Searching for existing AppImages Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Searching directory: /home/jik Mar 22 16:10:51 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.freedesktop.impl.portal.PermissionStore' Mar 22 16:10:51 jik5.kamens.us systemd[3924]: Started xdg-permission-store.service - sandboxed app permission store. Mar 22 16:10:51 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.freedesktop.portal.Documents' Mar 22 16:10:51 jik5.kamens.us systemd[3924]: Started xdg-document-portal.service - flatpak document portal service. Mar 22 16:10:51 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4503]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:10:51 jik5.kamens.us xdg-document-portal[4499]: Ignoring invalid max threads value 4294967295 > max (100000). Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Searching directory: /home/jik/Applications Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Found AppImage: /home/jik/Applications/digiKam-7.9.0-x86-64.appimage Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: AppImage integrated already, skipping Mar 22 16:10:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:10:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Watching directories: /home/jik /home/jik/Applications Mar 22 16:10:51 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gtk.vfs.Daemon' Mar 22 16:10:51 jik5.kamens.us systemd[3924]: Started gvfs-daemon.service - Virtual filesystem service. Mar 22 16:10:51 jik5.kamens.us pipewire-pulse[4331]: mod.rt: RTKit error: org.freedesktop.DBus.Error.AccessDenied Mar 22 16:10:51 jik5.kamens.us pipewire-pulse[4331]: mod.rt: could not set nice-level to -11: Permission denied Mar 22 16:10:51 jik5.kamens.us wireplumber[4326]: RTKit error: org.freedesktop.DBus.Error.AccessDenied Mar 22 16:10:51 jik5.kamens.us wireplumber[4326]: could not set nice-level to -11: Permission denied Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Supervising 0 threads of 0 processes of 1 users. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Supervising 0 threads of 0 processes of 1 users. Mar 22 16:10:51 jik5.kamens.us pipewire[4316]: mod.rt: RTKit error: org.freedesktop.DBus.Error.AccessDenied Mar 22 16:10:51 jik5.kamens.us pipewire[4316]: mod.rt: could not set nice-level to -11: Permission denied Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Supervising 0 threads of 0 processes of 1 users. Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Supervising 0 threads of 0 processes of 1 users. Mar 22 16:10:51 jik5.kamens.us python3[4321]: Starting watcher for /home/jik/CloudStation Mar 22 16:10:51 jik5.kamens.us su[4816]: (to jik) root on none Mar 22 16:10:51 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatch.86337b74-269d-4b6d-ab44-ae4b82e43c24.scope. Mar 22 16:10:51 jik5.kamens.us nm-dispatcher[4804]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args docker0 up Mar 22 16:10:51 jik5.kamens.us nm-dispatcher[4804]: /etc/NetworkManager/dispatcher.d/inotify-canary: unpause mode Mar 22 16:10:51 jik5.kamens.us su[4816]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:10:51 jik5.kamens.us wireplumber[4326]: RTKit error: org.freedesktop.DBus.Error.AccessDenied Mar 22 16:10:51 jik5.kamens.us nm-dispatcher[4814]: /etc/NetworkManager/dispatcher.d/inotify-canary: forked from 4804 Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Supervising 0 threads of 0 processes of 1 users. Mar 22 16:10:51 jik5.kamens.us wireplumber[4326]: could not make thread 4772 realtime using RTKit: Permission denied Mar 22 16:10:51 jik5.kamens.us rtkit-daemon[4449]: Supervising 0 threads of 0 processes of 1 users. Mar 22 16:10:51 jik5.kamens.us systemd[1]: Started session-c3.scope - Session c3 of User jik. Mar 22 16:10:51 jik5.kamens.us audit[4700]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=4700 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:10:51 jik5.kamens.us pipewire[4316]: mod.rt: RTKit error: org.freedesktop.DBus.Error.AccessDenied Mar 22 16:10:51 jik5.kamens.us pipewire[4316]: mod.rt: could not make thread 4782 realtime using RTKit: Permission denied Mar 22 16:10:51 jik5.kamens.us pipewire-pulse[4331]: mod.rt: RTKit error: org.freedesktop.DBus.Error.AccessDenied Mar 22 16:10:51 jik5.kamens.us pipewire-pulse[4331]: mod.rt: could not make thread 4784 realtime using RTKit: Permission denied Mar 22 16:10:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 10. Mar 22 16:10:51 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Start request repeated too quickly. Mar 22 16:10:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:10:51 jik5.kamens.us systemd[1]: Failed to start snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:10:51 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:51.234333469-04:00" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Mar 22 16:10:51 jik5.kamens.us su[3685]: pam_unix(su:session): session closed for user jik Mar 22 16:10:51 jik5.kamens.us systemd[1]: session-c2.scope: Deactivated successfully. Mar 22 16:10:51 jik5.kamens.us su[3573]: pam_unix(su:session): session closed for user jik Mar 22 16:10:51 jik5.kamens.us nm-dispatcher[3684]: /etc/NetworkManager/dispatcher.d/inotify-canary: already unpaused Mar 22 16:10:51 jik5.kamens.us systemd[1]: tmp-snap.rootfs_LPie90.mount: Deactivated successfully. Mar 22 16:10:51 jik5.kamens.us systemd[1]: session-c1.scope: Deactivated successfully. Mar 22 16:10:51 jik5.kamens.us inotify-canary[3571]: /etc/NetworkManager/dispatcher.d/inotify-canary: already unpaused Mar 22 16:10:51 jik5.kamens.us wireplumber[4326]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Mar 22 16:10:51 jik5.kamens.us wireplumber[4326]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Mar 22 16:10:51 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:51.366805714-04:00" level=info msg="Loading containers: done." Mar 22 16:10:51 jik5.kamens.us wireplumber[4326]: Trying to use legacy bluez5 API for LE Audio - only A2DP will be supported. Please upgrade bluez5. Mar 22 16:10:51 jik5.kamens.us kernel: Bluetooth: RFCOMM TTY layer initialized Mar 22 16:10:51 jik5.kamens.us kernel: Bluetooth: RFCOMM socket layer initialized Mar 22 16:10:51 jik5.kamens.us kernel: Bluetooth: RFCOMM ver 1.11 Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/ldac Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/aptx_hd Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_hd Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/aptx Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/sbc Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/sbc Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/sbc_xq Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/sbc_xq Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_1 Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_0 Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1 Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0 Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/faststream Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/faststream_duplex Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/opus_05 Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/opus_05 Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/opus_05_duplex Mar 22 16:10:51 jik5.kamens.us bluetoothd[1693]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/opus_05_duplex Mar 22 16:10:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatch.86337b74-269d-4b6d-ab44-ae4b82e43c24.scope: Deactivated successfully. Mar 22 16:10:51 jik5.kamens.us sshd[3786]: pam_env(sshd:session): deprecated reading of user environment enabled Mar 22 16:10:51 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:51.604561081-04:00" level=info msg="Docker daemon" commit=20.10.21-0ubuntu3 graphdriver(s)=overlay2 version=20.10.21 Mar 22 16:10:51 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:51.606208940-04:00" level=info msg="Daemon has completed initialization" Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Scheduling for (re-)integration: /home/jik/.Xauthority-c Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Scheduling for (re-)integration: /home/jik/.Xauthority-n Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Scheduling for (re-)integration: /home/jik/.Xauthority Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Scheduling for unintegration: /home/jik/.Xauthority-c Mar 22 16:10:51 jik5.kamens.us appimagelauncherd[4301]: Scheduling for unintegration: /home/jik/.Xauthority-l Mar 22 16:10:51 jik5.kamens.us systemd[1]: Started docker.service - Docker Application Container Engine. Mar 22 16:10:51 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:10:51.657488864-04:00" level=info msg="API listen on /run/docker.sock" Mar 22 16:10:51 jik5.kamens.us python3[4321]: Successfully fetched https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=tkuctpye Mar 22 16:10:51 jik5.kamens.us su[4816]: pam_unix(su:session): session closed for user jik Mar 22 16:10:51 jik5.kamens.us systemd[1]: session-c3.scope: Deactivated successfully. Mar 22 16:10:51 jik5.kamens.us nm-dispatcher[4814]: /etc/NetworkManager/dispatcher.d/inotify-canary: already unpaused Mar 22 16:10:52 jik5.kamens.us eruv.pl[4315]: Current time is: Wed Mar 22 16:10:52 2023 Mar 22 16:10:52 jik5.kamens.us eruv.pl[4315]: No candles on 03 22 2023 Mar 22 16:10:52 jik5.kamens.us eruv.pl[4315]: No candles, sleeping until tomorrow Mar 22 16:10:52 jik5.kamens.us eruv.pl[4315]: Sleeping for: 28148 Mar 22 16:10:52 jik5.kamens.us systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2588712794-merged.mount: Deactivated successfully. Mar 22 16:10:52 jik5.kamens.us snapd-desktop-i[5380]: Failed to do gtk init. Waiting for a new session with desktop capabilities. Mar 22 16:10:52 jik5.kamens.us audit[5380]: SECCOMP auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=5380 comm="snapd-desktop-i" exe="/snap/snapd-desktop-integration/71/usr/bin/snapd-desktop-integration" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7f9a59807a3d code=0x50000 Mar 22 16:10:52 jik5.kamens.us kernel: kauditd_printk_skb: 7 callbacks suppressed Mar 22 16:10:52 jik5.kamens.us kernel: audit: type=1326 audit(1679515852.412:197): auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=5380 comm="snapd-desktop-i" exe="/snap/snapd-desktop-integration/71/usr/bin/snapd-desktop-integration" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7f9a59807a3d code=0x50000 Mar 22 16:10:52 jik5.kamens.us snapd-desktop-i[5380]: Checking session /org/freedesktop/login1/session/_32... Mar 22 16:10:52 jik5.kamens.us sshd[5179]: Received disconnect from 200.116.195.123 port 51664:11: Bye Bye [preauth] Mar 22 16:10:52 jik5.kamens.us sshd[5179]: Disconnected from authenticating user root 200.116.195.123 port 51664 [preauth] Mar 22 16:10:52 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.freedesktop.Tracker3.Miner.Files' unit='tracker-miner-fs-3.service' requested by ':1.5' (uid=1000 pid=4325 comm="/usr/libexec/tracker-extract-3" label="unconfined") Mar 22 16:10:52 jik5.kamens.us systemd[3924]: Starting tracker-miner-fs-3.service - Tracker file system data miner... Mar 22 16:10:52 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.gtk.vfs.UDisks2VolumeMonitor' unit='gvfs-udisks2-volume-monitor.service' requested by ':1.13' (uid=1000 pid=5386 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:10:52 jik5.kamens.us systemd[3924]: Starting gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor... Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gtk.vfs.UDisks2VolumeMonitor' Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Started gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor. Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.gtk.vfs.GoaVolumeMonitor' unit='gvfs-goa-volume-monitor.service' requested by ':1.13' (uid=1000 pid=5386 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Starting gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor... Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating service name='org.gnome.OnlineAccounts' requested by ':1.15' (uid=1000 pid=5403 comm="/usr/libexec/gvfs-goa-volume-monitor" label="unconfined") Mar 22 16:10:53 jik5.kamens.us goa-daemon[5416]: goa-daemon version 3.46.0 starting Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating service name='org.gnome.Identity' requested by ':1.16' (uid=1000 pid=5416 comm="/usr/libexec/goa-daemon" label="unconfined") Mar 22 16:10:53 jik5.kamens.us goa-daemon[5416]: Unsupported account type ubuntusso for identity jik@kamens.brookline.ma.us (no provider) Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gnome.OnlineAccounts' Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gnome.Identity' Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gtk.vfs.GoaVolumeMonitor' Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Started gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor. Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.gtk.vfs.GPhoto2VolumeMonitor' unit='gvfs-gphoto2-volume-monitor.service' requested by ':1.13' (uid=1000 pid=5386 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Starting gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor... Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gtk.vfs.GPhoto2VolumeMonitor' Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Started gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor. Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.gtk.vfs.MTPVolumeMonitor' unit='gvfs-mtp-volume-monitor.service' requested by ':1.13' (uid=1000 pid=5386 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Starting gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor... Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gtk.vfs.MTPVolumeMonitor' Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Started gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor. Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.gtk.vfs.AfcVolumeMonitor' unit='gvfs-afc-volume-monitor.service' requested by ':1.13' (uid=1000 pid=5386 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Starting gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor... Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gtk.vfs.AfcVolumeMonitor' Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Started gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor. Mar 22 16:10:53 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' requested by ':1.61' (uid=1000 pid=5386 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:10:53 jik5.kamens.us systemd[1]: Starting upower.service - Daemon for power management... Mar 22 16:10:53 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.UPower' Mar 22 16:10:53 jik5.kamens.us systemd[1]: Started upower.service - Daemon for power management. Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.freedesktop.Tracker3.Miner.Files' Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Started tracker-miner-fs-3.service - Tracker file system data miner. Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Started tracker-extract-3.service - Tracker metadata extractor. Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Reached target default.target - Main User Target. Mar 22 16:10:53 jik5.kamens.us systemd[3924]: Startup finished in 3.632s. Mar 22 16:10:53 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.gtk.vfs.Metadata' unit='gvfs-metadata.service' requested by ':1.5' (uid=1000 pid=4325 comm="/usr/libexec/tracker-extract-3" label="unconfined") Mar 22 16:10:54 jik5.kamens.us systemd[3924]: Starting gvfs-metadata.service - Virtual filesystem metadata service... Mar 22 16:10:54 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.gtk.vfs.Metadata' Mar 22 16:10:54 jik5.kamens.us systemd[3924]: Started gvfs-metadata.service - Virtual filesystem metadata service. Mar 22 16:10:54 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating service name='org.freedesktop.secrets' requested by ':1.16' (uid=1000 pid=5416 comm="/usr/libexec/goa-daemon" label="unconfined") Mar 22 16:10:54 jik5.kamens.us systemd[3924]: Started gnome-keyring-daemon.service - GNOME Keyring daemon. Mar 22 16:10:54 jik5.kamens.us gnome-keyring-daemon[5808]: GNOME_KEYRING_CONTROL=/run/user/1000/keyring Mar 22 16:10:54 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.freedesktop.secrets' Mar 22 16:10:54 jik5.kamens.us gnome-keyring-daemon[5808]: The Secret Service was already initialized Mar 22 16:10:54 jik5.kamens.us gnome-keyring-daemon[5807]: discover_other_daemon: 1 Mar 22 16:10:54 jik5.kamens.us org.freedesktop.secrets[5807]: GNOME_KEYRING_CONTROL=/run/user/1000/keyring Mar 22 16:10:54 jik5.kamens.us gnome-keyring-d[5808]: The Secret Service was already initialized Mar 22 16:10:57 jik5.kamens.us rc.local[5912]: update-initramfs: Generating /boot/initrd.img-5.19.0-23-generic Mar 22 16:10:58 jik5.kamens.us bluetoothd[1693]: src/profile.c:record_cb() Unable to get Hands-Free Voice gateway SDP record: Host is down Mar 22 16:11:01 jik5.kamens.us systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Mar 22 16:11:02 jik5.kamens.us sshd[8464]: Received disconnect from 51.15.140.163 port 60894:11: Bye Bye [preauth] Mar 22 16:11:02 jik5.kamens.us sshd[8464]: Disconnected from authenticating user root 51.15.140.163 port 60894 [preauth] Mar 22 16:11:03 jik5.kamens.us vboxdrv.sh[8979]: VirtualBox kernel modules built. Mar 22 16:11:03 jik5.kamens.us kernel: vboxdrv: module verification failed: signature and/or required key missing - tainting kernel Mar 22 16:11:03 jik5.kamens.us kernel: vboxdrv: Found 8 processor cores/threads Mar 22 16:11:03 jik5.kamens.us systemd-udevd[706]: Configuration file /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:11:03 jik5.kamens.us systemd-udevd[706]: /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules:9 Invalid key 'SYSFS' Mar 22 16:11:03 jik5.kamens.us systemd-udevd[706]: /etc/udev/rules.d/60-brother-libsane-type1.rules:17 Invalid key 'SYSFS' Mar 22 16:11:03 jik5.kamens.us kernel: vboxdrv: TSC mode is Invariant, tentative frequency 4008001448 Hz Mar 22 16:11:03 jik5.kamens.us kernel: vboxdrv: Successfully loaded version 7.0.6 r155176 (interface 0x00330004) Mar 22 16:11:03 jik5.kamens.us kernel: VBoxNetFlt: Successfully started. Mar 22 16:11:03 jik5.kamens.us kernel: VBoxNetAdp: Successfully started. Mar 22 16:11:03 jik5.kamens.us vboxdrv.sh[9101]: VirtualBox services started. Mar 22 16:11:03 jik5.kamens.us systemd[1]: Started vboxdrv.service - VirtualBox Linux kernel module. Mar 22 16:11:03 jik5.kamens.us systemd[1]: Starting vboxautostart-service.service... Mar 22 16:11:03 jik5.kamens.us systemd[1]: Starting vboxballoonctrl-service.service... Mar 22 16:11:03 jik5.kamens.us systemd[1]: Starting vboxweb-service.service... Mar 22 16:11:03 jik5.kamens.us systemd[1]: Started vboxautostart-service.service. Mar 22 16:11:03 jik5.kamens.us systemd[1]: Started vboxballoonctrl-service.service. Mar 22 16:11:03 jik5.kamens.us systemd[1]: Started vboxweb-service.service. Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: Executing deferred operations Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: Integrating: /home/jik/.Xauthority-c Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: ERROR: file does not exist, cannot integrate Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: Integrating: /home/jik/.Xauthority-n Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: ERROR: file does not exist, cannot integrate Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: Integrating: /home/jik/.Xauthority Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: ERROR: not an AppImage, skipping Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: Cleaning up old desktop integration files Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: Updating desktop database and icon caches Mar 22 16:11:06 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Activating via systemd: service name='org.freedesktop.Tracker3.Miner.Extract' unit='tracker-extract-3.service' requested by ':1.13' (uid=1000 pid=5386 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:11:06 jik5.kamens.us systemd[3924]: Starting tracker-extract-3.service - Tracker metadata extractor... Mar 22 16:11:06 jik5.kamens.us dbus-daemon[4367]: [session uid=1000 pid=4367] Successfully activated service 'org.freedesktop.Tracker3.Miner.Extract' Mar 22 16:11:06 jik5.kamens.us systemd[3924]: Started tracker-extract-3.service - Tracker metadata extractor. Mar 22 16:11:06 jik5.kamens.us appimagelauncherd[4301]: Done Mar 22 16:11:12 jik5.kamens.us systemd-journald[672]: Forwarding to syslog missed 402 messages. Mar 22 16:11:12 jik5.kamens.us systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 22 16:11:14 jik5.kamens.us systemd-timesyncd[1359]: Contacted time server 91.189.94.4:123 (ntp.ubuntu.com). Mar 22 16:11:14 jik5.kamens.us systemd-timesyncd[1359]: Initial clock synchronization to Wed 2023-03-22 16:11:14.354252 EDT. Mar 22 16:11:16 jik5.kamens.us systemd[1]: systemd-timedated.service: Deactivated successfully. Mar 22 16:11:21 jik5.kamens.us appimagelauncherd[4301]: Directories to watch disappeared, unintegrating AppImages formerly found in there Mar 22 16:11:25 jik5.kamens.us rc.local[15009]: I: The initramfs will attempt to resume from /dev/dm-2 Mar 22 16:11:25 jik5.kamens.us rc.local[15009]: I: (/dev/mapper/ubuntu--vg-swap_1) Mar 22 16:11:25 jik5.kamens.us rc.local[15009]: I: Set the RESUME variable to override this. Mar 22 16:11:31 jik5.kamens.us rc.local[16223]: update-initramfs: Generating /boot/initrd.img-6.1.0-16-generic Mar 22 16:11:42 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:11:42 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:11:42 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:12:01 jik5.kamens.us kernel: usb 1-2: new full-speed USB device number 17 using xhci_hcd Mar 22 16:12:01 jik5.kamens.us kernel: usb 1-2: New USB device found, idVendor=0b0e, idProduct=2467, bcdDevice= 2.10 Mar 22 16:12:01 jik5.kamens.us kernel: usb 1-2: New USB device strings: Mfr=0, Product=2, SerialNumber=0 Mar 22 16:12:01 jik5.kamens.us kernel: usb 1-2: Product: Jabra Evolve 75 Mar 22 16:12:01 jik5.kamens.us kernel: input: Jabra Evolve 75 as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0/0003:0B0E:2467.000B/input/input32 Mar 22 16:12:01 jik5.kamens.us rc.local[25370]: I: The initramfs will attempt to resume from /dev/dm-2 Mar 22 16:12:01 jik5.kamens.us rc.local[25370]: I: (/dev/mapper/ubuntu--vg-swap_1) Mar 22 16:12:01 jik5.kamens.us rc.local[25370]: I: Set the RESUME variable to override this. Mar 22 16:12:02 jik5.kamens.us mtp-probe[25392]: checking bus 1, device 17: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-2" Mar 22 16:12:02 jik5.kamens.us mtp-probe[25392]: bus: 1, device: 17 was not an MTP device Mar 22 16:12:02 jik5.kamens.us kernel: jabra 0003:0B0E:2467.000B: input,hiddev4,hidraw8: USB HID v1.11 Device [Jabra Evolve 75] on usb-0000:00:14.0-2/input0 Mar 22 16:12:02 jik5.kamens.us systemd-udevd[9017]: 1-2:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0 0:0' failed with exit code 1. Mar 22 16:12:02 jik5.kamens.us systemd-udevd[9017]: 1-2:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0 0:0' failed with exit code 1. Mar 22 16:12:02 jik5.kamens.us mtp-probe[25518]: checking bus 1, device 17: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-2" Mar 22 16:12:02 jik5.kamens.us mtp-probe[25518]: bus: 1, device: 17 was not an MTP device Mar 22 16:12:02 jik5.kamens.us systemd-udevd[9017]: 1-2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-2 189:16' failed with exit code 1. Mar 22 16:12:02 jik5.kamens.us systemd-udevd[9017]: 1-2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-2 189:16' failed with exit code 1. Mar 22 16:12:02 jik5.kamens.us kernel: usb 1-7.4.3: reset high-speed USB device number 16 using xhci_hcd Mar 22 16:12:03 jik5.kamens.us kernel: usb 1-7.4.4.3: USB disconnect, device number 15 Mar 22 16:12:03 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:12:03 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:12:03 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:12:03 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:12:03 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:12:03 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:12:03 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:12:03 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:12:03 jik5.kamens.us systemd-udevd[9012]: 1-7.4.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3/1-7.4.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:12:03 jik5.kamens.us systemd-udevd[9017]: 1-7.4.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3/1-7.4.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:12:03 jik5.kamens.us systemd-udevd[9012]: 1-7.4.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3/1-7.4.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:12:03 jik5.kamens.us systemd-udevd[9017]: 1-7.4.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3/1-7.4.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:12:03 jik5.kamens.us systemd-udevd[9017]: 1-7.4.4.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3 189:14' failed with exit code 1. Mar 22 16:12:03 jik5.kamens.us systemd-udevd[9017]: 1-7.4.4.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.3 189:14' failed with exit code 1. Mar 22 16:12:03 jik5.kamens.us systemd[1]: Stopped target smartcard.target - Smart Card. Mar 22 16:12:03 jik5.kamens.us yubikey-monitor.sh[26604]: {"status":1,"request":"48624ea2-56dc-4b76-b95c-f084a6bb696a"} Mar 22 16:12:03 jik5.kamens.us yubikey-monitor.sh[26604]: Triggered https://api.pushover.net/1/messages.json Mar 22 16:12:03 jik5.kamens.us yubikey-monitor.sh[26604]: Delaying notification for 5 seconds Mar 22 16:12:07 jik5.kamens.us rc.local[26705]: update-initramfs: Generating /boot/initrd.img-6.2.0-18-generic Mar 22 16:12:09 jik5.kamens.us yubikey-monitor.sh[26604]: {"status":1,"request":"1c7fa59b-b95b-4cfd-9bd9-22c5295bf334"} Mar 22 16:12:09 jik5.kamens.us yubikey-monitor.sh[26604]: Triggered https://api.pushover.net/1/messages.json Mar 22 16:12:09 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:12:13 jik5.kamens.us systemd-udevd[770]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1505] timed out after 2min 59s, killing Mar 22 16:12:13 jik5.kamens.us systemd-udevd[767]: 2-5.1:1.0: Spawned process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' [1122] timed out after 2min 59s, killing Mar 22 16:12:13 jik5.kamens.us systemd-udevd[706]: 0000:01:00.0: Worker [748] processing SEQNUM=3822 killed Mar 22 16:12:13 jik5.kamens.us systemd-udevd[706]: nvidia: Worker [770] processing SEQNUM=4394 killed Mar 22 16:12:13 jik5.kamens.us systemd-udevd[767]: 2-5.1:1.0: Process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' terminated by signal KILL. Mar 22 16:12:13 jik5.kamens.us systemd-udevd[767]: 2-5.1:1.0: Failed to wait for spawned command '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003': Input/output error Mar 22 16:12:13 jik5.kamens.us systemd-udevd[767]: 2-5.1:1.0: Failed to execute '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003', ignoring: Input/output error Mar 22 16:12:13 jik5.kamens.us systemd-udevd[706]: 2-5.1:1.0: Worker [767] processing SEQNUM=3878 killed Mar 22 16:12:13 jik5.kamens.us systemd-udevd[706]: nvidia: Worker [770] terminated by signal 9 (KILL). Mar 22 16:12:13 jik5.kamens.us systemd-udevd[706]: Worker [767] terminated by signal 9 (KILL). Mar 22 16:12:14 jik5.kamens.us sshd[29253]: Received disconnect from 200.116.195.123 port 52194:11: Bye Bye [preauth] Mar 22 16:12:14 jik5.kamens.us sshd[29253]: Disconnected from authenticating user root 200.116.195.123 port 52194 [preauth] Mar 22 16:12:31 jik5.kamens.us rc.local[35897]: I: The initramfs will attempt to resume from /dev/dm-2 Mar 22 16:12:31 jik5.kamens.us rc.local[35897]: I: (/dev/mapper/ubuntu--vg-swap_1) Mar 22 16:12:31 jik5.kamens.us rc.local[35897]: I: Set the RESUME variable to override this. Mar 22 16:12:38 jik5.kamens.us rc.local[3580]: Removing key from sdc3_crypt (UUID=c531070b-52cc-405a-8abe-8ac4be2d75f4) Mar 22 16:12:38 jik5.kamens.us systemd[1]: Started rc-local.service - /etc/rc.local Compatibility. Mar 22 16:12:38 jik5.kamens.us systemd[1]: Starting plymouth-quit-wait.service - Hold until boot process finishes up... Mar 22 16:12:43 jik5.kamens.us sshd[37111]: Received disconnect from 51.15.140.163 port 33450:11: Bye Bye [preauth] Mar 22 16:12:43 jik5.kamens.us sshd[37111]: Disconnected from authenticating user root 51.15.140.163 port 33450 [preauth] Mar 22 16:12:57 jik5.kamens.us kernel: INFO: task systemd-udevd:748 blocked for more than 120 seconds. Mar 22 16:12:57 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:12:57 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:12:57 jik5.kamens.us kernel: task:systemd-udevd state:D stack:0 pid:748 ppid:706 flags:0x00004006 Mar 22 16:12:57 jik5.kamens.us kernel: Call Trace: Mar 22 16:12:57 jik5.kamens.us kernel: Mar 22 16:12:57 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:12:57 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:12:57 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:12:57 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:12:57 jik5.kamens.us kernel: ? __kmem_cache_alloc_node+0x19d/0x340 Mar 22 16:12:57 jik5.kamens.us kernel: ? nv_drm_calloc+0x1e/0x40 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:12:57 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:12:57 jik5.kamens.us kernel: __nv_drm_connector_detect_internal+0x15c/0x2f0 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: nv_drm_connector_detect+0xe/0x20 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: drm_helper_probe_detect_ctx+0xa0/0x120 [drm_kms_helper] Mar 22 16:12:57 jik5.kamens.us kernel: check_connector_changed+0x52/0x200 [drm_kms_helper] Mar 22 16:12:57 jik5.kamens.us kernel: drm_helper_hpd_irq_event+0xbc/0x170 [drm_kms_helper] Mar 22 16:12:57 jik5.kamens.us kernel: nv_drm_load+0x2e7/0x480 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: ? __pfx_nv_drm_event_callback+0x10/0x10 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: drm_dev_register+0x10b/0x250 [drm] Mar 22 16:12:57 jik5.kamens.us kernel: nv_drm_probe_devices+0x111/0x200 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: ? __pfx_init_module+0x10/0x10 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: nv_drm_init+0x1e/0x60 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: nv_linux_drm_init+0xe/0xff0 [nvidia_drm] Mar 22 16:12:57 jik5.kamens.us kernel: do_one_initcall+0x5b/0x250 Mar 22 16:12:57 jik5.kamens.us kernel: do_init_module+0x7b/0x260 Mar 22 16:12:57 jik5.kamens.us kernel: load_module+0xc76/0xd60 Mar 22 16:12:57 jik5.kamens.us kernel: __do_sys_finit_module+0xc4/0x140 Mar 22 16:12:57 jik5.kamens.us kernel: ? __do_sys_finit_module+0xc4/0x140 Mar 22 16:12:57 jik5.kamens.us kernel: __x64_sys_finit_module+0x18/0x30 Mar 22 16:12:57 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:12:57 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:12:57 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:12:57 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:12:57 jik5.kamens.us kernel: RIP: 0033:0x7f28aa11581d Mar 22 16:12:57 jik5.kamens.us kernel: RSP: 002b:00007fffd1d3e608 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 Mar 22 16:12:57 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 000055e98903cf60 RCX: 00007f28aa11581d Mar 22 16:12:57 jik5.kamens.us kernel: RDX: 0000000000000000 RSI: 000055e9890421c0 RDI: 000000000000000d Mar 22 16:12:57 jik5.kamens.us kernel: RBP: 000055e9890421c0 R08: 0000000000000000 R09: 00007fffd1d3e730 Mar 22 16:12:57 jik5.kamens.us kernel: R10: 000000000000000d R11: 0000000000000246 R12: 0000000000020000 Mar 22 16:12:57 jik5.kamens.us kernel: R13: 000055e988ee5d50 R14: 0000000000000000 R15: 000055e9890423c0 Mar 22 16:12:57 jik5.kamens.us kernel: Mar 22 16:12:57 jik5.kamens.us kernel: INFO: task gpu-manager:1697 blocked for more than 120 seconds. Mar 22 16:12:57 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:12:57 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:12:57 jik5.kamens.us kernel: task:gpu-manager state:D stack:0 pid:1697 ppid:1 flags:0x00000002 Mar 22 16:12:57 jik5.kamens.us kernel: Call Trace: Mar 22 16:12:57 jik5.kamens.us kernel: Mar 22 16:12:57 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:12:57 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:12:57 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:12:57 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:12:57 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:12:57 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:12:57 jik5.kamens.us kernel: drm_open+0x58/0x170 [drm] Mar 22 16:12:57 jik5.kamens.us kernel: drm_stub_open+0xa6/0xe0 [drm] Mar 22 16:12:57 jik5.kamens.us kernel: chrdev_open+0xc2/0x240 Mar 22 16:12:57 jik5.kamens.us kernel: ? __pfx_chrdev_open+0x10/0x10 Mar 22 16:12:57 jik5.kamens.us kernel: do_dentry_open+0x1f5/0x430 Mar 22 16:12:57 jik5.kamens.us kernel: vfs_open+0x2d/0x40 Mar 22 16:12:57 jik5.kamens.us kernel: do_open+0x200/0x4d0 Mar 22 16:12:57 jik5.kamens.us kernel: ? open_last_lookups+0x8e/0x420 Mar 22 16:12:57 jik5.kamens.us kernel: path_openat+0x135/0x2e0 Mar 22 16:12:57 jik5.kamens.us kernel: do_filp_open+0xaf/0x170 Mar 22 16:12:57 jik5.kamens.us kernel: do_sys_openat2+0xbf/0x180 Mar 22 16:12:57 jik5.kamens.us kernel: __x64_sys_openat+0x6c/0xa0 Mar 22 16:12:57 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:12:57 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:12:57 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:12:57 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:12:57 jik5.kamens.us kernel: RIP: 0033:0x7f85d690b615 Mar 22 16:12:57 jik5.kamens.us kernel: RSP: 002b:00007ffe0bec1340 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 Mar 22 16:12:57 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f85d690b615 Mar 22 16:12:57 jik5.kamens.us kernel: RDX: 0000000000000002 RSI: 00007ffe0bec1410 RDI: 00000000ffffff9c Mar 22 16:12:57 jik5.kamens.us kernel: RBP: 00007ffe0bec1410 R08: 0000000000000073 R09: 00007f85d69f7300 Mar 22 16:12:57 jik5.kamens.us kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 Mar 22 16:12:57 jik5.kamens.us kernel: R13: 00007ffe0bec2718 R14: 000055f9e5cd6af8 R15: 00007f85d6be0000 Mar 22 16:12:57 jik5.kamens.us kernel: Mar 22 16:13:04 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:13:04 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:13:04 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:13:28 jik5.kamens.us sshd[16208]: fatal: Timeout before authentication for 61.177.173.51 port 37251 Mar 22 16:13:38 jik5.kamens.us sshd[37131]: Received disconnect from 200.116.195.123 port 52722:11: Bye Bye [preauth] Mar 22 16:13:38 jik5.kamens.us sshd[37131]: Disconnected from authenticating user root 200.116.195.123 port 52722 [preauth] Mar 22 16:14:04 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:14:04 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:14:04 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:14:12 jik5.kamens.us systemd[1]: Starting update-notifier-download.service - Download data for packages that failed at package install time... Mar 22 16:14:12 jik5.kamens.us systemd[1]: update-notifier-download.service: Deactivated successfully. Mar 22 16:14:12 jik5.kamens.us systemd[1]: Finished update-notifier-download.service - Download data for packages that failed at package install time. Mar 22 16:14:24 jik5.kamens.us sshd[37151]: Received disconnect from 51.15.140.163 port 34230:11: Bye Bye [preauth] Mar 22 16:14:24 jik5.kamens.us sshd[37151]: Disconnected from authenticating user root 51.15.140.163 port 34230 [preauth] Mar 22 16:14:53 jik5.kamens.us sshd[37118]: fatal: Timeout before authentication for 61.177.173.39 port 31383 Mar 22 16:14:58 jik5.kamens.us kernel: INFO: task systemd-udevd:748 blocked for more than 241 seconds. Mar 22 16:14:58 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:14:58 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:14:58 jik5.kamens.us kernel: task:systemd-udevd state:D stack:0 pid:748 ppid:706 flags:0x00004006 Mar 22 16:14:58 jik5.kamens.us kernel: Call Trace: Mar 22 16:14:58 jik5.kamens.us kernel: Mar 22 16:14:58 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:14:58 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:14:58 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:14:58 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:14:58 jik5.kamens.us kernel: ? __kmem_cache_alloc_node+0x19d/0x340 Mar 22 16:14:58 jik5.kamens.us kernel: ? nv_drm_calloc+0x1e/0x40 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:14:58 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:14:58 jik5.kamens.us kernel: __nv_drm_connector_detect_internal+0x15c/0x2f0 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: nv_drm_connector_detect+0xe/0x20 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: drm_helper_probe_detect_ctx+0xa0/0x120 [drm_kms_helper] Mar 22 16:14:58 jik5.kamens.us kernel: check_connector_changed+0x52/0x200 [drm_kms_helper] Mar 22 16:14:58 jik5.kamens.us kernel: drm_helper_hpd_irq_event+0xbc/0x170 [drm_kms_helper] Mar 22 16:14:58 jik5.kamens.us kernel: nv_drm_load+0x2e7/0x480 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: ? __pfx_nv_drm_event_callback+0x10/0x10 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: drm_dev_register+0x10b/0x250 [drm] Mar 22 16:14:58 jik5.kamens.us kernel: nv_drm_probe_devices+0x111/0x200 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: ? __pfx_init_module+0x10/0x10 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: nv_drm_init+0x1e/0x60 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: nv_linux_drm_init+0xe/0xff0 [nvidia_drm] Mar 22 16:14:58 jik5.kamens.us kernel: do_one_initcall+0x5b/0x250 Mar 22 16:14:58 jik5.kamens.us kernel: do_init_module+0x7b/0x260 Mar 22 16:14:58 jik5.kamens.us kernel: load_module+0xc76/0xd60 Mar 22 16:14:58 jik5.kamens.us kernel: __do_sys_finit_module+0xc4/0x140 Mar 22 16:14:58 jik5.kamens.us kernel: ? __do_sys_finit_module+0xc4/0x140 Mar 22 16:14:58 jik5.kamens.us kernel: __x64_sys_finit_module+0x18/0x30 Mar 22 16:14:58 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:14:58 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:14:58 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:14:58 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:14:58 jik5.kamens.us kernel: RIP: 0033:0x7f28aa11581d Mar 22 16:14:58 jik5.kamens.us kernel: RSP: 002b:00007fffd1d3e608 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 Mar 22 16:14:58 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 000055e98903cf60 RCX: 00007f28aa11581d Mar 22 16:14:58 jik5.kamens.us kernel: RDX: 0000000000000000 RSI: 000055e9890421c0 RDI: 000000000000000d Mar 22 16:14:58 jik5.kamens.us kernel: RBP: 000055e9890421c0 R08: 0000000000000000 R09: 00007fffd1d3e730 Mar 22 16:14:58 jik5.kamens.us kernel: R10: 000000000000000d R11: 0000000000000246 R12: 0000000000020000 Mar 22 16:14:58 jik5.kamens.us kernel: R13: 000055e988ee5d50 R14: 0000000000000000 R15: 000055e9890423c0 Mar 22 16:14:58 jik5.kamens.us kernel: Mar 22 16:14:58 jik5.kamens.us kernel: INFO: task gpu-manager:1697 blocked for more than 241 seconds. Mar 22 16:14:58 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:14:58 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:14:58 jik5.kamens.us kernel: task:gpu-manager state:D stack:0 pid:1697 ppid:1 flags:0x00000002 Mar 22 16:14:58 jik5.kamens.us kernel: Call Trace: Mar 22 16:14:58 jik5.kamens.us kernel: Mar 22 16:14:58 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:14:58 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:14:58 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:14:58 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:14:58 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:14:58 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:14:58 jik5.kamens.us kernel: drm_open+0x58/0x170 [drm] Mar 22 16:14:58 jik5.kamens.us kernel: drm_stub_open+0xa6/0xe0 [drm] Mar 22 16:14:58 jik5.kamens.us kernel: chrdev_open+0xc2/0x240 Mar 22 16:14:58 jik5.kamens.us kernel: ? __pfx_chrdev_open+0x10/0x10 Mar 22 16:14:58 jik5.kamens.us kernel: do_dentry_open+0x1f5/0x430 Mar 22 16:14:58 jik5.kamens.us kernel: vfs_open+0x2d/0x40 Mar 22 16:14:58 jik5.kamens.us kernel: do_open+0x200/0x4d0 Mar 22 16:14:58 jik5.kamens.us kernel: ? open_last_lookups+0x8e/0x420 Mar 22 16:14:58 jik5.kamens.us kernel: path_openat+0x135/0x2e0 Mar 22 16:14:58 jik5.kamens.us kernel: do_filp_open+0xaf/0x170 Mar 22 16:14:58 jik5.kamens.us kernel: do_sys_openat2+0xbf/0x180 Mar 22 16:14:58 jik5.kamens.us kernel: __x64_sys_openat+0x6c/0xa0 Mar 22 16:14:58 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:14:58 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:14:58 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:14:58 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:14:58 jik5.kamens.us kernel: RIP: 0033:0x7f85d690b615 Mar 22 16:14:58 jik5.kamens.us kernel: RSP: 002b:00007ffe0bec1340 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 Mar 22 16:14:58 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f85d690b615 Mar 22 16:14:58 jik5.kamens.us kernel: RDX: 0000000000000002 RSI: 00007ffe0bec1410 RDI: 00000000ffffff9c Mar 22 16:14:58 jik5.kamens.us kernel: RBP: 00007ffe0bec1410 R08: 0000000000000073 R09: 00007f85d69f7300 Mar 22 16:14:58 jik5.kamens.us kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 Mar 22 16:14:58 jik5.kamens.us kernel: R13: 00007ffe0bec2718 R14: 000055f9e5cd6af8 R15: 00007f85d6be0000 Mar 22 16:14:58 jik5.kamens.us kernel: Mar 22 16:14:59 jik5.kamens.us sshd[37158]: Received disconnect from 200.116.195.123 port 53244:11: Bye Bye [preauth] Mar 22 16:14:59 jik5.kamens.us sshd[37158]: Disconnected from authenticating user root 200.116.195.123 port 53244 [preauth] Mar 22 16:15:01 jik5.kamens.us CRON[37160]: pam_unix(cron:session): session opened for user root(uid=0) by (uid=0) Mar 22 16:15:01 jik5.kamens.us CRON[37164]: (root) CMD (command -v debian-sa1 > /dev/null && debian-sa1 1 1) Mar 22 16:15:01 jik5.kamens.us CRON[37162]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:15:01 jik5.kamens.us CRON[37163]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:15:01 jik5.kamens.us CRON[37161]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:15:01 jik5.kamens.us CRON[37166]: (jik) CMD (find ~/CloudStation -name '*_Conflict') Mar 22 16:15:01 jik5.kamens.us CRON[37160]: pam_unix(cron:session): session closed for user root Mar 22 16:15:01 jik5.kamens.us CRON[37167]: (jik) CMD (curl --silent 'https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=bygbfafv' &>/dev/null) Mar 22 16:15:01 jik5.kamens.us CRON[37168]: (jik) CMD (PATH=/usr/local/bin:$PATH r2e run &>/dev/null) Mar 22 16:15:01 jik5.kamens.us CRON[37162]: pam_unix(cron:session): session closed for user jik Mar 22 16:15:01 jik5.kamens.us CRON[37163]: pam_unix(cron:session): session closed for user jik Mar 22 16:15:05 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:15:05 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:15:05 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:15:08 jik5.kamens.us CRON[37161]: pam_unix(cron:session): session closed for user jik Mar 22 16:15:46 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' requested by ':1.26' (uid=0 pid=1720 comm="/usr/lib/snapd/snapd" label="unconfined") Mar 22 16:15:46 jik5.kamens.us systemd[1]: Starting systemd-timedated.service - Time & Date Service... Mar 22 16:15:47 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.timedate1' Mar 22 16:15:47 jik5.kamens.us systemd[1]: Started systemd-timedated.service - Time & Date Service. Mar 22 16:15:47 jik5.kamens.us snapd[1720]: storehelpers.go:769: cannot refresh: snap has no updates available: "bare", "bitcoin-core", "canonical-livepatch", "chromium", "chromium-ffmpeg", "core", "core18", "core20", "core22", "cups", "firefox", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-3-38-2004", "gnome-42-2204", "gnome-system-monitor", "gtk-common-themes", "hunspell-dictionaries-1-7-2004", "snap-store", "snapd-desktop-integration", "vault" Mar 22 16:15:49 jik5.kamens.us systemd[1]: Reloading. Mar 22 16:15:50 jik5.kamens.us systemd[1]: Starting ua-timer.service - Ubuntu Advantage Timer for running repeated jobs... Mar 22 16:15:50 jik5.kamens.us systemd[1]: Mounting snap-bw-47.mount - Mount unit for bw, revision 47... Mar 22 16:15:50 jik5.kamens.us kernel: loop44: detected capacity change from 0 to 47328 Mar 22 16:15:50 jik5.kamens.us systemd[1]: Mounted snap-bw-47.mount - Mount unit for bw, revision 47. Mar 22 16:15:50 jik5.kamens.us ddclient[37341]: FAILED: updating Home: unexpected status (13) Mar 22 16:15:50 jik5.kamens.us systemd[1]: ua-timer.service: Deactivated successfully. Mar 22 16:15:50 jik5.kamens.us systemd[1]: Finished ua-timer.service - Ubuntu Advantage Timer for running repeated jobs. Mar 22 16:15:50 jik5.kamens.us ddclient[37343]: SUCCESS: updating : good: IP address set to 108.26.214.208 Mar 22 16:15:50 jik5.kamens.us ddclient[37345]: FAILED: updating : unexpected status (0) Mar 22 16:15:50 jik5.kamens.us ddclient[37347]: FAILED: was not updated because protocol is not supported. Mar 22 16:15:51 jik5.kamens.us audit[37355]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=37355 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us audit[37355]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=37355 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us kernel: audit: type=1400 audit(1679516151.167:198): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=37355 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us kernel: audit: type=1400 audit(1679516151.167:199): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=37355 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us audit[37357]: AVC apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.bw.bw" pid=37357 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us kernel: audit: type=1400 audit(1679516151.331:200): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.bw.bw" pid=37357 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us audit[37359]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.bw" pid=37359 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us audit[37360]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.core" pid=37360 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us audit[37361]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.core.hook.configure" pid=37361 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us kernel: audit: type=1400 audit(1679516151.335:201): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.bw" pid=37359 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us kernel: audit: type=1400 audit(1679516151.335:202): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.core" pid=37360 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us kernel: audit: type=1400 audit(1679516151.335:203): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.core.hook.configure" pid=37361 comm="apparmor_parser" Mar 22 16:15:51 jik5.kamens.us python3[4321]: Successfully fetched https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=tkuctpye Mar 22 16:15:52 jik5.kamens.us systemd[1]: snap-bw-45.mount: Deactivated successfully. Mar 22 16:15:52 jik5.kamens.us systemd[1]: Reloading. Mar 22 16:15:53 jik5.kamens.us snapd[1720]: storehelpers.go:769: cannot refresh snap "bw": snap has no updates available Mar 22 16:16:01 jik5.kamens.us sshd[37411]: Received disconnect from 51.15.140.163 port 35018:11: Bye Bye [preauth] Mar 22 16:16:01 jik5.kamens.us sshd[37411]: Disconnected from authenticating user root 51.15.140.163 port 35018 [preauth] Mar 22 16:16:06 jik5.kamens.us NetworkManager[1823]: [1679516166.0323] manager: NetworkManager state is now CONNECTED_SITE Mar 22 16:16:06 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.14' (uid=0 pid=1823 comm="/usr/sbin/NetworkManager --no-daemon" label="unconfined") Mar 22 16:16:06 jik5.kamens.us systemd[1]: Starting NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service... Mar 22 16:16:06 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:16:06 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:16:06 jik5.kamens.us dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Mar 22 16:16:06 jik5.kamens.us systemd[1]: Started NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service. Mar 22 16:16:06 jik5.kamens.us nm-dispatcher[37425]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args connectivity-change Mar 22 16:16:06 jik5.kamens.us nm-dispatcher[37425]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:16:06 jik5.kamens.us nm-dispatcher[37413]: req:1 'connectivity-change', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:16:06 jik5.kamens.us NetworkManager[1823]: [1679516166.1130] dispatcher: (8) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:16:06 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:16:06 jik5.kamens.us NetworkManager[1823]: [1679516166.2258] manager: NetworkManager state is now CONNECTED_GLOBAL Mar 22 16:16:06 jik5.kamens.us nm-dispatcher[37437]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args connectivity-change Mar 22 16:16:06 jik5.kamens.us nm-dispatcher[37437]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:16:06 jik5.kamens.us nm-dispatcher[37413]: req:2 'connectivity-change', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:16:06 jik5.kamens.us NetworkManager[1823]: [1679516166.2600] dispatcher: (9) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:16:07 jik5.kamens.us gnome-keyring-daemon[5808]: asked to register item /org/freedesktop/secrets/collection/Default_5fkeyring/164, but it's already registered Mar 22 16:16:07 jik5.kamens.us gnome-keyring-d[5808]: asked to register item /org/freedesktop/secrets/collection/Default_5fkeyring/164, but it's already registered Mar 22 16:16:16 jik5.kamens.us systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Mar 22 16:16:17 jik5.kamens.us systemd[1]: systemd-timedated.service: Deactivated successfully. Mar 22 16:16:20 jik5.kamens.us sshd[37447]: Received disconnect from 200.116.195.123 port 53768:11: Bye Bye [preauth] Mar 22 16:16:20 jik5.kamens.us sshd[37447]: Disconnected from authenticating user root 200.116.195.123 port 53768 [preauth] Mar 22 16:16:59 jik5.kamens.us kernel: INFO: task systemd-udevd:748 blocked for more than 362 seconds. Mar 22 16:16:59 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:16:59 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:16:59 jik5.kamens.us kernel: task:systemd-udevd state:D stack:0 pid:748 ppid:706 flags:0x00004006 Mar 22 16:16:59 jik5.kamens.us kernel: Call Trace: Mar 22 16:16:59 jik5.kamens.us kernel: Mar 22 16:16:59 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:16:59 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:16:59 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:16:59 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:16:59 jik5.kamens.us kernel: ? __kmem_cache_alloc_node+0x19d/0x340 Mar 22 16:16:59 jik5.kamens.us kernel: ? nv_drm_calloc+0x1e/0x40 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:16:59 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:16:59 jik5.kamens.us kernel: __nv_drm_connector_detect_internal+0x15c/0x2f0 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: nv_drm_connector_detect+0xe/0x20 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: drm_helper_probe_detect_ctx+0xa0/0x120 [drm_kms_helper] Mar 22 16:16:59 jik5.kamens.us kernel: check_connector_changed+0x52/0x200 [drm_kms_helper] Mar 22 16:16:59 jik5.kamens.us kernel: drm_helper_hpd_irq_event+0xbc/0x170 [drm_kms_helper] Mar 22 16:16:59 jik5.kamens.us kernel: nv_drm_load+0x2e7/0x480 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: ? __pfx_nv_drm_event_callback+0x10/0x10 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: drm_dev_register+0x10b/0x250 [drm] Mar 22 16:16:59 jik5.kamens.us kernel: nv_drm_probe_devices+0x111/0x200 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: ? __pfx_init_module+0x10/0x10 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: nv_drm_init+0x1e/0x60 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: nv_linux_drm_init+0xe/0xff0 [nvidia_drm] Mar 22 16:16:59 jik5.kamens.us kernel: do_one_initcall+0x5b/0x250 Mar 22 16:16:59 jik5.kamens.us kernel: do_init_module+0x7b/0x260 Mar 22 16:16:59 jik5.kamens.us kernel: load_module+0xc76/0xd60 Mar 22 16:16:59 jik5.kamens.us kernel: __do_sys_finit_module+0xc4/0x140 Mar 22 16:16:59 jik5.kamens.us kernel: ? __do_sys_finit_module+0xc4/0x140 Mar 22 16:16:59 jik5.kamens.us kernel: __x64_sys_finit_module+0x18/0x30 Mar 22 16:16:59 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:16:59 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:16:59 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:16:59 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:16:59 jik5.kamens.us kernel: RIP: 0033:0x7f28aa11581d Mar 22 16:16:59 jik5.kamens.us kernel: RSP: 002b:00007fffd1d3e608 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 Mar 22 16:16:59 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 000055e98903cf60 RCX: 00007f28aa11581d Mar 22 16:16:59 jik5.kamens.us kernel: RDX: 0000000000000000 RSI: 000055e9890421c0 RDI: 000000000000000d Mar 22 16:16:59 jik5.kamens.us kernel: RBP: 000055e9890421c0 R08: 0000000000000000 R09: 00007fffd1d3e730 Mar 22 16:16:59 jik5.kamens.us kernel: R10: 000000000000000d R11: 0000000000000246 R12: 0000000000020000 Mar 22 16:16:59 jik5.kamens.us kernel: R13: 000055e988ee5d50 R14: 0000000000000000 R15: 000055e9890423c0 Mar 22 16:16:59 jik5.kamens.us kernel: Mar 22 16:16:59 jik5.kamens.us kernel: INFO: task gpu-manager:1697 blocked for more than 362 seconds. Mar 22 16:16:59 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:16:59 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:16:59 jik5.kamens.us kernel: task:gpu-manager state:D stack:0 pid:1697 ppid:1 flags:0x00000002 Mar 22 16:16:59 jik5.kamens.us kernel: Call Trace: Mar 22 16:16:59 jik5.kamens.us kernel: Mar 22 16:16:59 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:16:59 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:16:59 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:16:59 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:16:59 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:16:59 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:16:59 jik5.kamens.us kernel: drm_open+0x58/0x170 [drm] Mar 22 16:16:59 jik5.kamens.us kernel: drm_stub_open+0xa6/0xe0 [drm] Mar 22 16:16:59 jik5.kamens.us kernel: chrdev_open+0xc2/0x240 Mar 22 16:16:59 jik5.kamens.us kernel: ? __pfx_chrdev_open+0x10/0x10 Mar 22 16:16:59 jik5.kamens.us kernel: do_dentry_open+0x1f5/0x430 Mar 22 16:16:59 jik5.kamens.us kernel: vfs_open+0x2d/0x40 Mar 22 16:16:59 jik5.kamens.us kernel: do_open+0x200/0x4d0 Mar 22 16:16:59 jik5.kamens.us kernel: ? open_last_lookups+0x8e/0x420 Mar 22 16:16:59 jik5.kamens.us kernel: path_openat+0x135/0x2e0 Mar 22 16:16:59 jik5.kamens.us kernel: do_filp_open+0xaf/0x170 Mar 22 16:16:59 jik5.kamens.us kernel: do_sys_openat2+0xbf/0x180 Mar 22 16:16:59 jik5.kamens.us kernel: __x64_sys_openat+0x6c/0xa0 Mar 22 16:16:59 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:16:59 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:16:59 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:16:59 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:16:59 jik5.kamens.us kernel: RIP: 0033:0x7f85d690b615 Mar 22 16:16:59 jik5.kamens.us kernel: RSP: 002b:00007ffe0bec1340 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 Mar 22 16:16:59 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f85d690b615 Mar 22 16:16:59 jik5.kamens.us kernel: RDX: 0000000000000002 RSI: 00007ffe0bec1410 RDI: 00000000ffffff9c Mar 22 16:16:59 jik5.kamens.us kernel: RBP: 00007ffe0bec1410 R08: 0000000000000073 R09: 00007f85d69f7300 Mar 22 16:16:59 jik5.kamens.us kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 Mar 22 16:16:59 jik5.kamens.us kernel: R13: 00007ffe0bec2718 R14: 000055f9e5cd6af8 R15: 00007f85d6be0000 Mar 22 16:16:59 jik5.kamens.us kernel: Mar 22 16:17:01 jik5.kamens.us CRON[37463]: pam_unix(cron:session): session opened for user root(uid=0) by (uid=0) Mar 22 16:17:01 jik5.kamens.us CRON[37464]: (root) CMD (cd / && run-parts --report /etc/cron.hourly) Mar 22 16:17:01 jik5.kamens.us CRON[37463]: pam_unix(cron:session): session closed for user root Mar 22 16:17:06 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:17:06 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:17:06 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:17:40 jik5.kamens.us sshd[37479]: Received disconnect from 51.15.140.163 port 35806:11: Bye Bye [preauth] Mar 22 16:17:40 jik5.kamens.us sshd[37479]: Disconnected from authenticating user root 51.15.140.163 port 35806 [preauth] Mar 22 16:17:44 jik5.kamens.us sshd[37488]: Received disconnect from 200.116.195.123 port 54298:11: Bye Bye [preauth] Mar 22 16:17:44 jik5.kamens.us sshd[37488]: Disconnected from authenticating user root 200.116.195.123 port 54298 [preauth] Mar 22 16:18:00 jik5.kamens.us sudo[37490]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/kill 37110 Mar 22 16:18:00 jik5.kamens.us sudo[37490]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:18:00 jik5.kamens.us sudo[37490]: pam_unix(sudo:session): session closed for user root Mar 22 16:18:00 jik5.kamens.us systemd[1]: Finished plymouth-quit-wait.service - Hold until boot process finishes up. Mar 22 16:18:00 jik5.kamens.us systemd[1]: Reached target multi-user.target - Multi-User System. Mar 22 16:18:00 jik5.kamens.us systemd[1]: Starting setvtrgb.service - Set console scheme... Mar 22 16:18:00 jik5.kamens.us systemd[1]: Finished setvtrgb.service - Set console scheme. Mar 22 16:18:00 jik5.kamens.us systemd[1]: Created slice system-getty.slice - Slice /system/getty. Mar 22 16:18:07 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:18:07 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:18:07 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:18:08 jik5.kamens.us sshd[37504]: Unable to negotiate with 27.43.224.162 port 47526: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Mar 22 16:18:37 jik5.kamens.us sudo[37508]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/journalctl Mar 22 16:18:37 jik5.kamens.us sudo[37508]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:18:38 jik5.kamens.us sudo[37508]: pam_unix(sudo:session): session closed for user root Mar 22 16:18:42 jik5.kamens.us sudo[37513]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/journalctl --since today Mar 22 16:18:42 jik5.kamens.us sudo[37513]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:18:43 jik5.kamens.us sudo[37513]: pam_unix(sudo:session): session closed for user root Mar 22 16:18:44 jik5.kamens.us sshd[37522]: error: kex_exchange_identification: Connection closed by remote host Mar 22 16:18:44 jik5.kamens.us sshd[37522]: Connection closed by 106.15.49.19 port 47636 Mar 22 16:19:00 jik5.kamens.us kernel: INFO: task systemd-udevd:748 blocked for more than 483 seconds. Mar 22 16:19:00 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:19:00 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:19:00 jik5.kamens.us kernel: task:systemd-udevd state:D stack:0 pid:748 ppid:706 flags:0x00004006 Mar 22 16:19:00 jik5.kamens.us kernel: Call Trace: Mar 22 16:19:00 jik5.kamens.us kernel: Mar 22 16:19:00 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:19:00 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:19:00 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:19:00 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:19:00 jik5.kamens.us kernel: ? __kmem_cache_alloc_node+0x19d/0x340 Mar 22 16:19:00 jik5.kamens.us kernel: ? nv_drm_calloc+0x1e/0x40 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:19:00 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:19:00 jik5.kamens.us kernel: __nv_drm_connector_detect_internal+0x15c/0x2f0 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: nv_drm_connector_detect+0xe/0x20 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: drm_helper_probe_detect_ctx+0xa0/0x120 [drm_kms_helper] Mar 22 16:19:00 jik5.kamens.us kernel: check_connector_changed+0x52/0x200 [drm_kms_helper] Mar 22 16:19:00 jik5.kamens.us kernel: drm_helper_hpd_irq_event+0xbc/0x170 [drm_kms_helper] Mar 22 16:19:00 jik5.kamens.us kernel: nv_drm_load+0x2e7/0x480 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: ? __pfx_nv_drm_event_callback+0x10/0x10 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: drm_dev_register+0x10b/0x250 [drm] Mar 22 16:19:00 jik5.kamens.us kernel: nv_drm_probe_devices+0x111/0x200 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: ? __pfx_init_module+0x10/0x10 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: nv_drm_init+0x1e/0x60 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: nv_linux_drm_init+0xe/0xff0 [nvidia_drm] Mar 22 16:19:00 jik5.kamens.us kernel: do_one_initcall+0x5b/0x250 Mar 22 16:19:00 jik5.kamens.us kernel: do_init_module+0x7b/0x260 Mar 22 16:19:00 jik5.kamens.us kernel: load_module+0xc76/0xd60 Mar 22 16:19:00 jik5.kamens.us kernel: __do_sys_finit_module+0xc4/0x140 Mar 22 16:19:00 jik5.kamens.us kernel: ? __do_sys_finit_module+0xc4/0x140 Mar 22 16:19:00 jik5.kamens.us kernel: __x64_sys_finit_module+0x18/0x30 Mar 22 16:19:00 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:19:00 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:19:00 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:19:00 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:19:00 jik5.kamens.us kernel: RIP: 0033:0x7f28aa11581d Mar 22 16:19:00 jik5.kamens.us kernel: RSP: 002b:00007fffd1d3e608 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 Mar 22 16:19:00 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 000055e98903cf60 RCX: 00007f28aa11581d Mar 22 16:19:00 jik5.kamens.us kernel: RDX: 0000000000000000 RSI: 000055e9890421c0 RDI: 000000000000000d Mar 22 16:19:00 jik5.kamens.us kernel: RBP: 000055e9890421c0 R08: 0000000000000000 R09: 00007fffd1d3e730 Mar 22 16:19:00 jik5.kamens.us kernel: R10: 000000000000000d R11: 0000000000000246 R12: 0000000000020000 Mar 22 16:19:00 jik5.kamens.us kernel: R13: 000055e988ee5d50 R14: 0000000000000000 R15: 000055e9890423c0 Mar 22 16:19:00 jik5.kamens.us kernel: Mar 22 16:19:00 jik5.kamens.us kernel: INFO: task gpu-manager:1697 blocked for more than 483 seconds. Mar 22 16:19:00 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:19:00 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:19:00 jik5.kamens.us kernel: task:gpu-manager state:D stack:0 pid:1697 ppid:1 flags:0x00000002 Mar 22 16:19:00 jik5.kamens.us kernel: Call Trace: Mar 22 16:19:00 jik5.kamens.us kernel: Mar 22 16:19:00 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:19:00 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:19:00 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:19:00 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:19:00 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:19:00 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:19:00 jik5.kamens.us kernel: drm_open+0x58/0x170 [drm] Mar 22 16:19:00 jik5.kamens.us kernel: drm_stub_open+0xa6/0xe0 [drm] Mar 22 16:19:00 jik5.kamens.us kernel: chrdev_open+0xc2/0x240 Mar 22 16:19:00 jik5.kamens.us kernel: ? __pfx_chrdev_open+0x10/0x10 Mar 22 16:19:00 jik5.kamens.us kernel: do_dentry_open+0x1f5/0x430 Mar 22 16:19:00 jik5.kamens.us kernel: vfs_open+0x2d/0x40 Mar 22 16:19:00 jik5.kamens.us kernel: do_open+0x200/0x4d0 Mar 22 16:19:00 jik5.kamens.us kernel: ? open_last_lookups+0x8e/0x420 Mar 22 16:19:00 jik5.kamens.us kernel: path_openat+0x135/0x2e0 Mar 22 16:19:00 jik5.kamens.us kernel: do_filp_open+0xaf/0x170 Mar 22 16:19:00 jik5.kamens.us kernel: do_sys_openat2+0xbf/0x180 Mar 22 16:19:00 jik5.kamens.us kernel: __x64_sys_openat+0x6c/0xa0 Mar 22 16:19:00 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:19:00 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:19:00 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:19:00 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:19:00 jik5.kamens.us kernel: RIP: 0033:0x7f85d690b615 Mar 22 16:19:00 jik5.kamens.us kernel: RSP: 002b:00007ffe0bec1340 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 Mar 22 16:19:00 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f85d690b615 Mar 22 16:19:00 jik5.kamens.us kernel: RDX: 0000000000000002 RSI: 00007ffe0bec1410 RDI: 00000000ffffff9c Mar 22 16:19:00 jik5.kamens.us kernel: RBP: 00007ffe0bec1410 R08: 0000000000000073 R09: 00007f85d69f7300 Mar 22 16:19:00 jik5.kamens.us kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 Mar 22 16:19:00 jik5.kamens.us kernel: R13: 00007ffe0bec2718 R14: 000055f9e5cd6af8 R15: 00007f85d6be0000 Mar 22 16:19:00 jik5.kamens.us kernel: Mar 22 16:19:07 jik5.kamens.us sshd[37523]: Received disconnect from 200.116.195.123 port 54820:11: Bye Bye [preauth] Mar 22 16:19:07 jik5.kamens.us sshd[37523]: Disconnected from authenticating user root 200.116.195.123 port 54820 [preauth] Mar 22 16:19:08 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:19:08 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:19:08 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:19:10 jik5.kamens.us sshd[37535]: Invalid user admin from 106.15.49.19 port 40482 Mar 22 16:19:10 jik5.kamens.us sshd[37539]: Invalid user admin from 106.15.49.19 port 40762 Mar 22 16:19:10 jik5.kamens.us sshd[37535]: Connection closed by invalid user admin 106.15.49.19 port 40482 [preauth] Mar 22 16:19:10 jik5.kamens.us sshd[37537]: Invalid user admin from 106.15.49.19 port 40622 Mar 22 16:19:10 jik5.kamens.us sshd[37537]: Connection closed by invalid user admin 106.15.49.19 port 40622 [preauth] Mar 22 16:19:11 jik5.kamens.us sshd[37539]: Connection closed by invalid user admin 106.15.49.19 port 40762 [preauth] Mar 22 16:19:12 jik5.kamens.us sshd[37541]: Invalid user admin from 106.15.49.19 port 40902 Mar 22 16:19:13 jik5.kamens.us sshd[37541]: Connection closed by invalid user admin 106.15.49.19 port 40902 [preauth] Mar 22 16:19:13 jik5.kamens.us sshd[37550]: Connection closed by authenticating user postgres 106.15.49.19 port 41882 [preauth] Mar 22 16:19:13 jik5.kamens.us sshd[2958]: error: beginning MaxStartups throttling Mar 22 16:19:13 jik5.kamens.us sshd[2958]: drop connection #11 from [106.15.49.19]:42722 on [192.168.4.11]:22 past MaxStartups Mar 22 16:19:14 jik5.kamens.us sshd[37557]: Invalid user hadoop from 106.15.49.19 port 42162 Mar 22 16:19:14 jik5.kamens.us sshd[37556]: Connection closed by authenticating user postgres 106.15.49.19 port 41742 [preauth] Mar 22 16:19:22 jik5.kamens.us sshd[37583]: Received disconnect from 51.15.140.163 port 36594:11: Bye Bye [preauth] Mar 22 16:19:22 jik5.kamens.us sshd[37583]: Disconnected from authenticating user root 51.15.140.163 port 36594 [preauth] Mar 22 16:19:37 jik5.kamens.us sshd[37592]: Received disconnect from 61.177.172.104 port 14041:11: [preauth] Mar 22 16:19:37 jik5.kamens.us sshd[37592]: Disconnected from authenticating user root 61.177.172.104 port 14041 [preauth] Mar 22 16:19:40 jik5.kamens.us sudo[37594]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/systemctl stop gpu-manager Mar 22 16:19:40 jik5.kamens.us sudo[37594]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:19:44 jik5.kamens.us sudo[37594]: pam_unix(sudo:session): session closed for user root Mar 22 16:19:47 jik5.kamens.us sudo[37603]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/systemctl status gpu-manager Mar 22 16:19:47 jik5.kamens.us sudo[37603]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:19:50 jik5.kamens.us sudo[37603]: pam_unix(sudo:session): session closed for user root Mar 22 16:20:00 jik5.kamens.us sudo[37613]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/kill 1697 Mar 22 16:20:00 jik5.kamens.us sudo[37613]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:20:00 jik5.kamens.us sudo[37613]: pam_unix(sudo:session): session closed for user root Mar 22 16:20:01 jik5.kamens.us sudo[37616]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/kill 1697 Mar 22 16:20:01 jik5.kamens.us sudo[37616]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:20:01 jik5.kamens.us sudo[37616]: pam_unix(sudo:session): session closed for user root Mar 22 16:20:01 jik5.kamens.us CRON[37619]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:20:01 jik5.kamens.us CRON[37620]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:20:01 jik5.kamens.us CRON[37621]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:20:01 jik5.kamens.us CRON[37622]: (jik) CMD (PATH=/usr/local/bin:$PATH r2e run &>/dev/null) Mar 22 16:20:01 jik5.kamens.us CRON[37623]: (jik) CMD (curl --silent 'https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=bygbfafv' &>/dev/null) Mar 22 16:20:01 jik5.kamens.us CRON[37624]: (jik) CMD (find ~/CloudStation -name '*_Conflict') Mar 22 16:20:01 jik5.kamens.us CRON[37620]: pam_unix(cron:session): session closed for user jik Mar 22 16:20:01 jik5.kamens.us CRON[37621]: pam_unix(cron:session): session closed for user jik Mar 22 16:20:03 jik5.kamens.us sudo[37636]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/kill -9 1697 Mar 22 16:20:03 jik5.kamens.us sudo[37636]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:20:03 jik5.kamens.us sudo[37636]: pam_unix(sudo:session): session closed for user root Mar 22 16:20:04 jik5.kamens.us sudo[37639]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/kill -9 1697 Mar 22 16:20:04 jik5.kamens.us sudo[37639]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:20:04 jik5.kamens.us sudo[37639]: pam_unix(sudo:session): session closed for user root Mar 22 16:20:05 jik5.kamens.us postfix/pickup[4214]: 6703C2D000A6: uid=1000 from= Mar 22 16:20:05 jik5.kamens.us postfix/cleanup[37645]: 6703C2D000A6: message-id=<510a6c8b-eeb6-4391-ab84-10d108011c6b@jik5.kamens.us> Mar 22 16:20:05 jik5.kamens.us postfix/qmgr[4215]: 6703C2D000A6: from=, size=1998, nrcpt=1 (queue active) Mar 22 16:20:06 jik5.kamens.us postfix/smtp[37648]: 6703C2D000A6: to=, relay=email.kamens.us[45.79.160.233]:587, delay=0.98, delays=0.04/0.02/0.23/0.68, dsn=2.0.0, status=sent (250 2.0.0 32MKK5RK2208055 Message accepted for delivery) Mar 22 16:20:06 jik5.kamens.us postfix/qmgr[4215]: 6703C2D000A6: removed Mar 22 16:20:07 jik5.kamens.us CRON[37619]: pam_unix(cron:session): session closed for user jik Mar 22 16:20:08 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:20:08 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:20:08 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:20:11 jik5.kamens.us sudo[37661]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/systemctl status gpu-manager Mar 22 16:20:11 jik5.kamens.us sudo[37661]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:20:31 jik5.kamens.us sshd[37665]: Received disconnect from 200.116.195.123 port 55342:11: Bye Bye [preauth] Mar 22 16:20:31 jik5.kamens.us sshd[37665]: Disconnected from authenticating user root 200.116.195.123 port 55342 [preauth] Mar 22 16:20:33 jik5.kamens.us sudo[37661]: pam_unix(sudo:session): session closed for user root Mar 22 16:20:51 jik5.kamens.us ddclient[37678]: FAILED: updating Home: unexpected status (13) Mar 22 16:20:51 jik5.kamens.us ddclient[37680]: SUCCESS: updating : good: IP address set to 108.26.214.208 Mar 22 16:20:51 jik5.kamens.us ddclient[37682]: FAILED: updating : unexpected status (0) Mar 22 16:20:51 jik5.kamens.us ddclient[37684]: FAILED: was not updated because protocol is not supported. Mar 22 16:20:52 jik5.kamens.us python3[4321]: Successfully fetched https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=tkuctpye Mar 22 16:21:01 jik5.kamens.us kernel: INFO: task systemd-udevd:748 blocked for more than 604 seconds. Mar 22 16:21:01 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:21:01 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:21:01 jik5.kamens.us kernel: task:systemd-udevd state:D stack:0 pid:748 ppid:706 flags:0x00004006 Mar 22 16:21:01 jik5.kamens.us kernel: Call Trace: Mar 22 16:21:01 jik5.kamens.us kernel: Mar 22 16:21:01 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:21:01 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:21:01 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:21:01 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:21:01 jik5.kamens.us kernel: ? __kmem_cache_alloc_node+0x19d/0x340 Mar 22 16:21:01 jik5.kamens.us kernel: ? nv_drm_calloc+0x1e/0x40 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:21:01 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:21:01 jik5.kamens.us kernel: __nv_drm_connector_detect_internal+0x15c/0x2f0 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: nv_drm_connector_detect+0xe/0x20 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: drm_helper_probe_detect_ctx+0xa0/0x120 [drm_kms_helper] Mar 22 16:21:01 jik5.kamens.us kernel: check_connector_changed+0x52/0x200 [drm_kms_helper] Mar 22 16:21:01 jik5.kamens.us kernel: drm_helper_hpd_irq_event+0xbc/0x170 [drm_kms_helper] Mar 22 16:21:01 jik5.kamens.us kernel: nv_drm_load+0x2e7/0x480 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: ? __pfx_nv_drm_event_callback+0x10/0x10 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: drm_dev_register+0x10b/0x250 [drm] Mar 22 16:21:01 jik5.kamens.us kernel: nv_drm_probe_devices+0x111/0x200 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: ? __pfx_init_module+0x10/0x10 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: nv_drm_init+0x1e/0x60 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: nv_linux_drm_init+0xe/0xff0 [nvidia_drm] Mar 22 16:21:01 jik5.kamens.us kernel: do_one_initcall+0x5b/0x250 Mar 22 16:21:01 jik5.kamens.us kernel: do_init_module+0x7b/0x260 Mar 22 16:21:01 jik5.kamens.us kernel: load_module+0xc76/0xd60 Mar 22 16:21:01 jik5.kamens.us kernel: __do_sys_finit_module+0xc4/0x140 Mar 22 16:21:01 jik5.kamens.us kernel: ? __do_sys_finit_module+0xc4/0x140 Mar 22 16:21:01 jik5.kamens.us kernel: __x64_sys_finit_module+0x18/0x30 Mar 22 16:21:01 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:21:01 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:21:01 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:21:01 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:21:01 jik5.kamens.us kernel: RIP: 0033:0x7f28aa11581d Mar 22 16:21:01 jik5.kamens.us kernel: RSP: 002b:00007fffd1d3e608 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 Mar 22 16:21:01 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 000055e98903cf60 RCX: 00007f28aa11581d Mar 22 16:21:01 jik5.kamens.us kernel: RDX: 0000000000000000 RSI: 000055e9890421c0 RDI: 000000000000000d Mar 22 16:21:01 jik5.kamens.us kernel: RBP: 000055e9890421c0 R08: 0000000000000000 R09: 00007fffd1d3e730 Mar 22 16:21:01 jik5.kamens.us kernel: R10: 000000000000000d R11: 0000000000000246 R12: 0000000000020000 Mar 22 16:21:01 jik5.kamens.us kernel: R13: 000055e988ee5d50 R14: 0000000000000000 R15: 000055e9890423c0 Mar 22 16:21:01 jik5.kamens.us kernel: Mar 22 16:21:01 jik5.kamens.us kernel: INFO: task gpu-manager:1697 blocked for more than 604 seconds. Mar 22 16:21:01 jik5.kamens.us kernel: Tainted: P OE 6.2.0-18-generic #18-Ubuntu Mar 22 16:21:01 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:21:01 jik5.kamens.us kernel: task:gpu-manager state:D stack:0 pid:1697 ppid:1 flags:0x00000006 Mar 22 16:21:01 jik5.kamens.us kernel: Call Trace: Mar 22 16:21:01 jik5.kamens.us kernel: Mar 22 16:21:01 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:21:01 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:21:01 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:21:01 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:21:01 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:21:01 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:21:01 jik5.kamens.us kernel: drm_open+0x58/0x170 [drm] Mar 22 16:21:01 jik5.kamens.us kernel: drm_stub_open+0xa6/0xe0 [drm] Mar 22 16:21:01 jik5.kamens.us kernel: chrdev_open+0xc2/0x240 Mar 22 16:21:01 jik5.kamens.us kernel: ? __pfx_chrdev_open+0x10/0x10 Mar 22 16:21:01 jik5.kamens.us kernel: do_dentry_open+0x1f5/0x430 Mar 22 16:21:01 jik5.kamens.us kernel: vfs_open+0x2d/0x40 Mar 22 16:21:01 jik5.kamens.us kernel: do_open+0x200/0x4d0 Mar 22 16:21:01 jik5.kamens.us kernel: ? open_last_lookups+0x8e/0x420 Mar 22 16:21:01 jik5.kamens.us kernel: path_openat+0x135/0x2e0 Mar 22 16:21:01 jik5.kamens.us kernel: do_filp_open+0xaf/0x170 Mar 22 16:21:01 jik5.kamens.us kernel: do_sys_openat2+0xbf/0x180 Mar 22 16:21:01 jik5.kamens.us kernel: __x64_sys_openat+0x6c/0xa0 Mar 22 16:21:01 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:21:01 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: ? syscall_exit_to_user_mode+0x29/0x50 Mar 22 16:21:01 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: ? do_syscall_64+0x67/0x90 Mar 22 16:21:01 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:21:01 jik5.kamens.us kernel: RIP: 0033:0x7f85d690b615 Mar 22 16:21:01 jik5.kamens.us kernel: RSP: 002b:00007ffe0bec1340 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 Mar 22 16:21:01 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f85d690b615 Mar 22 16:21:01 jik5.kamens.us kernel: RDX: 0000000000000002 RSI: 00007ffe0bec1410 RDI: 00000000ffffff9c Mar 22 16:21:01 jik5.kamens.us kernel: RBP: 00007ffe0bec1410 R08: 0000000000000073 R09: 00007f85d69f7300 Mar 22 16:21:01 jik5.kamens.us kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 Mar 22 16:21:01 jik5.kamens.us kernel: R13: 00007ffe0bec2718 R14: 000055f9e5cd6af8 R15: 00007f85d6be0000 Mar 22 16:21:01 jik5.kamens.us kernel: Mar 22 16:21:08 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:21:08 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:21:08 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:21:09 jik5.kamens.us sshd[37543]: fatal: Timeout before authentication for 106.15.49.19 port 41042 Mar 22 16:21:10 jik5.kamens.us sshd[37544]: fatal: Timeout before authentication for 106.15.49.19 port 41182 Mar 22 16:21:10 jik5.kamens.us sshd[37545]: fatal: Timeout before authentication for 106.15.49.19 port 41322 Mar 22 16:21:10 jik5.kamens.us systemd[1]: gpu-manager.service: State 'stop-sigterm' timed out. Killing. Mar 22 16:21:10 jik5.kamens.us systemd[1]: gpu-manager.service: Killing process 1697 (gpu-manager) with signal SIGKILL. Mar 22 16:21:10 jik5.kamens.us sshd[37547]: fatal: Timeout before authentication for 106.15.49.19 port 41462 Mar 22 16:21:11 jik5.kamens.us sshd[37549]: fatal: Timeout before authentication for 106.15.49.19 port 41602 Mar 22 16:21:12 jik5.kamens.us sshd[37552]: fatal: Timeout before authentication for 106.15.49.19 port 42022 Mar 22 16:21:12 jik5.kamens.us sshd[37557]: fatal: Timeout before authentication for 106.15.49.19 port 42162 Mar 22 16:21:12 jik5.kamens.us sshd[37560]: fatal: Timeout before authentication for 106.15.49.19 port 42302 Mar 22 16:21:13 jik5.kamens.us sshd[37562]: fatal: Timeout before authentication for 106.15.49.19 port 42442 Mar 22 16:21:13 jik5.kamens.us sshd[37563]: fatal: Timeout before authentication for 106.15.49.19 port 42582 Mar 22 16:21:14 jik5.kamens.us sshd[37565]: fatal: Timeout before authentication for 106.15.49.19 port 42862 Mar 22 16:21:14 jik5.kamens.us sshd[37567]: fatal: Timeout before authentication for 106.15.49.19 port 43002 Mar 22 16:21:27 jik5.kamens.us sudo[37704]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/kill -9 1167 Mar 22 16:21:27 jik5.kamens.us sudo[37704]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:21:27 jik5.kamens.us sudo[37704]: pam_unix(sudo:session): session closed for user root Mar 22 16:21:38 jik5.kamens.us sshd[2958]: exited MaxStartups throttling after 00:02:25, 1 connections dropped Mar 22 16:21:39 jik5.kamens.us sshd[37711]: error: kex_exchange_identification: Connection closed by remote host Mar 22 16:21:39 jik5.kamens.us sshd[37711]: Connection closed by 198.175.88.63 port 55975 Mar 22 16:21:55 jik5.kamens.us sshd[37717]: Received disconnect from 200.116.195.123 port 55860:11: Bye Bye [preauth] Mar 22 16:21:55 jik5.kamens.us sshd[37717]: Disconnected from authenticating user root 200.116.195.123 port 55860 [preauth] Mar 22 16:22:01 jik5.kamens.us CRON[37719]: pam_unix(cron:session): session opened for user root(uid=0) by (uid=0) Mar 22 16:22:01 jik5.kamens.us CRON[37720]: (root) CMD (if test -x /usr/sbin/apticron; then /usr/sbin/apticron --cron; else true; fi) Mar 22 16:22:01 jik5.kamens.us CRON[37719]: pam_unix(cron:session): session closed for user root Mar 22 16:22:08 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:22:08 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:22:09 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us sudo[37735]: jik : TTY=pts/1 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/sbin/shutdown -P now Mar 22 16:22:17 jik5.kamens.us sudo[37735]: pam_unix(sudo:session): session opened for user root(uid=0) by jik(uid=1000) Mar 22 16:22:17 jik5.kamens.us systemd-logind[1726]: The system will power off now! Mar 22 16:22:17 jik5.kamens.us audit[1694]: USER_AVC pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_signal" bus="system" path="/org/freedesktop/login1" interface="org.freedesktop.login1.Manager" member="PrepareForShutdown" name=":1.12" mask="receive" pid=5380 label="snap.snapd-desktop-integration.snapd-desktop-integration" peer_pid=1726 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:22:17 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:22:17 jik5.kamens.us sudo[37735]: pam_unix(sudo:session): session closed for user root Mar 22 16:22:17 jik5.kamens.us kernel: audit: type=1107 audit(1679516537.696:204): pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_signal" bus="system" path="/org/freedesktop/login1" interface="org.freedesktop.login1.Manager" member="PrepareForShutdown" name=":1.12" mask="receive" pid=5380 label="snap.snapd-desktop-integration.snapd-desktop-integration" peer_pid=1726 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:22:17 jik5.kamens.us kernel: audit: type=1420 audit(1679516537.696:205): subj_apparmor=unconfined Mar 22 16:22:17 jik5.kamens.us systemd-logind[1726]: System is powering down. Mar 22 16:22:17 jik5.kamens.us systemd[1]: unattended-upgrades.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping session-2.scope - Session 2 of User jik... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Removed slice system-getty.slice - Slice /system/getty. Mar 22 16:22:17 jik5.kamens.us sshd[3786]: pam_unix(sshd:session): session closed for user jik Mar 22 16:22:17 jik5.kamens.us systemd[1]: Removed slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target bluetooth.target - Bluetooth Support. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target getty-pre.target - Preparation for Logins. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target rpc_pipefs.target. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target rpcbind.target - RPC Port Mapper. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target sound.target - Sound Card. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target timers.target - Timer Units. Mar 22 16:22:17 jik5.kamens.us systemd[1]: anacron.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped anacron.timer - Trigger anacron every hour. Mar 22 16:22:17 jik5.kamens.us systemd[1]: apport-autoreport.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped apport-autoreport.timer - Process error reports when automatic reporting is enabled (timer based). Mar 22 16:22:17 jik5.kamens.us systemd[1]: apt-daily-upgrade.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped apt-daily-upgrade.timer - Daily apt upgrade and clean activities. Mar 22 16:22:17 jik5.kamens.us systemd[1]: apt-daily.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped apt-daily.timer - Daily apt download activities. Mar 22 16:22:17 jik5.kamens.us systemd[1]: dpkg-db-backup.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped dpkg-db-backup.timer - Daily dpkg database backup timer. Mar 22 16:22:17 jik5.kamens.us systemd[1]: e2scrub_all.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped e2scrub_all.timer - Periodic ext4 Online Metadata Check for All Filesystems. Mar 22 16:22:17 jik5.kamens.us systemd[1]: fstrim.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped fstrim.timer - Discard unused blocks once a week. Mar 22 16:22:17 jik5.kamens.us systemd[1]: fwupd-refresh.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped fwupd-refresh.timer - Refresh fwupd metadata regularly. Mar 22 16:22:17 jik5.kamens.us systemd[1]: logrotate.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped logrotate.timer - Daily rotation of log files. Mar 22 16:22:17 jik5.kamens.us systemd[1]: man-db.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped man-db.timer - Daily man-db regeneration. Mar 22 16:22:17 jik5.kamens.us systemd[1]: motd-news.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped motd-news.timer - Message of the Day. Mar 22 16:22:17 jik5.kamens.us systemd[1]: plocate-updatedb.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped plocate-updatedb.timer - Update the plocate database daily. Mar 22 16:22:17 jik5.kamens.us systemd[1]: systemd-tmpfiles-clean.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Mar 22 16:22:17 jik5.kamens.us systemd[1]: ua-timer.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped ua-timer.timer - Ubuntu Advantage Timer for running repeated jobs. Mar 22 16:22:17 jik5.kamens.us systemd[1]: update-notifier-download.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped update-notifier-download.timer - Download data for packages that failed at package install time. Mar 22 16:22:17 jik5.kamens.us systemd[1]: update-notifier-motd.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped update-notifier-motd.timer - Check to see whether there is a new version of Ubuntu available. Mar 22 16:22:17 jik5.kamens.us systemd[1]: yubikey-monitor.timer: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped yubikey-monitor.timer - Check for inserted Yubikey every minute. Mar 22 16:22:17 jik5.kamens.us systemd[1]: lvm2-lvmpolld.socket: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Closed lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:22:17 jik5.kamens.us systemd[1]: systemd-rfkill.socket: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Closed systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Unmounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping alsa-restore.service - Save/Restore Sound Card State... Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Terminating Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping blk-availability.service - Availability of block devices... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping bluetooth.service - Bluetooth service... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping colord.service - Manage, Install and Generate Color Profiles... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping rpc-statd.service - NFS status monitor for NFSv2/3 locking.... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping rtkit-daemon.service - RealtimeKit Scheduling Policy Service... Mar 22 16:22:17 jik5.kamens.us systemd[1]: snapd.system-shutdown.service - Ubuntu core (all-snaps) system shutdown helper setup service was skipped because no trigger condition checks were met. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping ssh.service - OpenBSD Secure Shell server... Mar 22 16:22:17 jik5.kamens.us sshd[2958]: Received signal 15; terminating. Mar 22 16:22:17 jik5.kamens.us blkdeactivate[37744]: Deactivating block devices: Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target multi-user.target - Multi-User System. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped target getty.target - Login Prompts. Mar 22 16:22:17 jik5.kamens.us ModemManager[1859]: caught signal, shutting down... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping ModemManager.service - Modem Manager... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping accounts-daemon.service - Accounts Service... Mar 22 16:22:17 jik5.kamens.us ModemManager[1859]: ModemManager is shut down Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping apache2.service - The Apache HTTP Server... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping apport.service - automatic crash report generation... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping atd.service - Deferred execution scheduler... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping cron.service - Regular background program processing daemon... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping cups-browsed.service - Make remote CUPS printers available locally... Mar 22 16:22:17 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:22:17.812291190-04:00" level=info msg="Processing signal 'terminated'" Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping ddclient.service - Update dynamic domain name service entries... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping docker.service - Docker Application Container Engine... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping fail2ban.service - Fail2Ban Service... Mar 22 16:22:17 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:22:17.814313343-04:00" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Mar 22 16:22:17 jik5.kamens.us NetworkManager[1823]: [1679516537.8143] modem-manager: ModemManager no longer available Mar 22 16:22:17 jik5.kamens.us dockerd[3567]: time="2023-03-22T16:22:17.814827664-04:00" level=info msg="Daemon shutdown complete" Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping inotify-canary-pause.service - Pause inotify canary on shutdown... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping irqbalance.service - irqbalance daemon... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping kerneloops.service - Tool to automatically collect and submit kernel crash signatures... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping mariadb.service - MariaDB 10.11.2 database server... Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' requested by ':1.19' (uid=0 pid=1908 comm="/usr/sbin/cupsd -l" label="/usr/sbin/cupsd (enforce)") Mar 22 16:22:17 jik5.kamens.us blkdeactivate[37744]: [SKIP]: unmount of ubuntu--vg-swap_1 (dm-2) mounted on [SWAP] Mar 22 16:22:17 jik5.kamens.us blkdeactivate[37744]: [SKIP]: unmount of ubuntu--vg-root (dm-1) mounted on / Mar 22 16:22:17 jik5.kamens.us inotify-canary[37755]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args pre inotify-canary-pause.service Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping mongod.service - MongoDB Database Server... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping networkd-dispatcher.service - Dispatcher daemon for systemd-networkd... Mar 22 16:22:17 jik5.kamens.us systemd[1]: openvpn.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped openvpn.service - OpenVPN service. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Starting plymouth-poweroff.service - Show Plymouth Power Off Screen... Mar 22 16:22:17 jik5.kamens.us systemd[1]: plymouth-quit-wait.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped plymouth-quit-wait.service - Hold until boot process finishes up. Mar 22 16:22:17 jik5.kamens.us systemd[1]: postfix.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:17 0 [Note] /usr/sbin/mariadbd (initiated by: unknown): Normal shutdown Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped postfix.service - Postfix Mail Transport Agent. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping postfix@-.service - Postfix Mail Transport Agent (instance -)... Mar 22 16:22:17 jik5.kamens.us systemd[1]: postgresql.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped postgresql.service - PostgreSQL RDBMS. Mar 22 16:22:17 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:17 0 [Note] InnoDB: FTS optimize thread exiting. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping postgresql@11-main.service - PostgreSQL Cluster 11-main... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping postgresql@12-main.service - PostgreSQL Cluster 12-main... Mar 22 16:22:17 jik5.kamens.us su[37756]: (to jik) root on none Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping postgresql@13-main.service - PostgreSQL Cluster 13-main... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping postgresql@14-main.service - PostgreSQL Cluster 14-main... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping postgresql@15-main.service - PostgreSQL Cluster 15-main... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping power-profiles-daemon.service - Power Profiles daemon... Mar 22 16:22:17 jik5.kamens.us postfix[37771]: Postfix is using backwards-compatible default settings Mar 22 16:22:17 jik5.kamens.us postfix[37771]: See http://www.postfix.org/COMPATIBILITY_README.html for details Mar 22 16:22:17 jik5.kamens.us postfix[37771]: To disable backwards compatibility use "postconf compatibility_level=3.6" and "postfix reload" Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping pwrstatd.service - LSB: The monitor UPS software.... Mar 22 16:22:17 jik5.kamens.us systemd[1]: rc-local.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped rc-local.service - /etc/rc.local Compatibility. Mar 22 16:22:17 jik5.kamens.us systemd[1]: rc-local.service: Consumed 1min 43.109s CPU time. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping rsyslog.service - System Logging Service... Mar 22 16:22:17 jik5.kamens.us rsyslogd[1879]: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="1879" x-info="https://www.rsyslog.com"] exiting on signal 15. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping snap.cups.cups-browsed.service - Service for snap application cups.cups-browsed... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping snap.cups.cupsd.service - Service for snap application cups.cupsd... Mar 22 16:22:17 jik5.kamens.us systemd[1]: snapd.seeded.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped snapd.seeded.service - Wait until snapd is fully seeded. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping snapd.service - Snap Daemon... Mar 22 16:22:17 jik5.kamens.us thermald[1728]: Terminating ... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping thermald.service - Thermal Daemon Service... Mar 22 16:22:17 jik5.kamens.us snapd[1720]: main.go:155: Exiting on terminated signal. Mar 22 16:22:17 jik5.kamens.us snapd[1720]: overlord.go:512: Released state lock file Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping ubuntu-fan.service - Ubuntu FAN network setup... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping udisks2.service - Disk Manager... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping upower.service - Daemon for power management... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping vboxautostart-service.service... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping vboxballoonctrl-service.service... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping vboxweb-service.service... Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopping virtualbox.service - LSB: VirtualBox Linux kernel module... Mar 22 16:22:17 jik5.kamens.us postfix/postfix-script[37826]: stopping the Postfix mail system Mar 22 16:22:17 jik5.kamens.us udisksd[1731]: udisks daemon version 2.9.4 exiting Mar 22 16:22:17 jik5.kamens.us systemd[1]: accounts-daemon.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped accounts-daemon.service - Accounts Service. Mar 22 16:22:17 jik5.kamens.us postfix/master[4213]: terminating on signal 15 Mar 22 16:22:17 jik5.kamens.us systemd[1]: irqbalance.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped irqbalance.service - irqbalance daemon. Mar 22 16:22:17 jik5.kamens.us systemd[1]: networkd-dispatcher.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped networkd-dispatcher.service - Dispatcher daemon for systemd-networkd. Mar 22 16:22:17 jik5.kamens.us systemd[1]: power-profiles-daemon.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped power-profiles-daemon.service - Power Profiles daemon. Mar 22 16:22:17 jik5.kamens.us systemd[1]: snapd.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped snapd.service - Snap Daemon. Mar 22 16:22:17 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:17 0 [Note] InnoDB: Starting shutdown... Mar 22 16:22:17 jik5.kamens.us systemd[1]: snapd.service: Consumed 11.948s CPU time. Mar 22 16:22:17 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:17 0 [Note] InnoDB: Dumping buffer pool(s) to /var/lib/mysql/ib_buffer_pool Mar 22 16:22:17 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:17 0 [Note] InnoDB: Restricted to 2016 pages due to innodb_buf_pool_dump_pct=25 Mar 22 16:22:17 jik5.kamens.us systemd[1]: udisks2.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:17 0 [Note] InnoDB: Buffer pool(s) dump completed at 230322 16:22:17 Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped udisks2.service - Disk Manager. Mar 22 16:22:17 jik5.kamens.us systemd[1]: udisks2.service: Consumed 1.521s CPU time. Mar 22 16:22:17 jik5.kamens.us systemd[1]: ModemManager.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped ModemManager.service - Modem Manager. Mar 22 16:22:17 jik5.kamens.us systemd[1]: rsyslog.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped rsyslog.service - System Logging Service. Mar 22 16:22:17 jik5.kamens.us systemd[1]: colord.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped colord.service - Manage, Install and Generate Color Profiles. Mar 22 16:22:17 jik5.kamens.us systemd[1]: ssh.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped ssh.service - OpenBSD Secure Shell server. Mar 22 16:22:17 jik5.kamens.us systemd[1]: ssh.service: Consumed 1.424s CPU time. Mar 22 16:22:17 jik5.kamens.us systemd[1]: docker.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped docker.service - Docker Application Container Engine. Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.network1' unit='dbus-org.freedesktop.network1.service' requested by ':1.87' (uid=0 pid=37801 comm="networkctl" label="unconfined") Mar 22 16:22:17 jik5.kamens.us systemd[1]: mongod.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped mongod.service - MongoDB Database Server. Mar 22 16:22:17 jik5.kamens.us systemd[1]: mongod.service: Consumed 7.456s CPU time. Mar 22 16:22:17 jik5.kamens.us systemd[1]: ddclient.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped ddclient.service - Update dynamic domain name service entries. Mar 22 16:22:17 jik5.kamens.us systemd[1]: rpc-statd.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped rpc-statd.service - NFS status monitor for NFSv2/3 locking.. Mar 22 16:22:17 jik5.kamens.us systemd[1]: cron.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped cron.service - Regular background program processing daemon. Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + [ -f /var/snap/cups/872/var/run/stop-cups-browsed.lock ] Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + touch /var/snap/cups/872/var/run/stop-cups-browsed.lock Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + echo ==> Shutting down cups-browsed Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: ==> Shutting down cups-browsed Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37847]: + cat /var/snap/cups/872/var/run/cups-browsed.pid Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/ldac Mar 22 16:22:17 jik5.kamens.us systemd[1]: cron.service: Consumed 2.868s CPU time. Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSink/aptx_hd Mar 22 16:22:17 jik5.kamens.us systemd[1]: atd.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_hd Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSink/aptx Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSink/sbc Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped atd.service - Deferred execution scheduler. Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/sbc Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSink/sbc_xq Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/sbc_xq Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_1 Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_0 Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1 Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0 Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/faststream Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/faststream_duplex Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSink/opus_05 Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/opus_05 Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSink/opus_05_duplex Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Endpoint unregistered: sender=:1.54 path=/MediaEndpoint/A2DPSource/opus_05_duplex Mar 22 16:22:17 jik5.kamens.us NetworkManager[1823]: [1679516537.9257] device (7C:D9:5C:BA:3D:76): state change: disconnected -> unmanaged (reason 'removed', sys-iface-state: 'removed') Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + PID=3380 Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + [ -n 3380 ] Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + kill -0 3380 Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + kill -TERM 3380 Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + DEAD=0 Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37849]: + seq 300 Mar 22 16:22:17 jik5.kamens.us systemd[1]: snap.cups.cups-browsed.service: Main process exited, code=exited, status=143/n/a Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us systemd[1]: rtkit-daemon.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped rtkit-daemon.service - RealtimeKit Scheduling Policy Service. Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.MediaEndpoint1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us systemd[1]: upower.