Guest User

Kubuntu-log

a guest
Oct 2nd, 2024
84
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 207.44 KB | None | 0 0
  1. [ 0.000000] Linux version 6.11.0-8-generic (buildd@lcy02-amd64-042) (x86_64-linux-gnu-gcc-14 (Ubuntu 14.2.0-4ubuntu2) 14.2.0, GNU ld (GNU Binutils for Ubuntu) 2.43.1) #8-Ubuntu SMP PREEMPT_DYNAMIC Mon Sep 16 13:41:20 UTC 2024 (Ubuntu 6.11.0-8.8-generic 6.11.0)
  2. [ 0.000000] Command line: BOOT_IMAGE=/boot/vmlinuz-6.11.0-8-generic root=UUID=af267def-decd-40dc-a20d-9be004c06599 ro quiet splash vt.handoff=7
  3. [ 0.000000] KERNEL supported cpus:
  4. [ 0.000000] Intel GenuineIntel
  5. [ 0.000000] AMD AuthenticAMD
  6. [ 0.000000] Hygon HygonGenuine
  7. [ 0.000000] Centaur CentaurHauls
  8. [ 0.000000] zhaoxin Shanghai
  9. [ 0.000000] BIOS-provided physical RAM map:
  10. [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009d3ff] usable
  11. [ 0.000000] BIOS-e820: [mem 0x000000000009d400-0x000000000009ffff] reserved
  12. [ 0.000000] BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
  13. [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x0000000009d1efff] usable
  14. [ 0.000000] BIOS-e820: [mem 0x0000000009d1f000-0x0000000009ffffff] reserved
  15. [ 0.000000] BIOS-e820: [mem 0x000000000a000000-0x000000000a1fffff] usable
  16. [ 0.000000] BIOS-e820: [mem 0x000000000a200000-0x000000000a20efff] ACPI NVS
  17. [ 0.000000] BIOS-e820: [mem 0x000000000a20f000-0x000000000affffff] usable
  18. [ 0.000000] BIOS-e820: [mem 0x000000000b000000-0x000000000b01ffff] reserved
  19. [ 0.000000] BIOS-e820: [mem 0x000000000b020000-0x00000000a33bafff] usable
  20. [ 0.000000] BIOS-e820: [mem 0x00000000a33bb000-0x00000000a36f5fff] reserved
  21. [ 0.000000] BIOS-e820: [mem 0x00000000a36f6000-0x00000000a385ffff] ACPI data
  22. [ 0.000000] BIOS-e820: [mem 0x00000000a3860000-0x00000000a53dcfff] ACPI NVS
  23. [ 0.000000] BIOS-e820: [mem 0x00000000a53dd000-0x00000000a6bfefff] reserved
  24. [ 0.000000] BIOS-e820: [mem 0x00000000a6bff000-0x00000000a7ffffff] usable
  25. [ 0.000000] BIOS-e820: [mem 0x00000000a8000000-0x00000000aaffffff] reserved
  26. [ 0.000000] BIOS-e820: [mem 0x00000000af000000-0x00000000cfffffff] reserved
  27. [ 0.000000] BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved
  28. [ 0.000000] BIOS-e820: [mem 0x00000000fd200000-0x00000000fd2fffff] reserved
  29. [ 0.000000] BIOS-e820: [mem 0x00000000fd600000-0x00000000fd6fffff] reserved
  30. [ 0.000000] BIOS-e820: [mem 0x00000000fea00000-0x00000000fea0ffff] reserved
  31. [ 0.000000] BIOS-e820: [mem 0x00000000feb80000-0x00000000fec01fff] reserved
  32. [ 0.000000] BIOS-e820: [mem 0x00000000fec10000-0x00000000fec10fff] reserved
  33. [ 0.000000] BIOS-e820: [mem 0x00000000fec30000-0x00000000fec30fff] reserved
  34. [ 0.000000] BIOS-e820: [mem 0x00000000fed00000-0x00000000fed00fff] reserved
  35. [ 0.000000] BIOS-e820: [mem 0x00000000fed40000-0x00000000fed44fff] reserved
  36. [ 0.000000] BIOS-e820: [mem 0x00000000fed80000-0x00000000fed8ffff] reserved
  37. [ 0.000000] BIOS-e820: [mem 0x00000000fedc2000-0x00000000fedcffff] reserved
  38. [ 0.000000] BIOS-e820: [mem 0x00000000fedd4000-0x00000000fedd5fff] reserved
  39. [ 0.000000] BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
  40. [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000042e2fffff] usable
  41. [ 0.000000] BIOS-e820: [mem 0x000000042e300000-0x000000042fffffff] reserved
  42. [ 0.000000] NX (Execute Disable) protection: active
  43. [ 0.000000] APIC: Static calls initialized
  44. [ 0.000000] SMBIOS 3.3.0 present.
  45. [ 0.000000] DMI: ASUS System Product Name/PRIME B550M-A, BIOS 3002 02/23/2023
  46. [ 0.000000] DMI: Memory slots populated: 2/4
  47. [ 0.000000] tsc: Fast TSC calibration using PIT
  48. [ 0.000000] tsc: Detected 3893.038 MHz processor
  49. [ 0.000353] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
  50. [ 0.000355] e820: remove [mem 0x000a0000-0x000fffff] usable
  51. [ 0.000364] last_pfn = 0x42e300 max_arch_pfn = 0x400000000
  52. [ 0.000369] MTRR map: 5 entries (3 fixed + 2 variable; max 20), built from 9 variable MTRRs
  53. [ 0.000371] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT
  54. [ 0.000949] e820: update [mem 0xd0000000-0xffffffff] usable ==> reserved
  55. [ 0.000958] last_pfn = 0xa8000 max_arch_pfn = 0x400000000
  56. [ 0.003877] Using GB pages for direct mapping
  57. [ 0.004217] RAMDISK: [mem 0x2fae7000-0x33d6afff]
  58. [ 0.004528] ACPI: Early table checksum verification disabled
  59. [ 0.004531] ACPI: RSDP 0x00000000000F05B0 000024 (v02 ALASKA)
  60. [ 0.004535] ACPI: XSDT 0x00000000A385E728 0000CC (v01 ALASKA A M I 01072009 AMI 01000013)
  61. [ 0.004540] ACPI: FACP 0x00000000A384F000 000114 (v06 ALASKA A M I 01072009 AMI 00010013)
  62. [ 0.004543] ACPI: DSDT 0x00000000A3843000 00B497 (v02 ALASKA A M I 01072009 INTL 20120913)
  63. [ 0.004546] ACPI: FACS 0x00000000A43C2000 000040
  64. [ 0.004548] ACPI: IVRS 0x00000000A385D000 0000D0 (v02 AMD AmdTable 00000001 AMD 00000001)
  65. [ 0.004550] ACPI: SSDT 0x00000000A3855000 0072B0 (v02 AMD Artic 00000002 MSFT 04000000)
  66. [ 0.004552] ACPI: SSDT 0x00000000A3851000 003B8E (v02 AMD AMD AOD 00000001 INTL 20120913)
  67. [ 0.004553] ACPI: SSDT 0x00000000A3850000 0001AD (v02 ALASKA CPUSSDT 01072009 AMI 01072009)
  68. [ 0.004555] ACPI: FIDT 0x00000000A3842000 00009C (v01 ALASKA A M I 01072009 AMI 00010013)
  69. [ 0.004557] ACPI: WSMT 0x00000000A383D000 000028 (v01 ALASKA A M I 01072009 AMI 00010013)
  70. [ 0.004559] ACPI: MCFG 0x00000000A3840000 00003C (v01 ALASKA A M I 01072009 MSFT 00010013)
  71. [ 0.004561] ACPI: HPET 0x00000000A383F000 000038 (v01 ALASKA A M I 01072009 AMI 00000005)
  72. [ 0.004562] ACPI: WPBT 0x00000000A375E000 00003C (v01 ALASKA A M I 00000001 ASUS 00000001)
  73. [ 0.004564] ACPI: TPM2 0x00000000A375D000 00004C (v04 ALASKA A M I 00000001 AMI 00000000)
  74. [ 0.004566] ACPI: SSDT 0x00000000A3759000 003E88 (v02 AMD AmdTable 00000001 AMD 00000001)
  75. [ 0.004568] ACPI: CRAT 0x00000000A3758000 000B68 (v01 AMD AmdTable 00000001 AMD 00000001)
  76. [ 0.004569] ACPI: CDIT 0x00000000A3757000 000029 (v01 AMD AmdTable 00000001 AMD 00000001)
  77. [ 0.004571] ACPI: SSDT 0x00000000A3756000 000D53 (v02 AMD ArticIG2 00000001 INTL 20120913)
  78. [ 0.004573] ACPI: SSDT 0x00000000A3754000 0010C1 (v02 AMD ArticTPX 00000001 INTL 20120913)
  79. [ 0.004575] ACPI: SSDT 0x00000000A3750000 003E6E (v02 AMD ArticN 00000001 INTL 20120913)
  80. [ 0.004576] ACPI: APIC 0x00000000A374E000 00015E (v04 ALASKA A M I 01072009 AMI 00010013)
  81. [ 0.004578] ACPI: SSDT 0x00000000A374D000 00007D (v02 AMD ArticDIS 00000001 INTL 20120913)
  82. [ 0.004580] ACPI: SSDT 0x00000000A374C000 0000BF (v01 AMD AmdTable 00001000 INTL 20120913)
  83. [ 0.004582] ACPI: FPDT 0x00000000A374B000 000044 (v01 ALASKA A M I 01072009 AMI 01000013)
  84. [ 0.004583] ACPI: Reserving FACP table memory at [mem 0xa384f000-0xa384f113]
  85. [ 0.004584] ACPI: Reserving DSDT table memory at [mem 0xa3843000-0xa384e496]
  86. [ 0.004585] ACPI: Reserving FACS table memory at [mem 0xa43c2000-0xa43c203f]
  87. [ 0.004585] ACPI: Reserving IVRS table memory at [mem 0xa385d000-0xa385d0cf]
  88. [ 0.004586] ACPI: Reserving SSDT table memory at [mem 0xa3855000-0xa385c2af]
  89. [ 0.004586] ACPI: Reserving SSDT table memory at [mem 0xa3851000-0xa3854b8d]
  90. [ 0.004587] ACPI: Reserving SSDT table memory at [mem 0xa3850000-0xa38501ac]
  91. [ 0.004587] ACPI: Reserving FIDT table memory at [mem 0xa3842000-0xa384209b]
  92. [ 0.004588] ACPI: Reserving WSMT table memory at [mem 0xa383d000-0xa383d027]
  93. [ 0.004588] ACPI: Reserving MCFG table memory at [mem 0xa3840000-0xa384003b]
  94. [ 0.004589] ACPI: Reserving HPET table memory at [mem 0xa383f000-0xa383f037]
  95. [ 0.004589] ACPI: Reserving WPBT table memory at [mem 0xa375e000-0xa375e03b]
  96. [ 0.004590] ACPI: Reserving TPM2 table memory at [mem 0xa375d000-0xa375d04b]
  97. [ 0.004590] ACPI: Reserving SSDT table memory at [mem 0xa3759000-0xa375ce87]
  98. [ 0.004591] ACPI: Reserving CRAT table memory at [mem 0xa3758000-0xa3758b67]
  99. [ 0.004591] ACPI: Reserving CDIT table memory at [mem 0xa3757000-0xa3757028]
  100. [ 0.004592] ACPI: Reserving SSDT table memory at [mem 0xa3756000-0xa3756d52]