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped upower.service - Daemon for power management. Mar 22 16:22:17 jik5.kamens.us systemd[1]: run-rpc_pipefs.mount: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Unmounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + kill -0 3380 Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + DEAD=1 Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + break Mar 22 16:22:17 jik5.kamens.us systemd[1]: alsa-restore.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped alsa-restore.service - Save/Restore Sound Card State. Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + [ 1 = 0 ] Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + rm -f /var/snap/cups/872/var/run/cups-browsed.pid Mar 22 16:22:17 jik5.kamens.us systemd[1]: systemd-random-seed.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:22:17 jik5.kamens.us cups.cups-browsed[37777]: + rm -f /var/snap/cups/872/var/run/stop-cups-browsed.lock Mar 22 16:22:17 jik5.kamens.us cups.cupsd[37779]: + [ -f /var/snap/cups/872/var/run/stop-cupsd.lock ] Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.Profile1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us cups.cupsd[37779]: + echo ==> We are already shutting down cupsd Mar 22 16:22:17 jik5.kamens.us cups.cupsd[37779]: ==> We are already shutting down cupsd Mar 22 16:22:17 jik5.kamens.us cups.cupsd[37779]: + exit 0 Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Rejected send message, 0 matched rules; type="error", sender=":1.54" (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") interface="(unset)" member="(unset)" error name="org.bluez.Profile1.Error.NotImplemented" requested_reply="0" destination=":1.4" (uid=0 pid=1693 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Stopping SDP server Mar 22 16:22:17 jik5.kamens.us bluetoothd[1693]: Exit Mar 22 16:22:17 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' requested by ':1.54' (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") Mar 22 16:22:17 jik5.kamens.us systemd[1]: bluetooth.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped bluetooth.service - Bluetooth service. Mar 22 16:22:17 jik5.kamens.us systemd[1]: blk-availability.service: Deactivated successfully. Mar 22 16:22:17 jik5.kamens.us systemd[1]: Stopped blk-availability.service - Availability of block devices. Mar 22 16:22:18 jik5.kamens.us systemd[1]: apache2.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped apache2.service - The Apache HTTP Server. Mar 22 16:22:18 jik5.kamens.us systemd[1]: apport.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped apport.service - automatic crash report generation. Mar 22 16:22:18 jik5.kamens.us systemd[1]: postfix@-.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped postfix@-.service - Postfix Mail Transport Agent (instance -). Mar 22 16:22:17 jik5.kamens.us audit[3314]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3314 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7fb13a0e839b code=0x50000 Mar 22 16:22:18 jik5.kamens.us kernel: audit: type=1326 audit(1679516537.996:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3314 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7fb13a0e839b code=0x50000 Mar 22 16:22:18 jik5.kamens.us systemd[1]: vboxautostart-service.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped vboxautostart-service.service. Mar 22 16:22:18 jik5.kamens.us systemd[1]: vboxballoonctrl-service.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped vboxballoonctrl-service.service. Mar 22 16:22:18 jik5.kamens.us systemd[1]: vboxweb-service.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped vboxweb-service.service. Mar 22 16:22:18 jik5.kamens.us systemd[1]: snap.cups.cups-browsed.service: Failed with result 'exit-code'. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped snap.cups.cups-browsed.service - Service for snap application cups.cups-browsed. Mar 22 16:22:18 jik5.kamens.us systemd[1]: kerneloops.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped kerneloops.service - Tool to automatically collect and submit kernel crash signatures. Mar 22 16:22:18 jik5.kamens.us systemd[1]: session-2.scope: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped session-2.scope - Session 2 of User jik. Mar 22 16:22:18 jik5.kamens.us systemd[1]: session-2.scope: Consumed 4.357s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd-logind[1726]: Session 2 logged out. Waiting for processes to exit. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Started plymouth-poweroff.service - Show Plymouth Power Off Screen. Mar 22 16:22:18 jik5.kamens.us pwrstatd[37774]: * Stopping pwrstatd 1.3.2 Mar 22 16:22:18 jik5.kamens.us pwrstatd[37774]: ...done. Mar 22 16:22:18 jik5.kamens.us systemd[1]: pwrstatd.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped pwrstatd.service - LSB: The monitor UPS software.. Mar 22 16:22:18 jik5.kamens.us systemd[1]: virtualbox.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped virtualbox.service - LSB: VirtualBox Linux kernel module. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for colord.service/start is destructive (systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us dbus-daemon[1694]: [system] Activation via systemd failed for unit 'colord.service': Transaction for colord.service/start is destructive (systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us dbus-daemon[1694]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.network1.service': Unit dbus-org.freedesktop.network1.service not found. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for bluetooth.service/start is destructive (home-jik4back-home-jik4back-backup.mount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us dbus-daemon[1694]: [system] Activation via systemd failed for unit 'dbus-org.bluez.service': Transaction for bluetooth.service/start is destructive (home-jik4back-home-jik4back-backup.mount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' requested by ':1.54' (uid=1000 pid=4326 comm="/usr/bin/wireplumber" label="unconfined") Mar 22 16:22:18 jik5.kamens.us su[37756]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:22:18 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for bluetooth.service/start is destructive (systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us dbus-daemon[1694]: [system] Activation via systemd failed for unit 'dbus-org.bluez.service': Transaction for bluetooth.service/start is destructive (systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us systemd[1]: ubuntu-fan.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped ubuntu-fan.service - Ubuntu FAN network setup. Mar 22 16:22:18 jik5.kamens.us systemd-logind[1726]: Removed session 2. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Removed slice system-postfix.slice - Slice /system/postfix. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target nss-lookup.target - Host and Network Name Lookups. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target time-set.target - System Time Set. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping containerd.service - containerd container runtime... Mar 22 16:22:18 jik5.kamens.us containerd[1930]: time="2023-03-22T16:22:18.037410138-04:00" level=info msg="Stop CRI service" Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping named.service - BIND Domain Name Server... Mar 22 16:22:18 jik5.kamens.us systemd[1]: plymouth-switch-root-initramfs.service - Tell Plymouth To Jump To initramfs was skipped because of an unmet condition check (ConditionPathExists=/run/initramfs/bin/sh). Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping polkit.service - Authorization Manager... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping switcheroo-control.service - Switcheroo Control Proxy service... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping systemd-logind.service - User Login Management... Mar 22 16:22:18 jik5.kamens.us su[37756]: pam_systemd(su:session): Failed to create session: Message recipient disconnected from message bus without replying Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping user@1000.service - User Manager for UID 1000... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Activating special unit exit.target... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped target default.target - Main User Target. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping appimagelauncherd.service - AppImageLauncher daemon... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping dbus.service - D-Bus User Message Bus... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping eruv.service - Eruv status checker... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gnome-keyring-daemon.service - GNOME Keyring daemon... Mar 22 16:22:18 jik5.kamens.us org.freedesktop.secrets[5807]: discover_other_daemon: 1 Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gvfs-daemon.service - Virtual filesystem service... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gvfs-metadata.service - Virtual filesystem metadata service... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping pipewire-pulse.service - PipeWire PulseAudio... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping synology-inotify.service - Force hard-linked files to sync to Synology Drive... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping tracker-miner-fs-3.service - Tracker file system data miner... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping x10-transceiver.service - X10 transceiver... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping xdg-document-portal.service - flatpak document portal service... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping xdg-permission-store.service - sandboxed app permission store... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped eruv.service - Eruv status checker. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping vboxdrv.service - VirtualBox Linux kernel module... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gvfs-metadata.service - Virtual filesystem metadata service. Mar 22 16:22:18 jik5.kamens.us avahi-daemon[1692]: Got SIGTERM, quitting. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor. Mar 22 16:22:18 jik5.kamens.us avahi-daemon[1692]: Leaving mDNS multicast group on interface docker0.IPv4 with address 172.17.0.1. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gnome-keyring-daemon.service - GNOME Keyring daemon. Mar 22 16:22:18 jik5.kamens.us avahi-daemon[1692]: Leaving mDNS multicast group on interface enp2s0.IPv6 with address fe80::86a3:4d63:740b:50a6. Mar 22 16:22:18 jik5.kamens.us systemd[1]: cups-browsed.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us named[1914]: received control channel command 'stop' Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped cups-browsed.service - Make remote CUPS printers available locally. Mar 22 16:22:18 jik5.kamens.us avahi-daemon[1692]: Leaving mDNS multicast group on interface enp2s0.IPv4 with address 192.168.4.11. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping avahi-daemon.service - Avahi mDNS/DNS-SD Stack... Mar 22 16:22:18 jik5.kamens.us avahi-daemon[1692]: Leaving mDNS multicast group on interface lo.IPv6 with address ::1. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped pipewire-pulse.service - PipeWire PulseAudio. Mar 22 16:22:18 jik5.kamens.us avahi-daemon[1692]: Leaving mDNS multicast group on interface lo.IPv4 with address 127.0.0.1. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping wireplumber.service - Multimedia Service Session Manager... Mar 22 16:22:18 jik5.kamens.us named[1914]: no longer listening on 127.0.0.1#53 Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping cups.service - CUPS Scheduler... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped xdg-permission-store.service - sandboxed app permission store. Mar 22 16:22:18 jik5.kamens.us wireplumber[4326]: stopped by signal: Terminated Mar 22 16:22:18 jik5.kamens.us containerd[1930]: time="2023-03-22T16:22:18.063617281-04:00" level=info msg="Stop CRI service" Mar 22 16:22:18 jik5.kamens.us audit[1694]: USER_AVC pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/Client1/ServiceBrowser1" interface="org.freedesktop.Avahi.ServiceBrowser" member="Free" mask="send" name="org.freedesktop.Avahi" pid=3315 label="snap.cups.cupsd" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:22:18 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:22:18 jik5.kamens.us audit[1694]: USER_AVC pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/Client1/ServiceBrowser2" interface="org.freedesktop.Avahi.ServiceBrowser" member="Free" mask="send" name="org.freedesktop.Avahi" pid=3315 label="snap.cups.cupsd" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:22:18 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:22:18 jik5.kamens.us named[1914]: no longer listening on ::1#53 Mar 22 16:22:18 jik5.kamens.us kernel: audit: type=1107 audit(1679516538.056:207): pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/Client1/ServiceBrowser1" interface="org.freedesktop.Avahi.ServiceBrowser" member="Free" mask="send" name="org.freedesktop.Avahi" pid=3315 label="snap.cups.cupsd" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:22:18 jik5.kamens.us kernel: audit: type=1420 audit(1679516538.056:208): subj_apparmor=unconfined Mar 22 16:22:18 jik5.kamens.us kernel: audit: type=1107 audit(1679516538.056:209): pid=1694 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/Client1/ServiceBrowser2" interface="org.freedesktop.Avahi.ServiceBrowser" member="Free" mask="send" name="org.freedesktop.Avahi" pid=3315 label="snap.cups.cupsd" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:22:18 jik5.kamens.us kernel: audit: type=1420 audit(1679516538.056:210): subj_apparmor=unconfined Mar 22 16:22:18 jik5.kamens.us named[1914]: no longer listening on 192.168.4.11#53 Mar 22 16:22:18 jik5.kamens.us named[1914]: no longer listening on 192.168.4.17#53 Mar 22 16:22:18 jik5.kamens.us systemd[1]: run-user-1000-gvfs.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us avahi-daemon[1692]: avahi-daemon 0.8 exiting. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted run-user-1000-gvfs.mount - /run/user/1000/gvfs. Mar 22 16:22:18 jik5.kamens.us wireplumber[4326]: disconnected from pipewire Mar 22 16:22:18 jik5.kamens.us named[1914]: no longer listening on fe80::86a3:4d63:740b:50a6%2#53 Mar 22 16:22:18 jik5.kamens.us named[1914]: no longer listening on 172.17.0.1#53 Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped appimagelauncherd.service - AppImageLauncher daemon. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped synology-inotify.service - Force hard-linked files to sync to Synology Drive. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped xdg-document-portal.service - flatpak document portal service. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: gvfs-udisks2-volume-monitor.service: Consumed 1.236s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor. Mar 22 16:22:18 jik5.kamens.us named[1914]: shutting down: flushing changes Mar 22 16:22:18 jik5.kamens.us named[1914]: stopping command channel on 127.0.0.1#953 Mar 22 16:22:18 jik5.kamens.us named[1914]: stopping command channel on ::1#953 Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped x10-transceiver.service - X10 transceiver. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped gvfs-daemon.service - Virtual filesystem service. Mar 22 16:22:18 jik5.kamens.us systemd[1]: run-user-1000-doc.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted run-user-1000-doc.mount - /run/user/1000/doc. Mar 22 16:22:18 jik5.kamens.us systemd[1]: avahi-daemon.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped avahi-daemon.service - Avahi mDNS/DNS-SD Stack. Mar 22 16:22:18 jik5.kamens.us systemd[1]: polkit.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped polkit.service - Authorization Manager. Mar 22 16:22:18 jik5.kamens.us systemd[1]: containerd.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped dbus.service - D-Bus User Message Bus. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped containerd.service - containerd container runtime. Mar 22 16:22:18 jik5.kamens.us systemd[1]: snap.cups.cupsd.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped snap.cups.cupsd.service - Service for snap application cups.cupsd. Mar 22 16:22:18 jik5.kamens.us systemd[1]: snap.cups.cupsd.service: Consumed 1.707s CPU time. Mar 22 16:22:18 jik5.kamens.us named[1914]: exiting Mar 22 16:22:18 jik5.kamens.us systemd[1]: named.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped named.service - BIND Domain Name Server. Mar 22 16:22:18 jik5.kamens.us systemd[1]: cups.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped cups.service - CUPS Scheduler. Mar 22 16:22:18 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:18 0 [Note] InnoDB: Removed temporary tablespace data file: "./ibtmp1" Mar 22 16:22:18 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:18 0 [Note] InnoDB: Shutdown completed; log sequence number 2563290250; transaction id 2957920 Mar 22 16:22:18 jik5.kamens.us systemd[3924]: snap.snapd-desktop-integration.snapd-desktop-integration.service: Main process exited, code=exited, status=143/n/a Mar 22 16:22:18 jik5.kamens.us systemd[3924]: snap.snapd-desktop-integration.snapd-desktop-integration.service: Failed with result 'exit-code'. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped wireplumber.service - Multimedia Service Session Manager. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopping pipewire.service - PipeWire Multimedia Service... Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped pipewire.service - PipeWire Multimedia Service. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Removed slice session.slice - User Core Session Slice. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: session.slice: Consumed 1.961s CPU time. Mar 22 16:22:18 jik5.kamens.us mariadbd[2096]: 2023-03-22 16:22:18 0 [Note] /usr/sbin/mariadbd: Shutdown complete Mar 22 16:22:18 jik5.kamens.us systemd[1]: mariadb.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped mariadb.service - MariaDB 10.11.2 database server. Mar 22 16:22:18 jik5.kamens.us systemd[1]: mariadb.service: Consumed 1.214s CPU time. Mar 22 16:22:18 jik5.kamens.us tracker-miner-fs-3[5386]: OK Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped tracker-miner-fs-3.service - Tracker file system data miner. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Removed slice background.slice - User Background Tasks Slice. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped target basic.target - Basic System. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped target paths.target - Paths. Mar 22 16:22:18 jik5.kamens.us systemd[1]: systemd-logind.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped systemd-logind.service - User Login Management. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped ubuntu-report.path - Pending report trigger for Ubuntu Report. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped target sockets.target - Sockets. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Stopped target timers.target - Timers. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed dbus.socket - D-Bus User Message Bus Socket. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed dirmngr.socket - GnuPG network certificate management daemon. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed gcr-ssh-agent.socket - GCR ssh-agent wrapper. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed gnome-keyring-daemon.socket - GNOME Keyring daemon. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed gpg-agent-browser.socket - GnuPG cryptographic agent and passphrase cache (access for web browsers). Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed gpg-agent-extra.socket - GnuPG cryptographic agent and passphrase cache (restricted). Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed gpg-agent-ssh.socket - GnuPG cryptographic agent (ssh-agent emulation). Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed gpg-agent.socket - GnuPG cryptographic agent and passphrase cache. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed pipewire.socket - PipeWire Multimedia System Socket. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed pk-debconf-helper.socket - debconf communication socket. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Closed snapd.session-agent.socket - REST API socket for snapd user session agent. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Removed slice app.slice - User Application Slice. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: app.slice: Consumed 3.487s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Reached target shutdown.target - Shutdown. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Finished systemd-exit.service - Exit the Session. Mar 22 16:22:18 jik5.kamens.us systemd[3924]: Reached target exit.target - Exit the Session. Mar 22 16:22:18 jik5.kamens.us systemd[1]: postgresql@13-main.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped postgresql@13-main.service - PostgreSQL Cluster 13-main. Mar 22 16:22:18 jik5.kamens.us systemd[1]: switcheroo-control.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped switcheroo-control.service - Switcheroo Control Proxy service. Mar 22 16:22:18 jik5.kamens.us systemd[1]: postgresql@11-main.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped postgresql@11-main.service - PostgreSQL Cluster 11-main. Mar 22 16:22:18 jik5.kamens.us systemd[3939]: pam_unix(systemd-user:session): session closed for user jik Mar 22 16:22:18 jik5.kamens.us systemd[1]: user@1000.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped user@1000.service - User Manager for UID 1000. Mar 22 16:22:18 jik5.kamens.us systemd[1]: user@1000.service: Consumed 6.785s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd[1]: postgresql@12-main.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped postgresql@12-main.service - PostgreSQL Cluster 12-main. Mar 22 16:22:18 jik5.kamens.us systemd[1]: postgresql@14-main.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped postgresql@14-main.service - PostgreSQL Cluster 14-main. Mar 22 16:22:18 jik5.kamens.us systemd[1]: postgresql@15-main.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped postgresql@15-main.service - PostgreSQL Cluster 15-main. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Removed slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:22:18 jik5.kamens.us systemd[1]: system-postgresql.slice: Consumed 2.206s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping systemd-user-sessions.service - Permit User Sessions... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping user-runtime-dir@1000.service - User Runtime Directory /run/user/1000... Mar 22 16:22:18 jik5.kamens.us su[37756]: pam_unix(su:session): session closed for user jik Mar 22 16:22:18 jik5.kamens.us inotify-canary[37755]: /etc/NetworkManager/dispatcher.d/inotify-canary: cmcli list failed Mar 22 16:22:18 jik5.kamens.us inotify-canary[37755]: /etc/NetworkManager/dispatcher.d/inotify-canary: giving up Mar 22 16:22:18 jik5.kamens.us systemd[1]: systemd-oomd.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:22:18 jik5.kamens.us systemd[1]: systemd-oomd.service: Consumed 1.498s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd[1]: inotify-canary-pause.service: Control process exited, code=exited, status=1/FAILURE Mar 22 16:22:18 jik5.kamens.us systemd[1]: inotify-canary-pause.service: Failed with result 'exit-code'. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped inotify-canary-pause.service - Pause inotify canary on shutdown. Mar 22 16:22:18 jik5.kamens.us systemd[1]: run-user-1000.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted run-user-1000.mount - /run/user/1000. Mar 22 16:22:18 jik5.kamens.us systemd[1]: systemd-user-sessions.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped systemd-user-sessions.service - Permit User Sessions. Mar 22 16:22:18 jik5.kamens.us systemd[1]: user-runtime-dir@1000.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped user-runtime-dir@1000.service - User Runtime Directory /run/user/1000. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Removed slice user-1000.slice - User Slice of UID 1000. Mar 22 16:22:18 jik5.kamens.us systemd[1]: user-1000.slice: Consumed 11.773s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target remote-fs.target - Remote File Systems. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounting home-jik-ogg.mount - /home/jik/ogg... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounting home-jik-pictures.mount - /home/jik/pictures... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-music.mount - /mnt/nas/nfs/music... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounting mnt-nas-nfs-video.mount - /mnt/nas/nfs/video... Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounting mnt-video.mount - /mnt/video... Mar 22 16:22:18 jik5.kamens.us systemd[1]: home-jik-ogg.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted home-jik-ogg.mount - /home/jik/ogg. Mar 22 16:22:18 jik5.kamens.us systemd[1]: home-jik-pictures.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted home-jik-pictures.mount - /home/jik/pictures. Mar 22 16:22:18 jik5.kamens.us systemd[1]: mnt-nas-nfs-photo.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo. Mar 22 16:22:18 jik5.kamens.us systemd[1]: mnt-video.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted mnt-video.mount - /mnt/video. Mar 22 16:22:18 jik5.kamens.us systemd[1]: mnt-nas-nfs-homes.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes. Mar 22 16:22:18 jik5.kamens.us systemd[1]: mnt-nas-nfs-video.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-video.mount - /mnt/nas/nfs/video. Mar 22 16:22:18 jik5.kamens.us systemd[1]: mnt-nas-nfs-music.mount: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Unmounted mnt-nas-nfs-music.mount - /mnt/nas/nfs/music. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target network-online.target - Network is Online. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target nfs-client.target - NFS client services. Mar 22 16:22:18 jik5.kamens.us systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped NetworkManager-wait-online.service - Network Manager Wait Online. Mar 22 16:22:18 jik5.kamens.us vboxdrv.sh[37894]: vboxdrv.sh: Stopping VirtualBox services. Mar 22 16:22:18 jik5.kamens.us vboxdrv.sh[38014]: Stopping VirtualBox services. Mar 22 16:22:18 jik5.kamens.us vboxdrv.sh[38028]: VirtualBox services stopped. Mar 22 16:22:18 jik5.kamens.us systemd[1]: vboxdrv.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped vboxdrv.service - VirtualBox Linux kernel module. Mar 22 16:22:18 jik5.kamens.us fail2ban-client[37754]: Shutdown successful Mar 22 16:22:18 jik5.kamens.us systemd[1]: fail2ban.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped fail2ban.service - Fail2Ban Service. Mar 22 16:22:18 jik5.kamens.us systemd[1]: fail2ban.service: Consumed 1.210s CPU time. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target network.target - Network. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping NetworkManager.service - Network Manager... Mar 22 16:22:18 jik5.kamens.us NetworkManager[1823]: [1679516538.8341] caught SIGTERM, shutting down normally. Mar 22 16:22:18 jik5.kamens.us NetworkManager[1823]: [1679516538.8349] manager: NetworkManager state is now CONNECTED_SITE Mar 22 16:22:18 jik5.kamens.us dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.14' (uid=0 pid=1823 comm="/usr/sbin/NetworkManager --no-daemon" label="unconfined") Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopping wpa_supplicant.service - WPA supplicant... Mar 22 16:22:18 jik5.kamens.us NetworkManager[1823]: [1679516538.8357] device (wlp3s0): state change: unavailable -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Mar 22 16:22:18 jik5.kamens.us systemd[1]: Requested transaction contradicts existing jobs: Transaction for NetworkManager-dispatcher.service/start is destructive (boot-efi.mount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us dbus-daemon[1694]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.nm-dispatcher.service': Transaction for NetworkManager-dispatcher.service/start is destructive (boot-efi.mount has 'stop' job queued, but 'start' is included in transaction). Mar 22 16:22:18 jik5.kamens.us systemd[1]: wpa_supplicant.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped wpa_supplicant.service - WPA supplicant. Mar 22 16:22:18 jik5.kamens.us NetworkManager[1823]: [1679516538.8566] exiting (success) Mar 22 16:22:18 jik5.kamens.us thermald[1728]: terminating on user request .. Mar 22 16:22:18 jik5.kamens.us systemd[1]: NetworkManager.service: Deactivated successfully. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped NetworkManager.service - Network Manager. Mar 22 16:22:18 jik5.kamens.us systemd[1]: Stopped target network-pre.target - Preparation for Network. Mar 22 16:22:19 jik5.kamens.us systemd[1]: thermald.service: Deactivated successfully. Mar 22 16:22:19 jik5.kamens.us systemd[1]: Stopped thermald.service - Thermal Daemon Service. Mar 22 16:22:40 jik5.kamens.us systemd[1]: gpu-manager.service: Processes still around after SIGKILL. Ignoring. -- Boot 685aa01b0082473b87a1020325817a10 -- Mar 22 16:24:01 jik5.kamens.us kernel: microcode: microcode updated early to revision 0xf0, date = 2021-11-12 Mar 22 16:24:01 jik5.kamens.us kernel: Linux version 6.2.0-18-generic (buildd@lcy02-amd64-099) (x86_64-linux-gnu-gcc-12 (Ubuntu 12.2.0-17ubuntu1) 12.2.0, GNU ld (GNU Binutils for Ubuntu) 2.40) #18-Ubuntu SMP PREEMPT_DYNAMIC Thu Mar 16 00:09:48 UTC 2023 (Ubuntu 6.2.0-18.18-generic 6.2.6) Mar 22 16:24:01 jik5.kamens.us kernel: Command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 Mar 22 16:24:01 jik5.kamens.us kernel: KERNEL supported cpus: Mar 22 16:24:01 jik5.kamens.us kernel: Intel GenuineIntel Mar 22 16:24:01 jik5.kamens.us kernel: AMD AuthenticAMD Mar 22 16:24:01 jik5.kamens.us kernel: Hygon HygonGenuine Mar 22 16:24:01 jik5.kamens.us kernel: Centaur CentaurHauls Mar 22 16:24:01 jik5.kamens.us kernel: zhaoxin Shanghai Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Mar 22 16:24:01 jik5.kamens.us kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Mar 22 16:24:01 jik5.kamens.us kernel: signal: max sigframe size: 2032 Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-provided physical RAM map: Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000100000-0x000000008a870fff] usable Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:24:01 jik5.kamens.us kernel: NX (Execute Disable) protection: active Mar 22 16:24:01 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:24:01 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:24:01 jik5.kamens.us kernel: extended physical RAM map: Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000089217017] usable Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089217018-0x0000000089238c57] usable Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089238c58-0x000000008a870fff] usable Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:24:01 jik5.kamens.us kernel: efi: EFI v2.40 by Acer Inc. Mar 22 16:24:01 jik5.kamens.us kernel: efi: ESRT=0x8f9afe98 ACPI=0x8eff2000 ACPI 2.0=0x8eff2000 SMBIOS=0x8f9ae000 SMBIOS 3.0=0x8f9ad000 MOKvar=0x8f71e000 RNG=0x8eff1f98 TPMEventLog=0x8a91c018 Mar 22 16:24:01 jik5.kamens.us kernel: random: crng init done Mar 22 16:24:01 jik5.kamens.us kernel: TPM Final Events table not present Mar 22 16:24:01 jik5.kamens.us kernel: efi: Remove mem41: MMIO range=[0xe0000000-0xefffffff] (256MB) from e820 map Mar 22 16:24:01 jik5.kamens.us kernel: e820: remove [mem 0xe0000000-0xefffffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: efi: Not removing mem42: MMIO range=[0xfe000000-0xfe010fff] (68KB) from e820 map Mar 22 16:24:01 jik5.kamens.us kernel: efi: Not removing mem43: MMIO range=[0xfec00000-0xfec00fff] (4KB) from e820 map Mar 22 16:24:01 jik5.kamens.us kernel: efi: Not removing mem44: MMIO range=[0xfee00000-0xfee00fff] (4KB) from e820 map Mar 22 16:24:01 jik5.kamens.us kernel: efi: Remove mem45: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map Mar 22 16:24:01 jik5.kamens.us kernel: e820: remove [mem 0xff000000-0xffffffff] reserved Mar 22 16:24:01 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:24:01 jik5.kamens.us kernel: SMBIOS 3.0.0 present. Mar 22 16:24:01 jik5.kamens.us kernel: DMI: Acer Predator G6-710/Predator G6-710, BIOS R01-A4 05/18/2016 Mar 22 16:24:01 jik5.kamens.us kernel: tsc: Detected 4000.000 MHz processor Mar 22 16:24:01 jik5.kamens.us kernel: tsc: Detected 3999.984 MHz TSC Mar 22 16:24:01 jik5.kamens.us kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 22 16:24:01 jik5.kamens.us kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 22 16:24:01 jik5.kamens.us kernel: last_pfn = 0x46f000 max_arch_pfn = 0x400000000 Mar 22 16:24:01 jik5.kamens.us kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 22 16:24:01 jik5.kamens.us kernel: last_pfn = 0x8faff max_arch_pfn = 0x400000000 Mar 22 16:24:01 jik5.kamens.us kernel: esrt: Reserving ESRT space from 0x000000008f9afe98 to 0x000000008f9afed0. Mar 22 16:24:01 jik5.kamens.us kernel: Using GB pages for direct mapping Mar 22 16:24:01 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:24:01 jik5.kamens.us kernel: RAMDISK: [mem 0x6c10c000-0x742cdfff] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Early table checksum verification disabled Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: RSDP 0x000000008EFF2000 000024 (v02 ACRSYS) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: XSDT 0x000000008EFF20A8 0000D4 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: FACP 0x000000008F016C90 00010C (v05 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: DSDT 0x000000008EFF2210 024A7F (v02 ACRSYS ACRPRDCT 01072009 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: FACS 0x000000008F560F80 000040 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: APIC 0x000000008F016DA0 0000BC (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: FPDT 0x000000008F016E60 000044 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: FIDT 0x000000008F016EA8 00009C (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: MCFG 0x000000008F016F48 00003C (v01 ACRSYS ACRPRDCT 01072009 MSFT 00000097) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: HPET 0x000000008F016F88 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI. 0005000B) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F016FC0 00036D (v01 SataRe SataTabl 00001000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LPIT 0x000000008F017330 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F0173C8 000248 (v02 INTEL sensrhub 00000000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F017610 002BAE (v02 INTEL PtidDevc 00001000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01A1C0 000BE3 (v02 INTEL Ther_Rvp 00001000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: DBGP 0x000000008F01ADA8 000034 (v01 INTEL 00000000 MSFT 0000005F) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: DBG2 0x000000008F01ADE0 000054 (v00 INTEL 00000000 MSFT 0000005F) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01AE38 000613 (v02 INTEL xh_rvp08 00000000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: MSDM 0x000000008F01B450 000055 (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01B4A8 00546C (v02 SaSsdt SaSsdt 00003000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: UEFI 0x000000008F020918 000042 (v01 00000000 00000000) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F020960 000E73 (v02 CpuRef CpuSsdt 00003000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: BGRT 0x000000008F0217D8 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: DMAR 0x000000008F021810 000070 (v01 INTEL SKL 00000001 INTL 00000001) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: TPM2 0x000000008F021880 000034 (v03 Tpm2Tabl 00000001 AMI 00000000) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: ASF! 0x000000008F0218B8 0000A5 (v32 INTEL HCG 00000001 TFSM 000F4240) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving FACP table memory at [mem 0x8f016c90-0x8f016d9b] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving DSDT table memory at [mem 0x8eff2210-0x8f016c8e] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving FACS table memory at [mem 0x8f560f80-0x8f560fbf] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving APIC table memory at [mem 0x8f016da0-0x8f016e5b] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving FPDT table memory at [mem 0x8f016e60-0x8f016ea3] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving FIDT table memory at [mem 0x8f016ea8-0x8f016f43] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving MCFG table memory at [mem 0x8f016f48-0x8f016f83] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving HPET table memory at [mem 0x8f016f88-0x8f016fbf] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f016fc0-0x8f01732c] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving LPIT table memory at [mem 0x8f017330-0x8f0173c3] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f0173c8-0x8f01760f] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f017610-0x8f01a1bd] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01a1c0-0x8f01ada2] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving DBGP table memory at [mem 0x8f01ada8-0x8f01addb] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving DBG2 table memory at [mem 0x8f01ade0-0x8f01ae33] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01ae38-0x8f01b44a] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving MSDM table memory at [mem 0x8f01b450-0x8f01b4a4] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01b4a8-0x8f020913] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving UEFI table memory at [mem 0x8f020918-0x8f020959] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f020960-0x8f0217d2] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving BGRT table memory at [mem 0x8f0217d8-0x8f02180f] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving DMAR table memory at [mem 0x8f021810-0x8f02187f] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving TPM2 table memory at [mem 0x8f021880-0x8f0218b3] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Reserving ASF! table memory at [mem 0x8f0218b8-0x8f02195c] Mar 22 16:24:01 jik5.kamens.us kernel: No NUMA configuration found Mar 22 16:24:01 jik5.kamens.us kernel: Faking a node at [mem 0x0000000000000000-0x000000046effffff] Mar 22 16:24:01 jik5.kamens.us kernel: NODE_DATA(0) allocated [mem 0x46efd5000-0x46effffff] Mar 22 16:24:01 jik5.kamens.us kernel: Zone ranges: Mar 22 16:24:01 jik5.kamens.us kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 22 16:24:01 jik5.kamens.us kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 22 16:24:01 jik5.kamens.us kernel: Normal [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:24:01 jik5.kamens.us kernel: Device empty Mar 22 16:24:01 jik5.kamens.us kernel: Movable zone start for each node Mar 22 16:24:01 jik5.kamens.us kernel: Early memory node ranges Mar 22 16:24:01 jik5.kamens.us kernel: node 0: [mem 0x0000000000001000-0x0000000000057fff] Mar 22 16:24:01 jik5.kamens.us kernel: node 0: [mem 0x0000000000059000-0x000000000009dfff] Mar 22 16:24:01 jik5.kamens.us kernel: node 0: [mem 0x0000000000100000-0x000000008a870fff] Mar 22 16:24:01 jik5.kamens.us kernel: node 0: [mem 0x000000008a8bc000-0x000000008e52bfff] Mar 22 16:24:01 jik5.kamens.us kernel: node 0: [mem 0x000000008fafe000-0x000000008fafefff] Mar 22 16:24:01 jik5.kamens.us kernel: node 0: [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:24:01 jik5.kamens.us kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000046effffff] Mar 22 16:24:01 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:24:01 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:24:01 jik5.kamens.us kernel: On node 0, zone DMA: 98 pages in unavailable ranges Mar 22 16:24:01 jik5.kamens.us kernel: On node 0, zone DMA32: 75 pages in unavailable ranges Mar 22 16:24:01 jik5.kamens.us kernel: On node 0, zone DMA32: 5586 pages in unavailable ranges Mar 22 16:24:01 jik5.kamens.us kernel: On node 0, zone Normal: 1281 pages in unavailable ranges Mar 22 16:24:01 jik5.kamens.us kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PM-Timer IO Port: 0x1808 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Mar 22 16:24:01 jik5.kamens.us kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 Mar 22 16:24:01 jik5.kamens.us kernel: e820: update [mem 0x8c99e000-0x8ca91fff] usable ==> reserved Mar 22 16:24:01 jik5.kamens.us kernel: TSC deadline timer available Mar 22 16:24:01 jik5.kamens.us kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00058000-0x00058fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009ffff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89217000-0x89217fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89238000-0x89238fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a871000-0x8a871fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a872000-0x8a8bbfff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8c99e000-0x8ca91fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8e52c000-0x8efe5fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8efe6000-0x8f021fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f022000-0x8f583fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f584000-0x8fafdfff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8faff000-0x8fafffff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fb00000-0x8fbfffff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fc00000-0xfdffffff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xfebfffff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec00000-0xfec00fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec01000-0xfedfffff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee00000-0xfee00fff] Mar 22 16:24:01 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee01000-0xffffffff] Mar 22 16:24:01 jik5.kamens.us kernel: [mem 0x8fc00000-0xfdffffff] available for PCI devices Mar 22 16:24:01 jik5.kamens.us kernel: Booting paravirtualized kernel on bare hardware Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Mar 22 16:24:01 jik5.kamens.us kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 22 16:24:01 jik5.kamens.us kernel: percpu: Embedded 61 pages/cpu s212992 r8192 d28672 u262144 Mar 22 16:24:01 jik5.kamens.us kernel: pcpu-alloc: s212992 r8192 d28672 u262144 alloc=1*2097152 Mar 22 16:24:01 jik5.kamens.us kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 22 16:24:01 jik5.kamens.us kernel: Fallback order for Node 0: 0 Mar 22 16:24:01 jik5.kamens.us kernel: Built 1 zonelists, mobility grouping on. Total pages: 4117646 Mar 22 16:24:01 jik5.kamens.us kernel: Policy zone: Normal Mar 22 16:24:01 jik5.kamens.us kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 Mar 22 16:24:01 jik5.kamens.us kernel: Unknown kernel command line parameters "splash BOOT_IMAGE=/vmlinuz-6.2.0-18-generic", will be passed to user space. Mar 22 16:24:01 jik5.kamens.us kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off Mar 22 16:24:01 jik5.kamens.us kernel: software IO TLB: area num 8. Mar 22 16:24:01 jik5.kamens.us kernel: Memory: 16105396K/16732664K available (20480K kernel code, 4148K rwdata, 13464K rodata, 4644K init, 17664K bss, 627008K reserved, 0K cma-reserved) Mar 22 16:24:01 jik5.kamens.us kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 22 16:24:01 jik5.kamens.us kernel: Kernel/User page tables isolation: enabled Mar 22 16:24:01 jik5.kamens.us kernel: ftrace: allocating 53106 entries in 208 pages Mar 22 16:24:01 jik5.kamens.us kernel: ftrace: allocated 208 pages with 3 groups Mar 22 16:24:01 jik5.kamens.us kernel: Dynamic Preempt: voluntary Mar 22 16:24:01 jik5.kamens.us kernel: rcu: Preemptible hierarchical RCU implementation. Mar 22 16:24:01 jik5.kamens.us kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 22 16:24:01 jik5.kamens.us kernel: Trampoline variant of Tasks RCU enabled. Mar 22 16:24:01 jik5.kamens.us kernel: Rude variant of Tasks RCU enabled. Mar 22 16:24:01 jik5.kamens.us kernel: Tracing variant of Tasks RCU enabled. Mar 22 16:24:01 jik5.kamens.us kernel: rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. Mar 22 16:24:01 jik5.kamens.us kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 22 16:24:01 jik5.kamens.us kernel: NR_IRQS: 524544, nr_irqs: 2048, preallocated irqs: 16 Mar 22 16:24:01 jik5.kamens.us kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 22 16:24:01 jik5.kamens.us kernel: spurious 8259A interrupt: IRQ7. Mar 22 16:24:01 jik5.kamens.us kernel: Console: colour dummy device 80x25 Mar 22 16:24:01 jik5.kamens.us kernel: printk: console [tty0] enabled Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Core revision 20221020 Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Mar 22 16:24:01 jik5.kamens.us kernel: APIC: Switch to symmetric I/O mode setup Mar 22 16:24:01 jik5.kamens.us kernel: DMAR: Host address width 39 Mar 22 16:24:01 jik5.kamens.us kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x1 Mar 22 16:24:01 jik5.kamens.us kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap d2008c40660462 ecap f050da Mar 22 16:24:01 jik5.kamens.us kernel: DMAR: RMRR base: 0x0000008ed60000 end: 0x0000008ed7ffff Mar 22 16:24:01 jik5.kamens.us kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed90000 IOMMU 0 Mar 22 16:24:01 jik5.kamens.us kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed90000 Mar 22 16:24:01 jik5.kamens.us kernel: DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. Mar 22 16:24:01 jik5.kamens.us kernel: DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. Mar 22 16:24:01 jik5.kamens.us kernel: DMAR-IR: Enabled IRQ remapping in xapic mode Mar 22 16:24:01 jik5.kamens.us kernel: x2apic: IRQ remapping doesn't support X2APIC mode Mar 22 16:24:01 jik5.kamens.us kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x73509d9fa88, max_idle_ns: 881590914879 ns Mar 22 16:24:01 jik5.kamens.us kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7999.96 BogoMIPS (lpj=15999936) Mar 22 16:24:01 jik5.kamens.us kernel: pid_max: default: 32768 minimum: 301 Mar 22 16:24:01 jik5.kamens.us kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor Mar 22 16:24:01 jik5.kamens.us kernel: landlock: Up and running. Mar 22 16:24:01 jik5.kamens.us kernel: Yama: becoming mindful. Mar 22 16:24:01 jik5.kamens.us kernel: AppArmor: AppArmor initialized Mar 22 16:24:01 jik5.kamens.us kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: x86/cpu: SGX disabled by BIOS. Mar 22 16:24:01 jik5.kamens.us kernel: CPU0: Thermal monitoring enabled (TM1) Mar 22 16:24:01 jik5.kamens.us kernel: process: using mwait in idle threads Mar 22 16:24:01 jik5.kamens.us kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 22 16:24:01 jik5.kamens.us kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Mar 22 16:24:01 jik5.kamens.us kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 22 16:24:01 jik5.kamens.us kernel: Spectre V2 : Mitigation: IBRS Mar 22 16:24:01 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 22 16:24:01 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 22 16:24:01 jik5.kamens.us kernel: RETBleed: Mitigation: IBRS Mar 22 16:24:01 jik5.kamens.us kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 22 16:24:01 jik5.kamens.us kernel: Spectre V2 : User space: Mitigation: STIBP via prctl Mar 22 16:24:01 jik5.kamens.us kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 22 16:24:01 jik5.kamens.us kernel: MDS: Mitigation: Clear CPU buffers Mar 22 16:24:01 jik5.kamens.us kernel: TAA: Mitigation: TSX disabled Mar 22 16:24:01 jik5.kamens.us kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Mar 22 16:24:01 jik5.kamens.us kernel: SRBDS: Mitigation: Microcode Mar 22 16:24:01 jik5.kamens.us kernel: Freeing SMP alternatives memory: 44K Mar 22 16:24:01 jik5.kamens.us kernel: smpboot: CPU0: Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz (family: 0x6, model: 0x5e, stepping: 0x3) Mar 22 16:24:01 jik5.kamens.us kernel: cblist_init_generic: Setting adjustable number of callback queues. Mar 22 16:24:01 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:24:01 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:24:01 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:24:01 jik5.kamens.us kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Mar 22 16:24:01 jik5.kamens.us kernel: ... version: 4 Mar 22 16:24:01 jik5.kamens.us kernel: ... bit width: 48 Mar 22 16:24:01 jik5.kamens.us kernel: ... generic registers: 4 Mar 22 16:24:01 jik5.kamens.us kernel: ... value mask: 0000ffffffffffff Mar 22 16:24:01 jik5.kamens.us kernel: ... max period: 00007fffffffffff Mar 22 16:24:01 jik5.kamens.us kernel: ... fixed-purpose events: 3 Mar 22 16:24:01 jik5.kamens.us kernel: ... event mask: 000000070000000f Mar 22 16:24:01 jik5.kamens.us kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1024 Mar 22 16:24:01 jik5.kamens.us kernel: rcu: Hierarchical SRCU implementation. Mar 22 16:24:01 jik5.kamens.us kernel: rcu: Max phase no-delay instances is 1000. Mar 22 16:24:01 jik5.kamens.us kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Mar 22 16:24:01 jik5.kamens.us kernel: smp: Bringing up secondary CPUs ... Mar 22 16:24:01 jik5.kamens.us kernel: x86: Booting SMP configuration: Mar 22 16:24:01 jik5.kamens.us kernel: .... node #0, CPUs: #1 #2 #3 #4 Mar 22 16:24:01 jik5.kamens.us kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 22 16:24:01 jik5.kamens.us kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 22 16:24:01 jik5.kamens.us kernel: #5 #6 #7 Mar 22 16:24:01 jik5.kamens.us kernel: smp: Brought up 1 node, 8 CPUs Mar 22 16:24:01 jik5.kamens.us kernel: smpboot: Max logical packages: 1 Mar 22 16:24:01 jik5.kamens.us kernel: smpboot: Total of 8 processors activated (63999.74 BogoMIPS) Mar 22 16:24:01 jik5.kamens.us kernel: devtmpfs: initialized Mar 22 16:24:01 jik5.kamens.us kernel: x86/mm: Memory block size: 128MB Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8a871000-0x8a871fff] (4096 bytes) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8f022000-0x8f583fff] (5644288 bytes) Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Mar 22 16:24:01 jik5.kamens.us kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: pinctrl core: initialized pinctrl subsystem Mar 22 16:24:01 jik5.kamens.us kernel: PM: RTC time: 20:23:36, date: 2023-03-22 Mar 22 16:24:01 jik5.kamens.us kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 22 16:24:01 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Mar 22 16:24:01 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 22 16:24:01 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 22 16:24:01 jik5.kamens.us kernel: audit: initializing netlink subsys (disabled) Mar 22 16:24:01 jik5.kamens.us kernel: audit: type=2000 audit(1679516616.060:1): state=initialized audit_enabled=0 res=1 Mar 22 16:24:01 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 22 16:24:01 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'bang_bang' Mar 22 16:24:01 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 22 16:24:01 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'user_space' Mar 22 16:24:01 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'power_allocator' Mar 22 16:24:01 jik5.kamens.us kernel: EISA bus registered Mar 22 16:24:01 jik5.kamens.us kernel: cpuidle: using governor ladder Mar 22 16:24:01 jik5.kamens.us kernel: cpuidle: using governor menu Mar 22 16:24:01 jik5.kamens.us kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 22 16:24:01 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:24:01 jik5.kamens.us kernel: PCI: not using MMCONFIG Mar 22 16:24:01 jik5.kamens.us kernel: PCI: Using configuration type 1 for base access Mar 22 16:24:01 jik5.kamens.us kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Mar 22 16:24:01 jik5.kamens.us kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 22 16:24:01 jik5.kamens.us kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 22 16:24:01 jik5.kamens.us kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 22 16:24:01 jik5.kamens.us kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 22 16:24:01 jik5.kamens.us kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 22 16:24:01 jik5.kamens.us kernel: fbcon: Taking over console Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Added _OSI(Module Device) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Device) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: 8 ACPI AML tables successfully acquired and loaded Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8FF640BC9000 0007AA (v02 PmRef Cpu0Ist 00003000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8FF640BD6C00 00037F (v02 PmRef Cpu0Cst 00003001 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8FF640BCA000 0005AA (v02 PmRef ApIst 00003000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8FF641A08200 000119 (v02 PmRef ApCst 00003000 INTL 20120913) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Interpreter enabled Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Using IOAPIC for interrupt routing Mar 22 16:24:01 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:24:01 jik5.kamens.us kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved as ACPI motherboard resource Mar 22 16:24:01 jik5.kamens.us kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 22 16:24:01 jik5.kamens.us kernel: PCI: Using E820 reservations for host bridge windows Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: Enabled 8 GPEs in block 00 to 7F Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG0.PG00: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG1.PG01: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG2.PG02: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP09.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP10.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP11.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP12.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP13.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP01.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP02.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP03.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP04.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP05.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP06.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP07.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP17.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP18.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP19.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP20.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP14.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP15.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP16.PXSX.WRST: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_TZ_.FN00: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_TZ_.FN01: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_TZ_.FN02: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_TZ_.FN03: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: \_TZ_.FN04: New power resource Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Mar 22 16:24:01 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 22 16:24:01 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] Mar 22 16:24:01 jik5.kamens.us kernel: PCI host bridge to bus 0000:00 Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000effff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:00.0: [8086:191f] type 00 class 0x060000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:14.0: [8086:a12f] type 00 class 0x0c0330 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:14.0: reg 0x10: [mem 0xdf310000-0xdf31ffff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:14.2: [8086:a131] type 00 class 0x118000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:14.2: reg 0x10: [mem 0xdf32e000-0xdf32efff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:16.0: [8086:a13a] type 00 class 0x078000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:16.0: reg 0x10: [mem 0xdf32d000-0xdf32dfff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:16.0: PME# supported from D3hot Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: [8086:a102] type 00 class 0x010601 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x10: [mem 0xdf328000-0xdf329fff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x14: [mem 0xdf32c000-0xdf32c0ff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x18: [io 0xf050-0xf057] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x1c: [io 0xf040-0xf043] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x20: [io 0xf020-0xf03f] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x24: [mem 0xdf32b000-0xdf32b7ff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:17.0: PME# supported from D3hot Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: [8086:a114] type 01 class 0x060400 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.5: [8086:a115] type 01 class 0x060400 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.6: [8086:a116] type 01 class 0x060400 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.0: [8086:a145] type 00 class 0x060100 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.2: [8086:a121] type 00 class 0x058000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.2: reg 0x10: [mem 0xdf324000-0xdf327fff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.3: [8086:a170] type 00 class 0x040300 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xdf320000-0xdf323fff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x20: [mem 0xdf300000-0xdf30ffff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.4: [8086:a123] type 00 class 0x0c0500 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x10: [mem 0xdf32a000-0xdf32a0ff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x20: [io 0xf000-0xf01f] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: [10de:13c2] type 00 class 0x030000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x10: [mem 0xde000000-0xdeffffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x14: [mem 0xc0000000-0xcfffffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xd0000000-0xd1ffffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x30: [mem 0xdf000000-0xdf07ffff pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: BAR 1: assigned to efifb Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: 32.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s PCIe x16 link at 0000:00:01.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.1: [10de:0fbb] type 00 class 0x040300 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.1: reg 0x10: [mem 0xdf080000-0xdf083fff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: ASPM: current common clock configuration is inconsistent, reconfiguring Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:02:00.0: [10ec:8168] type 00 class 0x020000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x10: [io 0xd000-0xd0ff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x18: [mem 0xdf200000-0xdf200fff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x20: [mem 0xd2100000-0xd2103fff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:02:00.0: supports D1 D2 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:03:00.0: [8086:095a] type 00 class 0x028000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:03:00.0: reg 0x10: [mem 0xdf100000-0xdf101fff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 11 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 11 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 11 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 22 16:24:01 jik5.kamens.us kernel: iommu: Default domain type: Translated Mar 22 16:24:01 jik5.kamens.us kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 22 16:24:01 jik5.kamens.us kernel: SCSI subsystem initialized Mar 22 16:24:01 jik5.kamens.us kernel: libata version 3.00 loaded. Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: bus type USB registered Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver usbfs Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver hub Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new device driver usb Mar 22 16:24:01 jik5.kamens.us kernel: pps_core: LinuxPPS API ver. 1 registered Mar 22 16:24:01 jik5.kamens.us kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 22 16:24:01 jik5.kamens.us kernel: PTP clock support registered Mar 22 16:24:01 jik5.kamens.us kernel: EDAC MC: Ver: 3.0.0 Mar 22 16:24:01 jik5.kamens.us kernel: Registered efivars operations Mar 22 16:24:01 jik5.kamens.us kernel: NetLabel: Initializing Mar 22 16:24:01 jik5.kamens.us kernel: NetLabel: domain hash size = 128 Mar 22 16:24:01 jik5.kamens.us kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 22 16:24:01 jik5.kamens.us kernel: NetLabel: unlabeled traffic allowed by default Mar 22 16:24:01 jik5.kamens.us kernel: mctp: management component transport protocol core Mar 22 16:24:01 jik5.kamens.us kernel: NET: Registered PF_MCTP protocol family Mar 22 16:24:01 jik5.kamens.us kernel: PCI: Using ACPI for IRQ routing Mar 22 16:24:01 jik5.kamens.us kernel: PCI: pci_cache_line_size set to 64 bytes Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x89217018-0x8bffffff] Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8a871000-0x8bffffff] Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8c99e000-0x8fffffff] Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8e52c000-0x8fffffff] Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8faff000-0x8fffffff] Mar 22 16:24:01 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x46f000000-0x46fffffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: setting as boot VGA device Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: bridge control possible Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 22 16:24:01 jik5.kamens.us kernel: vgaarb: loaded Mar 22 16:24:01 jik5.kamens.us kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Mar 22 16:24:01 jik5.kamens.us kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc-early Mar 22 16:24:01 jik5.kamens.us kernel: VFS: Disk quotas dquot_6.6.0 Mar 22 16:24:01 jik5.kamens.us kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 22 16:24:01 jik5.kamens.us kernel: AppArmor: AppArmor Filesystem Enabled Mar 22 16:24:01 jik5.kamens.us kernel: pnp: PnP ACPI init Mar 22 16:24:01 jik5.kamens.us kernel: system 00:00: [io 0x0a00-0x0a1f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:00: [io 0x0a40-0x0a4f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:00: [io 0x0a50-0x0a5f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:03: [io 0x0680-0x069f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:03: [io 0x1800-0x18fe] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:03: [io 0x164e-0x164f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:04: [io 0x0800-0x087f] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:06: [io 0x1854-0x1857] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xfed10000-0xfed17fff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xfed18000-0xfed18fff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xfed19000-0xfed19fff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xe0000000-0xefffffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xfed20000-0xfed3ffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xfed90000-0xfed93fff] could not be reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xfed45000-0xfed8ffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xfee00000-0xfeefffff] could not be reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:07: [mem 0xdffe0000-0xdfffffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:08: [mem 0xfd000000-0xfdabffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:08: [mem 0xfdad0000-0xfdadffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:08: [mem 0xfdb00000-0xfdffffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:08: [mem 0xfe000000-0xfe01ffff] could not be reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:08: [mem 0xfe036000-0xfe03bfff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:08: [mem 0xfe03d000-0xfe3fffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:08: [mem 0xfe410000-0xfe7fffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:09: [io 0xff00-0xfffe] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:0a: [mem 0xfdaf0000-0xfdafffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:0a: [mem 0xfdae0000-0xfdaeffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: system 00:0a: [mem 0xfdac0000-0xfdacffff] has been reserved Mar 22 16:24:01 jik5.kamens.us kernel: pnp: PnP ACPI: found 11 devices Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 22 16:24:01 jik5.kamens.us kernel: NET: Registered PF_INET protocol family Mar 22 16:24:01 jik5.kamens.us kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: TCP: Hash tables configured (established 131072 bind 65536) Mar 22 16:24:01 jik5.kamens.us kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:24:01 jik5.kamens.us kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 22 16:24:01 jik5.kamens.us kernel: NET: Registered PF_XDP protocol family Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000effff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:00: resource 8 [mem 0xfd000000-0xfe7fffff window] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:01: resource 1 [mem 0xde000000-0xdf0fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:01: resource 2 [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:02: resource 0 [io 0xd000-0xdfff] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:02: resource 1 [mem 0xdf200000-0xdf2fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:02: resource 2 [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:24:01 jik5.kamens.us kernel: pci_bus 0000:03: resource 1 [mem 0xdf100000-0xdf1fffff] Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:14.0: quirk_usb_early_handoff+0x0/0x190 took 93576 usecs Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0 Mar 22 16:24:01 jik5.kamens.us kernel: PCI: CLS 0 bytes, default 64 Mar 22 16:24:01 jik5.kamens.us kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 22 16:24:01 jik5.kamens.us kernel: software IO TLB: mapped [mem 0x0000000085217000-0x0000000089217000] (64MB) Mar 22 16:24:01 jik5.kamens.us kernel: Trying to unpack rootfs image as initramfs... Mar 22 16:24:01 jik5.kamens.us kernel: Initialise system trusted keyrings Mar 22 16:24:01 jik5.kamens.us kernel: Key type blacklist registered Mar 22 16:24:01 jik5.kamens.us kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Mar 22 16:24:01 jik5.kamens.us kernel: zbud: loaded Mar 22 16:24:01 jik5.kamens.us kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 22 16:24:01 jik5.kamens.us kernel: fuse: init (API version 7.38) Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Platform Keyring initialized Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Machine keyring initialized Mar 22 16:24:01 jik5.kamens.us kernel: Key type asymmetric registered Mar 22 16:24:01 jik5.kamens.us kernel: Asymmetric key parser 'x509' registered Mar 22 16:24:01 jik5.kamens.us kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) Mar 22 16:24:01 jik5.kamens.us kernel: io scheduler mq-deadline registered Mar 22 16:24:01 jik5.kamens.us kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Mar 22 16:24:01 jik5.kamens.us kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 122 Mar 22 16:24:01 jik5.kamens.us kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 122 Mar 22 16:24:01 jik5.kamens.us kernel: pcieport 0000:00:1c.5: PME: Signaling with IRQ 123 Mar 22 16:24:01 jik5.kamens.us kernel: pcieport 0000:00:1c.5: AER: enabled with IRQ 123 Mar 22 16:24:01 jik5.kamens.us kernel: pcieport 0000:00:1c.6: PME: Signaling with IRQ 124 Mar 22 16:24:01 jik5.kamens.us kernel: pcieport 0000:00:1c.6: AER: enabled with IRQ 124 Mar 22 16:24:01 jik5.kamens.us kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 22 16:24:01 jik5.kamens.us kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: button: Sleep Button [SLPB] Mar 22 16:24:01 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: button: Power Button [PWRB] Mar 22 16:24:01 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: button: Power Button [PWRF] Mar 22 16:24:01 jik5.kamens.us kernel: thermal LNXTHERM:00: registered as thermal_zone0 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Mar 22 16:24:01 jik5.kamens.us kernel: thermal LNXTHERM:01: registered as thermal_zone1 Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ01] (30 C) Mar 22 16:24:01 jik5.kamens.us kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Mar 22 16:24:01 jik5.kamens.us kernel: Linux agpgart interface v0.103 Mar 22 16:24:01 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:24:01 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:24:01 jik5.kamens.us kernel: loop: module loaded Mar 22 16:24:01 jik5.kamens.us kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 22 16:24:01 jik5.kamens.us kernel: PPP generic driver version 2.4.2 Mar 22 16:24:01 jik5.kamens.us kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 Mar 22 16:24:01 jik5.kamens.us kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 22 16:24:01 jik5.kamens.us kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 22 16:24:01 jik5.kamens.us kernel: mousedev: PS/2 mouse device common for all mice Mar 22 16:24:01 jik5.kamens.us kernel: rtc_cmos 00:05: RTC can wake from S4 Mar 22 16:24:01 jik5.kamens.us kernel: rtc_cmos 00:05: registered as rtc0 Mar 22 16:24:01 jik5.kamens.us kernel: rtc_cmos 00:05: setting system clock to 2023-03-22T20:23:36 UTC (1679516616) Mar 22 16:24:01 jik5.kamens.us kernel: rtc_cmos 00:05: alarms up to one month, y3k, 242 bytes nvram Mar 22 16:24:01 jik5.kamens.us kernel: i2c_dev: i2c /dev entries driver Mar 22 16:24:01 jik5.kamens.us kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 22 16:24:01 jik5.kamens.us kernel: device-mapper: uevent: version 1.0.3 Mar 22 16:24:01 jik5.kamens.us kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Probing EISA bus 0 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 1 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 2 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 3 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 4 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 5 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 6 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 7 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 8 Mar 22 16:24:01 jik5.kamens.us kernel: platform eisa.0: EISA: Detected 0 cards Mar 22 16:24:01 jik5.kamens.us kernel: intel_pstate: Intel P-state driver initializing Mar 22 16:24:01 jik5.kamens.us kernel: intel_pstate: HWP enabled Mar 22 16:24:01 jik5.kamens.us kernel: ledtrig-cpu: registered to indicate activity on CPUs Mar 22 16:24:01 jik5.kamens.us kernel: efifb: probing for efifb Mar 22 16:24:01 jik5.kamens.us kernel: efifb: showing boot graphics Mar 22 16:24:01 jik5.kamens.us kernel: efifb: framebuffer at 0xc0000000, using 8640k, total 8640k Mar 22 16:24:01 jik5.kamens.us kernel: efifb: mode is 1920x1080x32, linelength=8192, pages=1 Mar 22 16:24:01 jik5.kamens.us kernel: efifb: scrolling: redraw Mar 22 16:24:01 jik5.kamens.us kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 22 16:24:01 jik5.kamens.us kernel: Console: switching to colour frame buffer device 240x67 Mar 22 16:24:01 jik5.kamens.us kernel: fb0: EFI VGA frame buffer device Mar 22 16:24:01 jik5.kamens.us kernel: intel_pmc_core INT33A1:00: initialized Mar 22 16:24:01 jik5.kamens.us kernel: drop_monitor: Initializing network drop monitor service Mar 22 16:24:01 jik5.kamens.us kernel: NET: Registered PF_INET6 protocol family Mar 22 16:24:01 jik5.kamens.us kernel: Freeing initrd memory: 132872K Mar 22 16:24:01 jik5.kamens.us kernel: Segment Routing with IPv6 Mar 22 16:24:01 jik5.kamens.us kernel: In-situ OAM (IOAM) with IPv6 Mar 22 16:24:01 jik5.kamens.us kernel: NET: Registered PF_PACKET protocol family Mar 22 16:24:01 jik5.kamens.us kernel: Key type dns_resolver registered Mar 22 16:24:01 jik5.kamens.us kernel: microcode: Microcode Update Driver: v2.2. Mar 22 16:24:01 jik5.kamens.us kernel: IPI shorthand broadcast: enabled Mar 22 16:24:01 jik5.kamens.us kernel: sched_clock: Marking stable (963521903, 416584)->(968502965, -4564478) Mar 22 16:24:01 jik5.kamens.us kernel: registered taskstats version 1 Mar 22 16:24:01 jik5.kamens.us kernel: Loading compiled-in X.509 certificates Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Loading compiled-in revocation X.509 certificates Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' Mar 22 16:24:01 jik5.kamens.us kernel: zswap: loaded using pool lzo/zbud Mar 22 16:24:01 jik5.kamens.us kernel: Key type .fscrypt registered Mar 22 16:24:01 jik5.kamens.us kernel: Key type fscrypt-provisioning registered Mar 22 16:24:01 jik5.kamens.us kernel: Key type trusted registered Mar 22 16:24:01 jik5.kamens.us kernel: Key type encrypted registered Mar 22 16:24:01 jik5.kamens.us kernel: AppArmor: AppArmor sha1 policy hashing enabled Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer: c4f0474ae6b5e67a509d99132f49a4ec13f7ac68' Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer Database: 84f00f5841571abd2cc11a8c26d5c9c8d2b6b0b5' Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Acer Database Forbidden: 9de028a2638669f109745d3e2a7ad5c9e64ed392' Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:24:01 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Debian Secure Boot Signer: 00a7468def' Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:24:01 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:24:01 jik5.kamens.us kernel: Loading compiled-in module X.509 certificates Mar 22 16:24:01 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:24:01 jik5.kamens.us kernel: ima: Allocated hash algorithm: sha1 Mar 22 16:24:01 jik5.kamens.us kernel: ima: No architecture policies found Mar 22 16:24:01 jik5.kamens.us kernel: evm: Initialising EVM extended attributes: Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.selinux Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.SMACK64 Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.SMACK64EXEC Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.SMACK64TRANSMUTE Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.SMACK64MMAP Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.apparmor Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.ima Mar 22 16:24:01 jik5.kamens.us kernel: evm: security.capability Mar 22 16:24:01 jik5.kamens.us kernel: evm: HMAC attrs: 0x1 Mar 22 16:24:01 jik5.kamens.us kernel: PM: Magic number: 15:579:397 Mar 22 16:24:01 jik5.kamens.us kernel: mem random: hash matches Mar 22 16:24:01 jik5.kamens.us kernel: RAS: Correctable Errors collector initialized. Mar 22 16:24:01 jik5.kamens.us kernel: Freeing unused decrypted memory: 2036K Mar 22 16:24:01 jik5.kamens.us kernel: Freeing unused kernel image (initmem) memory: 4644K Mar 22 16:24:01 jik5.kamens.us kernel: Write protecting the kernel read-only data: 34816k Mar 22 16:24:01 jik5.kamens.us kernel: Freeing unused kernel image (rodata/data gap) memory: 872K Mar 22 16:24:01 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:24:01 jik5.kamens.us kernel: x86/mm: Checking user space page tables Mar 22 16:24:01 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:24:01 jik5.kamens.us kernel: Run /init as init process Mar 22 16:24:01 jik5.kamens.us kernel: with arguments: Mar 22 16:24:01 jik5.kamens.us kernel: /init Mar 22 16:24:01 jik5.kamens.us kernel: splash Mar 22 16:24:01 jik5.kamens.us kernel: with environment: Mar 22 16:24:01 jik5.kamens.us kernel: HOME=/ Mar 22 16:24:01 jik5.kamens.us kernel: TERM=linux Mar 22 16:24:01 jik5.kamens.us kernel: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic Mar 22 16:24:01 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:24:01 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Mar 22 16:24:01 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810 Mar 22 16:24:01 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:24:01 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Mar 22 16:24:01 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed Mar 22 16:24:01 jik5.kamens.us kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.02 Mar 22 16:24:01 jik5.kamens.us kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:24:01 jik5.kamens.us kernel: usb usb1: Product: xHCI Host Controller Mar 22 16:24:01 jik5.kamens.us kernel: usb usb1: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb usb1: SerialNumber: 0000:00:14.0 Mar 22 16:24:01 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Mar 22 16:24:01 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.1: [8086:a120] type 00 class 0x058000 Mar 22 16:24:01 jik5.kamens.us kernel: pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-0:1.0: USB hub found Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-0:1.0: 16 ports detected Mar 22 16:24:01 jik5.kamens.us kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Mar 22 16:24:01 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x51 Mar 22 16:24:01 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x53 Mar 22 16:24:01 jik5.kamens.us kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.02 Mar 22 16:24:01 jik5.kamens.us kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:24:01 jik5.kamens.us kernel: usb usb2: Product: xHCI Host Controller Mar 22 16:24:01 jik5.kamens.us kernel: usb usb2: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb usb2: SerialNumber: 0000:00:14.0 Mar 22 16:24:01 jik5.kamens.us kernel: hub 2-0:1.0: USB hub found Mar 22 16:24:01 jik5.kamens.us kernel: hub 2-0:1.0: 10 ports detected Mar 22 16:24:01 jik5.kamens.us kernel: usb: port power management may be unreliable Mar 22 16:24:01 jik5.kamens.us kernel: ahci 0000:00:17.0: version 3.0 Mar 22 16:24:01 jik5.kamens.us kernel: cryptd: max_cpu_qlen set to 1000 Mar 22 16:24:01 jik5.kamens.us kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 5 ports 6 Gbps 0x3d impl SATA mode Mar 22 16:24:01 jik5.kamens.us kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst Mar 22 16:24:01 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: RTL8168g/8111g, 98:ee:cb:23:9d:15, XID 4c0, IRQ 127 Mar 22 16:24:01 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] Mar 22 16:24:01 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: renamed from eth0 Mar 22 16:24:01 jik5.kamens.us kernel: scsi host0: ahci Mar 22 16:24:01 jik5.kamens.us kernel: scsi host1: ahci Mar 22 16:24:01 jik5.kamens.us kernel: scsi host2: ahci Mar 22 16:24:01 jik5.kamens.us kernel: scsi host3: ahci Mar 22 16:24:01 jik5.kamens.us kernel: scsi host4: ahci Mar 22 16:24:01 jik5.kamens.us kernel: scsi host5: ahci Mar 22 16:24:01 jik5.kamens.us kernel: ata1: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b100 irq 126 Mar 22 16:24:01 jik5.kamens.us kernel: ata2: DUMMY Mar 22 16:24:01 jik5.kamens.us kernel: ata3: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b200 irq 126 Mar 22 16:24:01 jik5.kamens.us kernel: ata4: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b280 irq 126 Mar 22 16:24:01 jik5.kamens.us kernel: ata5: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b300 irq 126 Mar 22 16:24:01 jik5.kamens.us kernel: ata6: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b380 irq 126 Mar 22 16:24:01 jik5.kamens.us kernel: tsc: Refined TSC clocksource calibration: 4007.936 MHz Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39c5a5cdbca, max_idle_ns: 440795391860 ns Mar 22 16:24:01 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-1: New USB device found, idVendor=04f9, idProduct=03b9, bcdDevice= 1.00 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-1: Product: ADS-2800W Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-1: Manufacturer: Brother Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-1: SerialNumber: U64278M7G198321 Mar 22 16:24:01 jik5.kamens.us kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:24:01 jik5.kamens.us kernel: ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:24:01 jik5.kamens.us kernel: ata4: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Mar 22 16:24:01 jik5.kamens.us kernel: ata6: SATA link up 3.0 Gbps (SStatus 123 SControl 300) Mar 22 16:24:01 jik5.kamens.us kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:24:01 jik5.kamens.us kernel: ata3.00: ATA-9: ST1000DM003-1ER162, CC45, max UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata6.00: ATA-8: WDC WD5001AALS-00L3B2, 01.03B01, max UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata3.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:24:01 jik5.kamens.us kernel: ata6.00: 976773168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:24:01 jik5.kamens.us kernel: ata4.00: ATAPI: HL-DT-ST DVDRAM GHC0N, 1.00, max UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata3.00: configured for UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: ATA-9: Samsung SSD 850 EVO 1TB, EMT01B6Q, max UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata6.00: configured for UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata1.00: ATA-9: LITEON CV1-8B128, G871201, max UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata1.00: 250069680 sectors, multi 2: LBA48 NCQ (depth 32), AA Mar 22 16:24:01 jik5.kamens.us kernel: ata1.00: Features: Dev-Sleep Mar 22 16:24:01 jik5.kamens.us kernel: ata1.00: configured for UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: ata4.00: configured for UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: scsi 0:0:0:0: Direct-Access ATA LITEON CV1-8B128 201 PQ: 0 ANSI: 5 Mar 22 16:24:01 jik5.kamens.us kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 Mar 22 16:24:01 jik5.kamens.us kernel: sd 0:0:0:0: [sda] 250069680 512-byte logical blocks: (128 GB/119 GiB) Mar 22 16:24:01 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 22 16:24:01 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Mar 22 16:24:01 jik5.kamens.us kernel: scsi 2:0:0:0: Direct-Access ATA ST1000DM003-1ER1 CC45 PQ: 0 ANSI: 5 Mar 22 16:24:01 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:24:01 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 4096-byte physical blocks Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write Protect is off Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Mar 22 16:24:01 jik5.kamens.us kernel: scsi 3:0:0:0: CD-ROM HL-DT-ST DVDRAM GHC0N 1.00 PQ: 0 ANSI: 5 Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: 1953525168 sectors, multi 1: LBA48 NCQ (depth 32), AA Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: Features: Trust Dev-Sleep Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:24:01 jik5.kamens.us kernel: sda: Mar 22 16:24:01 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 22 16:24:01 jik5.kamens.us kernel: ata5.00: configured for UDMA/133 Mar 22 16:24:01 jik5.kamens.us kernel: sdb: Mar 22 16:24:01 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Attached SCSI disk Mar 22 16:24:01 jik5.kamens.us kernel: sr 3:0:0:0: [sr0] scsi3-mmc drive: 40x/12x writer dvd-ram cd/rw xa/form2 cdda tray Mar 22 16:24:01 jik5.kamens.us kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5: new SuperSpeed USB device number 2 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi CD-ROM sr0 Mar 22 16:24:01 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi generic sg2 type 5 Mar 22 16:24:01 jik5.kamens.us kernel: scsi 4:0:0:0: Direct-Access ATA Samsung SSD 850 1B6Q PQ: 0 ANSI: 5 Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: Attached scsi generic sg3 type 0 Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write Protect is off Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Mode Sense: 00 3a 00 00 Mar 22 16:24:01 jik5.kamens.us kernel: scsi 5:0:0:0: Direct-Access ATA WDC WD5001AALS-0 3B01 PQ: 0 ANSI: 5 Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Preferred minimum I/O size 512 bytes Mar 22 16:24:01 jik5.kamens.us kernel: sd 5:0:0:0: Attached scsi generic sg4 type 0 Mar 22 16:24:01 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] 976773168 512-byte logical blocks: (500 GB/466 GiB) Mar 22 16:24:01 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write Protect is off Mar 22 16:24:01 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Mode Sense: 00 3a 00 00 Mar 22 16:24:01 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:24:01 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Preferred minimum I/O size 512 bytes Mar 22 16:24:01 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Attached SCSI disk Mar 22 16:24:01 jik5.kamens.us kernel: sdc: sdc1 sdc2 sdc3 Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] supports TCG Opal Mar 22 16:24:01 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Attached SCSI disk Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5: New USB device found, idVendor=2109, idProduct=8110, bcdDevice=90.95 Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5: Product: USB3.0 Hub Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5: Manufacturer: VIA Labs, Inc. Mar 22 16:24:01 jik5.kamens.us kernel: hub 2-5:1.0: USB hub found Mar 22 16:24:01 jik5.kamens.us kernel: hub 2-5:1.0: 4 ports detected Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-2: new full-speed USB device number 3 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-2: New USB device found, idVendor=0b0e, idProduct=2467, bcdDevice= 2.10 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-2: New USB device strings: Mfr=0, Product=2, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-2: Product: Jabra Evolve 75 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-3: new full-speed USB device number 4 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-3: New USB device found, idVendor=0764, idProduct=0501, bcdDevice= 2.00 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-3: New USB device strings: Mfr=3, Product=1, SerialNumber=2 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-3: Product: AVRG750U Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-3: Manufacturer: CPS Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-3: SerialNumber: BHBGV2000445 Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5.1: new SuperSpeed USB device number 3 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5.1: New USB device found, idVendor=17e9, idProduct=4323, bcdDevice=31.00 Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5.1: Product: Plugable UD-3900 Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5.1: Manufacturer: DisplayLink Mar 22 16:24:01 jik5.kamens.us kernel: usb 2-5.1: SerialNumber: 20175067 Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ether Mar 22 16:24:01 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: MAC-Address: 8c:ae:4c:dc:cf:46 Mar 22 16:24:01 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting rx_max = 16384 Mar 22 16:24:01 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5: setting tx_max = 16384 Mar 22 16:24:01 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 eth0: register 'cdc_ncm' at usb-0000:00:14.0-5.1, CDC NCM (SEND ZLP), 8c:ae:4c:dc:cf:46 Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ncm Mar 22 16:24:01 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 enx8cae4cdccf46: renamed from eth0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-6: new low-speed USB device number 5 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-6: New USB device found, idVendor=0bc7, idProduct=0002, bcdDevice= 1.00 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-6: Product: USB Transceiver Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-6: Manufacturer: X10 Wireless Technology Inc Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7: new high-speed USB device number 6 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7: New USB device found, idVendor=2109, idProduct=2811, bcdDevice=90.90 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7: Product: USB2.0 Hub Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7: Manufacturer: VIA Labs, Inc. Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7:1.0: USB hub found Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7:1.0: 4 ports detected Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-9: new high-speed USB device number 7 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-9: New USB device found, idVendor=0bda, idProduct=0153, bcdDevice=57.13 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-9: Product: USB2.0-CRW Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-9: Manufacturer: Generic Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-9: SerialNumber: 20120926571200000 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4: new high-speed USB device number 8 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4: Product: USB 2.0 Hub Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7.4:1.0: USB hub found Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7.4:1.0: 4 ports detected Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-10: new full-speed USB device number 9 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-10: New USB device found, idVendor=8087, idProduct=0a2a, bcdDevice= 0.01 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: hid: raw HID events driver (C) Jiri Kosina Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver usb-storage Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver uas Mar 22 16:24:01 jik5.kamens.us kernel: ums-realtek 1-9:1.0: USB Mass Storage device detected Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver usbhid Mar 22 16:24:01 jik5.kamens.us kernel: usbhid: USB HID core driver Mar 22 16:24:01 jik5.kamens.us kernel: scsi host6: usb-storage 1-9:1.0 Mar 22 16:24:01 jik5.kamens.us kernel: usbcore: registered new interface driver ums-realtek Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:0764:0501.0002: hiddev0,hidraw0: USB HID v1.10 Device [CPS AVRG750U] on usb-0000:00:14.0-3/input0 Mar 22 16:24:01 jik5.kamens.us kernel: input: Jabra Evolve 75 as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0/0003:0B0E:2467.0001/input/input6 Mar 22 16:24:01 jik5.kamens.us kernel: jabra 0003:0B0E:2467.0001: input,hiddev1,hidraw1: USB HID v1.11 Device [Jabra Evolve 75] on usb-0000:00:14.0-2/input0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1: new high-speed USB device number 10 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1: Product: USB 2.0 Hub Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7.4.1:1.0: USB hub found Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7.4.1:1.0: 4 ports detected Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.3: new high-speed USB device number 11 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.1: new full-speed USB device number 12 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: scsi 6:0:0:0: Direct-Access Generic- SD/MMC/MS PRO 1.00 PQ: 0 ANSI: 4 Mar 22 16:24:01 jik5.kamens.us kernel: sd 6:0:0:0: Attached scsi generic sg5 type 0 Mar 22 16:24:01 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Media removed, stopped polling Mar 22 16:24:01 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Attached SCSI removable disk Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device found, idVendor=0b0e, idProduct=245d, bcdDevice= 1.48 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.1: Product: Jabra Link 370 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.1: SerialNumber: 70BF92C25E96 Mar 22 16:24:01 jik5.kamens.us kernel: input: Jabra Link 370 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.3/0003:0B0E:245D.0003/input/input7 Mar 22 16:24:01 jik5.kamens.us kernel: jabra 0003:0B0E:245D.0003: input,hiddev2,hidraw2: USB HID v1.11 Device [Jabra Link 370] on usb-0000:00:14.0-7.4.1.1/input3 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.4: new full-speed USB device number 13 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device found, idVendor=046d, idProduct=c52b, bcdDevice=12.10 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.4: Product: USB Receiver Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.1.4: Manufacturer: Logitech Mar 22 16:24:01 jik5.kamens.us kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.0/0003:046D:C52B.0004/input/input8 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0004: input,hidraw3: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input0 Mar 22 16:24:01 jik5.kamens.us kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0005/input/input9 Mar 22 16:24:01 jik5.kamens.us kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0005/input/input10 Mar 22 16:24:01 jik5.kamens.us kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1/0003:046D:C52B.0005/input/input11 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0005: input,hiddev3,hidraw4: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input1 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0006: hiddev4,hidraw5: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.3: New USB device found, idVendor=046d, idProduct=082d, bcdDevice= 0.11 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.3: New USB device strings: Mfr=0, Product=2, SerialNumber=1 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.3: Product: HD Pro Webcam C920 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.3: SerialNumber: ED48865F Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4: new high-speed USB device number 14 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4: New USB device found, idVendor=058f, idProduct=6254, bcdDevice= 1.00 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7.4.4:1.0: USB hub found Mar 22 16:24:01 jik5.kamens.us kernel: hub 1-7.4.4:1.0: 4 ports detected Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.1: new full-speed USB device number 15 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: logitech-djreceiver 0003:046D:C52B.0006: hiddev3,hidraw3: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4.1.4/input2 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device found, idVendor=24f0, idProduct=0142, bcdDevice= 1.00 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.1: Product: Das Keyboard Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.1: Manufacturer: Metadot - Das Keyboard Mar 22 16:24:01 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.0/0003:24F0:0142.0007/input/input13 Mar 22 16:24:01 jik5.kamens.us kernel: input: Logitech Wireless Device PID:4051 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0008/input/input14 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0007: input,hidraw4: USB HID v1.10 Keyboard [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input0 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:046D:4051.0008: input,hidraw5: USB HID v1.11 Mouse [Logitech Wireless Device PID:4051] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:24:01 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0009/input/input18 Mar 22 16:24:01 jik5.kamens.us kernel: input: Logitech M510 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0008/input/input20 Mar 22 16:24:01 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1/0003:24F0:0142.0009/input/input19 Mar 22 16:24:01 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0008: input,hidraw5: USB HID v1.11 Mouse [Logitech M510] on usb-0000:00:14.0-7.4.1.4/input2:1 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0009: input,hidraw6: USB HID v1.10 Device [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.4.4.1/input1 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.2: new full-speed USB device number 16 using xhci_hcd Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.2: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 5.43 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.2: Product: YubiKey OTP+FIDO+CCID Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.2: Manufacturer: Yubico Mar 22 16:24:01 jik5.kamens.us kernel: input: Yubico YubiKey OTP+FIDO+CCID as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.2/1-7.4.4.2:1.0/0003:1050:0407.000A/input/input21 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000A: input,hidraw7: USB HID v1.10 Keyboard [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.4.4.2/input0 Mar 22 16:24:01 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000B: hiddev4,hidraw8: USB HID v1.10 Device [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.4.4.2/input1 Mar 22 16:24:01 jik5.kamens.us kernel: usb 1-7.4.4.2: USB disconnect, device number 16 Mar 22 16:24:01 jik5.kamens.us kernel: EXT4-fs (dm-1): mounted filesystem e07a02bb-3dad-40e5-945b-111535c44f3a with ordered data mode. Quota mode: none. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Inserted module 'autofs4' Mar 22 16:24:01 jik5.kamens.us systemd[1]: systemd 252.5-2ubuntu2 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 22 16:24:01 jik5.kamens.us systemd[1]: Detected architecture x86-64. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Hostname set to . Mar 22 16:24:01 jik5.kamens.us systemd[1]: Queued start job for default target graphical.target. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Created slice system-postfix.slice - Slice /system/postfix. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Created slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Created slice user.slice - User and Session Slice. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Reached target slices.target - Slice Units. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on rpcbind.socket - RPCbind Server Activation Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on syslog.socket - Syslog Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-journald.socket - Journal Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-oomd.socket - Userspace Out-Of-Memory (OOM) Killer Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-journald.service - Journal Service... Mar 22 16:24:01 jik5.kamens.us systemd[1]: auth-rpcgss-module.service - Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished blk-availability.service - Availability of block devices. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Mar 22 16:24:01 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Mar 22 16:24:01 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:24:01 jik5.kamens.us kernel: pstore: Using crash dump compression: deflate Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Mar 22 16:24:01 jik5.kamens.us systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Mar 22 16:24:01 jik5.kamens.us systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Mar 22 16:24:01 jik5.kamens.us kernel: pstore: Registered efi_pstore as persistent store backend Mar 22 16:24:01 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Mar 22 16:24:01 jik5.kamens.us kernel: EXT4-fs (dm-1): re-mounted e07a02bb-3dad-40e5-945b-111535c44f3a. Quota mode: none. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Mar 22 16:24:01 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:24:01 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-sysusers.service - Create System Users... Mar 22 16:24:01 jik5.kamens.us kernel: ACPI: bus type drm_connector registered Mar 22 16:24:01 jik5.kamens.us systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Mar 22 16:24:01 jik5.kamens.us kernel: lp: driver loaded but no devices found Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:24:01 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:24:01 jik5.kamens.us kernel: ppdev: user-space parallel port driver Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished systemd-sysusers.service - Create System Users. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Mar 22 16:24:01 jik5.kamens.us systemd-journald[719]: Journal started Mar 22 16:24:01 jik5.kamens.us systemd-journald[719]: Runtime Journal (/run/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 8.0M, max 159.3M, 151.3M free. Mar 22 16:24:01 jik5.kamens.us systemd-modules-load[733]: Inserted module 'lp' Mar 22 16:24:01 jik5.kamens.us systemd-modules-load[733]: Inserted module 'ppdev' Mar 22 16:24:01 jik5.kamens.us systemd-modules-load[733]: Inserted module 'parport_pc' Mar 22 16:24:01 jik5.kamens.us lvm[723]: 2 logical volume(s) in volume group "ubuntu-vg" monitored Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Mar 22 16:24:01 jik5.kamens.us systemd[1]: Started systemd-journald.service - Journal Service. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Mar 22 16:24:01 jik5.kamens.us systemd-journald[719]: Time spent on flushing to /var/log/journal/dca43d426a4043fd96f7351cc9f080c2 is 6.517ms for 1092 entries. Mar 22 16:24:01 jik5.kamens.us systemd-journald[719]: System Journal (/var/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 1.3G, max 4.0G, 2.6G free. Mar 22 16:24:01 jik5.kamens.us systemd-journald[719]: Received client request to flush runtime journal. Mar 22 16:24:01 jik5.kamens.us systemd-journald[719]: File /var/log/journal/dca43d426a4043fd96f7351cc9f080c2/system.journal corrupted or uncleanly shut down, renaming and replacing. Mar 22 16:24:01 jik5.kamens.us systemd-udevd[751]: Using default interface naming scheme 'v252'. Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Mar 22 16:24:01 jik5.kamens.us systemd-udevd[751]: Configuration file /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:24:01 jik5.kamens.us systemd-udevd[751]: /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules:9 Invalid key 'SYSFS' Mar 22 16:24:01 jik5.kamens.us systemd-udevd[751]: /etc/udev/rules.d/60-brother-libsane-type1.rules:17 Invalid key 'SYSFS' Mar 22 16:24:01 jik5.kamens.us systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Mar 22 16:24:01 jik5.kamens.us systemd-udevd[761]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatch /module/rfkill 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us kernel: nvidia: loading out-of-tree module taints kernel. Mar 22 16:24:02 jik5.kamens.us kernel: nvidia: module license 'NVIDIA' taints kernel. Mar 22 16:24:02 jik5.kamens.us kernel: Disabling lock debugging due to kernel taint Mar 22 16:24:01 jik5.kamens.us systemd-udevd[761]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatchd /module/rfkill 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[839]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1" Mar 22 16:24:01 jik5.kamens.us systemd-udevd[761]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /module/rfkill 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[839]: bus: 2, device: 3 was not an MTP device Mar 22 16:24:01 jik5.kamens.us systemd-udevd[761]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /module/rfkill 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[829]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-2" Mar 22 16:24:02 jik5.kamens.us systemd-udevd[786]: event_source: Failed to get device name: No such file or directory Mar 22 16:24:02 jik5.kamens.us mtp-probe[829]: bus: 1, device: 3 was not an MTP device Mar 22 16:24:02 jik5.kamens.us lvm[793]: PV /dev/dm-0 online, VG ubuntu-vg is complete. Mar 22 16:24:02 jik5.kamens.us mtp-probe[828]: checking bus 1, device 7: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" Mar 22 16:24:02 jik5.kamens.us lvm[793]: VG ubuntu-vg finished Mar 22 16:24:02 jik5.kamens.us mtp-probe[828]: bus: 1, device: 7 was not an MTP device Mar 22 16:24:02 jik5.kamens.us systemd-udevd[757]: dm-1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-1' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[913]: checking bus 1, device 12: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1" Mar 22 16:24:02 jik5.kamens.us systemd-udevd[764]: sdb: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[913]: bus: 1, device: 12 was not an MTP device Mar 22 16:24:02 jik5.kamens.us systemd-udevd[769]: sda: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[918]: checking bus 1, device 15: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1" Mar 22 16:24:02 jik5.kamens.us systemd-udevd[778]: dm-2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-2' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[918]: bus: 1, device: 15 was not an MTP device Mar 22 16:24:02 jik5.kamens.us systemd-udevd[763]: sdc: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[932]: checking bus 1, device 13: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4" Mar 22 16:24:02 jik5.kamens.us systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Mar 22 16:24:02 jik5.kamens.us mtp-probe[932]: bus: 1, device: 13 was not an MTP device Mar 22 16:24:02 jik5.kamens.us systemd[1]: Found device dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.device - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[1015]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-3" Mar 22 16:24:02 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_wdm Mar 22 16:24:02 jik5.kamens.us kernel: nvidia-nvlink: Nvlink Core is being initialized, major device number 238 Mar 22 16:24:02 jik5.kamens.us kernel: Mar 22 16:24:02 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_mbim Mar 22 16:24:02 jik5.kamens.us kernel: nvidia 0000:01:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem Mar 22 16:24:02 jik5.kamens.us kernel: EDAC ie31200: No ECC support Mar 22 16:24:02 jik5.kamens.us kernel: mc: Linux media interface: v0.10 Mar 22 16:24:02 jik5.kamens.us kernel: NVRM: loading NVIDIA UNIX x86_64 Kernel Module 515.86.01 Wed Oct 26 09:12:38 UTC 2022 Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: Core ver 2.22 Mar 22 16:24:02 jik5.kamens.us kernel: NET: Registered PF_BLUETOOTH protocol family Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: HCI device and connection manager initialized Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: HCI socket layer initialized Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: L2CAP socket layer initialized Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: SCO socket layer initialized Mar 22 16:24:02 jik5.kamens.us kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) Mar 22 16:24:02 jik5.kamens.us kernel: ee1004 0-0051: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:24:02 jik5.kamens.us kernel: ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:24:02 jik5.kamens.us kernel: nvidia-modeset: Loading NVIDIA Kernel Mode Setting Driver for UNIX platforms 515.86.01 Wed Oct 26 09:02:01 UTC 2022 Mar 22 16:24:02 jik5.kamens.us mtp-probe[1015]: bus: 1, device: 4 was not an MTP device Mar 22 16:24:02 jik5.kamens.us systemd-udevd[784]: sdc3: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc3' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[1010]: checking bus 1, device 5: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-6" Mar 22 16:24:02 jik5.kamens.us systemd-udevd[778]: sde: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sde' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[1010]: bus: 1, device: 5 was not an MTP device Mar 22 16:24:02 jik5.kamens.us systemd-udevd[758]: sdc2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc2' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[1095]: checking bus 1, device 11: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3" Mar 22 16:24:02 jik5.kamens.us systemd-udevd[763]: sdc1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc1' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us mtp-probe[1095]: bus: 1, device: 11 was not an MTP device Mar 22 16:24:02 jik5.kamens.us systemd-udevd[762]: sdd: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdd' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Activating swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Mar 22 16:24:02 jik5.kamens.us kernel: Adding 999420k swap on /dev/mapper/ubuntu--vg-swap_1. Priority:-2 extents:1 across:999420k SSFS Mar 22 16:24:02 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - Samsung_SSD_850_EVO_1TB 3. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Activated swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-F41C\x2d35B5.device - Samsung_SSD_850_EVO_1TB EFI\x20System\x20Partition. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[774]: dm-0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.device - Samsung_SSD_850_EVO_1TB 2. Mar 22 16:24:02 jik5.kamens.us kernel: videodev: Linux video capture interface: v2.00 Mar 22 16:24:02 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:24:02 jik5.kamens.us systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Reached target swap.target - Swaps. Mar 22 16:24:02 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=511), cval->res is probably wrong. Mar 22 16:24:02 jik5.kamens.us kernel: usb 2-5.1: [15] FU [Plugable Audio Playback Volume] ch = 6, val = -8176/0/16 Mar 22 16:24:02 jik5.kamens.us kernel: usb 2-5.1: Warning! Unlikely big volume range (=767), cval->res is probably wrong. Mar 22 16:24:02 jik5.kamens.us kernel: usb 2-5.1: [12] FU [Mic Capture Volume] ch = 2, val = -4592/7680/16 Mar 22 16:24:02 jik5.kamens.us kernel: usb 1-7.4.1.1: 1:1: cannot set freq 48000 to ep 0x3 Mar 22 16:24:02 jik5.kamens.us kernel: acer_wmi: Acer Laptop ACPI-WMI Extras Mar 22 16:24:02 jik5.kamens.us kernel: acer_wmi: No WMID device detection method found Mar 22 16:24:02 jik5.kamens.us kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Mar 22 16:24:02 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:24:02 jik5.kamens.us kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Mar 22 16:24:02 jik5.kamens.us systemd[1]: Starting systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt... Mar 22 16:24:02 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:24:02 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:24:02 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:24:02 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2... Mar 22 16:24:02 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:24:02 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:24:02 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:24:02 jik5.kamens.us systemd[1]: Started systemd-fsckd.service - File System Check Daemon to report status. Mar 22 16:24:02 jik5.kamens.us kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Mar 22 16:24:02 jik5.kamens.us kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Mar 22 16:24:02 jik5.kamens.us kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Mar 22 16:24:02 jik5.kamens.us kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Mar 22 16:24:02 jik5.kamens.us systemd-cryptsetup[1232]: Volume sdc3_crypt already active. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Finished systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: enabling device (0000 -> 0002) Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Disabling MSI Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1246]: /dev/sdc2: recovering journal Mar 22 16:24:02 jik5.kamens.us kernel: [drm] [nvidia-drm] [GPU ID 0x00000100] Loading driver Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card4/input22 Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card4/input23 Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card4/input24 Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card4/input25 Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: autoconfig for ALC662 rev3: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: mono: mono_out=0x0 Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: inputs: Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: Front Mic=0x19 Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: Rear Mic=0x18 Mar 22 16:24:02 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC3D0: Line=0x1a Mar 22 16:24:02 jik5.kamens.us kernel: usbcore: registered new interface driver btusb Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1246]: /dev/sdc2: clean, 326/46848 files, 119061/187392 blocks Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: fsck.fat 4.2 (2021-01-31) Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: There are differences between boot sector and its backup. Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: This is mostly harmless. Differences: (offset:original/backup) Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: 65:01/00 Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: Not automatically fixing this. Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: Automatically removing dirty bit. Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: *** Filesystem was changed *** Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: Writing changes. Mar 22 16:24:02 jik5.kamens.us systemd-fsck[1261]: /dev/sdc1: 11 files, 1554/130812 clusters Mar 22 16:24:02 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5. Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: hci0: Legacy ROM 2.5 revision 1.0 build 3 week 17 2014 Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: hci0: Intel Bluetooth firmware file: intel/ibt-hw-37.8.10-fw-1.10.3.11.e.bseq Mar 22 16:24:02 jik5.kamens.us kernel: Intel(R) Wireless WiFi driver for Linux Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1f.3/sound/card3/input26 Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1f.3/sound/card3/input27 Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1f.3/sound/card3/input28 Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1f.3/sound/card3/input29 Mar 22 16:24:02 jik5.kamens.us kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card3/input30 Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: enabling device (0000 -> 0002) Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug destination: EXTERNAL_DRAM Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug configuration: 0 Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: loaded firmware version 29.4063824552.0 7265D-29.ucode op_mode iwlmvm Mar 22 16:24:02 jik5.kamens.us systemd-udevd[761]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[761]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /class/video4linux 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[761]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_firefox /class/video4linux 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[761]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_geckodriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[782]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[777]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[760]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[782]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[777]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[760]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[755]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[755]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting home-macback-home-macback-backup.mount - /home/macback/home/macback/backup... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-bare-5.mount - Mount unit for bare, revision 5... Mar 22 16:24:02 jik5.kamens.us systemd-udevd[770]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120... Mar 22 16:24:02 jik5.kamens.us systemd-udevd[770]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126... Mar 22 16:24:02 jik5.kamens.us kernel: loop0: detected capacity change from 0 to 232672 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-bw-46.mount - Mount unit for bw, revision 46... Mar 22 16:24:02 jik5.kamens.us kernel: loop1: detected capacity change from 0 to 8 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-bw-47.mount - Mount unit for bw, revision 47... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164... Mar 22 16:24:02 jik5.kamens.us kernel: loop2: detected capacity change from 0 to 235144 Mar 22 16:24:02 jik5.kamens.us kernel: loop3: detected capacity change from 0 to 47328 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-chromium-2381.mount - Mount unit for chromium, revision 2381... Mar 22 16:24:02 jik5.kamens.us kernel: loop4: detected capacity change from 0 to 18352 Mar 22 16:24:02 jik5.kamens.us kernel: usb 1-7.4.3: Found UVC 1.00 device HD Pro Webcam C920 (046d:082d) Mar 22 16:24:02 jik5.kamens.us kernel: usbcore: registered new interface driver snd-usb-audio Mar 22 16:24:02 jik5.kamens.us kernel: loop5: detected capacity change from 0 to 47368 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-chromium-2392.mount - Mount unit for chromium, revision 2392... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28... Mar 22 16:24:02 jik5.kamens.us kernel: loop6: detected capacity change from 0 to 18352 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30... Mar 22 16:24:02 jik5.kamens.us kernel: loop7: detected capacity change from 0 to 304168 Mar 22 16:24:02 jik5.kamens.us systemd-udevd[762]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core-14784.mount - Mount unit for core, revision 14784... Mar 22 16:24:02 jik5.kamens.us systemd-udevd[762]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core-14946.mount - Mount unit for core, revision 14946... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core18-2708.mount - Mount unit for core18, revision 2708... Mar 22 16:24:02 jik5.kamens.us systemd-udevd[784]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[784]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us kernel: loop10: detected capacity change from 0 to 37776 Mar 22 16:24:02 jik5.kamens.us kernel: loop9: detected capacity change from 0 to 304168 Mar 22 16:24:02 jik5.kamens.us kernel: loop8: detected capacity change from 0 to 55568 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core18-2714.mount - Mount unit for core18, revision 2714... Mar 22 16:24:02 jik5.kamens.us kernel: input: HD Pro Webcam C920 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0/input/input31 Mar 22 16:24:02 jik5.kamens.us kernel: usbcore: registered new interface driver uvcvideo Mar 22 16:24:02 jik5.kamens.us kernel: loop11: detected capacity change from 0 to 239176 Mar 22 16:24:02 jik5.kamens.us systemd-udevd[759]: sr0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sr0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us kernel: loop12: detected capacity change from 0 to 113896 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core20-1828.mount - Mount unit for core20, revision 1828... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core20-1852.mount - Mount unit for core20, revision 1852... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core22-522.mount - Mount unit for core22, revision 522... Mar 22 16:24:02 jik5.kamens.us kernel: loop13: detected capacity change from 0 to 113888 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-core22-547.mount - Mount unit for core22, revision 547... Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Detected Intel(R) Dual Band Wireless AC 7265, REV=0x210 Mar 22 16:24:02 jik5.kamens.us kernel: thermal thermal_zone4: failed to read out thermal zone (-61) Mar 22 16:24:02 jik5.kamens.us kernel: loop14: detected capacity change from 0 to 239128 Mar 22 16:24:02 jik5.kamens.us kernel: loop18: detected capacity change from 0 to 149312 Mar 22 16:24:02 jik5.kamens.us kernel: intel_tcc_cooling: Programmable TCC Offset detected Mar 22 16:24:02 jik5.kamens.us kernel: loop16: detected capacity change from 0 to 129672 Mar 22 16:24:02 jik5.kamens.us kernel: Bluetooth: hci0: Intel BT fw patch 0x32 completed & activated Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-cups-836.mount - Mount unit for cups, revision 836... Mar 22 16:24:02 jik5.kamens.us kernel: loop15: detected capacity change from 0 to 129608 Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Applying debug destination EXTERNAL_DRAM Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Allocated 0x00400000 bytes for firmware monitor. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-cups-872.mount - Mount unit for cups, revision 872... Mar 22 16:24:02 jik5.kamens.us systemd-udevd[773]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[773]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us kernel: loop17: detected capacity change from 0 to 149312 Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: base HW address: 4c:34:88:9c:4f:cd, OTP minor version: 0x0 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-firefox-2432.mount - Mount unit for firefox, revision 2432... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-firefox-2487.mount - Mount unit for firefox, revision 2487... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102... Mar 22 16:24:02 jik5.kamens.us kernel: loop19: detected capacity change from 0 to 112848 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104... Mar 22 16:24:02 jik5.kamens.us kernel: loop20: detected capacity change from 0 to 112704 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145... Mar 22 16:24:02 jik5.kamens.us kernel: loop21: detected capacity change from 0 to 288072 Mar 22 16:24:02 jik5.kamens.us kernel: loop22: detected capacity change from 0 to 491264 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161... Mar 22 16:24:02 jik5.kamens.us kernel: loop24: detected capacity change from 0 to 288120 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72... Mar 22 16:24:02 jik5.kamens.us kernel: ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' Mar 22 16:24:02 jik5.kamens.us kernel: loop23: detected capacity change from 0 to 494824 Mar 22 16:24:02 jik5.kamens.us systemd-udevd[761]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77... Mar 22 16:24:02 jik5.kamens.us systemd-udevd[761]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115... Mar 22 16:24:02 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain package Mar 22 16:24:02 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain core Mar 22 16:24:02 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain dram Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56... Mar 22 16:24:02 jik5.kamens.us kernel: loop25: detected capacity change from 0 to 337424 Mar 22 16:24:02 jik5.kamens.us kernel: loop26: detected capacity change from 0 to 333552 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65... Mar 22 16:24:02 jik5.kamens.us kernel: loop29: detected capacity change from 0 to 448512 Mar 22 16:24:02 jik5.kamens.us kernel: loop28: detected capacity change from 0 to 448512 Mar 22 16:24:02 jik5.kamens.us kernel: iwlwifi 0000:03:00.0 wlp3s0: renamed from wlan0 Mar 22 16:24:02 jik5.kamens.us kernel: loop27: detected capacity change from 0 to 709216 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178... Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181... Mar 22 16:24:02 jik5.kamens.us systemd-udevd[755]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd-udevd[755]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534... Mar 22 16:24:02 jik5.kamens.us kernel: loop32: detected capacity change from 0 to 942640 Mar 22 16:24:02 jik5.kamens.us kernel: loop30: detected capacity change from 0 to 709280 Mar 22 16:24:02 jik5.kamens.us kernel: loop31: detected capacity change from 0 to 926512 Mar 22 16:24:02 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535... Mar 22 16:24:03 jik5.kamens.us kernel: loop33: detected capacity change from 0 to 3048 Mar 22 16:24:03 jik5.kamens.us systemd-udevd[782]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:24:03 jik5.kamens.us systemd-udevd[782]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2... Mar 22 16:24:03 jik5.kamens.us kernel: loop34: detected capacity change from 0 to 5208 Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599... Mar 22 16:24:03 jik5.kamens.us kernel: loop36: detected capacity change from 0 to 187776 Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638... Mar 22 16:24:03 jik5.kamens.us kernel: loop35: detected capacity change from 0 to 166424 Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49... Mar 22 16:24:03 jik5.kamens.us kernel: loop37: detected capacity change from 0 to 75960 Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71... Mar 22 16:24:03 jik5.kamens.us kernel: loop39: detected capacity change from 0 to 94064 Mar 22 16:24:03 jik5.kamens.us kernel: loop38: detected capacity change from 0 to 94056 Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting snap-vault-1930.mount - Mount unit for vault, revision 1930... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting snap-vault-1958.mount - Mount unit for vault, revision 1958... Mar 22 16:24:03 jik5.kamens.us kernel: loop40: detected capacity change from 0 to 608 Mar 22 16:24:03 jik5.kamens.us kernel: loop41: detected capacity change from 0 to 864 Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control... Mar 22 16:24:03 jik5.kamens.us kernel: loop42: detected capacity change from 0 to 594024 Mar 22 16:24:03 jik5.kamens.us kernel: loop43: detected capacity change from 0 to 594024 Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted home-macback-home-macback-backup.mount - /home/macback/home/macback/backup. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-bare-5.mount - Mount unit for bare, revision 5. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-bw-46.mount - Mount unit for bw, revision 46. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-bw-47.mount - Mount unit for bw, revision 47. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-chromium-2381.mount - Mount unit for chromium, revision 2381. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-chromium-2392.mount - Mount unit for chromium, revision 2392. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core-14784.mount - Mount unit for core, revision 14784. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core-14946.mount - Mount unit for core, revision 14946. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core18-2708.mount - Mount unit for core18, revision 2708. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core18-2714.mount - Mount unit for core18, revision 2714. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core20-1828.mount - Mount unit for core20, revision 1828. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core20-1852.mount - Mount unit for core20, revision 1852. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core22-522.mount - Mount unit for core22, revision 522. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-core22-547.mount - Mount unit for core22, revision 547. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-cups-836.mount - Mount unit for cups, revision 836. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-cups-872.mount - Mount unit for cups, revision 872. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-firefox-2432.mount - Mount unit for firefox, revision 2432. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-firefox-2487.mount - Mount unit for firefox, revision 2487. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-vault-1930.mount - Mount unit for vault, revision 1930. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted snap-vault-1958.mount - Mount unit for vault, revision 1958. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control. Mar 22 16:24:03 jik5.kamens.us systemd-udevd[763]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:24:03 jik5.kamens.us systemd-udevd[763]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:24:03 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:24:03 jik5.kamens.us systemd[1]: Reached target snapd.mounts.target - Mounted snaps. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting boot.mount - /boot... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:24:03 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:24:03 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:24:03 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:24:03 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting systemd-rfkill.service - Load/Save RF Kill Switch Status... Mar 22 16:24:03 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Started systemd-rfkill.service - Load/Save RF Kill Switch Status. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted boot.mount - /boot. Mar 22 16:24:03 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting boot-efi.mount - /boot/efi... Mar 22 16:24:03 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted boot-efi.mount - /boot/efi. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Reached target local-fs.target - Local File Systems. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting apparmor.service - Load AppArmor profiles... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting console-setup.service - Set console font and keymap... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting systemd-binfmt.service - Set Up Additional Binary Formats... Mar 22 16:24:03 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting ufw.service - Uncomplicated firewall... Mar 22 16:24:03 jik5.kamens.us apparmor.systemd[1538]: Restarting AppArmor Mar 22 16:24:03 jik5.kamens.us apparmor.systemd[1538]: Reloading AppArmor profiles Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished console-setup.service - Set console font and keymap. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Received SIGRTMIN+20 from PID 484 (plymouthd). Mar 22 16:24:03 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 1543 (systemd-binfmt) Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System... Mar 22 16:24:03 jik5.kamens.us apparmor.systemd[1562]: Skipping profile in /etc/apparmor.d/disable: usr.bin.firefox Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished systemd-binfmt.service - Set Up Additional Binary Formats. Mar 22 16:24:03 jik5.kamens.us audit[1566]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1566 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1558]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1558 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1559]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1559 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1559]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1559 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1565]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1565 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1563]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1563 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1563]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1563 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1563]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1563 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting binfmt-support.service - Enable support for additional executable binary formats... Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1566 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1558 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1559 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1559 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1565 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1563 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1563 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.492:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1563 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1568]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1568 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1564]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1564 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Mar 22 16:24:03 jik5.kamens.us audit[1570]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1570 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.496:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1568 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: audit: type=1400 audit(1679516643.496:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1564 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1560]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1560 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1560]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=1560 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1560]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1560 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1560]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/{,usr/}sbin/dhclient" pid=1560 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us apparmor.systemd[1576]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting rpcbind.service - RPC bind portmap service... Mar 22 16:24:03 jik5.kamens.us audit[1569]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine" pid=1569 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1569]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1569 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:24:03 jik5.kamens.us audit[1574]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="named" pid=1574 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1575]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="rsyslogd" pid=1575 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Mar 22 16:24:03 jik5.kamens.us audit[1572]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1572 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1572]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd" pid=1572 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1572]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd//third_party" pid=1572 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Started rpcbind.service - RPC bind portmap service. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Reached target rpcbind.target - RPC Port Mapper. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Mar 22 16:24:03 jik5.kamens.us audit[1561]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince" pid=1561 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1561]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince//sanitized_helper" pid=1561 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1561]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer" pid=1561 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1561]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer//sanitized_helper" pid=1561 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1561]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-thumbnailer" pid=1561 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1567]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice" pid=1567 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1567]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice//gpg" pid=1567 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished binfmt-support.service - Enable support for additional executable binary formats. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Started systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Reached target time-set.target - System Time Set. Mar 22 16:24:03 jik5.kamens.us systemd-resolved[1583]: Positive Trust Anchors: Mar 22 16:24:03 jik5.kamens.us systemd-resolved[1583]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 22 16:24:03 jik5.kamens.us systemd-resolved[1583]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 22 16:24:03 jik5.kamens.us audit[1576]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=1576 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us apparmor.systemd[1576]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 60): Caching disabled for: 'usr.sbin.sssd' due to force complain Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished apparmor.service - Load AppArmor profiles. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Starting snapd.apparmor.service - Load AppArmor profiles managed internally by snapd... Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:24:03 jik5.kamens.us systemd-resolved[1583]: Using system hostname 'jik5.kamens.us'. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Started systemd-resolved.service - Network Name Resolution. Mar 22 16:24:03 jik5.kamens.us audit[1623]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bw" pid=1623 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1622]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=1622 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1621]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=1621 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1621]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1621 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1626]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.core" pid=1626 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1624]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=1624 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1627]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.cups" pid=1627 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1632]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.vault" pid=1632 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1628]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.firefox" pid=1628 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1625]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.chromium" pid=1625 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1633]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.cli" pid=1633 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1630]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snap-store" pid=1630 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1629]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=1629 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1634]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.daemon" pid=1634 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1631]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=1631 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1636]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.tx" pid=1636 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us kernel: RPC: Registered named UNIX socket transport module. Mar 22 16:24:03 jik5.kamens.us kernel: RPC: Registered udp transport module. Mar 22 16:24:03 jik5.kamens.us kernel: RPC: Registered tcp transport module. Mar 22 16:24:03 jik5.kamens.us kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 22 16:24:03 jik5.kamens.us audit[1638]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.wallet" pid=1638 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1637]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.util" pid=1637 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1639]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bw.bw" pid=1639 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1640]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=1640 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1646]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=1646 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1643]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=1643 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1647]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=1647 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1648]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=1648 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Mounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:24:03 jik5.kamens.us audit[1642]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=1642 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Reached target rpc_pipefs.target. Mar 22 16:24:03 jik5.kamens.us systemd[1]: rpc-gssd.service - RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:24:03 jik5.kamens.us audit[1635]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.qt" pid=1635 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Reached target nfs-client.target - NFS client services. Mar 22 16:24:03 jik5.kamens.us audit[1655]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.accept" pid=1655 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1654]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.core.hook.configure" pid=1654 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1656]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cancel" pid=1656 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1653]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.hook.configure" pid=1653 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1660]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsaccept" pid=1660 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1659]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cups-browsed" pid=1659 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1649]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromedriver" pid=1649 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1666]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsctl" pid=1666 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1668]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsdisable" pid=1668 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1652]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromium" pid=1652 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1667]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsd" pid=1667 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1670]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsfilter" pid=1670 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1669]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsenable" pid=1669 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1671]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsreject" pid=1671 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1672]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupstestppd" pid=1672 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1674]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.gs" pid=1674 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1673]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.driverless" pid=1673 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1678]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lp" pid=1678 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1676]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippfind" pid=1676 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1675]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippeveprinter" pid=1675 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1677]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ipptool" pid=1677 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1679]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpadmin" pid=1679 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1681]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpinfo" pid=1681 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1680]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpc" pid=1680 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1682]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpoptions" pid=1682 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1685]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lprm" pid=1685 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1684]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpr" pid=1684 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1683]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpq" pid=1683 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1686]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpstat" pid=1686 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1687]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.reject" pid=1687 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1691]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=1691 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1690]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.configure" pid=1690 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1692]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=1692 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1693]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=1693 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1695]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=1695 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1688]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.firefox" pid=1688 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1689]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.geckodriver" pid=1689 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1697]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.hook.configure" pid=1697 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1694]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=1694 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1699]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=1699 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1709]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.vault.vault" pid=1709 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1698]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.snap-store" pid=1698 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1707]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=1707 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1702]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=1702 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us audit[1708]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=1708 comm="apparmor_parser" Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished snapd.apparmor.service - Load AppArmor profiles managed internally by snapd. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Finished ufw.service - Uncomplicated firewall. Mar 22 16:24:03 jik5.kamens.us systemd[1]: Reached target network-pre.target - Preparation for Network. Mar 22 16:24:08 jik5.kamens.us systemd[1]: systemd-rfkill.service: Deactivated successfully. Mar 22 16:24:32 jik5.kamens.us systemd[1]: systemd-fsckd.service: Deactivated successfully. Mar 22 16:25:02 jik5.kamens.us systemd-udevd[766]: 2-5.1:1.0: Spawned process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' [1181] is taking longer than 59s to complete Mar 22 16:25:02 jik5.kamens.us systemd-udevd[751]: 0000:01:00.0: Worker [787] processing SEQNUM=3848 is taking a long time Mar 22 16:25:02 jik5.kamens.us systemd-udevd[751]: 2-5.1:1.0: Worker [766] processing SEQNUM=3900 is taking a long time Mar 22 16:25:03 jik5.kamens.us systemd-udevd[786]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1323] is taking longer than 59s to complete Mar 22 16:25:03 jik5.kamens.us systemd-udevd[751]: nvidia: Worker [786] processing SEQNUM=4351 is taking a long time Mar 22 16:25:31 jik5.kamens.us systemd[1]: systemd-modules-load.service: start operation timed out. Terminating. Mar 22 16:26:12 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0008: HID++ 4.5 device connected. Mar 22 16:27:02 jik5.kamens.us systemd[1]: systemd-modules-load.service: State 'stop-sigterm' timed out. Killing. Mar 22 16:27:02 jik5.kamens.us systemd[1]: systemd-modules-load.service: Killing process 733 (systemd-modules) with signal SIGKILL. Mar 22 16:27:02 jik5.kamens.us systemd-udevd[766]: 2-5.1:1.0: Spawned process '/opt/displaylink/udev.sh /dev /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.0 usb-002-003-DisplayLink_Plugable_UD-3900_20175067 /dev/bus/usb/002/003' [1181] timed out after 2min 59s, killing Mar 22 16:27:02 jik5.kamens.us systemd-udevd[751]: 0000:01:00.0: Worker [787] processing SEQNUM=3848 killed Mar 22 16:27:02 jik5.kamens.us systemd-udevd[751]: 2-5.1:1.0: Worker [766] processing SEQNUM=3900 killed Mar 22 16:27:02 jik5.kamens.us systemd-udevd[751]: 2-5.1:1.0: Worker [766] terminated by signal 9 (KILL). Mar 22 16:27:02 jik5.kamens.us systemd-udevd[751]: 0000:01:00.0: Worker [787] terminated by signal 9 (KILL). Mar 22 16:27:03 jik5.kamens.us systemd-udevd[786]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1323] timed out after 2min 59s, killing Mar 22 16:27:03 jik5.kamens.us systemd-udevd[751]: nvidia: Worker [786] processing SEQNUM=4351 killed Mar 22 16:27:03 jik5.kamens.us systemd-udevd[751]: nvidia: Worker [786] terminated by signal 9 (KILL). Mar 22 16:27:38 jik5.kamens.us kernel: INFO: task systemd-modules:733 blocked for more than 120 seconds. Mar 22 16:27:38 jik5.kamens.us kernel: Tainted: P O 6.2.0-18-generic #18-Ubuntu Mar 22 16:27:38 jik5.kamens.us kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Mar 22 16:27:38 jik5.kamens.us kernel: task:systemd-modules state:D stack:0 pid:733 ppid:1 flags:0x00004006 Mar 22 16:27:38 jik5.kamens.us kernel: Call Trace: Mar 22 16:27:38 jik5.kamens.us kernel: Mar 22 16:27:38 jik5.kamens.us kernel: __schedule+0x2aa/0x610 Mar 22 16:27:38 jik5.kamens.us kernel: schedule+0x63/0x110 Mar 22 16:27:38 jik5.kamens.us kernel: schedule_preempt_disabled+0x15/0x30 Mar 22 16:27:38 jik5.kamens.us kernel: __mutex_lock.constprop.0+0x3f8/0x7a0 Mar 22 16:27:38 jik5.kamens.us kernel: ? __kmem_cache_alloc_node+0x19d/0x340 Mar 22 16:27:38 jik5.kamens.us kernel: ? nv_drm_calloc+0x1e/0x40 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: __mutex_lock_slowpath+0x13/0x20 Mar 22 16:27:38 jik5.kamens.us kernel: mutex_lock+0x3c/0x50 Mar 22 16:27:38 jik5.kamens.us kernel: __nv_drm_connector_detect_internal+0x15c/0x2f0 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: nv_drm_connector_detect+0xe/0x20 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: drm_helper_probe_detect_ctx+0xa0/0x120 [drm_kms_helper] Mar 22 16:27:38 jik5.kamens.us kernel: check_connector_changed+0x52/0x200 [drm_kms_helper] Mar 22 16:27:38 jik5.kamens.us kernel: drm_helper_hpd_irq_event+0xbc/0x170 [drm_kms_helper] Mar 22 16:27:38 jik5.kamens.us kernel: nv_drm_load+0x2e7/0x480 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: ? __pfx_nv_drm_event_callback+0x10/0x10 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: drm_dev_register+0x10b/0x250 [drm] Mar 22 16:27:38 jik5.kamens.us kernel: nv_drm_probe_devices+0x111/0x200 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: ? __pfx_init_module+0x10/0x10 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: nv_drm_init+0x1e/0x60 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: nv_linux_drm_init+0xe/0xff0 [nvidia_drm] Mar 22 16:27:38 jik5.kamens.us kernel: do_one_initcall+0x5b/0x250 Mar 22 16:27:38 jik5.kamens.us kernel: do_init_module+0x7b/0x260 Mar 22 16:27:38 jik5.kamens.us kernel: load_module+0xc76/0xd60 Mar 22 16:27:38 jik5.kamens.us kernel: ? kernel_read_file+0x2a4/0x320 Mar 22 16:27:38 jik5.kamens.us kernel: __do_sys_finit_module+0xc4/0x140 Mar 22 16:27:38 jik5.kamens.us kernel: ? __do_sys_finit_module+0xc4/0x140 Mar 22 16:27:38 jik5.kamens.us kernel: __x64_sys_finit_module+0x18/0x30 Mar 22 16:27:38 jik5.kamens.us kernel: do_syscall_64+0x58/0x90 Mar 22 16:27:38 jik5.kamens.us kernel: ? do_flush_tlb_all+0x1a/0x60 Mar 22 16:27:38 jik5.kamens.us kernel: ? __flush_smp_call_function_queue+0x122/0x1f0 Mar 22 16:27:38 jik5.kamens.us kernel: ? exit_to_user_mode_prepare+0x30/0xb0 Mar 22 16:27:38 jik5.kamens.us kernel: ? irqentry_exit_to_user_mode+0x9/0x20 Mar 22 16:27:38 jik5.kamens.us kernel: ? irqentry_exit+0x43/0x50 Mar 22 16:27:38 jik5.kamens.us kernel: ? sysvec_call_function+0x4b/0xd0 Mar 22 16:27:38 jik5.kamens.us kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc Mar 22 16:27:38 jik5.kamens.us kernel: RIP: 0033:0x7faec3d1581d Mar 22 16:27:38 jik5.kamens.us kernel: RSP: 002b:00007ffc5c4a8568 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 Mar 22 16:27:38 jik5.kamens.us kernel: RAX: ffffffffffffffda RBX: 00005578a5b451b0 RCX: 00007faec3d1581d Mar 22 16:27:38 jik5.kamens.us kernel: RDX: 0000000000000000 RSI: 00005578a5b45b10 RDI: 000000000000000b Mar 22 16:27:38 jik5.kamens.us kernel: RBP: 00005578a5b45b10 R08: 0000000000000000 R09: 00005578a5b3a970 Mar 22 16:27:38 jik5.kamens.us kernel: R10: 000000000000000b R11: 0000000000000246 R12: 0000000000020000 Mar 22 16:27:38 jik5.kamens.us kernel: R13: 00005578a5b3a7c0 R14: 0000000000000000 R15: 00005578a5b45ee0 Mar 22 16:27:38 jik5.kamens.us kernel: Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7: USB disconnect, device number 6 Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7.4: USB disconnect, device number 8 Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7.4.1: USB disconnect, device number 10 Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7.4.1.1: USB disconnect, device number 12 Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1863]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1863]: 1-7.4.1.1:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7.4.1.1:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1860]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1860]: 1-7.4.1.1:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us kernel: usb 2-5: USB disconnect, device number 2 Mar 22 16:27:52 jik5.kamens.us kernel: usb 2-5.1: USB disconnect, device number 3 Mar 22 16:27:52 jik5.kamens.us kernel: cdc_ncm 2-5.1:1.5 enx8cae4cdccf46: unregister 'cdc_ncm' usb-0000:00:14.0-5.1, CDC NCM (SEND ZLP) Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1877]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1878]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1877]: 2-5.1:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.3 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1878]: 2-5.1:1.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.4 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 2-5.1:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7.4.1.4: USB disconnect, device number 13 Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 2-5.1:1.6: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.6 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 2-5.1:1.5: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.5 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 2-5.1:1.6: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.6 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 2-5.1:1.5: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1/2-5.1:1.5 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1863]: 2-5:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1863]: 2-5:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1860]: 1-7.4.1.4:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1861]: 1-7.4.1.4:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 1-7.4.1.1:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.3 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1860]: 1-7.4.1.4:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1861]: 1-7.4.1.4:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 1-7.4.1.1:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1/1-7.4.1.1:1.3 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 2-5.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1 189:130' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 2-5.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5/2-5.1 189:130' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7.4.1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1 189:11' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7.4.1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.1 189:11' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 2-5: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-5 189:129' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 2-5: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-5 189:129' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7.4.3: USB disconnect, device number 11 Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1878]: 1-7.4.1:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1878]: 1-7.4.1:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.1.4:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.1.4:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4/1-7.4.1.4:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.1.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4 189:12' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.1.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1/1-7.4.1.4 189:12' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1 189:9' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.1 189:9' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7.4.4: USB disconnect, device number 14 Mar 22 16:27:52 jik5.kamens.us kernel: usb 1-7.4.4.1: USB disconnect, device number 15 Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1878]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 1-7.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1878]: 1-7.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3/1-7.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3 189:10' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.3: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.3 189:10' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4.1:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4.1:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 1-7.4.4:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1914]: 1-7.4:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1879]: 1-7.4.4:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1864]: 1-7:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4.1:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1914]: 1-7.4:1.0: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.0 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4.1:1.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1/1-7.4.4.1:1.1 0:0' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1 189:14' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4.1: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4/1-7.4.4.1 189:14' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4 189:13' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4.4 189:13' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4 189:7' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7.4: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4 189:7' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7 189:5' failed with exit code 1. Mar 22 16:27:52 jik5.kamens.us systemd-udevd[1880]: 1-7: Process '/usr/lib/snapd/snap-device-helper unbind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7 189:5' failed with exit code 1. Mar 22 16:28:08 jik5.kamens.us kernel: usb 1-7: new high-speed USB device number 17 using xhci_hcd Mar 22 16:28:08 jik5.kamens.us kernel: usb 1-7: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:28:08 jik5.kamens.us kernel: usb 1-7: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:28:08 jik5.kamens.us kernel: usb 1-7: Product: USB 2.0 Hub Mar 22 16:28:08 jik5.kamens.us kernel: hub 1-7:1.0: USB hub found Mar 22 16:28:08 jik5.kamens.us kernel: hub 1-7:1.0: 4 ports detected Mar 22 16:28:08 jik5.kamens.us systemd-udevd[2104]: 1-7:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7:1.0 0:0' failed with exit code 1. Mar 22 16:28:08 jik5.kamens.us systemd-udevd[2104]: 1-7:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7:1.0 0:0' failed with exit code 1. Mar 22 16:28:08 jik5.kamens.us systemd-udevd[2104]: 1-7: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7 189:16' failed with exit code 1. Mar 22 16:28:08 jik5.kamens.us systemd-udevd[2104]: 1-7: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7 189:16' failed with exit code 1. Mar 22 16:28:09 jik5.kamens.us kernel: usb 1-7.1: new full-speed USB device number 18 using xhci_hcd Mar 22 16:28:09 jik5.kamens.us kernel: usb 1-7.1: New USB device found, idVendor=0b0e, idProduct=245d, bcdDevice= 1.48 Mar 22 16:28:09 jik5.kamens.us kernel: usb 1-7.1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Mar 22 16:28:09 jik5.kamens.us kernel: usb 1-7.1: Product: Jabra Link 370 Mar 22 16:28:09 jik5.kamens.us kernel: usb 1-7.1: SerialNumber: 70BF92C25E96 Mar 22 16:28:09 jik5.kamens.us kernel: usb 1-7.1: 1:1: cannot set freq 48000 to ep 0x3 Mar 22 16:28:09 jik5.kamens.us kernel: input: Jabra Link 370 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.3/0003:0B0E:245D.000C/input/input32 -- Boot 6b523a63ce9245bc9942b1f0971475b9 -- Mar 22 16:29:25 jik5.kamens.us kernel: microcode: microcode updated early to revision 0xf0, date = 2021-11-12 Mar 22 16:29:25 jik5.kamens.us kernel: Linux version 6.2.0-18-generic (buildd@lcy02-amd64-099) (x86_64-linux-gnu-gcc-12 (Ubuntu 12.2.0-17ubuntu1) 12.2.0, GNU ld (GNU Binutils for Ubuntu) 2.40) #18-Ubuntu SMP PREEMPT_DYNAMIC Thu Mar 16 00:09:48 UTC 2023 (Ubuntu 6.2.0-18.18-generic 6.2.6) Mar 22 16:29:25 jik5.kamens.us kernel: Command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:29:25 jik5.kamens.us kernel: KERNEL supported cpus: Mar 22 16:29:25 jik5.kamens.us kernel: Intel GenuineIntel Mar 22 16:29:25 jik5.kamens.us kernel: AMD AuthenticAMD Mar 22 16:29:25 jik5.kamens.us kernel: Hygon HygonGenuine Mar 22 16:29:25 jik5.kamens.us kernel: Centaur CentaurHauls Mar 22 16:29:25 jik5.kamens.us kernel: zhaoxin Shanghai Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Mar 22 16:29:25 jik5.kamens.us kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Mar 22 16:29:25 jik5.kamens.us kernel: signal: max sigframe size: 2032 Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-provided physical RAM map: Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000100000-0x000000008a870fff] usable Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:29:25 jik5.kamens.us kernel: NX (Execute Disable) protection: active Mar 22 16:29:25 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:29:25 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:29:25 jik5.kamens.us kernel: extended physical RAM map: Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000089217017] usable Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089217018-0x0000000089238c57] usable Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089238c58-0x000000008a870fff] usable Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:29:25 jik5.kamens.us kernel: efi: EFI v2.40 by Acer Inc. Mar 22 16:29:25 jik5.kamens.us kernel: efi: ESRT=0x8f9afe98 ACPI=0x8eff2000 ACPI 2.0=0x8eff2000 SMBIOS=0x8f9ae000 SMBIOS 3.0=0x8f9ad000 MOKvar=0x8f71e000 RNG=0x8eff1f98 TPMEventLog=0x8a91c018 Mar 22 16:29:25 jik5.kamens.us kernel: random: crng init done Mar 22 16:29:25 jik5.kamens.us kernel: TPM Final Events table not present Mar 22 16:29:25 jik5.kamens.us kernel: efi: Remove mem40: MMIO range=[0xe0000000-0xefffffff] (256MB) from e820 map Mar 22 16:29:25 jik5.kamens.us kernel: e820: remove [mem 0xe0000000-0xefffffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: efi: Not removing mem41: MMIO range=[0xfe000000-0xfe010fff] (68KB) from e820 map Mar 22 16:29:25 jik5.kamens.us kernel: efi: Not removing mem42: MMIO range=[0xfec00000-0xfec00fff] (4KB) from e820 map Mar 22 16:29:25 jik5.kamens.us kernel: efi: Not removing mem43: MMIO range=[0xfee00000-0xfee00fff] (4KB) from e820 map Mar 22 16:29:25 jik5.kamens.us kernel: efi: Remove mem44: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map Mar 22 16:29:25 jik5.kamens.us kernel: e820: remove [mem 0xff000000-0xffffffff] reserved Mar 22 16:29:25 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:29:25 jik5.kamens.us kernel: SMBIOS 3.0.0 present. Mar 22 16:29:25 jik5.kamens.us kernel: DMI: Acer Predator G6-710/Predator G6-710, BIOS R01-A4 05/18/2016 Mar 22 16:29:25 jik5.kamens.us kernel: tsc: Detected 4000.000 MHz processor Mar 22 16:29:25 jik5.kamens.us kernel: tsc: Detected 3999.984 MHz TSC Mar 22 16:29:25 jik5.kamens.us kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 22 16:29:25 jik5.kamens.us kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 22 16:29:25 jik5.kamens.us kernel: last_pfn = 0x46f000 max_arch_pfn = 0x400000000 Mar 22 16:29:25 jik5.kamens.us kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 22 16:29:25 jik5.kamens.us kernel: last_pfn = 0x8faff max_arch_pfn = 0x400000000 Mar 22 16:29:25 jik5.kamens.us kernel: esrt: Reserving ESRT space from 0x000000008f9afe98 to 0x000000008f9afed0. Mar 22 16:29:25 jik5.kamens.us kernel: Using GB pages for direct mapping Mar 22 16:29:25 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:29:25 jik5.kamens.us kernel: RAMDISK: [mem 0x6c214000-0x743d5fff] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Early table checksum verification disabled Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: RSDP 0x000000008EFF2000 000024 (v02 ACRSYS) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: XSDT 0x000000008EFF20A8 0000D4 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: FACP 0x000000008F016C90 00010C (v05 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: DSDT 0x000000008EFF2210 024A7F (v02 ACRSYS ACRPRDCT 01072009 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: FACS 0x000000008F560F80 000040 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: APIC 0x000000008F016DA0 0000BC (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: FPDT 0x000000008F016E60 000044 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: FIDT 0x000000008F016EA8 00009C (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: MCFG 0x000000008F016F48 00003C (v01 ACRSYS ACRPRDCT 01072009 MSFT 00000097) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: HPET 0x000000008F016F88 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI. 0005000B) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F016FC0 00036D (v01 SataRe SataTabl 00001000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LPIT 0x000000008F017330 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F0173C8 000248 (v02 INTEL sensrhub 00000000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F017610 002BAE (v02 INTEL PtidDevc 00001000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01A1C0 000BE3 (v02 INTEL Ther_Rvp 00001000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: DBGP 0x000000008F01ADA8 000034 (v01 INTEL 00000000 MSFT 0000005F) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: DBG2 0x000000008F01ADE0 000054 (v00 INTEL 00000000 MSFT 0000005F) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01AE38 000613 (v02 INTEL xh_rvp08 00000000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: MSDM 0x000000008F01B450 000055 (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01B4A8 00546C (v02 SaSsdt SaSsdt 00003000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: UEFI 0x000000008F020918 000042 (v01 00000000 00000000) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F020960 000E73 (v02 CpuRef CpuSsdt 00003000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: BGRT 0x000000008F0217D8 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: DMAR 0x000000008F021810 000070 (v01 INTEL SKL 00000001 INTL 00000001) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: TPM2 0x000000008F021880 000034 (v03 Tpm2Tabl 00000001 AMI 00000000) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: ASF! 0x000000008F0218B8 0000A5 (v32 INTEL HCG 00000001 TFSM 000F4240) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving FACP table memory at [mem 0x8f016c90-0x8f016d9b] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving DSDT table memory at [mem 0x8eff2210-0x8f016c8e] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving FACS table memory at [mem 0x8f560f80-0x8f560fbf] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving APIC table memory at [mem 0x8f016da0-0x8f016e5b] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving FPDT table memory at [mem 0x8f016e60-0x8f016ea3] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving FIDT table memory at [mem 0x8f016ea8-0x8f016f43] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving MCFG table memory at [mem 0x8f016f48-0x8f016f83] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving HPET table memory at [mem 0x8f016f88-0x8f016fbf] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f016fc0-0x8f01732c] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving LPIT table memory at [mem 0x8f017330-0x8f0173c3] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f0173c8-0x8f01760f] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f017610-0x8f01a1bd] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01a1c0-0x8f01ada2] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving DBGP table memory at [mem 0x8f01ada8-0x8f01addb] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving DBG2 table memory at [mem 0x8f01ade0-0x8f01ae33] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01ae38-0x8f01b44a] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving MSDM table memory at [mem 0x8f01b450-0x8f01b4a4] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01b4a8-0x8f020913] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving UEFI table memory at [mem 0x8f020918-0x8f020959] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f020960-0x8f0217d2] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving BGRT table memory at [mem 0x8f0217d8-0x8f02180f] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving DMAR table memory at [mem 0x8f021810-0x8f02187f] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving TPM2 table memory at [mem 0x8f021880-0x8f0218b3] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Reserving ASF! table memory at [mem 0x8f0218b8-0x8f02195c] Mar 22 16:29:25 jik5.kamens.us kernel: No NUMA configuration found Mar 22 16:29:25 jik5.kamens.us kernel: Faking a node at [mem 0x0000000000000000-0x000000046effffff] Mar 22 16:29:25 jik5.kamens.us kernel: NODE_DATA(0) allocated [mem 0x46efd5000-0x46effffff] Mar 22 16:29:25 jik5.kamens.us kernel: Zone ranges: Mar 22 16:29:25 jik5.kamens.us kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 22 16:29:25 jik5.kamens.us kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 22 16:29:25 jik5.kamens.us kernel: Normal [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:29:25 jik5.kamens.us kernel: Device empty Mar 22 16:29:25 jik5.kamens.us kernel: Movable zone start for each node Mar 22 16:29:25 jik5.kamens.us kernel: Early memory node ranges Mar 22 16:29:25 jik5.kamens.us kernel: node 0: [mem 0x0000000000001000-0x0000000000057fff] Mar 22 16:29:25 jik5.kamens.us kernel: node 0: [mem 0x0000000000059000-0x000000000009dfff] Mar 22 16:29:25 jik5.kamens.us kernel: node 0: [mem 0x0000000000100000-0x000000008a870fff] Mar 22 16:29:25 jik5.kamens.us kernel: node 0: [mem 0x000000008a8bc000-0x000000008e52bfff] Mar 22 16:29:25 jik5.kamens.us kernel: node 0: [mem 0x000000008fafe000-0x000000008fafefff] Mar 22 16:29:25 jik5.kamens.us kernel: node 0: [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:29:25 jik5.kamens.us kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000046effffff] Mar 22 16:29:25 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:29:25 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:29:25 jik5.kamens.us kernel: On node 0, zone DMA: 98 pages in unavailable ranges Mar 22 16:29:25 jik5.kamens.us kernel: On node 0, zone DMA32: 75 pages in unavailable ranges Mar 22 16:29:25 jik5.kamens.us kernel: On node 0, zone DMA32: 5586 pages in unavailable ranges Mar 22 16:29:25 jik5.kamens.us kernel: On node 0, zone Normal: 1281 pages in unavailable ranges Mar 22 16:29:25 jik5.kamens.us kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PM-Timer IO Port: 0x1808 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Mar 22 16:29:25 jik5.kamens.us kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 Mar 22 16:29:25 jik5.kamens.us kernel: e820: update [mem 0x8c99e000-0x8ca91fff] usable ==> reserved Mar 22 16:29:25 jik5.kamens.us kernel: TSC deadline timer available Mar 22 16:29:25 jik5.kamens.us kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00058000-0x00058fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009ffff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89217000-0x89217fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89238000-0x89238fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a871000-0x8a871fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a872000-0x8a8bbfff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8c99e000-0x8ca91fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8e52c000-0x8efe5fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8efe6000-0x8f021fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f022000-0x8f583fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f584000-0x8fafdfff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8faff000-0x8fafffff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fb00000-0x8fbfffff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fc00000-0xfdffffff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xfebfffff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec00000-0xfec00fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec01000-0xfedfffff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee00000-0xfee00fff] Mar 22 16:29:25 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee01000-0xffffffff] Mar 22 16:29:25 jik5.kamens.us kernel: [mem 0x8fc00000-0xfdffffff] available for PCI devices Mar 22 16:29:25 jik5.kamens.us kernel: Booting paravirtualized kernel on bare hardware Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Mar 22 16:29:25 jik5.kamens.us kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 22 16:29:25 jik5.kamens.us kernel: percpu: Embedded 61 pages/cpu s212992 r8192 d28672 u262144 Mar 22 16:29:25 jik5.kamens.us kernel: pcpu-alloc: s212992 r8192 d28672 u262144 alloc=1*2097152 Mar 22 16:29:25 jik5.kamens.us kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 22 16:29:25 jik5.kamens.us kernel: Fallback order for Node 0: 0 Mar 22 16:29:25 jik5.kamens.us kernel: Built 1 zonelists, mobility grouping on. Total pages: 4117646 Mar 22 16:29:25 jik5.kamens.us kernel: Policy zone: Normal Mar 22 16:29:25 jik5.kamens.us kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:29:25 jik5.kamens.us kernel: Unknown kernel command line parameters "splash BOOT_IMAGE=/vmlinuz-6.2.0-18-generic", will be passed to user space. Mar 22 16:29:25 jik5.kamens.us kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off Mar 22 16:29:25 jik5.kamens.us kernel: software IO TLB: area num 8. Mar 22 16:29:25 jik5.kamens.us kernel: Memory: 16131780K/16732664K available (20480K kernel code, 4148K rwdata, 13464K rodata, 4644K init, 17664K bss, 600624K reserved, 0K cma-reserved) Mar 22 16:29:25 jik5.kamens.us kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 22 16:29:25 jik5.kamens.us kernel: Kernel/User page tables isolation: enabled Mar 22 16:29:25 jik5.kamens.us kernel: ftrace: allocating 53106 entries in 208 pages Mar 22 16:29:25 jik5.kamens.us kernel: ftrace: allocated 208 pages with 3 groups Mar 22 16:29:25 jik5.kamens.us kernel: Dynamic Preempt: voluntary Mar 22 16:29:25 jik5.kamens.us kernel: rcu: Preemptible hierarchical RCU implementation. Mar 22 16:29:25 jik5.kamens.us kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 22 16:29:25 jik5.kamens.us kernel: Trampoline variant of Tasks RCU enabled. Mar 22 16:29:25 jik5.kamens.us kernel: Rude variant of Tasks RCU enabled. Mar 22 16:29:25 jik5.kamens.us kernel: Tracing variant of Tasks RCU enabled. Mar 22 16:29:25 jik5.kamens.us kernel: rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. Mar 22 16:29:25 jik5.kamens.us kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 22 16:29:25 jik5.kamens.us kernel: NR_IRQS: 524544, nr_irqs: 2048, preallocated irqs: 16 Mar 22 16:29:25 jik5.kamens.us kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 22 16:29:25 jik5.kamens.us kernel: spurious 8259A interrupt: IRQ7. Mar 22 16:29:25 jik5.kamens.us kernel: Console: colour dummy device 80x25 Mar 22 16:29:25 jik5.kamens.us kernel: printk: console [tty0] enabled Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Core revision 20221020 Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Mar 22 16:29:25 jik5.kamens.us kernel: APIC: Switch to symmetric I/O mode setup Mar 22 16:29:25 jik5.kamens.us kernel: DMAR: Host address width 39 Mar 22 16:29:25 jik5.kamens.us kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x1 Mar 22 16:29:25 jik5.kamens.us kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap d2008c40660462 ecap f050da Mar 22 16:29:25 jik5.kamens.us kernel: DMAR: RMRR base: 0x0000008ed60000 end: 0x0000008ed7ffff Mar 22 16:29:25 jik5.kamens.us kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed90000 IOMMU 0 Mar 22 16:29:25 jik5.kamens.us kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed90000 Mar 22 16:29:25 jik5.kamens.us kernel: DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. Mar 22 16:29:25 jik5.kamens.us kernel: DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. Mar 22 16:29:25 jik5.kamens.us kernel: DMAR-IR: Enabled IRQ remapping in xapic mode Mar 22 16:29:25 jik5.kamens.us kernel: x2apic: IRQ remapping doesn't support X2APIC mode Mar 22 16:29:25 jik5.kamens.us kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x73509d9fa88, max_idle_ns: 881590914879 ns Mar 22 16:29:25 jik5.kamens.us kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7999.96 BogoMIPS (lpj=15999936) Mar 22 16:29:25 jik5.kamens.us kernel: pid_max: default: 32768 minimum: 301 Mar 22 16:29:25 jik5.kamens.us kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,apparmor Mar 22 16:29:25 jik5.kamens.us kernel: landlock: Up and running. Mar 22 16:29:25 jik5.kamens.us kernel: Yama: becoming mindful. Mar 22 16:29:25 jik5.kamens.us kernel: AppArmor: AppArmor initialized Mar 22 16:29:25 jik5.kamens.us kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: x86/cpu: SGX disabled by BIOS. Mar 22 16:29:25 jik5.kamens.us kernel: CPU0: Thermal monitoring enabled (TM1) Mar 22 16:29:25 jik5.kamens.us kernel: process: using mwait in idle threads Mar 22 16:29:25 jik5.kamens.us kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 22 16:29:25 jik5.kamens.us kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Mar 22 16:29:25 jik5.kamens.us kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 22 16:29:25 jik5.kamens.us kernel: Spectre V2 : Mitigation: IBRS Mar 22 16:29:25 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 22 16:29:25 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 22 16:29:25 jik5.kamens.us kernel: RETBleed: Mitigation: IBRS Mar 22 16:29:25 jik5.kamens.us kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 22 16:29:25 jik5.kamens.us kernel: Spectre V2 : User space: Mitigation: STIBP via prctl Mar 22 16:29:25 jik5.kamens.us kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 22 16:29:25 jik5.kamens.us kernel: MDS: Mitigation: Clear CPU buffers Mar 22 16:29:25 jik5.kamens.us kernel: TAA: Mitigation: TSX disabled Mar 22 16:29:25 jik5.kamens.us kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Mar 22 16:29:25 jik5.kamens.us kernel: SRBDS: Mitigation: Microcode Mar 22 16:29:25 jik5.kamens.us kernel: Freeing SMP alternatives memory: 44K Mar 22 16:29:25 jik5.kamens.us kernel: smpboot: CPU0: Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz (family: 0x6, model: 0x5e, stepping: 0x3) Mar 22 16:29:25 jik5.kamens.us kernel: cblist_init_generic: Setting adjustable number of callback queues. Mar 22 16:29:25 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:29:25 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:29:25 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:29:25 jik5.kamens.us kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Mar 22 16:29:25 jik5.kamens.us kernel: ... version: 4 Mar 22 16:29:25 jik5.kamens.us kernel: ... bit width: 48 Mar 22 16:29:25 jik5.kamens.us kernel: ... generic registers: 4 Mar 22 16:29:25 jik5.kamens.us kernel: ... value mask: 0000ffffffffffff Mar 22 16:29:25 jik5.kamens.us kernel: ... max period: 00007fffffffffff Mar 22 16:29:25 jik5.kamens.us kernel: ... fixed-purpose events: 3 Mar 22 16:29:25 jik5.kamens.us kernel: ... event mask: 000000070000000f Mar 22 16:29:25 jik5.kamens.us kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1024 Mar 22 16:29:25 jik5.kamens.us kernel: rcu: Hierarchical SRCU implementation. Mar 22 16:29:25 jik5.kamens.us kernel: rcu: Max phase no-delay instances is 1000. Mar 22 16:29:25 jik5.kamens.us kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Mar 22 16:29:25 jik5.kamens.us kernel: smp: Bringing up secondary CPUs ... Mar 22 16:29:25 jik5.kamens.us kernel: x86: Booting SMP configuration: Mar 22 16:29:25 jik5.kamens.us kernel: .... node #0, CPUs: #1 #2 #3 #4 Mar 22 16:29:25 jik5.kamens.us kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 22 16:29:25 jik5.kamens.us kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 22 16:29:25 jik5.kamens.us kernel: #5 #6 #7 Mar 22 16:29:25 jik5.kamens.us kernel: smp: Brought up 1 node, 8 CPUs Mar 22 16:29:25 jik5.kamens.us kernel: smpboot: Max logical packages: 1 Mar 22 16:29:25 jik5.kamens.us kernel: smpboot: Total of 8 processors activated (63999.74 BogoMIPS) Mar 22 16:29:25 jik5.kamens.us kernel: devtmpfs: initialized Mar 22 16:29:25 jik5.kamens.us kernel: x86/mm: Memory block size: 128MB Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8a871000-0x8a871fff] (4096 bytes) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8f022000-0x8f583fff] (5644288 bytes) Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Mar 22 16:29:25 jik5.kamens.us kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: pinctrl core: initialized pinctrl subsystem Mar 22 16:29:25 jik5.kamens.us kernel: PM: RTC time: 20:29:03, date: 2023-03-22 Mar 22 16:29:25 jik5.kamens.us kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 22 16:29:25 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Mar 22 16:29:25 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 22 16:29:25 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 22 16:29:25 jik5.kamens.us kernel: audit: initializing netlink subsys (disabled) Mar 22 16:29:25 jik5.kamens.us kernel: audit: type=2000 audit(1679516943.060:1): state=initialized audit_enabled=0 res=1 Mar 22 16:29:25 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 22 16:29:25 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'bang_bang' Mar 22 16:29:25 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 22 16:29:25 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'user_space' Mar 22 16:29:25 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'power_allocator' Mar 22 16:29:25 jik5.kamens.us kernel: EISA bus registered Mar 22 16:29:25 jik5.kamens.us kernel: cpuidle: using governor ladder Mar 22 16:29:25 jik5.kamens.us kernel: cpuidle: using governor menu Mar 22 16:29:25 jik5.kamens.us kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 22 16:29:25 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:29:25 jik5.kamens.us kernel: PCI: not using MMCONFIG Mar 22 16:29:25 jik5.kamens.us kernel: PCI: Using configuration type 1 for base access Mar 22 16:29:25 jik5.kamens.us kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Mar 22 16:29:25 jik5.kamens.us kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 22 16:29:25 jik5.kamens.us kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 22 16:29:25 jik5.kamens.us kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 22 16:29:25 jik5.kamens.us kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 22 16:29:25 jik5.kamens.us kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 22 16:29:25 jik5.kamens.us kernel: fbcon: Taking over console Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Added _OSI(Module Device) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Device) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: 8 ACPI AML tables successfully acquired and loaded Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8D0800EED800 0007AA (v02 PmRef Cpu0Ist 00003000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8D0801309C00 00037F (v02 PmRef Cpu0Cst 00003001 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8D0800EEC000 0005AA (v02 PmRef ApIst 00003000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF8D08002D5800 000119 (v02 PmRef ApCst 00003000 INTL 20120913) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Interpreter enabled Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Using IOAPIC for interrupt routing Mar 22 16:29:25 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:29:25 jik5.kamens.us kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved as ACPI motherboard resource Mar 22 16:29:25 jik5.kamens.us kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 22 16:29:25 jik5.kamens.us kernel: PCI: Using E820 reservations for host bridge windows Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: Enabled 8 GPEs in block 00 to 7F Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG0.PG00: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG1.PG01: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.PEG2.PG02: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP09.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP10.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP11.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP12.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP13.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP01.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP02.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP03.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP04.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP05.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP06.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP07.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP17.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP18.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP19.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP20.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP14.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP15.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_SB_.PCI0.RP16.PXSX.WRST: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_TZ_.FN00: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_TZ_.FN01: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_TZ_.FN02: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_TZ_.FN03: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: \_TZ_.FN04: New power resource Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Mar 22 16:29:25 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 22 16:29:25 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] Mar 22 16:29:25 jik5.kamens.us kernel: PCI host bridge to bus 0000:00 Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000effff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:00.0: [8086:191f] type 00 class 0x060000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:14.0: [8086:a12f] type 00 class 0x0c0330 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:14.0: reg 0x10: [mem 0xdf310000-0xdf31ffff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:14.2: [8086:a131] type 00 class 0x118000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:14.2: reg 0x10: [mem 0xdf32e000-0xdf32efff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:16.0: [8086:a13a] type 00 class 0x078000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:16.0: reg 0x10: [mem 0xdf32d000-0xdf32dfff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:16.0: PME# supported from D3hot Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: [8086:a102] type 00 class 0x010601 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x10: [mem 0xdf328000-0xdf329fff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x14: [mem 0xdf32c000-0xdf32c0ff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x18: [io 0xf050-0xf057] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x1c: [io 0xf040-0xf043] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x20: [io 0xf020-0xf03f] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x24: [mem 0xdf32b000-0xdf32b7ff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:17.0: PME# supported from D3hot Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: [8086:a114] type 01 class 0x060400 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.5: [8086:a115] type 01 class 0x060400 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.6: [8086:a116] type 01 class 0x060400 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.0: [8086:a145] type 00 class 0x060100 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.2: [8086:a121] type 00 class 0x058000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.2: reg 0x10: [mem 0xdf324000-0xdf327fff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.3: [8086:a170] type 00 class 0x040300 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xdf320000-0xdf323fff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x20: [mem 0xdf300000-0xdf30ffff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.4: [8086:a123] type 00 class 0x0c0500 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x10: [mem 0xdf32a000-0xdf32a0ff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x20: [io 0xf000-0xf01f] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: [10de:13c2] type 00 class 0x030000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x10: [mem 0xde000000-0xdeffffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x14: [mem 0xc0000000-0xcfffffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xd0000000-0xd1ffffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x30: [mem 0xdf000000-0xdf07ffff pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: BAR 1: assigned to efifb Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: 32.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s PCIe x16 link at 0000:00:01.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.1: [10de:0fbb] type 00 class 0x040300 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.1: reg 0x10: [mem 0xdf080000-0xdf083fff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: ASPM: current common clock configuration is inconsistent, reconfiguring Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:02:00.0: [10ec:8168] type 00 class 0x020000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x10: [io 0xd000-0xd0ff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x18: [mem 0xdf200000-0xdf200fff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x20: [mem 0xd2100000-0xd2103fff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:02:00.0: supports D1 D2 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:03:00.0: [8086:095a] type 00 class 0x028000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:03:00.0: reg 0x10: [mem 0xdf100000-0xdf101fff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 11 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 11 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 11 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 22 16:29:25 jik5.kamens.us kernel: iommu: Default domain type: Translated Mar 22 16:29:25 jik5.kamens.us kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 22 16:29:25 jik5.kamens.us kernel: SCSI subsystem initialized Mar 22 16:29:25 jik5.kamens.us kernel: libata version 3.00 loaded. Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: bus type USB registered Mar 22 16:29:25 jik5.kamens.us kernel: usbcore: registered new interface driver usbfs Mar 22 16:29:25 jik5.kamens.us kernel: usbcore: registered new interface driver hub Mar 22 16:29:25 jik5.kamens.us kernel: usbcore: registered new device driver usb Mar 22 16:29:25 jik5.kamens.us kernel: pps_core: LinuxPPS API ver. 1 registered Mar 22 16:29:25 jik5.kamens.us kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 22 16:29:25 jik5.kamens.us kernel: PTP clock support registered Mar 22 16:29:25 jik5.kamens.us kernel: EDAC MC: Ver: 3.0.0 Mar 22 16:29:25 jik5.kamens.us kernel: Registered efivars operations Mar 22 16:29:25 jik5.kamens.us kernel: NetLabel: Initializing Mar 22 16:29:25 jik5.kamens.us kernel: NetLabel: domain hash size = 128 Mar 22 16:29:25 jik5.kamens.us kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 22 16:29:25 jik5.kamens.us kernel: NetLabel: unlabeled traffic allowed by default Mar 22 16:29:25 jik5.kamens.us kernel: mctp: management component transport protocol core Mar 22 16:29:25 jik5.kamens.us kernel: NET: Registered PF_MCTP protocol family Mar 22 16:29:25 jik5.kamens.us kernel: PCI: Using ACPI for IRQ routing Mar 22 16:29:25 jik5.kamens.us kernel: PCI: pci_cache_line_size set to 64 bytes Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x89217018-0x8bffffff] Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8a871000-0x8bffffff] Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8c99e000-0x8fffffff] Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8e52c000-0x8fffffff] Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8faff000-0x8fffffff] Mar 22 16:29:25 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x46f000000-0x46fffffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: setting as boot VGA device Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: bridge control possible Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 22 16:29:25 jik5.kamens.us kernel: vgaarb: loaded Mar 22 16:29:25 jik5.kamens.us kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Mar 22 16:29:25 jik5.kamens.us kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc-early Mar 22 16:29:25 jik5.kamens.us kernel: VFS: Disk quotas dquot_6.6.0 Mar 22 16:29:25 jik5.kamens.us kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 22 16:29:25 jik5.kamens.us kernel: AppArmor: AppArmor Filesystem Enabled Mar 22 16:29:25 jik5.kamens.us kernel: pnp: PnP ACPI init Mar 22 16:29:25 jik5.kamens.us kernel: system 00:00: [io 0x0a00-0x0a1f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:00: [io 0x0a40-0x0a4f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:00: [io 0x0a50-0x0a5f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:03: [io 0x0680-0x069f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:03: [io 0x1800-0x18fe] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:03: [io 0x164e-0x164f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:04: [io 0x0800-0x087f] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:06: [io 0x1854-0x1857] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xfed10000-0xfed17fff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xfed18000-0xfed18fff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xfed19000-0xfed19fff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xe0000000-0xefffffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xfed20000-0xfed3ffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xfed90000-0xfed93fff] could not be reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xfed45000-0xfed8ffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xfee00000-0xfeefffff] could not be reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:07: [mem 0xdffe0000-0xdfffffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:08: [mem 0xfd000000-0xfdabffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:08: [mem 0xfdad0000-0xfdadffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:08: [mem 0xfdb00000-0xfdffffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:08: [mem 0xfe000000-0xfe01ffff] could not be reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:08: [mem 0xfe036000-0xfe03bfff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:08: [mem 0xfe03d000-0xfe3fffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:08: [mem 0xfe410000-0xfe7fffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:09: [io 0xff00-0xfffe] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:0a: [mem 0xfdaf0000-0xfdafffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:0a: [mem 0xfdae0000-0xfdaeffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: system 00:0a: [mem 0xfdac0000-0xfdacffff] has been reserved Mar 22 16:29:25 jik5.kamens.us kernel: pnp: PnP ACPI: found 11 devices Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 22 16:29:25 jik5.kamens.us kernel: NET: Registered PF_INET protocol family Mar 22 16:29:25 jik5.kamens.us kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: TCP: Hash tables configured (established 131072 bind 65536) Mar 22 16:29:25 jik5.kamens.us kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:29:25 jik5.kamens.us kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 22 16:29:25 jik5.kamens.us kernel: NET: Registered PF_XDP protocol family Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000effff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:00: resource 8 [mem 0xfd000000-0xfe7fffff window] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:01: resource 1 [mem 0xde000000-0xdf0fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:01: resource 2 [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:02: resource 0 [io 0xd000-0xdfff] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:02: resource 1 [mem 0xdf200000-0xdf2fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:02: resource 2 [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:29:25 jik5.kamens.us kernel: pci_bus 0000:03: resource 1 [mem 0xdf100000-0xdf1fffff] Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:14.0: quirk_usb_early_handoff+0x0/0x190 took 93379 usecs Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0 Mar 22 16:29:25 jik5.kamens.us kernel: PCI: CLS 0 bytes, default 64 Mar 22 16:29:25 jik5.kamens.us kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 22 16:29:25 jik5.kamens.us kernel: software IO TLB: mapped [mem 0x0000000085217000-0x0000000089217000] (64MB) Mar 22 16:29:25 jik5.kamens.us kernel: Trying to unpack rootfs image as initramfs... Mar 22 16:29:25 jik5.kamens.us kernel: Initialise system trusted keyrings Mar 22 16:29:25 jik5.kamens.us kernel: Key type blacklist registered Mar 22 16:29:25 jik5.kamens.us kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Mar 22 16:29:25 jik5.kamens.us kernel: zbud: loaded Mar 22 16:29:25 jik5.kamens.us kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 22 16:29:25 jik5.kamens.us kernel: fuse: init (API version 7.38) Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Platform Keyring initialized Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Machine keyring initialized Mar 22 16:29:25 jik5.kamens.us kernel: Key type asymmetric registered Mar 22 16:29:25 jik5.kamens.us kernel: Asymmetric key parser 'x509' registered Mar 22 16:29:25 jik5.kamens.us kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) Mar 22 16:29:25 jik5.kamens.us kernel: io scheduler mq-deadline registered Mar 22 16:29:25 jik5.kamens.us kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Mar 22 16:29:25 jik5.kamens.us kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 122 Mar 22 16:29:25 jik5.kamens.us kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 122 Mar 22 16:29:25 jik5.kamens.us kernel: pcieport 0000:00:1c.5: PME: Signaling with IRQ 123 Mar 22 16:29:25 jik5.kamens.us kernel: pcieport 0000:00:1c.5: AER: enabled with IRQ 123 Mar 22 16:29:25 jik5.kamens.us kernel: pcieport 0000:00:1c.6: PME: Signaling with IRQ 124 Mar 22 16:29:25 jik5.kamens.us kernel: pcieport 0000:00:1c.6: AER: enabled with IRQ 124 Mar 22 16:29:25 jik5.kamens.us kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 22 16:29:25 jik5.kamens.us kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: button: Sleep Button [SLPB] Mar 22 16:29:25 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: button: Power Button [PWRB] Mar 22 16:29:25 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: button: Power Button [PWRF] Mar 22 16:29:25 jik5.kamens.us kernel: thermal LNXTHERM:00: registered as thermal_zone0 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Mar 22 16:29:25 jik5.kamens.us kernel: thermal LNXTHERM:01: registered as thermal_zone1 Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ01] (30 C) Mar 22 16:29:25 jik5.kamens.us kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Mar 22 16:29:25 jik5.kamens.us kernel: Linux agpgart interface v0.103 Mar 22 16:29:25 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:29:25 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:29:25 jik5.kamens.us kernel: loop: module loaded Mar 22 16:29:25 jik5.kamens.us kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 22 16:29:25 jik5.kamens.us kernel: PPP generic driver version 2.4.2 Mar 22 16:29:25 jik5.kamens.us kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 Mar 22 16:29:25 jik5.kamens.us kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 22 16:29:25 jik5.kamens.us kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 22 16:29:25 jik5.kamens.us kernel: mousedev: PS/2 mouse device common for all mice Mar 22 16:29:25 jik5.kamens.us kernel: rtc_cmos 00:05: RTC can wake from S4 Mar 22 16:29:25 jik5.kamens.us kernel: rtc_cmos 00:05: registered as rtc0 Mar 22 16:29:25 jik5.kamens.us kernel: rtc_cmos 00:05: setting system clock to 2023-03-22T20:29:04 UTC (1679516944) Mar 22 16:29:25 jik5.kamens.us kernel: rtc_cmos 00:05: alarms up to one month, y3k, 242 bytes nvram Mar 22 16:29:25 jik5.kamens.us kernel: i2c_dev: i2c /dev entries driver Mar 22 16:29:25 jik5.kamens.us kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 22 16:29:25 jik5.kamens.us kernel: device-mapper: uevent: version 1.0.3 Mar 22 16:29:25 jik5.kamens.us kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Probing EISA bus 0 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 1 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 2 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 3 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 4 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 5 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 6 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 7 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 8 Mar 22 16:29:25 jik5.kamens.us kernel: platform eisa.0: EISA: Detected 0 cards Mar 22 16:29:25 jik5.kamens.us kernel: intel_pstate: Intel P-state driver initializing Mar 22 16:29:25 jik5.kamens.us kernel: intel_pstate: HWP enabled Mar 22 16:29:25 jik5.kamens.us kernel: ledtrig-cpu: registered to indicate activity on CPUs Mar 22 16:29:25 jik5.kamens.us kernel: efifb: probing for efifb Mar 22 16:29:25 jik5.kamens.us kernel: efifb: showing boot graphics Mar 22 16:29:25 jik5.kamens.us kernel: efifb: framebuffer at 0xc0000000, using 8640k, total 8640k Mar 22 16:29:25 jik5.kamens.us kernel: efifb: mode is 1920x1080x32, linelength=8192, pages=1 Mar 22 16:29:25 jik5.kamens.us kernel: efifb: scrolling: redraw Mar 22 16:29:25 jik5.kamens.us kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 22 16:29:25 jik5.kamens.us kernel: Console: switching to colour frame buffer device 240x67 Mar 22 16:29:25 jik5.kamens.us kernel: fb0: EFI VGA frame buffer device Mar 22 16:29:25 jik5.kamens.us kernel: intel_pmc_core INT33A1:00: initialized Mar 22 16:29:25 jik5.kamens.us kernel: drop_monitor: Initializing network drop monitor service Mar 22 16:29:25 jik5.kamens.us kernel: NET: Registered PF_INET6 protocol family Mar 22 16:29:25 jik5.kamens.us kernel: Freeing initrd memory: 132872K Mar 22 16:29:25 jik5.kamens.us kernel: Segment Routing with IPv6 Mar 22 16:29:25 jik5.kamens.us kernel: In-situ OAM (IOAM) with IPv6 Mar 22 16:29:25 jik5.kamens.us kernel: NET: Registered PF_PACKET protocol family Mar 22 16:29:25 jik5.kamens.us kernel: Key type dns_resolver registered Mar 22 16:29:25 jik5.kamens.us kernel: microcode: Microcode Update Driver: v2.2. Mar 22 16:29:25 jik5.kamens.us kernel: IPI shorthand broadcast: enabled Mar 22 16:29:25 jik5.kamens.us kernel: sched_clock: Marking stable (962941202, 413062)->(968556550, -5202286) Mar 22 16:29:25 jik5.kamens.us kernel: registered taskstats version 1 Mar 22 16:29:25 jik5.kamens.us kernel: Loading compiled-in X.509 certificates Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Loading compiled-in revocation X.509 certificates Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' Mar 22 16:29:25 jik5.kamens.us kernel: zswap: loaded using pool lzo/zbud Mar 22 16:29:25 jik5.kamens.us kernel: Key type .fscrypt registered Mar 22 16:29:25 jik5.kamens.us kernel: Key type fscrypt-provisioning registered Mar 22 16:29:25 jik5.kamens.us kernel: Key type trusted registered Mar 22 16:29:25 jik5.kamens.us kernel: Key type encrypted registered Mar 22 16:29:25 jik5.kamens.us kernel: AppArmor: AppArmor sha1 policy hashing enabled Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer: c4f0474ae6b5e67a509d99132f49a4ec13f7ac68' Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer Database: 84f00f5841571abd2cc11a8c26d5c9c8d2b6b0b5' Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Acer Database Forbidden: 9de028a2638669f109745d3e2a7ad5c9e64ed392' Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:29:25 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Debian Secure Boot Signer: 00a7468def' Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:29:25 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:29:25 jik5.kamens.us kernel: Loading compiled-in module X.509 certificates Mar 22 16:29:25 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: badcb93e95e6cc72f0e277ee45ba2d682e02dfc3' Mar 22 16:29:25 jik5.kamens.us kernel: ima: Allocated hash algorithm: sha1 Mar 22 16:29:25 jik5.kamens.us kernel: ima: No architecture policies found Mar 22 16:29:25 jik5.kamens.us kernel: evm: Initialising EVM extended attributes: Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.selinux Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.SMACK64 Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.SMACK64EXEC Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.SMACK64TRANSMUTE Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.SMACK64MMAP Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.apparmor Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.ima Mar 22 16:29:25 jik5.kamens.us kernel: evm: security.capability Mar 22 16:29:25 jik5.kamens.us kernel: evm: HMAC attrs: 0x1 Mar 22 16:29:25 jik5.kamens.us kernel: PM: Magic number: 15:682:498 Mar 22 16:29:25 jik5.kamens.us kernel: RAS: Correctable Errors collector initialized. Mar 22 16:29:25 jik5.kamens.us kernel: Freeing unused decrypted memory: 2036K Mar 22 16:29:25 jik5.kamens.us kernel: Freeing unused kernel image (initmem) memory: 4644K Mar 22 16:29:25 jik5.kamens.us kernel: Write protecting the kernel read-only data: 34816k Mar 22 16:29:25 jik5.kamens.us kernel: Freeing unused kernel image (rodata/data gap) memory: 872K Mar 22 16:29:25 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:29:25 jik5.kamens.us kernel: x86/mm: Checking user space page tables Mar 22 16:29:25 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:29:25 jik5.kamens.us kernel: Run /init as init process Mar 22 16:29:25 jik5.kamens.us kernel: with arguments: Mar 22 16:29:25 jik5.kamens.us kernel: /init Mar 22 16:29:25 jik5.kamens.us kernel: splash Mar 22 16:29:25 jik5.kamens.us kernel: with environment: Mar 22 16:29:25 jik5.kamens.us kernel: HOME=/ Mar 22 16:29:25 jik5.kamens.us kernel: TERM=linux Mar 22 16:29:25 jik5.kamens.us kernel: BOOT_IMAGE=/vmlinuz-6.2.0-18-generic Mar 22 16:29:25 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:29:25 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Mar 22 16:29:25 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810 Mar 22 16:29:25 jik5.kamens.us kernel: ahci 0000:00:17.0: version 3.0 Mar 22 16:29:25 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:29:25 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Mar 22 16:29:25 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed Mar 22 16:29:25 jik5.kamens.us kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.02 Mar 22 16:29:25 jik5.kamens.us kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:29:25 jik5.kamens.us kernel: usb usb1: Product: xHCI Host Controller Mar 22 16:29:25 jik5.kamens.us kernel: usb usb1: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb usb1: SerialNumber: 0000:00:14.0 Mar 22 16:29:25 jik5.kamens.us kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 5 ports 6 Gbps 0x3d impl SATA mode Mar 22 16:29:25 jik5.kamens.us kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst Mar 22 16:29:25 jik5.kamens.us kernel: hub 1-0:1.0: USB hub found Mar 22 16:29:25 jik5.kamens.us kernel: hub 1-0:1.0: 16 ports detected Mar 22 16:29:25 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: RTL8168g/8111g, 98:ee:cb:23:9d:15, XID 4c0, IRQ 127 Mar 22 16:29:25 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] Mar 22 16:29:25 jik5.kamens.us kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.02 Mar 22 16:29:25 jik5.kamens.us kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:29:25 jik5.kamens.us kernel: usb usb2: Product: xHCI Host Controller Mar 22 16:29:25 jik5.kamens.us kernel: usb usb2: Manufacturer: Linux 6.2.0-18-generic xhci-hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb usb2: SerialNumber: 0000:00:14.0 Mar 22 16:29:25 jik5.kamens.us kernel: hub 2-0:1.0: USB hub found Mar 22 16:29:25 jik5.kamens.us kernel: hub 2-0:1.0: 10 ports detected Mar 22 16:29:25 jik5.kamens.us kernel: usb: port power management may be unreliable Mar 22 16:29:25 jik5.kamens.us kernel: scsi host0: ahci Mar 22 16:29:25 jik5.kamens.us kernel: scsi host1: ahci Mar 22 16:29:25 jik5.kamens.us kernel: scsi host2: ahci Mar 22 16:29:25 jik5.kamens.us kernel: scsi host3: ahci Mar 22 16:29:25 jik5.kamens.us kernel: scsi host4: ahci Mar 22 16:29:25 jik5.kamens.us kernel: scsi host5: ahci Mar 22 16:29:25 jik5.kamens.us kernel: ata1: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b100 irq 126 Mar 22 16:29:25 jik5.kamens.us kernel: ata2: DUMMY Mar 22 16:29:25 jik5.kamens.us kernel: ata3: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b200 irq 126 Mar 22 16:29:25 jik5.kamens.us kernel: ata4: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b280 irq 126 Mar 22 16:29:25 jik5.kamens.us kernel: ata5: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b300 irq 126 Mar 22 16:29:25 jik5.kamens.us kernel: ata6: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b380 irq 126 Mar 22 16:29:25 jik5.kamens.us kernel: cryptd: max_cpu_qlen set to 1000 Mar 22 16:29:25 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Mar 22 16:29:25 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.1: [8086:a120] type 00 class 0x058000 Mar 22 16:29:25 jik5.kamens.us kernel: pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] Mar 22 16:29:25 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: renamed from eth0 Mar 22 16:29:25 jik5.kamens.us kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Mar 22 16:29:25 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x51 Mar 22 16:29:25 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x53 Mar 22 16:29:25 jik5.kamens.us kernel: tsc: Refined TSC clocksource calibration: 4007.999 MHz Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39c5e149d3a, max_idle_ns: 440795336434 ns Mar 22 16:29:25 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:29:25 jik5.kamens.us kernel: ata4: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Mar 22 16:29:25 jik5.kamens.us kernel: ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:29:25 jik5.kamens.us kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:29:25 jik5.kamens.us kernel: ata6: SATA link up 3.0 Gbps (SStatus 123 SControl 300) Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: ATA-9: Samsung SSD 850 EVO 1TB, EMT01B6Q, max UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: ata3.00: ATA-9: ST1000DM003-1ER162, CC45, max UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: ata6.00: ATA-8: WDC WD5001AALS-00L3B2, 01.03B01, max UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: ata6.00: 976773168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:29:25 jik5.kamens.us kernel: ata4.00: ATAPI: HL-DT-ST DVDRAM GHC0N, 1.00, max UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: ata1.00: ATA-9: LITEON CV1-8B128, G871201, max UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: ata1.00: 250069680 sectors, multi 2: LBA48 NCQ (depth 32), AA Mar 22 16:29:25 jik5.kamens.us kernel: ata6.00: configured for UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: ata4.00: configured for UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: ata1.00: Features: Dev-Sleep Mar 22 16:29:25 jik5.kamens.us kernel: ata1.00: configured for UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: scsi 0:0:0:0: Direct-Access ATA LITEON CV1-8B128 201 PQ: 0 ANSI: 5 Mar 22 16:29:25 jik5.kamens.us kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 Mar 22 16:29:25 jik5.kamens.us kernel: sd 0:0:0:0: [sda] 250069680 512-byte logical blocks: (128 GB/119 GiB) Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: 1953525168 sectors, multi 1: LBA48 NCQ (depth 32), AA Mar 22 16:29:25 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 22 16:29:25 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Mar 22 16:29:25 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:29:25 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: Features: Trust Dev-Sleep Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:29:25 jik5.kamens.us kernel: sda: Mar 22 16:29:25 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 22 16:29:25 jik5.kamens.us kernel: ata5.00: configured for UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-1: New USB device found, idVendor=04f9, idProduct=03b9, bcdDevice= 1.00 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-1: Product: ADS-2800W Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-1: Manufacturer: Brother Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-1: SerialNumber: U64278M7G198321 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-2: new full-speed USB device number 3 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: ata3.