  101. [ 0.004592] ACPI: Reserving SSDT table memory at [mem 0xa3754000-0xa37550c0]
  102. [ 0.004593] ACPI: Reserving SSDT table memory at [mem 0xa3750000-0xa3753e6d]
  103. [ 0.004593] ACPI: Reserving APIC table memory at [mem 0xa374e000-0xa374e15d]
  104. [ 0.004594] ACPI: Reserving SSDT table memory at [mem 0xa374d000-0xa374d07c]
  105. [ 0.004594] ACPI: Reserving SSDT table memory at [mem 0xa374c000-0xa374c0be]
  106. [ 0.004595] ACPI: Reserving FPDT table memory at [mem 0xa374b000-0xa374b043]
  107. [ 0.004717] No NUMA configuration found
  108. [ 0.004717] Faking a node at [mem 0x0000000000000000-0x000000042e2fffff]
  109. [ 0.004726] NODE_DATA(0) allocated [mem 0x42e2d5000-0x42e2fffff]
  110. [ 0.004858] Zone ranges:
  111. [ 0.004859] DMA [mem 0x0000000000001000-0x0000000000ffffff]
  112. [ 0.004860] DMA32 [mem 0x0000000001000000-0x00000000ffffffff]
  113. [ 0.004861] Normal [mem 0x0000000100000000-0x000000042e2fffff]
  114. [ 0.004862] Device empty
  115. [ 0.004863] Movable zone start for each node
  116. [ 0.004864] Early memory node ranges
  117. [ 0.004865] node 0: [mem 0x0000000000001000-0x000000000009cfff]
  118. [ 0.004865] node 0: [mem 0x0000000000100000-0x0000000009d1efff]
  119. [ 0.004866] node 0: [mem 0x000000000a000000-0x000000000a1fffff]
  120. [ 0.004867] node 0: [mem 0x000000000a20f000-0x000000000affffff]
  121. [ 0.004867] node 0: [mem 0x000000000b020000-0x00000000a33bafff]
  122. [ 0.004868] node 0: [mem 0x00000000a6bff000-0x00000000a7ffffff]
  123. [ 0.004868] node 0: [mem 0x0000000100000000-0x000000042e2fffff]
  124. [ 0.004870] Initmem setup node 0 [mem 0x0000000000001000-0x000000042e2fffff]
  125. [ 0.004874] On node 0, zone DMA: 1 pages in unavailable ranges
  126. [ 0.004886] On node 0, zone DMA: 99 pages in unavailable ranges
  127. [ 0.004991] On node 0, zone DMA32: 737 pages in unavailable ranges
  128. [ 0.005001] On node 0, zone DMA32: 15 pages in unavailable ranges
  129. [ 0.007840] On node 0, zone DMA32: 32 pages in unavailable ranges
  130. [ 0.007967] On node 0, zone DMA32: 14404 pages in unavailable ranges
  131. [ 0.025744] On node 0, zone Normal: 7424 pages in unavailable ranges
  132. [ 0.026156] ACPI: PM-Timer IO Port: 0x808
  133. [ 0.026165] CPU topo: Ignoring hot-pluggable APIC ID 0 in present package.
  134. [ 0.026168] ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1])
  135. [ 0.026181] IOAPIC[0]: apic_id 13, version 33, address 0xfec00000, GSI 0-23
  136. [ 0.026186] IOAPIC[1]: apic_id 14, version 33, address 0xfec01000, GSI 24-55
  137. [ 0.026188] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
  138. [ 0.026189] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level)
  139. [ 0.026192] ACPI: Using ACPI (MADT) for SMP configuration information
  140. [ 0.026193] ACPI: HPET id: 0x10228201 base: 0xfed00000
  141. [ 0.026200] CPU topo: Max. logical packages: 1
  142. [ 0.026200] CPU topo: Max. logical dies: 1
  143. [ 0.026201] CPU topo: Max. dies per package: 1
  144. [ 0.026203] CPU topo: Max. threads per core: 2
  145. [ 0.026204] CPU topo: Num. cores per package: 6
  146. [ 0.026204] CPU topo: Num. threads per package: 12
  147. [ 0.026205] CPU topo: Allowing 12 present CPUs plus 0 hotplug CPUs
  148. [ 0.026206] CPU topo: Rejected CPUs 20
  149. [ 0.026224] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff]
  150. [ 0.026226] PM: hibernation: Registered nosave memory: [mem 0x0009d000-0x0009dfff]
  151. [ 0.026226] PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009ffff]
  152. [ 0.026227] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000dffff]
  153. [ 0.026227] PM: hibernation: Registered nosave memory: [mem 0x000e0000-0x000fffff]
  154. [ 0.026228] PM: hibernation: Registered nosave memory: [mem 0x09d1f000-0x09ffffff]
  155. [ 0.026229] PM: hibernation: Registered nosave memory: [mem 0x0a200000-0x0a20efff]
  156. [ 0.026231] PM: hibernation: Registered nosave memory: [mem 0x0b000000-0x0b01ffff]
  157. [ 0.026232] PM: hibernation: Registered nosave memory: [mem 0xa33bb000-0xa36f5fff]
  158. [ 0.026232] PM: hibernation: Registered nosave memory: [mem 0xa36f6000-0xa385ffff]
  159. [ 0.026233] PM: hibernation: Registered nosave memory: [mem 0xa3860000-0xa53dcfff]
  160. [ 0.026233] PM: hibernation: Registered nosave memory: [mem 0xa53dd000-0xa6bfefff]
  161. [ 0.026234] PM: hibernation: Registered nosave memory: [mem 0xa8000000-0xaaffffff]
  162. [ 0.026235] PM: hibernation: Registered nosave memory: [mem 0xab000000-0xaeffffff]
  163. [ 0.026235] PM: hibernation: Registered nosave memory: [mem 0xaf000000-0xcfffffff]
  164. [ 0.026235] PM: hibernation: Registered nosave memory: [mem 0xd0000000-0xefffffff]
  165. [ 0.026236] PM: hibernation: Registered nosave memory: [mem 0xf0000000-0xf7ffffff]
  166. [ 0.026236] PM: hibernation: Registered nosave memory: [mem 0xf8000000-0xfd1fffff]
  167. [ 0.026237] PM: hibernation: Registered nosave memory: [mem 0xfd200000-0xfd2fffff]
  168. [ 0.026237] PM: hibernation: Registered nosave memory: [mem 0xfd300000-0xfd5fffff]
  169. [ 0.026238] PM: hibernation: Registered nosave memory: [mem 0xfd600000-0xfd6fffff]
  170. [ 0.026238] PM: hibernation: Registered nosave memory: [mem 0xfd700000-0xfe9fffff]
  171. [ 0.026238] PM: hibernation: Registered nosave memory: [mem 0xfea00000-0xfea0ffff]
  172. [ 0.026239] PM: hibernation: Registered nosave memory: [mem 0xfea10000-0xfeb7ffff]
  173. [ 0.026239] PM: hibernation: Registered nosave memory: [mem 0xfeb80000-0xfec01fff]
  174. [ 0.026240] PM: hibernation: Registered nosave memory: [mem 0xfec02000-0xfec0ffff]
  175. [ 0.026240] PM: hibernation: Registered nosave memory: [mem 0xfec10000-0xfec10fff]
  176. [ 0.026241] PM: hibernation: Registered nosave memory: [mem 0xfec11000-0xfec2ffff]
  177. [ 0.026241] PM: hibernation: Registered nosave memory: [mem 0xfec30000-0xfec30fff]
  178. [ 0.026242] PM: hibernation: Registered nosave memory: [mem 0xfec31000-0xfecfffff]
  179. [ 0.026242] PM: hibernation: Registered nosave memory: [mem 0xfed00000-0xfed00fff]
  180. [ 0.026242] PM: hibernation: Registered nosave memory: [mem 0xfed01000-0xfed3ffff]
  181. [ 0.026243] PM: hibernation: Registered nosave memory: [mem 0xfed40000-0xfed44fff]
  182. [ 0.026243] PM: hibernation: Registered nosave memory: [mem 0xfed45000-0xfed7ffff]
  183. [ 0.026244] PM: hibernation: Registered nosave memory: [mem 0xfed80000-0xfed8ffff]
  184. [ 0.026244] PM: hibernation: Registered nosave memory: [mem 0xfed90000-0xfedc1fff]
  185. [ 0.026245] PM: hibernation: Registered nosave memory: [mem 0xfedc2000-0xfedcffff]
  186. [ 0.026245] PM: hibernation: Registered nosave memory: [mem 0xfedd0000-0xfedd3fff]
  187. [ 0.026245] PM: hibernation: Registered nosave memory: [mem 0xfedd4000-0xfedd5fff]
  188. [ 0.026246] PM: hibernation: Registered nosave memory: [mem 0xfedd6000-0xfeffffff]
  189. [ 0.026246] PM: hibernation: Registered nosave memory: [mem 0xff000000-0xffffffff]
  190. [ 0.026247] [mem 0xd0000000-0xefffffff] available for PCI devices
  191. [ 0.026249] Booting paravirtualized kernel on bare hardware
  192. [ 0.026251] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
  193. [ 0.026258] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:12 nr_cpu_ids:12 nr_node_ids:1
  194. [ 0.026868] percpu: Embedded 88 pages/cpu s237568 r8192 d114688 u524288
  195. [ 0.026873] pcpu-alloc: s237568 r8192 d114688 u524288 alloc=1*2097152
  196. [ 0.026875] pcpu-alloc: [0] 00 01 02 03 [0] 04 05 06 07
  197. [ 0.026879] pcpu-alloc: [0] 08 09 10 11
  198. [ 0.026892] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-6.11.0-8-generic root=UUID=af267def-decd-40dc-a20d-9be004c06599 ro quiet splash vt.handoff=7
  199. [ 0.026944] Unknown kernel command line parameters "splash BOOT_IMAGE=/boot/vmlinuz-6.11.0-8-generic", will be passed to user space.
  200. [ 0.026965] random: crng init done
  201. [ 0.028298] Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear)
  202. [ 0.028960] Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear)
  203. [ 0.029023] Fallback order for Node 0: 0
  204. [ 0.029025] Built 1 zonelists, mobility grouping on. Total pages: 4007752
  205. [ 0.029026] Policy zone: Normal
  206. [ 0.029035] mem auto-init: stack:all(zero), heap alloc:on, heap free:off
  207. [ 0.029076] software IO TLB: area num 16.
  208. [ 0.063892] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=12, Nodes=1
  209. [ 0.063939] ftrace: allocating 59297 entries in 232 pages
  210. [ 0.075218] ftrace: allocated 232 pages with 4 groups
  211. [ 0.075949] Dynamic Preempt: voluntary
  212. [ 0.076008] rcu: Preemptible hierarchical RCU implementation.
  213. [ 0.076009] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=12.
  214. [ 0.076010] Trampoline variant of Tasks RCU enabled.
  215. [ 0.076010] Rude variant of Tasks RCU enabled.
  216. [ 0.076010] Tracing variant of Tasks RCU enabled.
  217. [ 0.076012] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
  218. [ 0.076012] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=12
  219. [ 0.076020] RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
  220. [ 0.076022] RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
  221. [ 0.076023] RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
  222. [ 0.078604] NR_IRQS: 524544, nr_irqs: 1064, preallocated irqs: 16
  223. [ 0.078798] rcu: srcu_init: Setting srcu_struct sizes based on contention.
  224. [ 0.078865] spurious 8259A interrupt: IRQ7.
  225. [ 0.078881] Console: colour dummy device 80x25
  226. [ 0.078882] printk: legacy console [tty0] enabled
  227. [ 0.078912] ACPI: Core revision 20240322
  228. [ 0.079023] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484873504 ns
  229. [ 0.079040] APIC: Switch to symmetric I/O mode setup
  230. [ 0.079901] AMD-Vi: Using global IVHD EFR:0x206d73ef22254ade, EFR2:0x0
  231. [ 0.080176] x2apic enabled
  232. [ 0.080225] APIC: Switched APIC routing to: cluster x2apic
  233. [ 0.080853] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
  234. [ 0.085047] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x703b541cd2c, max_idle_ns: 881591166280 ns
  235. [ 0.085051] Calibrating delay loop (skipped), value calculated using timer frequency.. 7786.07 BogoMIPS (lpj=3893038)
  236. [ 0.085073] x86/cpu: User Mode Instruction Prevention (UMIP) activated
  237. [ 0.085119] LVT offset 1 assigned for vector 0xf9
  238. [ 0.085227] LVT offset 2 assigned for vector 0xf4
  239. [ 0.085251] Last level iTLB entries: 4KB 512, 2MB 512, 4MB 256
  240. [ 0.085252] Last level dTLB entries: 4KB 2048, 2MB 2048, 4MB 1024, 1GB 0
  241. [ 0.085255] process: using mwait in idle threads
  242. [ 0.085257] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
  243. [ 0.085258] Spectre V2 : Mitigation: Retpolines
  244. [ 0.085259] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
  245. [ 0.085260] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
  246. [ 0.085260] Spectre V2 : Enabling Restricted Speculation for firmware calls
  247. [ 0.085261] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
  248. [ 0.085262] Spectre V2 : User space: Mitigation: STIBP always-on protection
  249. [ 0.085263] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
  250. [ 0.085264] Speculative Return Stack Overflow: IBPB-extending microcode not applied!
  251. [ 0.085265] Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options.
  252. [ 0.085265] Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode
  253. [ 0.085270] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
  254. [ 0.085272] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
  255. [ 0.085272] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
  256. [ 0.085273] x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
  257. [ 0.085274] x86/fpu: Supporting XSAVE feature 0x800: 'Control-flow User registers'
  258. [ 0.085275] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
  259. [ 0.085276] x86/fpu: xstate_offset[9]: 832, xstate_sizes[9]: 8
  260. [ 0.085277] x86/fpu: xstate_offset[11]: 840, xstate_sizes[11]: 16
  261. [ 0.085277] x86/fpu: Enabled xstate features 0xa07, context size is 856 bytes, using 'compacted' format.
  262. [ 0.113964] Freeing SMP alternatives memory: 48K
  263. [ 0.113967] pid_max: default: 32768 minimum: 301
  264. [ 0.114018] LSM: initializing lsm=lockdown,capability,landlock,yama,apparmor,ima,evm
  265. [ 0.114038] landlock: Up and running.
  266. [ 0.114039] Yama: becoming mindful.
  267. [ 0.114074] AppArmor: AppArmor initialized
  268. [ 0.114140] Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear)
  269. [ 0.114159] Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear)
  270. [ 0.217996] smpboot: CPU0: AMD Ryzen 5 5600G with Radeon Graphics (family: 0x19, model: 0x50, stepping: 0x0)
  271. [ 0.218049] Performance Events: Fam17h+ core perfctr, AMD PMU driver.
  272. [ 0.218049] ... version: 0
  273. [ 0.218049] ... bit width: 48
  274. [ 0.218049] ... generic registers: 6
  275. [ 0.218049] ... value mask: 0000ffffffffffff
  276. [ 0.218049] ... max period: 00007fffffffffff
  277. [ 0.218049] ... fixed-purpose events: 0
  278. [ 0.218049] ... event mask: 000000000000003f
  279. [ 0.218049] signal: max sigframe size: 3376
  280. [ 0.218049] rcu: Hierarchical SRCU implementation.
  281. [ 0.218049] rcu: Max phase no-delay instances is 400.
  282. [ 0.218049] Timer migration: 2 hierarchy levels; 8 children per group; 2 crossnode level
  283. [ 0.220396] NMI watchdog: Enabled. Permanently consumes one hw-PMU counter.
  284. [ 0.220531] smp: Bringing up secondary CPUs ...
  285. [ 0.220650] smpboot: x86: Booting SMP configuration:
  286. [ 0.220652] .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11
  287. [ 0.229175] Spectre V2 : Update user space SMT mitigation: STIBP always-on
  288. [ 0.235090] smp: Brought up 1 node, 12 CPUs
  289. [ 0.235090] smpboot: Total of 12 processors activated (93432.91 BogoMIPS)
  290. [ 0.236217] Memory: 15540424K/16031008K available (22528K kernel code, 4521K rwdata, 14936K rodata, 4956K init, 4664K bss, 469336K reserved, 0K cma-reserved)
  291. [ 0.237180] devtmpfs: initialized
  292. [ 0.237180] x86/mm: Memory block size: 128MB
  293. [ 0.239374] ACPI: PM: Registering ACPI NVS region [mem 0x0a200000-0x0a20efff] (61440 bytes)
  294. [ 0.239374] ACPI: PM: Registering ACPI NVS region [mem 0xa3860000-0xa53dcfff] (28823552 bytes)
  295. [ 0.239552] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
  296. [ 0.239568] futex hash table entries: 4096 (order: 6, 262144 bytes, linear)
  297. [ 0.239641] pinctrl core: initialized pinctrl subsystem
  298. [ 0.240088] PM: RTC time: 13:44:23, date: 2024-10-01
  299. [ 0.240567] NET: Registered PF_NETLINK/PF_ROUTE protocol family
  300. [ 0.240799] DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations
  301. [ 0.240893] DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
  302. [ 0.240988] DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
  303. [ 0.240998] audit: initializing netlink subsys (disabled)
  304. [ 0.241004] audit: type=2000 audit(1727790263.161:1): state=initialized audit_enabled=0 res=1
  305. [ 0.241161] thermal_sys: Registered thermal governor 'fair_share'
  306. [ 0.241163] thermal_sys: Registered thermal governor 'bang_bang'
  307. [ 0.241164] thermal_sys: Registered thermal governor 'step_wise'
  308. [ 0.241166] thermal_sys: Registered thermal governor 'user_space'
  309. [ 0.241167] thermal_sys: Registered thermal governor 'power_allocator'
  310. [ 0.241176] EISA bus registered
  311. [ 0.241188] cpuidle: using governor ladder
  312. [ 0.241193] cpuidle: using governor menu
  313. [ 0.241221] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
  314. [ 0.241221] PCI: ECAM [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) for domain 0000 [bus 00-7f]
  315. [ 0.241221] PCI: Using configuration type 1 for base access
  316. [ 0.241284] mtrr: your CPUs had inconsistent variable MTRR settings
  317. [ 0.241286] mtrr: probably your BIOS does not setup all CPUs.
  318. [ 0.241287] mtrr: corrected configuration.