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:29:25 jik5.kamens.us kernel: ata3.00: configured for UDMA/133 Mar 22 16:29:25 jik5.kamens.us kernel: scsi 2:0:0:0: Direct-Access ATA ST1000DM003-1ER1 CC45 PQ: 0 ANSI: 5 Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 4096-byte physical blocks Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write Protect is off Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Mar 22 16:29:25 jik5.kamens.us kernel: scsi 3:0:0:0: CD-ROM HL-DT-ST DVDRAM GHC0N 1.00 PQ: 0 ANSI: 5 Mar 22 16:29:25 jik5.kamens.us kernel: sdb: Mar 22 16:29:25 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Attached SCSI disk Mar 22 16:29:25 jik5.kamens.us kernel: sr 3:0:0:0: [sr0] scsi3-mmc drive: 40x/12x writer dvd-ram cd/rw xa/form2 cdda tray Mar 22 16:29:25 jik5.kamens.us kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 22 16:29:25 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi CD-ROM sr0 Mar 22 16:29:25 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi generic sg2 type 5 Mar 22 16:29:25 jik5.kamens.us kernel: scsi 4:0:0:0: Direct-Access ATA Samsung SSD 850 1B6Q PQ: 0 ANSI: 5 Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: Attached scsi generic sg3 type 0 Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write Protect is off Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Mode Sense: 00 3a 00 00 Mar 22 16:29:25 jik5.kamens.us kernel: scsi 5:0:0:0: Direct-Access ATA WDC WD5001AALS-0 3B01 PQ: 0 ANSI: 5 Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Preferred minimum I/O size 512 bytes Mar 22 16:29:25 jik5.kamens.us kernel: sd 5:0:0:0: Attached scsi generic sg4 type 0 Mar 22 16:29:25 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] 976773168 512-byte logical blocks: (500 GB/466 GiB) Mar 22 16:29:25 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write Protect is off Mar 22 16:29:25 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Mode Sense: 00 3a 00 00 Mar 22 16:29:25 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:29:25 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Preferred minimum I/O size 512 bytes Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-2: New USB device found, idVendor=0b0e, idProduct=2467, bcdDevice= 2.10 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-2: New USB device strings: Mfr=0, Product=2, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-2: Product: Jabra Evolve 75 Mar 22 16:29:25 jik5.kamens.us kernel: sdc: sdc1 sdc2 sdc3 Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] supports TCG Opal Mar 22 16:29:25 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Attached SCSI disk Mar 22 16:29:25 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Attached SCSI disk Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-3: new full-speed USB device number 4 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-3: New USB device found, idVendor=0764, idProduct=0501, bcdDevice= 2.00 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-3: New USB device strings: Mfr=3, Product=1, SerialNumber=2 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-3: Product: AVRG750U Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-3: Manufacturer: CPS Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-3: SerialNumber: BHBGV2000445 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-6: new low-speed USB device number 5 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-6: New USB device found, idVendor=0bc7, idProduct=0002, bcdDevice= 1.00 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-6: Product: USB Transceiver Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-6: Manufacturer: X10 Wireless Technology Inc Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7: new high-speed USB device number 6 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7: Product: USB 2.0 Hub Mar 22 16:29:25 jik5.kamens.us kernel: hub 1-7:1.0: USB hub found Mar 22 16:29:25 jik5.kamens.us kernel: hub 1-7:1.0: 4 ports detected Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-9: new high-speed USB device number 7 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-9: New USB device found, idVendor=0bda, idProduct=0153, bcdDevice=57.13 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-9: Product: USB2.0-CRW Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-9: Manufacturer: Generic Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-9: SerialNumber: 20120926571200000 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.1: new full-speed USB device number 8 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.1: New USB device found, idVendor=0b0e, idProduct=245d, bcdDevice= 1.48 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.1: Product: Jabra Link 370 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.1: SerialNumber: 70BF92C25E96 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-10: new full-speed USB device number 9 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-10: New USB device found, idVendor=8087, idProduct=0a2a, bcdDevice= 0.01 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: usbcore: registered new interface driver usb-storage Mar 22 16:29:25 jik5.kamens.us kernel: hid: raw HID events driver (C) Jiri Kosina Mar 22 16:29:25 jik5.kamens.us kernel: usbcore: registered new interface driver uas Mar 22 16:29:25 jik5.kamens.us kernel: ums-realtek 1-9:1.0: USB Mass Storage device detected Mar 22 16:29:25 jik5.kamens.us kernel: scsi host6: usb-storage 1-9:1.0 Mar 22 16:29:25 jik5.kamens.us kernel: usbcore: registered new interface driver ums-realtek Mar 22 16:29:25 jik5.kamens.us kernel: usbcore: registered new interface driver usbhid Mar 22 16:29:25 jik5.kamens.us kernel: usbhid: USB HID core driver Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:0764:0501.0002: hiddev0,hidraw0: USB HID v1.10 Device [CPS AVRG750U] on usb-0000:00:14.0-3/input0 Mar 22 16:29:25 jik5.kamens.us kernel: input: Jabra Evolve 75 as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0/0003:0B0E:2467.0001/input/input6 Mar 22 16:29:25 jik5.kamens.us kernel: jabra 0003:0B0E:2467.0001: input,hiddev1,hidraw1: USB HID v1.11 Device [Jabra Evolve 75] on usb-0000:00:14.0-2/input0 Mar 22 16:29:25 jik5.kamens.us kernel: input: Jabra Link 370 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.3/0003:0B0E:245D.0003/input/input7 Mar 22 16:29:25 jik5.kamens.us kernel: jabra 0003:0B0E:245D.0003: input,hiddev2,hidraw2: USB HID v1.11 Device [Jabra Link 370] on usb-0000:00:14.0-7.1/input3 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2: new high-speed USB device number 10 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2: New USB device found, idVendor=058f, idProduct=6254, bcdDevice= 1.00 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: hub 1-7.2:1.0: USB hub found Mar 22 16:29:25 jik5.kamens.us kernel: hub 1-7.2:1.0: 4 ports detected Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.4: new full-speed USB device number 11 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.4: New USB device found, idVendor=046d, idProduct=c52b, bcdDevice=12.10 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.4: Product: USB Receiver Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.4: Manufacturer: Logitech Mar 22 16:29:25 jik5.kamens.us kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.0/0003:046D:C52B.0004/input/input8 Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0004: input,hidraw3: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input0 Mar 22 16:29:25 jik5.kamens.us kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.1/0003:046D:C52B.0005/input/input9 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.1: new full-speed USB device number 12 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.1/0003:046D:C52B.0005/input/input10 Mar 22 16:29:25 jik5.kamens.us kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.1/0003:046D:C52B.0005/input/input11 Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0005: input,hiddev3,hidraw4: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input1 Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0006: hiddev4,hidraw5: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input2 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.1: New USB device found, idVendor=24f0, idProduct=0142, bcdDevice= 1.00 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.1: Product: Das Keyboard Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.1: Manufacturer: Metadot - Das Keyboard Mar 22 16:29:25 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.0/0003:24F0:0142.0007/input/input13 Mar 22 16:29:25 jik5.kamens.us kernel: scsi 6:0:0:0: Direct-Access Generic- SD/MMC/MS PRO 1.00 PQ: 0 ANSI: 4 Mar 22 16:29:25 jik5.kamens.us kernel: sd 6:0:0:0: Attached scsi generic sg5 type 0 Mar 22 16:29:25 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Media removed, stopped polling Mar 22 16:29:25 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Attached SCSI removable disk Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0007: input,hidraw3: USB HID v1.10 Keyboard [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.2.1/input0 Mar 22 16:29:25 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.1/0003:24F0:0142.0008/input/input14 Mar 22 16:29:25 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.1/0003:24F0:0142.0008/input/input15 Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0008: input,hidraw6: USB HID v1.10 Device [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.2.1/input1 Mar 22 16:29:25 jik5.kamens.us kernel: logitech-djreceiver 0003:046D:C52B.0006: hiddev3,hidraw4: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input2 Mar 22 16:29:25 jik5.kamens.us kernel: input: Logitech Wireless Device PID:4051 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0009/input/input16 Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:046D:4051.0009: input,hidraw5: USB HID v1.11 Mouse [Logitech Wireless Device PID:4051] on usb-0000:00:14.0-7.4/input2:1 Mar 22 16:29:25 jik5.kamens.us kernel: input: Logitech M510 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0009/input/input20 Mar 22 16:29:25 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0009: input,hidraw5: USB HID v1.11 Mouse [Logitech M510] on usb-0000:00:14.0-7.4/input2:1 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.3: new full-speed USB device number 13 using xhci_hcd Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.3: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 5.43 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.3: Product: YubiKey OTP+FIDO+CCID Mar 22 16:29:25 jik5.kamens.us kernel: usb 1-7.2.3: Manufacturer: Yubico Mar 22 16:29:25 jik5.kamens.us kernel: input: Yubico YubiKey OTP+FIDO+CCID as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.3/1-7.2.3:1.0/0003:1050:0407.000A/input/input21 Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000A: input,hidraw7: USB HID v1.10 Keyboard [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.2.3/input0 Mar 22 16:29:25 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000B: hiddev4,hidraw8: USB HID v1.10 Device [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.2.3/input1 Mar 22 16:29:25 jik5.kamens.us kernel: EXT4-fs (dm-1): mounted filesystem e07a02bb-3dad-40e5-945b-111535c44f3a with ordered data mode. Quota mode: none. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Inserted module 'autofs4' Mar 22 16:29:25 jik5.kamens.us systemd[1]: systemd 252.5-2ubuntu2 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 22 16:29:25 jik5.kamens.us systemd[1]: Detected architecture x86-64. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Hostname set to . Mar 22 16:29:25 jik5.kamens.us systemd[1]: Queued start job for default target graphical.target. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Created slice system-postfix.slice - Slice /system/postfix. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Created slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Created slice user.slice - User and Session Slice. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Reached target slices.target - Slice Units. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on rpcbind.socket - RPCbind Server Activation Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on syslog.socket - Syslog Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-journald.socket - Journal Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-oomd.socket - Userspace Out-Of-Memory (OOM) Killer Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-journald.service - Journal Service... Mar 22 16:29:25 jik5.kamens.us systemd[1]: auth-rpcgss-module.service - Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished blk-availability.service - Availability of block devices. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Mar 22 16:29:25 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Mar 22 16:29:25 jik5.kamens.us kernel: pstore: Using crash dump compression: deflate Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Mar 22 16:29:25 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Mar 22 16:29:25 jik5.kamens.us systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Mar 22 16:29:25 jik5.kamens.us systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Mar 22 16:29:25 jik5.kamens.us kernel: pstore: Registered efi_pstore as persistent store backend Mar 22 16:29:25 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Mar 22 16:29:25 jik5.kamens.us kernel: EXT4-fs (dm-1): re-mounted e07a02bb-3dad-40e5-945b-111535c44f3a. Quota mode: none. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Mar 22 16:29:25 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:29:25 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-sysusers.service - Create System Users... Mar 22 16:29:25 jik5.kamens.us kernel: ACPI: bus type drm_connector registered Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:29:25 jik5.kamens.us systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Mar 22 16:29:25 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:29:25 jik5.kamens.us kernel: lp: driver loaded but no devices found Mar 22 16:29:25 jik5.kamens.us kernel: ppdev: user-space parallel port driver Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished systemd-sysusers.service - Create System Users. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Mar 22 16:29:25 jik5.kamens.us systemd-journald[612]: Journal started Mar 22 16:29:25 jik5.kamens.us systemd-journald[612]: Runtime Journal (/run/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 8.0M, max 159.3M, 151.3M free. Mar 22 16:29:25 jik5.kamens.us systemd-modules-load[628]: Inserted module 'lp' Mar 22 16:29:25 jik5.kamens.us systemd[1]: Started systemd-journald.service - Journal Service. Mar 22 16:29:25 jik5.kamens.us systemd-modules-load[628]: Inserted module 'ppdev' Mar 22 16:29:25 jik5.kamens.us systemd-modules-load[628]: Inserted module 'parport_pc' Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Mar 22 16:29:25 jik5.kamens.us systemd-journald[612]: Time spent on flushing to /var/log/journal/dca43d426a4043fd96f7351cc9f080c2 is 6.047ms for 1046 entries. Mar 22 16:29:25 jik5.kamens.us systemd-journald[612]: System Journal (/var/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 1.3G, max 4.0G, 2.6G free. Mar 22 16:29:25 jik5.kamens.us systemd-journald[612]: Received client request to flush runtime journal. Mar 22 16:29:25 jik5.kamens.us systemd-journald[612]: File /var/log/journal/dca43d426a4043fd96f7351cc9f080c2/system.journal corrupted or uncleanly shut down, renaming and replacing. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Mar 22 16:29:25 jik5.kamens.us lvm[616]: 2 logical volume(s) in volume group "ubuntu-vg" monitored Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Mar 22 16:29:25 jik5.kamens.us systemd-udevd[645]: Using default interface naming scheme 'v252'. Mar 22 16:29:25 jik5.kamens.us systemd-udevd[645]: Configuration file /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:29:25 jik5.kamens.us systemd-udevd[645]: /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules:9 Invalid key 'SYSFS' Mar 22 16:29:25 jik5.kamens.us systemd-udevd[645]: /etc/udev/rules.d/60-brother-libsane-type1.rules:17 Invalid key 'SYSFS' Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Mar 22 16:29:25 jik5.kamens.us systemd-udevd[672]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatch /module/rfkill 0:0' failed with exit code 1. Mar 22 16:29:25 jik5.kamens.us systemd-udevd[672]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatchd /module/rfkill 0:0' failed with exit code 1. Mar 22 16:29:25 jik5.kamens.us systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Mar 22 16:29:25 jik5.kamens.us systemd-udevd[672]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /module/rfkill 0:0' failed with exit code 1. Mar 22 16:29:25 jik5.kamens.us systemd-udevd[672]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /module/rfkill 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us lvm[688]: PV /dev/dm-0 online, VG ubuntu-vg is complete. Mar 22 16:29:26 jik5.kamens.us lvm[688]: VG ubuntu-vg finished Mar 22 16:29:26 jik5.kamens.us systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[664]: dm-1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-1' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[666]: event_source: Failed to get device name: No such file or directory Mar 22 16:29:26 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:29:26 jik5.kamens.us systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[669]: sda: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[679]: sdc: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[667]: dm-0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[682]: dm-2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-2' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Found device dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.device - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:29:26 jik5.kamens.us mtp-probe[731]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-2" Mar 22 16:29:26 jik5.kamens.us kernel: nvidia: loading out-of-tree module taints kernel. Mar 22 16:29:26 jik5.kamens.us kernel: nvidia: module license 'NVIDIA' taints kernel. Mar 22 16:29:26 jik5.kamens.us kernel: Disabling lock debugging due to kernel taint Mar 22 16:29:26 jik5.kamens.us kernel: EDAC ie31200: No ECC support Mar 22 16:29:26 jik5.kamens.us kernel: nvidia-nvlink: Nvlink Core is being initialized, major device number 237 Mar 22 16:29:26 jik5.kamens.us kernel: Mar 22 16:29:26 jik5.kamens.us kernel: nvidia 0000:01:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem Mar 22 16:29:26 jik5.kamens.us mtp-probe[733]: checking bus 1, device 7: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" Mar 22 16:29:26 jik5.kamens.us systemd-udevd[681]: sdb: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us mtp-probe[733]: bus: 1, device: 7 was not an MTP device Mar 22 16:29:26 jik5.kamens.us systemd-udevd[669]: sdc1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc1' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us mtp-probe[731]: bus: 1, device: 3 was not an MTP device Mar 22 16:29:26 jik5.kamens.us systemd-udevd[680]: sde: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sde' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us mtp-probe[781]: checking bus 1, device 11: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4" Mar 22 16:29:26 jik5.kamens.us systemd-udevd[679]: sdc2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc2' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us mtp-probe[781]: bus: 1, device: 11 was not an MTP device Mar 22 16:29:26 jik5.kamens.us systemd-udevd[661]: sdc3: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc3' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us mtp-probe[773]: checking bus 1, device 8: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1" Mar 22 16:29:26 jik5.kamens.us systemd-udevd[665]: sdd: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdd' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us mtp-probe[773]: bus: 1, device: 8 was not an MTP device Mar 22 16:29:26 jik5.kamens.us systemd[1]: Activating swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1... Mar 22 16:29:26 jik5.kamens.us mtp-probe[801]: checking bus 1, device 12: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1" Mar 22 16:29:26 jik5.kamens.us mtp-probe[801]: bus: 1, device: 12 was not an MTP device Mar 22 16:29:26 jik5.kamens.us mtp-probe[811]: checking bus 1, device 13: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.3" Mar 22 16:29:26 jik5.kamens.us mtp-probe[811]: bus: 1, device: 13 was not an MTP device Mar 22 16:29:26 jik5.kamens.us mtp-probe[866]: checking bus 1, device 5: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-6" Mar 22 16:29:26 jik5.kamens.us mtp-probe[866]: bus: 1, device: 5 was not an MTP device Mar 22 16:29:26 jik5.kamens.us mtp-probe[881]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-3" Mar 22 16:29:26 jik5.kamens.us mtp-probe[881]: bus: 1, device: 4 was not an MTP device Mar 22 16:29:26 jik5.kamens.us kernel: Adding 999420k swap on /dev/mapper/ubuntu--vg-swap_1. Priority:-2 extents:1 across:999420k SSFS Mar 22 16:29:26 jik5.kamens.us systemd[1]: Activated swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-F41C\x2d35B5.device - Samsung_SSD_850_EVO_1TB EFI\x20System\x20Partition. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.device - Samsung_SSD_850_EVO_1TB 2. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - Samsung_SSD_850_EVO_1TB 3. Mar 22 16:29:26 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:29:26 jik5.kamens.us systemd[1]: Reached target swap.target - Swaps. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Starting systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt... Mar 22 16:29:26 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:29:26 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:29:26 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:29:26 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2... Mar 22 16:29:26 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:29:26 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:29:26 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:29:26 jik5.kamens.us systemd[1]: Started systemd-fsckd.service - File System Check Daemon to report status. Mar 22 16:29:26 jik5.kamens.us systemd-cryptsetup[993]: Volume sdc3_crypt already active. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Finished systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: fsck.fat 4.2 (2021-01-31) Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: There are differences between boot sector and its backup. Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: This is mostly harmless. Differences: (offset:original/backup) Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: 65:01/00 Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: Not automatically fixing this. Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: Automatically removing dirty bit. Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: *** Filesystem was changed *** Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: Writing changes. Mar 22 16:29:26 jik5.kamens.us systemd-fsck[1000]: /dev/sdc1: 11 files, 1554/130812 clusters Mar 22 16:29:26 jik5.kamens.us systemd-fsck[999]: /dev/sdc2: recovering journal Mar 22 16:29:26 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5. Mar 22 16:29:26 jik5.kamens.us systemd-fsck[999]: /dev/sdc2: clean, 326/46848 files, 119061/187392 blocks Mar 22 16:29:26 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:29:26 jik5.kamens.us kernel: NVRM: loading NVIDIA UNIX x86_64 Kernel Module 515.86.01 Wed Oct 26 09:12:38 UTC 2022 Mar 22 16:29:26 jik5.kamens.us kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) Mar 22 16:29:26 jik5.kamens.us kernel: ee1004 0-0051: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:29:26 jik5.kamens.us kernel: ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:29:26 jik5.kamens.us kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Mar 22 16:29:26 jik5.kamens.us kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Mar 22 16:29:26 jik5.kamens.us kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Mar 22 16:29:26 jik5.kamens.us kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Mar 22 16:29:26 jik5.kamens.us kernel: nvidia-modeset: Loading NVIDIA Kernel Mode Setting Driver for UNIX platforms 515.86.01 Wed Oct 26 09:02:01 UTC 2022 Mar 22 16:29:26 jik5.kamens.us kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Mar 22 16:29:26 jik5.kamens.us kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Mar 22 16:29:26 jik5.kamens.us kernel: acer_wmi: Acer Laptop ACPI-WMI Extras Mar 22 16:29:26 jik5.kamens.us kernel: acer_wmi: No WMID device detection method found Mar 22 16:29:26 jik5.kamens.us kernel: Bluetooth: Core ver 2.22 Mar 22 16:29:26 jik5.kamens.us kernel: NET: Registered PF_BLUETOOTH protocol family Mar 22 16:29:26 jik5.kamens.us kernel: Bluetooth: HCI device and connection manager initialized Mar 22 16:29:26 jik5.kamens.us kernel: Bluetooth: HCI socket layer initialized Mar 22 16:29:26 jik5.kamens.us kernel: Bluetooth: L2CAP socket layer initialized Mar 22 16:29:26 jik5.kamens.us kernel: Bluetooth: SCO socket layer initialized Mar 22 16:29:26 jik5.kamens.us kernel: Intel(R) Wireless WiFi driver for Linux Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: enabling device (0000 -> 0002) Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug destination: EXTERNAL_DRAM Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug configuration: 0 Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: loaded firmware version 29.4063824552.0 7265D-29.ucode op_mode iwlmvm Mar 22 16:29:26 jik5.kamens.us systemd-udevd[656]: sr0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sr0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us kernel: [drm] [nvidia-drm] [GPU ID 0x00000100] Loading driver Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting boot.mount - /boot... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting home-macback-home-macback-backup.mount - /home/macback/home/macback/backup... Mar 22 16:29:26 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem da5cb0b2-d839-4972-a245-b31b54e44cc2 with ordered data mode. Quota mode: none. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-bare-5.mount - Mount unit for bare, revision 5... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120... Mar 22 16:29:26 jik5.kamens.us kernel: loop0: detected capacity change from 0 to 8 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126... Mar 22 16:29:26 jik5.kamens.us kernel: loop1: detected capacity change from 0 to 232672 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-bw-46.mount - Mount unit for bw, revision 46... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-bw-47.mount - Mount unit for bw, revision 47... Mar 22 16:29:26 jik5.kamens.us kernel: loop2: detected capacity change from 0 to 235144 Mar 22 16:29:26 jik5.kamens.us kernel: loop3: detected capacity change from 0 to 47368 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146... Mar 22 16:29:26 jik5.kamens.us kernel: loop4: detected capacity change from 0 to 47328 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164... Mar 22 16:29:26 jik5.kamens.us kernel: loop5: detected capacity change from 0 to 18352 Mar 22 16:29:26 jik5.kamens.us kernel: loop6: detected capacity change from 0 to 18352 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-chromium-2381.mount - Mount unit for chromium, revision 2381... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-chromium-2392.mount - Mount unit for chromium, revision 2392... Mar 22 16:29:26 jik5.kamens.us kernel: loop7: detected capacity change from 0 to 304168 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28... Mar 22 16:29:26 jik5.kamens.us kernel: loop8: detected capacity change from 0 to 304168 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core-14784.mount - Mount unit for core, revision 14784... Mar 22 16:29:26 jik5.kamens.us kernel: loop9: detected capacity change from 0 to 55568 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core-14946.mount - Mount unit for core, revision 14946... Mar 22 16:29:26 jik5.kamens.us kernel: loop10: detected capacity change from 0 to 37776 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core18-2708.mount - Mount unit for core18, revision 2708... Mar 22 16:29:26 jik5.kamens.us kernel: loop11: detected capacity change from 0 to 239176 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core18-2714.mount - Mount unit for core18, revision 2714... Mar 22 16:29:26 jik5.kamens.us kernel: loop12: detected capacity change from 0 to 239128 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core20-1828.mount - Mount unit for core20, revision 1828... Mar 22 16:29:26 jik5.kamens.us kernel: loop13: detected capacity change from 0 to 113896 Mar 22 16:29:26 jik5.kamens.us kernel: loop14: detected capacity change from 0 to 113888 Mar 22 16:29:26 jik5.kamens.us kernel: loop15: detected capacity change from 0 to 129608 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core20-1852.mount - Mount unit for core20, revision 1852... Mar 22 16:29:26 jik5.kamens.us kernel: loop16: detected capacity change from 0 to 129672 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core22-522.mount - Mount unit for core22, revision 522... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-core22-547.mount - Mount unit for core22, revision 547... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-cups-836.mount - Mount unit for cups, revision 836... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-cups-872.mount - Mount unit for cups, revision 872... Mar 22 16:29:26 jik5.kamens.us kernel: mc: Linux media interface: v0.10 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-firefox-2432.mount - Mount unit for firefox, revision 2432... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-firefox-2487.mount - Mount unit for firefox, revision 2487... Mar 22 16:29:26 jik5.kamens.us kernel: usbcore: registered new interface driver btusb Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104... Mar 22 16:29:26 jik5.kamens.us systemd-udevd[661]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[661]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[669]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[669]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72... Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Detected Intel(R) Dual Band Wireless AC 7265, REV=0x210 Mar 22 16:29:26 jik5.kamens.us kernel: thermal thermal_zone3: failed to read out thermal zone (-61) Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115... Mar 22 16:29:26 jik5.kamens.us kernel: usb 1-7.1: 1:1: cannot set freq 48000 to ep 0x3 Mar 22 16:29:26 jik5.kamens.us kernel: Bluetooth: hci0: Legacy ROM 2.5 revision 1.0 build 3 week 17 2014 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119... Mar 22 16:29:26 jik5.kamens.us systemd-udevd[681]: 1-7.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.2 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd-udevd[681]: 1-7.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.2 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56... Mar 22 16:29:26 jik5.kamens.us systemd-udevd[669]: 1-7.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.1 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Applying debug destination EXTERNAL_DRAM Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Allocated 0x00400000 bytes for firmware monitor. Mar 22 16:29:26 jik5.kamens.us kernel: Bluetooth: hci0: Intel Bluetooth firmware file: intel/ibt-hw-37.8.10-fw-1.10.3.11.e.bseq Mar 22 16:29:26 jik5.kamens.us systemd-udevd[669]: 1-7.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.1 0:0' failed with exit code 1. Mar 22 16:29:26 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: base HW address: 4c:34:88:9c:4f:cd, OTP minor version: 0x0 Mar 22 16:29:26 jik5.kamens.us kernel: loop18: detected capacity change from 0 to 149312 Mar 22 16:29:26 jik5.kamens.us kernel: loop24: detected capacity change from 0 to 333552 Mar 22 16:29:26 jik5.kamens.us kernel: loop23: detected capacity change from 0 to 494824 Mar 22 16:29:26 jik5.kamens.us kernel: loop17: detected capacity change from 0 to 149312 Mar 22 16:29:26 jik5.kamens.us kernel: loop26: detected capacity change from 0 to 491264 Mar 22 16:29:26 jik5.kamens.us kernel: loop22: detected capacity change from 0 to 288120 Mar 22 16:29:26 jik5.kamens.us kernel: loop25: detected capacity change from 0 to 448512 Mar 22 16:29:26 jik5.kamens.us kernel: loop28: detected capacity change from 0 to 709216 Mar 22 16:29:26 jik5.kamens.us kernel: loop27: detected capacity change from 0 to 337424 Mar 22 16:29:26 jik5.kamens.us kernel: loop29: detected capacity change from 0 to 448512 Mar 22 16:29:26 jik5.kamens.us kernel: loop19: detected capacity change from 0 to 112848 Mar 22 16:29:26 jik5.kamens.us kernel: loop30: detected capacity change from 0 to 709280 Mar 22 16:29:26 jik5.kamens.us kernel: loop20: detected capacity change from 0 to 112704 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534... Mar 22 16:29:26 jik5.kamens.us kernel: loop21: detected capacity change from 0 to 288072 Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535... Mar 22 16:29:26 jik5.kamens.us systemd[1]: Mounting snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2... Mar 22 16:29:27 jik5.kamens.us kernel: loop31: detected capacity change from 0 to 926512 Mar 22 16:29:27 jik5.kamens.us kernel: loop32: detected capacity change from 0 to 5208 Mar 22 16:29:27 jik5.kamens.us kernel: loop34: detected capacity change from 0 to 3048 Mar 22 16:29:27 jik5.kamens.us kernel: intel_tcc_cooling: Programmable TCC Offset detected Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: enabling device (0000 -> 0002) Mar 22 16:29:27 jik5.kamens.us kernel: ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Disabling MSI Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client Mar 22 16:29:27 jik5.kamens.us kernel: loop33: detected capacity change from 0 to 942640 Mar 22 16:29:27 jik5.kamens.us kernel: usbcore: registered new interface driver snd-usb-audio Mar 22 16:29:27 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain package Mar 22 16:29:27 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain core Mar 22 16:29:27 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain dram Mar 22 16:29:27 jik5.kamens.us kernel: loop37: detected capacity change from 0 to 166424 Mar 22 16:29:27 jik5.kamens.us kernel: loop35: detected capacity change from 0 to 75960 Mar 22 16:29:27 jik5.kamens.us kernel: loop36: detected capacity change from 0 to 94064 Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49... Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input22 Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71... Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input23 Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input24 Mar 22 16:29:27 jik5.kamens.us kernel: loop38: detected capacity change from 0 to 187776 Mar 22 16:29:27 jik5.kamens.us kernel: iwlwifi 0000:03:00.0 wlp3s0: renamed from wlan0 Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card2/input25 Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting snap-vault-1930.mount - Mount unit for vault, revision 1930... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting snap-vault-1958.mount - Mount unit for vault, revision 1958... Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC662 rev3: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: inputs: Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Front Mic=0x19 Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 Mar 22 16:29:27 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Line=0x1a Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input26 Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input27 Mar 22 16:29:27 jik5.kamens.us kernel: loop40: detected capacity change from 0 to 594024 Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1f.3/sound/card0/input28 Mar 22 16:29:27 jik5.kamens.us kernel: loop39: detected capacity change from 0 to 94056 Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1f.3/sound/card0/input29 Mar 22 16:29:27 jik5.kamens.us kernel: loop41: detected capacity change from 0 to 864 Mar 22 16:29:27 jik5.kamens.us kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input30 Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control... Mar 22 16:29:27 jik5.kamens.us kernel: loop42: detected capacity change from 0 to 608 Mar 22 16:29:27 jik5.kamens.us kernel: loop43: detected capacity change from 0 to 594024 Mar 22 16:29:27 jik5.kamens.us kernel: Bluetooth: hci0: Intel BT fw patch 0x32 completed & activated Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted boot.mount - /boot. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted home-macback-home-macback-backup.mount - /home/macback/home/macback/backup. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-bare-5.mount - Mount unit for bare, revision 5. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-bw-46.mount - Mount unit for bw, revision 46. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-bw-47.mount - Mount unit for bw, revision 47. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-chromium-2381.mount - Mount unit for chromium, revision 2381. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-chromium-2392.mount - Mount unit for chromium, revision 2392. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core-14784.mount - Mount unit for core, revision 14784. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core-14946.mount - Mount unit for core, revision 14946. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core18-2708.mount - Mount unit for core18, revision 2708. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core18-2714.mount - Mount unit for core18, revision 2714. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core20-1828.mount - Mount unit for core20, revision 1828. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core20-1852.mount - Mount unit for core20, revision 1852. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core22-522.mount - Mount unit for core22, revision 522. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-core22-547.mount - Mount unit for core22, revision 547. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-cups-836.mount - Mount unit for cups, revision 836. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-cups-872.mount - Mount unit for cups, revision 872. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-firefox-2432.mount - Mount unit for firefox, revision 2432. Mar 22 16:29:27 jik5.kamens.us systemd-udevd[681]: 1-7.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.0 0:0' failed with exit code 1. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-firefox-2487.mount - Mount unit for firefox, revision 2487. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104. Mar 22 16:29:27 jik5.kamens.us systemd-udevd[681]: 1-7.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.0 0:0' failed with exit code 1. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-vault-1930.mount - Mount unit for vault, revision 1930. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted snap-vault-1958.mount - Mount unit for vault, revision 1958. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control. Mar 22 16:29:27 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:29:27 jik5.kamens.us systemd[1]: Reached target snapd.mounts.target - Mounted snaps. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting boot-efi.mount - /boot/efi... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:29:27 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:29:27 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:29:27 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:29:27 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting systemd-rfkill.service - Load/Save RF Kill Switch Status... Mar 22 16:29:27 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:29:27 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:29:27 jik5.kamens.us systemd[1]: Started systemd-rfkill.service - Load/Save RF Kill Switch Status. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted boot-efi.mount - /boot/efi. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Reached target local-fs.target - Local File Systems. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting apparmor.service - Load AppArmor profiles... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting console-setup.service - Set console font and keymap... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting systemd-binfmt.service - Set Up Additional Binary Formats... Mar 22 16:29:27 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting ufw.service - Uncomplicated firewall... Mar 22 16:29:27 jik5.kamens.us apparmor.systemd[1341]: Restarting AppArmor Mar 22 16:29:27 jik5.kamens.us apparmor.systemd[1341]: Reloading AppArmor profiles Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished console-setup.service - Set console font and keymap. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Received SIGRTMIN+20 from PID 451 (plymouthd). Mar 22 16:29:27 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 1346 (systemd-binfmt) Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System... Mar 22 16:29:27 jik5.kamens.us apparmor.systemd[1365]: Skipping profile in /etc/apparmor.d/disable: usr.bin.firefox Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Mar 22 16:29:27 jik5.kamens.us audit[1361]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1361 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1369]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1369 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1362]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1362 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.357:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1361 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.357:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1369 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.357:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1362 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.357:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1362 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1362]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1362 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting rpcbind.service - RPC bind portmap service... Mar 22 16:29:27 jik5.kamens.us audit[1366]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1366 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1366]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1366 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1366]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1366 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1368]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1368 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1371]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1371 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.361:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1366 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.361:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1366 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.361:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1366 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.361:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1368 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.361:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1371 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1367]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1367 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:29:27 jik5.kamens.us kernel: audit: type=1400 audit(1679516967.365:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1367 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Mar 22 16:29:27 jik5.kamens.us audit[1363]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1363 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1363]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=1363 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1363]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1363 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1363]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/{,usr/}sbin/dhclient" pid=1363 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us apparmor.systemd[1381]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Mar 22 16:29:27 jik5.kamens.us audit[1372]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine" pid=1372 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1372]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1372 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1377]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="named" pid=1377 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Mar 22 16:29:27 jik5.kamens.us audit[1374]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1374 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Mar 22 16:29:27 jik5.kamens.us systemd[1]: Started rpcbind.service - RPC bind portmap service. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished systemd-binfmt.service - Set Up Additional Binary Formats. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Reached target rpcbind.target - RPC Port Mapper. Mar 22 16:29:27 jik5.kamens.us audit[1375]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1375 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1375]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd" pid=1375 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1375]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd//third_party" pid=1375 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting binfmt-support.service - Enable support for additional executable binary formats... Mar 22 16:29:27 jik5.kamens.us audit[1379]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="rsyslogd" pid=1379 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Mar 22 16:29:27 jik5.kamens.us audit[1364]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince" pid=1364 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1364]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince//sanitized_helper" pid=1364 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1364]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer" pid=1364 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1364]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer//sanitized_helper" pid=1364 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1364]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-thumbnailer" pid=1364 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1370]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice" pid=1370 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1370]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice//gpg" pid=1370 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished binfmt-support.service - Enable support for additional executable binary formats. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Reached target time-set.target - System Time Set. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Started systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:29:27 jik5.kamens.us systemd-resolved[1380]: Positive Trust Anchors: Mar 22 16:29:27 jik5.kamens.us systemd-resolved[1380]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 22 16:29:27 jik5.kamens.us systemd-resolved[1380]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 22 16:29:27 jik5.kamens.us audit[1381]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=1381 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us apparmor.systemd[1381]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 60): Caching disabled for: 'usr.sbin.sssd' due to force complain Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished apparmor.service - Load AppArmor profiles. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Starting snapd.apparmor.service - Load AppArmor profiles managed internally by snapd... Mar 22 16:29:27 jik5.kamens.us systemd-resolved[1380]: Using system hostname 'jik5.kamens.us'. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Started systemd-resolved.service - Network Name Resolution. Mar 22 16:29:27 jik5.kamens.us audit[1441]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=1441 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1443]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=1443 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1442]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bw" pid=1442 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1445]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.core" pid=1445 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1446]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.cups" pid=1446 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1440]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=1440 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1440]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1440 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1452]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.vault" pid=1452 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1444]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.chromium" pid=1444 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1447]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.firefox" pid=1447 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1448]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=1448 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1449]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snap-store" pid=1449 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1451]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=1451 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1453]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.cli" pid=1453 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1454]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.daemon" pid=1454 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1456]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.tx" pid=1456 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1457]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.util" pid=1457 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1459]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.wallet" pid=1459 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1455]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.qt" pid=1455 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1460]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bw.bw" pid=1460 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1461]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=1461 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1464]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=1464 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1466]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=1466 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1462]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=1462 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1470]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=1470 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1469]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=1469 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1475]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.core.hook.configure" pid=1475 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1476]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.accept" pid=1476 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1474]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.hook.configure" pid=1474 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1479]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsaccept" pid=1479 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1477]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cancel" pid=1477 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1478]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cups-browsed" pid=1478 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1473]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromium" pid=1473 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1471]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromedriver" pid=1471 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1480]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsctl" pid=1480 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished ufw.service - Uncomplicated firewall. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Reached target network-pre.target - Preparation for Network. Mar 22 16:29:27 jik5.kamens.us audit[1484]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsdisable" pid=1484 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1481]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsd" pid=1481 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1489]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsfilter" pid=1489 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1487]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsenable" pid=1487 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1490]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsreject" pid=1490 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1493]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.gs" pid=1493 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1491]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupstestppd" pid=1491 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1492]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.driverless" pid=1492 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1495]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippfind" pid=1495 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1494]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippeveprinter" pid=1494 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1497]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lp" pid=1497 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1498]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpadmin" pid=1498 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1496]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ipptool" pid=1496 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1499]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpc" pid=1499 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1500]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpinfo" pid=1500 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1501]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpoptions" pid=1501 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1504]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lprm" pid=1504 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1503]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpr" pid=1503 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1502]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpq" pid=1502 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1506]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.reject" pid=1506 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1505]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpstat" pid=1505 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1510]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=1510 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1509]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.configure" pid=1509 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1512]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=1512 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1511]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=1511 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1507]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.firefox" pid=1507 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1514]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=1514 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1508]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.geckodriver" pid=1508 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1515]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.hook.configure" pid=1515 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1513]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=1513 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1519]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=1519 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1516]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.snap-store" pid=1516 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1521]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.vault.vault" pid=1521 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1517]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=1517 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1518]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=1518 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us audit[1520]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=1520 comm="apparmor_parser" Mar 22 16:29:27 jik5.kamens.us systemd[1]: Finished snapd.apparmor.service - Load AppArmor profiles managed internally by snapd. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:29:27 jik5.kamens.us kernel: RPC: Registered named UNIX socket transport module. Mar 22 16:29:27 jik5.kamens.us kernel: RPC: Registered udp transport module. Mar 22 16:29:27 jik5.kamens.us kernel: RPC: Registered tcp transport module. Mar 22 16:29:27 jik5.kamens.us kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Mounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:29:27 jik5.kamens.us systemd[1]: Reached target rpc_pipefs.target. Mar 22 16:29:27 jik5.kamens.us systemd[1]: rpc-gssd.service - RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:29:27 jik5.kamens.us systemd[1]: Reached target nfs-client.target - NFS client services. Mar 22 16:29:32 jik5.kamens.us systemd[1]: systemd-rfkill.service: Deactivated successfully. Mar 22 16:29:56 jik5.kamens.us systemd[1]: systemd-fsckd.service: Deactivated successfully. Mar 22 16:30:26 jik5.kamens.us systemd-udevd[645]: 1-7.2.3: Worker [674] processing SEQNUM=3256 is taking a long time Mar 22 16:30:26 jik5.kamens.us systemd-udevd[674]: 1-7.2.3: Spawned process '/bin/systemctl start yubikey-monitor.service' [835] is taking longer than 59s to complete Mar 22 16:30:26 jik5.kamens.us systemd-udevd[645]: 0000:01:00.0: Worker [664] processing SEQNUM=3781 is taking a long time Mar 22 16:30:27 jik5.kamens.us systemd-udevd[668]: nvidia: Spawned process '/sbin/modprobe nvidia-drm' [1087] is taking longer than 59s to complete Mar 22 16:30:27 jik5.kamens.us systemd-udevd[645]: nvidia: Worker [668] processing SEQNUM=4282 is taking a long time -- Boot 7f163eb15e954dc79f76958a6acedd8a -- Mar 22 16:31:40 jik5.kamens.us kernel: microcode: microcode updated early to revision 0xf0, date = 2021-11-12 Mar 22 16:31:40 jik5.kamens.us kernel: Linux version 6.1.0-16-generic (buildd@lcy02-amd64-014) (x86_64-linux-gnu-gcc-12 (Ubuntu 12.2.0-14ubuntu2) 12.2.0, GNU ld (GNU Binutils for Ubuntu) 2.40) #16-Ubuntu SMP PREEMPT_DYNAMIC Fri Feb 24 14:37:30 UTC 2023 Mar 22 16:31:40 jik5.kamens.us kernel: Command line: BOOT_IMAGE=/vmlinuz-6.1.0-16-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:31:40 jik5.kamens.us kernel: KERNEL supported cpus: Mar 22 16:31:40 jik5.kamens.us kernel: Intel GenuineIntel Mar 22 16:31:40 jik5.kamens.us kernel: AMD AuthenticAMD Mar 22 16:31:40 jik5.kamens.us kernel: Hygon HygonGenuine Mar 22 16:31:40 jik5.kamens.us kernel: Centaur CentaurHauls Mar 22 16:31:40 jik5.kamens.us kernel: zhaoxin Shanghai Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Mar 22 16:31:40 jik5.kamens.us kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Mar 22 16:31:40 jik5.kamens.us kernel: signal: max sigframe size: 2032 Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-provided physical RAM map: Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000000100000-0x000000008a870fff] usable Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: BIOS-e820: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:31:40 jik5.kamens.us kernel: NX (Execute Disable) protection: active Mar 22 16:31:40 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:31:40 jik5.kamens.us kernel: e820: update [mem 0x89217018-0x89238c57] usable ==> usable Mar 22 16:31:40 jik5.kamens.us kernel: extended physical RAM map: Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000000000-0x0000000000057fff] usable Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000058000-0x0000000000058fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000059000-0x000000000009dfff] usable Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000000009e000-0x000000000009ffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000089217017] usable Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089217018-0x0000000089238c57] usable Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000089238c58-0x000000008a870fff] usable Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a871000-0x000000008a871fff] ACPI NVS Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a872000-0x000000008a8bbfff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008a8bc000-0x000000008e52bfff] usable Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008e52c000-0x000000008efe5fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008efe6000-0x000000008f021fff] ACPI data Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f022000-0x000000008f583fff] ACPI NVS Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008f584000-0x000000008fafdfff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fafe000-0x000000008fafefff] usable Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x000000008fb00000-0x000000008fbfffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000e0000000-0x00000000efffffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Mar 22 16:31:40 jik5.kamens.us kernel: reserve setup_data: [mem 0x0000000100000000-0x000000046effffff] usable Mar 22 16:31:40 jik5.kamens.us kernel: efi: EFI v2.40 by Acer Inc. Mar 22 16:31:40 jik5.kamens.us kernel: efi: ESRT=0x8f9afe98 ACPI=0x8eff2000 ACPI 2.0=0x8eff2000 SMBIOS=0x8f9ae000 SMBIOS 3.0=0x8f9ad000 MOKvar=0x8f71e000 RNG=0x8eff1f98 TPMEventLog=0x8a91c018 Mar 22 16:31:40 jik5.kamens.us kernel: random: crng init done Mar 22 16:31:40 jik5.kamens.us kernel: TPM Final Events table not present Mar 22 16:31:40 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:31:40 jik5.kamens.us kernel: SMBIOS 3.0.0 present. Mar 22 16:31:40 jik5.kamens.us kernel: DMI: Acer Predator G6-710/Predator G6-710, BIOS R01-A4 05/18/2016 Mar 22 16:31:40 jik5.kamens.us kernel: tsc: Detected 4000.000 MHz processor Mar 22 16:31:40 jik5.kamens.us kernel: tsc: Detected 3999.984 MHz TSC Mar 22 16:31:40 jik5.kamens.us kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 22 16:31:40 jik5.kamens.us kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 22 16:31:40 jik5.kamens.us kernel: last_pfn = 0x46f000 max_arch_pfn = 0x400000000 Mar 22 16:31:40 jik5.kamens.us kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 22 16:31:40 jik5.kamens.us kernel: last_pfn = 0x8faff max_arch_pfn = 0x400000000 Mar 22 16:31:40 jik5.kamens.us kernel: esrt: Reserving ESRT space from 0x000000008f9afe98 to 0x000000008f9afed0. Mar 22 16:31:40 jik5.kamens.us kernel: Using GB pages for direct mapping Mar 22 16:31:40 jik5.kamens.us kernel: secureboot: Secure boot disabled Mar 22 16:31:40 jik5.kamens.us kernel: RAMDISK: [mem 0x6d104000-0x74c4ffff] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Early table checksum verification disabled Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: RSDP 0x000000008EFF2000 000024 (v02 ACRSYS) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: XSDT 0x000000008EFF20A8 0000D4 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: FACP 0x000000008F016C90 00010C (v05 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: DSDT 0x000000008EFF2210 024A7F (v02 ACRSYS ACRPRDCT 01072009 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: FACS 0x000000008F560F80 000040 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: APIC 0x000000008F016DA0 0000BC (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: FPDT 0x000000008F016E60 000044 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: FIDT 0x000000008F016EA8 00009C (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: MCFG 0x000000008F016F48 00003C (v01 ACRSYS ACRPRDCT 01072009 MSFT 00000097) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: HPET 0x000000008F016F88 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI. 0005000B) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F016FC0 00036D (v01 SataRe SataTabl 00001000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LPIT 0x000000008F017330 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F0173C8 000248 (v02 INTEL sensrhub 00000000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F017610 002BAE (v02 INTEL PtidDevc 00001000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01A1C0 000BE3 (v02 INTEL Ther_Rvp 00001000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: DBGP 0x000000008F01ADA8 000034 (v01 INTEL 00000000 MSFT 0000005F) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: DBG2 0x000000008F01ADE0 000054 (v00 INTEL 00000000 MSFT 0000005F) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01AE38 000613 (v02 INTEL xh_rvp08 00000000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: MSDM 0x000000008F01B450 000055 (v03 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F01B4A8 00546C (v02 SaSsdt SaSsdt 00003000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: UEFI 0x000000008F020918 000042 (v01 00000000 00000000) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0x000000008F020960 000E73 (v02 CpuRef CpuSsdt 00003000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: BGRT 0x000000008F0217D8 000038 (v01 ACRSYS ACRPRDCT 01072009 AMI 00010013) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: DMAR 0x000000008F021810 000070 (v01 INTEL SKL 00000001 INTL 00000001) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: TPM2 0x000000008F021880 000034 (v03 Tpm2Tabl 00000001 AMI 00000000) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: ASF! 0x000000008F0218B8 0000A5 (v32 INTEL HCG 00000001 TFSM 000F4240) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving FACP table memory at [mem 0x8f016c90-0x8f016d9b] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving DSDT table memory at [mem 0x8eff2210-0x8f016c8e] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving FACS table memory at [mem 0x8f560f80-0x8f560fbf] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving APIC table memory at [mem 0x8f016da0-0x8f016e5b] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving FPDT table memory at [mem 0x8f016e60-0x8f016ea3] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving FIDT table memory at [mem 0x8f016ea8-0x8f016f43] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving MCFG table memory at [mem 0x8f016f48-0x8f016f83] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving HPET table memory at [mem 0x8f016f88-0x8f016fbf] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f016fc0-0x8f01732c] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving LPIT table memory at [mem 0x8f017330-0x8f0173c3] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f0173c8-0x8f01760f] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f017610-0x8f01a1bd] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01a1c0-0x8f01ada2] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving DBGP table memory at [mem 0x8f01ada8-0x8f01addb] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving DBG2 table memory at [mem 0x8f01ade0-0x8f01ae33] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01ae38-0x8f01b44a] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving MSDM table memory at [mem 0x8f01b450-0x8f01b4a4] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f01b4a8-0x8f020913] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving UEFI table memory at [mem 0x8f020918-0x8f020959] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving SSDT table memory at [mem 0x8f020960-0x8f0217d2] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving BGRT table memory at [mem 0x8f0217d8-0x8f02180f] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving DMAR table memory at [mem 0x8f021810-0x8f02187f] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving TPM2 table memory at [mem 0x8f021880-0x8f0218b3] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Reserving ASF! table memory at [mem 0x8f0218b8-0x8f02195c] Mar 22 16:31:40 jik5.kamens.us kernel: No NUMA configuration found Mar 22 16:31:40 jik5.kamens.us kernel: Faking a node at [mem 0x0000000000000000-0x000000046effffff] Mar 22 16:31:40 jik5.kamens.us kernel: NODE_DATA(0) allocated [mem 0x46efd5000-0x46effffff] Mar 22 16:31:40 jik5.kamens.us kernel: Zone ranges: Mar 22 16:31:40 jik5.kamens.us kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 22 16:31:40 jik5.kamens.us kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 22 16:31:40 jik5.kamens.us kernel: Normal [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:31:40 jik5.kamens.us kernel: Device empty Mar 22 16:31:40 jik5.kamens.us kernel: Movable zone start for each node Mar 22 16:31:40 jik5.kamens.us kernel: Early memory node ranges Mar 22 16:31:40 jik5.kamens.us kernel: node 0: [mem 0x0000000000001000-0x0000000000057fff] Mar 22 16:31:40 jik5.kamens.us kernel: node 0: [mem 0x0000000000059000-0x000000000009dfff] Mar 22 16:31:40 jik5.kamens.us kernel: node 0: [mem 0x0000000000100000-0x000000008a870fff] Mar 22 16:31:40 jik5.kamens.us kernel: node 0: [mem 0x000000008a8bc000-0x000000008e52bfff] Mar 22 16:31:40 jik5.kamens.us kernel: node 0: [mem 0x000000008fafe000-0x000000008fafefff] Mar 22 16:31:40 jik5.kamens.us kernel: node 0: [mem 0x0000000100000000-0x000000046effffff] Mar 22 16:31:40 jik5.kamens.us kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000046effffff] Mar 22 16:31:40 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:31:40 jik5.kamens.us kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 22 16:31:40 jik5.kamens.us kernel: On node 0, zone DMA: 98 pages in unavailable ranges Mar 22 16:31:40 jik5.kamens.us kernel: On node 0, zone DMA32: 75 pages in unavailable ranges Mar 22 16:31:40 jik5.kamens.us kernel: On node 0, zone DMA32: 5586 pages in unavailable ranges Mar 22 16:31:40 jik5.kamens.us kernel: On node 0, zone Normal: 1281 pages in unavailable ranges Mar 22 16:31:40 jik5.kamens.us kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM-Timer IO Port: 0x1808 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Mar 22 16:31:40 jik5.kamens.us kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 Mar 22 16:31:40 jik5.kamens.us kernel: e820: update [mem 0x8c99e000-0x8ca91fff] usable ==> reserved Mar 22 16:31:40 jik5.kamens.us kernel: TSC deadline timer available Mar 22 16:31:40 jik5.kamens.us kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x00058000-0x00058fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009ffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89217000-0x89217fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x89238000-0x89238fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a871000-0x8a871fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8a872000-0x8a8bbfff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8c99e000-0x8ca91fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8e52c000-0x8efe5fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8efe6000-0x8f021fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f022000-0x8f583fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8f584000-0x8fafdfff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8faff000-0x8fafffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fb00000-0x8fbfffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0x8fc00000-0xdfffffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xe0000000-0xefffffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xf0000000-0xfdffffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xfebfffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec00000-0xfec00fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfec01000-0xfedfffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee00000-0xfee00fff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xfee01000-0xfeffffff] Mar 22 16:31:40 jik5.kamens.us kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xffffffff] Mar 22 16:31:40 jik5.kamens.us kernel: [mem 0x8fc00000-0xdfffffff] available for PCI devices Mar 22 16:31:40 jik5.kamens.us kernel: Booting paravirtualized kernel on bare hardware Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Mar 22 16:31:40 jik5.kamens.us kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 22 16:31:40 jik5.kamens.us kernel: percpu: Embedded 61 pages/cpu s212992 r8192 d28672 u262144 Mar 22 16:31:40 jik5.kamens.us kernel: pcpu-alloc: s212992 r8192 d28672 u262144 alloc=1*2097152 Mar 22 16:31:40 jik5.kamens.us kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 22 16:31:40 jik5.kamens.us kernel: Fallback order for Node 0: 0 Mar 22 16:31:40 jik5.kamens.us kernel: Built 1 zonelists, mobility grouping on. Total pages: 4117646 Mar 22 16:31:40 jik5.kamens.us kernel: Policy zone: Normal Mar 22 16:31:40 jik5.kamens.us kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-6.1.0-16-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:31:40 jik5.kamens.us kernel: Unknown kernel command line parameters "splash BOOT_IMAGE=/vmlinuz-6.1.0-16-generic", will be passed to user space. Mar 22 16:31:40 jik5.kamens.us kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:off Mar 22 16:31:40 jik5.kamens.us kernel: software IO TLB: area num 8. Mar 22 16:31:40 jik5.kamens.us kernel: Memory: 16147976K/16732664K available (18440K kernel code, 4142K rwdata, 17740K rodata, 3188K init, 4792K bss, 584428K reserved, 0K cma-reserved) Mar 22 16:31:40 jik5.kamens.us kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 22 16:31:40 jik5.kamens.us kernel: Kernel/User page tables isolation: enabled Mar 22 16:31:40 jik5.kamens.us kernel: ftrace: allocating 52642 entries in 206 pages Mar 22 16:31:40 jik5.kamens.us kernel: ftrace: allocated 206 pages with 5 groups Mar 22 16:31:40 jik5.kamens.us kernel: Dynamic Preempt: voluntary Mar 22 16:31:40 jik5.kamens.us kernel: rcu: Preemptible hierarchical RCU implementation. Mar 22 16:31:40 jik5.kamens.us kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 22 16:31:40 jik5.kamens.us kernel: Trampoline variant of Tasks RCU enabled. Mar 22 16:31:40 jik5.kamens.us kernel: Rude variant of Tasks RCU enabled. Mar 22 16:31:40 jik5.kamens.us kernel: Tracing variant of Tasks RCU enabled. Mar 22 16:31:40 jik5.kamens.us kernel: rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. Mar 22 16:31:40 jik5.kamens.us kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 22 16:31:40 jik5.kamens.us kernel: NR_IRQS: 524544, nr_irqs: 2048, preallocated irqs: 16 Mar 22 16:31:40 jik5.kamens.us kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 22 16:31:40 jik5.kamens.us kernel: spurious 8259A interrupt: IRQ7. Mar 22 16:31:40 jik5.kamens.us kernel: Console: colour dummy device 80x25 Mar 22 16:31:40 jik5.kamens.us kernel: printk: console [tty0] enabled Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Core revision 20220331 Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Mar 22 16:31:40 jik5.kamens.us kernel: APIC: Switch to symmetric I/O mode setup Mar 22 16:31:40 jik5.kamens.us kernel: DMAR: Host address width 39 Mar 22 16:31:40 jik5.kamens.us kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x1 Mar 22 16:31:40 jik5.kamens.us kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap d2008c40660462 ecap f050da Mar 22 16:31:40 jik5.kamens.us kernel: DMAR: RMRR base: 0x0000008ed60000 end: 0x0000008ed7ffff Mar 22 16:31:40 jik5.kamens.us kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed90000 IOMMU 0 Mar 22 16:31:40 jik5.kamens.us kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed90000 Mar 22 16:31:40 jik5.kamens.us kernel: DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. Mar 22 16:31:40 jik5.kamens.us kernel: DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. Mar 22 16:31:40 jik5.kamens.us kernel: DMAR-IR: Enabled IRQ remapping in xapic mode Mar 22 16:31:40 jik5.kamens.us kernel: x2apic: IRQ remapping doesn't support X2APIC mode Mar 22 16:31:40 jik5.kamens.us kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x73509d9fa88, max_idle_ns: 881590914879 ns Mar 22 16:31:40 jik5.kamens.us kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7999.96 BogoMIPS (lpj=15999936) Mar 22 16:31:40 jik5.kamens.us kernel: pid_max: default: 32768 minimum: 301 Mar 22 16:31:40 jik5.kamens.us kernel: LSM: Security Framework initializing Mar 22 16:31:40 jik5.kamens.us kernel: landlock: Up and running. Mar 22 16:31:40 jik5.kamens.us kernel: Yama: becoming mindful. Mar 22 16:31:40 jik5.kamens.us kernel: AppArmor: AppArmor initialized Mar 22 16:31:40 jik5.kamens.us kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: x86/cpu: SGX disabled by BIOS. Mar 22 16:31:40 jik5.kamens.us kernel: CPU0: Thermal monitoring enabled (TM1) Mar 22 16:31:40 jik5.kamens.us kernel: process: using mwait in idle threads Mar 22 16:31:40 jik5.kamens.us kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 22 16:31:40 jik5.kamens.us kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Mar 22 16:31:40 jik5.kamens.us kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 22 16:31:40 jik5.kamens.us kernel: Spectre V2 : Mitigation: IBRS Mar 22 16:31:40 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 22 16:31:40 jik5.kamens.us kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 22 16:31:40 jik5.kamens.us kernel: RETBleed: Mitigation: IBRS Mar 22 16:31:40 jik5.kamens.us kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 22 16:31:40 jik5.kamens.us kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 22 16:31:40 jik5.kamens.us kernel: MDS: Mitigation: Clear CPU buffers Mar 22 16:31:40 jik5.kamens.us kernel: TAA: Mitigation: TSX disabled Mar 22 16:31:40 jik5.kamens.us kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Mar 22 16:31:40 jik5.kamens.us kernel: SRBDS: Mitigation: Microcode Mar 22 16:31:40 jik5.kamens.us kernel: Freeing SMP alternatives memory: 44K Mar 22 16:31:40 jik5.kamens.us kernel: smpboot: CPU0: Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz (family: 0x6, model: 0x5e, stepping: 0x3) Mar 22 16:31:40 jik5.kamens.us kernel: cblist_init_generic: Setting adjustable number of callback queues. Mar 22 16:31:40 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:31:40 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:31:40 jik5.kamens.us kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Mar 22 16:31:40 jik5.kamens.us kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Mar 22 16:31:40 jik5.kamens.us kernel: ... version: 4 Mar 22 16:31:40 jik5.kamens.us kernel: ... bit width: 48 Mar 22 16:31:40 jik5.kamens.us kernel: ... generic registers: 4 Mar 22 16:31:40 jik5.kamens.us kernel: ... value mask: 0000ffffffffffff Mar 22 16:31:40 jik5.kamens.us kernel: ... max period: 00007fffffffffff Mar 22 16:31:40 jik5.kamens.us kernel: ... fixed-purpose events: 3 Mar 22 16:31:40 jik5.kamens.us kernel: ... event mask: 000000070000000f Mar 22 16:31:40 jik5.kamens.us kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1024 Mar 22 16:31:40 jik5.kamens.us kernel: rcu: Hierarchical SRCU implementation. Mar 22 16:31:40 jik5.kamens.us kernel: rcu: Max phase no-delay instances is 1000. Mar 22 16:31:40 jik5.kamens.us kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Mar 22 16:31:40 jik5.kamens.us kernel: smp: Bringing up secondary CPUs ... Mar 22 16:31:40 jik5.kamens.us kernel: x86: Booting SMP configuration: Mar 22 16:31:40 jik5.kamens.us kernel: .... node #0, CPUs: #1 #2 #3 #4 Mar 22 16:31:40 jik5.kamens.us kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 22 16:31:40 jik5.kamens.us kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 22 16:31:40 jik5.kamens.us kernel: #5 #6 #7 Mar 22 16:31:40 jik5.kamens.us kernel: smp: Brought up 1 node, 8 CPUs Mar 22 16:31:40 jik5.kamens.us kernel: smpboot: Max logical packages: 1 Mar 22 16:31:40 jik5.kamens.us kernel: smpboot: Total of 8 processors activated (63999.74 BogoMIPS) Mar 22 16:31:40 jik5.kamens.us kernel: devtmpfs: initialized Mar 22 16:31:40 jik5.kamens.us kernel: x86/mm: Memory block size: 128MB Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8a871000-0x8a871fff] (4096 bytes) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8f022000-0x8f583fff] (5644288 bytes) Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Mar 22 16:31:40 jik5.kamens.us kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: pinctrl core: initialized pinctrl subsystem Mar 22 16:31:40 jik5.kamens.us kernel: PM: RTC time: 20:31:17, date: 2023-03-22 Mar 22 16:31:40 jik5.kamens.us kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 22 16:31:40 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Mar 22 16:31:40 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 22 16:31:40 jik5.kamens.us kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 22 16:31:40 jik5.kamens.us kernel: audit: initializing netlink subsys (disabled) Mar 22 16:31:40 jik5.kamens.us kernel: audit: type=2000 audit(1679517077.056:1): state=initialized audit_enabled=0 res=1 Mar 22 16:31:40 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 22 16:31:40 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'bang_bang' Mar 22 16:31:40 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 22 16:31:40 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'user_space' Mar 22 16:31:40 jik5.kamens.us kernel: thermal_sys: Registered thermal governor 'power_allocator' Mar 22 16:31:40 jik5.kamens.us kernel: EISA bus registered Mar 22 16:31:40 jik5.kamens.us kernel: cpuidle: using governor ladder Mar 22 16:31:40 jik5.kamens.us kernel: cpuidle: using governor menu Mar 22 16:31:40 jik5.kamens.us kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 22 16:31:40 jik5.kamens.us kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Mar 22 16:31:40 jik5.kamens.us kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Mar 22 16:31:40 jik5.kamens.us kernel: PCI: Using configuration type 1 for base access Mar 22 16:31:40 jik5.kamens.us kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Mar 22 16:31:40 jik5.kamens.us kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 22 16:31:40 jik5.kamens.us kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 22 16:31:40 jik5.kamens.us kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 22 16:31:40 jik5.kamens.us kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 22 16:31:40 jik5.kamens.us kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 22 16:31:40 jik5.kamens.us kernel: fbcon: Taking over console Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Added _OSI(Module Device) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Device) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: 8 ACPI AML tables successfully acquired and loaded Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF9440410E5800 0007AA (v02 PmRef Cpu0Ist 00003000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF94404110AC00 00037F (v02 PmRef Cpu0Cst 00003001 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF9440410E2000 0005AA (v02 PmRef ApIst 00003000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Dynamic OEM Table Load: Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: SSDT 0xFFFF944040947E00 000119 (v02 PmRef ApCst 00003000 INTL 20120913) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Interpreter enabled Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Using IOAPIC for interrupt routing Mar 22 16:31:40 jik5.kamens.us kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 22 16:31:40 jik5.kamens.us kernel: PCI: Using E820 reservations for host bridge windows Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: Enabled 8 GPEs in block 00 to 7F Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [PG00] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [PG01] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [PG02] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [WRST] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [FN00] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [FN01] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [FN02] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [FN03] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PM: Power Resource [FN04] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Mar 22 16:31:40 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 22 16:31:40 jik5.kamens.us kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] Mar 22 16:31:40 jik5.kamens.us kernel: PCI host bridge to bus 0000:00 Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000effff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:00.0: [8086:191f] type 00 class 0x060000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:14.0: [8086:a12f] type 00 class 0x0c0330 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:14.0: reg 0x10: [mem 0xdf310000-0xdf31ffff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:14.2: [8086:a131] type 00 class 0x118000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:14.2: reg 0x10: [mem 0xdf32e000-0xdf32efff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:16.0: [8086:a13a] type 00 class 0x078000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:16.0: reg 0x10: [mem 0xdf32d000-0xdf32dfff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:16.0: PME# supported from D3hot Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: [8086:a102] type 00 class 0x010601 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x10: [mem 0xdf328000-0xdf329fff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x14: [mem 0xdf32c000-0xdf32c0ff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x18: [io 0xf050-0xf057] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x1c: [io 0xf040-0xf043] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x20: [io 0xf020-0xf03f] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: reg 0x24: [mem 0xdf32b000-0xdf32b7ff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:17.0: PME# supported from D3hot Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: [8086:a114] type 01 class 0x060400 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.5: [8086:a115] type 01 class 0x060400 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.6: [8086:a116] type 01 class 0x060400 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.0: [8086:a145] type 00 class 0x060100 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.2: [8086:a121] type 00 class 0x058000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.2: reg 0x10: [mem 0xdf324000-0xdf327fff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.3: [8086:a170] type 00 class 0x040300 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xdf320000-0xdf323fff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.3: reg 0x20: [mem 0xdf300000-0xdf30ffff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.4: [8086:a123] type 00 class 0x0c0500 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x10: [mem 0xdf32a000-0xdf32a0ff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.4: reg 0x20: [io 0xf000-0xf01f] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: [10de:13c2] type 00 class 0x030000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x10: [mem 0xde000000-0xdeffffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x14: [mem 0xc0000000-0xcfffffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xd0000000-0xd1ffffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: reg 0x30: [mem 0xdf000000-0xdf07ffff pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: BAR 1: assigned to efifb Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: 32.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s PCIe x16 link at 0000:00:01.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.1: [10de:0fbb] type 00 class 0x040300 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.1: reg 0x10: [mem 0xdf080000-0xdf083fff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: ASPM: current common clock configuration is inconsistent, reconfiguring Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:02:00.0: [10ec:8168] type 00 class 0x020000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x10: [io 0xd000-0xd0ff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x18: [mem 0xdf200000-0xdf200fff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:02:00.0: reg 0x20: [mem 0xd2100000-0xd2103fff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:02:00.0: supports D1 D2 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:03:00.0: [8086:095a] type 00 class 0x028000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:03:00.0: reg 0x10: [mem 0xdf100000-0xdf101fff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 11 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 11 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 11 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 22 16:31:40 jik5.kamens.us kernel: iommu: Default domain type: Translated Mar 22 16:31:40 jik5.kamens.us kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 22 16:31:40 jik5.kamens.us kernel: SCSI subsystem initialized Mar 22 16:31:40 jik5.kamens.us kernel: libata version 3.00 loaded. Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: bus type USB registered Mar 22 16:31:40 jik5.kamens.us kernel: usbcore: registered new interface driver usbfs Mar 22 16:31:40 jik5.kamens.us kernel: usbcore: registered new interface driver hub Mar 22 16:31:40 jik5.kamens.us kernel: usbcore: registered new device driver usb Mar 22 16:31:40 jik5.kamens.us kernel: pps_core: LinuxPPS API ver. 1 registered Mar 22 16:31:40 jik5.kamens.us kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 22 16:31:40 jik5.kamens.us kernel: PTP clock support registered Mar 22 16:31:40 jik5.kamens.us kernel: EDAC MC: Ver: 3.0.0 Mar 22 16:31:40 jik5.kamens.us kernel: Registered efivars operations Mar 22 16:31:40 jik5.kamens.us kernel: NetLabel: Initializing Mar 22 16:31:40 jik5.kamens.us kernel: NetLabel: domain hash size = 128 Mar 22 16:31:40 jik5.kamens.us kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 22 16:31:40 jik5.kamens.us kernel: NetLabel: unlabeled traffic allowed by default Mar 22 16:31:40 jik5.kamens.us kernel: mctp: management component transport protocol core Mar 22 16:31:40 jik5.kamens.us kernel: NET: Registered PF_MCTP protocol family Mar 22 16:31:40 jik5.kamens.us kernel: PCI: Using ACPI for IRQ routing Mar 22 16:31:40 jik5.kamens.us kernel: PCI: pci_cache_line_size set to 64 bytes Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x89217018-0x8bffffff] Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8a871000-0x8bffffff] Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8c99e000-0x8fffffff] Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8e52c000-0x8fffffff] Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x8faff000-0x8fffffff] Mar 22 16:31:40 jik5.kamens.us kernel: e820: reserve RAM buffer [mem 0x46f000000-0x46fffffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: setting as boot VGA device Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: bridge control possible Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 22 16:31:40 jik5.kamens.us kernel: vgaarb: loaded Mar 22 16:31:40 jik5.kamens.us kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Mar 22 16:31:40 jik5.kamens.us kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc-early Mar 22 16:31:40 jik5.kamens.us kernel: VFS: Disk quotas dquot_6.6.0 Mar 22 16:31:40 jik5.kamens.us kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 22 16:31:40 jik5.kamens.us kernel: AppArmor: AppArmor Filesystem Enabled Mar 22 16:31:40 jik5.kamens.us kernel: pnp: PnP ACPI init Mar 22 16:31:40 jik5.kamens.us kernel: system 00:00: [io 0x0a00-0x0a1f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:00: [io 0x0a40-0x0a4f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:00: [io 0x0a50-0x0a5f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:03: [io 0x0680-0x069f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:03: [io 0xffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:03: [io 0x1800-0x18fe] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:03: [io 0x164e-0x164f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:04: [io 0x0800-0x087f] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:06: [io 0x1854-0x1857] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xfed10000-0xfed17fff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xfed18000-0xfed18fff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xfed19000-0xfed19fff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xe0000000-0xefffffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xfed20000-0xfed3ffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xfed90000-0xfed93fff] could not be reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xfed45000-0xfed8ffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xfee00000-0xfeefffff] could not be reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:07: [mem 0xdffe0000-0xdfffffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:08: [mem 0xfd000000-0xfdabffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:08: [mem 0xfdad0000-0xfdadffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:08: [mem 0xfdb00000-0xfdffffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:08: [mem 0xfe000000-0xfe01ffff] could not be reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:08: [mem 0xfe036000-0xfe03bfff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:08: [mem 0xfe03d000-0xfe3fffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:08: [mem 0xfe410000-0xfe7fffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:09: [io 0xff00-0xfffe] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:0a: [mem 0xfdaf0000-0xfdafffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:0a: [mem 0xfdae0000-0xfdaeffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: system 00:0a: [mem 0xfdac0000-0xfdacffff] has been reserved Mar 22 16:31:40 jik5.kamens.us kernel: pnp: PnP ACPI: found 11 devices Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 22 16:31:40 jik5.kamens.us kernel: NET: Registered PF_INET protocol family Mar 22 16:31:40 jik5.kamens.us kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: TCP: Hash tables configured (established 131072 bind 65536) Mar 22 16:31:40 jik5.kamens.us kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Mar 22 16:31:40 jik5.kamens.us kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 22 16:31:40 jik5.kamens.us kernel: NET: Registered PF_XDP protocol family Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xde000000-0xdf0fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:01.0: bridge window [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [io 0xd000-0xdfff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xdf200000-0xdf2fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.0: bridge window [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.5: bridge window [mem 0xdf100000-0xdf1fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000effff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:00: resource 8 [mem 0xfd000000-0xfe7fffff window] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:01: resource 1 [mem 0xde000000-0xdf0fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:01: resource 2 [mem 0xc0000000-0xd1ffffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:02: resource 0 [io 0xd000-0xdfff] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:02: resource 1 [mem 0xdf200000-0xdf2fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:02: resource 2 [mem 0xd2100000-0xd21fffff 64bit pref] Mar 22 16:31:40 jik5.kamens.us kernel: pci_bus 0000:03: resource 1 [mem 0xdf100000-0xdf1fffff] Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:14.0: quirk_usb_early_handoff+0x0/0x170 took 141341 usecs Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0 Mar 22 16:31:40 jik5.kamens.us kernel: PCI: CLS 0 bytes, default 64 Mar 22 16:31:40 jik5.kamens.us kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 22 16:31:40 jik5.kamens.us kernel: software IO TLB: mapped [mem 0x0000000085217000-0x0000000089217000] (64MB) Mar 22 16:31:40 jik5.kamens.us kernel: Trying to unpack rootfs image as initramfs... Mar 22 16:31:40 jik5.kamens.us kernel: Initialise system trusted keyrings Mar 22 16:31:40 jik5.kamens.us kernel: Key type blacklist registered Mar 22 16:31:40 jik5.kamens.us kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Mar 22 16:31:40 jik5.kamens.us kernel: zbud: loaded Mar 22 16:31:40 jik5.kamens.us kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 22 16:31:40 jik5.kamens.us kernel: fuse: init (API version 7.37) Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Platform Keyring initialized Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Machine keyring initialized Mar 22 16:31:40 jik5.kamens.us kernel: Key type asymmetric registered Mar 22 16:31:40 jik5.kamens.us kernel: Asymmetric key parser 'x509' registered Mar 22 16:31:40 jik5.kamens.us kernel: Freeing initrd memory: 126256K Mar 22 16:31:40 jik5.kamens.us kernel: alg: self-tests for CTR-KDF (hmac(sha256)) passed Mar 22 16:31:40 jik5.kamens.us kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) Mar 22 16:31:40 jik5.kamens.us kernel: io scheduler mq-deadline registered Mar 22 16:31:40 jik5.kamens.us kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Mar 22 16:31:40 jik5.kamens.us kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 122 Mar 22 16:31:40 jik5.kamens.us kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 122 Mar 22 16:31:40 jik5.kamens.us kernel: pcieport 0000:00:1c.5: PME: Signaling with IRQ 123 Mar 22 16:31:40 jik5.kamens.us kernel: pcieport 0000:00:1c.5: AER: enabled with IRQ 123 Mar 22 16:31:40 jik5.kamens.us kernel: pcieport 0000:00:1c.6: PME: Signaling with IRQ 124 Mar 22 16:31:40 jik5.kamens.us kernel: pcieport 0000:00:1c.6: AER: enabled with IRQ 124 Mar 22 16:31:40 jik5.kamens.us kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 22 16:31:40 jik5.kamens.us kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: button: Sleep Button [SLPB] Mar 22 16:31:40 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: button: Power Button [PWRB] Mar 22 16:31:40 jik5.kamens.us kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: button: Power Button [PWRF] Mar 22 16:31:40 jik5.kamens.us kernel: thermal LNXTHERM:00: registered as thermal_zone0 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Mar 22 16:31:40 jik5.kamens.us kernel: thermal LNXTHERM:01: registered as thermal_zone1 Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: thermal: Thermal Zone [TZ01] (30 C) Mar 22 16:31:40 jik5.kamens.us kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Mar 22 16:31:40 jik5.kamens.us kernel: Linux agpgart interface v0.103 Mar 22 16:31:40 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:31:40 jik5.kamens.us kernel: tpm_crb MSFT0101:00: [Firmware Bug]: ACPI region does not cover the entire command/response buffer. [mem 0xfed40000-0xfed4087f flags 0x200] vs fed40080 f80 Mar 22 16:31:40 jik5.kamens.us kernel: loop: module loaded Mar 22 16:31:40 jik5.kamens.us kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 22 16:31:40 jik5.kamens.us kernel: PPP generic driver version 2.4.2 Mar 22 16:31:40 jik5.kamens.us kernel: VFIO - User Level meta-driver version: 0.3 Mar 22 16:31:40 jik5.kamens.us kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 Mar 22 16:31:40 jik5.kamens.us kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 22 16:31:40 jik5.kamens.us kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 22 16:31:40 jik5.kamens.us kernel: mousedev: PS/2 mouse device common for all mice Mar 22 16:31:40 jik5.kamens.us kernel: rtc_cmos 00:05: RTC can wake from S4 Mar 22 16:31:40 jik5.kamens.us kernel: rtc_cmos 00:05: registered as rtc0 Mar 22 16:31:40 jik5.kamens.us kernel: rtc_cmos 00:05: setting system clock to 2023-03-22T20:31:18 UTC (1679517078) Mar 22 16:31:40 jik5.kamens.us kernel: rtc_cmos 00:05: alarms up to one month, y3k, 242 bytes nvram Mar 22 16:31:40 jik5.kamens.us kernel: i2c_dev: i2c /dev entries driver Mar 22 16:31:40 jik5.kamens.us kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 22 16:31:40 jik5.kamens.us kernel: device-mapper: uevent: version 1.0.3 Mar 22 16:31:40 jik5.kamens.us kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Probing EISA bus 0 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 1 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 2 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 3 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 4 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 5 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 6 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 7 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: Cannot allocate resource for EISA slot 8 Mar 22 16:31:40 jik5.kamens.us kernel: platform eisa.0: EISA: Detected 0 cards Mar 22 16:31:40 jik5.kamens.us kernel: intel_pstate: Intel P-state driver initializing Mar 22 16:31:40 jik5.kamens.us kernel: intel_pstate: HWP enabled Mar 22 16:31:40 jik5.kamens.us kernel: ledtrig-cpu: registered to indicate activity on CPUs Mar 22 16:31:40 jik5.kamens.us kernel: efifb: probing for efifb Mar 22 16:31:40 jik5.kamens.us kernel: efifb: showing boot graphics Mar 22 16:31:40 jik5.kamens.us kernel: efifb: framebuffer at 0xc0000000, using 8640k, total 8640k Mar 22 16:31:40 jik5.kamens.us kernel: efifb: mode is 1920x1080x32, linelength=8192, pages=1 Mar 22 16:31:40 jik5.kamens.us kernel: efifb: scrolling: redraw Mar 22 16:31:40 jik5.kamens.us kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 22 16:31:40 jik5.kamens.us kernel: Console: switching to colour frame buffer device 240x67 Mar 22 16:31:40 jik5.kamens.us kernel: fb0: EFI VGA frame buffer device Mar 22 16:31:40 jik5.kamens.us kernel: intel_pmc_core INT33A1:00: initialized Mar 22 16:31:40 jik5.kamens.us kernel: drop_monitor: Initializing network drop monitor service Mar 22 16:31:40 jik5.kamens.us kernel: NET: Registered PF_INET6 protocol family Mar 22 16:31:40 jik5.kamens.us kernel: Segment Routing with IPv6 Mar 22 16:31:40 jik5.kamens.us kernel: In-situ OAM (IOAM) with IPv6 Mar 22 16:31:40 jik5.kamens.us kernel: NET: Registered PF_PACKET protocol family Mar 22 16:31:40 jik5.kamens.us kernel: Key type dns_resolver registered Mar 22 16:31:40 jik5.kamens.us kernel: microcode: sig=0x506e3, pf=0x2, revision=0xf0 Mar 22 16:31:40 jik5.kamens.us kernel: microcode: Microcode Update Driver: v2.2. Mar 22 16:31:40 jik5.kamens.us kernel: IPI shorthand broadcast: enabled Mar 22 16:31:40 jik5.kamens.us kernel: sched_clock: Marking stable (1001093757, 392654)->(1008373595, -6887184) Mar 22 16:31:40 jik5.kamens.us kernel: registered taskstats version 1 Mar 22 16:31:40 jik5.kamens.us kernel: Loading compiled-in X.509 certificates Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c899a6cf9ea20e2e5e89348cc5dcf2fe9c8c20b9' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Loading compiled-in revocation X.509 certificates Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' Mar 22 16:31:40 jik5.kamens.us kernel: zswap: loaded using pool lzo/zbud Mar 22 16:31:40 jik5.kamens.us kernel: Key type .fscrypt registered Mar 22 16:31:40 jik5.kamens.us kernel: Key type fscrypt-provisioning registered Mar 22 16:31:40 jik5.kamens.us kernel: Key type trusted registered Mar 22 16:31:40 jik5.kamens.us kernel: Key type encrypted registered Mar 22 16:31:40 jik5.kamens.us kernel: AppArmor: AppArmor sha1 policy hashing enabled Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer: c4f0474ae6b5e67a509d99132f49a4ec13f7ac68' Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Acer Database: 84f00f5841571abd2cc11a8c26d5c9c8d2b6b0b5' Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loading X.509 certificate: UEFI:db Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Acer Database Forbidden: 9de028a2638669f109745d3e2a7ad5c9e64ed392' Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' Mar 22 16:31:40 jik5.kamens.us kernel: integrity: Revoking X.509 certificate: UEFI:dbx Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Revoked X.509 cert 'Debian Secure Boot Signer: 00a7468def' Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:31:40 jik5.kamens.us kernel: blacklist: Problem blacklisting hash (-13) Mar 22 16:31:40 jik5.kamens.us kernel: Loading compiled-in module X.509 certificates Mar 22 16:31:40 jik5.kamens.us kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c899a6cf9ea20e2e5e89348cc5dcf2fe9c8c20b9' Mar 22 16:31:40 jik5.kamens.us kernel: ima: Allocated hash algorithm: sha1 Mar 22 16:31:40 jik5.kamens.us kernel: ima: No architecture policies found Mar 22 16:31:40 jik5.kamens.us kernel: evm: Initialising EVM extended attributes: Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.selinux Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.SMACK64 Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.SMACK64EXEC Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.SMACK64TRANSMUTE Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.SMACK64MMAP Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.apparmor Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.ima Mar 22 16:31:40 jik5.kamens.us kernel: evm: security.capability Mar 22 16:31:40 jik5.kamens.us kernel: evm: HMAC attrs: 0x1 Mar 22 16:31:40 jik5.kamens.us kernel: PM: Magic number: 15:235:549 Mar 22 16:31:40 jik5.kamens.us kernel: tty ttyS25: hash matches Mar 22 16:31:40 jik5.kamens.us kernel: clockevents clockevent0: hash matches Mar 22 16:31:40 jik5.kamens.us kernel: acpi PNP0C0F:00: hash matches Mar 22 16:31:40 jik5.kamens.us kernel: RAS: Correctable Errors collector initialized. Mar 22 16:31:40 jik5.kamens.us kernel: Freeing unused decrypted memory: 2036K Mar 22 16:31:40 jik5.kamens.us kernel: Freeing unused kernel image (initmem) memory: 3188K Mar 22 16:31:40 jik5.kamens.us kernel: Write protecting the kernel read-only data: 38912k Mar 22 16:31:40 jik5.kamens.us kernel: Freeing unused kernel image (text/rodata gap) memory: 2036K Mar 22 16:31:40 jik5.kamens.us kernel: Freeing unused kernel image (rodata/data gap) memory: 692K Mar 22 16:31:40 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:31:40 jik5.kamens.us kernel: x86/mm: Checking user space page tables Mar 22 16:31:40 jik5.kamens.us kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 22 16:31:40 jik5.kamens.us kernel: Run /init as init process Mar 22 16:31:40 jik5.kamens.us kernel: with arguments: Mar 22 16:31:40 jik5.kamens.us kernel: /init Mar 22 16:31:40 jik5.kamens.us kernel: splash Mar 22 16:31:40 jik5.kamens.us kernel: with environment: Mar 22 16:31:40 jik5.kamens.us kernel: HOME=/ Mar 22 16:31:40 jik5.kamens.us kernel: TERM=linux Mar 22 16:31:40 jik5.kamens.us kernel: BOOT_IMAGE=/vmlinuz-6.1.0-16-generic Mar 22 16:31:40 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:31:40 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Mar 22 16:31:40 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810 Mar 22 16:31:40 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Mar 22 16:31:40 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Mar 22 16:31:40 jik5.kamens.us kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed Mar 22 16:31:40 jik5.kamens.us kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.01 Mar 22 16:31:40 jik5.kamens.us kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:31:40 jik5.kamens.us kernel: usb usb1: Product: xHCI Host Controller Mar 22 16:31:40 jik5.kamens.us kernel: usb usb1: Manufacturer: Linux 6.1.0-16-generic xhci-hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb usb1: SerialNumber: 0000:00:14.0 Mar 22 16:31:40 jik5.kamens.us kernel: hub 1-0:1.0: USB hub found Mar 22 16:31:40 jik5.kamens.us kernel: hub 1-0:1.0: 16 ports detected Mar 22 16:31:40 jik5.kamens.us kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.01 Mar 22 16:31:40 jik5.kamens.us kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 22 16:31:40 jik5.kamens.us kernel: usb usb2: Product: xHCI Host Controller Mar 22 16:31:40 jik5.kamens.us kernel: usb usb2: Manufacturer: Linux 6.1.0-16-generic xhci-hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb usb2: SerialNumber: 0000:00:14.0 Mar 22 16:31:40 jik5.kamens.us kernel: hub 2-0:1.0: USB hub found Mar 22 16:31:40 jik5.kamens.us kernel: hub 2-0:1.0: 10 ports detected Mar 22 16:31:40 jik5.kamens.us kernel: usb: port power management may be unreliable Mar 22 16:31:40 jik5.kamens.us kernel: ahci 0000:00:17.0: version 3.0 Mar 22 16:31:40 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Mar 22 16:31:40 jik5.kamens.us kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.1: [8086:a120] type 00 class 0x058000 Mar 22 16:31:40 jik5.kamens.us kernel: pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] Mar 22 16:31:40 jik5.kamens.us kernel: cryptd: max_cpu_qlen set to 1000 Mar 22 16:31:40 jik5.kamens.us kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Mar 22 16:31:40 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x51 Mar 22 16:31:40 jik5.kamens.us kernel: i2c i2c-0: Successfully instantiated SPD at 0x53 Mar 22 16:31:40 jik5.kamens.us kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 5 ports 6 Gbps 0x3d impl SATA mode Mar 22 16:31:40 jik5.kamens.us kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst Mar 22 16:31:40 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: RTL8168g/8111g, 98:ee:cb:23:9d:15, XID 4c0, IRQ 127 Mar 22 16:31:40 jik5.kamens.us kernel: r8169 0000:02:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] Mar 22 16:31:40 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: renamed from eth0 Mar 22 16:31:40 jik5.kamens.us kernel: scsi host0: ahci Mar 22 16:31:40 jik5.kamens.us kernel: scsi host1: ahci Mar 22 16:31:40 jik5.kamens.us kernel: scsi host2: ahci Mar 22 16:31:40 jik5.kamens.us kernel: scsi host3: ahci Mar 22 16:31:40 jik5.kamens.us kernel: scsi host4: ahci Mar 22 16:31:40 jik5.kamens.us kernel: scsi host5: ahci Mar 22 16:31:40 jik5.kamens.us kernel: ata1: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b100 irq 126 Mar 22 16:31:40 jik5.kamens.us kernel: ata2: DUMMY Mar 22 16:31:40 jik5.kamens.us kernel: ata3: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b200 irq 126 Mar 22 16:31:40 jik5.kamens.us kernel: ata4: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b280 irq 126 Mar 22 16:31:40 jik5.kamens.us kernel: ata5: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b300 irq 126 Mar 22 16:31:40 jik5.kamens.us kernel: ata6: SATA max UDMA/133 abar m2048@0xdf32b000 port 0xdf32b380 irq 126 Mar 22 16:31:40 jik5.kamens.us kernel: tsc: Refined TSC clocksource calibration: 4007.999 MHz Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39c5e149d3a, max_idle_ns: 440795336434 ns Mar 22 16:31:40 jik5.kamens.us kernel: clocksource: Switched to clocksource tsc Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:31:40 jik5.kamens.us kernel: ata6: SATA link up 3.0 Gbps (SStatus 123 SControl 300) Mar 22 16:31:40 jik5.kamens.us kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:31:40 jik5.kamens.us kernel: ata3.00: ATA-9: ST1000DM003-1ER162, CC45, max UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: ata3.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:31:40 jik5.kamens.us kernel: ata6.00: ATA-8: WDC WD5001AALS-00L3B2, 01.03B01, max UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: ata6.00: 976773168 sectors, multi 16: LBA48 NCQ (depth 32), AA Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-1: New USB device found, idVendor=04f9, idProduct=03b9, bcdDevice= 1.00 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-1: Product: ADS-2800W Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-1: Manufacturer: Brother Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-1: SerialNumber: U64278M7G198321 Mar 22 16:31:40 jik5.kamens.us kernel: ata4: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Mar 22 16:31:40 jik5.kamens.us kernel: ata6.00: configured for UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: ata1.00: ATA-9: LITEON CV1-8B128, G871201, max UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: ata1.00: 250069680 sectors, multi 2: LBA48 NCQ (depth 32), AA Mar 22 16:31:40 jik5.kamens.us kernel: ata1.00: Features: Dev-Sleep Mar 22 16:31:40 jik5.kamens.us kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Mar 22 16:31:40 jik5.kamens.us kernel: ata1.00: configured for UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: scsi 0:0:0:0: Direct-Access ATA LITEON CV1-8B128 201 PQ: 0 ANSI: 5 Mar 22 16:31:40 jik5.kamens.us kernel: ata4.00: ATAPI: HL-DT-ST DVDRAM GHC0N, 1.00, max UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 0 Mar 22 16:31:40 jik5.kamens.us kernel: sd 0:0:0:0: [sda] 250069680 512-byte logical blocks: (128 GB/119 GiB) Mar 22 16:31:40 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 22 16:31:40 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Mar 22 16:31:40 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:31:40 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes Mar 22 16:31:40 jik5.kamens.us kernel: ata4.00: configured for UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: ATA-9: Samsung SSD 850 EVO 1TB, EMT01B6Q, max UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: 1953525168 sectors, multi 1: LBA48 NCQ (depth 32), AA Mar 22 16:31:40 jik5.kamens.us kernel: ata3.00: configured for UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: scsi 2:0:0:0: Direct-Access ATA ST1000DM003-1ER1 CC45 PQ: 0 ANSI: 5 Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] 4096-byte physical blocks Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write Protect is off Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Mar 22 16:31:40 jik5.kamens.us kernel: scsi 3:0:0:0: CD-ROM HL-DT-ST DVDRAM GHC0N 1.00 PQ: 0 ANSI: 5 Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: Features: Trust Dev-Sleep Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: supports DRM functions and may not be fully accessible Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: NCQ Send/Recv Log not supported Mar 22 16:31:40 jik5.kamens.us kernel: sda: Mar 22 16:31:40 jik5.kamens.us kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 22 16:31:40 jik5.kamens.us kernel: ata5.00: configured for UDMA/133 Mar 22 16:31:40 jik5.kamens.us kernel: sdb: Mar 22 16:31:40 jik5.kamens.us kernel: sd 2:0:0:0: [sdb] Attached SCSI disk Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-2: new full-speed USB device number 3 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: sr 3:0:0:0: [sr0] scsi3-mmc drive: 40x/12x writer dvd-ram cd/rw xa/form2 cdda tray Mar 22 16:31:40 jik5.kamens.us kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 22 16:31:40 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi CD-ROM sr0 Mar 22 16:31:40 jik5.kamens.us kernel: sr 3:0:0:0: Attached scsi generic sg2 type 5 Mar 22 16:31:40 jik5.kamens.us kernel: scsi 4:0:0:0: Direct-Access ATA Samsung SSD 850 1B6Q PQ: 0 ANSI: 5 Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: Attached scsi generic sg3 type 0 Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write Protect is off Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Mode Sense: 00 3a 00 00 Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Preferred minimum I/O size 512 bytes Mar 22 16:31:40 jik5.kamens.us kernel: scsi 5:0:0:0: Direct-Access ATA WDC WD5001AALS-0 3B01 PQ: 0 ANSI: 5 Mar 22 16:31:40 jik5.kamens.us kernel: sd 5:0:0:0: Attached scsi generic sg4 type 0 Mar 22 16:31:40 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] 976773168 512-byte logical blocks: (500 GB/466 GiB) Mar 22 16:31:40 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write Protect is off Mar 22 16:31:40 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Mode Sense: 00 3a 00 00 Mar 22 16:31:40 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 22 16:31:40 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Preferred minimum I/O size 512 bytes Mar 22 16:31:40 jik5.kamens.us kernel: sdc: sdc1 sdc2 sdc3 Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] supports TCG Opal Mar 22 16:31:40 jik5.kamens.us kernel: sd 4:0:0:0: [sdc] Attached SCSI disk Mar 22 16:31:40 jik5.kamens.us kernel: sd 5:0:0:0: [sdd] Attached SCSI disk Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-2: New USB device found, idVendor=0b0e, idProduct=2467, bcdDevice= 2.10 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-2: New USB device strings: Mfr=0, Product=2, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-2: Product: Jabra Evolve 75 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-3: new full-speed USB device number 4 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-3: New USB device found, idVendor=0764, idProduct=0501, bcdDevice= 2.00 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-3: New USB device strings: Mfr=3, Product=1, SerialNumber=2 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-3: Product: AVRG750U Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-3: Manufacturer: CPS Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-3: SerialNumber: BHBGV2000445 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-6: new low-speed USB device number 5 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-6: New USB device found, idVendor=0bc7, idProduct=0002, bcdDevice= 1.00 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-6: Product: USB Transceiver Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-6: Manufacturer: X10 Wireless Technology Inc Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7: new high-speed USB device number 6 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7: Product: USB 2.0 Hub Mar 22 16:31:40 jik5.kamens.us kernel: hub 1-7:1.0: USB hub found Mar 22 16:31:40 jik5.kamens.us kernel: hub 1-7:1.0: 4 ports detected Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-9: new high-speed USB device number 7 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-9: New USB device found, idVendor=0bda, idProduct=0153, bcdDevice=57.13 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-9: Product: USB2.0-CRW Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-9: Manufacturer: Generic Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-9: SerialNumber: 20120926571200000 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.1: new full-speed USB device number 8 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.1: New USB device found, idVendor=0b0e, idProduct=245d, bcdDevice= 1.48 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.1: Product: Jabra Link 370 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.1: SerialNumber: 70BF92C25E96 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-10: new full-speed USB device number 9 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-10: New USB device found, idVendor=8087, idProduct=0a2a, bcdDevice= 0.01 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-10: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: hid: raw HID events driver (C) Jiri Kosina Mar 22 16:31:40 jik5.kamens.us kernel: usbcore: registered new interface driver usb-storage Mar 22 16:31:40 jik5.kamens.us kernel: usbcore: registered new interface driver uas Mar 22 16:31:40 jik5.kamens.us kernel: ums-realtek 1-9:1.0: USB Mass Storage device detected Mar 22 16:31:40 jik5.kamens.us kernel: scsi host6: usb-storage 1-9:1.0 Mar 22 16:31:40 jik5.kamens.us kernel: usbcore: registered new interface driver ums-realtek Mar 22 16:31:40 jik5.kamens.us kernel: usbcore: registered new interface driver usbhid Mar 22 16:31:40 jik5.kamens.us kernel: usbhid: USB HID core driver Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:0764:0501.0002: hiddev0,hidraw0: USB HID v1.10 Device [CPS AVRG750U] on usb-0000:00:14.0-3/input0 Mar 22 16:31:40 jik5.kamens.us kernel: input: Jabra Evolve 75 as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0/0003:0B0E:2467.0001/input/input6 Mar 22 16:31:40 jik5.kamens.us kernel: jabra 0003:0B0E:2467.0001: input,hiddev1,hidraw1: USB HID v1.11 Device [Jabra Evolve 75] on usb-0000:00:14.0-2/input0 Mar 22 16:31:40 jik5.kamens.us kernel: input: Jabra Link 370 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.3/0003:0B0E:245D.0003/input/input7 Mar 22 16:31:40 jik5.kamens.us kernel: jabra 0003:0B0E:245D.0003: input,hiddev2,hidraw2: USB HID v1.11 Device [Jabra Link 370] on usb-0000:00:14.0-7.1/input3 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2: new high-speed USB device number 10 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2: New USB device found, idVendor=058f, idProduct=6254, bcdDevice= 1.00 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: hub 1-7.2:1.0: USB hub found Mar 22 16:31:40 jik5.kamens.us kernel: hub 1-7.2:1.0: 4 ports detected Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.4: new full-speed USB device number 11 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.4: New USB device found, idVendor=046d, idProduct=c52b, bcdDevice=12.10 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.4: Product: USB Receiver Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.4: Manufacturer: Logitech Mar 22 16:31:40 jik5.kamens.us kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.0/0003:046D:C52B.0004/input/input8 Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0004: input,hidraw3: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input0 Mar 22 16:31:40 jik5.kamens.us kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.1/0003:046D:C52B.0005/input/input9 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.1: new full-speed USB device number 12 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.1/0003:046D:C52B.0005/input/input10 Mar 22 16:31:40 jik5.kamens.us kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.1/0003:046D:C52B.0005/input/input11 Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0005: input,hiddev3,hidraw4: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input1 Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:046D:C52B.0006: hiddev4,hidraw5: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input2 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.1: New USB device found, idVendor=24f0, idProduct=0142, bcdDevice= 1.00 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.1: Product: Das Keyboard Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.1: Manufacturer: Metadot - Das Keyboard Mar 22 16:31:40 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.0/0003:24F0:0142.0007/input/input13 Mar 22 16:31:40 jik5.kamens.us kernel: scsi 6:0:0:0: Direct-Access Generic- SD/MMC/MS PRO 1.00 PQ: 0 ANSI: 4 Mar 22 16:31:40 jik5.kamens.us kernel: sd 6:0:0:0: Attached scsi generic sg5 type 0 Mar 22 16:31:40 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Media removed, stopped polling Mar 22 16:31:40 jik5.kamens.us kernel: sd 6:0:0:0: [sde] Attached SCSI removable disk Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0007: input,hidraw3: USB HID v1.10 Keyboard [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.2.1/input0 Mar 22 16:31:40 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.1/0003:24F0:0142.0008/input/input14 Mar 22 16:31:40 jik5.kamens.us kernel: input: Metadot - Das Keyboard Das Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.1/0003:24F0:0142.0008/input/input15 Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:24F0:0142.0008: input,hidraw6: USB HID v1.10 Device [Metadot - Das Keyboard Das Keyboard] on usb-0000:00:14.0-7.2.1/input1 Mar 22 16:31:40 jik5.kamens.us kernel: logitech-djreceiver 0003:046D:C52B.0006: hiddev3,hidraw4: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-7.4/input2 Mar 22 16:31:40 jik5.kamens.us kernel: input: Logitech Wireless Device PID:4051 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0009/input/input16 Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:046D:4051.0009: input,hidraw5: USB HID v1.11 Mouse [Logitech Wireless Device PID:4051] on usb-0000:00:14.0-7.4/input2:1 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.3: new full-speed USB device number 13 using xhci_hcd Mar 22 16:31:40 jik5.kamens.us kernel: input: Logitech M510 as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0009/input/input20 Mar 22 16:31:40 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0009: input,hidraw5: USB HID v1.11 Mouse [Logitech M510] on usb-0000:00:14.0-7.4/input2:1 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.3: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 5.43 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.3: Product: YubiKey OTP+FIDO+CCID Mar 22 16:31:40 jik5.kamens.us kernel: usb 1-7.2.3: Manufacturer: Yubico Mar 22 16:31:40 jik5.kamens.us kernel: input: Yubico YubiKey OTP+FIDO+CCID as /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.3/1-7.2.3:1.0/0003:1050:0407.000A/input/input21 Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000A: input,hidraw7: USB HID v1.10 Keyboard [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.2.3/input0 Mar 22 16:31:40 jik5.kamens.us kernel: hid-generic 0003:1050:0407.000B: hiddev4,hidraw8: USB HID v1.10 Device [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:00:14.0-7.2.3/input1 Mar 22 16:31:40 jik5.kamens.us kernel: EXT4-fs (dm-1): mounted filesystem with ordered data mode. Quota mode: none. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Inserted module 'autofs4' Mar 22 16:31:40 jik5.kamens.us systemd[1]: systemd 252.5-2ubuntu2 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 22 16:31:40 jik5.kamens.us systemd[1]: Detected architecture x86-64. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Hostname set to . Mar 22 16:31:40 jik5.kamens.us systemd[1]: Queued start job for default target graphical.target. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Created slice system-postfix.slice - Slice /system/postfix. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Created slice system-postgresql.slice - Slice /system/postgresql. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Created slice user.slice - User and Session Slice. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Reached target slices.target - Slice Units. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on rpcbind.socket - RPCbind Server Activation Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on syslog.socket - Syslog Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-journald.socket - Journal Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-oomd.socket - Userspace Out-Of-Memory (OOM) Killer Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-journald.service - Journal Service... Mar 22 16:31:40 jik5.kamens.us systemd[1]: auth-rpcgss-module.service - Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished blk-availability.service - Availability of block devices. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Mar 22 16:31:40 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Mar 22 16:31:40 jik5.kamens.us kernel: pstore: Using crash dump compression: deflate Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Mar 22 16:31:40 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Mar 22 16:31:40 jik5.kamens.us systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Mar 22 16:31:40 jik5.kamens.us systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Mar 22 16:31:40 jik5.kamens.us kernel: EXT4-fs (dm-1): re-mounted. Quota mode: none. Mar 22 16:31:40 jik5.kamens.us kernel: pstore: Registered efi as persistent store backend Mar 22 16:31:40 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Mar 22 16:31:40 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:40 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-sysusers.service - Create System Users... Mar 22 16:31:40 jik5.kamens.us kernel: ACPI: bus type drm_connector registered Mar 22 16:31:40 jik5.kamens.us systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Mar 22 16:31:40 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:40 jik5.kamens.us kernel: lp: driver loaded but no devices found Mar 22 16:31:40 jik5.kamens.us kernel: ppdev: user-space parallel port driver Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished systemd-sysusers.service - Create System Users. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Mar 22 16:31:40 jik5.kamens.us systemd-journald[679]: Journal started Mar 22 16:31:40 jik5.kamens.us systemd-journald[679]: Runtime Journal (/run/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 8.0M, max 159.5M, 151.5M free. Mar 22 16:31:40 jik5.kamens.us systemd-modules-load[695]: Inserted module 'lp' Mar 22 16:31:40 jik5.kamens.us systemd-modules-load[695]: Inserted module 'ppdev' Mar 22 16:31:40 jik5.kamens.us systemd-modules-load[695]: Inserted module 'parport_pc' Mar 22 16:31:40 jik5.kamens.us lvm[683]: 2 logical volume(s) in volume group "ubuntu-vg" monitored Mar 22 16:31:40 jik5.kamens.us systemd[1]: Started systemd-journald.service - Journal Service. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Mar 22 16:31:40 jik5.kamens.us systemd-journald[679]: Time spent on flushing to /var/log/journal/dca43d426a4043fd96f7351cc9f080c2 is 9.898ms for 1050 entries. Mar 22 16:31:40 jik5.kamens.us systemd-journald[679]: System Journal (/var/log/journal/dca43d426a4043fd96f7351cc9f080c2) is 1.3G, max 4.0G, 2.6G free. Mar 22 16:31:40 jik5.kamens.us systemd-journald[679]: Received client request to flush runtime journal. Mar 22 16:31:40 jik5.kamens.us systemd-journald[679]: File /var/log/journal/dca43d426a4043fd96f7351cc9f080c2/system.journal corrupted or uncleanly shut down, renaming and replacing. Mar 22 16:31:40 jik5.kamens.us kernel: loop0: detected capacity change from 0 to 8 Mar 22 16:31:40 jik5.kamens.us kernel: loop1: detected capacity change from 0 to 232672 Mar 22 16:31:40 jik5.kamens.us kernel: loop2: detected capacity change from 0 to 235144 Mar 22 16:31:40 jik5.kamens.us kernel: loop3: detected capacity change from 0 to 47368 Mar 22 16:31:40 jik5.kamens.us kernel: loop4: detected capacity change from 0 to 47328 Mar 22 16:31:40 jik5.kamens.us kernel: loop5: detected capacity change from 0 to 18352 Mar 22 16:31:40 jik5.kamens.us kernel: loop6: detected capacity change from 0 to 18352 Mar 22 16:31:40 jik5.kamens.us kernel: loop7: detected capacity change from 0 to 304168 Mar 22 16:31:40 jik5.kamens.us kernel: loop8: detected capacity change from 0 to 304168 Mar 22 16:31:40 jik5.kamens.us kernel: loop9: detected capacity change from 0 to 55568 Mar 22 16:31:40 jik5.kamens.us kernel: loop10: detected capacity change from 0 to 37776 Mar 22 16:31:40 jik5.kamens.us kernel: loop11: detected capacity change from 0 to 239176 Mar 22 16:31:40 jik5.kamens.us kernel: loop12: detected capacity change from 0 to 239128 Mar 22 16:31:40 jik5.kamens.us kernel: loop13: detected capacity change from 0 to 113896 Mar 22 16:31:40 jik5.kamens.us kernel: loop14: detected capacity change from 0 to 129608 Mar 22 16:31:40 jik5.kamens.us kernel: loop15: detected capacity change from 0 to 113888 Mar 22 16:31:40 jik5.kamens.us kernel: loop16: detected capacity change from 0 to 129672 Mar 22 16:31:40 jik5.kamens.us kernel: loop17: detected capacity change from 0 to 149312 Mar 22 16:31:40 jik5.kamens.us kernel: loop18: detected capacity change from 0 to 112848 Mar 22 16:31:40 jik5.kamens.us kernel: loop19: detected capacity change from 0 to 149312 Mar 22 16:31:40 jik5.kamens.us kernel: loop20: detected capacity change from 0 to 112704 Mar 22 16:31:40 jik5.kamens.us systemd-udevd[713]: Using default interface naming scheme 'v252'. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting home-macback-home-macback-backup.mount - /home/macback/home/macback/backup... Mar 22 16:31:40 jik5.kamens.us systemd-udevd[713]: Configuration file /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:31:40 jik5.kamens.us systemd-udevd[713]: /etc/udev/rules.d/60-brother-brscan4-libsane-type1.rules:9 Invalid key 'SYSFS' Mar 22 16:31:40 jik5.kamens.us systemd-udevd[713]: /etc/udev/rules.d/60-brother-libsane-type1.rules:17 Invalid key 'SYSFS' Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-bare-5.mount - Mount unit for bare, revision 5... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-bw-46.mount - Mount unit for bw, revision 46... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-bw-47.mount - Mount unit for bw, revision 47... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-chromium-2381.mount - Mount unit for chromium, revision 2381... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-chromium-2392.mount - Mount unit for chromium, revision 2392... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30... Mar 22 16:31:40 jik5.kamens.us kernel: loop21: detected capacity change from 0 to 494824 Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core-14784.mount - Mount unit for core, revision 14784... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core-14946.mount - Mount unit for core, revision 14946... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core18-2708.mount - Mount unit for core18, revision 2708... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core18-2714.mount - Mount unit for core18, revision 2714... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core20-1828.mount - Mount unit for core20, revision 1828... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core20-1852.mount - Mount unit for core20, revision 1852... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core22-522.mount - Mount unit for core22, revision 522... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-core22-547.mount - Mount unit for core22, revision 547... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-cups-836.mount - Mount unit for cups, revision 836... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-cups-872.mount - Mount unit for cups, revision 872... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-firefox-2432.mount - Mount unit for firefox, revision 2432... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-firefox-2487.mount - Mount unit for firefox, revision 2487... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104... Mar 22 16:31:40 jik5.kamens.us kernel: loop22: detected capacity change from 0 to 491264 Mar 22 16:31:40 jik5.kamens.us kernel: loop23: detected capacity change from 0 to 288072 Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72... Mar 22 16:31:40 jik5.kamens.us kernel: loop24: detected capacity change from 0 to 288120 Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77... Mar 22 16:31:40 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115... Mar 22 16:31:41 jik5.kamens.us kernel: loop25: detected capacity change from 0 to 333552 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65... Mar 22 16:31:41 jik5.kamens.us kernel: loop26: detected capacity change from 0 to 337424 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178... Mar 22 16:31:41 jik5.kamens.us kernel: loop28: detected capacity change from 0 to 709216 Mar 22 16:31:41 jik5.kamens.us kernel: loop30: detected capacity change from 0 to 709280 Mar 22 16:31:41 jik5.kamens.us kernel: loop27: detected capacity change from 0 to 448512 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534... Mar 22 16:31:41 jik5.kamens.us kernel: loop31: detected capacity change from 0 to 926512 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535... Mar 22 16:31:41 jik5.kamens.us kernel: loop29: detected capacity change from 0 to 448512 Mar 22 16:31:41 jik5.kamens.us systemd-udevd[766]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatch /module/rfkill 0:0' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us systemd-udevd[766]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_canonical-livepatch_canonical-livepatchd /module/rfkill 0:0' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us systemd-udevd[766]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /module/rfkill 0:0' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2... Mar 22 16:31:41 jik5.kamens.us systemd-udevd[766]: rfkill: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /module/rfkill 0:0' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us kernel: loop33: detected capacity change from 0 to 3048 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599... Mar 22 16:31:41 jik5.kamens.us kernel: loop35: detected capacity change from 0 to 166424 Mar 22 16:31:41 jik5.kamens.us kernel: loop32: detected capacity change from 0 to 942640 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49... Mar 22 16:31:41 jik5.kamens.us kernel: loop34: detected capacity change from 0 to 5208 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-vault-1930.mount - Mount unit for vault, revision 1930... Mar 22 16:31:41 jik5.kamens.us kernel: loop36: detected capacity change from 0 to 187776 Mar 22 16:31:41 jik5.kamens.us systemd-udevd[774]: dm-2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-2' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us systemd-udevd[776]: dm-1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-1' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us kernel: nvidia: loading out-of-tree module taints kernel. Mar 22 16:31:41 jik5.kamens.us kernel: nvidia: module license 'NVIDIA' taints kernel. Mar 22 16:31:41 jik5.kamens.us kernel: Disabling lock debugging due to kernel taint Mar 22 16:31:41 jik5.kamens.us lvm[803]: PV /dev/dm-0 online, VG ubuntu-vg is complete. Mar 22 16:31:41 jik5.kamens.us lvm[803]: VG ubuntu-vg finished Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting snap-vault-1958.mount - Mount unit for vault, revision 1958... Mar 22 16:31:41 jik5.kamens.us kernel: loop37: detected capacity change from 0 to 75960 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control... Mar 22 16:31:41 jik5.kamens.us kernel: loop38: detected capacity change from 0 to 94056 Mar 22 16:31:41 jik5.kamens.us kernel: loop39: detected capacity change from 0 to 94064 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Mar 22 16:31:41 jik5.kamens.us kernel: loop42: detected capacity change from 0 to 594024 Mar 22 16:31:41 jik5.kamens.us kernel: loop40: detected capacity change from 0 to 608 Mar 22 16:31:41 jik5.kamens.us kernel: loop41: detected capacity change from 0 to 864 Mar 22 16:31:41 jik5.kamens.us systemd-udevd[752]: event_source: Failed to get device name: No such file or directory Mar 22 16:31:41 jik5.kamens.us mtp-probe[821]: checking bus 1, device 7: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" Mar 22 16:31:41 jik5.kamens.us mtp-probe[822]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-2" Mar 22 16:31:41 jik5.kamens.us mtp-probe[821]: bus: 1, device: 7 was not an MTP device Mar 22 16:31:41 jik5.kamens.us kernel: loop43: detected capacity change from 0 to 594024 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted home-jik4back-home-jik4back-backup.mount - /home/jik4back/home/jik4back/backup. Mar 22 16:31:41 jik5.kamens.us mtp-probe[832]: checking bus 1, device 8: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1" Mar 22 16:31:41 jik5.kamens.us mtp-probe[822]: bus: 1, device: 3 was not an MTP device Mar 22 16:31:41 jik5.kamens.us systemd-udevd[752]: sdc: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us mtp-probe[840]: checking bus 1, device 11: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4" Mar 22 16:31:41 jik5.kamens.us kernel: nvidia-nvlink: Nvlink Core is being initialized, major device number 237 Mar 22 16:31:41 jik5.kamens.us mtp-probe[840]: bus: 1, device: 11 was not an MTP device Mar 22 16:31:41 jik5.kamens.us mtp-probe[832]: bus: 1, device: 8 was not an MTP device Mar 22 16:31:41 jik5.kamens.us kernel: Mar 22 16:31:41 jik5.kamens.us kernel: nvidia 0000:01:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem Mar 22 16:31:41 jik5.kamens.us mtp-probe[910]: checking bus 1, device 12: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1" Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted home-macback-home-macback-backup.mount - /home/macback/home/macback/backup. Mar 22 16:31:41 jik5.kamens.us mtp-probe[910]: bus: 1, device: 12 was not an MTP device Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-bare-5.mount - Mount unit for bare, revision 5. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-120.mount - Mount unit for bitcoin-core, revision 120. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-bitcoin\x2dcore-126.mount - Mount unit for bitcoin-core, revision 126. Mar 22 16:31:41 jik5.kamens.us systemd-udevd[773]: sda: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us kernel: NVRM: loading NVIDIA UNIX x86_64 Kernel Module 515.86.01 Wed Oct 26 09:12:38 UTC 2022 Mar 22 16:31:41 jik5.kamens.us systemd-udevd[769]: dm-0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/dm-0' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us mtp-probe[923]: checking bus 1, device 13: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.3" Mar 22 16:31:41 jik5.kamens.us systemd-udevd[748]: sdc3: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc3' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us mtp-probe[923]: bus: 1, device: 13 was not an MTP device Mar 22 16:31:41 jik5.kamens.us systemd-udevd[773]: sdc1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc1' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us mtp-probe[987]: checking bus 1, device 5: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-6" Mar 22 16:31:41 jik5.kamens.us systemd-udevd[760]: sdc2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc2' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us mtp-probe[987]: bus: 1, device: 5 was not an MTP device Mar 22 16:31:41 jik5.kamens.us systemd-udevd[744]: sdd: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdd' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us mtp-probe[993]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-3" Mar 22 16:31:41 jik5.kamens.us systemd-udevd[752]: sde: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sde' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us mtp-probe[993]: bus: 1, device: 4 was not an MTP device Mar 22 16:31:41 jik5.kamens.us systemd-udevd[762]: sdb: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-bw-46.mount - Mount unit for bw, revision 46. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-bw-47.mount - Mount unit for bw, revision 47. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-146.mount - Mount unit for canonical-livepatch, revision 146. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-canonical\x2dlivepatch-164.mount - Mount unit for canonical-livepatch, revision 164. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-chromium-2381.mount - Mount unit for chromium, revision 2381. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-chromium-2392.mount - Mount unit for chromium, revision 2392. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-28.mount - Mount unit for chromium-ffmpeg, revision 28. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-chromium\x2dffmpeg-30.mount - Mount unit for chromium-ffmpeg, revision 30. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core-14784.mount - Mount unit for core, revision 14784. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core-14946.mount - Mount unit for core, revision 14946. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core18-2708.mount - Mount unit for core18, revision 2708. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core18-2714.mount - Mount unit for core18, revision 2714. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core20-1828.mount - Mount unit for core20, revision 1828. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core20-1852.mount - Mount unit for core20, revision 1852. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core22-522.mount - Mount unit for core22, revision 522. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-core22-547.mount - Mount unit for core22, revision 547. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-cups-836.mount - Mount unit for cups, revision 836. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-cups-872.mount - Mount unit for cups, revision 872. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-firefox-2432.mount - Mount unit for firefox, revision 2432. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-firefox-2487.mount - Mount unit for firefox, revision 2487. Mar 22 16:31:41 jik5.kamens.us kernel: EDAC ie31200: No ECC support Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-102.mount - Mount unit for gnome-3-26-1604, revision 102. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d26\x2d1604-104.mount - Mount unit for gnome-3-26-1604, revision 104. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-145.mount - Mount unit for gnome-3-28-1804, revision 145. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d28\x2d1804-161.mount - Mount unit for gnome-3-28-1804, revision 161. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-72.mount - Mount unit for gnome-3-34-1804, revision 72. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d34\x2d1804-77.mount - Mount unit for gnome-3-34-1804, revision 77. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-115.mount - Mount unit for gnome-3-38-2004, revision 115. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d3\x2d38\x2d2004-119.mount - Mount unit for gnome-3-38-2004, revision 119. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-56.mount - Mount unit for gnome-42-2204, revision 56. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2d42\x2d2204-65.mount - Mount unit for gnome-42-2204, revision 65. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-178.mount - Mount unit for gnome-system-monitor, revision 178. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gnome\x2dsystem\x2dmonitor-181.mount - Mount unit for gnome-system-monitor, revision 181. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1534.mount - Mount unit for gtk-common-themes, revision 1534. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-gtk\x2dcommon\x2dthemes-1535.mount - Mount unit for gtk-common-themes, revision 1535. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-hunspell\x2ddictionaries\x2d1\x2d7\x2d2004-2.mount - Mount unit for hunspell-dictionaries-1-7-2004, revision 2. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-599.mount - Mount unit for snap-store, revision 599. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-snap\x2dstore-638.mount - Mount unit for snap-store, revision 638. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-49.mount - Mount unit for snapd-desktop-integration, revision 49. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-snapd\x2ddesktop\x2dintegration-71.mount - Mount unit for snapd-desktop-integration, revision 71. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-vault-1930.mount - Mount unit for vault, revision 1930. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted snap-vault-1958.mount - Mount unit for vault, revision 1958. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted var-snap-firefox-common-host\x2dhunspell.mount - Mount unit for firefox, revision 1860 via mount-control. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Found device dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.device - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:31:41 jik5.kamens.us kernel: nvidia-modeset: Loading NVIDIA Kernel Mode Setting Driver for UNIX platforms 515.86.01 Wed Oct 26 09:02:01 UTC 2022 Mar 22 16:31:41 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-c531070b\x2d52cc\x2d405a\x2d8abe\x2d8ac4be2d75f4.device - Samsung_SSD_850_EVO_1TB 3. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-F41C\x2d35B5.device - Samsung_SSD_850_EVO_1TB EFI\x20System\x20Partition. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Found device dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.device - Samsung_SSD_850_EVO_1TB 2. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Reached target snapd.mounts.target - Mounted snaps. Mar 22 16:31:41 jik5.kamens.us kernel: ee1004 0-0051: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:31:41 jik5.kamens.us kernel: ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only Mar 22 16:31:41 jik5.kamens.us kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) Mar 22 16:31:41 jik5.kamens.us kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Mar 22 16:31:41 jik5.kamens.us kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Mar 22 16:31:41 jik5.kamens.us kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Mar 22 16:31:41 jik5.kamens.us kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Mar 22 16:31:41 jik5.kamens.us kernel: acer_wmi: Acer Laptop ACPI-WMI Extras Mar 22 16:31:41 jik5.kamens.us kernel: acer_wmi: No WMID device detection method found Mar 22 16:31:41 jik5.kamens.us systemd[1]: Activating swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Mar 22 16:31:41 jik5.kamens.us kernel: Adding 999420k swap on /dev/mapper/ubuntu--vg-swap_1. Priority:-2 extents:1 across:999420k SSFS Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt... Mar 22 16:31:41 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:41 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:41 jik5.kamens.us systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2... Mar 22 16:31:41 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Activated swap dev-mapper-ubuntu\x2d\x2dvg\x2dswap_1.swap - /dev/mapper/ubuntu--vg-swap_1. Mar 22 16:31:41 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Reached target swap.target - Swaps. Mar 22 16:31:41 jik5.kamens.us systemd-cryptsetup[1147]: Volume sdc3_crypt already active. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Started systemd-fsckd.service - File System Check Daemon to report status. Mar 22 16:31:41 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished systemd-cryptsetup@sdc3_crypt.service - Cryptography Setup for sdc3_crypt. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Reached target blockdev@dev-mapper-sdc3_crypt.target - Block Device Preparation for /dev/mapper/sdc3_crypt. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Mar 22 16:31:41 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:31:41 jik5.kamens.us systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1170]: /dev/sdc2: recovering journal Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: fsck.fat 4.2 (2021-01-31) Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: There are differences between boot sector and its backup. Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: This is mostly harmless. Differences: (offset:original/backup) Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: 65:01/00 Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: Not automatically fixing this. Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: Dirty bit is set. Fs was not properly unmounted and some data may be corrupt. Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: Automatically removing dirty bit. Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: *** Filesystem was changed *** Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: Writing changes. Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1169]: /dev/sdc1: 11 files, 1554/130812 clusters Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-F41C\x2d35B5.service - File System Check on /dev/disk/by-uuid/F41C-35B5. Mar 22 16:31:41 jik5.kamens.us systemd-fsck[1170]: /dev/sdc2: clean, 326/46848 files, 119061/187392 blocks Mar 22 16:31:41 jik5.kamens.us kernel: [drm] [nvidia-drm] [GPU ID 0x00000100] Loading driver Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-da5cb0b2\x2dd839\x2d4972\x2da245\x2db31b54e44cc2.service - File System Check on /dev/disk/by-uuid/da5cb0b2-d839-4972-a245-b31b54e44cc2. Mar 22 16:31:41 jik5.kamens.us kernel: Bluetooth: Core ver 2.22 Mar 22 16:31:41 jik5.kamens.us kernel: NET: Registered PF_BLUETOOTH protocol family Mar 22 16:31:41 jik5.kamens.us kernel: Bluetooth: HCI device and connection manager initialized Mar 22 16:31:41 jik5.kamens.us kernel: Bluetooth: HCI socket layer initialized Mar 22 16:31:41 jik5.kamens.us kernel: Bluetooth: L2CAP socket layer initialized Mar 22 16:31:41 jik5.kamens.us kernel: Bluetooth: SCO socket layer initialized Mar 22 16:31:41 jik5.kamens.us kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Mar 22 16:31:41 jik5.kamens.us kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting boot.mount - /boot... Mar 22 16:31:41 jik5.kamens.us kernel: EXT4-fs (sdc2): mounted filesystem with ordered data mode. Quota mode: none. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted boot.mount - /boot. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting boot-efi.mount - /boot/efi... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted boot-efi.mount - /boot/efi. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Reached target local-fs.target - Local File Systems. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting apparmor.service - Load AppArmor profiles... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting console-setup.service - Set console font and keymap... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting systemd-binfmt.service - Set Up Additional Binary Formats... Mar 22 16:31:41 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Starting ufw.service - Uncomplicated firewall... Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished console-setup.service - Set console font and keymap. Mar 22 16:31:41 jik5.kamens.us apparmor.systemd[1346]: Restarting AppArmor Mar 22 16:31:41 jik5.kamens.us apparmor.systemd[1346]: Reloading AppArmor profiles Mar 22 16:31:41 jik5.kamens.us systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 1350 (systemd-binfmt) Mar 22 16:31:41 jik5.kamens.us kernel: Intel(R) Wireless WiFi driver for Linux Mar 22 16:31:41 jik5.kamens.us kernel: mc: Linux media interface: v0.10 Mar 22 16:31:41 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: enabling device (0000 -> 0002) Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounting proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System... Mar 22 16:31:41 jik5.kamens.us systemd-udevd[750]: sr0: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sr0' failed with exit code 1. Mar 22 16:31:41 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug destination: EXTERNAL_DRAM Mar 22 16:31:41 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Found debug configuration: 0 Mar 22 16:31:41 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: loaded firmware version 29.4063824552.0 7265D-29.ucode op_mode iwlmvm Mar 22 16:31:41 jik5.kamens.us apparmor.systemd[1381]: Skipping profile in /etc/apparmor.d/disable: usr.bin.firefox Mar 22 16:31:41 jik5.kamens.us kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) Mar 22 16:31:41 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: enabling device (0000 -> 0002) Mar 22 16:31:41 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Disabling MSI Mar 22 16:31:41 jik5.kamens.us kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.948:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1378 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.948:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1378 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.948:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1386 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.948:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1377 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.952:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1382 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.952:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1382 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.952:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1382 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.952:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1384 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.956:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1383 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1378]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1378 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1378]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1378 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1386]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=1386 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1377]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="lsb_release" pid=1377 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1382]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1382 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1382]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1382 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1382]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1382 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1384]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oosplash" pid=1384 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1383]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="tcpdump" pid=1383 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1393]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1393 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us kernel: audit: type=1400 audit(1679517101.960:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1393 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1391]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=1391 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1379]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1379 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1379]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=1379 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1379]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1379 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1379]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/{,usr/}sbin/dhclient" pid=1379 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us apparmor.systemd[1402]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Mar 22 16:31:41 jik5.kamens.us audit[1392]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine" pid=1392 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1392]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1392 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1396]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="named" pid=1396 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1401]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="rsyslogd" pid=1401 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Mar 22 16:31:41 jik5.kamens.us systemd[1]: Mounted proc-sys-fs-binfmt_misc.mount - Arbitrary Executable File Formats File System. Mar 22 16:31:41 jik5.kamens.us audit[1394]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1394 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1394]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd" pid=1394 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us audit[1394]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd//third_party" pid=1394 comm="apparmor_parser" Mar 22 16:31:41 jik5.kamens.us systemd[1]: Finished systemd-binfmt.service - Set Up Additional Binary Formats. Mar 22 16:31:42 jik5.kamens.us kernel: usbcore: registered new interface driver btusb Mar 22 16:31:42 jik5.kamens.us kernel: usbcore: registered new interface driver snd-usb-audio Mar 22 16:31:42 jik5.kamens.us systemd-udevd[744]: 1-7.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.2 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[744]: 1-7.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.2 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[772]: 1-7.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.1 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC662 rev3: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: inputs: Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Front Mic=0x19 Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 Mar 22 16:31:42 jik5.kamens.us kernel: snd_hda_codec_realtek hdaudioC0D0: Line=0x1a Mar 22 16:31:42 jik5.kamens.us kernel: Bluetooth: hci0: Legacy ROM 2.5 revision 1.0 build 3 week 17 2014 Mar 22 16:31:42 jik5.kamens.us kernel: Bluetooth: hci0: Intel Bluetooth firmware file: intel/ibt-hw-37.8.10-fw-1.10.3.11.e.bseq Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input22 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1f.3/sound/card0/input23 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1f.3/sound/card0/input24 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1f.3/sound/card0/input25 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1f.3/sound/card0/input26 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input27 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input28 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input29 Mar 22 16:31:42 jik5.kamens.us kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input30 Mar 22 16:31:42 jik5.kamens.us audit[1380]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince" pid=1380 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1380]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince//sanitized_helper" pid=1380 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1380]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer" pid=1380 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1380]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-previewer//sanitized_helper" pid=1380 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1380]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/evince-thumbnailer" pid=1380 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1390]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice" pid=1390 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1390]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-soffice//gpg" pid=1390 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd-udevd[772]: 1-7.1:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.1 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[750]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[750]: 1-10:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.0 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[775]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Detected Intel(R) Dual Band Wireless AC 7265, REV=0x210 Mar 22 16:31:42 jik5.kamens.us kernel: thermal thermal_zone3: failed to read out thermal zone (-61) Mar 22 16:31:42 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Applying debug destination EXTERNAL_DRAM Mar 22 16:31:42 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: Allocated 0x00400000 bytes for firmware monitor. Mar 22 16:31:42 jik5.kamens.us kernel: iwlwifi 0000:03:00.0: base HW address: 4c:34:88:9c:4f:cd, OTP minor version: 0x0 Mar 22 16:31:42 jik5.kamens.us kernel: intel_tcc_cooling: Programmable TCC Offset detected Mar 22 16:31:42 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain package Mar 22 16:31:42 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain core Mar 22 16:31:42 jik5.kamens.us kernel: intel_rapl_common: Found RAPL domain dram Mar 22 16:31:42 jik5.kamens.us systemd-udevd[775]: 1-10:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10:1.1 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Mounting run-rpc_pipefs.mount - RPC Pipe File System... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting binfmt-support.service - Enable support for additional executable binary formats... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting rpcbind.service - RPC bind portmap service... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Received SIGRTMIN+20 from PID 513 (plymouthd). Mar 22 16:31:42 jik5.kamens.us systemd-udevd[745]: 1-7.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.0 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[745]: 1-7.1:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.0 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Mar 22 16:31:42 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:31:42 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:42 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:42 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:31:42 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting systemd-rfkill.service - Load/Save RF Kill Switch Status... Mar 22 16:31:42 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:31:42 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:31:42 jik5.kamens.us kernel: ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' Mar 22 16:31:42 jik5.kamens.us systemd[1]: Started rpcbind.service - RPC bind portmap service. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Reached target rpcbind.target - RPC Port Mapper. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Started systemd-rfkill.service - Load/Save RF Kill Switch Status. Mar 22 16:31:42 jik5.kamens.us kernel: iwlwifi 0000:03:00.0 wlp3s0: renamed from wlan0 Mar 22 16:31:42 jik5.kamens.us audit[1402]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=1402 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us apparmor.systemd[1402]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 60): Caching disabled for: 'usr.sbin.sssd' due to force complain Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished apparmor.service - Load AppArmor profiles. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting snapd.apparmor.service - Load AppArmor profiles managed internally by snapd... Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished binfmt-support.service - Enable support for additional executable binary formats. Mar 22 16:31:42 jik5.kamens.us audit[1453]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=1453 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1455]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=1455 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1458]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.cups" pid=1458 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1457]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.core" pid=1457 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1454]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.bw" pid=1454 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1464]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.vault" pid=1464 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: Bluetooth: hci0: Intel BT fw patch 0x32 completed & activated Mar 22 16:31:42 jik5.kamens.us audit[1452]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=1452 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1452]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=1452 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1465]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.cli" pid=1465 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd-resolved[1436]: Positive Trust Anchors: Mar 22 16:31:42 jik5.kamens.us systemd-resolved[1436]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 22 16:31:42 jik5.kamens.us systemd-resolved[1436]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 22 16:31:42 jik5.kamens.us systemd[1]: Started systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Mar 22 16:31:42 jik5.kamens.us audit[1466]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.daemon" pid=1466 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Reached target time-set.target - System Time Set. Mar 22 16:31:42 jik5.kamens.us audit[1470]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.qt" pid=1470 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1471]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.tx" pid=1471 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1475]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.util" pid=1475 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: RPC: Registered named UNIX socket transport module. Mar 22 16:31:42 jik5.kamens.us kernel: RPC: Registered udp transport module. Mar 22 16:31:42 jik5.kamens.us kernel: RPC: Registered tcp transport module. Mar 22 16:31:42 jik5.kamens.us kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 22 16:31:42 jik5.kamens.us audit[1483]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bitcoin-core.wallet" pid=1483 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd[1]: Mounted run-rpc_pipefs.mount - RPC Pipe File System. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Reached target rpc_pipefs.target. Mar 22 16:31:42 jik5.kamens.us systemd[1]: rpc-gssd.service - RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 22 16:31:42 jik5.kamens.us systemd[1]: Reached target nfs-client.target - NFS client services. Mar 22 16:31:42 jik5.kamens.us kernel: [drm] Initialized nvidia-drm 0.0.0 20160202 for 0000:01:00.0 on minor 0 Mar 22 16:31:42 jik5.kamens.us audit[1485]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=1485 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: evdi: module verification failed: signature and/or required key missing - tainting kernel Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] Initialising logging on level 4 Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] Atomic driver: yes Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] Increasing device count to 4 Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 695 (systemd-modules) of process 695 (systemd-modules) Mar 22 16:31:42 jik5.kamens.us kernel: evdi evdi.0: [drm] Cannot find any crtc or sizes Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [W] evdi_painter_send_update_ready_if_needed:693 Painter does not exist! Mar 22 16:31:42 jik5.kamens.us kernel: [drm] Initialized evdi 1.12.0 20220713 for evdi.0 on minor 1 Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] Evdi platform_device create Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 695 (systemd-modules) of process 695 (systemd-modules) Mar 22 16:31:42 jik5.kamens.us kernel: evdi evdi.1: [drm] Cannot find any crtc or sizes Mar 22 16:31:42 jik5.kamens.us audit[1487]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=1487 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [W] evdi_painter_send_update_ready_if_needed:693 Painter does not exist! Mar 22 16:31:42 jik5.kamens.us kernel: [drm] Initialized evdi 1.12.0 20220713 for evdi.1 on minor 2 Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] Evdi platform_device create Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 695 (systemd-modules) of process 695 (systemd-modules) Mar 22 16:31:42 jik5.kamens.us kernel: evdi evdi.2: [drm] Cannot find any crtc or sizes Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [W] evdi_painter_send_update_ready_if_needed:693 Painter does not exist! Mar 22 16:31:42 jik5.kamens.us kernel: [drm] Initialized evdi 1.12.0 20220713 for evdi.2 on minor 3 Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] Evdi platform_device create Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 695 (systemd-modules) of process 695 (systemd-modules) Mar 22 16:31:42 jik5.kamens.us kernel: evdi evdi.3: [drm] Cannot find any crtc or sizes Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [W] evdi_painter_send_update_ready_if_needed:693 Painter does not exist! Mar 22 16:31:42 jik5.kamens.us kernel: [drm] Initialized evdi 1.12.0 20220713 for evdi.3 on minor 4 Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] Evdi platform_device create Mar 22 16:31:42 jik5.kamens.us systemd-resolved[1436]: Using system hostname 'jik5.kamens.us'. Mar 22 16:31:42 jik5.kamens.us systemd[1]: Started systemd-resolved.service - Network Name Resolution. Mar 22 16:31:42 jik5.kamens.us audit[1491]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=1491 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1498]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=1498 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd-modules-load[695]: Inserted module 'evdi' Mar 22 16:31:42 jik5.kamens.us audit[1519]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=1519 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us systemd-modules-load[695]: Inserted module 'msr' Mar 22 16:31:42 jik5.kamens.us audit[1522]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=1522 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: videodev: Linux video capture interface: v2.00 Mar 22 16:31:42 jik5.kamens.us systemd-modules-load[695]: Inserted module 'v4l2loopback' Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[760]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromedriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us kernel: v4l2loopback driver version 0.12.7 loaded Mar 22 16:31:42 jik5.kamens.us systemd-udevd[760]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_chromium_chromium /class/video4linux 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[760]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_firefox /class/video4linux 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us systemd-udevd[760]: video4linux: Process '/usr/lib/snapd/snap-device-helper add snap_firefox_geckodriver /class/video4linux 0:0' failed with exit code 1. Mar 22 16:31:42 jik5.kamens.us audit[1581]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromium" pid=1581 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1566]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.chromedriver" pid=1566 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Mar 22 16:31:42 jik5.kamens.us audit[1640]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.chromium.hook.configure" pid=1640 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Mar 22 16:31:42 jik5.kamens.us audit[1642]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.core.hook.configure" pid=1642 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1688]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.accept" pid=1688 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1689]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cancel" pid=1689 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1723]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsaccept" pid=1723 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:42 jik5.kamens.us audit[1701]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cups-browsed" pid=1701 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1738]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsctl" pid=1738 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1741]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsd" pid=1741 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1749]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsdisable" pid=1749 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1754]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsenable" pid=1754 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd[1]: Finished ufw.service - Uncomplicated firewall. Mar 22 16:31:42 jik5.kamens.us audit[1484]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.bw.bw" pid=1484 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd[1]: Reached target network-pre.target - Preparation for Network. Mar 22 16:31:42 jik5.kamens.us audit[1765]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsfilter" pid=1765 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1771]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupsreject" pid=1771 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1776]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.cupstestppd" pid=1776 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1777]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.driverless" pid=1777 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1780]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.gs" pid=1780 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1781]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippeveprinter" pid=1781 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1782]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ippfind" pid=1782 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1802]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.ipptool" pid=1802 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1804]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpadmin" pid=1804 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1803]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lp" pid=1803 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1808]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpc" pid=1808 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1811]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpinfo" pid=1811 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1813]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpq" pid=1813 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1812]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpoptions" pid=1812 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1817]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpr" pid=1817 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1820]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lprm" pid=1820 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: nvidia_uvm: module uses symbols nvUvmInterfaceDisableAccessCntr from proprietary module nvidia, inheriting taint. Mar 22 16:31:42 jik5.kamens.us audit[1822]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.lpstat" pid=1822 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1823]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.cups.reject" pid=1823 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us kernel: nvidia-uvm: Loaded the UVM driver, major device number 511. Mar 22 16:31:42 jik5.kamens.us audit[1826]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.firefox" pid=1826 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of an unmet condition check (ConditionPathExists=!/run/plymouth/pid). Mar 22 16:31:42 jik5.kamens.us audit[1850]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=1850 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1832]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.configure" pid=1832 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1831]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.geckodriver" pid=1831 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1858]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=1858 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1859]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=1859 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1865]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=1865 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1863]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=1863 comm="apparmor_parser" Mar 22 16:31:42 jik5.kamens.us audit[1870]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.hook.configure" pid=1870 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us audit[1874]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.snap-store" pid=1874 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Mar 22 16:31:43 jik5.kamens.us systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:43 jik5.kamens.us systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 22 16:31:43 jik5.kamens.us systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 22 16:31:43 jik5.kamens.us systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Mar 22 16:31:43 jik5.kamens.us systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 22 16:31:43 jik5.kamens.us systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Mar 22 16:31:43 jik5.kamens.us systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 22 16:31:43 jik5.kamens.us audit[1877]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=1877 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us audit[1875]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=1875 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us audit[1876]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=1876 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us audit[1879]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.vault.vault" pid=1879 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us audit[1878]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=1878 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 513 (plymouthd) of process 513 (plymouthd) Mar 22 16:31:43 jik5.kamens.us audit[1456]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.chromium" pid=1456 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us audit[1459]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.firefox" pid=1459 comm="apparmor_parser" Mar 22 16:31:43 jik5.kamens.us audit[1462]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=1462 comm="apparmor_parser" Mar 22 16:31:44 jik5.kamens.us audit[1461]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.snap-store" pid=1461 comm="apparmor_parser" Mar 22 16:31:44 jik5.kamens.us audit[1460]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=1460 comm="apparmor_parser" Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished snapd.apparmor.service - Load AppArmor profiles managed internally by snapd. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target sysinit.target - System Initialization. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started apport-autoreport.path - Process error reports when automatic reporting is enabled (file watch). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started cups.path - CUPS Scheduler. Mar 22 16:31:44 jik5.kamens.us systemd[1]: tpm-udev.path - Handle dynamically added tpm devices was skipped because of an unmet condition check (ConditionVirtualization=container). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started whoopsie.path - Start whoopsie on modification of the /var/crash directory. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started anacron.timer - Trigger anacron every hour. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started apport-autoreport.timer - Process error reports when automatic reporting is enabled (timer based). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started apt-daily.timer - Daily apt download activities. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started apt-daily-upgrade.timer - Daily apt upgrade and clean activities. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started dpkg-db-backup.timer - Daily dpkg database backup timer. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started e2scrub_all.timer - Periodic ext4 Online Metadata Check for All Filesystems. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started fstrim.timer - Discard unused blocks once a week. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started fwupd-refresh.timer - Refresh fwupd metadata regularly. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started logrotate.timer - Daily rotation of log files. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started man-db.timer - Daily man-db regeneration. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started motd-news.timer - Message of the Day. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started plocate-updatedb.timer - Update the plocate database daily. Mar 22 16:31:44 jik5.kamens.us systemd[1]: snapd.snap-repair.timer - Timer to automatically fetch and run repair assertions was skipped because no trigger condition checks were met. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started ua-timer.timer - Ubuntu Advantage Timer for running repeated jobs. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started yubikey-monitor.timer - Check for inserted Yubikey every minute. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target paths.target - Path Units. Mar 22 16:31:44 jik5.kamens.us systemd[1]: apport-forward.socket - Unix socket for apport crash forwarding was skipped because of an unmet condition check (ConditionVirtualization=container). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on avahi-daemon.socket - Avahi mDNS/DNS-SD Stack Activation Socket. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on cups.socket - CUPS Scheduler. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting docker.socket - Docker Socket for the API... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on pcscd.socket - PC/SC Smart Card Daemon Activation Socket. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting snapd.socket - Socket activation for snappy daemon... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on spice-vdagentd.socket - Activation socket for spice guest agent daemon. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on ssh.socket - OpenBSD Secure Shell server socket. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on uuidd.socket - UUID daemon activation socket. Mar 22 16:31:44 jik5.kamens.us systemd[1]: systemd-pcrphase-sysinit.service - TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on docker.socket - Docker Socket for the API. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Listening on snapd.socket - Socket activation for snappy daemon. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target sockets.target - Socket Units. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target basic.target - Basic System. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting accounts-daemon.service - Accounts Service... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting avahi-daemon.service - Avahi mDNS/DNS-SD Stack... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting bluetooth.service - Bluetooth service... Mar 22 16:31:44 jik5.kamens.us systemd[1926]: ConfigurationDirectory 'bluetooth' already exists but the mode is different. (File system: 755 ConfigurationDirectoryMode: 555) Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting dbus.service - D-Bus System Message Bus... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started dmesg.service - Save initial kernel messages after boot. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting e2scrub_reap.service - Remove Stale Online ext4 Metadata Check Snapshots... Mar 22 16:31:44 jik5.kamens.us systemd[1]: getty-static.service - getty on tty2-tty6 if dbus and logind are not available was skipped because of an unmet condition check (ConditionPathExists=!/usr/bin/dbus-daemon). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target getty.target - Login Prompts. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting gpu-manager.service - Detect the available GPUs and deal with any system changes... Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Found user 'avahi' (UID 119) and group 'avahi' (GID 126). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting grub-common.service - Record successful boot for GRUB... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started irqbalance.service - irqbalance daemon. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting networkd-dispatcher.service - Dispatcher daemon for systemd-networkd... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting nvidia-persistenced.service - NVIDIA Persistence Daemon... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting polkit.service - Authorization Manager... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting power-profiles-daemon.service - Power Profiles daemon... Mar 22 16:31:44 jik5.kamens.us nvidia-persistenced[1946]: Verbose syslog connection opened Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting pwrstatd.service - LSB: The monitor UPS software.... Mar 22 16:31:44 jik5.kamens.us nvidia-persistenced[1946]: Now running with user ID 138 and group ID 151 Mar 22 16:31:44 jik5.kamens.us nvidia-persistenced[1946]: Started (1946) Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting rsyslog.service - System Logging Service... Mar 22 16:31:44 jik5.kamens.us nvidia-persistenced[1946]: device 0000:01:00.0 - registered Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting secureboot-db.service - Secure Boot updates for DB and DBX... Mar 22 16:31:44 jik5.kamens.us nvidia-persistenced[1946]: Local RPC services initialized Mar 22 16:31:44 jik5.kamens.us systemd[1]: snapd.aa-prompt-listener.service - Userspace listener for prompt events was skipped because of an unmet condition check (ConditionPathExists=/sys/kernel/security/apparmor/.notify). Mar 22 16:31:44 jik5.kamens.us systemd[1]: snapd.core-fixup.service - Automatically repair incorrect owner/permissions on core devices was skipped because no trigger condition checks were met. Mar 22 16:31:44 jik5.kamens.us systemd[1]: snapd.recovery-chooser-trigger.service - Wait for the Ubuntu Core chooser trigger was skipped because of an unmet condition check (ConditionKernelCommandLine=snapd_recovery_mode). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target getty-pre.target - Preparation for Logins. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting snapd.service - Snap Daemon... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting switcheroo-control.service - Switcheroo Control Proxy service... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting systemd-logind.service - User Login Management... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting thermald.service - Thermal Daemon Service... Mar 22 16:31:44 jik5.kamens.us systemd[1]: ua-reboot-cmds.service - Ubuntu Advantage reboot cmds was skipped because of an unmet condition check (ConditionPathExists=/var/lib/ubuntu-advantage/marker-reboot-cmds-required). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting udisks2.service - Disk Manager... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting vboxdrv.service - VirtualBox Linux kernel module... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: dbus[1927]: Unknown group "power" in message bus configuration file Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started nvidia-persistenced.service - NVIDIA Persistence Daemon. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Successfully dropped root privileges. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: avahi-daemon 0.8 starting up. Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 1930 (gpu-manager) of process 1930 (gpu-manager) Mar 22 16:31:44 jik5.kamens.us pwrstatd[1947]: * Starting pwrstatd 1.3.2 Mar 22 16:31:44 jik5.kamens.us systemd[1]: grub-common.service: Deactivated successfully. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished grub-common.service - Record successful boot for GRUB. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting grub-initrd-fallback.service - GRUB failed boot detection... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target smartcard.target - Smart Card. Mar 22 16:31:44 jik5.kamens.us udisksd[1967]: udisks daemon version 2.9.4 starting Mar 22 16:31:44 jik5.kamens.us pwrstatd[1947]: ...done. Mar 22 16:31:44 jik5.kamens.us systemd[1]: gpu-manager.service: Deactivated successfully. Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: Filesystem keystore: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin [7085 bytes] Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: firmware keys: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: PK: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Platform Key Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: KEK: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation KEK CA 2011 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Key Exchange Key Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=TW/ST=Taiwan/O=Acer/OU=Acer/CN=Acer/emailAddress=Mephisto_Lai@acer.com.tw Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: db: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Windows Production PCA 2011 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Database Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=TW/ST=Taiwan/O=Acer/OU=Acer/CN=Acer/emailAddress=Mephisto_Lai@acer.com.tw Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: dbx: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 90aec5c4995674a849c1d1384463f3b02b5aa625a5c320fc4fe7d9bb58a62398 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: edd2cb55726e10abedec9de8ca5ded289ad793ab3b6919d163c875fec1209cd5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 284153e7d04a9f187e5c3dbfe17b2672ad2fbdd119f27bec789417b7919853ec Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 66d0803e2550d9e790829ae1b5f81547cc9bfbe69b51817068ecb5dabb7a89fc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1e918f170a796b4b0b1400bb9bdae75be1cf86705c2d0fc8fb9dd0c5016b933b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c3d65e174d47d3772cb431ea599bba76b8670bfaa51081895796432e2ef6461f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: af79b14064601bc0987d4747af1e914a228c05d622ceda03b7a4f67014fee767 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 48f4584de1c5ec650c25e6c623635ce101bd82617fc400d4150f0aee2355b4ca Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e060da09561ae00dcfb1769d6e8e846868a1e99a54b14aa5d0689f2840cec6df Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 007f4c95125713b112093e21663e2d23e3c1ae9ce4b5de0d58a297332336a2d8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5b89f1aa2435a03d18d9b203d17fb4fba4f8f5076cf1f9b8d6d9b826222235c1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 4cdae3920a512c9c052a8b4aba9096969b0a0197b614031e4c64a5d898cb09b9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e37ff3fc0eff20bfc1c060a4bf56885e1efd55a8e9ce3c5f4869444cacffad0b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: fabc379df395e6f52472b44fa5082f9f0e0da480f05198c66814b7055b03f446 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 47b31a1c7867644b2ee8093b2d5fbe21e21f77c1617a2c08812f57ace0850e9f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9959ed4e05e548b59f219308a45563ea85bb224c1ad96dec0e96c0e71ffccd81 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: dc8aff7faa9d1a00a3e32eefbf899b3059cbb313a48b82fa9c8d931fd58fb69d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 91721aa76266b5bb2f8009f1188510a36e54afd56e967387ea7d0b114d782089 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 23142e14424fb3ff4efc75d00b63867727841aba5005149070ee2417df8ab799 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d4241190cd5a369d8c344c660e24f3027fb8e7064fab33770e93fa765ffb152e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f5e892dd6ec4c2defa4a495c09219b621379b64da3d1b2e34adf4b5f1102bd39 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ef87be89a413657de8721498552cf9e0f3c1f71bc62dfa63b9f25bbc66e86494 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e6236dc1ee074c077c7a1c9b3965947430847be125f7aeb71d91a128133aea7f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e42572afac720f5d4a1c7aaaf802f094daceb682f4e92783b2bb3fa00862af7f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: dda0121dcf167db1e2622d10f454701837ac6af304a03ec06b3027904988c56b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d6ee8db782e36caffb4d9f8207900487de930aabcc1d196fa455fbfd6f37273d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: cb994b400590b66cbf55fc663555caf0d4f1ce267464d0452c2361e05ee1cd50 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bdd4086c019f5d388453c6d93475d39a576572baff75612c321b46a35a5329b1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: a608a87f51bdf7532b4b80fa95eadfdf1bf8b0cbb58a7d3939c9f11c12e71c85 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 99d7ada0d67e5233108dbd76702f4b168087cfc4ec65494d6ca8aba858febada Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5c2afe34bd8a7aebbb439c251dfb6a424f00e535ac4df61ec19745b6f10e893a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 4f0214fce4fa8897d0c80a46d6dab4124726d136fc2492efd01bfedfa3887a9c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 40d6cae02973789080cf4c3a9ad11b5a0a4d8bba4438ab96e276cc784454dee7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2ea4cb6a1f1eb1d3dce82d54fde26ded243ba3e18de7c6d211902a594fe56788 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 288878f12e8b9c6ccbf601c73d5f4e985cac0ff3fcb0c24e4414912b3eb91f15 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1142a0cc7c9004dff64c5948484d6a7ec3514e176f5ca6bdeed7a093940b93cc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 040b3bc339e9b6f9acd828b88f3482a5c3f64e67e5a714ba1da8a70453b34af6 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 540801dd345dc1c33ef431b35bf4c0e68bd319b577b9abe1a9cff1cbc39f548f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 408b8b3df5abb043521a493525023175ab1261b1de21064d6bf247ce142153b9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 37a480374daf6202ce790c318a2bb8aa3797311261160a8e30558b7dea78c7a6 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1f16078cce009df62edb9e7170e66caae670bce71b8f92d38280c56aa372031d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c805603c4fa038776e42f263c604b49d96840322e1922d5606a9b0bbb5bffe6f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f48e6dd8718e953b60a24f2cbea60a9521deae67db25425b7d3ace3c517dd9b7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f31fd461c5e99510403fc97c1da2d8a9cbe270597d32badf8fd66b77495f8d94 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f2a16d35b554694187a70d40ca682959f4f35c2ce0eab8fd64f7ac2ab9f5c24a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f1b4f6513b0d544a688d13adc291efa8c59f420ca5dcb23e0b5a06fa7e0d083d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: eed7e0eff2ed559e2a79ee361f9962af3b1e999131e30bb7fd07546fae0a7267 Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished gpu-manager.service - Detect the available GPUs and deal with any system changes. Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ee83a566496109a74f6ac6e410df00bb29a290e0021516ae3b8a23288e7e2e72 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: eaff8c85c208ba4d5b6b8046f5d6081747d779bada7768e649d047ff9b1f660c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e6856f137f79992dc94fa2f43297ec32d2d9a76f7be66114c6a13efc3bcdf5c8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e39891f48bbcc593b8ed86ce82ce666fc1145b9fcbfd2b07bad0a89bf4c7bfbf Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e36dfc719d2114c2e39aea88849e2845ab326f6f7fe74e0e539b7e54d81f3631 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e051b788ecbaeda53046c70e6af6058f95222c046157b8c4c1b9c2cfc65f46e5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e051b788ecbaeda53046c70e6af6058f95222c046157b8c4c1b9c2cfc65f46e5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: df91ac85a94fcd0cfb8155bd7cbefaac14b8c5ee7397fe2cc85984459e2ea14e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: df02aab48387a9e1d4c65228089cb6abe196c8f4b396c7e4bbc395de136977f6 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: da3560fd0c32b54c83d4f2ff869003d2089369acf2c89608f8afa7436bfa4655 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d9668ab52785086786c134b5e4bddbf72452813b6973229ab92aa1a54d201bf5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d89a11d16c488dd4fbbc541d4b07faf8670d660994488fe54b1fbff2704e4288 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: cf13a243c1cd2e3c8ceb7e70100387cecbfb830525bbf9d0b70c79adf3e84128 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: cc8eec6eb9212cbf897a5ace7e8abeece1079f1a6def0a789591cb1547f1f084 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: cb340011afeb0d74c4a588b36ebaa441961608e8d2fa80dca8c13872c850796b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c69d64a5b839e41ba16742527e17056a18ce3c276fd26e34901a1bc7d0e32219 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c452ab846073df5ace25cca64d6b7a09d906308a1a65eb5240e3c4ebcaa9cc0c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c42d11c70ccf5e8cf3fb91fdf21d884021ad836ca68adf2cbb7995c10bf588d4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c3505bf3ec10a51dace417c76b8bd10939a065d1f34e75b8a3065ee31cc69b96 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c2469759c1947e14f4b65f72a9f5b3af8b6f6e727b68bb0d91385cbf42176a8a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bef7663be5ea4dbfd8686e24701e036f4c03fb7fcd67a6c566ed94ce09c44470 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: be435df7cd28aa2a7c8db4fc8173475b77e5abf392f76b7c76fa3f698cb71a9a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bdd01126e9d85710d3fe75af1cc1702a29f081b4f6fdf6a2b2135c0297a9cec5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bc75f910ff320f5cb5999e66bbd4034f4ae537a42fdfef35161c5348e366e216 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bb01da0333bb639c7e1c806db0561dc98a5316f22fef1090fb8d0be46dae499a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b93f0699598f8b20fa0dacc12cfcfc1f2568793f6e779e04795e6d7c22530f75 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b8d6b5e7857b45830e017c7be3d856adeb97c7290eb0665a3d473a4beb51dcf3 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ad3be589c0474e97de5bb2bf33534948b76bb80376dfdc58b1fed767b5a15bfc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: a924d3cad6da42b7399b96a095a06f18f6b1aba5b873b0d5f3a0ee2173b48b6c Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started pwrstatd.service - LSB: The monitor UPS software.. Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: a4d978b7c4bda15435d508f8b9592ec2a5adfb12ea7bad146a35ecb53094642f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9ed33f0fbc180bc032f8909ca2c4ab3418edc33a45a50d2521a3b5876aa3ea2c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9dd2dcb72f5e741627f2e9e03ab18503a3403cf6a904a479a4db05d97e2250a9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9c259fcb301d5fc7397ed5759963e0ef6b36e42057fd73046e6bd08b149f751c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9baf4f76d76bf5d6a897bfbd5f429ba14d04e08b48c3ee8d76930a828fff3891 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9954a1a99d55e8b189ab1bca414b91f6a017191f6c40a86b6f3ef368dd860031 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 992d359aa7a5f789d268b94c11b9485a6b1ce64362b0edb4441ccc187c39647b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 992820e6ec8c41daae4bd8ab48f58268e943a670d35ca5e2bdcd3e7c4c94a072 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 97a8c5ba11d61fefbb5d6a05da4e15ba472dc4c6cd4972fc1a035de321342fe4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 97a51a094444620df38cd8c6512cac909a75fd437ae1e4d22929807661238127 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9783b5ee4492e9e891c655f1f48035959dad453c0e623af0fe7bf2c0a57885e3 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 96e4509450d380dac362ff8e295589128a1f1ce55885d20d89c27ba2a9d00909 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 947078f97c6196968c3ae99c9a5d58667e86882cf6c8c9d58967a496bb7af43c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 91971c1497bf8e5bc68439acc48d63ebb8faabfd764dcbe82f3ba977cac8cf6a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 91656aa4ef493b3824a0b7263248e4e2d657a5c8488d880cb65b01730932fb53 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9063f5fbc5e57ab6de6c9488146020e172b176d5ab57d4c89f0f600e17fe2de2 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8d93d60c691959651476e5dc464be12a85fa5280b6f524d4a1c3fcc9d048cfad Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8c0349d708571ae5aa21c11363482332073297d868f29058916529efc520ef70 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 894d7839368f3298cc915ae8742ef330d7a26699f459478cf22c2b6bb2850166 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 82acba48d5236ccff7659afc14594dee902bd6082ef1a30a0b9b508628cf34f4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 7f49ccb309323b1c7ab11c93c955b8c744f0a2b75c311f495e18906070500027 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 78b4edcaabc8d9093e20e217802caeb4f09e23a3394c4acc6e87e8f35395310f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 788383a4c733bb87d2bf51673dc73e92df15ab7d51dc715627ae77686d8d23bc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 781764102188a8b4b173d4a8f5ec94d828647156097f99357a581e624b377509 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 72c26f827ceb92989798961bc6ae748d141e05d3ebcfb65d9041b266c920be82 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 70a1450af2ad395569ad0afeb1d9c125324ee90aec39c258880134d4892d51ab Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6dead13257dfc3ccc6a4b37016ba91755fe9e0ec1f415030942e5abc47f07c88 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6dbbead23e8c860cf8b47f74fbfca5204de3e28b881313bb1d1eccdc4747934e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6873d2f61c29bd52e954eeff5977aa8367439997811a62ff212c948133c68d97 Mar 22 16:31:44 jik5.kamens.us systemd[1]: secureboot-db.service: Deactivated successfully. Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 66aa13a0edc219384d9c425d3927e6ed4a5d1940c5e7cd4dac88f5770103f2f1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 65b2e7cc18d903c331df1152df73ca0dc932d29f17997481c56f3087b2dd3147 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 631f0857b41845362c90c6980b4b10c4b628e23dbe24b6e96c128ae3dcb0d5ac Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 61cec4a377bf5902c0feaee37034bf97d5bc6e0615e23a1cdfbae6e3f5fb3cfd Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 61341e07697978220ea61e85dcd2421343f2c1bf35cc5b8d0ad2f0226f391479 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5d1e9acbbb4a7d024b6852df025970e2ced66ff622ee019cd0ed7fd841ccad02 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5890fa227121c76d90ed9e63c87e3a6533eea0f6f0a1a23f1fc445139bc6bcdf Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 57e6913afacc5222bd76cdaf31f8ed88895464255374ef097a82d7f59ad39596 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 47ff1b63b140b6fc04ed79131331e651da5b2e2f170f5daef4153dc2fbc532b1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 47ff1b63b140b6fc04ed79131331e651da5b2e2f170f5daef4153dc2fbc532b1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 4667bf250cd7c1a06b8474c613cdb1df648a7f58736fbf57d05d6f755dab67f4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 45876b4dd861d45b3a94800774027a5db45a48b2a729410908b6412f8a87e95d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 41d1eeb177c0324e17dd6557f384e532de0cf51a019a446b01efb351bc259d77 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 4185821f6dab5ba8347b78a22b5f9a0a7570ca5c93a74d478a793d83bac49805 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 400ac66d59b7b094a9e30b01a6bd013aff1d30570f83e7592f421dbe5ff4ba8f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3e3926f0b8a15ad5a14167bb647a843c3d4321e35dbc44dce8c837417f2d28b0 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3be8e7eb348d35c1928f19c769846788991641d1f6cf09514ca10269934f7359 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3ae76c45ca70e9180c1559981f42622dd251bca1fbe6b901c52ec11673b03514 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3a4f74beafae2b9383ad8215d233a6cf3d057fb3c7e213e897beef4255faee9d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 386d695cdf2d4576e01bcaccf5e49e78da51af9955c0b8fa7606373b007994b3 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3765d769c05bf98b427b3511903b2137e8a49b6f859d0af159ed6a86786aa634 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 367a31e5838831ad2c074647886a6cdff217e6b1ba910bff85dc7a87ae9b5e98 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 362ed31d20b1e00392281231a96f0a0acfde02618953e695c9ef2eb0bac37550 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 340da32b58331c8e2b561baf300ca9dfd6b91cd2270ee0e2a34958b1c6259e85 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 32ad3296829bc46dcfac5eddcb9dbf2c1eed5c11f83b2210cf9c6e60c798d4a7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 311a2ac55b50c09b30b3cc93b994a119153eeeac54ef892fc447bbbd96101aa1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2dcf8e8d817023d1e8e1451a3d68d6ec30d9bed94cbcb87f19ddc1cc0116ac1a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2b2298eaa26b9dc4a4558ae92e7bb0e4f85cf34bf848fdf636c0c11fbec49897 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 29cca4544ea330d61591c784695c149c6b040022ac7b5b89cbd72800d10840ea Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished secureboot-db.service - Secure Boot updates for DB and DBX. Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 270c84b29d86f16312b06aaae4ebb8dff8de7d080d825b8839ff1766274eff47 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1f179186efdf5ef2de018245ba0eae8134868601ba0d35ff3d9865c1537ced93 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1d8b58c1fdb8da8b33ccee1e5f973af734d90ef317e33f5db1573c2ba088a80c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1b909115a8d473e51328a87823bd621ce655dfae54fa2bfa72fdc0298611d6b8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 148fe18f715a9fcfe1a444ce0fff7f85869eb422330dc04b314c0f295d6da79e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 147730b42f11fe493fe902b6251e97cd2b6f34d36af59330f11d02a42f940d07 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0fa3a29ad05130d7fe5bf4d2596563cded1d874096aacc181069932a2e49519a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0c51d7906fc4931149765da88682426b2cfe9e6aa4f27253eab400111432e3a7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0a75ea0b1d70eaa4d3f374246db54fc7b43e7f596a353309b9c36b4fd975725e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 09f98aa90f85198c0d73f89ba77e87ec6f596c491350fb8f8bba80a62fbb914b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0928f0408bf725e61d67d87138a8eebc52962d2847f16e3587163b160e41b6ad Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 08bb2289e9e91b4d20ff3f1562516ab07e979b2c6cefe2ab70c6dfc1199f8da5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 06eb5badd26e4fae65f9a42358deef7c18e52cc05fbb7fc76776e69d1b982a14 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 05d87e15713454616f5b0ed7849ab5c1712ab84f02349478ec2a38f970c01489 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 03f64a29948a88beffdb035e0b09a7370ccf0cd9ce6bcf8e640c2107318fab87 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 804e354c6368bb27a90fae8e498a57052b293418259a019c4f53a2007254490f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5c5805196a85e93789457017d4f9eb6828b97c41cb9ba6d3dc1fcc115f527a55 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d372c0d0f4fdc9f52e9e1f23fc56ee72414a17f350d0cea6c26a35a6c3217a13 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9fa4d5023fd43ecaff4200ba7e8d4353259d2b7e5e72b5096eff8027d66d1043 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 992d359aa7a5f789d268b94c11b9485a6b1ce64362b0edb4441ccc187c39647b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8e53efdc15f852cee5a6e92931bc42e6163cd30ff649cca7e87252c3a459960b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 81a8b2c9751aeb1faba7dbde5ee9691dc0eaee2a31c38b1491a8146756a6b770 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 495300790e6c9bf2510daba59db3d57e9d2b85d7d7640434ec75baa3851c74e5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3a91f0f9e5287fa2994c7d930b2c1a5ee14ce8e1c8304ae495adc58cc4453c0c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0257ff710f2a16e489b37493c07604a7cda96129d8a8fd68d2b6af633904315d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: dccc3ce1c00ee4b0b10487d372a0fa47f5c26f57a359be7b27801e144eacbac4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e7681f153121ea1e67f74bbcb0cdc5e502702c1b8cc55fb65d702dfba948b5f4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 7eac80a915c84cd4afec638904d94eb168a8557951a4d539b0713028552b6b8c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e7c20b3ab481ec885501eca5293781d84b5a1ac24f88266b5270e7ecb4aa2538 Mar 22 16:31:44 jik5.kamens.us systemd[1]: grub-initrd-fallback.service: Deactivated successfully. Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e24b315a551671483d8b9073b32de11b4de1eb2eab211afd2d9c319ff55e08d0 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 68ee4632c7be1c66c83e89dd93eaee1294159abf45b4c2c72d7dc7499aa2a043 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3ece27cbb3ec4438cce523b927c4f05fdc5c593a3766db984c5e437a3ff6a16b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1cb4dccaf2c812cfa7b4938e1371fe2b96910fe407216fd95428672d6c7e7316 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e800395dbe0e045781e8005178b4baf5a257f06e159121a67c595f6ae22506fd Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 7bc9cb5463ce0f011fb5085eb8ba77d1acd283c43f4a57603cc113f22cebc579 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f1863ec8b7f43f94ad14fb0b8b4a69497a8c65ecbc2a55e0bb420e772b8cdc91 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c452ab846073df5ace25cca64d6b7a09d906308a1a65eb5240e3c4ebcaa9cc0c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: badff5e4f0fea711701ca8fb22e4c43821e31e210cf52d1d4f74dd50f1d039bc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 835881f2a5572d7059b5c8635018552892e945626f115fc9ca07acf7bde857a4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0dc24c75eb1aef56b9f13ab9de60e2eca1c4510034e290bbb36cf60a549b234c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f277af4f9bdc918ae89fa35cc1b34e34984c04ae9765322c3cb049574d36509c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d8d4e6ddf6e42d74a6a536ea62fd1217e4290b145c9e5c3695a31b42efb5f5a4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9d00ae4cd47a41c783dc48f342c076c2c16f3413f4d2df50d181ca3bb5ad859d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6efefe0b5b01478b7b944c10d3a8aca2cca4208888e2059f8a06cb5824d7bab0 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 02e6216acaef6401401fa555ecbed940b1a5f2569aed92956137ae58482ef1b7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 95049f0e4137c790b0d2767195e56f73807d123adcf8f6e7bf2d4d991d305f89 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0ce02100f67c7ef85f4eed368f02bf7092380a3c23ca91fd7f19430d94b00c19 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bb1dd16d530008636f232303a7a86f3dff969f848815c0574b12c2d787fec93f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2679650fe341f2cf1ea883460b3556aaaf77a70d6b8dc484c9301d1b746cf7b5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5b248e913d71853d3da5aedd8d9a4bc57a917126573817fb5fcb2d86a2f1c886 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 65f3c0a01b8402d362b9722e98f75e5e991e6c186e934f7b2b2e6be6dec800ec Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: dbaf9e056d3d5b38b68553304abc88827ebc00f80cb9c7e197cdbc5822cd316c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: dd59af56084406e38c63fbe0850f30a0cd1277462a2192590fb05bc259e61273 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9f1863ed5717c394b42ef10a6607b144a65ba11fb6579df94b8eb2f0c4cd60c1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b3e506340fbf6b5786973393079f24b66ba46507e35e911db0362a2acde97049 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c9ec350406f26e559affb4030de2ebde5435054c35a998605b8fcf04972d8d55 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 89f3d1f6e485c334cd059d0995e3cdfdc00571b1849854847a44dc5548e2dcfb Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 4b8668a5d465bcdd9000aa8dfcff42044fcbd0aece32fc7011a83e9160e89f09 Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished grub-initrd-fallback.service - GRUB failed boot detection. Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 10d45fcba396aef3153ee8f6ecae58afe8476a280a2026fc71f6217dcf49ba2f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 32f5940ca29dd812a2c145e6fc89646628ffcc7c7a42cae512337d8d29c40bbd Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 39dbc2288ef44b5f95332cb777e31103e840dba680634aa806f5c9b100061802 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e19dae83c02e6f281358d4ebd11d7723b4f5ea0e357907d5443decc5f93c1e9d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b92af298dc08049b78c77492d6551b710cd72aada3d77be54609e43278ef6e4d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 81d8fb4c9e2e7a8225656b4b8273b7cba4b03ef2e9eb20e0a0291624eca1ba86 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /CN=Debian Secure Boot Signer Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=GB/ST=Isle of Man/O=Canonical Ltd./OU=Secure Boot/CN=Canonical Ltd. Secure Boot Signing Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 45c7c8ae750acfbb48fc37527d6412dd644daed8913ccd8a24c94d856967df8e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 64575bd912789a2e14ad56f6341f52af6bf80cf94400785975e9f04e2d64d745 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 939aeef4f5fa51e23340c3f2e49048ce8872526afdf752c3a7f3a3f2bc9f6049 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3b0287533e0cc3d0ec1aa823cbf0a941aad8721579d1c499802dd1c3a636b8a9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c83cb13922ad99f560744675dd37cc94dcad5a1fcba6472fee341171d939e884 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 77dd190fa30d88ff5e3b011a0ae61e6209780c130b535ecb87e6f0888a0b6b2f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 55b99b0de53dbcfe485aa9c737cf3fb616ef3d91fab599aa7cab19eda763b5ba Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ca171d614a8d7e121c93948cd0fe55d39981f9d11aa96e03450a415227c2c65b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: fecfb232d12e994b6d485d2c7167728aa5525984ad5ca61e7516221f079a1436 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: fe63a84f782cc9d3fcf2ccf9fc11fbd03760878758d26285ed12669bdc6e6d01 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: fddd6e3d29ea84c7743dad4a1bdbc700b5fec1b391f932409086acc71dd6dbd8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e92c22eb3b5642d65c1ec2caf247d2594738eebb7fb3841a44956f59e2b0d1fa Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d8cbeb9735f5672b367e4f96cdc74969615d17074ae96c724d42ce0216f8f3fa Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ce3bfabe59d67ce8ac8dfd4a16f7c43ef9c224513fbc655957d735fa29f540ce Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: cb6b858b40d3a098765815b592c1514a49604fafd60819da88d7a76e9778fef7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c90f336617b8e7f983975413c997f10b73eb267fd8a10cb9e3bdbfc667abdb8b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c617c1a8b1ee2a811c28b5a81b4c83d7c98b5b0c27281d610207ebe692c2967f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c409bdac4775add8db92aa22b5b718fb8c94a1462c1fe9a416b95d8a3388c2fc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bc87a668e81966489cb508ee805183c19e6acd24cf17799ca062d2e384da0ea7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b97a0889059c035ff1d54b6db53b11b9766668d9f955247c028b2837d7a04cd9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b8f078d983a24ac433216393883514cd932c33af18e7dd70884c8235f4275736 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b54f1ee636631fad68058d3b0937031ac1b90ccb17062a391cca68afdbe40d55 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: afe2030afb7d2cda13f9fa333a02e34f6751afec11b010dbcd441fdf4c4002b3 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: aeebae3151271273ed95aa2e671139ed31a98567303a332298f83709a9d55aa1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ad6826e1946d26d3eaf3685c88d97d85de3b4dcb3d0ee2ae81c70560d13c5720 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: a7f32f508d4eb0fead9a087ef94ed1ba0aec5de6f7ef6ff0a62b93bedf5d458d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: a6b5151f3655d3a2af0d472759796be4a4200e5495a7d869754c4848857408a7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9e4a69173161682e55fde8fef560eb88ec1ffedcaf04001f66c0caf707b2b734 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9998d363c491be16bd74ba10b94d9291001611736fdca643a36664bc0f315a42 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8d8ea289cfe70a1c07ab7365cb28ee51edd33cf2506de888fbadd60ebf80481c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8bf434b49e00ccf71502a2cd900865cb01ec3b3da03c35be505fdf7bd563f521 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8ad64859f195b5f58dafaa940b6a6167acd67a886e8f469364177221c55945b9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 895a9785f617ca1d7ed44fc1a1470b71f3f1223862d9ff9dcc3ae2df92163daf Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 82db3bceb4f60843ce9d97c3d187cd9b5941cd3de8100e586f2bda5637575f67 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 81a8b965bb84d3876b9429a95481cc955318cfaa1412d808c8a33bfd33fff0e4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 7827af99362cfaf0717dade4b1bfe0438ad171c15addc248b75bf8caa44bb2c5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 72e0bd1867cf5d9d56ab158adf3bddbc82bf32a8d8aa1d8c5e2f6df29428d6d8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 726b3eb654046a30f3f83d9b96ce03f670e9a806d1708a0371e62dc49d2c23c1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 71f2906fd222497e54a34662ab2497fcc81020770ff51368e9e3d9bfcbfd6375 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6f1428ff71c9db0ed5af1f2e7bbfcbab647cc265ddf5b293cdb626f50a3a785e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6c8854478dd559e29351b826c06cb8bfef2b94ad3538358772d193f82ed1ca11 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6b1d138078e4418aa68deb7bb35e066092cf479eeb8ce4cd12e7d072ccb42f66 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5ae949ea8855eb93e439dbc65bda2e42852c2fdf6789fa146736e3c3410f2b5c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 518831fe7382b514d03e15c621228b8ab65479bd0cbfa3c5c1d0f48d9c306135 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 47cc086127e2069a86e03a6bef2cd410f8c55a6d6bdb362168c31b2ce32a5adf Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 4397daca839e7f63077cb50c92df43bc2d2fb2a8f59f26fc7a0e4bd4d9751692 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3fce9b9fdf3ef09d5452b0f95ee481c2b7f06d743a737971558e70136ace3e73 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3841d221368d1583d75c0a02e62160394d6c4e0a6760b6f607b90362bc855b02 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3608edbaf5ad0f41a414a1777abf2faf5e670334675ec3995e6935829e0caad2 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 306628fa5477305728ba4a467de7d0387a54f569d3769fce5e75ec89d28d1593 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2e70916786a6f773511fa7181fab0f1d70b557c6322ea923b2a8d3b92b51af7d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2c73d93325ba6dcbe589d4a4c63c5b935559ef92fbf050ed50c4e2085206f17d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2bbf2ca7b8f1d91f27ee52b6fb2a5dd049b85a2b9b529c5d6662068104b055f8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2b99cf26422e92fe365fbf4bc30d27086c9ee14b7a6fff44fb2f6b9001699939 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 18333429ff0562ed9f97033e1148dceee52dbe2e496d5410b5cfd6c864d2d10f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 174e3a0b5b43c6a607bbd3404f05341e3dcf396267ce94f8b50e2e23a9da920c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 106faceacfecfd4e303b74f480a08098e2d0802b936f8ec774ce21f31686689c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0dc9f3fb99962148c3ca833632758d3ed4fc8d0b0007b95b31e6528f2acd5bfc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0d0dbeca6f29eca06f331a7d72e4884b12097fb348983a2a14a0d73f4f10140f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0c189339762df336ab3dd006a463df715a39cfb0f492465c600e6c6bd7bd898c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0bbb4392daac7ab89b30a4ac657531b97bfaab04f90b0dafe5f9b6eb90a06374 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 09df5f4e511208ec78b96d12d08125fdb603868de39f6f72927852599b659c26 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 07e6c6a858646fb1efc67903fe28b116011f2367fe92e6be2b36999eff39d09e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 075eea060589548ba060b2feed10da3c20c7fe9b17cd026b94e8a683b8115238 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 90fbe70e69d633408d3e170c6832dbb2d209e0272527dfb63d49d29572a6f44c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 29c6eb52b43c3aa18b2cd8ed6ea8607cef3cfae1bafe1165755cf2e614844a44 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d063ec28f67eba53f1642dbf7dff33c6a32add869f6013fe162e2c32f1cbe56d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d626157e1d6a718bc124ab8da27cbb65072ca03a7b6b257dbdcbbd60f65ef3d1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5391c3a2fb112102a6aa1edc25ae77e19f5d6f09cd09eeb2509922bfcd5992ea Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 58fb941aef95a25943b3fb5f2510a0df3fe44c58c95e0ab80487297568ab9771 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c3a99a460da464a057c3586d83cef5f4ae08b7103979ed8932742df0ed530c66 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e6ca68e94146629af03f69c2f86e6bef62f930b37c6fbcc878b78df98c0334e5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1aec84b84b6c65a51220a9be7181965230210d62d6d33c48999c6b295a2b0a06 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 363384d14d1f2e0b7815626484c459ad57a318ef4396266048d058c5a19bbf76 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c5d9d8a186e2c82d09afaa2a6f7f2e73870d3e64f72c4e08ef67796a840f0fbd Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f52f83a3fa9cfbd6920f722824dbe4034534d25b8507246b3b957dac6e1bce7a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 80b4d96931bf0d02fd91a61e19d14f1da452e66db2408ca8604d411f92659f0a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: /C=Taiwan/ST=TW/L=Taipei/O=Acer/CN=Acer Database Forbidden Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: filesystem keys: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: PK: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: KEK: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: db: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: dbx: Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 45c7c8ae750acfbb48fc37527d6412dd644daed8913ccd8a24c94d856967df8e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 64575bd912789a2e14ad56f6341f52af6bf80cf94400785975e9f04e2d64d745 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 939aeef4f5fa51e23340c3f2e49048ce8872526afdf752c3a7f3a3f2bc9f6049 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3b0287533e0cc3d0ec1aa823cbf0a941aad8721579d1c499802dd1c3a636b8a9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c83cb13922ad99f560744675dd37cc94dcad5a1fcba6472fee341171d939e884 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 77dd190fa30d88ff5e3b011a0ae61e6209780c130b535ecb87e6f0888a0b6b2f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 55b99b0de53dbcfe485aa9c737cf3fb616ef3d91fab599aa7cab19eda763b5ba Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ca171d614a8d7e121c93948cd0fe55d39981f9d11aa96e03450a415227c2c65b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: fecfb232d12e994b6d485d2c7167728aa5525984ad5ca61e7516221f079a1436 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: fe63a84f782cc9d3fcf2ccf9fc11fbd03760878758d26285ed12669bdc6e6d01 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: fddd6e3d29ea84c7743dad4a1bdbc700b5fec1b391f932409086acc71dd6dbd8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e92c22eb3b5642d65c1ec2caf247d2594738eebb7fb3841a44956f59e2b0d1fa Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d8cbeb9735f5672b367e4f96cdc74969615d17074ae96c724d42ce0216f8f3fa Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ce3bfabe59d67ce8ac8dfd4a16f7c43ef9c224513fbc655957d735fa29f540ce Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: cb6b858b40d3a098765815b592c1514a49604fafd60819da88d7a76e9778fef7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c90f336617b8e7f983975413c997f10b73eb267fd8a10cb9e3bdbfc667abdb8b Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c617c1a8b1ee2a811c28b5a81b4c83d7c98b5b0c27281d610207ebe692c2967f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c409bdac4775add8db92aa22b5b718fb8c94a1462c1fe9a416b95d8a3388c2fc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: bc87a668e81966489cb508ee805183c19e6acd24cf17799ca062d2e384da0ea7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b97a0889059c035ff1d54b6db53b11b9766668d9f955247c028b2837d7a04cd9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b8f078d983a24ac433216393883514cd932c33af18e7dd70884c8235f4275736 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: b54f1ee636631fad68058d3b0937031ac1b90ccb17062a391cca68afdbe40d55 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: afe2030afb7d2cda13f9fa333a02e34f6751afec11b010dbcd441fdf4c4002b3 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: aeebae3151271273ed95aa2e671139ed31a98567303a332298f83709a9d55aa1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: ad6826e1946d26d3eaf3685c88d97d85de3b4dcb3d0ee2ae81c70560d13c5720 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: a7f32f508d4eb0fead9a087ef94ed1ba0aec5de6f7ef6ff0a62b93bedf5d458d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: a6b5151f3655d3a2af0d472759796be4a4200e5495a7d869754c4848857408a7 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9e4a69173161682e55fde8fef560eb88ec1ffedcaf04001f66c0caf707b2b734 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 9998d363c491be16bd74ba10b94d9291001611736fdca643a36664bc0f315a42 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8d8ea289cfe70a1c07ab7365cb28ee51edd33cf2506de888fbadd60ebf80481c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8bf434b49e00ccf71502a2cd900865cb01ec3b3da03c35be505fdf7bd563f521 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 8ad64859f195b5f58dafaa940b6a6167acd67a886e8f469364177221c55945b9 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 895a9785f617ca1d7ed44fc1a1470b71f3f1223862d9ff9dcc3ae2df92163daf Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 82db3bceb4f60843ce9d97c3d187cd9b5941cd3de8100e586f2bda5637575f67 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 81a8b965bb84d3876b9429a95481cc955318cfaa1412d808c8a33bfd33fff0e4 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 7827af99362cfaf0717dade4b1bfe0438ad171c15addc248b75bf8caa44bb2c5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 72e0bd1867cf5d9d56ab158adf3bddbc82bf32a8d8aa1d8c5e2f6df29428d6d8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 726b3eb654046a30f3f83d9b96ce03f670e9a806d1708a0371e62dc49d2c23c1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 71f2906fd222497e54a34662ab2497fcc81020770ff51368e9e3d9bfcbfd6375 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6f1428ff71c9db0ed5af1f2e7bbfcbab647cc265ddf5b293cdb626f50a3a785e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6c8854478dd559e29351b826c06cb8bfef2b94ad3538358772d193f82ed1ca11 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 6b1d138078e4418aa68deb7bb35e066092cf479eeb8ce4cd12e7d072ccb42f66 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5ae949ea8855eb93e439dbc65bda2e42852c2fdf6789fa146736e3c3410f2b5c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 518831fe7382b514d03e15c621228b8ab65479bd0cbfa3c5c1d0f48d9c306135 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 47cc086127e2069a86e03a6bef2cd410f8c55a6d6bdb362168c31b2ce32a5adf Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 4397daca839e7f63077cb50c92df43bc2d2fb2a8f59f26fc7a0e4bd4d9751692 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3fce9b9fdf3ef09d5452b0f95ee481c2b7f06d743a737971558e70136ace3e73 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3841d221368d1583d75c0a02e62160394d6c4e0a6760b6f607b90362bc855b02 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 3608edbaf5ad0f41a414a1777abf2faf5e670334675ec3995e6935829e0caad2 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 306628fa5477305728ba4a467de7d0387a54f569d3769fce5e75ec89d28d1593 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2e70916786a6f773511fa7181fab0f1d70b557c6322ea923b2a8d3b92b51af7d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2c73d93325ba6dcbe589d4a4c63c5b935559ef92fbf050ed50c4e2085206f17d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2bbf2ca7b8f1d91f27ee52b6fb2a5dd049b85a2b9b529c5d6662068104b055f8 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 2b99cf26422e92fe365fbf4bc30d27086c9ee14b7a6fff44fb2f6b9001699939 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 18333429ff0562ed9f97033e1148dceee52dbe2e496d5410b5cfd6c864d2d10f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 174e3a0b5b43c6a607bbd3404f05341e3dcf396267ce94f8b50e2e23a9da920c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 106faceacfecfd4e303b74f480a08098e2d0802b936f8ec774ce21f31686689c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0dc9f3fb99962148c3ca833632758d3ed4fc8d0b0007b95b31e6528f2acd5bfc Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0d0dbeca6f29eca06f331a7d72e4884b12097fb348983a2a14a0d73f4f10140f Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0c189339762df336ab3dd006a463df715a39cfb0f492465c600e6c6bd7bd898c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 0bbb4392daac7ab89b30a4ac657531b97bfaab04f90b0dafe5f9b6eb90a06374 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 09df5f4e511208ec78b96d12d08125fdb603868de39f6f72927852599b659c26 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 07e6c6a858646fb1efc67903fe28b116011f2367fe92e6be2b36999eff39d09e Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 075eea060589548ba060b2feed10da3c20c7fe9b17cd026b94e8a683b8115238 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 90fbe70e69d633408d3e170c6832dbb2d209e0272527dfb63d49d29572a6f44c Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 29c6eb52b43c3aa18b2cd8ed6ea8607cef3cfae1bafe1165755cf2e614844a44 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d063ec28f67eba53f1642dbf7dff33c6a32add869f6013fe162e2c32f1cbe56d Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: d626157e1d6a718bc124ab8da27cbb65072ca03a7b6b257dbdcbbd60f65ef3d1 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 5391c3a2fb112102a6aa1edc25ae77e19f5d6f09cd09eeb2509922bfcd5992ea Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 58fb941aef95a25943b3fb5f2510a0df3fe44c58c95e0ab80487297568ab9771 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c3a99a460da464a057c3586d83cef5f4ae08b7103979ed8932742df0ed530c66 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: e6ca68e94146629af03f69c2f86e6bef62f930b37c6fbcc878b78df98c0334e5 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 1aec84b84b6c65a51220a9be7181965230210d62d6d33c48999c6b295a2b0a06 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 363384d14d1f2e0b7815626484c459ad57a318ef4396266048d058c5a19bbf76 Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: c5d9d8a186e2c82d09afaa2a6f7f2e73870d3e64f72c4e08ef67796a840f0fbd Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: f52f83a3fa9cfbd6920f722824dbe4034534d25b8507246b3b957dac6e1bce7a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: 80b4d96931bf0d02fd91a61e19d14f1da452e66db2408ca8604d411f92659f0a Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: from /usr/share/secureboot/updates/dbx/dbxupdate_x64.bin Mar 22 16:31:44 jik5.kamens.us sbkeysync[1987]: New keys in filesystem: Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] AppArmor D-Bus mediation is enabled Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started dbus.service - D-Bus System Message Bus. Mar 22 16:31:44 jik5.kamens.us systemd[1]: e2scrub_reap.service: Deactivated successfully. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished e2scrub_reap.service - Remove Stale Online ext4 Metadata Check Snapshots. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Successfully called chroot(). Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Successfully dropped remaining capabilities. Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Activating systemd to hand-off: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.7' (uid=0 pid=1943 comm="/usr/libexec/power-profiles-daemon" label="unconfined") Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: No service file found in /etc/avahi/services. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Joining mDNS multicast group on interface lo.IPv6 with address ::1. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: New relevant interface lo.IPv6 for mDNS. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: New relevant interface lo.IPv4 for mDNS. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Network interface enumeration completed. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Registering new address record for ::1 on lo.*. Mar 22 16:31:44 jik5.kamens.us avahi-daemon[1925]: Registering new address record for 127.0.0.1 on lo.IPv4. Mar 22 16:31:44 jik5.kamens.us thermald[1965]: 22 CPUID levels; family:model:stepping 0x6:5e:3 (6:94:3) Mar 22 16:31:44 jik5.kamens.us thermald[1965]: 22 CPUID levels; family:model:stepping 0x6:5e:3 (6:94:3) Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: Bluetooth daemon 5.66 Mar 22 16:31:44 jik5.kamens.us thermald[1965]: sensor id 10 : No temp sysfs for reading raw temp Mar 22 16:31:44 jik5.kamens.us thermald[1965]: sensor id 10 : No temp sysfs for reading raw temp Mar 22 16:31:44 jik5.kamens.us thermald[1965]: sensor id 10 : No temp sysfs for reading raw temp Mar 22 16:31:44 jik5.kamens.us thermald[1965]: Using config file /etc/thermald/thermal-conf.xml Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: Starting SDP server Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: profiles/audio/vcp.c:vcp_init() D-Bus experimental not enabled Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: src/plugin.c:plugin_init() Failed to init vcp plugin Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: profiles/audio/mcp.c:mcp_init() D-Bus experimental not enabled Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: src/plugin.c:plugin_init() Failed to init mcp plugin Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: profiles/audio/bap.c:bap_init() D-Bus experimental not enabled Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: src/plugin.c:plugin_init() Failed to init bap plugin Mar 22 16:31:44 jik5.kamens.us polkitd[1942]: started daemon version 0.105 using authority implementation `local' version `0.105' Mar 22 16:31:44 jik5.kamens.us kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 Mar 22 16:31:44 jik5.kamens.us kernel: Bluetooth: BNEP filters: protocol multicast Mar 22 16:31:44 jik5.kamens.us kernel: Bluetooth: BNEP socket layer initialized Mar 22 16:31:44 jik5.kamens.us kernel: Bluetooth: MGMT ver 1.22 Mar 22 16:31:44 jik5.kamens.us kernel: NET: Registered PF_ALG protocol family Mar 22 16:31:44 jik5.kamens.us udisksd[1967]: failed to load module mdraid: libbd_mdraid.so.2: cannot open shared object file: No such file or directory Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting NetworkManager.service - Network Manager... Mar 22 16:31:44 jik5.kamens.us bluetoothd[1926]: Bluetooth management interface 1.22 initialized Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting wpa_supplicant.service - WPA supplicant... Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.8' (uid=0 pid=1926 comm="/usr/lib/bluetooth/bluetoothd" label="unconfined") Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Activating systemd to hand-off: service name='org.freedesktop.login1' unit='dbus-org.freedesktop.login1.service' requested by ':1.7' (uid=0 pid=1943 comm="/usr/libexec/power-profiles-daemon" label="unconfined") Mar 22 16:31:44 jik5.kamens.us thermald[1965]: Polling mode is enabled: 4 Mar 22 16:31:44 jik5.kamens.us udisksd[1967]: Failed to load the 'mdraid' libblockdev plugin Mar 22 16:31:44 jik5.kamens.us systemd-logind[1963]: New seat seat0. Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.systemd1' Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started polkit.service - Authorization Manager. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started bluetooth.service - Bluetooth service. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started power-profiles-daemon.service - Power Profiles daemon. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started thermald.service - Thermal Daemon Service. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started switcheroo-control.service - Switcheroo Control Proxy service. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started avahi-daemon.service - Avahi mDNS/DNS-SD Stack. Mar 22 16:31:44 jik5.kamens.us systemd-logind[1963]: Watching system buttons on /dev/input/event2 (Power Button) Mar 22 16:31:44 jik5.kamens.us systemd-logind[1963]: Watching system buttons on /dev/input/event1 (Power Button) Mar 22 16:31:44 jik5.kamens.us systemd-logind[1963]: Watching system buttons on /dev/input/event0 (Sleep Button) Mar 22 16:31:44 jik5.kamens.us systemd-logind[1963]: Watching system buttons on /dev/input/event6 (Metadot - Das Keyboard Das Keyboard System Control) Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.login1' Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started systemd-logind.service - User Login Management. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target bluetooth.target - Bluetooth Support. Mar 22 16:31:44 jik5.kamens.us systemd[1]: alsa-state.service - Manage Sound Card State (restore and store) was skipped because of an unmet condition check (ConditionPathExists=/etc/alsa/state-daemon.conf). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting alsa-restore.service - Save/Restore Sound Card State... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting ModemManager.service - Modem Manager... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Mar 22 16:31:44 jik5.kamens.us systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished alsa-restore.service - Save/Restore Sound Card State. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target sound.target - Sound Card. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started wpa_supplicant.service - WPA supplicant. Mar 22 16:31:44 jik5.kamens.us wpa_supplicant[2079]: Successfully initialized wpa_supplicant Mar 22 16:31:44 jik5.kamens.us audit[1964]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="rsyslogd" pid=1964 comm="apparmor_parser" Mar 22 16:31:44 jik5.kamens.us yubikey-monitor.sh[1969]: Triggered https://api.pushover.net/1/messages.json Mar 22 16:31:44 jik5.kamens.us yubikey-monitor.sh[1969]: Delaying notification for 5 seconds Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.5265] NetworkManager (version 1.40.12) is starting... (boot:7f163eb1-5e95-4dc7-9f76-958a6acedd8a) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.5265] Read config: /etc/NetworkManager/NetworkManager.conf (lib: 10-dns-resolved.conf, 20-connectivity-ubuntu.conf, no-mac-addr-change.conf) (run: 10-globally-managed-devices.conf) (etc: 10-ubuntu-fan.conf, default-wifi-powersave-on.conf) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.5665] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started NetworkManager.service - Network Manager. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Reached target network.target - Network. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting NetworkManager-wait-online.service - Network Manager Wait Online... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting containerd.service - containerd container runtime... Mar 22 16:31:44 jik5.kamens.us ModemManager[2104]: ModemManager (version 1.20.4) starting in system bus... Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.hostname1' Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting cups.service - CUPS Scheduler... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started fail2ban.service - Fail2Ban Service. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting mariadb.service - MariaDB 10.11.2 database server... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting named.service - BIND Domain Name Server... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting openvpn.service - OpenVPN service... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting postgresql@11-main.service - PostgreSQL Cluster 11-main... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting postgresql@12-main.service - PostgreSQL Cluster 12-main... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting postgresql@13-main.service - PostgreSQL Cluster 13-main... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting postgresql@14-main.service - PostgreSQL Cluster 14-main... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting postgresql@15-main.service - PostgreSQL Cluster 15-main... Mar 22 16:31:44 jik5.kamens.us systemd[1]: rsync.service - fast remote file copy program daemon was skipped because of an unmet condition check (ConditionPathExists=/etc/rsyncd.conf). Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6056] manager[0x5649d1f07990]: monitoring kernel firmware directory '/lib/firmware'. Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6084] monitoring ifupdown state file '/run/network/ifstate'. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started snap.cups.cups-browsed.service - Service for snap application cups.cups-browsed. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started snap.cups.cupsd.service - Service for snap application cups.cupsd. Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started unattended-upgrades.service - Unattended Upgrades Shutdown. Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6227] hostname: hostname: using hostnamed Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6227] hostname: static hostname changed from (none) to "jik5.kamens.us" Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6240] dns-mgr: init: dns=systemd-resolved rc-manager=unmanaged (auto), plugin=systemd-resolved Mar 22 16:31:44 jik5.kamens.us systemd[1]: Finished openvpn.service - OpenVPN service. Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6276] rfkill1: found Wi-Fi radio killswitch (at /sys/devices/pci0000:00/0000:00:1c.5/0000:03:00.0/ieee80211/phy0/rfkill1) (driver iwlwifi) Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started systemd-hostnamed.service - Hostname Service. Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6280] manager[0x5649d1f07990]: rfkill: Wi-Fi hardware radio set disabled Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6280] manager[0x5649d1f07990]: rfkill: WWAN hardware radio set enabled Mar 22 16:31:44 jik5.kamens.us rsyslogd[2122]: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] Mar 22 16:31:44 jik5.kamens.us rsyslogd[2122]: rsyslogd's groupid changed to 108 Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started rsyslog.service - System Logging Service. Mar 22 16:31:44 jik5.kamens.us rsyslogd[2122]: rsyslogd's userid changed to 103 Mar 22 16:31:44 jik5.kamens.us rsyslogd[2122]: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="2122" x-info="https://www.rsyslog.com"] start Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6516] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-adsl.so) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6787] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-bluetooth.so) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6845] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-wifi.so) Mar 22 16:31:44 jik5.kamens.us snapd[1955]: overlord.go:268: Acquiring state lock file Mar 22 16:31:44 jik5.kamens.us snapd[1955]: overlord.go:273: Acquired state lock file Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6910] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-team.so) Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.14' (uid=0 pid=2066 comm="/usr/sbin/NetworkManager --no-daemon" label="unconfined") Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.6997] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-device-plugin-wwan.so) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7000] manager: rfkill: Wi-Fi disabled by radio killswitch; disabled by state file Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7012] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7012] manager: Networking is enabled by state file Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7058] settings: Loaded settings plugin: ifupdown ("/usr/lib/x86_64-linux-gnu/NetworkManager/1.40.12/libnm-settings-plugin-ifupdown.so") Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7058] settings: Loaded settings plugin: keyfile (internal) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7058] ifupdown: management mode: unmanaged Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7061] ifupdown: interface-parser: parsing file /etc/network/interfaces Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7064] ifupdown: interface-parser: finished parsing file /etc/network/interfaces Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7161] dhcp: init: Using DHCP client 'internal' Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7161] device (lo): carrier: link connected Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7163] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7173] manager: (enp2s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.7176] device (enp2s0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:31:44 jik5.kamens.us kernel: Generic FE-GE Realtek PHY r8169-0-200:00: attached PHY driver (mii_bus:phy_addr=r8169-0-200:00, irq=MAC) Mar 22 16:31:44 jik5.kamens.us named[2145]: starting BIND 9.18.12-1ubuntu1-Ubuntu (Extended Support Version) Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service... Mar 22 16:31:44 jik5.kamens.us named[2145]: running on Linux x86_64 6.1.0-16-generic #16-Ubuntu SMP PREEMPT_DYNAMIC Fri Feb 24 14:37:30 UTC 2023 Mar 22 16:31:44 jik5.kamens.us named[2145]: built with '--build=x86_64-linux-gnu' '--prefix=/usr' '--includedir=${prefix}/include' '--mandir=${prefix}/share/man' '--infodir=${prefix}/share/info' '--sysconfdir=/etc' '--localstatedir=/var' '--disable-option-checking' '--disable-silent-rules' '--libdir=${prefix}/lib/x86_64-linux-gnu' '--runstatedir=/run' '--disable-maintainer-mode' '--disable-dependency-tracking' '--libdir=/usr/lib/x86_64-linux-gnu' '--sysconfdir=/etc/bind' '--with-python=python3' '--localstatedir=/' '--enable-threads' '--enable-largefile' '--with-libtool' '--enable-shared' '--disable-static' '--with-gost=no' '--with-openssl=/usr' '--with-gssapi=yes' '--with-libidn2' '--with-json-c' '--with-lmdb=/usr' '--with-gnu-ld' '--with-maxminddb' '--with-atf=no' '--enable-ipv6' '--enable-rrl' '--enable-filter-aaaa' '--disable-native-pkcs11' 'build_alias=x86_64-linux-gnu' 'CFLAGS=-g -O2 -ffile-prefix-map=/build/bind9-Za0Td3/bind9-9.18.12=. -flto=auto -ffat-lto-objects -fstack-protector-strong -Wformat -Werror=format-security -fdebug-prefix-map=/build/bind9-Za0Td3/bind9-9.18.12=/usr/src/bind9-1:9.18.12-1ubuntu1 -fno-strict-aliasing -fno-delete-null-pointer-checks -DNO_VERSION_DATE -DDIG_SIGCHASE' 'LDFLAGS=-Wl,-Bsymbolic-functions -flto=auto -ffat-lto-objects -Wl,-z,relro -Wl,-z,now' 'CPPFLAGS=-Wdate-time -D_FORTIFY_SOURCE=2' Mar 22 16:31:44 jik5.kamens.us named[2145]: running as: named -f -u bind Mar 22 16:31:44 jik5.kamens.us named[2145]: compiled by GCC 12.2.0 Mar 22 16:31:44 jik5.kamens.us named[2145]: compiled with OpenSSL version: OpenSSL 3.0.8 7 Feb 2023 Mar 22 16:31:44 jik5.kamens.us named[2145]: linked to OpenSSL version: OpenSSL 3.0.8 7 Feb 2023 Mar 22 16:31:44 jik5.kamens.us named[2145]: compiled with libxml2 version: 2.9.14 Mar 22 16:31:44 jik5.kamens.us named[2145]: linked to libxml2 version: 20914 Mar 22 16:31:44 jik5.kamens.us named[2145]: compiled with json-c version: 0.16 Mar 22 16:31:44 jik5.kamens.us named[2145]: linked to json-c version: 0.16 Mar 22 16:31:44 jik5.kamens.us named[2145]: compiled with zlib version: 1.2.13 Mar 22 16:31:44 jik5.kamens.us named[2145]: linked to zlib version: 1.2.13 Mar 22 16:31:44 jik5.kamens.us named[2145]: ---------------------------------------------------- Mar 22 16:31:44 jik5.kamens.us named[2145]: BIND 9 is maintained by Internet Systems Consortium, Mar 22 16:31:44 jik5.kamens.us named[2145]: Inc. (ISC), a non-profit 501(c)(3) public-benefit Mar 22 16:31:44 jik5.kamens.us named[2145]: corporation. Support and training for BIND 9 are Mar 22 16:31:44 jik5.kamens.us named[2145]: available at https://www.isc.org/support Mar 22 16:31:44 jik5.kamens.us named[2145]: ---------------------------------------------------- Mar 22 16:31:44 jik5.kamens.us named[2145]: adjusted limit on open files from 524288 to 1048576 Mar 22 16:31:44 jik5.kamens.us named[2145]: found 8 CPUs, using 8 worker threads Mar 22 16:31:44 jik5.kamens.us named[2145]: using 8 UDP listeners per interface Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service. Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: No valid path found for iw Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started ModemManager.service - Modem Manager. Mar 22 16:31:44 jik5.kamens.us nm-dispatcher[2235]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args none hostname Mar 22 16:31:44 jik5.kamens.us named[2145]: DNSSEC algorithms: RSASHA1 NSEC3RSASHA1 RSASHA256 RSASHA512 ECDSAP256SHA256 ECDSAP384SHA384 ED25519 ED448 Mar 22 16:31:44 jik5.kamens.us snapd[1955]: daemon.go:247: started snapd/2.58.3+23.04ubuntu1 (series 16; classic) ubuntu/23.04 (amd64) linux/6.1.0-16-generic. Mar 22 16:31:44 jik5.kamens.us named[2145]: DS algorithms: SHA-1 SHA-256 SHA-384 Mar 22 16:31:44 jik5.kamens.us named[2145]: HMAC algorithms: HMAC-MD5 HMAC-SHA1 HMAC-SHA224 HMAC-SHA256 HMAC-SHA384 HMAC-SHA512 Mar 22 16:31:44 jik5.kamens.us named[2145]: TKEY mode 2 support (Diffie-Hellman): yes Mar 22 16:31:44 jik5.kamens.us named[2145]: TKEY mode 3 support (GSS-API): yes Mar 22 16:31:44 jik5.kamens.us named[2145]: config.c: option 'trust-anchor-telemetry' is experimental and subject to change in the future Mar 22 16:31:44 jik5.kamens.us named[2145]: loading configuration from '/etc/bind/named.conf' Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.network1' unit='dbus-org.freedesktop.network1.service' requested by ':1.19' (uid=0 pid=2242 comm="/usr/bin/networkctl list --no-pager --no-legend" label="unconfined") Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.network1.service': Unit dbus-org.freedesktop.network1.service not found. Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[2242]: WARNING: systemd-networkd is not running, output will be incomplete. Mar 22 16:31:44 jik5.kamens.us nm-dispatcher[2235]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:31:44 jik5.kamens.us nm-dispatcher[2207]: req:1 'hostname', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:31:44 jik5.kamens.us kernel: loop44: detected capacity change from 0 to 8 Mar 22 16:31:44 jik5.kamens.us named[2145]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:31:44 jik5.kamens.us named[2145]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:31:44 jik5.kamens.us named[2145]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:31:44 jik5.kamens.us named[2145]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:31:44 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' requested by ':1.20' (uid=0 pid=2142 comm="/usr/sbin/cupsd -l" label="/usr/sbin/cupsd (enforce)") Mar 22 16:31:44 jik5.kamens.us systemd[1]: tmp-syscheck\x2dmountpoint\x2d2336243968.mount: Deactivated successfully. Mar 22 16:31:44 jik5.kamens.us snapd[1955]: daemon.go:340: adjusting startup timeout by 2m25s (pessimistic estimate of 30s plus 5s per snap) Mar 22 16:31:44 jik5.kamens.us fail2ban-server[2143]: 2023-03-22 16:31:44,888 fail2ban.configreader [2143]: WARNING 'allowipv6' not defined in 'Definition'. Using default one: 'auto' Mar 22 16:31:44 jik5.kamens.us systemd[1]: Starting colord.service - Manage, Install and Generate Color Profiles... Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started udisks2.service - Disk Manager. Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9653] device (wlp3s0): driver supports Access Point (AP) mode Mar 22 16:31:44 jik5.kamens.us named[2145]: listening on IPv4 interface lo, 127.0.0.1#53 Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9659] manager: (wlp3s0): new 802.11 Wi-Fi device (/org/freedesktop/NetworkManager/Devices/3) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9662] device (wlp3s0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:31:44 jik5.kamens.us named[2145]: IPv6 socket API is incomplete; explicitly binding to each IPv6 address separately Mar 22 16:31:44 jik5.kamens.us named[2145]: listening on IPv6 interface lo, ::1#53 Mar 22 16:31:44 jik5.kamens.us named[2145]: generating session key for dynamic DNS Mar 22 16:31:44 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: Link is Down Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9720] failed to open /run/network/ifstate Mar 22 16:31:44 jik5.kamens.us named[2145]: sizing zone task pool based on 50 zones Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9778] dispatcher: (1) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:31:44 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:44 jik5.kamens.us named[2145]: set up managed keys zone for view unrestricted, file 'unrestricted.mkeys' Mar 22 16:31:44 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:44 jik5.kamens.us named[2145]: set up managed keys zone for view opendns, file 'opendns.mkeys' Mar 22 16:31:44 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:44 jik5.kamens.us nm-dispatcher[2373]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args connectivity-change Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: ERROR:Unknown state for interface NetworkctlListState(idx=1, name='lo', type='loopback', operational='-', administrative='unmanaged'): - Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: Traceback (most recent call last): Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: File "/usr/bin/networkd-dispatcher", line 298, in trigger_all Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: self.handle_state(iface_name, Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: File "/usr/bin/networkd-dispatcher", line 348, in handle_state Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: raise UnknownState(operational_state) Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: UnknownState: - Mar 22 16:31:44 jik5.kamens.us named[2145]: command channel listening on 127.0.0.1#953 Mar 22 16:31:44 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:44 jik5.kamens.us named[2145]: command channel listening on ::1#953 Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9950] modem-manager: ModemManager available Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: ERROR:Unknown state for interface NetworkctlListState(idx=2, name='enp2s0', type='ether', operational='-', administrative='unmanaged'): - Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: Traceback (most recent call last): Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: File "/usr/bin/networkd-dispatcher", line 298, in trigger_all Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: self.handle_state(iface_name, Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: File "/usr/bin/networkd-dispatcher", line 348, in handle_state Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: raise UnknownState(operational_state) Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: UnknownState: - Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: ERROR:Unknown state for interface NetworkctlListState(idx=3, name='wlp3s0', type='wlan', operational='-', administrative='unmanaged'): - Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: Traceback (most recent call last): Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: File "/usr/bin/networkd-dispatcher", line 298, in trigger_all Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: self.handle_state(iface_name, Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: File "/usr/bin/networkd-dispatcher", line 348, in handle_state Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: raise UnknownState(operational_state) Mar 22 16:31:44 jik5.kamens.us networkd-dispatcher[1939]: UnknownState: - Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9963] manager: (7C:D9:5C:BA:3D:76): new Bluetooth device (/org/freedesktop/NetworkManager/Devices/4) Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9967] device (7C:D9:5C:BA:3D:76): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:31:44 jik5.kamens.us NetworkManager[2066]: [1679517104.9975] device (7C:D9:5C:BA:3D:76): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed') Mar 22 16:31:44 jik5.kamens.us systemd[1]: Started networkd-dispatcher.service - Dispatcher daemon for systemd-networkd. Mar 22 16:31:44 jik5.kamens.us nm-dispatcher[2373]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:31:44 jik5.kamens.us nm-dispatcher[2207]: req:2 'connectivity-change', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:31:45 jik5.kamens.us named[2145]: managed-keys-zone/unrestricted: loaded serial 0 Mar 22 16:31:45 jik5.kamens.us named[2145]: managed-keys-zone/opendns: loaded serial 0 Mar 22 16:31:45 jik5.kamens.us NetworkManager[2066]: [1679517105.0052] dispatcher: (2) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 28.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 4.168.192.in-addr.arpa/IN/unrestricted: loaded serial 2022113000 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 0.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 0.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 10.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 18.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 21.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 29.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 18.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 10.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 16.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 29.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 25.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 168.192.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 26.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 127.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 21.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 22.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 16.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 17.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 20.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 25.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 168.192.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 26.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.ColorManager' Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 27.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us systemd[1]: Started colord.service - Manage, Install and Generate Color Profiles. Mar 22 16:31:45 jik5.kamens.us named[2145]: zone localhost/IN/opendns: loaded serial 2 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone kamens.brookline.ma.us/IN/unrestricted: loaded serial 2022113000 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 30.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 27.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 19.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 22.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone kamens.brookline.ma.us/IN/opendns: loaded serial 2022113000 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 23.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us udisksd[1967]: Acquired the name org.freedesktop.UDisks2 on the system message bus Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 24.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 23.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 28.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 255.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 255.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 19.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 24.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone localhost/IN/unrestricted: loaded serial 2 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 30.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us systemd[1]: Started named.service - BIND Domain Name Server. Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 31.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 31.172.in-addr.arpa/IN/unrestricted: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 127.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 17.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 20.172.in-addr.arpa/IN/opendns: loaded serial 1 Mar 22 16:31:45 jik5.kamens.us named[2145]: zone 4.168.192.in-addr.arpa/IN/opendns: loaded serial 2022113000 Mar 22 16:31:45 jik5.kamens.us named[2145]: all zones loaded Mar 22 16:31:45 jik5.kamens.us named[2145]: running Mar 22 16:31:45 jik5.kamens.us accounts-daemon[1924]: started daemon version 22.08.8 Mar 22 16:31:45 jik5.kamens.us systemd[1]: Started accounts-daemon.service - Accounts Service. Mar 22 16:31:45 jik5.kamens.us snapd[1955]: backends.go:58: AppArmor status: apparmor is enabled and all features are available Mar 22 16:31:45 jik5.kamens.us avahi-daemon[1925]: Server startup complete. Host name is jik5.local. Local service cookie is 546201782. Mar 22 16:31:45 jik5.kamens.us audit[2142]: AVC apparmor="DENIED" operation="capable" profile="/usr/sbin/cupsd" pid=2142 comm="cupsd" capability=12 capname="net_admin" Mar 22 16:31:45 jik5.kamens.us systemd[1]: Started cups.service - CUPS Scheduler. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] Starting MariaDB 10.11.2-MariaDB-1 source revision as process 2362 Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Warning] WSREP: Failed to guess base node address. Set it explicitly via wsrep_node_address. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Warning] WSREP: Failed to guess base node address. Set it explicitly via wsrep_node_address. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Warning] WSREP: Guessing address for incoming client connections failed. Try setting wsrep_node_incoming_address explicitly. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] WSREP: Node addr: Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Compressed tables use zlib 1.2.13 Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Number of transaction pools: 1 Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Using crc32 + pclmulqdq instructions Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Using liburing Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Initializing buffer pool, total size = 128.000MiB, chunk size = 2.000MiB Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Completed initialization of buffer pool Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.404395102-04:00" level=info msg="starting containerd" revision= version=1.6.12-0ubuntu2 Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: File system buffers for log disabled (block size=512 bytes) Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.418067475-04:00" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.418327165-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.421138391-04:00" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.1.0-16-generic\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.421168938-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.421485012-04:00" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.421511854-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.421530592-04:00" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.421544162-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.421787824-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.426883225-04:00" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.427243412-04:00" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.427269536-04:00" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.427301164-04:00" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.427321031-04:00" level=info msg="metadata content store policy set" policy=shared Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429442760-04:00" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429468747-04:00" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429485813-04:00" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429524275-04:00" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429544813-04:00" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429568044-04:00" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429586118-04:00" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429604291-04:00" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429620463-04:00" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429637499-04:00" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429655133-04:00" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429674078-04:00" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429740126-04:00" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.429804340-04:00" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432033174-04:00" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432065296-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432080603-04:00" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432348978-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432366040-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432378956-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432390863-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432415971-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432439107-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432457217-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432474794-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.432494829-04:00" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433317166-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433341218-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433360011-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433377494-04:00" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433397528-04:00" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433413838-04:00" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433434221-04:00" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.433897971-04:00" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.434082682-04:00" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[BinaryName: CriuImagePath: CriuPath: CriuWorkPath: IoGid:0 IoUid:0 NoNewKeyring:false NoPivotRoot:false Root: ShimCgroup: SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.434179849-04:00" level=info msg="Connect containerd service" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.434342464-04:00" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.437890186-04:00" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.440472197-04:00" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.440535584-04:00" level=info msg=serving... address=/run/containerd/containerd.sock Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.440627228-04:00" level=info msg="containerd successfully booted in 0.043604s" Mar 22 16:31:45 jik5.kamens.us systemd[1]: Started containerd.service - containerd container runtime. Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.441616003-04:00" level=info msg="Start subscribing containerd event" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.441676823-04:00" level=info msg="Start recovering state" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.441757702-04:00" level=info msg="Start event monitor" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.441775119-04:00" level=info msg="Start snapshots syncer" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.441787284-04:00" level=info msg="Start cni network conf syncer for default" Mar 22 16:31:45 jik5.kamens.us containerd[2165]: time="2023-03-22T16:31:45.441797890-04:00" level=info msg="Start streaming server" Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: 128 rollback segments are active. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Setting file './ibtmp1' size to 12.000MiB. Physically writing the file full; Please wait ... Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: File './ibtmp1' size is now 12.000MiB. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: log sequence number 2563290250; transaction id 2957919 Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Loading buffer pool(s) from /var/lib/mysql/ib_buffer_pool Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] Plugin 'FEEDBACK' is disabled. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Warning] You need to use --log-bin to make --expire-logs-days or --binlog-expire-logs-seconds work. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] Server socket created on IP: '0.0.0.0'. Mar 22 16:31:45 jik5.kamens.us vboxdrv.sh[1968]: vboxdrv.sh: Starting VirtualBox services. Mar 22 16:31:45 jik5.kamens.us vboxdrv.sh[2565]: Starting VirtualBox services. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] /usr/sbin/mariadbd: ready for connections. Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: Version: '10.11.2-MariaDB-1' socket: '/run/mysqld/mysqld.sock' port: 3306 Ubuntu 23.04 Mar 22 16:31:45 jik5.kamens.us mariadbd[2362]: 2023-03-22 16:31:45 0 [Note] InnoDB: Buffer pool(s) load completed at 230322 16:31:45 Mar 22 16:31:45 jik5.kamens.us audit[2636]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine" pid=2636 comm="apparmor_parser" Mar 22 16:31:45 jik5.kamens.us audit[2636]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="/snap/core/14946/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2636 comm="apparmor_parser" Mar 22 16:31:45 jik5.kamens.us kernel: vboxdrv: Found 8 processor cores/threads Mar 22 16:31:45 jik5.kamens.us systemd[1]: Started mariadb.service - MariaDB 10.11.2 database server. Mar 22 16:31:45 jik5.kamens.us /etc/mysql/debian-start[2649]: Upgrading MySQL tables if necessary. Mar 22 16:31:45 jik5.kamens.us kernel: vboxdrv: TSC mode is Invariant, tentative frequency 4007998748 Hz Mar 22 16:31:45 jik5.kamens.us kernel: vboxdrv: Successfully loaded version 7.0.6 r155176 (interface 0x00330004) Mar 22 16:31:45 jik5.kamens.us /etc/mysql/debian-start[2652]: /usr/bin/mysql_upgrade: the '--basedir' option is always ignored Mar 22 16:31:45 jik5.kamens.us /etc/mysql/debian-start[2664]: Checking for insecure root accounts. Mar 22 16:31:45 jik5.kamens.us /etc/mysql/debian-start[2668]: Triggering myisam-recover for all MyISAM tables and aria-recover for all Aria tables Mar 22 16:31:45 jik5.kamens.us kernel: VBoxNetFlt: Successfully started. Mar 22 16:31:46 jik5.kamens.us fail2ban-server[2143]: Server ready Mar 22 16:31:46 jik5.kamens.us kernel: VBoxNetAdp: Successfully started. Mar 22 16:31:46 jik5.kamens.us vboxdrv.sh[2689]: VirtualBox services started. Mar 22 16:31:46 jik5.kamens.us systemd[1]: Started vboxdrv.service - VirtualBox Linux kernel module. Mar 22 16:31:46 jik5.kamens.us systemd[1]: Starting vboxautostart-service.service... Mar 22 16:31:46 jik5.kamens.us systemd[1]: Starting vboxballoonctrl-service.service... Mar 22 16:31:46 jik5.kamens.us systemd[1]: Started vboxballoonctrl-service.service. Mar 22 16:31:46 jik5.kamens.us systemd[1]: Started vboxautostart-service.service. Mar 22 16:31:46 jik5.kamens.us audit[2646]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.firefox" pid=2646 comm="apparmor_parser" Mar 22 16:31:46 jik5.kamens.us audit[2643]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snap-store" pid=2643 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: kauditd_printk_skb: 96 callbacks suppressed Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517106.996:108): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snap-store" pid=2643 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2647]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.chromium" pid=2647 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.136:109): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.chromium" pid=2647 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us systemd[1]: systemd-rfkill.service: Deactivated successfully. Mar 22 16:31:47 jik5.kamens.us audit[2645]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=2645 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.208:110): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.gnome-system-monitor" pid=2645 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2644]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=2644 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.284:111): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.snapd-desktop-integration" pid=2644 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2782]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=2782 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.296:112): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.bitcoin-core" pid=2782 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2786]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.tx" pid=2786 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2787]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.util" pid=2787 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.300:113): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.tx" pid=2786 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.300:114): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.util" pid=2787 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2784]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.daemon" pid=2784 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2783]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.cli" pid=2783 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2788]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.wallet" pid=2788 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2793]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.bw" pid=2793 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.304:115): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.daemon" pid=2784 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.304:116): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.cli" pid=2783 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us kernel: audit: type=1400 audit(1679517107.304:117): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.wallet" pid=2788 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2785]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bitcoin-core.qt" pid=2785 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2789]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.hook.configure" pid=2789 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2794]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.bw.bw" pid=2794 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2795]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snapd-desktop-integration.hook.configure" pid=2795 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started postgresql@15-main.service - PostgreSQL Cluster 15-main. Mar 22 16:31:47 jik5.kamens.us audit[2792]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.ubuntu-software-local-file" pid=2792 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2790]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.snap-store" pid=2790 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2791]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snap-store.ubuntu-software" pid=2791 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2802]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.cups" pid=2802 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2803]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.accept" pid=2803 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2796]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.snapd-desktop-integration.snapd-desktop-integration" pid=2796 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2798]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.gnome-system-monitor.gnome-system-monitor" pid=2798 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2804]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cancel" pid=2804 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2801]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.gnome-system-monitor.hook.configure" pid=2801 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2806]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsaccept" pid=2806 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2805]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cups-browsed" pid=2805 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2807]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsctl" pid=2807 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2808]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsd" pid=2808 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2810]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsenable" pid=2810 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2809]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsdisable" pid=2809 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2811]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsfilter" pid=2811 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us ModemManager[2104]: [base-manager] couldn't check support for device '/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0': not supported by any plugin Mar 22 16:31:47 jik5.kamens.us ModemManager[2104]: [base-manager] couldn't check support for device '/sys/devices/pci0000:00/0000:00:1c.5/0000:03:00.0': not supported by any plugin Mar 22 16:31:47 jik5.kamens.us audit[2812]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupsreject" pid=2812 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2813]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.cupstestppd" pid=2813 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2814]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.driverless" pid=2814 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2816]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.gs" pid=2816 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started postgresql@14-main.service - PostgreSQL Cluster 14-main. Mar 22 16:31:47 jik5.kamens.us audit[2818]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.ippfind" pid=2818 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2817]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.ippeveprinter" pid=2817 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2820]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.ipptool" pid=2820 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2822]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lp" pid=2822 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2824]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpc" pid=2824 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2823]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpadmin" pid=2823 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2825]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpinfo" pid=2825 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2826]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpoptions" pid=2826 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2827]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpq" pid=2827 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2828]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpr" pid=2828 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2831]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.reject" pid=2831 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2829]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lprm" pid=2829 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2830]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.cups.lpstat" pid=2830 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2838]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.disconnect-plug-host-hunspell" pid=2838 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2837]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.connect-plug-host-hunspell" pid=2837 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2836]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.configure" pid=2836 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2839]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.hook.post-refresh" pid=2839 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started postgresql@13-main.service - PostgreSQL Cluster 13-main. Mar 22 16:31:47 jik5.kamens.us audit[2841]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.vault" pid=2841 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2842]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.vault.vault" pid=2842 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2846]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.core" pid=2846 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2832]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.firefox" pid=2832 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2845]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.chromium.hook.configure" pid=2845 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2833]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.firefox.geckodriver" pid=2833 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2850]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=2850 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2847]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.core.hook.configure" pid=2847 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started postgresql@11-main.service - PostgreSQL Cluster 11-main. Mar 22 16:31:47 jik5.kamens.us audit[2855]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=2855 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2856]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.connect-plug-etc-update-motd-d" pid=2856 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2843]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.chromium.chromedriver" pid=2843 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started postgresql@12-main.service - PostgreSQL Cluster 12-main. Mar 22 16:31:47 jik5.kamens.us audit[2854]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=2854 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2852]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=2852 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2844]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.chromium.chromium" pid=2844 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2859]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.disconnect-plug-etc-update-motd-d" pid=2859 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us audit[2860]: AVC apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.remove" pid=2860 comm="apparmor_parser" Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting postgresql.service - PostgreSQL RDBMS... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Finished postgresql.service - PostgreSQL RDBMS. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started snapd.service - Snap Daemon. Mar 22 16:31:47 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' requested by ':1.28' (uid=0 pid=1955 comm="/usr/lib/snapd/snapd" label="unconfined") Mar 22 16:31:47 jik5.kamens.us systemd-journald[679]: Forwarding to syslog missed 416 messages. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting snapd.seeded.service - Wait until snapd is fully seeded... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting systemd-timedated.service - Time & Date Service... Mar 22 16:31:47 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.timedate1' Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started systemd-timedated.service - Time & Date Service. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Finished snapd.seeded.service - Wait until snapd is fully seeded. Mar 22 16:31:47 jik5.kamens.us systemd[1]: snapd.autoimport.service - Auto import assertions from block devices was skipped because no trigger condition checks were met. Mar 22 16:31:47 jik5.kamens.us audit[2154]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=2154 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:47 jik5.kamens.us audit[2154]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=2154 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:47 jik5.kamens.us audit[2163]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=2163 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:47 jik5.kamens.us audit[2163]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=2163 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7357] device (enp2s0): carrier: link connected Mar 22 16:31:47 jik5.kamens.us kernel: r8169 0000:02:00.0 enp2s0: Link is Up - 1Gbps/Full - flow control rx/tx Mar 22 16:31:47 jik5.kamens.us kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0: link becomes ready Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7359] device (enp2s0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7363] policy: auto-activating connection 'Wired connection 1' (1214ff09-82f6-38e6-8d8b-fb7bb07ff6cb) Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7368] device (enp2s0): Activation: starting connection 'Wired connection 1' (1214ff09-82f6-38e6-8d8b-fb7bb07ff6cb) Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7369] device (enp2s0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7371] manager: NetworkManager state is now CONNECTING Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7372] device (enp2s0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7378] device (enp2s0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7382] policy: set 'Wired connection 1' (enp2s0) as default for IPv4 routing and DNS Mar 22 16:31:47 jik5.kamens.us avahi-daemon[1925]: Joining mDNS multicast group on interface enp2s0.IPv4 with address 192.168.4.11. Mar 22 16:31:47 jik5.kamens.us avahi-daemon[1925]: New relevant interface enp2s0.IPv4 for mDNS. Mar 22 16:31:47 jik5.kamens.us avahi-daemon[1925]: Registering new address record for 192.168.4.11 on enp2s0.IPv4. Mar 22 16:31:47 jik5.kamens.us avahi-daemon[1925]: Registering new address record for 192.168.4.17 on enp2s0.IPv4. Mar 22 16:31:47 jik5.kamens.us named[2145]: listening on IPv4 interface enp2s0, 192.168.4.11#53 Mar 22 16:31:47 jik5.kamens.us avahi-daemon[1925]: Joining mDNS multicast group on interface enp2s0.IPv6 with address fe80::86a3:4d63:740b:50a6. Mar 22 16:31:47 jik5.kamens.us systemd-resolved[1436]: enp2s0: Bus client set search domain list to: kamens.brookline.ma.us, kamens.us Mar 22 16:31:47 jik5.kamens.us avahi-daemon[1925]: New relevant interface enp2s0.IPv6 for mDNS. Mar 22 16:31:47 jik5.kamens.us systemd-resolved[1436]: enp2s0: Bus client set default route setting: yes Mar 22 16:31:47 jik5.kamens.us avahi-daemon[1925]: Registering new address record for fe80::86a3:4d63:740b:50a6 on enp2s0.*. Mar 22 16:31:47 jik5.kamens.us named[2145]: listening on IPv4 interface enp2s0, 192.168.4.17#53 Mar 22 16:31:47 jik5.kamens.us systemd-resolved[1436]: enp2s0: Bus client set DNS server list to: 127.0.0.1 Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7429] device (enp2s0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7447] device (enp2s0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7448] device (enp2s0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7451] manager: NetworkManager state is now CONNECTED_SITE Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7454] device (enp2s0): Activation: successful, device activated. Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.7459] manager: startup complete Mar 22 16:31:47 jik5.kamens.us named[2145]: listening on IPv6 interface enp2s0, fe80::86a3:4d63:740b:50a6%2#53 Mar 22 16:31:47 jik5.kamens.us systemd[1]: Finished NetworkManager-wait-online.service - Network Manager Wait Online. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Reached target network-online.target - Network is Online. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started update-notifier-download.timer - Download data for packages that failed at package install time. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started update-notifier-motd.timer - Check to see whether there is a new version of Ubuntu available. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Reached target timers.target - Timer Units. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Mounting home-jik-ogg.mount - /home/jik/ogg... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Mounting home-jik-pictures.mount - /home/jik/pictures... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-music.mount - /mnt/nas/nfs/music... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Mounting mnt-nas-nfs-video.mount - /mnt/nas/nfs/video... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Mounting mnt-video.mount - /mnt/video... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started cups-browsed.service - Make remote CUPS printers available locally. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting ddclient.service - Update dynamic domain name service entries... Mar 22 16:31:47 jik5.kamens.us kernel: FS-Cache: Loaded Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting docker.service - Docker Application Container Engine... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting inotify-canary-pause.service - Pause inotify canary on shutdown... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started mongod.service - MongoDB Database Server. Mar 22 16:31:47 jik5.kamens.us inotify-canary[2916]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args post inotify-canary-pause.service Mar 22 16:31:47 jik5.kamens.us inotify-canary[2919]: /etc/NetworkManager/dispatcher.d/inotify-canary: forked from 2916 Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting postfix@-.service - Postfix Mail Transport Agent (instance -)... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting rpc-statd-notify.service - Notify NFS peers of a restart... Mar 22 16:31:47 jik5.kamens.us systemd[1]: ubuntu-advantage.service - Ubuntu Pro Background Auto Attach was skipped because no trigger condition checks were met. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting ubuntu-fan.service - Ubuntu FAN network setup... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Starting vboxweb-service.service... Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Finished inotify-canary-pause.service - Pause inotify canary on shutdown. Mar 22 16:31:47 jik5.kamens.us sm-notify[2924]: Version 2.6.2 starting Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started rpc-statd-notify.service - Notify NFS peers of a restart. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Started vboxweb-service.service. Mar 22 16:31:47 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.network1' unit='dbus-org.freedesktop.network1.service' requested by ':1.30' (uid=0 pid=2941 comm="networkctl" label="unconfined") Mar 22 16:31:47 jik5.kamens.us dbus-daemon[1927]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.network1.service': Unit dbus-org.freedesktop.network1.service not found. Mar 22 16:31:47 jik5.kamens.us NetworkManager[2066]: [1679517107.8949] manager: NetworkManager state is now CONNECTED_GLOBAL Mar 22 16:31:47 jik5.kamens.us whoopsie[2928]: [16:31:47] Using lock path: /var/lock/whoopsie/lock Mar 22 16:31:47 jik5.kamens.us kernel: Key type cifs.spnego registered Mar 22 16:31:47 jik5.kamens.us kernel: Key type cifs.idmap registered Mar 22 16:31:47 jik5.kamens.us kernel: CIFS: No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount. Mar 22 16:31:47 jik5.kamens.us kernel: CIFS: Attempting to mount \\nas.kamens.brookline.ma.us\photo Mar 22 16:31:47 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:31:47 jik5.kamens.us systemd[1]: tmp-snap.rootfs_GOuKL0.mount: Deactivated successfully. Mar 22 16:31:47 jik5.kamens.us su[2920]: (to jik) root on none Mar 22 16:31:47 jik5.kamens.us named[2145]: received control channel command 'reconfig' Mar 22 16:31:47 jik5.kamens.us named[2145]: loading configuration from '/etc/bind/named.conf' Mar 22 16:31:47 jik5.kamens.us named[2145]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:31:47 jik5.kamens.us systemd[1]: tmp-snap.rootfs_rp2tTm.mount: Deactivated successfully. Mar 22 16:31:47 jik5.kamens.us systemd[1]: Finished ubuntu-fan.service - Ubuntu FAN network setup. Mar 22 16:31:47 jik5.kamens.us named[2145]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:31:47 jik5.kamens.us named[2145]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:31:47 jik5.kamens.us named[2145]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:31:47 jik5.kamens.us named[2145]: sizing zone task pool based on 50 zones Mar 22 16:31:47 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:47 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:47 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:47 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:47 jik5.kamens.us named[2145]: reloading configuration succeeded Mar 22 16:31:47 jik5.kamens.us named[2145]: scheduled loading new zones Mar 22 16:31:47 jik5.kamens.us named[2145]: any newly configured zones are now loaded Mar 22 16:31:47 jik5.kamens.us named[2145]: running Mar 22 16:31:47 jik5.kamens.us su[2920]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:31:47 jik5.kamens.us systemd[1]: Created slice user-1000.slice - User Slice of UID 1000. Mar 22 16:31:48 jik5.kamens.us systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000... Mar 22 16:31:48 jik5.kamens.us systemd[1]: Started ddclient.service - Update dynamic domain name service entries. Mar 22 16:31:48 jik5.kamens.us kernel: CIFS: Attempting to mount \\nas.kamens.brookline.ma.us\music Mar 22 16:31:48 jik5.kamens.us systemd[1]: Mounted home-jik-pictures.mount - /home/jik/pictures. Mar 22 16:31:48 jik5.kamens.us systemd[1]: Finished user-runtime-dir@1000.service - User Runtime Directory /run/user/1000. Mar 22 16:31:48 jik5.kamens.us kernel: CIFS: Attempting to mount \\nas.kamens.brookline.ma.us\video Mar 22 16:31:48 jik5.kamens.us systemd[1]: Mounted home-jik-ogg.mount - /home/jik/ogg. Mar 22 16:31:48 jik5.kamens.us systemd[1]: Mounted mnt-video.mount - /mnt/video. Mar 22 16:31:48 jik5.kamens.us kernel: NFS: Registering the id_resolver key type Mar 22 16:31:48 jik5.kamens.us kernel: Key type id_resolver registered Mar 22 16:31:48 jik5.kamens.us kernel: Key type id_legacy registered Mar 22 16:31:48 jik5.kamens.us named[2145]: received control channel command 'reconfig' Mar 22 16:31:48 jik5.kamens.us named[2145]: loading configuration from '/etc/bind/named.conf' Mar 22 16:31:48 jik5.kamens.us named[2145]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:31:48 jik5.kamens.us named[2145]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:31:48 jik5.kamens.us named[2145]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:31:48 jik5.kamens.us named[2145]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:31:48 jik5.kamens.us named[2145]: sizing zone task pool based on 50 zones Mar 22 16:31:48 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:48 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:48 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:48 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:48 jik5.kamens.us named[2145]: reloading configuration succeeded Mar 22 16:31:48 jik5.kamens.us named[2145]: scheduled loading new zones Mar 22 16:31:48 jik5.kamens.us named[2145]: any newly configured zones are now loaded Mar 22 16:31:48 jik5.kamens.us named[2145]: running Mar 22 16:31:48 jik5.kamens.us systemd[1]: Starting rpc-statd.service - NFS status monitor for NFSv2/3 locking.... Mar 22 16:31:48 jik5.kamens.us rpc.statd[3319]: Version 2.6.2 starting Mar 22 16:31:48 jik5.kamens.us rpc.statd[3319]: Flags: TI-RPC Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + mkdir -p /var/snap/cups/872/var/log Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + mkdir -p /var/snap/cups/872/var/cache Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/872/var/run/certs Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + mkdir -p /var/snap/cups/872/var/run Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/872/var/log Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/872/var/cache/fontconfig Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + mkdir -p /var/snap/cups/common/etc/cups Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + CONF=/var/snap/cups/common/etc/cups/cups-browsed.conf Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + CLIENTCONF=/var/snap/cups/common/etc/cups/client.conf Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + DAEMON=cups-browsed Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + export LC_ALL=C.UTF-8 Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + export LANG=C.UTF-8 Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + TMPDIR=/var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + mkdir -p /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/common/etc/cups/ppd Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/common/etc/cups/ssl Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/common/run Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -m 0755 -p /run/cups Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + export LC_ALL=C.UTF-8 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + export LANG=C.UTF-8 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + export TMPDIR=/var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + CUPSTMPDIR=/var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ -d /var/snap/cups/872/tmp ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chown -R root.root /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + CUPSSTARTED=0 Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[3349]: + seq 60 Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + [ -r /var/snap/cups/872/var/run/cupsd.pid ] Mar 22 16:31:48 jik5.kamens.us cups.cups-browsed[2162]: + sleep 1 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chmod -R u+rwX /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + rm -rf /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ -d /var/snap/cups/872/tmp ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ -d /var/snap/cups/872/var/spool/tmp ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chown -R root.root /var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chmod -R u+rwX /var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + rm -rf /var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ -d /var/snap/cups/872/var/spool/tmp ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chown -R root.root /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chmod -R 1777 /var/snap/cups/872/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mkdir -p /var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chown -R root.snap_daemon /var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chmod -R 1770 /var/snap/cups/872/var/spool/tmp Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + CUPSUSER=snap_daemon Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + ALTCUPSUSER=root Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + CUPSGROUP=snap_daemon Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + ALTCUPSGROUP=root Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + CUPSSYSTEMGROUP=lpadmin Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + ALTCUPSSYSTEMGROUP=adm Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + TESTFILE=/var/snap/cups/872/tmp/testfile Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + touch /var/snap/cups/872/tmp/testfile Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chown snap_daemon /var/snap/cups/872/tmp/testfile Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + chgrp snap_daemon /var/snap/cups/872/tmp/testfile Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + rm -f /var/snap/cups/872/tmp/testfile Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + getent group lpadmin Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ ! -f /var/snap/cups/common/etc/cups/cups-files.conf ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + perl -p -i -e s:^(\s*\#)?\s*User\s+\S+\s*$:User snap_daemon\n:; -e s:^(\s*\#)?\s*Group\s+.*$:Group snap_daemon:; -e s:^(\s*\#)?\s*SystemGroup\s+.*$:SystemGroup lpadmin root:; -e s:^(\s*\#)?\s*AccessLog\s+.*$:AccessLog /var/snap/cups/872/var/log/access_log:; -e s:^(\s*\#)?\s*CacheDir\s+.*$:CacheDir /var/snap/cups/872/var/cache:; -e s:^(\s*\#)?\s*DataDir\s+.*$:DataDir /snap/cups/872/share/cups:; -e s:^(\s*\#)?\s*DocumentRoot\s+.*$:DocumentRoot /snap/cups/872/share/cups/doc:; -e s:^(\s*\#)?\s*ErrorLog\s+.*$:ErrorLog /var/snap/cups/872/var/log/error_log:; -e s:^(\s*\#)?\s*FontPath\s+.*$:\#FontPath (NOT SUPPORTED ANY MORE):; -e s:^(\s*\#)?\s*PageLog\s+.*$:PageLog /var/snap/cups/872/var/log/page_log:; -e s:^(\s*\#)?\s*Printcap\s+.*$:Printcap /var/snap/cups/common/etc/printcap:; -e s:^(\s*\#)?\s*RequestRoot\s+.*$:RequestRoot /var/snap/cups/872/var/spool:; -e s:^(\s*\#)?\s*ServerBin\s+.*$:ServerBin /snap/cups/872/lib/cups:; -e s:^(\s*\#)?\s*ServerRoot\s+.*$:ServerRoot /var/snap/cups/common/etc/cups:; -e s:^(\s*\#)?\s*StateDir\s+.*$:StateDir /var/snap/cups/872/var/run:; -e s:^(\s*\#)?\s*TempDir\s+.*$:TempDir /var/snap/cups/872/var/spool/tmp:; /var/snap/cups/common/etc/cups/cups-files.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + PROXY_MODE=NO Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + SYSTEM_CUPS_SERVER= Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + rm -f /var/snap/cups/872/var/run/proxy-mode Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ ! -f /var/snap/cups/common/no-proxy ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ -r /etc/cups/cupsd.conf ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + touch /var/snap/cups/872/var/run/proxy-mode Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + PROXY_MODE=YES Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + SYSTEM_CUPS_SERVER=localhost:631 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3376]: + grep -E ^[ \t]*Listen[ \t]+/ /etc/cups/cupsd.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + LINE=Listen /run/cups/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3378]: + echo Listen /run/cups/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3379]: + head -1 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3380]: + perl -p -e s:^\s*Listen\s+(\S+)\s*$:\1: Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + SYSTEM_CUPS_SERVER=/run/cups/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + PORT=631 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + ALTPORT=10631 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + DOMAINSOCKET=/run/cups/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ ! -d /run/cups ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + ALTDOMAINSOCKET=/var/snap/cups/common/run/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ YES = YES ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + PORT= Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + DOMAINSOCKET=/var/snap/cups/common/run/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ ! -f /var/snap/cups/common/etc/cups/cupsd.conf ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ YES = YES ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3382]: + cat /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3383]: + grep -v Listen Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3384]: + grep -v Port Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + mv /var/snap/cups/common/etc/cups/cupsd.conf.new /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + LISTENLINES= Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ /var/snap/cups/common/run/cups.sock = /var/snap/cups/common/run/cups.sock ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + LISTENLINES=Listen /var/snap/cups/common/run/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3387]: + cat /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3388]: + grep -v Listen Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + echo Listen /var/snap/cups/common/run/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + cat /var/snap/cups/common/etc/cups/cupsd.conf.new Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + rm -f /var/snap/cups/common/etc/cups/cupsd.conf.new Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + touch /var/snap/cups/common/etc/cups/client.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3393]: + cat /var/snap/cups/common/etc/cups/client.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3394]: + grep -v ServerName Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3392]: + true Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + echo ServerName /var/snap/cups/common/run/cups.sock Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + cat /var/snap/cups/common/etc/cups/client.conf.new Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + rm -f /var/snap/cups/common/etc/cups/client.conf.new Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ ! -f /var/snap/cups/common/etc/cups/snmp.conf ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3397]: + yes n Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3398]: + cp -ri /snap/cups/872/etc/cups/ppd /var/snap/cups/common/etc/cups/ Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3399]: + yes n Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3400]: + cp -ri /snap/cups/872/etc/cups/ssl /var/snap/cups/common/etc/cups/ Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + SCHEDULER=cupsd Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + CUPS_PID=3401 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3401]: + Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: echo 3401 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3401]: exec cupsd -f -s /var/snap/cups/common/etc/cups/cups-files.conf -c /var/snap/cups/common/etc/cups/cupsd.conf Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + [ YES = YES ] Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + PROXY_DAEMON=cups-proxyd Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + PROXYD_PID=3402 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3402]: + Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + echo 3402 Mar 22 16:31:48 jik5.kamens.us cups.cupsd[3402]: exec cups-proxyd /var/snap/cups/common/run/cups.sock /run/cups/cups.sock -l --logdir /var/snap/cups/872/var/log Mar 22 16:31:48 jik5.kamens.us cups.cupsd[2163]: + wait 3401 Mar 22 16:31:48 jik5.kamens.us canonical-livepatch.canonical-livepatchd[2154]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:31:48 jik5.kamens.us audit[3401]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3401 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7f1203d5539b code=0x50000 Mar 22 16:31:49 jik5.kamens.us audit[1927]: USER_AVC pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/ColorManager/devices/cups_HP_Color_LaserJet_Pro_M478f_9f_3279B8" interface="org.freedesktop.ColorManager.Device" member="AddProfile" mask="send" name="org.freedesktop.ColorManager" pid=3401 label="snap.cups.cupsd" peer_pid=2300 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:31:49 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:31:49 jik5.kamens.us audit[1927]: USER_AVC pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/ColorManager/devices/cups_HP_Color_LaserJet_Pro_M478f_9f_3279B8" interface="org.freedesktop.ColorManager.Device" member="AddProfile" mask="send" name="org.freedesktop.ColorManager" pid=3401 label="snap.cups.cupsd" peer_pid=2300 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:31:49 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + [ -r /var/snap/cups/872/var/run/cupsd.pid ] Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[3413]: + cat /var/snap/cups/872/var/run/cupsd.pid Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + PID=3401 Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + [ -n 3401 ] Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + kill -0 3401 Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + CUPSSTARTED=1 Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + break Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + [ 1 = 0 ] Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + PID= Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + [ ! -e /var/snap/cups/872/var/run/proxy-mode ] Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + PID=3415 Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[3415]: + Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + echo 3415 Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[3415]: true Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[3415]: + sleep 3600 Mar 22 16:31:49 jik5.kamens.us cups.cups-browsed[2162]: + wait 3415 Mar 22 16:31:49 jik5.kamens.us ddclient[3432]: FAILED: updating Home: unexpected status (13) Mar 22 16:31:49 jik5.kamens.us ddclient[3434]: SUCCESS: updating : good: IP address set to 108.26.214.208 Mar 22 16:31:49 jik5.kamens.us ddclient[3436]: FAILED: updating : unexpected status (0) Mar 22 16:31:49 jik5.kamens.us ddclient[3438]: FAILED: was not updated because protocol is not supported. Mar 22 16:31:49 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:31:49 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:31:49 jik5.kamens.us systemd[1]: Started rpc-statd.service - NFS status monitor for NFSv2/3 locking.. Mar 22 16:31:49 jik5.kamens.us mount[3466]: Created symlink /run/systemd/system/remote-fs.target.wants/rpc-statd.service → /lib/systemd/system/rpc-statd.service. Mar 22 16:31:49 jik5.kamens.us systemd[1]: Reloading. Mar 22 16:31:49 jik5.kamens.us postfix[3477]: Postfix is using backwards-compatible default settings Mar 22 16:31:49 jik5.kamens.us postfix[3477]: See http://www.postfix.org/COMPATIBILITY_README.html for details Mar 22 16:31:49 jik5.kamens.us postfix[3477]: To disable backwards compatibility use "postconf compatibility_level=3.6" and "postfix reload" Mar 22 16:31:49 jik5.kamens.us audit[3402]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3402 comm="cups-proxyd" exe="/snap/cups/872/sbin/cups-proxyd" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7fbb37c6a73d code=0x50000 Mar 22 16:31:49 jik5.kamens.us yubikey-monitor.sh[1969]: {"status":1,"request":"6ba2a045-71a1-4339-8106-7cc5723f5239"} Mar 22 16:31:49 jik5.kamens.us yubikey-monitor.sh[1969]: Triggered https://api.pushover.net/1/messages.json Mar 22 16:31:50 jik5.kamens.us postfix/postfix-script[3611]: starting the Postfix mail system Mar 22 16:31:50 jik5.kamens.us postfix/master[3613]: daemon started -- version 3.7.4, configuration /etc/postfix Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.133178599-04:00" level=info msg="Starting up" Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.136842377-04:00" level=info msg="detected 127.0.0.53 nameserver, assuming systemd-resolved, so using resolv.conf: /run/systemd/resolve/resolv.conf" Mar 22 16:31:50 jik5.kamens.us audit[3618]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=3618 comm="apparmor_parser" Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.178575042-04:00" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.178603324-04:00" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.178627220-04:00" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.178643722-04:00" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.194408882-04:00" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.194427635-04:00" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.194442835-04:00" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.194452464-04:00" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.242778188-04:00" level=info msg="[graphdriver] using prior storage driver: overlay2" Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.254960678-04:00" level=info msg="Loading containers: start." Mar 22 16:31:50 jik5.kamens.us kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 22 16:31:50 jik5.kamens.us kernel: Bridge firewalling registered Mar 22 16:31:50 jik5.kamens.us kernel: Initializing XFRM netlink socket Mar 22 16:31:50 jik5.kamens.us named[2145]: listening on IPv4 interface docker0, 172.17.0.1#53 Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.3349] manager: (docker0): new Bridge device (/org/freedesktop/NetworkManager/Devices/5) Mar 22 16:31:50 jik5.kamens.us avahi-daemon[1925]: Joining mDNS multicast group on interface docker0.IPv4 with address 172.17.0.1. Mar 22 16:31:50 jik5.kamens.us avahi-daemon[1925]: New relevant interface docker0.IPv4 for mDNS. Mar 22 16:31:50 jik5.kamens.us avahi-daemon[1925]: Registering new address record for 172.17.0.1 on docker0.IPv4. Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4115] device (docker0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4119] device (docker0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4124] device (docker0): Activation: starting connection 'docker0' (3c667198-5cf9-4da5-90c7-c903e370f0f8) Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4126] device (docker0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4128] device (docker0): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4130] device (docker0): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4131] device (docker0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4141] device (docker0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4143] device (docker0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.4146] device (docker0): Activation: successful, device activated. Mar 22 16:31:50 jik5.kamens.us nfsrahead[3744]: setting /mnt/nas/nfs/video readahead to 128 Mar 22 16:31:50 jik5.kamens.us nfsrahead[3745]: setting /mnt/nas/nfs/homes readahead to 128 Mar 22 16:31:50 jik5.kamens.us nfsrahead[3746]: setting /mnt/nas/nfs/music readahead to 128 Mar 22 16:31:50 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-homes.mount - /mnt/nas/nfs/homes. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-music.mount - /mnt/nas/nfs/music. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-video.mount - /mnt/nas/nfs/video. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started postfix@-.service - Postfix Mail Transport Agent (instance -). Mar 22 16:31:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 1. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Mounted mnt-nas-nfs-photo.mount - /mnt/nas/nfs/photo. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Reached target remote-fs.target - Remote File Systems. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting apache2.service - The Apache HTTP Server... Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting apport.service - automatic crash report generation... Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting atd.service - Deferred execution scheduler... Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.646827768-04:00" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started cron.service - Regular background program processing daemon. Mar 22 16:31:50 jik5.kamens.us cron[3764]: (CRON) INFO (pidfile fd = 3) Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting kerneloops.service - Tool to automatically collect and submit kernel crash signatures... Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[3766]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args enp2s0 up Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting postfix.service - Postfix Mail Transport Agent... Mar 22 16:31:50 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[3766]: /etc/NetworkManager/dispatcher.d/inotify-canary: unpause mode Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[3782]: /etc/NetworkManager/dispatcher.d/inotify-canary: forked from 3766 Mar 22 16:31:50 jik5.kamens.us systemd[1]: systemd-pcrphase.service - TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Mar 22 16:31:50 jik5.kamens.us su[3784]: (to jik) root on none Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting virtualbox.service - LSB: VirtualBox Linux kernel module... Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started atd.service - Deferred execution scheduler. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Finished postfix.service - Postfix Mail Transport Agent. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[3807]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args connectivity-change Mar 22 16:31:50 jik5.kamens.us cron[3764]: (quantobox) ORPHAN (no passwd entry) Mar 22 16:31:50 jik5.kamens.us cron[3764]: (CRON) INFO (Running @reboot jobs) Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[3807]: /etc/NetworkManager/dispatcher.d/inotify-canary: don't know what to do, exiting Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[2207]: req:5 'connectivity-change', "/etc/NetworkManager/dispatcher.d/inotify-canary": complete: failed with Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:31:50 jik5.kamens.us NetworkManager[2066]: [1679517110.6756] dispatcher: (5) /etc/NetworkManager/dispatcher.d/inotify-canary failed (failed): Script '/etc/NetworkManager/dispatcher.d/inotify-canary' exited with status 1. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting gdm.service - GNOME Display Manager... Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting plymouth-quit-wait.service - Hold until boot process finishes up... Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting user@1000.service - User Manager for UID 1000... Mar 22 16:31:50 jik5.kamens.us systemd[1]: kerneloops.service: Found left-over process 3827 (kerneloops) in control group while starting unit. Ignoring. Mar 22 16:31:50 jik5.kamens.us systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started virtualbox.service - LSB: VirtualBox Linux kernel module. Mar 22 16:31:50 jik5.kamens.us audit[3779]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=3779 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:50 jik5.kamens.us audit[3779]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=3779 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:50 jik5.kamens.us su[3784]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started kerneloops.service - Tool to automatically collect and submit kernel crash signatures. Mar 22 16:31:50 jik5.kamens.us systemd[3832]: pam_unix(systemd-user:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:31:50 jik5.kamens.us canonical-livepatch.canonical-livepatchd[3779]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:31:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:31:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:31:50 jik5.kamens.us named[2145]: received control channel command 'reconfig' Mar 22 16:31:50 jik5.kamens.us named[2145]: loading configuration from '/etc/bind/named.conf' Mar 22 16:31:50 jik5.kamens.us named[2145]: reading built-in trust anchors from file '/etc/bind/bind.keys' Mar 22 16:31:50 jik5.kamens.us named[2145]: looking for GeoIP2 databases in '/usr/share/GeoIP' Mar 22 16:31:50 jik5.kamens.us named[2145]: using default UDP/IPv4 port range: [32768, 60999] Mar 22 16:31:50 jik5.kamens.us named[2145]: using default UDP/IPv6 port range: [32768, 60999] Mar 22 16:31:50 jik5.kamens.us named[2145]: sizing zone task pool based on 50 zones Mar 22 16:31:50 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:50 jik5.kamens.us named[2145]: none:99: 'max-cache-size 90%' - setting to 14354MB (out of 15949MB) Mar 22 16:31:50 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:50 jik5.kamens.us named[2145]: configuring command channel from '/etc/bind/rndc.key' Mar 22 16:31:50 jik5.kamens.us named[2145]: reloading configuration succeeded Mar 22 16:31:50 jik5.kamens.us named[2145]: scheduled loading new zones Mar 22 16:31:50 jik5.kamens.us named[2145]: any newly configured zones are now loaded Mar 22 16:31:50 jik5.kamens.us named[2145]: running Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.729848717-04:00" level=info msg="Loading containers: done." Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: Configuration file /etc/xdg/autostart/uwidgets-runner.desktop is marked executable. Please remove executable permission bits. Proceeding anyway. Mar 22 16:31:50 jik5.kamens.us systemd-journald[679]: File /var/log/journal/dca43d426a4043fd96f7351cc9f080c2/user-1000.journal corrupted or uncleanly shut down, renaming and replacing. Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[4006]: /etc/NetworkManager/dispatcher.d/inotify-canary: starting with args docker0 up Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[4006]: /etc/NetworkManager/dispatcher.d/inotify-canary: unpause mode Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: Exec binary '/usr/lib/x86_64-linux-gnu/indicator-application/indicator-application-service' does not exist: No such file or directory Mar 22 16:31:50 jik5.kamens.us su[4012]: (to jik) root on none Mar 22 16:31:50 jik5.kamens.us nm-dispatcher[4011]: /etc/NetworkManager/dispatcher.d/inotify-canary: forked from 4006 Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: /etc/xdg/autostart/indicator-application.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:31:50 jik5.kamens.us su[4012]: pam_unix(su:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: Exec binary 'gsettings-data-convert' does not exist: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: /etc/xdg/autostart/gsettings-data-convert.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: Exec binary '/usr/share/ibus-mozc/ibus-mozc-gnome-initial-setup.sh' does not exist: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: /etc/xdg/autostart/ibus-mozc-gnome-initial-setup.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: Exec binary 'nemo-desktop' does not exist: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: /etc/xdg/autostart/nemo-unity-autostart.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: Exec binary '/usr/libexec/gnome-shell-overrides-migration.sh' does not exist: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd-xdg-autostart-generator[3891]: /etc/xdg/autostart/gnome-shell-overrides-migration.desktop: not generating unit, error parsing Exec= line: No such file or directory Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started apache2.service - The Apache HTTP Server. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started gdm.service - GNOME Display Manager. Mar 22 16:31:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 2. Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.855634120-04:00" level=info msg="Docker daemon" commit=20.10.21-0ubuntu3 graphdriver(s)=overlay2 version=20.10.21 Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.856834154-04:00" level=info msg="Daemon has completed initialization" Mar 22 16:31:50 jik5.kamens.us systemd[1]: Starting apport-autoreport.service - Process error reports when automatic reporting is enabled... Mar 22 16:31:50 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Started docker.service - Docker Application Container Engine. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Finished apport.service - automatic crash report generation. Mar 22 16:31:50 jik5.kamens.us dockerd[2915]: time="2023-03-22T16:31:50.890561347-04:00" level=info msg="API listen on /run/docker.sock" Mar 22 16:31:50 jik5.kamens.us whoopsie[4088]: [16:31:50] Using lock path: /var/lock/whoopsie/lock Mar 22 16:31:50 jik5.kamens.us audit[4082]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=4082 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:50 jik5.kamens.us audit[4082]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=4082 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:50 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:31:50 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4082]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:31:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:31:50 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:31:50 jik5.kamens.us systemd[1]: Received SIGRTMIN+21 from PID 513 (plymouthd). Mar 22 16:31:50 jik5.kamens.us gdm-autologin][4114]: gkr-pam: no password is available for user Mar 22 16:31:51 jik5.kamens.us gdm-autologin][4114]: pam_env(gdm-autologin:session): deprecated reading of user environment enabled Mar 22 16:31:51 jik5.kamens.us gdm-autologin][4114]: pam_unix(gdm-autologin:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:31:51 jik5.kamens.us systemd-logind[1963]: New session 2 of user jik. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Queued start job for default target default.target. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Created slice app.slice - User Application Slice. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Created slice session.slice - User Core Session Slice. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Created slice background.slice - User Background Tasks Slice. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started ubuntu-report.path - Pending report trigger for Ubuntu Report. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Reached target paths.target - Paths. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Reached target timers.target - Timers. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Starting dbus.socket - D-Bus User Message Bus Socket... Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on dirmngr.socket - GnuPG network certificate management daemon. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on gcr-ssh-agent.socket - GCR ssh-agent wrapper. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on gnome-keyring-daemon.socket - GNOME Keyring daemon. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on gpg-agent-browser.socket - GnuPG cryptographic agent and passphrase cache (access for web browsers). Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on gpg-agent-extra.socket - GnuPG cryptographic agent and passphrase cache (restricted). Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on gpg-agent-ssh.socket - GnuPG cryptographic agent (ssh-agent emulation). Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on gpg-agent.socket - GnuPG cryptographic agent and passphrase cache. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on pipewire.socket - PipeWire Multimedia System Socket. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on pk-debconf-helper.socket - debconf communication socket. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on snapd.session-agent.socket - REST API socket for snapd user session agent. Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 3. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Listening on dbus.socket - D-Bus User Message Bus Socket. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Reached target sockets.target - Sockets. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Reached target basic.target - Basic System. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started appimagelauncherd.service - AppImageLauncher daemon. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started user@1000.service - User Manager for UID 1000. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started eruv.service - Eruv status checker. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started session-2.scope - Session 2 of User jik. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started pipewire.service - PipeWire Multimedia Service. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started session-c1.scope - Session c1 of User jik. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started session-c2.scope - Session c2 of User jik. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started session-c3.scope - Session c3 of User jik. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Starting synology-inotify.service - Force hard-linked files to sync to Synology Drive... Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Starting tracker-extract-3.service - Tracker metadata extractor... Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started wireplumber.service - Multimedia Service Session Manager. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started pipewire-pulse.service - PipeWire PulseAudio. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started x10-transceiver.service - X10 transceiver. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started synology-inotify.service - Force hard-linked files to sync to Synology Drive. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started gnome-keyring-daemon.service - GNOME Keyring daemon. Mar 22 16:31:51 jik5.kamens.us audit[4121]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=4121 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:51 jik5.kamens.us audit[4121]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=4121 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:51 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4121]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:31:51 jik5.kamens.us gnome-keyring-daemon[4142]: GNOME_KEYRING_CONTROL=/run/user/1000/keyring Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Starting dbus.service - D-Bus User Message Bus... Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] AppArmor D-Bus mediation is enabled Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started dbus.service - D-Bus User Message Bus. Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating systemd to hand-off: service name='org.freedesktop.portal.Documents' unit='xdg-document-portal.service' requested by ':1.1' (uid=1000 pid=4127 comm="/usr/bin/snap run snapd-desktop-integration" label="unconfined") Mar 22 16:31:51 jik5.kamens.us wireplumber[4133]: Can't find org.freedesktop.portal.Desktop. Is xdg-desktop-portal running? Mar 22 16:31:51 jik5.kamens.us wireplumber[4133]: found session bus but no portal Mar 22 16:31:51 jik5.kamens.us pipewire[4124]: mod.rt: Can't find org.freedesktop.portal.Desktop. Is xdg-desktop-portal running? Mar 22 16:31:51 jik5.kamens.us pipewire[4124]: mod.rt: found session bus but no portal Mar 22 16:31:51 jik5.kamens.us pipewire-pulse[4139]: mod.rt: Can't find org.freedesktop.portal.Desktop. Is xdg-desktop-portal running? Mar 22 16:31:51 jik5.kamens.us pipewire-pulse[4139]: mod.rt: found session bus but no portal Mar 22 16:31:51 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.RealtimeKit1' unit='rtkit-daemon.service' requested by ':1.49' (uid=1000 pid=4124 comm="/usr/bin/pipewire" label="unconfined") Mar 22 16:31:51 jik5.kamens.us systemd[1]: Starting rtkit-daemon.service - RealtimeKit Scheduling Policy Service... Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating systemd to hand-off: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.5' (uid=1000 pid=4132 comm="/usr/libexec/tracker-extract-3" label="unconfined") Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.systemd1' Mar 22 16:31:51 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.RealtimeKit1' Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully called chroot. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully dropped privileges. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully limited resources. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Running. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Watchdog thread running. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Canary thread running. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started rtkit-daemon.service - RealtimeKit Scheduling Policy Service. Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 4. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Starting gvfs-daemon.service - Virtual filesystem service... Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Starting xdg-document-portal.service - flatpak document portal service... Mar 22 16:31:51 jik5.kamens.us whoopsie-upload-all[4073]: INFO:root: skipping, not a crash Mar 22 16:31:51 jik5.kamens.us whoopsie-upload-all[4073]: INFO:root:/var/crash/_usr_libexec_tracker-extract-3.1000.crash already marked for upload, skipping Mar 22 16:31:51 jik5.kamens.us whoopsie-upload-all[4073]: INFO:root:/var/crash/_usr_lib_x86_64-linux-gnu_indicator-messages_indicator-messages-service.1000.crash already marked for upload, skipping Mar 22 16:31:51 jik5.kamens.us whoopsie-upload-all[4073]: INFO:root:/var/crash/_usr_bin_gnome-shell.1000.crash already marked for upload, skipping Mar 22 16:31:51 jik5.kamens.us whoopsie-upload-all[4073]: INFO:root:/var/crash/_usr_bin_emacs-gtk.1000.crash already marked for upload, skipping Mar 22 16:31:51 jik5.kamens.us whoopsie-upload-all[4073]: INFO:root:Waiting for whoopsie to upload reports (timeout: 20 s) Mar 22 16:31:51 jik5.kamens.us whoopsie-upload-all[4073]: INFO:root:All reports uploaded successfully Mar 22 16:31:51 jik5.kamens.us gdm-autologin][4114]: gkr-pam: couldn't unlock the login keyring. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully made thread 4124 of process 4124 owned by '1000' high priority at nice level -11. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 1 threads of 1 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully made thread 4133 of process 4133 owned by '1000' high priority at nice level -11. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 2 threads of 2 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.freedesktop.impl.portal.PermissionStore' unit='xdg-permission-store.service' requested by ':1.8' (uid=1000 pid=4185 comm="/usr/libexec/xdg-document-portal" label="unconfined") Mar 22 16:31:51 jik5.kamens.us audit[4184]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=4184 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:51 jik5.kamens.us audit[4184]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=4184 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully made thread 4139 of process 4139 owned by '1000' high priority at nice level -11. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 3 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 3 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 3 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 3 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us systemd[1]: apport-autoreport.service: Deactivated successfully. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Finished apport-autoreport.service - Process error reports when automatic reporting is enabled. Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Starting xdg-permission-store.service - sandboxed app permission store... Mar 22 16:31:51 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4184]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4202 (gpu-manager) of process 4202 (gpu-manager) Mar 22 16:31:51 jik5.kamens.us whoopsie[4191]: [16:31:51] Using lock path: /var/lock/whoopsie/lock Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.impl.portal.PermissionStore' Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started xdg-permission-store.service - sandboxed app permission store. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 3 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.portal.Documents' Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started xdg-document-portal.service - flatpak document portal service. Mar 22 16:31:51 jik5.kamens.us appimagelauncherd[4122]: Searching for existing AppImages Mar 22 16:31:51 jik5.kamens.us appimagelauncherd[4122]: Searching directory: /home/jik Mar 22 16:31:51 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gtk.vfs.Daemon' Mar 22 16:31:51 jik5.kamens.us xdg-document-portal[4185]: Ignoring invalid max threads value 4294967295 > max (100000). Mar 22 16:31:51 jik5.kamens.us systemd[3832]: Started gvfs-daemon.service - Virtual filesystem service. Mar 22 16:31:51 jik5.kamens.us appimagelauncherd[4122]: Searching directory: /home/jik/Applications Mar 22 16:31:51 jik5.kamens.us appimagelauncherd[4122]: Found AppImage: /home/jik/Applications/digiKam-7.9.0-x86-64.appimage Mar 22 16:31:51 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:31:51 jik5.kamens.us appimagelauncherd[4122]: AppImage integrated already, skipping Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully made thread 4242 of process 4133 owned by '1000' RT at priority 20. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 4 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 4 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 4 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully made thread 4247 of process 4124 owned by '1000' RT at priority 20. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 5 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4266 (Xorg.wrap) of process 4266 (Xorg.wrap) Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Successfully made thread 4258 of process 4139 owned by '1000' RT at priority 20. Mar 22 16:31:51 jik5.kamens.us rtkit-daemon[4180]: Supervising 6 threads of 3 processes of 1 users. Mar 22 16:31:51 jik5.kamens.us appimagelauncherd[4122]: Watching directories: /home/jik /home/jik/Applications Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) Log file renamed from "/home/jik/.local/share/xorg/Xorg.pid-4266.log" to "/home/jik/.local/share/xorg/Xorg.0.log" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: X.Org X Server 1.21.1.7 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: X Protocol Version 11, Revision 0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Current Operating System: Linux jik5.kamens.us 6.1.0-16-generic #16-Ubuntu SMP PREEMPT_DYNAMIC Fri Feb 24 14:37:30 UTC 2023 x86_64 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Kernel command line: BOOT_IMAGE=/vmlinuz-6.1.0-16-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: xorg-server 2:21.1.7-1ubuntu2 (For technical support please see http://www.ubuntu.com/support) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Current version of pixman: 0.42.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Before reporting problems, check http://wiki.x.org Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: to make sure that you have the latest version. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Markers: (--) probed, (**) from config file, (==) default setting, Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (++) from command line, (!!) notice, (II) informational, Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) warning, (EE) error, (NI) not implemented, (??) unknown. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Log file: "/home/jik/.local/share/xorg/Xorg.0.log", Time: Wed Mar 22 16:31:51 2023 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Using system config directory "/usr/share/X11/xorg.conf.d" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) No Layout section. Using the first Screen section. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) No screen section available. Using defaults. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) |-->Screen "Default Screen Section" (0) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) | |-->Monitor "" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) No monitor specified for screen "Default Screen Section". Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Using a default monitor configuration. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Automatically adding devices Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Automatically enabling devices Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Automatically adding GPU devices Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Automatically binding GPU devices Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Max clients allowed: 256, resource mask: 0x1fffff Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) The directory "/usr/share/fonts/X11/cyrillic" does not exist. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Entry deleted from font path. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) The directory "/usr/share/fonts/X11/100dpi/" does not exist. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Entry deleted from font path. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) The directory "/usr/share/fonts/X11/75dpi/" does not exist. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Entry deleted from font path. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) The directory "/usr/share/fonts/X11/100dpi" does not exist. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Entry deleted from font path. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) The directory "/usr/share/fonts/X11/75dpi" does not exist. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Entry deleted from font path. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) FontPath set to: Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: /usr/share/fonts/X11/misc, Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: /usr/share/fonts/X11/Type1, Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: built-ins Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) ModulePath set to "/usr/lib/xorg/modules" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) The server relies on udev to provide the list of input devices. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: If no devices become available, reconfigure udev or disable AutoAddDevices. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loader magic: 0x5643f5c23020 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module ABI versions: Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: X.Org ANSI C Emulation: 0.4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: X.Org Video Driver: 25.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: X.Org XInput driver : 24.4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: X.Org Server Extension : 10.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (++) using VT number 2 Mar 22 16:31:51 jik5.kamens.us python3[4131]: Starting watcher for /home/jik/CloudStation Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: took control of session /org/freedesktop/login1/session/_32 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) xfree86: Adding drm device (/dev/dri/card0) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Platform probe for /sys/devices/pci0000:00/0000:00:01.0/0000:01:00.0/drm/card0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/dri/card0 226:0 fd 14 paused 0 Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 5. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) xfree86: Adding drm device (/dev/dri/card1) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Platform probe for /sys/devices/platform/evdi.0/drm/card1 Mar 22 16:31:51 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us wireplumber[4133]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Mar 22 16:31:51 jik5.kamens.us wireplumber[4133]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/dri/card1 226:1 fd 15 paused 0 Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 1963 (systemd-logind) of process 1963 (systemd-logind) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) xfree86: Adding drm device (/dev/dri/card2) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Platform probe for /sys/devices/platform/evdi.1/drm/card2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/dri/card2 226:2 fd 16 paused 0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) xfree86: Adding drm device (/dev/dri/card3) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Platform probe for /sys/devices/platform/evdi.2/drm/card3 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/dri/card3 226:3 fd 17 paused 0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) xfree86: Adding drm device (/dev/dri/card4) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Platform probe for /sys/devices/platform/evdi.3/drm/card4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/dri/card4 226:4 fd 18 paused 0 Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 1963 (systemd-logind) of process 1963 (systemd-logind) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 1963 (systemd-logind) of process 1963 (systemd-logind) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 1963 (systemd-logind) of process 1963 (systemd-logind) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) OutputClass "nvidia" ModulePath extended to "/usr/lib/x86_64-linux-gnu/nvidia/xorg,/usr/lib/xorg/modules" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) PCI:*(1@0:0:0) 10de:13c2:196e:1131 rev 161, Mem @ 0xde000000/16777216, 0xc0000000/268435456, 0xd0000000/33554432, I/O @ 0x0000e000/128, BIOS @ 0x????????/131072 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "glx" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/extensions/libglx.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module glx: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 1.0.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org Server Extension, version 10.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Applying OutputClass "nvidia" to /dev/dri/card0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: loading driver: nvidia Mar 22 16:31:51 jik5.kamens.us systemd[1]: Started snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us audit[3401]: SECCOMP auid=4294967295 uid=0 gid=0 ses=4294967295 subj=? pid=3401 comm="cupsd" exe="/snap/cups/872/sbin/cupsd" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7f1203d5539b code=0x50000 Mar 22 16:31:51 jik5.kamens.us systemd[1]: tmp-snap.rootfs_cWryj8.mount: Deactivated successfully. Mar 22 16:31:51 jik5.kamens.us canonical-livepatch.canonical-livepatchd[4274]: The platform Ubuntu 23.04 is not supported. exiting. Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Main process exited, code=exited, status=1/FAILURE Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:31:51 jik5.kamens.us su[4012]: pam_unix(su:session): session closed for user jik Mar 22 16:31:51 jik5.kamens.us su[3784]: pam_unix(su:session): session closed for user jik Mar 22 16:31:51 jik5.kamens.us systemd[1]: session-c3.scope: Deactivated successfully. Mar 22 16:31:51 jik5.kamens.us kernel: Bluetooth: RFCOMM TTY layer initialized Mar 22 16:31:51 jik5.kamens.us kernel: Bluetooth: RFCOMM socket layer initialized Mar 22 16:31:51 jik5.kamens.us kernel: Bluetooth: RFCOMM ver 1.11 Mar 22 16:31:51 jik5.kamens.us su[2920]: pam_unix(su:session): session closed for user jik Mar 22 16:31:51 jik5.kamens.us nm-dispatcher[4011]: /etc/NetworkManager/dispatcher.d/inotify-canary: already unpaused Mar 22 16:31:51 jik5.kamens.us systemd[1]: session-c2.scope: Deactivated successfully. Mar 22 16:31:51 jik5.kamens.us nm-dispatcher[3782]: /etc/NetworkManager/dispatcher.d/inotify-canary: already unpaused Mar 22 16:31:51 jik5.kamens.us systemd[1]: session-c1.scope: Deactivated successfully. Mar 22 16:31:51 jik5.kamens.us inotify-canary[2919]: /etc/NetworkManager/dispatcher.d/inotify-canary: already unpaused Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Scheduled restart job, restart counter is at 6. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Stopped snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Start request repeated too quickly. Mar 22 16:31:51 jik5.kamens.us systemd[1]: snap.canonical-livepatch.canonical-livepatchd.service: Failed with result 'exit-code'. Mar 22 16:31:51 jik5.kamens.us systemd[1]: Failed to start snap.canonical-livepatch.canonical-livepatchd.service - Service for snap application canonical-livepatch.canonical-livepatchd. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Matched nvidia as autoconfigured driver 0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Matched nouveau as autoconfigured driver 1 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Matched modesetting as autoconfigured driver 2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Matched fbdev as autoconfigured driver 3 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Matched vesa as autoconfigured driver 4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) Assigned the driver to the xf86ConfigLayout Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "nvidia" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/x86_64-linux-gnu/nvidia/xorg/nvidia_drv.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module nvidia: vendor="NVIDIA Corporation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.6.99.901, module version = 1.0.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Module class: X.Org Video Driver Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "nouveau" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/drivers/nouveau_drv.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module nouveau: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.3, module version = 1.0.17 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Module class: X.Org Video Driver Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org Video Driver, version 25.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "modesetting" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/drivers/modesetting_drv.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module modesetting: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 1.21.1 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Module class: X.Org Video Driver Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org Video Driver, version 25.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "fbdev" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/drivers/fbdev_drv.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module fbdev: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.3, module version = 0.5.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Module class: X.Org Video Driver Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org Video Driver, version 25.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "vesa" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/drivers/vesa_drv.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module vesa: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.3, module version = 2.5.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Module class: X.Org Video Driver Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org Video Driver, version 25.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA dlloader X Driver 515.86.01 Wed Oct 26 09:06:30 UTC 2022 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA Unified Driver for all Supported NVIDIA GPUs Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NOUVEAU driver Date: Sat Jan 23 12:24:42 2021 -0500 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NOUVEAU driver for NVIDIA chipset families : Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: RIVA TNT (NV04) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: RIVA TNT2 (NV05) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 256 (NV10) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 2 (NV11, NV15) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 4MX (NV17, NV18) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 3 (NV20) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 4Ti (NV25, NV28) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce FX (NV3x) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 6 (NV4x) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 7 (G7x) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 8 (G8x) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce 9 (G9x) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce GTX 2xx/3xx (GT2xx) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce GTX 4xx/5xx (GFxxx) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce GTX 6xx/7xx (GKxxx) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce GTX 9xx (GMxxx) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: GeForce GTX 10xx (GPxxx) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modesetting: Driver for Modesetting Kernel Drivers: kms Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) FBDEV: driver for framebuffer: fbdev Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) VESA: driver for VESA chipsets: vesa Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: xf86EnableIO: failed to enable I/O ports 0000-03ff (Operation not permitted) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: releasing fd for 226:0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "fb" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "fb" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module "fb" already built-in Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "wfb" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "wfb" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/libwfb.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module wfb: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 1.0.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org ANSI C Emulation, version 0.4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "ramdac" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "ramdac" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module "ramdac" already built-in Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) Falling back to old probe method for modesetting Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) Falling back to old probe method for fbdev Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "fbdevhw" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "fbdevhw" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/libfbdevhw.so Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module fbdevhw: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 0.0.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org Video Driver, version 25.2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (EE) open /dev/fb0: Permission denied Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: releasing fd for 226:1 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: releasing fd for 226:2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: releasing fd for 226:3 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: releasing fd for 226:4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (EE) [drm] Failed to open DRM device for (null): -22 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (EE) [drm] Failed to open DRM device for (null): -22 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (EE) [drm] Failed to open DRM device for (null): -22 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (EE) [drm] Failed to open DRM device for (null): -22 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): using drv /dev/dri/card1 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): using drv /dev/dri/card2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): using drv /dev/dri/card3 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): using drv /dev/dri/card4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) VGA arbiter: cannot open kernel arbiter, no multi-card support Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): Creating default Display subsection in Screen section Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: "Default Screen Section" for depth/fbbpp 24/32 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Depth 24, (==) framebuffer bpp 32 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): RGB weight 888 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Default visual is TrueColor Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Using gamma correction (1.0, 1.0, 1.0) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Applying OutputClass "nvidia" options to /dev/dri/card0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) NVIDIA(0): Option "AllowEmptyInitialConfiguration" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) NVIDIA(0): Enabling 2D acceleration Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "glxserver_nvidia" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "glxserver_nvidia" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/x86_64-linux-gnu/nvidia/xorg/libglxserver_nvidia.so Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [E] evdi_painter_connect:854 Edid length too small Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [W] evdi_painter_connect_ioctl:989 (card1)(pid=4266) disconnect failed Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [E] evdi_painter_connect:854 Edid length too small Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [W] evdi_painter_connect_ioctl:989 (card2)(pid=4266) disconnect failed Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [E] evdi_painter_connect:854 Edid length too small Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [W] evdi_painter_connect_ioctl:989 (card3)(pid=4266) disconnect failed Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [E] evdi_painter_connect:854 Edid length too small Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [W] evdi_painter_connect_ioctl:989 (card4)(pid=4266) disconnect failed Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card2) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card3) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card4) Closed by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module glxserver_nvidia: vendor="NVIDIA Corporation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.6.99.901, module version = 1.0.0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Module class: X.Org Server Extension Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA GLX Module 515.86.01 Wed Oct 26 09:04:06 UTC 2022 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA: The X server supports PRIME Render Offload. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): Valid display device(s) on GPU-0 at PCI:1:0:0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): CRT-0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): DFP-0 (boot) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): DFP-1 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): DFP-2 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): DFP-3 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): DFP-4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): DFP-5 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): NVIDIA GPU NVIDIA GeForce GTX 970 (GM204-A) at PCI:1:0:0 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): (GPU-0) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): Memory: 4194304 kBytes Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): VideoBIOS: 84.04.36.00.0b Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): Detected PCI Express Link width: 16X Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: disconnected Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: 400.0 MHz maximum pixel clock Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): connected Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): Internal TMDS Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): 330.0 MHz maximum pixel clock Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: disconnected Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: Internal TMDS Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: 165.0 MHz maximum pixel clock Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: disconnected Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: Internal DisplayPort Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: 960.0 MHz maximum pixel clock Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: disconnected Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: Internal TMDS Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: 165.0 MHz maximum pixel clock Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: disconnected Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: Internal DisplayPort Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: 960.0 MHz maximum pixel clock Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: disconnected Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: Internal TMDS Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: 165.0 MHz maximum pixel clock Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): No modes were requested; the default mode "nvidia-auto-select" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): will be used as the requested mode. Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): Validated MetaModes: Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): "DFP-0:nvidia-auto-select" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): Virtual screen size determined to be 1920 x 1080 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): DPI set to (101, 101); computed from "UseEdidDpi" X config Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(0): option Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): Depth 24, (==) framebuffer bpp 32 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): RGB weight 888 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): Default visual is TrueColor Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "glamoregl" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "glamoregl" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/libglamoregl.so Mar 22 16:31:51 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module glamoregl: vendor="X.Org Foundation" Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 1.0.1 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org ANSI C Emulation, version 0.4 Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to open evdi: /usr/lib/dri/evdi_dri.so: cannot open shared object file: No such file or directory (search paths /usr/lib/x86_64-linux-gnu/dri:\$${ORIGIN}/dri:/usr/lib/dri, suffix _dri) Mar 22 16:31:51 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: failed to load driver: evdi Mar 22 16:31:51 jik5.kamens.us python3[4131]: Successfully fetched https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=tkuctpye Mar 22 16:31:52 jik5.kamens.us eruv.pl[4123]: Current time is: Wed Mar 22 16:31:52 2023 Mar 22 16:31:52 jik5.kamens.us eruv.pl[4123]: No candles on 03 22 2023 Mar 22 16:31:52 jik5.kamens.us eruv.pl[4123]: No candles, sleeping until tomorrow Mar 22 16:31:52 jik5.kamens.us eruv.pl[4123]: Sleeping for: 26888 Mar 22 16:31:52 jik5.kamens.us wireplumber[4133]: Trying to use legacy bluez5 API for LE Audio - only A2DP will be supported. Please upgrade bluez5. Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/ldac Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/aptx_hd Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_hd Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/aptx Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/sbc Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/sbc Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/sbc_xq Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/sbc_xq Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_1 Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_0 Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_1 Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/aptx_ll_duplex_0 Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/faststream Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/faststream_duplex Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/opus_05 Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/opus_05 Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSink/opus_05_duplex Mar 22 16:31:52 jik5.kamens.us bluetoothd[1926]: Endpoint registered: sender=:1.54 path=/MediaEndpoint/A2DPSource/opus_05_duplex Mar 22 16:31:52 jik5.kamens.us wireplumber[4133]: Object activation aborted: proxy destroyed Mar 22 16:31:52 jik5.kamens.us wireplumber[4133]: failed to activate item: Object activation aborted: proxy destroyed Mar 22 16:31:52 jik5.kamens.us snapd-desktop-i[4386]: Failed to do gtk init. Waiting for a new session with desktop capabilities. Mar 22 16:31:52 jik5.kamens.us audit[4386]: SECCOMP auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=4386 comm="snapd-desktop-i" exe="/snap/snapd-desktop-integration/71/usr/bin/snapd-desktop-integration" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7fb593cd6a3d code=0x50000 Mar 22 16:31:52 jik5.kamens.us kernel: kauditd_printk_skb: 78 callbacks suppressed Mar 22 16:31:52 jik5.kamens.us kernel: audit: type=1326 audit(1679517112.380:196): auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=4386 comm="snapd-desktop-i" exe="/snap/snapd-desktop-integration/71/usr/bin/snapd-desktop-integration" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7fb593cd6a3d code=0x50000 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: kmsro: driver missing Mar 22 16:31:52 jik5.kamens.us snapd-desktop-i[4386]: Checking session /org/freedesktop/login1/session/_32... Mar 22 16:31:52 jik5.kamens.us snapd-desktop-i[4386]: Is a desktop session! Forcing a reload. Mar 22 16:31:52 jik5.kamens.us snapd-desktop-i[4386]: Loop exited. Forcing reload. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): Refusing to try glamor on llvmpipe Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): glamor initialization failed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): ShadowFB: preferred NO, enabled NO Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): Output DVI-I-1-2 has no monitor section Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): EDID for output DVI-I-1-2 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): Using gamma correction (1.0, 1.0, 1.0) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): DPI set to (96, 96) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module "fb" already built-in Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): Depth 24, (==) framebuffer bpp 32 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): RGB weight 888 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): Default visual is TrueColor Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "glamoregl" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "glamoregl" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/libglamoregl.so Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module glamoregl: vendor="X.Org Foundation" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 1.0.1 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org ANSI C Emulation, version 0.4 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to open evdi: /usr/lib/dri/evdi_dri.so: cannot open shared object file: No such file or directory (search paths /usr/lib/x86_64-linux-gnu/dri:\$${ORIGIN}/dri:/usr/lib/dri, suffix _dri) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: failed to load driver: evdi Mar 22 16:31:52 jik5.kamens.us kernel: evdi: [I] (card2) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: kmsro: driver missing Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): Refusing to try glamor on llvmpipe Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): glamor initialization failed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): ShadowFB: preferred NO, enabled NO Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): Output DVI-I-2-3 has no monitor section Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): EDID for output DVI-I-2-3 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): Using gamma correction (1.0, 1.0, 1.0) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): DPI set to (96, 96) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module "fb" already built-in Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): Depth 24, (==) framebuffer bpp 32 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): RGB weight 888 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): Default visual is TrueColor Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "glamoregl" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "glamoregl" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/libglamoregl.so Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module glamoregl: vendor="X.Org Foundation" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 1.0.1 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org ANSI C Emulation, version 0.4 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to open evdi: /usr/lib/dri/evdi_dri.so: cannot open shared object file: No such file or directory (search paths /usr/lib/x86_64-linux-gnu/dri:\$${ORIGIN}/dri:/usr/lib/dri, suffix _dri) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: failed to load driver: evdi Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us kernel: evdi: [I] (card3) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: kmsro: driver missing Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): Refusing to try glamor on llvmpipe Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): glamor initialization failed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): ShadowFB: preferred NO, enabled NO Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): Output DVI-I-3-4 has no monitor section Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): EDID for output DVI-I-3-4 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): Using gamma correction (1.0, 1.0, 1.0) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): DPI set to (96, 96) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module "fb" already built-in Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): Depth 24, (==) framebuffer bpp 32 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): RGB weight 888 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): Default visual is TrueColor Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "glamoregl" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "glamoregl" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/libglamoregl.so Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module glamoregl: vendor="X.Org Foundation" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.21.1.7, module version = 1.0.1 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org ANSI C Emulation, version 0.4 Mar 22 16:31:52 jik5.kamens.us kernel: evdi: [I] (card4) Opened by Task 4266 (Xorg) of process 4266 (Xorg) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to open evdi: /usr/lib/dri/evdi_dri.so: cannot open shared object file: No such file or directory (search paths /usr/lib/x86_64-linux-gnu/dri:\$${ORIGIN}/dri:/usr/lib/dri, suffix _dri) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: failed to load driver: evdi Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: MESA-LOADER: failed to retrieve device information Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: kmsro: driver missing Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): Refusing to try glamor on llvmpipe Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): glamor initialization failed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): ShadowFB: preferred NO, enabled NO Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): Output DVI-I-4-5 has no monitor section Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): EDID for output DVI-I-4-5 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): Using gamma correction (1.0, 1.0, 1.0) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): DPI set to (96, 96) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "fb" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module "fb" already built-in Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) UnloadModule: "fbdev" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Unloading fbdev Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) UnloadSubModule: "fbdevhw" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Unloading fbdevhw Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) UnloadModule: "vesa" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Unloading vesa Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) NVIDIA: Failed to bind sideband socket to Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) NVIDIA: '/var/run/nvidia-xdriver-78ea5851' Permission denied Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA: Reserving 6144.00 MB of virtual memory for indirect memory Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA: access. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): ACPI: failed to connect to the ACPI event daemon; the daemon Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): may not be running or the "AcpidSocketPath" X Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): configuration option may not be set correctly. When the Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): ACPI event daemon is available, the NVIDIA X driver will Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): try to use it to receive ACPI event notifications. For Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): details, please see the "ConnectToAcpid" and Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): "AcpidSocketPath" X configuration options in Appendix B: X Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): Config Options in the README. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): Setting mode "DFP-0:nvidia-auto-select" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Disabling shared memory pixmaps Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Backing store enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): Silken mouse enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) NVIDIA(0): DPMS enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading sub module "dri2" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "dri2" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module "dri2" already built-in Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): [DRI2] Setup complete Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) NVIDIA(0): [DRI2] VDPAU driver: nvidia Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): Backing store enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): Silken mouse enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): Initializing kms color map for depth 24, 8 bpc. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G0): DPMS enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): Backing store enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): Silken mouse enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): Initializing kms color map for depth 24, 8 bpc. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G1): DPMS enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): Backing store enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): Silken mouse enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): Initializing kms color map for depth 24, 8 bpc. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G2): DPMS enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): Backing store enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): Silken mouse enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): Initializing kms color map for depth 24, 8 bpc. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (==) modeset(G3): DPMS enabled Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension Generic Event Extension Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension SHAPE Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension MIT-SHM Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XInputExtension Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XTEST Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension BIG-REQUESTS Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension SYNC Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XKEYBOARD Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XC-MISC Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension SECURITY Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XFIXES Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension RENDER Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension RANDR Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension COMPOSITE Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension DAMAGE Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension MIT-SCREEN-SAVER Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension DOUBLE-BUFFER Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension RECORD Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension DPMS Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension Present Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension DRI3 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension X-Resource Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XVideo Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XVideo-MotionCompensation Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension SELinux Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) SELinux: Disabled on system Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension GLX Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension GLX Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Indirect GLX disabled. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) GLX: Another vendor is already registered for screen 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XFree86-VidModeExtension Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XFree86-DGA Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XFree86-DRI Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension DRI2 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension NV-GLX Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension NV-CONTROL Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Initializing extension XINERAMA Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G0): Damage tracking initialized Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G1): Damage tracking initialized Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G2): Damage tracking initialized Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) modeset(G3): Damage tracking initialized Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Power Button (/dev/input/event2) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Power Button: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) LoadModule: "libinput" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Loading /usr/lib/xorg/modules/input/libinput_drv.so Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Module libinput: vendor="X.Org Foundation" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: compiled for 1.20.14, module version = 1.2.1 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: Module class: X.Org XInput Driver Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: ABI class: X.Org XInput driver, version 24.1 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Power Button' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event2 13:66 fd 49 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Power Button: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event2" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event2 - Power Button: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event2 - Power Button: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event2 - Power Button: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/LNXSYSTM:00/LNXPWRBN:00/input/input2/event2" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Power Button" (type: KEYBOARD, id 6) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event2 - Power Button: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event2 - Power Button: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Power Button (/dev/input/event1) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Power Button: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Power Button' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event1 13:65 fd 52 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Power Button: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event1" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event1 - Power Button: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event1 - Power Button: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event1 - Power Button: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1/event1" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Power Button" (type: KEYBOARD, id 7) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event1 - Power Button: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event1 - Power Button: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Sleep Button (/dev/input/event0) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Sleep Button: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Sleep Button' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event0 13:64 fd 53 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Sleep Button: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event0" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event0 - Sleep Button: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event0 - Sleep Button: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event0 - Sleep Button: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0/event0" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Sleep Button" (type: KEYBOARD, id 8) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event0 - Sleep Button: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event0 - Sleep Button: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA NVidia HDMI/DP,pcm=3 (/dev/input/event15) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA NVidia HDMI/DP,pcm=7 (/dev/input/event16) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA NVidia HDMI/DP,pcm=8 (/dev/input/event17) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA NVidia HDMI/DP,pcm=9 (/dev/input/event18) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Jabra Evolve 75 (/dev/input/event3) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Jabra Evolve 75: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Jabra Evolve 75' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event3 13:67 fd 54 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Jabra Evolve 75: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event3" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event3 - Jabra Evolve 75: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event3 - Jabra Evolve 75: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event3 - Jabra Evolve 75: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2:1.0/0003:0B0E:2467.0001/input/input6/event3" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Jabra Evolve 75" (type: KEYBOARD, id 9) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event3 - Jabra Evolve 75: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event3 - Jabra Evolve 75: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Jabra Link 370 (/dev/input/event4) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Jabra Link 370: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Jabra Link 370' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event4 13:68 fd 55 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Jabra Link 370: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event4" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event4 - Jabra Link 370: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event4 - Jabra Link 370: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event4 - Jabra Link 370: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.1/1-7.1:1.3/0003:0B0E:245D.0003/input/input7/event4" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Jabra Link 370" (type: KEYBOARD, id 10) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event4 - Jabra Link 370: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event4 - Jabra Link 370: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Metadot - Das Keyboard Das Keyboard (/dev/input/event5) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Metadot - Das Keyboard Das Keyboard: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Metadot - Das Keyboard Das Keyboard' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event5 13:69 fd 56 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Metadot - Das Keyboard Das Keyboard: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event5" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event5 - Metadot - Das Keyboard Das Keyboard: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event5 - Metadot - Das Keyboard Das Keyboard: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event5 - Metadot - Das Keyboard Das Keyboard: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.0/0003:24F0:0142.0007/input/input13/event5" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Metadot - Das Keyboard Das Keyboard" (type: KEYBOARD, id 11) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event5 - Metadot - Das Keyboard Das Keyboard: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event5 - Metadot - Das Keyboard Das Keyboard: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Metadot - Das Keyboard Das Keyboard System Control (/dev/input/event6) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Metadot - Das Keyboard Das Keyboard System Control: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Metadot - Das Keyboard Das Keyboard System Control' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event6 13:70 fd 57 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Metadot - Das Keyboard Das Keyboard System Control: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event6" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event6 - Metadot - Das Keyboard Das Keyboard System Control: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event6 - Metadot - Das Keyboard Das Keyboard System Control: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event6 - Metadot - Das Keyboard Das Keyboard System Control: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.1/0003:24F0:0142.0008/input/input14/event6" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Metadot - Das Keyboard Das Keyboard System Control" (type: KEYBOARD, id 12) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event6 - Metadot - Das Keyboard Das Keyboard System Control: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event6 - Metadot - Das Keyboard Das Keyboard System Control: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Metadot - Das Keyboard Das Keyboard Consumer Control (/dev/input/event7) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Metadot - Das Keyboard Das Keyboard Consumer Control: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Metadot - Das Keyboard Das Keyboard Consumer Control' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event7 13:71 fd 58 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Metadot - Das Keyboard Das Keyboard Consumer Control: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event7" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event7 - Metadot - Das Keyboard Das Keyboard Consumer Control: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event7 - Metadot - Das Keyboard Das Keyboard Consumer Control: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event7 - Metadot - Das Keyboard Das Keyboard Consumer Control: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.1/1-7.2.1:1.1/0003:24F0:0142.0008/input/input15/event7" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Metadot - Das Keyboard Das Keyboard Consumer Control" (type: KEYBOARD, id 13) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event7 - Metadot - Das Keyboard Das Keyboard Consumer Control: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event7 - Metadot - Das Keyboard Das Keyboard Consumer Control: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Yubico YubiKey OTP+FIDO+CCID (/dev/input/event9) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Yubico YubiKey OTP+FIDO+CCID: Applying InputClass "libinput keyboard catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Yubico YubiKey OTP+FIDO+CCID' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event9 13:73 fd 59 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Yubico YubiKey OTP+FIDO+CCID: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event9" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event9 - Yubico YubiKey OTP+FIDO+CCID: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event9 - Yubico YubiKey OTP+FIDO+CCID: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event9 - Yubico YubiKey OTP+FIDO+CCID: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.2/1-7.2.3/1-7.2.3:1.0/0003:1050:0407.000A/input/input21/event9" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Yubico YubiKey OTP+FIDO+CCID" (type: KEYBOARD, id 14) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event9 - Yubico YubiKey OTP+FIDO+CCID: is tagged by udev as: Keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event9 - Yubico YubiKey OTP+FIDO+CCID: device is a keyboard Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Logitech M510 (/dev/input/event8) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Logitech M510: Applying InputClass "libinput pointer catchall" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'Logitech M510' Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event8 13:72 fd 60 paused 0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Logitech M510: always reports core events Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event8" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event8 - Logitech M510: is tagged by udev as: Mouse Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event8 - Logitech M510: device is a pointer Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event8 - Logitech M510: device removed Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-7/1-7.4/1-7.4:1.2/0003:046D:C52B.0006/0003:046D:4051.0009/input/input20/event8" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "Logitech M510" (type: MOUSE, id 15) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "AccelerationScheme" "none" Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Logitech M510: (accel) selected scheme none/0 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Logitech M510: (accel) acceleration factor: 2.000 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Logitech M510: (accel) acceleration threshold: 4 Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event8 - Logitech M510: is tagged by udev as: Mouse Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event8 - Logitech M510: device is a pointer Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device Logitech M510 (/dev/input/mouse0) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA Intel PCH Front Mic (/dev/input/event10) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA Intel PCH Rear Mic (/dev/input/event11) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA Intel PCH Line (/dev/input/event12) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA Intel PCH Line Out (/dev/input/event13) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HDA Intel PCH Front Headphone (/dev/input/event14) Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) No input driver specified, ignoring this device. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) This device may have been added with another device file. Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4467]: /usr/bin/prime-supported: 38: cannot create /var/log/prime-supported.log: Permission denied Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4465]: /sbin/prime-offload: 29: cannot create /var/log/prime-offload.log: Permission denied Mar 22 16:31:52 jik5.kamens.us /usr/libexec/gdm-x-session[4468]: /etc/gdm3/Xsession: Beginning session setup... Mar 22 16:31:52 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.freedesktop.Tracker3.Miner.Files' unit='tracker-miner-fs-3.service' requested by ':1.5' (uid=1000 pid=4132 comm="/usr/libexec/tracker-extract-3" label="unconfined") Mar 22 16:31:52 jik5.kamens.us systemd[3832]: Starting tracker-miner-fs-3.service - Tracker file system data miner... Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "XTerm*VT100*font" on line 12 overrides entry on line 5 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "XRn*Composition.geometry" on line 13 overrides entry on line 6 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "XRn*Composition*rightMargin" on line 14 overrides entry on line 7 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "XRn*Command.font" on line 15 overrides entry on line 8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "login*VT100.geometry" on line 234 overrides entry on line 226 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "console*VT100.geometry" on line 235 overrides entry on line 227 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "initclock.geometry" on line 236 overrides entry on line 228 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "topright*VT100.geometry" on line 239 overrides entry on line 229 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "login*VT100.geometry" on line 246 overrides entry on line 234 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "console*VT100.geometry" on line 247 overrides entry on line 235 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "initclock.geometry" on line 248 overrides entry on line 236 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "topright*VT100.geometry" on line 249 overrides entry on line 239 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "initemacs.geometry" on line 250 overrides entry on line 240 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "homexbuffy.geometry" on line 251 overrides entry on line 241 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "worldxbuffy.geometry" on line 252 overrides entry on line 242 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "login*VT100.geometry" on line 257 overrides entry on line 246 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "topright*VT100.geometry" on line 258 overrides entry on line 249 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "TimeTracker.geometry" on line 259 overrides entry on line 230 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "console*VT100.geometry" on line 260 overrides entry on line 247 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "initclock.geometry" on line 261 overrides entry on line 248 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "login*VT100.geometry" on line 267 overrides entry on line 257 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "topright*VT100.geometry" on line 268 overrides entry on line 258 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "console*VT100.geometry" on line 269 overrides entry on line 260 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "initclock.geometry" on line 270 overrides entry on line 261 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "homexbuffy.geometry" on line 271 overrides entry on line 251 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "initemacs.geometry" on line 272 overrides entry on line 250 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "login*VT100.geometry" on line 276 overrides entry on line 267 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "console*VT100.geometry" on line 277 overrides entry on line 269 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "initclock.geometry" on line 278 overrides entry on line 270 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "TimeTracker.geometry" on line 279 overrides entry on line 259 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4571]: xrdb: "topright*VT100.geometry" on line 280 overrides entry on line 268 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4574]: localuser:jik being added to access control list Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4578]: dbus-update-activation-environment: setting DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1000/bus Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4578]: dbus-update-activation-environment: setting DISPLAY=:0 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4578]: dbus-update-activation-environment: setting XAUTHORITY=/run/user/1000/gdm/Xauthority Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4583]: /etc/X11/Xsession.d/30x11-common_xresources: line 16: has_option: command not found Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4586]: localuser:jik being added to access control list Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4611]: /etc/X11/Xsession.d/75dbus_dbus-launch: line 9: has_option: command not found Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4613]: dbus-update-activation-environment: setting GTK_MODULES=gail:atk-bridge Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4622]: dbus-update-activation-environment: setting QT_ACCESSIBILITY=1 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4624]: /etc/X11/Xsession.d/90x11-common_ssh-agent: line 9: has_option: command not found Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting SHELL=/bin/bash Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting QT_ACCESSIBILITY=1 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XDG_CONFIG_DIRS=/etc/xdg/xdg-ubuntu:/etc/xdg Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting rvm_prefix=/usr/share Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LANGUAGE=en_US:en Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting MANDATORY_PATH=/usr/share/gconf/ubuntu.mandatory.path Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_ADDRESS=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_NAME=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting MY_RUBY_HOME=/usr/share/rvm/rubies/ruby-2.7.0 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting DESKTOP_SESSION=ubuntu Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_MONETARY=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting EDITOR=emacsclient Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting SHABBATON_DB_PASSWORD=shabbaton Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting GTK_MODULES=gail:atk-bridge Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting RUBY_VERSION=ruby-2.7.0 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting PWD=/home/jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting NIX_PROFILES=/nix/var/nix/profiles/default /home/jik/.nix-profile Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XDG_SESSION_DESKTOP=ubuntu Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LOGNAME=jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XDG_SESSION_TYPE=x11 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting TEXINPUTS=.:/home/jik/tex:/usr/lib/texmf/tex/language/hebrew: Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting rvm_version=1.29.9 (manual) Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting MANPATH=/home/jik/.nix-profile/share/man:/home/jik/man:/usr/local/share/man:/usr/local/man:/usr/share/man:/usr/man Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting NIX_PATH=/home/jik/.nix-defexpr/channels Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting GPG_AGENT_INFO=/run/user/1000/gnupg/S.gpg-agent:0:1 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting SYSTEMD_EXEC_PID=3832 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting PGPPATH=/home/jik/.pgpdata Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XAUTHORITY=/run/user/1000/gdm/Xauthority Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting WINDOWPATH=2 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting HOME=/home/jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting USERNAME=jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting IM_CONFIG_PHASE=1 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_PAPER=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LANG=en_US.utf8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XDG_CURRENT_DESKTOP=ubuntu:GNOME Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting RCLONE_FAST_LIST=true Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting NIX_SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting NNTPSERVER=jik4.kamens.us Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting rvm_bin_path=/usr/share/rvm/bin Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting GEM_PATH=/home/jik/.rvm/gems/ruby-2.7.0:/home/jik/.rvm/gems/ruby-2.7.0@global Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting GEM_HOME=/home/jik/.rvm/gems/ruby-2.7.0 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XDG_SESSION_CLASS=user Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_IDENTIFICATION=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting DEFAULTS_PATH=/usr/share/gconf/ubuntu.default.path Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LIBVIRT_DEFAULT_URI=qemu:///system Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting USER=jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting VISUAL=emacsclient Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting DISPLAY=:0 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting SHLVL=0 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_TELEPHONE=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting CVS_RSH=ssh Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_MEASUREMENT=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting HEBCAL_CITY=Boston Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting PAPERSIZE=letter Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XDG_RUNTIME_DIR=/run/user/1000 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting DEBUGINFOD_URLS=https://debuginfod.ubuntu.com Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_TIME=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting AUDIOT=/dev/dsp1 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_COLLATE=C Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting XDG_DATA_DIRS=/usr/share/ubuntu:/usr/share/gnome:/usr/local/share/:/usr/share/:/var/lib/snapd/desktop Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting MAILHOST=jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting PATH=/home/jik/.nix-profile/bin:/home/jik/.cargo/bin:/home/jik/bin:/home/jik/bin:/home/jik/scripts:/home/jik/.rvm/gems/ruby-2.7.0/bin:/home/jik/.rvm/gems/ruby-2.7.0@global/bin:/usr/share/rvm/rubies/ruby-2.7.0/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin:/snap/bin:/usr/share/rvm/bin:/home/jik/bin/.bash_aliases Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting GDMSESSION=ubuntu Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1000/bus Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting MAIL=/var/mail/jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting IRBRC=/usr/share/rvm/rubies/ruby-2.7.0/.irbrc Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting rvm_path=/usr/share/rvm Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting LC_NUMERIC=en_US.UTF-8 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting OLDPWD=/home/jik Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting BASH_ENVIRONMENT_SET=1 Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4628]: dbus-update-activation-environment: setting _=/usr/bin/dbus-update-activation-environment Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gtk.vfs.UDisks2VolumeMonitor' unit='gvfs-udisks2-volume-monitor.service' requested by ':1.15' (uid=1000 pid=4477 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor... Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.21' (uid=1000 pid=4642 comm="/usr/libexec/gnome-session-check-accelerated" label="unconfined") Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting at-spi-dbus-bus.service - Accessibility services bus... Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.a11y.Bus' Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started at-spi-dbus-bus.service - Accessibility services bus. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Created slice app-gnome\x2dsession\x2dmanager.slice - Slice /app/gnome-session-manager. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: update-notifier-crash.path - Path trigger for Apport crash notifications was skipped because of an unmet condition check (ConditionPathExists=!/var/lib/apport/autoreport). Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started update-notifier-release.path - Path trigger for new release of Ubuntu notifications. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Reached target gnome-session-x11.target - GNOME X11 Session. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Reached target org.gnome.Shell.target - GNOME Shell. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gcr-ssh-agent.service - GCR ssh-agent wrapper. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: gnome-initial-setup-copy-worker.service - GNOME Initial Setup Copy Worker was skipped because of an unmet condition check (ConditionPathExists=!/home/jik/.config/gnome-initial-setup-done). Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gnome-remote-desktop.service - GNOME Remote Desktop... Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gnome-session-monitor.service - Monitor Session leader for GNOME Session... Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting session-migration.service - Session Migration... Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started ssh-agent.service - OpenSSH Agent. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting xdg-desktop-portal-rewrite-launchers.service - Rewrite dynamic launcher portal entries... Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gnome-session-monitor.service - Monitor Session leader for GNOME Session. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Finished session-migration.service - Session Migration. Mar 22 16:31:53 jik5.kamens.us agent-launch[4670]: dbus-update-activation-environment: setting SSH_AUTH_SOCK=/run/user/1000/openssh_agent Mar 22 16:31:53 jik5.kamens.us agent-launch[4670]: dbus-update-activation-environment: setting SSH_AGENT_LAUNCHER=openssh Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Finished xdg-desktop-portal-rewrite-launchers.service - Rewrite dynamic launcher portal entries. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Reached target graphical-session-pre.target - Session services which should run early before the graphical session is brought up. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Reached target gnome-session-pre.target - Tasks to be run before GNOME Session starts. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gnome-session-manager@ubuntu.service - GNOME Session Manager (session: ubuntu)... Mar 22 16:31:53 jik5.kamens.us agent-launch[4664]: SSH_AUTH_SOCK=/run/user/1000/openssh_agent; export SSH_AUTH_SOCK; Mar 22 16:31:53 jik5.kamens.us agent-launch[4664]: echo Agent pid 4664; Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gnome-remote-desktop.service - GNOME Remote Desktop. Mar 22 16:31:53 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: WARNING: Could not parse desktop file gsettings-data-convert.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session-binary[4674]: WARNING: Could not parse desktop file gsettings-data-convert.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: WARNING: Could not parse desktop file nemo-unity-autostart.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session-binary[4674]: WARNING: Could not parse desktop file nemo-unity-autostart.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: WARNING: Could not parse desktop file gnome-shell-overrides-migration.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session-binary[4674]: WARNING: Could not parse desktop file gnome-shell-overrides-migration.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: WARNING: Could not parse desktop file indicator-application.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session-binary[4674]: WARNING: Could not parse desktop file indicator-application.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: WARNING: Could not parse desktop file ibus-mozc-gnome-initial-setup.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us gnome-session-binary[4674]: WARNING: Could not parse desktop file ibus-mozc-gnome-initial-setup.desktop or it references a not found TryExec binary Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gtk.vfs.UDisks2VolumeMonitor' Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor. Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gtk.vfs.GoaVolumeMonitor' unit='gvfs-goa-volume-monitor.service' requested by ':1.15' (uid=1000 pid=4477 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:31:53 jik5.kamens.us gnome-keyring-daemon[4142]: The PKCS#11 component was already initialized Mar 22 16:31:53 jik5.kamens.us gnome-keyring-daemon[4692]: discover_other_daemon: 1 Mar 22 16:31:53 jik5.kamens.us gnome-keyring-pkcs11.desktop[4692]: discover_other_daemon: 1GNOME_KEYRING_CONTROL=/run/user/1000/keyring Mar 22 16:31:53 jik5.kamens.us gnome-keyring-d[4142]: The PKCS#11 component was already initialized Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor... Mar 22 16:31:53 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 4687: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 4687 does not exist. Mar 22 16:31:53 jik5.kamens.us gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 4687: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 4687 does not exist. Mar 22 16:31:53 jik5.kamens.us gnome-keyring-daemon[4142]: The Secret Service was already initialized Mar 22 16:31:53 jik5.kamens.us gnome-keyring-d[4142]: The Secret Service was already initialized Mar 22 16:31:53 jik5.kamens.us gnome-keyring-ssh.desktop[4693]: discover_other_daemon: 1GNOME_KEYRING_CONTROL=/run/user/1000/keyring Mar 22 16:31:53 jik5.kamens.us gnome-keyring-ssh.desktop[4693]: SSH_AUTH_SOCK=/run/user/1000/keyring/ssh Mar 22 16:31:53 jik5.kamens.us gnome-keyring-daemon[4693]: discover_other_daemon: 1 Mar 22 16:31:53 jik5.kamens.us gnome-keyring-secrets.desktop[4694]: discover_other_daemon: 1GNOME_KEYRING_CONTROL=/run/user/1000/keyring Mar 22 16:31:53 jik5.kamens.us gnome-keyring-secrets.desktop[4694]: SSH_AUTH_SOCK=/run/user/1000/keyring/ssh Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started app-gnome-gnome\x2dkeyring\x2dsecrets-4690.scope - Application launched by gnome-session-binary. Mar 22 16:31:53 jik5.kamens.us gnome-keyring-daemon[4694]: discover_other_daemon: 1 Mar 22 16:31:53 jik5.kamens.us systemd[3832]: app-gnome-gnome\x2dkeyring\x2dssh-4689.scope: Couldn't move process 4689 to requested cgroup '/user.slice/user-1000.slice/user@1000.service/app.slice/app-gnome-gnome\x2dkeyring\x2dssh-4689.scope': No such process Mar 22 16:31:53 jik5.kamens.us systemd[3832]: app-gnome-gnome\x2dkeyring\x2dssh-4689.scope: Failed to add PIDs to scope's control group: No such process Mar 22 16:31:53 jik5.kamens.us systemd[3832]: app-gnome-gnome\x2dkeyring\x2dssh-4689.scope: Failed with result 'resources'. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Failed to start app-gnome-gnome\x2dkeyring\x2dssh-4689.scope - Application launched by gnome-session-binary. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gnome-session-manager@ubuntu.service - GNOME Session Manager (session: ubuntu). Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Reached target gnome-session-manager.target - GNOME Session Manager is ready. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting org.gnome.Shell@wayland.service - GNOME Shell on Wayland... Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting org.gnome.Shell@x11.service - GNOME Shell on X11... Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.OnlineAccounts' requested by ':1.41' (uid=1000 pid=4691 comm="/usr/libexec/gvfs-goa-volume-monitor" label="unconfined") Mar 22 16:31:53 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 4695: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 4695 does not exist. Mar 22 16:31:53 jik5.kamens.us gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 4695: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 4695 does not exist. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: org.gnome.Shell@wayland.service: Skipped due to 'exec-condition'. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Condition check resulted in org.gnome.Shell@wayland.service - GNOME Shell on Wayland being skipped. Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started app-gnome-at\x2dspi\x2ddbus\x2dbus-4699.scope - Application launched by gnome-session-binary. Mar 22 16:31:53 jik5.kamens.us gnome-shell[4705]: Running GNOME Shell (using mutter 44.0) as a X11 window and compositing manager Mar 22 16:31:53 jik5.kamens.us goa-daemon[4704]: goa-daemon version 3.46.0 starting Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.Identity' requested by ':1.44' (uid=1000 pid=4704 comm="/usr/libexec/goa-daemon" label="unconfined") Mar 22 16:31:53 jik5.kamens.us goa-daemon[4704]: Unsupported account type ubuntusso for identity jik@kamens.brookline.ma.us (no provider) Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.OnlineAccounts' Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.Identity' Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gtk.vfs.GoaVolumeMonitor' Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gvfs-goa-volume-monitor.service - Virtual filesystem service - GNOME Online Accounts monitor. Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gtk.vfs.GPhoto2VolumeMonitor' unit='gvfs-gphoto2-volume-monitor.service' requested by ':1.15' (uid=1000 pid=4477 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor... Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gtk.vfs.GPhoto2VolumeMonitor' Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gvfs-gphoto2-volume-monitor.service - Virtual filesystem service - digital camera monitor. Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gtk.vfs.MTPVolumeMonitor' unit='gvfs-mtp-volume-monitor.service' requested by ':1.15' (uid=1000 pid=4477 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor... Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gtk.vfs.MTPVolumeMonitor' Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gvfs-mtp-volume-monitor.service - Virtual filesystem service - Media Transfer Protocol monitor. Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gtk.vfs.AfcVolumeMonitor' unit='gvfs-afc-volume-monitor.service' requested by ':1.15' (uid=1000 pid=4477 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Starting gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor... Mar 22 16:31:53 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gtk.vfs.AfcVolumeMonitor' Mar 22 16:31:53 jik5.kamens.us systemd[3832]: Started gvfs-afc-volume-monitor.service - Virtual filesystem service - Apple File Conduit monitor. Mar 22 16:31:53 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' requested by ':1.65' (uid=1000 pid=4477 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: 400.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us systemd[1]: Starting upower.service - Daemon for power management... Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): connected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): 330.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: 165.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: Internal DisplayPort Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: 960.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: 165.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: Internal DisplayPort Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: 960.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: 165.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: 400.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): connected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): 330.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: 165.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: Internal DisplayPort Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: 960.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: 165.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: Internal DisplayPort Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: 960.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: disconnected Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: Internal TMDS Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: 165.0 MHz maximum pixel clock Mar 22 16:31:53 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:53 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.UPower' Mar 22 16:31:53 jik5.kamens.us systemd[1]: Started upower.service - Daemon for power management. Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.Tracker3.Miner.Files' Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Started tracker-miner-fs-3.service - Tracker file system data miner. Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Started tracker-extract-3.service - Tracker metadata extractor. Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Reached target default.target - Main User Target. Mar 22 16:31:54 jik5.kamens.us systemd[3832]: snap.snapd-desktop-integration.snapd-desktop-integration.service: Scheduled restart job, restart counter is at 1. Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Stopped snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration. Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Started snap.snapd-desktop-integration.snapd-desktop-integration.service - Service for snap application snapd-desktop-integration.snapd-desktop-integration. Mar 22 16:31:54 jik5.kamens.us gnome-shell[4705]: Unset XDG_SESSION_ID, getCurrentSessionProxy() called outside a user session. Asking logind directly. Mar 22 16:31:54 jik5.kamens.us gnome-shell[4705]: Will monitor session 2 Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.Shell.Screencast' requested by ':1.43' (uid=1000 pid=4705 comm="/usr/bin/gnome-shell" label="unconfined") Mar 22 16:31:54 jik5.kamens.us audit[4864]: SECCOMP auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=4864 comm="snapd-desktop-i" exe="/snap/snapd-desktop-integration/71/usr/bin/snapd-desktop-integration" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7faef9e7ca3d code=0x50000 Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.freedesktop.portal.Desktop' unit='xdg-desktop-portal.service' requested by ':1.51' (uid=1000 pid=4864 comm="/snap/snapd-desktop-integration/71/usr/bin/snapd-d" label="snap.snapd-desktop-integration.snapd-desktop-integration (enforce)") Mar 22 16:31:54 jik5.kamens.us kernel: audit: type=1326 audit(1679517114.760:197): auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=4864 comm="snapd-desktop-i" exe="/snap/snapd-desktop-integration/71/usr/bin/snapd-desktop-integration" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7faef9e7ca3d code=0x50000 Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.Shell.CalendarServer' requested by ':1.43' (uid=1000 pid=4705 comm="/usr/bin/gnome-shell" label="unconfined") Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Starting xdg-desktop-portal.service - Portal service... Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gnome.evolution.dataserver.Sources5' unit='evolution-source-registry.service' requested by ':1.52' (uid=1000 pid=4870 comm="/usr/libexec/gnome-shell-calendar-server" label="unconfined") Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Starting evolution-source-registry.service - Evolution source registry... Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.freedesktop.impl.portal.desktop.gnome' unit='xdg-desktop-portal-gnome.service' requested by ':1.53' (uid=1000 pid=4868 comm="/usr/libexec/xdg-desktop-portal" label="unconfined") Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Starting xdg-desktop-portal-gnome.service - Portal service (GNOME implementation)... Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.Shell.Screencast' Mar 22 16:31:54 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' requested by ':1.64' (uid=1000 pid=4705 comm="/usr/bin/gnome-shell" label="unconfined") Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gtk.vfs.Metadata' unit='gvfs-metadata.service' requested by ':1.54' (uid=1000 pid=4882 comm="/usr/libexec/evolution-source-registry" label="unconfined") Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.impl.portal.desktop.gnome' Mar 22 16:31:54 jik5.kamens.us rtkit-daemon[4180]: Supervising 6 threads of 3 processes of 1 users. Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='ca.desrt.dconf' unit='dconf.service' requested by ':1.43' (uid=1000 pid=4705 comm="/usr/bin/gnome-shell" label="unconfined") Mar 22 16:31:54 jik5.kamens.us rtkit-daemon[4180]: Supervising 6 threads of 3 processes of 1 users. Mar 22 16:31:54 jik5.kamens.us rtkit-daemon[4180]: Supervising 6 threads of 3 processes of 1 users. Mar 22 16:31:54 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.freedesktop.impl.portal.desktop.gtk' unit='xdg-desktop-portal-gtk.service' requested by ':1.53' (uid=1000 pid=4868 comm="/usr/libexec/xdg-desktop-portal" label="unconfined") Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Starting gvfs-metadata.service - Virtual filesystem metadata service... Mar 22 16:31:54 jik5.kamens.us systemd[1]: Starting geoclue.service - Location Lookup Service... Mar 22 16:31:54 jik5.kamens.us systemd[3832]: Started xdg-desktop-portal-gnome.service - Portal service (GNOME implementation). Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting dconf.service - User preferences database... Mar 22 16:31:55 jik5.kamens.us polkitd(authority=local)[1942]: Registered Authentication Agent for unix-session:2 (system bus name :1.64 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting xdg-desktop-portal-gtk.service - Portal service (GTK/GNOME implementation)... Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gtk.vfs.Metadata' Mar 22 16:31:55 jik5.kamens.us gnome-shell[4705]: Telepathy is not available, chat integration will be disabled. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started gvfs-metadata.service - Virtual filesystem metadata service. Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'ca.desrt.dconf' Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started dconf.service - User preferences database. Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.evolution.dataserver.Sources5' Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started evolution-source-registry.service - Evolution source registry. Mar 22 16:31:55 jik5.kamens.us at-spi-bus-launcher[4655]: dbus-daemon[4655]: Activating service name='org.a11y.atspi.Registry' requested by ':1.3' (uid=1000 pid=4909 comm="/usr/libexec/xdg-desktop-portal-gtk" label="unconfined") Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gnome.evolution.dataserver.Calendar8' unit='evolution-calendar-factory.service' requested by ':1.52' (uid=1000 pid=4870 comm="/usr/libexec/gnome-shell-calendar-server" label="unconfined") Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting evolution-calendar-factory.service - Evolution calendar service... Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.Shell.CalendarServer' Mar 22 16:31:55 jik5.kamens.us at-spi-bus-launcher[4655]: dbus-daemon[4655]: Successfully activated service 'org.a11y.atspi.Registry' Mar 22 16:31:55 jik5.kamens.us at-spi-bus-launcher[4927]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Mar 22 16:31:55 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' requested by ':1.64' (uid=1000 pid=4705 comm="/usr/bin/gnome-shell" label="unconfined") Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.Shell.Notifications' requested by ':1.43' (uid=1000 pid=4705 comm="/usr/bin/gnome-shell" label="unconfined") Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: No feature manager for feature of type 'GProxyResolver' Mar 22 16:31:55 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.GeoClue2' Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: No feature manager for feature of type 'GProxyResolver' Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.evolution.dataserver.Calendar8' Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started evolution-calendar-factory.service - Evolution calendar service. Mar 22 16:31:55 jik5.kamens.us systemd[1]: Starting packagekit.service - PackageKit Daemon... Mar 22 16:31:55 jik5.kamens.us systemd[1]: Started geoclue.service - Location Lookup Service. Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.Shell.Notifications' Mar 22 16:31:55 jik5.kamens.us PackageKit[4953]: daemon start Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gnome.evolution.dataserver.AddressBook10' unit='evolution-addressbook-factory.service' requested by ':1.60' (uid=1000 pid=4931 comm="/usr/libexec/evolution-calendar-factory" label="unconfined") Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting evolution-addressbook-factory.service - Evolution address book service... Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.freedesktop.FileManager1' requested by ':1.43' (uid=1000 pid=4705 comm="/usr/bin/gnome-shell" label="unconfined") Mar 22 16:31:55 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.PackageKit' Mar 22 16:31:55 jik5.kamens.us systemd[1]: Started packagekit.service - PackageKit Daemon. Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.evolution.dataserver.AddressBook10' Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started evolution-addressbook-factory.service - Evolution address book service. Mar 22 16:31:55 jik5.kamens.us nautilus[4987]: Connecting to org.freedesktop.Tracker3.Miner.Files Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.FileManager1' Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: 400.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): connected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): 330.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: 165.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: Internal DisplayPort Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: 960.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: 165.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: Internal DisplayPort Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: 960.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: 165.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: 400.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): connected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): 330.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: 165.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: Internal DisplayPort Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: 960.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: 165.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: Internal DisplayPort Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: 960.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: disconnected Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: Internal TMDS Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: 165.0 MHz maximum pixel clock Mar 22 16:31:55 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.ScreenSaver' requested by ':1.58' (uid=1000 pid=4909 comm="/usr/libexec/xdg-desktop-portal-gtk" label="unconfined") Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.Shell@x11.service - GNOME Shell on X11. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target gnome-session-initialized.target - GNOME Session is initialized. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target gnome-session-x11-services.target - GNOME session X11 services. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target gnome-session@ubuntu.target - GNOME Session (session: ubuntu). Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting gnome-session-signal-init.service - Signal initialization done to GNOME Session Manager... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.freedesktop.IBus.session.GNOME.service - IBus Daemon for GNOME... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.A11ySettings.service - GNOME accessibility service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Color.service - GNOME color management service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Datetime.service - GNOME date & time service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Housekeeping.service - GNOME maintenance of expirable data service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Keyboard.service - GNOME keyboard configuration service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.MediaKeys.service - GNOME keyboard shortcuts service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Power.service - GNOME power management service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.PrintNotifications.service - GNOME printer notifications service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Rfkill.service - GNOME RFKill support service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.ScreensaverProxy.service - GNOME FreeDesktop screensaver service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Sharing.service - GNOME file sharing service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Smartcard.service - GNOME smartcard service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Sound.service - GNOME sound sample caching service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.Wacom.service - GNOME Wacom tablet support service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Starting org.gnome.SettingsDaemon.XSettings.service - GNOME XSettings service... Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.ScreenSaver' Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Finished gnome-session-signal-init.service - Signal initialization done to GNOME Session Manager. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-spice\x2dvdagent-5076.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us NetworkManager[2066]: [1679517115.6011] agent-manager: agent[07bcf4f682ad1a43,:1.64/org.gnome.Shell.NetworkAgent/1000]: agent registered Mar 22 16:31:55 jik5.kamens.us spice-vdagent[5076]: vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 does not exist, exiting Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.ScreensaverProxy.service - GNOME FreeDesktop screensaver service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.ScreensaverProxy.target - GNOME FreeDesktop screensaver target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Sharing.service - GNOME file sharing service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Sharing.target - GNOME file sharing target. Mar 22 16:31:55 jik5.kamens.us webcam-config.sh.desktop[5143]: Cannot open device /dev/video0, exiting. Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.freedesktop.portal.IBus' requested by ':1.79' (uid=1000 pid=5044 comm="/usr/bin/ibus-daemon --panel disable --xim" label="unconfined") Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.freedesktop.IBus.session.GNOME.service - IBus Daemon for GNOME. Mar 22 16:31:55 jik5.kamens.us gnome-session-binary[4674]: Entering running state Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Datetime.service - GNOME date & time service. Mar 22 16:31:55 jik5.kamens.us kernel: rfkill: input handler disabled Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: No feature manager for feature of type 'GProxyResolver' Mar 22 16:31:55 jik5.kamens.us kernel: indicator-messa[5165]: segfault at 559792208dc3 ip 00007fbbcb4becb9 sp 00007ffc54e69160 error 4 in libaccountsservice.so.0.0.0[7fbbcb4b5000+17000] likely on CPU 0 (core 0, socket 0) Mar 22 16:31:55 jik5.kamens.us kernel: Code: 04 25 28 00 00 00 48 89 44 24 08 31 c0 48 c7 04 24 00 00 00 00 e8 c7 96 ff ff 48 85 db 74 7a 48 89 c6 48 8b 03 48 85 c0 74 05 <48> 3b 30 74 0c 48 89 df e8 0a 7a ff ff 85 c0 74 5e 48 85 ed 0f 84 Mar 22 16:31:55 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' requested by ':1.85' (uid=1000 pid=5048 comm="/usr/libexec/gsd-keyboard" label="unconfined") Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Smartcard.service - GNOME smartcard service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Rfkill.service - GNOME RFKill support service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Color.service - GNOME color management service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Keyboard.service - GNOME keyboard configuration service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Wacom.service - GNOME Wacom tablet support service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.A11ySettings.service - GNOME accessibility service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Housekeeping.service - GNOME maintenance of expirable data service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.MediaKeys.service - GNOME keyboard shortcuts service. Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.portal.IBus' Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us geoclue[4907]: unable to create directory '/var/lib/geoclue/.cache/dconf': Read-only file system. dconf will not work properly. Mar 22 16:31:55 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 5135: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 5135 does not exist. Mar 22 16:31:55 jik5.kamens.us gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 5135: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 5135 does not exist. Mar 22 16:31:55 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 5155: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 5155 does not exist. Mar 22 16:31:55 jik5.kamens.us gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 5155: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 5155 does not exist. Mar 22 16:31:55 jik5.kamens.us gnome-session[4674]: gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 5159: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 5159 does not exist. Mar 22 16:31:55 jik5.kamens.us gnome-session-binary[4674]: GnomeDesktop-WARNING: Could not create transient scope for PID 5159: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 5159 does not exist. Mar 22 16:31:55 jik5.kamens.us systemd[1]: Starting systemd-localed.service - Locale Service... Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-bt_pa_auto_switcher.pl-5130.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-dropbox-5161.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-google\x2dchrome-5127.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-indicator\x2dmessages-5165.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-nvidia\x2dsettings\x2dautostart-5137.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-org.gnome.Evolution\x2dalarm\x2dnotify-5128.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-org.gnome.SettingsDaemon.DiskUtilityNotify-5162.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5233]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-snap\x2duserd\x2dautostart-5164.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-synology\x2ddrive\x2dautostart-5142.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-ubuntu\x2dreport\x2don\x2dupgrade-5146.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started app-gnome-user\x2ddirs\x2dupdate\x2dgtk-5178.scope - Application launched by gnome-session-binary. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.A11ySettings.target - GNOME accessibility target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Color.target - GNOME color management target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Datetime.target - GNOME date & time target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Housekeeping.target - GNOME maintenance of expirable data target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Keyboard.target - GNOME keyboard configuration target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.MediaKeys.target - GNOME keyboard shortcuts target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Rfkill.target - GNOME RFKill support target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Smartcard.target - GNOME smartcard target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Wacom.target - GNOME Wacom tablet support target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Sound.service - GNOME sound sample caching service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.Power.service - GNOME power management service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.PrintNotifications.service - GNOME printer notifications service. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Power.target - GNOME power management target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.PrintNotifications.target - GNOME printer notifications target. Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.Sound.target - GNOME sound sample caching target. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5238]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5239]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5242]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5246]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: Use of uninitialized value $output in pattern match (m//) at /home/jik/src/bt_pa_auto_switcher/bt_pa_auto_switcher.pl line 367. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: Use of uninitialized value $want_num in concatenation (.) or string at /home/jik/src/bt_pa_auto_switcher/bt_pa_auto_switcher.pl line 368. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: Use of uninitialized value $output in die at /home/jik/src/bt_pa_auto_switcher/bt_pa_auto_switcher.pl line 368. Mar 22 16:31:55 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: Spawning pactl subscribe Mar 22 16:31:55 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.impl.portal.desktop.gtk' Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started xdg-desktop-portal-gtk.service - Portal service (GTK/GNOME implementation). Mar 22 16:31:55 jik5.kamens.us systemd[3832]: Started snap.snap-store.snap-store.8a642bea-74c6-478f-9800-c78b8c2f8dcc.scope. Mar 22 16:31:55 jik5.kamens.us audit[5245]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=5245 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:55 jik5.kamens.us audit[5245]: AVC apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=5245 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:55 jik5.kamens.us kernel: audit: type=1400 audit(1679517115.952:198): apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=5245 comm="snap-confine" capability=12 capname="net_admin" Mar 22 16:31:55 jik5.kamens.us kernel: audit: type=1400 audit(1679517115.952:199): apparmor="DENIED" operation="capable" profile="/usr/lib/snapd/snap-confine" pid=5245 comm="snap-confine" capability=38 capname="perfmon" Mar 22 16:31:55 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.locale1' Mar 22 16:31:55 jik5.kamens.us systemd[1]: Started systemd-localed.service - Locale Service. Mar 22 16:31:56 jik5.kamens.us systemd[1]: dmesg.service: Deactivated successfully. Mar 22 16:31:56 jik5.kamens.us systemd[1]: tmp-snap.rootfs_zK7SEa.mount: Deactivated successfully. Mar 22 16:31:56 jik5.kamens.us gnome-remote-de[4661]: [RDP] Initialization of CUDA was successful Mar 22 16:31:56 jik5.kamens.us gnome-remote-de[4661]: RDP server started Mar 22 16:31:56 jik5.kamens.us gsd-media-keys[5049]: Failed to grab accelerator for keybinding settings:playback-random Mar 22 16:31:56 jik5.kamens.us gsd-media-keys[5049]: Failed to grab accelerator for keybinding settings:hibernate Mar 22 16:31:56 jik5.kamens.us gsd-media-keys[5049]: Failed to grab accelerator for keybinding settings:playback-repeat Mar 22 16:31:56 jik5.kamens.us gsd-media-keys[5049]: Failed to grab accelerator for keybinding settings:rotate-video-lock Mar 22 16:31:56 jik5.kamens.us systemd[3832]: Started org.gnome.SettingsDaemon.XSettings.service - GNOME XSettings service. Mar 22 16:31:56 jik5.kamens.us systemd[3832]: gnome-session-x11-services-ready.target - GNOME session X11 services is inactive. Mar 22 16:31:56 jik5.kamens.us systemd[3832]: Reached target org.gnome.SettingsDaemon.XSettings.target - GNOME XSettings target. Mar 22 16:31:56 jik5.kamens.us systemd[3832]: Reached target gnome-session.target - GNOME Session. Mar 22 16:31:56 jik5.kamens.us systemd[3832]: Reached target gnome-session-x11@ubuntu.target - GNOME X11 Session (session: ubuntu). Mar 22 16:31:56 jik5.kamens.us systemd[3832]: Reached target graphical-session.target - Current graphical user session. Mar 22 16:31:56 jik5.kamens.us systemd[3832]: gnome-initial-setup-first-login.service - GNOME Initial Setup was skipped because of an unmet condition check (ConditionPathExists=!/home/jik/.config/gnome-initial-setup-done). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 37 with keysym 37 (keycode 10). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 34 with keysym 34 (keycode d). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 35 with keysym 35 (keycode e). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 33 with keysym 33 (keycode c). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 38 with keysym 38 (keycode 11). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 39 with keysym 39 (keycode 12). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 32 with keysym 32 (keycode b). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 31 with keysym 31 (keycode a). Mar 22 16:31:56 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 36 with keysym 36 (keycode f). Mar 22 16:31:56 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.portal.Desktop' Mar 22 16:31:56 jik5.kamens.us systemd[3832]: Started xdg-desktop-portal.service - Portal service. Mar 22 16:31:56 jik5.kamens.us systemd[3832]: Startup finished in 5.995s. Mar 22 16:31:56 jik5.kamens.us org.freedesktop.FileManager1[4987]: Initializing nautilus-dropbox 2019.02.14 Mar 22 16:31:56 jik5.kamens.us nautilus[4987]: libnautilus-cloud-extension.so init Mar 22 16:31:56 jik5.kamens.us nautilus[4987]: thread_start [287]:bind successfull for path = '/home/jik/.cloud-ipc-socket' Mar 22 16:31:56 jik5.kamens.us nautilus[4987]: thread_start [291]:running with sock 28..... Mar 22 16:31:56 jik5.kamens.us nautilus[4987]: setDumpCacheReady [107]:Set dump cache as ready Mar 22 16:31:56 jik5.kamens.us snapd-desktop-i[4864]: New theme: gtk=Yaru icon=Yaru cursor=(null), sound=Yaru Mar 22 16:31:56 jik5.kamens.us appimagelauncherd[4122]: Scheduling for unintegration: /home/jik/.cloud-ipc-socket Mar 22 16:31:56 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.DiskUtility' requested by ':1.63' (uid=1000 pid=4987 comm="/usr/bin/nautilus --gapplication-service" label="unconfined") Mar 22 16:31:56 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.DiskUtility' Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5494]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5496]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5499]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5502]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:56 jik5.kamens.us snapd-desktop-i[4864]: All available theme snaps installed Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5507]: No PulseAudio daemon running, or not running as session daemon. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs exited non-zero Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: Use of uninitialized value $output in pattern match (m//) at /home/jik/src/bt_pa_auto_switcher/bt_pa_auto_switcher.pl line 367. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: Use of uninitialized value $want_num in concatenation (.) or string at /home/jik/src/bt_pa_auto_switcher/bt_pa_auto_switcher.pl line 368. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: Use of uninitialized value $output in die at /home/jik/src/bt_pa_auto_switcher/bt_pa_auto_switcher.pl line 368. Mar 22 16:31:56 jik5.kamens.us bt_pa_auto_switcher.pl.desktop[5130]: pacmd list-sink-inputs looking for index # failed, aborting. Output: Mar 22 16:31:56 jik5.kamens.us dropbox.desktop[5161]: Starting Dropbox... Mar 22 16:31:56 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/cryptography.hazmat.bindings._openssl.abi3.so' Mar 22 16:31:56 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/cryptography.hazmat.bindings._padding.abi3.so' Mar 22 16:31:56 jik5.kamens.us systemd[1]: Starting apport-autoreport.service - Process error reports when automatic reporting is enabled... Mar 22 16:31:56 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:31:56 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/apex._apex.abi3.so' Mar 22 16:31:57 jik5.kamens.us whoopsie[5509]: [16:31:57] Using lock path: /var/lock/whoopsie/lock Mar 22 16:31:57 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:31:57 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/psutil._psutil_linux.cpython-38-x86_64-linux-gnu.so' Mar 22 16:31:57 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/psutil._psutil_posix.cpython-38-x86_64-linux-gnu.so' Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 32 with keysym 32 (keycode b). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 31 with keysym 31 (keycode a). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 33 with keysym 33 (keycode c). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 34 with keysym 34 (keycode d). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 36 with keysym 36 (keycode f). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 37 with keysym 37 (keycode 10). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 35 with keysym 35 (keycode e). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 38 with keysym 38 (keycode 11). Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 39 with keysym 39 (keycode 12). Mar 22 16:31:57 jik5.kamens.us whoopsie-upload-all[5508]: INFO:root: skipping, not a crash Mar 22 16:31:57 jik5.kamens.us whoopsie-upload-all[5508]: INFO:root:/var/crash/_usr_libexec_tracker-extract-3.1000.crash already marked for upload, skipping Mar 22 16:31:57 jik5.kamens.us whoopsie-upload-all[5508]: INFO:root:/var/crash/_usr_bin_gnome-shell.1000.crash already marked for upload, skipping Mar 22 16:31:57 jik5.kamens.us whoopsie-upload-all[5508]: INFO:root:/var/crash/_usr_bin_emacs-gtk.1000.crash already marked for upload, skipping Mar 22 16:31:57 jik5.kamens.us whoopsie-upload-all[5508]: INFO:root:Waiting for whoopsie to upload reports (timeout: 20 s) Mar 22 16:31:57 jik5.kamens.us whoopsie-upload-all[5508]: INFO:root:All reports uploaded successfully Mar 22 16:31:57 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:31:57 jik5.kamens.us systemd[1]: apport-autoreport.service: Deactivated successfully. Mar 22 16:31:57 jik5.kamens.us systemd[1]: Finished apport-autoreport.service - Process error reports when automatic reporting is enabled. Mar 22 16:31:57 jik5.kamens.us systemd[3832]: Started app-gnome-Flameshot-5530.scope - Application launched by gnome-session-binary. Mar 22 16:31:57 jik5.kamens.us systemd[3832]: Started app-gnome-yubioath\x2ddesktop-5528.scope - Application launched by gnome-session-binary. Mar 22 16:31:57 jik5.kamens.us whoopsie[5527]: [16:31:57] Using lock path: /var/lock/whoopsie/lock Mar 22 16:31:57 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: GNOME Shell started at Wed Mar 22 2023 16:31:55 GMT-0400 (Eastern Daylight Time) Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Registering session with GDM Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: Launching DING process Mar 22 16:31:57 jik5.kamens.us audit[5245]: SECCOMP auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=5245 comm="snap-store" exe="/snap/snap-store/638/usr/bin/snap-store" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7f20229a573d code=0x50000 Mar 22 16:31:57 jik5.kamens.us kernel: audit: type=1326 audit(1679517117.756:200): auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=5245 comm="snap-store" exe="/snap/snap-store/638/usr/bin/snap-store" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7f20229a573d code=0x50000 Mar 22 16:31:57 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.ArchiveManager1' requested by ':1.99' (uid=1000 pid=5540 comm="gjs /usr/share/gnome-shell/extensions/ding@rasters" label="unconfined") Mar 22 16:31:57 jik5.kamens.us gnome-shell[4705]: DING: Detected async api for thumbnails Mar 22 16:31:58 jik5.kamens.us gnome-shell[4705]: DING: ** Message: 16:31:58.098: Connecting to org.freedesktop.Tracker3.Miner.Files Mar 22 16:31:58 jik5.kamens.us gnome-shell[4705]: DING: GNOME nautilus 44.rc Mar 22 16:31:58 jik5.kamens.us gnome-shell[4705]: DING: DBus interface for Switcheroo control (net.hadess.SwitcherooControl) is now available. Mar 22 16:31:58 jik5.kamens.us gnome-shell[4705]: DING: DBus interface for Gvfs daemon (org.gtk.vfs.Metadata) is now available. Mar 22 16:31:58 jik5.kamens.us gnome-shell[4705]: DING: DBus interface for Nautilus (org.gnome.Nautilus.FileOperations2) is now available. Mar 22 16:31:58 jik5.kamens.us gnome-shell[4705]: DING: DBus interface for Nautilus (org.freedesktop.FileManager1) is now available. Mar 22 16:31:58 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.ArchiveManager1' Mar 22 16:31:58 jik5.kamens.us gnome-shell[4705]: DING: DBus interface for File-roller (org.gnome.ArchiveManager1) is now available. Mar 22 16:31:58 jik5.kamens.us dbus-daemon[1927]: [system] Activating via systemd: service name='org.freedesktop.fwupd' unit='fwupd.service' requested by ':1.94' (uid=1000 pid=5245 comm="/snap/snap-store/638/usr/bin/snap-store --gapplica" label="snap.snap-store.snap-store (enforce)") Mar 22 16:31:58 jik5.kamens.us systemd[1]: Starting fwupd.service - Firmware update daemon... Mar 22 16:31:58 jik5.kamens.us yubioath-desktop.desktop[5528]: qrc:/qml/main.qml:305:5: QML Shortcut: Shortcut: Only binding to one of multiple key bindings associated with 7. Use 'sequences: [ ]' to bind to all of them. Mar 22 16:31:58 jik5.kamens.us yubioath-desktop.desktop[5528]: qrc:/qml/main.qml:297:5: QML Shortcut: Shortcut: Only binding to one of multiple key bindings associated with 9. Use 'sequences: [ ]' to bind to all of them. Mar 22 16:31:58 jik5.kamens.us snapd-desktop-i[4864]: New theme: gtk=Yaru-dark icon=Yaru cursor=Yaru, sound=Yaru Mar 22 16:31:58 jik5.kamens.us snapd-desktop-i[4864]: All available theme snaps installed Mar 22 16:31:58 jik5.kamens.us bluetoothd[1926]: src/profile.c:record_cb() Unable to get Hands-Free Voice gateway SDP record: Host is down Mar 22 16:31:58 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/tornado.speedups.cpython-38-x86_64-linux-gnu.so' Mar 22 16:31:58 jik5.kamens.us gnome-keyring-daemon[4142]: asked to register item /org/freedesktop/secrets/collection/Default_5fkeyring/118, but it's already registered Mar 22 16:31:58 jik5.kamens.us gnome-keyring-d[4142]: asked to register item /org/freedesktop/secrets/collection/Default_5fkeyring/118, but it's already registered Mar 22 16:31:58 jik5.kamens.us systemd[1]: Started pcscd.service - PC/SC Smart Card Daemon. Mar 22 16:31:59 jik5.kamens.us google-chrome.desktop[5141]: libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null) Mar 22 16:31:59 jik5.kamens.us fwupd[5593]: 20:31:59.731 FuPluginIntelMe failed to get public key using /fpf/OemCred: generic failure [0xb] Mar 22 16:32:00 jik5.kamens.us dbus-daemon[1927]: [system] Successfully activated service 'org.freedesktop.fwupd' Mar 22 16:32:00 jik5.kamens.us systemd[1]: Started fwupd.service - Firmware update daemon. Mar 22 16:32:00 jik5.kamens.us snap-store[5245]: plugin fwupd took 2.2 seconds to do setup Mar 22 16:32:00 jik5.kamens.us systemd[1]: Starting apport-autoreport.service - Process error reports when automatic reporting is enabled... Mar 22 16:32:00 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating service name='org.gnome.BrowserConnector' requested by ':1.111' (uid=1000 pid=6129 comm="/usr/bin/python3 /usr/bin/gnome-browser-connector-" label="unconfined") Mar 22 16:32:00 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:32:00 jik5.kamens.us whoopsie[6155]: [16:32:00] Using lock path: /var/lock/whoopsie/lock Mar 22 16:32:00 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:32:00 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.BrowserConnector' Mar 22 16:32:00 jik5.kamens.us systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Mar 22 16:32:01 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root: skipping, not a crash Mar 22 16:32:01 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root:/var/crash/_usr_libexec_tracker-extract-3.1000.crash already marked for upload, skipping Mar 22 16:32:01 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root:Collecting info for /var/crash/_usr_lib_x86_64-linux-gnu_indicator-messages_indicator-messages-service.1000.crash... Mar 22 16:32:01 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:32:01 jik5.kamens.us whoopsie[6190]: [16:32:01] Using lock path: /var/lock/whoopsie/lock Mar 22 16:32:01 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:32:02 jik5.kamens.us google-chrome.desktop[5141]: INFO: Created TensorFlow Lite XNNPACK delegate for CPU. Mar 22 16:32:02 jik5.kamens.us google-chrome.desktop[5141]: [5127:5127:0322/163202.193062:ERROR:object_proxy.cc(623)] Failed to call method: org.freedesktop.ScreenSaver.GetActive: object_path= /org/freedesktop/ScreenSaver: org.freedesktop.DBus.Error.NotSupported: This method is not implemented Mar 22 16:32:02 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/wrapt._wrappers.cpython-38-x86_64-linux-gnu.so' Mar 22 16:32:02 jik5.kamens.us audit[5245]: SECCOMP auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=5245 comm="snap-store" exe="/snap/snap-store/638/usr/bin/snap-store" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7f202299c39b code=0x50000 Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1326 audit(1679517122.832:201): auid=1000 uid=1000 gid=1000 ses=1 subj=? pid=5245 comm="snap-store" exe="/snap/snap-store/638/usr/bin/snap-store" sig=0 arch=c000003e syscall=93 compat=0 ip=0x7f202299c39b code=0x50000 Mar 22 16:32:02 jik5.kamens.us snap-store[5245]: plugin appstream took 2.4 seconds to do setup Mar 22 16:32:02 jik5.kamens.us audit[1927]: USER_AVC pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.DBus.Properties" member="GetAll" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:32:02 jik5.kamens.us audit[1927]: USER_AVC pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.PolicyKit1.Authority" member="CheckAuthorization" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1107 audit(1679517122.876:202): pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.DBus.Properties" member="GetAll" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1420 audit(1679517122.876:203): subj_apparmor=unconfined Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1107 audit(1679517122.876:204): pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.PolicyKit1.Authority" member="CheckAuthorization" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1420 audit(1679517122.876:205): subj_apparmor=unconfined Mar 22 16:32:02 jik5.kamens.us audit[1927]: USER_AVC pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.DBus.Properties" member="GetAll" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:32:02 jik5.kamens.us audit[1927]: USER_AVC pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.PolicyKit1.Authority" member="CheckAuthorization" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us audit: MAC_TASK_CONTEXTS subj_apparmor=unconfined Mar 22 16:32:02 jik5.kamens.us snap-store[5245]: enabled plugins: fwupd, os-release, packagekit-refine-repos, packagekit-refresh, appstream, hardcoded-blocklist, hardcoded-popular, modalias, packagekit, rewrite-resource, provenance, snap, systemd-updates, generic-updates, provenance-license, icons Mar 22 16:32:02 jik5.kamens.us snap-store[5245]: disabled plugins: dpkg, dummy, fedora-langpacks, fedora-pkgdb-collections, repos Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1107 audit(1679517122.880:206): pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.DBus.Properties" member="GetAll" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1420 audit(1679517122.880:207): subj_apparmor=unconfined Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1107 audit(1679517122.880:208): pid=1927 uid=105 auid=4294967295 ses=4294967295 subj=? msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/PolicyKit1/Authority" interface="org.freedesktop.PolicyKit1.Authority" member="CheckAuthorization" mask="send" name=":1.6" pid=5245 label="snap.snap-store.snap-store" peer_pid=1942 peer_label="unconfined" exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? terminal=?' Mar 22 16:32:02 jik5.kamens.us kernel: audit: type=1420 audit(1679517122.880:209): subj_apparmor=unconfined Mar 22 16:32:03 jik5.kamens.us dropbox.desktop[5161]: Dropbox isn't running! Mar 22 16:32:03 jik5.kamens.us dropbox.desktop[5161]: Done! Mar 22 16:32:03 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/PyQt5.QtCore.so' Mar 22 16:32:03 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/PyQt5.QtGui.so' Mar 22 16:32:03 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/PyQt5.QtWidgets.so' Mar 22 16:32:03 jik5.kamens.us audit[5245]: AVC apparmor="DENIED" operation="open" profile="snap.snap-store.snap-store" name="/etc/PackageKit/Vendor.conf" pid=5245 comm="snap-store" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 Mar 22 16:32:03 jik5.kamens.us kernel: audit: type=1400 audit(1679517123.308:210): apparmor="DENIED" operation="open" profile="snap.snap-store.snap-store" name="/etc/PackageKit/Vendor.conf" pid=5245 comm="snap-store" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 Mar 22 16:32:03 jik5.kamens.us snap-store[5245]: /etc/PackageKit/Vendor.conf file not found Mar 22 16:32:03 jik5.kamens.us audit[5245]: AVC apparmor="DENIED" operation="open" profile="snap.snap-store.snap-store" name="/etc/appstream.conf" pid=5245 comm="snap-store" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 Mar 22 16:32:03 jik5.kamens.us snap-store[5245]: not handling error failed for action get-updates-historical: failed to build result for 5e46a9423bcec2d905d6d7a1f1ec23c1813b63e8 Mar 22 16:32:03 jik5.kamens.us snap-store[5245]: unhandled property 'Sender' Mar 22 16:32:03 jik5.kamens.us PackageKit[4953]: uid 1000 is trying to obtain org.freedesktop.packagekit.system-sources-refresh auth (only_trusted:0) Mar 22 16:32:03 jik5.kamens.us PackageKit[4953]: uid 1000 obtained auth for org.freedesktop.packagekit.system-sources-refresh Mar 22 16:32:04 jik5.kamens.us dropbox.desktop[5293]: dropbox: load fq extension '/home/jik/.dropbox-dist/dropbox-lnx.x86_64-170.4.5895/PyQt5.QtDBus.so' Mar 22 16:32:04 jik5.kamens.us systemd[1]: Starting apt-news.service - Update APT News... Mar 22 16:32:04 jik5.kamens.us systemd[1]: Starting esm-cache.service - Update the local ESM caches... Mar 22 16:32:04 jik5.kamens.us systemd[1]: esm-cache.service: Deactivated successfully. Mar 22 16:32:04 jik5.kamens.us systemd[1]: Finished esm-cache.service - Update the local ESM caches. Mar 22 16:32:04 jik5.kamens.us systemd[1]: apt-news.service: Deactivated successfully. Mar 22 16:32:04 jik5.kamens.us systemd[1]: Finished apt-news.service - Update APT News. Mar 22 16:32:04 jik5.kamens.us dropbox[5293]: About to Show called on an item wihtout submenus. We're ignoring it. Mar 22 16:32:05 jik5.kamens.us systemd[1]: Started uuidd.service - Daemon for generating UUIDs. Mar 22 16:32:05 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root:Marking /var/crash/_usr_lib_x86_64-linux-gnu_indicator-messages_indicator-messages-service.1000.crash for whoopsie upload Mar 22 16:32:05 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root:/var/crash/_usr_bin_gnome-shell.1000.crash already marked for upload, skipping Mar 22 16:32:05 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root:/var/crash/_usr_bin_emacs-gtk.1000.crash already marked for upload, skipping Mar 22 16:32:05 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root:Waiting for whoopsie to upload reports (timeout: 20 s) Mar 22 16:32:05 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root: missing (remaining: 20 s): /var/crash/_usr_lib_x86_64-linux-gnu_indicator-messages_indicator-messages-service.1000.uploaded Mar 22 16:32:05 jik5.kamens.us systemd[1]: Started whoopsie.service - crash report submission. Mar 22 16:32:05 jik5.kamens.us whoopsie[7945]: [16:32:05] Using lock path: /var/lock/whoopsie/lock Mar 22 16:32:05 jik5.kamens.us whoopsie[7945]: [16:32:05] Parsing /var/crash/_usr_lib_x86_64-linux-gnu_indicator-messages_indicator-messages-service.1000.crash. Mar 22 16:32:05 jik5.kamens.us whoopsie[7945]: [16:32:05] Uploading /var/crash/_usr_lib_x86_64-linux-gnu_indicator-messages_indicator-messages-service.1000.crash. Mar 22 16:32:05 jik5.kamens.us synology-drive-autostart.desktop[7930]: debug.message: Cannot find path by key "user_cloud_station_app_path" Mar 22 16:32:05 jik5.kamens.us synology-drive-autostart.desktop[7930]: debug.message: Cannot find path by key "user_cloud_station_data_path" Mar 22 16:32:05 jik5.kamens.us synology-drive-autostart.desktop[7930]: debug.message: Cannot find path by key "user_cloud_station_working_dir_path" Mar 22 16:32:05 jik5.kamens.us synology-drive-autostart.desktop[7930]: debug.message: Cannot find path by key "user_cloud_station_drive_ui_path" Mar 22 16:32:07 jik5.kamens.us whoopsie[7945]: [16:32:07] Sent; server replied with: No error Mar 22 16:32:07 jik5.kamens.us whoopsie[7945]: [16:32:07] Response code: 200 Mar 22 16:32:07 jik5.kamens.us whoopsie[7945]: [16:32:07] Reported OOPS ID 9bf21274-c8f0-11ed-ad84-fa163e55efd0 Mar 22 16:32:07 jik5.kamens.us systemd[1]: whoopsie.service: Deactivated successfully. Mar 22 16:32:07 jik5.kamens.us synology-drive-autostart.desktop[8296]: QObject::connect: Incompatible sender/receiver arguments Mar 22 16:32:07 jik5.kamens.us synology-drive-autostart.desktop[8296]: GlobalConnecter::sigTriggerThreeWayMerge(quint64) --> DaemonManager::slotIssueThreeWayMergeEvent(uint64_t) Mar 22 16:32:08 jik5.kamens.us synology-drive-autostart.desktop[9633]: sh: 1: /sbin/udevadm: not found Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us synology-drive-autostart.desktop[9629]: gtk-update-icon-cache: Cache file created successfully. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:08 jik5.kamens.us synology-inotify.py[4131]: Path already being watched: [/home/jik/CloudStation/.SynologyWorkingDirectory] Mar 22 16:32:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:32:11 jik5.kamens.us appimagelauncherd[4122]: Executing deferred operations Mar 22 16:32:11 jik5.kamens.us appimagelauncherd[4122]: Cleaning up old desktop integration files Mar 22 16:32:11 jik5.kamens.us appimagelauncherd[4122]: Updating desktop database and icon caches Mar 22 16:32:11 jik5.kamens.us systemd[1]: Received SIGRTMIN+21 from PID 513 (plymouthd). Mar 22 16:32:11 jik5.kamens.us systemd[1]: Finished plymouth-quit-wait.service - Hold until boot process finishes up. Mar 22 16:32:11 jik5.kamens.us systemd[1]: Reached target multi-user.target - Multi-User System. Mar 22 16:32:11 jik5.kamens.us systemd[1]: Reached target graphical.target - Graphical Interface. Mar 22 16:32:11 jik5.kamens.us systemd[1]: Starting setvtrgb.service - Set console scheme... Mar 22 16:32:11 jik5.kamens.us systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP... Mar 22 16:32:11 jik5.kamens.us systemd[1]: Finished setvtrgb.service - Set console scheme. Mar 22 16:32:11 jik5.kamens.us systemd[1]: Created slice system-getty.slice - Slice /system/getty. Mar 22 16:32:11 jik5.kamens.us systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 22 16:32:11 jik5.kamens.us systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP. Mar 22 16:32:11 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.freedesktop.Tracker3.Miner.Extract' unit='tracker-extract-3.service' requested by ':1.15' (uid=1000 pid=4477 comm="/usr/libexec/tracker-miner-fs-3" label="unconfined") Mar 22 16:32:11 jik5.kamens.us systemd[3832]: Starting tracker-extract-3.service - Tracker metadata extractor... Mar 22 16:32:11 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.freedesktop.Tracker3.Miner.Extract' Mar 22 16:32:11 jik5.kamens.us systemd[3832]: Started tracker-extract-3.service - Tracker metadata extractor. Mar 22 16:32:11 jik5.kamens.us appimagelauncherd[4122]: Done Mar 22 16:32:12 jik5.kamens.us systemd-timesyncd[1437]: Contacted time server 185.125.190.58:123 (ntp.ubuntu.com). Mar 22 16:32:12 jik5.kamens.us systemd-timesyncd[1437]: Initial clock synchronization to Wed 2023-03-22 16:32:12.128016 EDT. Mar 22 16:32:15 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gnome.zeitgeist.Engine' unit='zeitgeist.service' requested by ':1.122' (uid=1000 pid=9791 comm="/usr/bin/zeitgeist-datahub" label="unconfined") Mar 22 16:32:15 jik5.kamens.us systemd[3832]: Started app-gnome-zeitgeist\x2ddatahub-9791.scope - Application launched by gnome-session-binary. Mar 22 16:32:15 jik5.kamens.us systemd[3832]: Starting zeitgeist.service - Zeitgeist activity log service... Mar 22 16:32:15 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Activating via systemd: service name='org.gnome.zeitgeist.SimpleIndexer' unit='zeitgeist-fts.service' requested by ':1.123' (uid=1000 pid=9800 comm="/usr/bin/zeitgeist-daemon" label="unconfined") Mar 22 16:32:15 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.zeitgeist.Engine' Mar 22 16:32:15 jik5.kamens.us systemd[3832]: Started zeitgeist.service - Zeitgeist activity log service. Mar 22 16:32:15 jik5.kamens.us systemd[3832]: Starting zeitgeist-fts.service - Zeitgeist full-text search indexer... Mar 22 16:32:15 jik5.kamens.us zeitgeist-datah[9808]: zeitgeist-datahub.vala:227: Unable to get name "org.gnome.zeitgeist.datahub" on the bus! Mar 22 16:32:15 jik5.kamens.us dbus-daemon[4170]: [session uid=1000 pid=4170] Successfully activated service 'org.gnome.zeitgeist.SimpleIndexer' Mar 22 16:32:15 jik5.kamens.us systemd[3832]: Started zeitgeist-fts.service - Zeitgeist full-text search indexer. Mar 22 16:32:15 jik5.kamens.us whoopsie-upload-all[6151]: INFO:root:All reports uploaded successfully Mar 22 16:32:15 jik5.kamens.us PackageKit[4953]: refresh-cache transaction /10438_ddaeaaed from uid 1000 finished with success after 11980ms Mar 22 16:32:15 jik5.kamens.us systemd[1]: apport-autoreport.service: Deactivated successfully. Mar 22 16:32:15 jik5.kamens.us systemd[1]: Finished apport-autoreport.service - Process error reports when automatic reporting is enabled. Mar 22 16:32:15 jik5.kamens.us systemd[1]: Startup finished in 10.075s (firmware) + 16.296s (loader) + 22.525s (kernel) + 35.686s (userspace) = 1min 24.585s. Mar 22 16:32:15 jik5.kamens.us systemd[1]: apport-autoreport.service: Consumed 3.080s CPU time. Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.Builder.desktop/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.Calculator.desktop/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.clocks.desktop/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.Dictionary.desktop/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.Documents.desktop/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.Evince/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.gedit.desktop/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.Maps.desktop/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: adding wildcard app */*/*/org.gnome.Weather/* to plugin cache Mar 22 16:32:15 jik5.kamens.us snap-store[5245]: unhandled property 'Sender' Mar 22 16:32:16 jik5.kamens.us kernel: usb 1-8: new high-speed USB device number 14 using xhci_hcd Mar 22 16:32:16 jik5.kamens.us kernel: usb 1-8: New USB device found, idVendor=2109, idProduct=2811, bcdDevice=90.90 Mar 22 16:32:16 jik5.kamens.us kernel: usb 1-8: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:32:16 jik5.kamens.us kernel: usb 1-8: Product: USB2.0 Hub Mar 22 16:32:16 jik5.kamens.us kernel: usb 1-8: Manufacturer: VIA Labs, Inc. Mar 22 16:32:16 jik5.kamens.us kernel: hub 1-8:1.0: USB hub found Mar 22 16:32:16 jik5.kamens.us kernel: hub 1-8:1.0: 4 ports detected Mar 22 16:32:16 jik5.kamens.us systemd-udevd[9847]: 1-8:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8:1.0 0:0' failed with exit code 1. Mar 22 16:32:16 jik5.kamens.us systemd-udevd[9847]: 1-8:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8:1.0 0:0' failed with exit code 1. Mar 22 16:32:16 jik5.kamens.us systemd-udevd[9847]: 1-8: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8 189:13' failed with exit code 1. Mar 22 16:32:16 jik5.kamens.us systemd-udevd[9847]: 1-8: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8 189:13' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6: new SuperSpeed USB device number 2 using xhci_hcd Mar 22 16:32:17 jik5.kamens.us PackageKit[4953]: resolve transaction /10439_aedcacdd from uid 1000 finished with success after 1167ms Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6: New USB device found, idVendor=2109, idProduct=8110, bcdDevice=90.95 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6: Product: USB3.0 Hub Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6: Manufacturer: VIA Labs, Inc. Mar 22 16:32:17 jik5.kamens.us kernel: hub 2-6:1.0: USB hub found Mar 22 16:32:17 jik5.kamens.us kernel: hub 2-6:1.0: 4 ports detected Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 2-6:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6:1.0 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 2-6:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6:1.0 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 2-6: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6 189:129' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 2-6: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6 189:129' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us kernel: usb 1-8.4: new high-speed USB device number 15 using xhci_hcd Mar 22 16:32:17 jik5.kamens.us kernel: usb 1-8.4: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Mar 22 16:32:17 jik5.kamens.us kernel: usb 1-8.4: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Mar 22 16:32:17 jik5.kamens.us kernel: usb 1-8.4: Product: USB 2.0 Hub Mar 22 16:32:17 jik5.kamens.us kernel: hub 1-8.4:1.0: USB hub found Mar 22 16:32:17 jik5.kamens.us kernel: hub 1-8.4:1.0: 4 ports detected Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 1-8.4:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4:1.0 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 1-8.4:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4:1.0 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 1-8.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4 189:14' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9847]: 1-8.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4 189:14' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us snap-store[5245]: Tried to set invalid release date: 2022 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: new SuperSpeed USB device number 3 using xhci_hcd Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: New USB device found, idVendor=17e9, idProduct=4323, bcdDevice=31.00 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: Product: Plugable UD-3900 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: Manufacturer: DisplayLink Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: SerialNumber: 20175067 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: Warning! Unlikely big volume range (=511), cval->res is probably wrong. Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: [15] FU [Plugable Audio Playback Volume] ch = 6, val = -8176/0/16 Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: Warning! Unlikely big volume range (=767), cval->res is probably wrong. Mar 22 16:32:17 jik5.kamens.us kernel: usb 2-6.1: [12] FU [Mic Capture Volume] ch = 2, val = -4592/7680/16 Mar 22 16:32:17 jik5.kamens.us mtp-probe[9902]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1" Mar 22 16:32:17 jik5.kamens.us mtp-probe[9902]: bus: 2, device: 3 was not an MTP device Mar 22 16:32:17 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ether Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9926]: 2-6.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.4 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9926]: 2-6.1:1.4: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.4 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.3 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us kernel: cdc_ncm 2-6.1:1.5: MAC-Address: 8c:ae:4c:dc:cf:46 Mar 22 16:32:17 jik5.kamens.us kernel: cdc_ncm 2-6.1:1.5: setting rx_max = 16384 Mar 22 16:32:17 jik5.kamens.us kernel: cdc_ncm 2-6.1:1.5: setting tx_max = 16384 Mar 22 16:32:17 jik5.kamens.us kernel: cdc_ncm 2-6.1:1.5 eth0: register 'cdc_ncm' at usb-0000:00:14.0-6.1, CDC NCM (SEND ZLP), 8c:ae:4c:dc:cf:46 Mar 22 16:32:17 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_ncm Mar 22 16:32:17 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_wdm Mar 22 16:32:17 jik5.kamens.us kernel: usbcore: registered new interface driver cdc_mbim Mar 22 16:32:17 jik5.kamens.us NetworkManager[2066]: [1679517137.8193] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/6) Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.3 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.2 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd[3832]: Reached target sound.target - Sound Card. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.2 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd[1]: Starting displaylink-driver.service - DisplayLink Driver Service... Mar 22 16:32:17 jik5.kamens.us systemd[1]: Started displaylink-driver.service - DisplayLink Driver Service. Mar 22 16:32:17 jik5.kamens.us mtp-probe[9981]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1" Mar 22 16:32:17 jik5.kamens.us mtp-probe[9981]: bus: 2, device: 3 was not an MTP device Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1 189:130' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1 189:130' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.6: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.6 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.6: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.6 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us kernel: cdc_ncm 2-6.1:1.5 enx8cae4cdccf46: renamed from eth0 Mar 22 16:32:17 jik5.kamens.us snap-store[5245]: Tried to set invalid release date: 2022 Mar 22 16:32:17 jik5.kamens.us NetworkManager[2066]: [1679517137.9006] device (eth0): interface index 5 renamed iface from 'eth0' to 'enx8cae4cdccf46' Mar 22 16:32:17 jik5.kamens.us NetworkManager[2066]: [1679517137.9067] device (enx8cae4cdccf46): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Mar 22 16:32:17 jik5.kamens.us NetworkManager[2066]: [1679517137.9079] settings: (enx8cae4cdccf46): created default wired connection 'Wired connection 2' Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.5: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.5 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us systemd-udevd[9923]: 2-6.1:1.5: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1/2-6.1:1.5 0:0' failed with exit code 1. Mar 22 16:32:17 jik5.kamens.us kernel: usb 1-8.4.3: new high-speed USB device number 16 using xhci_hcd Mar 22 16:32:18 jik5.kamens.us snapd[1955]: storehelpers.go:769: cannot refresh: snap has no updates available: "bare", "bitcoin-core", "bw", "canonical-livepatch", "chromium", "chromium-ffmpeg", "core", "core18", "core20", "core22", "cups", "firefox", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-3-38-2004", "gnome-42-2204", "gnome-system-monitor", "gtk-common-themes", "hunspell-dictionaries-1-7-2004", "snap-store", "snapd-desktop-integration", "vault" Mar 22 16:32:18 jik5.kamens.us snap-store[5245]: unhandled property 'Sender' Mar 22 16:32:18 jik5.kamens.us PackageKit[4953]: resolve transaction /10440_bdbeeced from uid 1000 finished with success after 318ms Mar 22 16:32:18 jik5.kamens.us snap-store[5245]: unhandled property 'Sender' Mar 22 16:32:18 jik5.kamens.us systemd[1]: systemd-timedated.service: Deactivated successfully. Mar 22 16:32:19 jik5.kamens.us snapd[1955]: storehelpers.go:769: cannot refresh: snap has no updates available: "bare", "bitcoin-core", "bw", "canonical-livepatch", "chromium", "chromium-ffmpeg", "core", "core18", "core20", "core22", "cups", "firefox", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-3-38-2004", "gnome-42-2204", "gnome-system-monitor", "gtk-common-themes", "hunspell-dictionaries-1-7-2004", "snap-store", "snapd-desktop-integration", "vault" Mar 22 16:32:20 jik5.kamens.us kernel: usb 1-8.4.3: New USB device found, idVendor=046d, idProduct=082d, bcdDevice= 0.11 Mar 22 16:32:20 jik5.kamens.us kernel: usb 1-8.4.3: New USB device strings: Mfr=0, Product=2, SerialNumber=1 Mar 22 16:32:20 jik5.kamens.us kernel: usb 1-8.4.3: Product: HD Pro Webcam C920 Mar 22 16:32:20 jik5.kamens.us kernel: usb 1-8.4.3: SerialNumber: ED48865F Mar 22 16:32:20 jik5.kamens.us PackageKit[4953]: search-file transaction /10441_daebdeed from uid 1000 finished with success after 1832ms Mar 22 16:32:20 jik5.kamens.us snap-store[5245]: unhandled property 'Sender' Mar 22 16:32:20 jik5.kamens.us mtp-probe[10008]: checking bus 1, device 16: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3" Mar 22 16:32:20 jik5.kamens.us mtp-probe[10008]: bus: 1, device: 16 was not an MTP device Mar 22 16:32:20 jik5.kamens.us ModemManager[2104]: [base-manager] couldn't check support for device '/sys/devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.1': not supported by any plugin Mar 22 16:32:20 jik5.kamens.us kernel: usb 1-8.4.3: Found UVC 1.00 device HD Pro Webcam C920 (046d:082d) Mar 22 16:32:20 jik5.kamens.us kernel: input: HD Pro Webcam C920 as /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.0/input/input31 Mar 22 16:32:20 jik5.kamens.us kernel: usbcore: registered new interface driver uvcvideo Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.3 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.2: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.2 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us mtp-probe[10070]: checking bus 1, device 16: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3" Mar 22 16:32:20 jik5.kamens.us mtp-probe[10070]: bus: 1, device: 16 was not an MTP device Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3 189:15' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3 189:15' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.1: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.1 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) config/udev: Adding input device HD Pro Webcam C920 (/dev/input/event19) Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) HD Pro Webcam C920: Applying InputClass "libinput keyboard catchall" Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) Using input driver 'libinput' for 'HD Pro Webcam C920' Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) systemd-logind: got fd for /dev/input/event19 13:83 fd 76 paused 0 Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) HD Pro Webcam C920: always reports core events Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "Device" "/dev/input/event19" Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event19 - HD Pro Webcam C920: is tagged by udev as: Keyboard Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event19 - HD Pro Webcam C920: device is a keyboard Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event19 - HD Pro Webcam C920: device removed Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.0/input/input31/event19" Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) XINPUT: Adding extended input device "HD Pro Webcam C920" (type: KEYBOARD, id 16) Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_model" "pc105" Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (**) Option "xkb_layout" "us" Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) Option "xkb_variant" requires a string value Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (WW) Option "xkb_options" requires a string value Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_cupsd /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us systemd-udevd[9923]: 1-8.4.3:1.0: Process '/usr/lib/snapd/snap-device-helper bind snap_cups_ippeveprinter /devices/pci0000:00/0000:00:14.0/usb1/1-8/1-8.4/1-8.4.3/1-8.4.3:1.0 0:0' failed with exit code 1. Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event19 - HD Pro Webcam C920: is tagged by udev as: Keyboard Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (II) event19 - HD Pro Webcam C920: device is a keyboard Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 32 with keysym 32 (keycode b). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 31 with keysym 31 (keycode a). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 33 with keysym 33 (keycode c). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 34 with keysym 34 (keycode d). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 36 with keysym 36 (keycode f). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 37 with keysym 37 (keycode 10). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 35 with keysym 35 (keycode e). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 38 with keysym 38 (keycode 11). Mar 22 16:32:20 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 39 with keysym 39 (keycode 12). Mar 22 16:32:20 jik5.kamens.us wireplumber[4133]: Failed to call Lookup: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for camera Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] Attaching to usb:2-6.1 Mar 22 16:32:20 jik5.kamens.us PackageKit[4953]: search-file transaction /10442_acaadeaa from uid 1000 finished with success after 501ms Mar 22 16:32:20 jik5.kamens.us snap-store[5245]: unhandled property 'Sender' Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Opened by Task 10011 (DesktopManagerE) of process 9980 (DisplayLinkMana) Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Added i2c adapter bus number 6 Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Connected with Task 10011 (DesktopManagerE) of process 9980 (DisplayLinkMana) Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Connector state: connected Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Connector state: connected Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Edid property set Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Connector state: connected Mar 22 16:32:20 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: randr: falling back to unsynchronized pixmap sharing Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Edid property set Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Notifying display power state: on Mar 22 16:32:20 jik5.kamens.us kernel: evdi: [I] (card1) Notifying mode changed: 1920x1080@60; bpp 32; pixel format XR24 little-endian (0x34325258) Mar 22 16:32:21 jik5.kamens.us kernel: evdi: [I] (card1) Notifying display power state: on Mar 22 16:32:21 jik5.kamens.us kernel: evdi: [W] evdi_painter_connect:883 (card1) Double connect - replacing 00000000349cf1f6 with 00000000349cf1f6 Mar 22 16:32:21 jik5.kamens.us kernel: evdi: [I] (card1) Connected with Task 10011 (DesktopManagerE) of process 9980 (DisplayLinkMana) Mar 22 16:32:21 jik5.kamens.us kernel: evdi: [I] (card1) Connector state: connected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: 400.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): connected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): 330.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: 165.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: Internal DisplayPort Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: 960.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: 165.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: Internal DisplayPort Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: 960.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: 165.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): CRT-0: 400.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): connected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Acer S220HQL (DFP-0): 330.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-1: 165.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: Internal DisplayPort Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-2: 960.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-3: 165.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: Internal DisplayPort Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-4: 960.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: disconnected Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: Internal TMDS Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): DFP-5: 165.0 MHz maximum pixel clock Mar 22 16:32:21 jik5.kamens.us /usr/libexec/gdm-x-session[4266]: (--) NVIDIA(GPU-0): Mar 22 16:32:21 jik5.kamens.us kernel: evdi: [I] (card1) Connector state: connected Mar 22 16:32:21 jik5.kamens.us kernel: evdi: [I] (card1) Edid property set Mar 22 16:32:21 jik5.kamens.us kernel: evdi: [I] (card1) Notifying mode changed: 1920x1080@60; bpp 32; pixel format XR24 little-endian (0x34325258) Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Failed to connect to colord device xrandr-Acer Technologies-S220HQL-LTK0R0292400: Failed to connect to missing device /org/freedesktop/ColorManager/devices/xrandr_Acer_Technologies_S220HQL_LTK0R0292400_jik_1000 Mar 22 16:32:21 jik5.kamens.us PackageKit[4953]: get-details transaction /10443_bdadeaac from uid 1000 finished with success after 406ms Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 31 with keysym 31 (keycode a). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 32 with keysym 32 (keycode b). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 33 with keysym 33 (keycode c). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 34 with keysym 34 (keycode d). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 35 with keysym 35 (keycode e). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 36 with keysym 36 (keycode f). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 37 with keysym 37 (keycode 10). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 38 with keysym 38 (keycode 11). Mar 22 16:32:21 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 39 with keysym 39 (keycode 12). Mar 22 16:32:21 jik5.kamens.us appimagelauncherd[4122]: Directories to watch disappeared, unintegrating AppImages formerly found in there Mar 22 16:32:21 jik5.kamens.us snapd-desktop-i[4864]: atk-bridge: get_device_events_reply: unknown signature Mar 22 16:32:25 jik5.kamens.us systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 22 16:32:26 jik5.kamens.us systemd[1]: systemd-localed.service: Deactivated successfully. Mar 22 16:32:28 jik5.kamens.us snap-store[5245]: atk-bridge: get_device_events_reply: unknown signature Mar 22 16:32:40 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:32:40 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:32:40 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:32:41 jik5.kamens.us kernel: evdi: [I] (card1) Notifying display power state: on Mar 22 16:32:41 jik5.kamens.us kernel: logitech-hidpp-device 0003:046D:4051.0009: HID++ 4.5 device connected. Mar 22 16:32:41 jik5.kamens.us systemd[1]: systemd-fsckd.service: Deactivated successfully. Mar 22 16:32:43 jik5.kamens.us zeitgeist-datah[9791]: zeitgeist-datahub.vala:210: Error during inserting events: GDBus.Error:org.gnome.zeitgeist.EngineError.InvalidArgument: Incomplete event: interpretation, manifestation and actor are required Mar 22 16:32:43 jik5.kamens.us systemd[3832]: Started app-gnome-emacs-10154.scope - Application launched by gnome-shell. Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 31 with keysym 31 (keycode a). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 32 with keysym 32 (keycode b). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 33 with keysym 33 (keycode c). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 34 with keysym 34 (keycode d). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 35 with keysym 35 (keycode e). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 36 with keysym 36 (keycode f). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 37 with keysym 37 (keycode 10). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 38 with keysym 38 (keycode 11). Mar 22 16:32:45 jik5.kamens.us gnome-shell[4705]: Window manager warning: Overwriting existing binding of keysym 39 with keysym 39 (keycode 12). Mar 22 16:32:55 jik5.kamens.us systemd[3832]: Started app-gnome-ubuntu\x2dadvantage\x2dnotification-10191.scope - Application launched by gnome-session-binary. Mar 22 16:32:55 jik5.kamens.us systemd[3832]: Started app-gnome-update\x2dnotifier-10194.scope - Application launched by gnome-session-binary. Mar 22 16:32:58 jik5.kamens.us pkexec[10223]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000) Mar 22 16:32:58 jik5.kamens.us pkexec[10223]: jik: Executing command [USER=root] [TTY=unknown] [CWD=/home/jik] [COMMAND=/usr/lib/update-notifier/package-system-locked] Mar 22 16:33:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:33:09 jik5.kamens.us polkitd(authority=local)[1942]: Registered Authentication Agent for unix-process:10257:10850 (system bus name :1.105 [pkttyagent --notify-fd 63 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) Mar 22 16:33:14 jik5.kamens.us polkitd(authority=local)[1942]: Operator of unix-session:2 successfully authenticated as unix-user:jik to gain ONE-SHOT authorization for action org.freedesktop.policykit.exec for unix-process:10257:10850 [/usr/bin/python3 /usr/share/apport/apport-gtk linux-image-6.2.0-18-generic] (owned by unix-user:jik) Mar 22 16:33:14 jik5.kamens.us pkexec[10710]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000) Mar 22 16:33:14 jik5.kamens.us pkexec[10710]: jik: Executing command [USER=root] [TTY=/dev/pts/0] [CWD=/home/jik] [COMMAND=/usr/bin/dmesg] Mar 22 16:33:17 jik5.kamens.us polkitd(authority=local)[1942]: Operator of unix-session:2 successfully authenticated as unix-user:jik to gain ONE-SHOT authorization for action org.freedesktop.policykit.exec for unix-process:10257:10850 [/usr/bin/python3 /usr/share/apport/apport-gtk linux-image-6.2.0-18-generic] (owned by unix-user:jik) Mar 22 16:33:17 jik5.kamens.us pkexec[10733]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000) Mar 22 16:33:17 jik5.kamens.us pkexec[10733]: jik: Executing command [USER=root] [TTY=/dev/pts/0] [CWD=/home/jik] [COMMAND=/usr/share/apport/dump_acpi_tables.py] Mar 22 16:33:22 jik5.kamens.us polkitd(authority=local)[1942]: Unregistered Authentication Agent for unix-process:10257:10850 (system bus name :1.105, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) (disconnected from bus) Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57195f10] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57590430] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57195f10] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57590430] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57195f10] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57590430] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57195f10] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57590430] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57195f10] is on because it needs an allocation. Mar 22 16:33:23 jik5.kamens.us gnome-shell[4705]: Can't update stage views actor [:0x55de57590430] is on because it needs an allocation. Mar 22 16:33:28 jik5.kamens.us gnome-keyring-daemon[4142]: asked to register item /org/freedesktop/secrets/collection/Default_5fkeyring/118, but it's already registered Mar 22 16:33:28 jik5.kamens.us gnome-keyring-d[4142]: asked to register item /org/freedesktop/secrets/collection/Default_5fkeyring/118, but it's already registered Mar 22 16:33:41 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:33:41 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:33:41 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:33:44 jik5.kamens.us sudo[12226]: jik : TTY=pts/0 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/systemctl list-units --full Mar 22 16:33:44 jik5.kamens.us sudo[12226]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Mar 22 16:33:44 jik5.kamens.us sudo[12226]: pam_unix(sudo:session): session closed for user root Mar 22 16:33:48 jik5.kamens.us systemd[1]: Started anacron.service - Run anacron jobs. Mar 22 16:33:48 jik5.kamens.us anacron[12245]: Anacron 2.3 started on 2023-03-22 Mar 22 16:33:48 jik5.kamens.us anacron[12245]: Normal exit (0 jobs run) Mar 22 16:33:48 jik5.kamens.us systemd[1]: anacron.service: Deactivated successfully. Mar 22 16:34:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:34:42 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:34:42 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:34:42 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:34:46 jik5.kamens.us systemd[1]: Starting ssh.service - OpenBSD Secure Shell server... Mar 22 16:34:46 jik5.kamens.us sshd[12272]: Server listening on :: port 22. Mar 22 16:34:46 jik5.kamens.us sshd[12272]: Server listening on :: port 2223. Mar 22 16:34:46 jik5.kamens.us systemd[1]: Started ssh.service - OpenBSD Secure Shell server. Mar 22 16:34:55 jik5.kamens.us sshd[12274]: Received disconnect from 61.177.173.36 port 27058:11: [preauth] Mar 22 16:34:55 jik5.kamens.us sshd[12274]: Disconnected from authenticating user root 61.177.173.36 port 27058 [preauth] Mar 22 16:34:58 jik5.kamens.us sshd[12276]: Received disconnect from 220.248.15.10 port 44238:11: Bye Bye [preauth] Mar 22 16:34:58 jik5.kamens.us sshd[12276]: Disconnected from authenticating user root 220.248.15.10 port 44238 [preauth] Mar 22 16:35:01 jik5.kamens.us CRON[12279]: pam_unix(cron:session): session opened for user root(uid=0) by (uid=0) Mar 22 16:35:01 jik5.kamens.us CRON[12283]: (root) CMD (command -v debian-sa1 > /dev/null && debian-sa1 1 1) Mar 22 16:35:01 jik5.kamens.us CRON[12280]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:35:01 jik5.kamens.us CRON[12281]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:35:01 jik5.kamens.us CRON[12282]: pam_unix(cron:session): session opened for user jik(uid=1000) by (uid=0) Mar 22 16:35:01 jik5.kamens.us CRON[12285]: (jik) CMD (PATH=/usr/local/bin:$PATH r2e run &>/dev/null) Mar 22 16:35:01 jik5.kamens.us CRON[12279]: pam_unix(cron:session): session closed for user root Mar 22 16:35:01 jik5.kamens.us CRON[12286]: (jik) CMD (find ~/CloudStation -name '*_Conflict') Mar 22 16:35:01 jik5.kamens.us CRON[12287]: (jik) CMD (curl --silent 'https://jik4.kamens.us/coal-mine/v1/canary/trigger?id=bygbfafv' &>/dev/null) Mar 22 16:35:01 jik5.kamens.us CRON[12281]: pam_unix(cron:session): session closed for user jik Mar 22 16:35:02 jik5.kamens.us CRON[12282]: pam_unix(cron:session): session closed for user jik Mar 22 16:35:05 jik5.kamens.us postfix/pickup[3614]: C02C72D000A6: uid=1000 from= Mar 22 16:35:05 jik5.kamens.us postfix/cleanup[12302]: C02C72D000A6: message-id=<54817abc-0f90-4be5-9d58-b499323543d3@jik5.kamens.us> Mar 22 16:35:05 jik5.kamens.us postfix/qmgr[3615]: C02C72D000A6: from=, size=2516, nrcpt=1 (queue active) Mar 22 16:35:06 jik5.kamens.us postfix/smtp[12305]: C02C72D000A6: to=, relay=email.kamens.us[45.79.160.233]:587, delay=0.98, delays=0.02/0.03/0.25/0.68, dsn=2.0.0, status=sent (250 2.0.0 32MKZ50H2209334 Message accepted for delivery) Mar 22 16:35:06 jik5.kamens.us postfix/qmgr[3615]: C02C72D000A6: removed Mar 22 16:35:08 jik5.kamens.us python3[4131]: Rescanning tasks. Mar 22 16:35:09 jik5.kamens.us CRON[12280]: pam_unix(cron:session): session closed for user jik Mar 22 16:35:42 jik5.kamens.us systemd[1]: Starting yubikey-monitor.service - Check for inserted Yubikey... Mar 22 16:35:42 jik5.kamens.us systemd[1]: Started yubikey-monitor.service - Check for inserted Yubikey. Mar 22 16:35:42 jik5.kamens.us systemd[1]: yubikey-monitor.service: Deactivated successfully. Mar 22 16:35:59 jik5.kamens.us sudo[12329]: jik : TTY=pts/0 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/journalctl --since 16:00 Mar 22 16:35:59 jik5.kamens.us sudo[12329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Mar 22 16:36:03 jik5.kamens.us sudo[12329]: pam_unix(sudo:session): session closed for user root Mar 22 16:36:05 jik5.kamens.us sudo[12333]: jik : TTY=pts/0 ; PWD=/home/jik ; USER=root ; COMMAND=/usr/bin/journalctl --since 16:00 Mar 22 16:36:05 jik5.kamens.us sudo[12333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)