  319. [ 0.241357] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
  320. [ 0.241364] HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages
  321. [ 0.241364] HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page
  322. [ 0.241364] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages
  323. [ 0.241364] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page
  324. [ 0.242199] ACPI: Added _OSI(Module Device)
  325. [ 0.242201] ACPI: Added _OSI(Processor Device)
  326. [ 0.242202] ACPI: Added _OSI(3.0 _SCP Extensions)
  327. [ 0.242204] ACPI: Added _OSI(Processor Aggregator Device)
  328. [ 0.263119] ACPI: 10 ACPI AML tables successfully acquired and loaded
  329. [ 0.265720] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
  330. [ 0.270308] ACPI: Interpreter enabled
  331. [ 0.270326] ACPI: PM: (supports S0 S3 S4 S5)
  332. [ 0.270327] ACPI: Using IOAPIC for interrupt routing
  333. [ 0.272150] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
  334. [ 0.272152] PCI: Ignoring E820 reservations for host bridge windows
  335. [ 0.272618] ACPI: Enabled 4 GPEs in block 00 to 1F
  336. [ 0.307377] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
  337. [ 0.307384] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3]
  338. [ 0.307552] acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug SHPCHotplug PME LTR DPC]
  339. [ 0.307864] acpi PNP0A08:00: _OSC: OS now controls [AER PCIeCapability]
  340. [ 0.307876] acpi PNP0A08:00: [Firmware Info]: ECAM [mem 0xf0000000-0xf7ffffff] for domain 0000 [bus 00-7f] only partially covers this bridge
  341. [ 0.308477] PCI host bridge to bus 0000:00
  342. [ 0.308482] pci_bus 0000:00: root bus resource [io 0x0000-0x03af window]
  343. [ 0.308484] pci_bus 0000:00: root bus resource [io 0x03e0-0x0cf7 window]
  344. [ 0.308486] pci_bus 0000:00: root bus resource [io 0x03b0-0x03df window]
  345. [ 0.308488] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window]
  346. [ 0.308490] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000dffff window]
  347. [ 0.308491] pci_bus 0000:00: root bus resource [mem 0xd0000000-0xfec2ffff window]
  348. [ 0.308493] pci_bus 0000:00: root bus resource [mem 0xfee00000-0xffffffff window]
  349. [ 0.308495] pci_bus 0000:00: root bus resource [bus 00-ff]
  350. [ 0.308512] pci 0000:00:00.0: [1022:1630] type 00 class 0x060000 conventional PCI endpoint
  351. [ 0.308633] pci 0000:00:00.2: [1022:1631] type 00 class 0x080600 conventional PCI endpoint
  352. [ 0.308747] pci 0000:00:01.0: [1022:1632] type 00 class 0x060000 conventional PCI endpoint
  353. [ 0.308815] pci 0000:00:02.0: [1022:1632] type 00 class 0x060000 conventional PCI endpoint
  354. [ 0.308879] pci 0000:00:02.1: [1022:1634] type 01 class 0x060400 PCIe Root Port
  355. [ 0.308895] pci 0000:00:02.1: PCI bridge to [bus 01-09]
  356. [ 0.308900] pci 0000:00:02.1: bridge window [io 0xf000-0xffff]
  357. [ 0.308903] pci 0000:00:02.1: bridge window [mem 0xfce00000-0xfcffffff]
  358. [ 0.308915] pci 0000:00:02.1: enabling Extended Tags
  359. [ 0.308953] pci 0000:00:02.1: PME# supported from D0 D3hot D3cold
  360. [ 0.309125] pci 0000:00:08.0: [1022:1632] type 00 class 0x060000 conventional PCI endpoint
  361. [ 0.309189] pci 0000:00:08.1: [1022:1635] type 01 class 0x060400 PCIe Root Port
  362. [ 0.309205] pci 0000:00:08.1: PCI bridge to [bus 0a]
  363. [ 0.309209] pci 0000:00:08.1: bridge window [io 0xe000-0xefff]
  364. [ 0.309211] pci 0000:00:08.1: bridge window [mem 0xfca00000-0xfcdfffff]
  365. [ 0.309217] pci 0000:00:08.1: bridge window [mem 0xd0000000-0xe01fffff 64bit pref]
  366. [ 0.309224] pci 0000:00:08.1: enabling Extended Tags
  367. [ 0.309261] pci 0000:00:08.1: PME# supported from D0 D3hot D3cold
  368. [ 0.309420] pci 0000:00:14.0: [1022:790b] type 00 class 0x0c0500 conventional PCI endpoint
  369. [ 0.309560] pci 0000:00:14.3: [1022:790e] type 00 class 0x060100 conventional PCI endpoint
  370. [ 0.309722] pci 0000:00:18.0: [1022:166a] type 00 class 0x060000 conventional PCI endpoint
  371. [ 0.309764] pci 0000:00:18.1: [1022:166b] type 00 class 0x060000 conventional PCI endpoint
  372. [ 0.309805] pci 0000:00:18.2: [1022:166c] type 00 class 0x060000 conventional PCI endpoint
  373. [ 0.309846] pci 0000:00:18.3: [1022:166d] type 00 class 0x060000 conventional PCI endpoint
  374. [ 0.309886] pci 0000:00:18.4: [1022:166e] type 00 class 0x060000 conventional PCI endpoint
  375. [ 0.309927] pci 0000:00:18.5: [1022:166f] type 00 class 0x060000 conventional PCI endpoint
  376. [ 0.309968] pci 0000:00:18.6: [1022:1670] type 00 class 0x060000 conventional PCI endpoint
  377. [ 0.310010] pci 0000:00:18.7: [1022:1671] type 00 class 0x060000 conventional PCI endpoint
  378. [ 0.310130] pci 0000:01:00.0: [1022:43ee] type 00 class 0x0c0330 PCIe Legacy Endpoint
  379. [ 0.310148] pci 0000:01:00.0: BAR 0 [mem 0xfcfa0000-0xfcfa7fff 64bit]
  380. [ 0.310189] pci 0000:01:00.0: enabling Extended Tags
  381. [ 0.310246] pci 0000:01:00.0: PME# supported from D3hot D3cold
  382. [ 0.310432] pci 0000:01:00.1: [1022:43eb] type 00 class 0x010601 PCIe Legacy Endpoint
  383. [ 0.310479] pci 0000:01:00.1: BAR 5 [mem 0xfcf80000-0xfcf9ffff]
  384. [ 0.310488] pci 0000:01:00.1: ROM [mem 0xfcf00000-0xfcf7ffff pref]
  385. [ 0.310495] pci 0000:01:00.1: enabling Extended Tags
  386. [ 0.310538] pci 0000:01:00.1: PME# supported from D3hot D3cold
  387. [ 0.310645] pci 0000:01:00.2: [1022:43e9] type 01 class 0x060400 PCIe Switch Upstream Port
  388. [ 0.310673] pci 0000:01:00.2: PCI bridge to [bus 02-09]
  389. [ 0.310680] pci 0000:01:00.2: bridge window [io 0xf000-0xffff]
  390. [ 0.310683] pci 0000:01:00.2: bridge window [mem 0xfce00000-0xfcefffff]
  391. [ 0.310704] pci 0000:01:00.2: enabling Extended Tags
  392. [ 0.310754] pci 0000:01:00.2: PME# supported from D3hot D3cold
  393. [ 0.310877] pci 0000:00:02.1: PCI bridge to [bus 01-09]
  394. [ 0.311027] pci 0000:02:00.0: [1022:43ea] type 01 class 0x060400 PCIe Switch Downstream Port
  395. [ 0.311063] pci 0000:02:00.0: PCI bridge to [bus 03]
  396. [ 0.311093] pci 0000:02:00.0: enabling Extended Tags
  397. [ 0.311153] pci 0000:02:00.0: PME# supported from D3hot D3cold
  398. [ 0.311277] pci 0000:02:01.0: [1022:43ea] type 01 class 0x060400 PCIe Switch Downstream Port
  399. [ 0.311307] pci 0000:02:01.0: PCI bridge to [bus 04]
  400. [ 0.311337] pci 0000:02:01.0: enabling Extended Tags
  401. [ 0.311397] pci 0000:02:01.0: PME# supported from D3hot D3cold
  402. [ 0.311521] pci 0000:02:02.0: [1022:43ea] type 01 class 0x060400 PCIe Switch Downstream Port
  403. [ 0.311550] pci 0000:02:02.0: PCI bridge to [bus 05]
  404. [ 0.311581] pci 0000:02:02.0: enabling Extended Tags
  405. [ 0.311640] pci 0000:02:02.0: PME# supported from D3hot D3cold
  406. [ 0.311764] pci 0000:02:03.0: [1022:43ea] type 01 class 0x060400 PCIe Switch Downstream Port
  407. [ 0.311794] pci 0000:02:03.0: PCI bridge to [bus 06]
  408. [ 0.311824] pci 0000:02:03.0: enabling Extended Tags
  409. [ 0.311883] pci 0000:02:03.0: PME# supported from D3hot D3cold
  410. [ 0.312012] pci 0000:02:04.0: [1022:43ea] type 01 class 0x060400 PCIe Switch Downstream Port
  411. [ 0.312042] pci 0000:02:04.0: PCI bridge to [bus 07]
  412. [ 0.312076] pci 0000:02:04.0: enabling Extended Tags
  413. [ 0.312135] pci 0000:02:04.0: PME# supported from D3hot D3cold
  414. [ 0.312263] pci 0000:02:08.0: [1022:43ea] type 01 class 0x060400 PCIe Switch Downstream Port
  415. [ 0.312293] pci 0000:02:08.0: PCI bridge to [bus 08]
  416. [ 0.312323] pci 0000:02:08.0: enabling Extended Tags
  417. [ 0.312382] pci 0000:02:08.0: PME# supported from D3hot D3cold
  418. [ 0.312508] pci 0000:02:09.0: [1022:43ea] type 01 class 0x060400 PCIe Switch Downstream Port
  419. [ 0.312537] pci 0000:02:09.0: PCI bridge to [bus 09]
  420. [ 0.312544] pci 0000:02:09.0: bridge window [io 0xf000-0xffff]
  421. [ 0.312548] pci 0000:02:09.0: bridge window [mem 0xfce00000-0xfcefffff]
  422. [ 0.312571] pci 0000:02:09.0: enabling Extended Tags
  423. [ 0.312630] pci 0000:02:09.0: PME# supported from D3hot D3cold
  424. [ 0.312763] pci 0000:01:00.2: PCI bridge to [bus 02-09]
  425. [ 0.312811] pci 0000:02:00.0: PCI bridge to [bus 03]
  426. [ 0.312860] pci 0000:02:01.0: PCI bridge to [bus 04]
  427. [ 0.312921] pci 0000:02:02.0: PCI bridge to [bus 05]
  428. [ 0.312981] pci 0000:02:03.0: PCI bridge to [bus 06]
  429. [ 0.313040] pci 0000:02:04.0: PCI bridge to [bus 07]
  430. [ 0.313096] pci 0000:02:08.0: PCI bridge to [bus 08]
  431. [ 0.313186] pci 0000:09:00.0: [10ec:8168] type 00 class 0x020000 PCIe Endpoint
  432. [ 0.313216] pci 0000:09:00.0: BAR 0 [io 0xf000-0xf0ff]
  433. [ 0.313255] pci 0000:09:00.0: BAR 2 [mem 0xfce04000-0xfce04fff 64bit]
  434. [ 0.313280] pci 0000:09:00.0: BAR 4 [mem 0xfce00000-0xfce03fff 64bit]
  435. [ 0.313450] pci 0000:09:00.0: supports D1 D2
  436. [ 0.313452] pci 0000:09:00.0: PME# supported from D0 D1 D2 D3hot D3cold
  437. [ 0.313737] pci 0000:02:09.0: PCI bridge to [bus 09]
  438. [ 0.313890] pci 0000:0a:00.0: [1002:1638] type 00 class 0x030000 PCIe Legacy Endpoint
  439. [ 0.313902] pci 0000:0a:00.0: BAR 0 [mem 0xd0000000-0xdfffffff 64bit pref]
  440. [ 0.313910] pci 0000:0a:00.0: BAR 2 [mem 0xe0000000-0xe01fffff 64bit pref]
  441. [ 0.313916] pci 0000:0a:00.0: BAR 4 [io 0xe000-0xe0ff]
  442. [ 0.313922] pci 0000:0a:00.0: BAR 5 [mem 0xfcd00000-0xfcd7ffff]
  443. [ 0.313931] pci 0000:0a:00.0: enabling Extended Tags
  444. [ 0.313951] pci 0000:0a:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
  445. [ 0.313992] pci 0000:0a:00.0: PME# supported from D1 D2 D3hot D3cold
  446. [ 0.314032] pci 0000:0a:00.0: 126.016 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x16 link at 0000:00:08.1 (capable of 252.048 Gb/s with 16.0 GT/s PCIe x16 link)
  447. [ 0.314135] pci 0000:0a:00.1: [1002:1637] type 00 class 0x040300 PCIe Legacy Endpoint
  448. [ 0.314145] pci 0000:0a:00.1: BAR 0 [mem 0xfcd88000-0xfcd8bfff]
  449. [ 0.314174] pci 0000:0a:00.1: enabling Extended Tags
  450. [ 0.314209] pci 0000:0a:00.1: PME# supported from D1 D2 D3hot D3cold
  451. [ 0.314302] pci 0000:0a:00.2: [1022:15df] type 00 class 0x108000 PCIe Endpoint
  452. [ 0.314320] pci 0000:0a:00.2: BAR 2 [mem 0xfcc00000-0xfccfffff]
  453. [ 0.314334] pci 0000:0a:00.2: BAR 5 [mem 0xfcd8c000-0xfcd8dfff]
  454. [ 0.314343] pci 0000:0a:00.2: enabling Extended Tags
  455. [ 0.314464] pci 0000:0a:00.3: [1022:1639] type 00 class 0x0c0330 PCIe Endpoint
  456. [ 0.314476] pci 0000:0a:00.3: BAR 0 [mem 0xfcb00000-0xfcbfffff 64bit]
  457. [ 0.314502] pci 0000:0a:00.3: enabling Extended Tags
  458. [ 0.314537] pci 0000:0a:00.3: PME# supported from D0 D3hot D3cold
  459. [ 0.314639] pci 0000:0a:00.4: [1022:1639] type 00 class 0x0c0330 PCIe Endpoint
  460. [ 0.314651] pci 0000:0a:00.4: BAR 0 [mem 0xfca00000-0xfcafffff 64bit]
  461. [ 0.314676] pci 0000:0a:00.4: enabling Extended Tags
  462. [ 0.314712] pci 0000:0a:00.4: PME# supported from D0 D3hot D3cold
  463. [ 0.314814] pci 0000:0a:00.6: [1022:15e3] type 00 class 0x040300 PCIe Endpoint
  464. [ 0.314824] pci 0000:0a:00.6: BAR 0 [mem 0xfcd80000-0xfcd87fff]
  465. [ 0.314854] pci 0000:0a:00.6: enabling Extended Tags
  466. [ 0.314888] pci 0000:0a:00.6: PME# supported from D0 D3hot D3cold
  467. [ 0.314997] pci 0000:00:08.1: PCI bridge to [bus 0a]
  468. [ 0.315838] ACPI: PCI: Interrupt link LNKA configured for IRQ 0
  469. [ 0.315915] ACPI: PCI: Interrupt link LNKB configured for IRQ 0
  470. [ 0.315983] ACPI: PCI: Interrupt link LNKC configured for IRQ 0
  471. [ 0.316074] ACPI: PCI: Interrupt link LNKD configured for IRQ 0
  472. [ 0.316149] ACPI: PCI: Interrupt link LNKE configured for IRQ 0
  473. [ 0.316210] ACPI: PCI: Interrupt link LNKF configured for IRQ 0
  474. [ 0.316272] ACPI: PCI: Interrupt link LNKG configured for IRQ 0
  475. [ 0.316333] ACPI: PCI: Interrupt link LNKH configured for IRQ 0
  476. [ 0.317572] iommu: Default domain type: Translated
  477. [ 0.317572] iommu: DMA domain TLB invalidation policy: lazy mode
  478. [ 0.317572] SCSI subsystem initialized
  479. [ 0.317572] libata version 3.00 loaded.
  480. [ 0.317572] ACPI: bus type USB registered
  481. [ 0.317572] usbcore: registered new interface driver usbfs
  482. [ 0.317572] usbcore: registered new interface driver hub
  483. [ 0.317572] usbcore: registered new device driver usb
  484. [ 0.317572] pps_core: LinuxPPS API ver. 1 registered
  485. [ 0.317572] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <[email protected]>
  486. [ 0.317572] PTP clock support registered
  487. [ 0.317572] EDAC MC: Ver: 3.0.0
  488. [ 0.318292] NetLabel: Initializing
  489. [ 0.318294] NetLabel: domain hash size = 128
  490. [ 0.318295] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
  491. [ 0.318317] NetLabel: unlabeled traffic allowed by default
  492. [ 0.318333] mctp: management component transport protocol core
  493. [ 0.318333] NET: Registered PF_MCTP protocol family
  494. [ 0.318333] PCI: Using ACPI for IRQ routing
  495. [ 0.322638] PCI: pci_cache_line_size set to 64 bytes
  496. [ 0.322692] e820: reserve RAM buffer [mem 0x0009d400-0x0009ffff]
  497. [ 0.322694] e820: reserve RAM buffer [mem 0x09d1f000-0x0bffffff]
  498. [ 0.322696] e820: reserve RAM buffer [mem 0x0a200000-0x0bffffff]
  499. [ 0.322697] e820: reserve RAM buffer [mem 0x0b000000-0x0bffffff]
  500. [ 0.322699] e820: reserve RAM buffer [mem 0xa33bb000-0xa3ffffff]
  501. [ 0.322700] e820: reserve RAM buffer [mem 0x42e300000-0x42fffffff]
  502. [ 0.322715] pci 0000:0a:00.0: vgaarb: setting as boot VGA device
  503. [ 0.322715] pci 0000:0a:00.0: vgaarb: bridge control possible
  504. [ 0.322715] pci 0000:0a:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
  505. [ 0.322715] vgaarb: loaded
  506. [ 0.322715] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0
  507. [ 0.322715] hpet0: 3 comparators, 32-bit 14.318180 MHz counter
  508. [ 0.324102] clocksource: Switched to clocksource tsc-early
  509. [ 0.324976] VFS: Disk quotas dquot_6.6.0
  510. [ 0.324986] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
  511. [ 0.325140] AppArmor: AppArmor Filesystem Enabled
  512. [ 0.325172] pnp: PnP ACPI init
  513. [ 0.325278] system 00:00: [mem 0xf0000000-0xf7ffffff] has been reserved
  514. [ 0.325369] system 00:01: [mem 0xb0000000-0xcfffffff window] has been reserved
  515. [ 0.325646] system 00:03: [io 0x0290-0x029f] has been reserved
  516. [ 0.325649] system 00:03: [io 0x0200-0x021f] has been reserved
  517. [ 0.325993] pnp 00:04: [dma 0 disabled]
  518. [ 0.326424] system 00:06: [io 0x04d0-0x04d1] has been reserved
  519. [ 0.326426] system 00:06: [io 0x040b] has been reserved
  520. [ 0.326428] system 00:06: [io 0x04d6] has been reserved
  521. [ 0.326430] system 00:06: [io 0x0c00-0x0c01] has been reserved
  522. [ 0.326432] system 00:06: [io 0x0c14] has been reserved
  523. [ 0.326434] system 00:06: [io 0x0c50-0x0c51] has been reserved
  524. [ 0.326436] system 00:06: [io 0x0c52] has been reserved
  525. [ 0.326438] system 00:06: [io 0x0c6c] has been reserved
  526. [ 0.326440] system 00:06: [io 0x0c6f] has been reserved
  527. [ 0.326442] system 00:06: [io 0x0cd8-0x0cdf] has been reserved
  528. [ 0.326444] system 00:06: [io 0x0800-0x089f] has been reserved
  529. [ 0.326445] system 00:06: [io 0x0b00-0x0b0f] has been reserved
  530. [ 0.326447] system 00:06: [io 0x0b20-0x0b3f] has been reserved
  531. [ 0.326449] system 00:06: [io 0x0900-0x090f] has been reserved
  532. [ 0.326451] system 00:06: [io 0x0910-0x091f] has been reserved
  533. [ 0.326453] system 00:06: [mem 0xfec00000-0xfec00fff] could not be reserved
  534. [ 0.326456] system 00:06: [mem 0xfec01000-0xfec01fff] could not be reserved
  535. [ 0.326458] system 00:06: [mem 0xfedc0000-0xfedc0fff] has been reserved
  536. [ 0.326459] system 00:06: [mem 0xfee00000-0xfee00fff] has been reserved
  537. [ 0.326462] system 00:06: [mem 0xfed80000-0xfed8ffff] could not be reserved
  538. [ 0.326463] system 00:06: [mem 0xfec10000-0xfec10fff] has been reserved
  539. [ 0.326465] system 00:06: [mem 0xff000000-0xffffffff] has been reserved
  540. [ 0.327470] pnp: PnP ACPI: found 7 devices
  541. [ 0.333551] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
  542. [ 0.333638] NET: Registered PF_INET protocol family
  543. [ 0.333819] IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear)
  544. [ 0.346955] tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear)
  545. [ 0.346976] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
  546. [ 0.347038] TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear)
  547. [ 0.347234] TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear)
  548. [ 0.347317] TCP: Hash tables configured (established 131072 bind 65536)
  549. [ 0.347424] MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear)
  550. [ 0.347460] UDP hash table entries: 8192 (order: 6, 262144 bytes, linear)
  551. [ 0.347490] UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear)
  552. [ 0.347554] NET: Registered PF_UNIX/PF_LOCAL protocol family
  553. [ 0.347560] NET: Registered PF_XDP protocol family
  554. [ 0.347576] pci 0000:02:00.0: PCI bridge to [bus 03]
  555. [ 0.347593] pci 0000:02:01.0: PCI bridge to [bus 04]
  556. [ 0.347604] pci 0000:02:02.0: PCI bridge to [bus 05]
  557. [ 0.347615] pci 0000:02:03.0: PCI bridge to [bus 06]
  558. [ 0.347626] pci 0000:02:04.0: PCI bridge to [bus 07]
  559. [ 0.347637] pci 0000:02:08.0: PCI bridge to [bus 08]
  560. [ 0.347648] pci 0000:02:09.0: PCI bridge to [bus 09]
  561. [ 0.347650] pci 0000:02:09.0: bridge window [io 0xf000-0xffff]
  562. [ 0.347656] pci 0000:02:09.0: bridge window [mem 0xfce00000-0xfcefffff]
  563. [ 0.347664] pci 0000:01:00.2: PCI bridge to [bus 02-09]
  564. [ 0.347666] pci 0000:01:00.2: bridge window [io 0xf000-0xffff]
  565. [ 0.347671] pci 0000:01:00.2: bridge window [mem 0xfce00000-0xfcefffff]
  566. [ 0.347678] pci 0000:00:02.1: PCI bridge to [bus 01-09]
  567. [ 0.347681] pci 0000:00:02.1: bridge window [io 0xf000-0xffff]
  568. [ 0.347684] pci 0000:00:02.1: bridge window [mem 0xfce00000-0xfcffffff]
  569. [ 0.347690] pci 0000:00:08.1: PCI bridge to [bus 0a]
  570. [ 0.347692] pci 0000:00:08.1: bridge window [io 0xe000-0xefff]
  571. [ 0.347696] pci 0000:00:08.1: bridge window [mem 0xfca00000-0xfcdfffff]
  572. [ 0.347698] pci 0000:00:08.1: bridge window [mem 0xd0000000-0xe01fffff 64bit pref]
  573. [ 0.347703] pci_bus 0000:00: resource 4 [io 0x0000-0x03af window]
  574. [ 0.347705] pci_bus 0000:00: resource 5 [io 0x03e0-0x0cf7 window]
  575. [ 0.347707] pci_bus 0000:00: resource 6 [io 0x03b0-0x03df window]
  576. [ 0.347708] pci_bus 0000:00: resource 7 [io 0x0d00-0xffff window]
  577. [ 0.347710] pci_bus 0000:00: resource 8 [mem 0x000a0000-0x000dffff window]
  578. [ 0.347712] pci_bus 0000:00: resource 9 [mem 0xd0000000-0xfec2ffff window]
  579. [ 0.347714] pci_bus 0000:00: resource 10 [mem 0xfee00000-0xffffffff window]
  580. [ 0.347716] pci_bus 0000:01: resource 0 [io 0xf000-0xffff]
  581. [ 0.347717] pci_bus 0000:01: resource 1 [mem 0xfce00000-0xfcffffff]
  582. [ 0.347719] pci_bus 0000:02: resource 0 [io 0xf000-0xffff]
  583. [ 0.347721] pci_bus 0000:02: resource 1 [mem 0xfce00000-0xfcefffff]
  584. [ 0.347723] pci_bus 0000:09: resource 0 [io 0xf000-0xffff]
  585. [ 0.347724] pci_bus 0000:09: resource 1 [mem 0xfce00000-0xfcefffff]
  586. [ 0.347726] pci_bus 0000:0a: resource 0 [io 0xe000-0xefff]
  587. [ 0.347728] pci_bus 0000:0a: resource 1 [mem 0xfca00000-0xfcdfffff]
  588. [ 0.347730] pci_bus 0000:0a: resource 2 [mem 0xd0000000-0xe01fffff 64bit pref]
  589. [ 0.348016] pci 0000:0a:00.1: D0 power state depends on 0000:0a:00.0
  590. [ 0.348024] pci 0000:0a:00.3: extending delay after power-on from D3hot to 20 msec
  591. [ 0.348175] pci 0000:0a:00.4: extending delay after power-on from D3hot to 20 msec
  592. [ 0.348263] PCI: CLS 64 bytes, default 64
  593. [ 0.348283] pci 0000:00:00.2: AMD-Vi: IOMMU performance counters supported
  594. [ 0.348327] Trying to unpack rootfs image as initramfs...
  595. [ 0.348337] pci 0000:00:01.0: Adding to iommu group 0
  596. [ 0.348362] pci 0000:00:02.0: Adding to iommu group 1
  597. [ 0.348377] pci 0000:00:02.1: Adding to iommu group 2
  598. [ 0.348398] pci 0000:00:08.0: Adding to iommu group 3
  599. [ 0.348413] pci 0000:00:08.1: Adding to iommu group 4
  600. [ 0.348440] pci 0000:00:14.0: Adding to iommu group 5
  601. [ 0.348453] pci 0000:00:14.3: Adding to iommu group 5
  602. [ 0.348518] pci 0000:00:18.0: Adding to iommu group 6
  603. [ 0.348531] pci 0000:00:18.1: Adding to iommu group 6
  604. [ 0.348545] pci 0000:00:18.2: Adding to iommu group 6
  605. [ 0.348558] pci 0000:00:18.3: Adding to iommu group 6
  606. [ 0.348573] pci 0000:00:18.4: Adding to iommu group 6
  607. [ 0.348586] pci 0000:00:18.5: Adding to iommu group 6
  608. [ 0.348600] pci 0000:00:18.6: Adding to iommu group 6
  609. [ 0.348614] pci 0000:00:18.7: Adding to iommu group 6
  610. [ 0.348646] pci 0000:01:00.0: Adding to iommu group 7
  611. [ 0.348662] pci 0000:01:00.1: Adding to iommu group 7
  612. [ 0.348678] pci 0000:01:00.2: Adding to iommu group 7
  613. [ 0.348685] pci 0000:02:00.0: Adding to iommu group 7
  614. [ 0.348690] pci 0000:02:01.0: Adding to iommu group 7
  615. [ 0.348696] pci 0000:02:02.0: Adding to iommu group 7
  616. [ 0.348701] pci 0000:02:03.0: Adding to iommu group 7
  617. [ 0.348707] pci 0000:02:04.0: Adding to iommu group 7
  618. [ 0.348713] pci 0000:02:08.0: Adding to iommu group 7
  619. [ 0.348718] pci 0000:02:09.0: Adding to iommu group 7
  620. [ 0.348725] pci 0000:09:00.0: Adding to iommu group 7
  621. [ 0.348746] pci 0000:0a:00.0: Adding to iommu group 8
  622. [ 0.348761] pci 0000:0a:00.1: Adding to iommu group 9
  623. [ 0.348777] pci 0000:0a:00.2: Adding to iommu group 10
  624. [ 0.348794] pci 0000:0a:00.3: Adding to iommu group 11
  625. [ 0.348810] pci 0000:0a:00.4: Adding to iommu group 12
  626. [ 0.348825] pci 0000:0a:00.6: Adding to iommu group 13
  627. [ 0.350121] AMD-Vi: Extended features (0x206d73ef22254ade, 0x0): PPR X2APIC NX GT IA GA PC GA_vAPIC
  628. [ 0.350130] AMD-Vi: Interrupt remapping enabled
  629. [ 0.350131] AMD-Vi: X2APIC enabled
  630. [ 0.430441] Freeing initrd memory: 68112K
  631. [ 0.504941] AMD-Vi: Virtual APIC enabled
  632. [ 0.504952] PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
  633. [ 0.504954] software IO TLB: mapped [mem 0x000000009f3bb000-0x00000000a33bb000] (64MB)
  634. [ 0.505030] LVT offset 0 assigned for vector 0x400
  635. [ 0.505131] perf: AMD IBS detected (0x000003ff)
  636. [ 0.505138] perf/amd_iommu: Detected AMD IOMMU #0 (2 banks, 4 counters/bank).
  637. [ 0.505934] Initialise system trusted keyrings
  638. [ 0.505945] Key type blacklist registered
  639. [ 0.505987] workingset: timestamp_bits=36 max_order=22 bucket_order=0
  640. [ 0.505999] zbud: loaded
  641. [ 0.506289] squashfs: version 4.0 (2009/01/31) Phillip Lougher
  642. [ 0.506368] fuse: init (API version 7.40)
  643. [ 0.506486] integrity: Platform Keyring initialized
  644. [ 0.506489] integrity: Machine keyring initialized
  645. [ 0.515464] Key type asymmetric registered
  646. [ 0.515466] Asymmetric key parser 'x509' registered
  647. [ 0.515485] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243)
  648. [ 0.515525] io scheduler mq-deadline registered
  649. [ 0.517921] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
  650. [ 0.518070] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0
  651. [ 0.518093] ACPI: button: Power Button [PWRB]
  652. [ 0.518128] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1
  653. [ 0.518172] ACPI: button: Power Button [PWRF]
  654. [ 0.518514] Estimated ratio of average max frequency by base frequency (times 1024): 1098
  655. [ 0.518527] Monitor-Mwait will be used to enter C-1 state
  656. [ 0.518530] ACPI: \_SB_.PLTF.C000: Found 3 idle states
  657. [ 0.518674] ACPI: \_SB_.PLTF.C002: Found 3 idle states
  658. [ 0.518836] ACPI: \_SB_.PLTF.C004: Found 3 idle states
  659. [ 0.518993] ACPI: \_SB_.PLTF.C006: Found 3 idle states
  660. [ 0.519167] ACPI: \_SB_.PLTF.C008: Found 3 idle states
  661. [ 0.519342] ACPI: \_SB_.PLTF.C00A: Found 3 idle states
  662. [ 0.519498] ACPI: \_SB_.PLTF.C001: Found 3 idle states
  663. [ 0.519633] ACPI: \_SB_.PLTF.C003: Found 3 idle states
  664. [ 0.519781] ACPI: \_SB_.PLTF.C005: Found 3 idle states
  665. [ 0.519941] ACPI: \_SB_.PLTF.C007: Found 3 idle states
  666. [ 0.520102] ACPI: \_SB_.PLTF.C009: Found 3 idle states
  667. [ 0.520240] ACPI: \_SB_.PLTF.C00B: Found 3 idle states
  668. [ 0.520505] Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled
  669. [ 0.541292] 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
  670. [ 0.544744] Linux agpgart interface v0.103
  671. [ 0.557277] tpm_crb MSFT0101:00: Disabling hwrng
  672. [ 0.560083] loop: module loaded
  673. [ 0.560288] ACPI: bus type drm_connector registered
  674. [ 0.560830] tun: Universal TUN/TAP device driver, 1.6
  675. [ 0.560870] PPP generic driver version 2.4.2
  676. [ 0.560993] i8042: PNP: PS/2 Controller [PNP0303:PS2K] at 0x60,0x64 irq 1
  677. [ 0.560995] i8042: PNP: PS/2 appears to have AUX port disabled, if this is incorrect please boot with i8042.nopnp
  678. [ 0.561495] serio: i8042 KBD port at 0x60,0x64 irq 1
  679. [ 0.561569] mousedev: PS/2 mouse device common for all mice
  680. [ 0.561668] rtc_cmos 00:02: RTC can wake from S4
  681. [ 0.561893] rtc_cmos 00:02: registered as rtc0
  682. [ 0.561924] rtc_cmos 00:02: setting system clock to 2024-10-01T13:44:24 UTC (1727790264)
  683. [ 0.561954] rtc_cmos 00:02: alarms up to one month, y3k, 114 bytes nvram
  684. [ 0.561962] i2c_dev: i2c /dev entries driver
  685. [ 0.561985] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
  686. [ 0.561993] device-mapper: uevent: version 1.0.3
  687. [ 0.562034] device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: [email protected]
  688. [ 0.562054] platform eisa.0: Probing EISA bus 0
  689. [ 0.562058] platform eisa.0: EISA: Cannot allocate resource for mainboard
  690. [ 0.562060] platform eisa.0: Cannot allocate resource for EISA slot 1
  691. [ 0.562062] platform eisa.0: Cannot allocate resource for EISA slot 2
  692. [ 0.562064] platform eisa.0: Cannot allocate resource for EISA slot 3
  693. [ 0.562065] platform eisa.0: Cannot allocate resource for EISA slot 4
  694. [ 0.562067] platform eisa.0: Cannot allocate resource for EISA slot 5
  695. [ 0.562068] platform eisa.0: Cannot allocate resource for EISA slot 6
  696. [ 0.562070] platform eisa.0: Cannot allocate resource for EISA slot 7
  697. [ 0.562072] platform eisa.0: Cannot allocate resource for EISA slot 8
  698. [ 0.562073] platform eisa.0: EISA: Detected 0 cards
  699. [ 0.562772] ledtrig-cpu: registered to indicate activity on CPUs
  700. [ 0.563003] [drm] Initialized simpledrm 1.0.0 for simple-framebuffer.0 on minor 0
  701. [ 0.564879] fbcon: Deferring console take-over
  702. [ 0.564881] simple-framebuffer simple-framebuffer.0: [drm] fb0: simpledrmdrmfb frame buffer device
  703. [ 0.564947] drop_monitor: Initializing network drop monitor service
  704. [ 0.565049] NET: Registered PF_INET6 protocol family
  705. [ 0.570466] Segment Routing with IPv6
  706. [ 0.570479] In-situ OAM (IOAM) with IPv6
  707. [ 0.570511] NET: Registered PF_PACKET protocol family
  708. [ 0.570547] Key type dns_resolver registered
  709. [ 0.571520] microcode: Current revision: 0x0a50000d
  710. [ 0.571712] resctrl: L3 allocation detected
  711. [ 0.571714] resctrl: MB allocation detected
  712. [ 0.571715] resctrl: L3 monitoring detected
  713. [ 0.571734] IPI shorthand broadcast: enabled
  714. [ 0.573763] sched_clock: Marking stable (573263329, 223549)->(738222431, -164735553)
  715. [ 0.573879] registered taskstats version 1
  716. [ 0.574215] Loading compiled-in X.509 certificates
  717. [ 0.574608] Loaded X.509 cert 'Build time autogenerated kernel key: 44bb7aee388ba8514143508bda37e4c74d0436e3'
  718. [ 0.574930] Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969'
  719. [ 0.575245] Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19'
  720. [ 0.575247] blacklist: Loading compiled-in revocation X.509 certificates
  721. [ 0.575263] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0'
  722. [ 0.575275] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03'
  723. [ 0.575285] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b'
  724. [ 0.575297] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8'
  725. [ 0.575308] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d'
  726. [ 0.575320] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c'
  727. [ 0.575331] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af'
  728. [ 0.575342] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9'
  729. [ 0.580111] Demotion targets for Node 0: null
  730. [ 0.580174] Key type .fscrypt registered
  731. [ 0.580176] Key type fscrypt-provisioning registered
  732. [ 0.580239] Key type trusted registered
  733. [ 0.584721] cryptd: max_cpu_qlen set to 1000
  734. [ 0.586548] AES CTR mode by8 optimization enabled
  735. [ 0.586760] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input2
  736. [ 0.596817] Key type encrypted registered
  737. [ 0.596821] AppArmor: AppArmor sha256 policy hashing enabled
  738. [ 0.596836] Loading compiled-in module X.509 certificates
  739. [ 0.597263] Loaded X.509 cert 'Build time autogenerated kernel key: 44bb7aee388ba8514143508bda37e4c74d0436e3'
  740. [ 0.597266] ima: Allocated hash algorithm: sha256
  741. [ 0.630523] ima: No architecture policies found
  742. [ 0.630559] evm: Initialising EVM extended attributes:
  743. [ 0.630560] evm: security.selinux
  744. [ 0.630563] evm: security.SMACK64
  745. [ 0.630564] evm: security.SMACK64EXEC
  746. [ 0.630566] evm: security.SMACK64TRANSMUTE
  747. [ 0.630567] evm: security.SMACK64MMAP
  748. [ 0.630569] evm: security.apparmor
  749. [ 0.630570] evm: security.ima
  750. [ 0.630572] evm: security.capability
  751. [ 0.630573] evm: HMAC attrs: 0x1
  752. [ 0.630930] PM: Magic number: 12:162:735
  753. [ 0.634484] RAS: Correctable Errors collector initialized.
  754. [ 0.645697] clk: Disabling unused clocks
  755. [ 0.645700] PM: genpd: Disabling unused power domains
  756. [ 0.646852] Freeing unused decrypted memory: 2028K
  757. [ 0.647545] Freeing unused kernel image (initmem) memory: 4956K
  758. [ 0.647560] Write protecting the kernel read-only data: 38912k
  759. [ 0.648008] Freeing unused kernel image (rodata/data gap) memory: 1448K
  760. [ 0.690197] x86/mm: Checked W+X mappings: passed, no W+X pages found.
  761. [ 0.690203] Run /init as init process
  762. [ 0.690205] with arguments:
  763. [ 0.690207] /init
  764. [ 0.690208] splash
  765. [ 0.690209] with environment:
  766. [ 0.690210] HOME=/
  767. [ 0.690212] TERM=linux
  768. [ 0.690213] BOOT_IMAGE=/boot/vmlinuz-6.11.0-8-generic
  769. [ 0.805265] xhci_hcd 0000:01:00.0: xHCI Host Controller
  770. [ 0.805278] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 1
  771. [ 0.805449] ahci 0000:01:00.1: version 3.0
  772. [ 0.806178] ahci 0000:01:00.1: SSS flag set, parallel bus scan disabled
  773. [ 0.806229] ahci 0000:01:00.1: AHCI vers 0001.0301, 32 command slots, 6 Gbps, SATA mode
  774. [ 0.806233] ahci 0000:01:00.1: 6/6 ports implemented (port mask 0x3f)
  775. [ 0.806236] ahci 0000:01:00.1: flags: 64bit ncq sntf stag pm led clo only pmp pio slum part sxs deso sadm sds apst
  776. [ 0.814377] scsi host0: ahci
  777. [ 0.814602] scsi host1: ahci
  778. [ 0.814796] scsi host2: ahci
  779. [ 0.815920] scsi host3: ahci
  780. [ 0.816178] scsi host4: ahci
  781. [ 0.816308] scsi host5: ahci
  782. [ 0.816409] ata1: SATA max UDMA/133 abar m131072@0xfcf80000 port 0xfcf80100 irq 41 lpm-pol 3
  783. [ 0.816413] ata2: SATA max UDMA/133 abar m131072@0xfcf80000 port 0xfcf80180 irq 41 lpm-pol 3
  784. [ 0.816416] ata3: SATA max UDMA/133 abar m131072@0xfcf80000 port 0xfcf80200 irq 41 lpm-pol 3
  785. [ 0.816419] ata4: SATA max UDMA/133 abar m131072@0xfcf80000 port 0xfcf80280 irq 41 lpm-pol 3
  786. [ 0.816422] ata5: SATA max UDMA/133 abar m131072@0xfcf80000 port 0xfcf80300 irq 41 lpm-pol 3
  787. [ 0.816424] ata6: SATA max UDMA/133 abar m131072@0xfcf80000 port 0xfcf80380 irq 41 lpm-pol 3
  788. [ 0.823380] r8169 0000:09:00.0 eth0: RTL8168h/8111h, 08:bf:b8:36:df:62, XID 541, IRQ 42
  789. [ 0.823385] r8169 0000:09:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko]
  790. [ 0.860627] xhci_hcd 0000:01:00.0: hcc params 0x0200ef81 hci version 0x110 quirks 0x0000000000000010
  791. [ 0.861069] xhci_hcd 0000:01:00.0: xHCI Host Controller
  792. [ 0.861077] xhci_hcd 0000:01:00.0: new USB bus registered, assigned bus number 2
  793. [ 0.861085] xhci_hcd 0000:01:00.0: Host supports USB 3.1 Enhanced SuperSpeed
  794. [ 0.861178] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.11
  795. [ 0.861181] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  796. [ 0.861184] usb usb1: Product: xHCI Host Controller
  797. [ 0.861186] usb usb1: Manufacturer: Linux 6.11.0-8-generic xhci-hcd
  798. [ 0.861188] usb usb1: SerialNumber: 0000:01:00.0
  799. [ 0.861406] hub 1-0:1.0: USB hub found
  800. [ 0.861441] hub 1-0:1.0: 10 ports detected
  801. [ 0.880451] usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
  802. [ 0.880477] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.11
  803. [ 0.880481] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  804. [ 0.880484] usb usb2: Product: xHCI Host Controller
  805. [ 0.880486] usb usb2: Manufacturer: Linux 6.11.0-8-generic xhci-hcd
  806. [ 0.880488] usb usb2: SerialNumber: 0000:01:00.0
  807. [ 0.880594] hub 2-0:1.0: USB hub found
  808. [ 0.880607] hub 2-0:1.0: 4 ports detected
  809. [ 0.888306] xhci_hcd 0000:0a:00.3: xHCI Host Controller
  810. [ 0.888312] xhci_hcd 0000:0a:00.3: new USB bus registered, assigned bus number 3
  811. [ 0.888416] xhci_hcd 0000:0a:00.3: hcc params 0x0268ffe5 hci version 0x110 quirks 0x0000020000000010
  812. [ 0.888719] xhci_hcd 0000:0a:00.3: xHCI Host Controller
  813. [ 0.888724] xhci_hcd 0000:0a:00.3: new USB bus registered, assigned bus number 4
  814. [ 0.888728] xhci_hcd 0000:0a:00.3: Host supports USB 3.1 Enhanced SuperSpeed
  815. [ 0.888764] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.11
  816. [ 0.888766] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  817. [ 0.888768] usb usb3: Product: xHCI Host Controller
  818. [ 0.888770] usb usb3: Manufacturer: Linux 6.11.0-8-generic xhci-hcd
  819. [ 0.888772] usb usb3: SerialNumber: 0000:0a:00.3
  820. [ 0.888883] hub 3-0:1.0: USB hub found
  821. [ 0.888894] hub 3-0:1.0: 4 ports detected
  822. [ 0.889168] usb usb4: We don't know the algorithms for LPM for this host, disabling LPM.
  823. [ 0.889211] usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.11
  824. [ 0.889214] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  825. [ 0.889217] usb usb4: Product: xHCI Host Controller
  826. [ 0.889219] usb usb4: Manufacturer: Linux 6.11.0-8-generic xhci-hcd
  827. [ 0.889221] usb usb4: SerialNumber: 0000:0a:00.3
  828. [ 0.889354] hub 4-0:1.0: USB hub found
  829. [ 0.889372] hub 4-0:1.0: 2 ports detected
  830. [ 0.889635] xhci_hcd 0000:0a:00.4: xHCI Host Controller
  831. [ 0.889641] xhci_hcd 0000:0a:00.4: new USB bus registered, assigned bus number 5
  832. [ 0.889752] xhci_hcd 0000:0a:00.4: hcc params 0x0268ffe5 hci version 0x110 quirks 0x0000020000000010
  833. [ 0.890065] xhci_hcd 0000:0a:00.4: xHCI Host Controller
  834. [ 0.890068] xhci_hcd 0000:0a:00.4: new USB bus registered, assigned bus number 6
  835. [ 0.890071] xhci_hcd 0000:0a:00.4: Host supports USB 3.1 Enhanced SuperSpeed
  836. [ 0.890106] usb usb5: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.11
  837. [ 0.890108] usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  838. [ 0.890110] usb usb5: Product: xHCI Host Controller
  839. [ 0.890112] usb usb5: Manufacturer: Linux 6.11.0-8-generic xhci-hcd
  840. [ 0.890113] usb usb5: SerialNumber: 0000:0a:00.4
  841. [ 0.890215] hub 5-0:1.0: USB hub found
  842. [ 0.890224] hub 5-0:1.0: 4 ports detected
  843. [ 0.890448] usb usb6: We don't know the algorithms for LPM for this host, disabling LPM.
  844. [ 0.890475] usb usb6: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.11
  845. [ 0.890477] usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  846. [ 0.890479] usb usb6: Product: xHCI Host Controller
  847. [ 0.890481] usb usb6: Manufacturer: Linux 6.11.0-8-generic xhci-hcd
  848. [ 0.890483] usb usb6: SerialNumber: 0000:0a:00.4
  849. [ 0.890577] hub 6-0:1.0: USB hub found
  850. [ 0.890584] hub 6-0:1.0: 2 ports detected
  851. [ 1.114251] usb 3-1: new low-speed USB device number 2 using xhci_hcd
  852. [ 1.167494] usb 1-1: new high-speed USB device number 2 using xhci_hcd
  853. [ 1.258066] usb 3-1: New USB device found, idVendor=1130, idProduct=6606, bcdDevice= 1.00
  854. [ 1.258074] usb 3-1: New USB device strings: Mfr=0, Product=2, SerialNumber=0
  855. [ 1.258077] usb 3-1: Product: USB Laser Optical Mouse
  856. [ 1.263452] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
  857. [ 1.264283] ata1.00: supports DRM functions and may not be fully accessible
  858. [ 1.264289] ata1.00: ATA-11: Samsung SSD 860 EVO 500GB, RVT01B6Q, max UDMA/133
  859. [ 1.265366] ata1.00: 976773168 sectors, multi 1: LBA48 NCQ (depth 32), AA
  860. [ 1.273322] ata1.00: Features: Trust Dev-Sleep NCQ-sndrcv
  861. [ 1.273760] ata1.00: supports DRM functions and may not be fully accessible
  862. [ 1.281063] ata1.00: configured for UDMA/133
  863. [ 1.291323] ahci 0000:01:00.1: port does not support device sleep
  864. [ 1.291617] scsi 0:0:0:0: Direct-Access ATA Samsung SSD 860 1B6Q PQ: 0 ANSI: 5
  865. [ 1.292143] ata1.00: Enabling discard_zeroes_data
  866. [ 1.292146] sd 0:0:0:0: Attached scsi generic sg0 type 0
  867. [ 1.292157] sd 0:0:0:0: [sda] 976773168 512-byte logical blocks: (500 GB/466 GiB)
  868. [ 1.292169] sd 0:0:0:0: [sda] Write Protect is off
  869. [ 1.292173] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
  870. [ 1.292206] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
  871. [ 1.292266] sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes
  872. [ 1.292684] ata1.00: Enabling discard_zeroes_data
  873. [ 1.310887] sda: sda1 sda2 < sda5 sda6 sda7 >
  874. [ 1.312298] sd 0:0:0:0: [sda] supports TCG Opal
  875. [ 1.312301] sd 0:0:0:0: [sda] Attached SCSI disk
  876. [ 1.368336] usb 1-1: New USB device found, idVendor=0409, idProduct=005a, bcdDevice= 1.00
  877. [ 1.368345] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
  878. [ 1.377311] hub 1-1:1.0: USB hub found
  879. [ 1.380321] hub 1-1:1.0: 2 ports detected
  880. [ 1.519437] tsc: Refined TSC clocksource calibration: 3892.685 MHz
  881. [ 1.519448] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x7038b8db878, max_idle_ns: 881590710692 ns
  882. [ 1.519488] clocksource: Switched to clocksource tsc
  883. [ 1.566456] usb 1-6: new full-speed USB device number 3 using xhci_hcd
  884. [ 1.751600] ata2: SATA link up 3.0 Gbps (SStatus 123 SControl 300)
  885. [ 1.758261] ata2.00: ATA-7: SAMSUNG HD753LJ, 1AA01113, max UDMA7
  886. [ 1.759257] ata2.00: 1465149168 sectors, multi 16: LBA48 NCQ (depth 32), AA
  887. [ 1.766127] ata2.00: configured for UDMA/133
  888. [ 1.766538] scsi 1:0:0:0: Direct-Access ATA SAMSUNG HD753LJ 1113 PQ: 0 ANSI: 5
  889. [ 1.767067] sd 1:0:0:0: Attached scsi generic sg1 type 0
  890. [ 1.767093] sd 1:0:0:0: [sdb] 1465149168 512-byte logical blocks: (750 GB/699 GiB)
  891. [ 1.767109] sd 1:0:0:0: [sdb] Write Protect is off
  892. [ 1.767114] sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00
  893. [ 1.767132] sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
  894. [ 1.767167] sd 1:0:0:0: [sdb] Preferred minimum I/O size 512 bytes
  895. [ 1.820872] sdb: sdb1 sdb2 sdb3 sdb4 < sdb5 >
  896. [ 1.821351] sd 1:0:0:0: [sdb] Attached SCSI disk
  897. [ 1.925480] usb 1-1.1: new high-speed USB device number 4 using xhci_hcd
  898. [ 1.929201] usb 1-6: config 1 has an invalid interface number: 2 but max is 1
  899. [ 1.929211] usb 1-6: config 1 has no interface number 1
  900. [ 1.941142] usb 1-6: New USB device found, idVendor=0b05, idProduct=1939, bcdDevice= 1.00
  901. [ 1.941152] usb 1-6: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  902. [ 1.941156] usb 1-6: Product: AURA LED Controller
  903. [ 1.941159] usb 1-6: Manufacturer: AsusTek Computer Inc.
  904. [ 1.941162] usb 1-6: SerialNumber: 9876543210
  905. [ 2.069314] usb 1-1.1: New USB device found, idVendor=05a3, idProduct=9331, bcdDevice= 2.01
  906. [ 2.069325] usb 1-1.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  907. [ 2.069329] usb 1-1.1: Product: HD Web Camera
  908. [ 2.069332] usb 1-1.1: Manufacturer: HD Web Camera
  909. [ 2.069335] usb 1-1.1: SerialNumber: Ucamera001
  910. [ 2.208509] usb 1-8: new high-speed USB device number 5 using xhci_hcd
  911. [ 2.239523] ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
  912. [ 2.241088] ata3.00: ATA-9: INTENSO, V0609A0, max UDMA/133
  913. [ 2.241771] ata3.00: 468862128 sectors, multi 1: LBA48 NCQ (depth 32), AA
  914. [ 2.244964] ata3.00: configured for UDMA/133
  915. [ 2.255487] scsi 2:0:0:0: Direct-Access ATA INTENSO 9A0 PQ: 0 ANSI: 5
  916. [ 2.256096] sd 2:0:0:0: Attached scsi generic sg2 type 0
  917. [ 2.256110] sd 2:0:0:0: [sdc] 468862128 512-byte logical blocks: (240 GB/224 GiB)
  918. [ 2.256123] sd 2:0:0:0: [sdc] Write Protect is off
  919. [ 2.256127] sd 2:0:0:0: [sdc] Mode Sense: 00 3a 00 00
  920. [ 2.256144] sd 2:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
  921. [ 2.256176] sd 2:0:0:0: [sdc] Preferred minimum I/O size 512 bytes
  922. [ 2.269487] sdc: sdc1 sdc2 sdc3 sdc4
  923. [ 2.269794] sd 2:0:0:0: [sdc] Attached SCSI disk
  924. [ 2.430311] usb 1-8: New USB device found, idVendor=058f, idProduct=6362, bcdDevice= 1.29
  925. [ 2.430319] usb 1-8: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  926. [ 2.430323] usb 1-8: Product: Mass Storage Device
  927. [ 2.430326] usb 1-8: Manufacturer: Generic
  928. [ 2.430328] usb 1-8: SerialNumber: 058F312D81B
  929. [ 2.569481] ata4: SATA link down (SStatus 0 SControl 300)
  930. [ 2.876272] ata5: SATA link down (SStatus 0 SControl 330)
  931. [ 3.911502] ata6: failed to resume link (SControl 0)
  932. [ 3.911522] ata6: SATA link down (SStatus 0 SControl 0)
  933. [ 3.914722] r8169 0000:09:00.0 enp9s0: renamed from eth0
  934. [ 3.925343] usb-storage 1-8:1.0: USB Mass Storage device detected
  935. [ 3.925504] scsi host6: usb-storage 1-8:1.0
  936. [ 3.925609] usbcore: registered new interface driver usb-storage
  937. [ 3.926558] usbcore: registered new interface driver uas
  938. [ 3.927938] hid: raw HID events driver (C) Jiri Kosina
  939. [ 3.968944] usbcore: registered new interface driver usbhid
  940. [ 3.968947] usbhid: USB HID core driver
  941. [ 3.971630] input: USB Laser Optical Mouse System Control as /devices/pci0000:00/0000:00:08.1/0000:0a:00.3/usb3/3-1/3-1:1.0/0003:1130:6606.0001/input/input3
  942. [ 4.023359] input: USB Laser Optical Mouse Consumer Control as /devices/pci0000:00/0000:00:08.1/0000:0a:00.3/usb3/3-1/3-1:1.0/0003:1130:6606.0001/input/input4
  943. [ 4.023477] input: USB Laser Optical Mouse as /devices/pci0000:00/0000:00:08.1/0000:0a:00.3/usb3/3-1/3-1:1.0/0003:1130:6606.0001/input/input5
  944. [ 4.023680] hid-generic 0003:1130:6606.0001: input,hidraw0: USB HID v1.10 Mouse [USB Laser Optical Mouse] on usb-0000:0a:00.3-1/input0
  945. [ 4.023859] hid-generic 0003:0B05:1939.0002: hiddev0,hidraw1: USB HID v1.11 Device [AsusTek Computer Inc. AURA LED Controller] on usb-0000:01:00.0-6/input2
  946. [ 4.600226] raid6: avx2x4 gen() 39354 MB/s
  947. [ 4.617225] raid6: avx2x2 gen() 42811 MB/s
  948. [ 4.634225] raid6: avx2x1 gen() 35162 MB/s
  949. [ 4.634227] raid6: using algorithm avx2x2 gen() 42811 MB/s
  950. [ 4.651225] raid6: .... xor() 39364 MB/s, rmw enabled
  951. [ 4.651227] raid6: using avx2x2 recovery algorithm
  952. [ 4.651903] xor: automatically using best checksumming function avx
  953. [ 4.712857] Btrfs loaded, zoned=yes, fsverity=yes
  954. [ 4.979531] scsi 6:0:0:0: Direct-Access Generic USB SD Reader 1.00 PQ: 0 ANSI: 0
  955. [ 4.979895] scsi 6:0:0:1: Direct-Access Generic USB CF Reader 1.01 PQ: 0 ANSI: 0
  956. [ 4.980268] scsi 6:0:0:2: Direct-Access Generic USB SM Reader 1.02 PQ: 0 ANSI: 0
  957. [ 4.980606] scsi 6:0:0:3: Direct-Access Generic USB MS Reader 1.03 PQ: 0 ANSI: 0
  958. [ 4.980799] sd 6:0:0:0: Attached scsi generic sg3 type 0
  959. [ 4.980912] sd 6:0:0:1: Attached scsi generic sg4 type 0
  960. [ 4.981053] sd 6:0:0:2: Attached scsi generic sg5 type 0
  961. [ 4.981193] sd 6:0:0:3: Attached scsi generic sg6 type 0
  962. [ 4.981230] sd 6:0:0:0: [sdd] Media removed, stopped polling
  963. [ 4.981507] sd 6:0:0:0: [sdd] Attached SCSI removable disk
  964. [ 4.981646] sd 6:0:0:1: [sde] Media removed, stopped polling
  965. [ 4.982057] sd 6:0:0:1: [sde] Attached SCSI removable disk
  966. [ 4.982099] sd 6:0:0:2: [sdf] Media removed, stopped polling
  967. [ 4.983374] sd 6:0:0:3: [sdg] Media removed, stopped polling
  968. [ 4.983394] sd 6:0:0:2: [sdf] Attached SCSI removable disk
  969. [ 4.983732] sd 6:0:0:3: [sdg] Attached SCSI removable disk
  970. [ 4.992747] PM: Image not found (code -22)
  971. [ 5.021586] EXT4-fs (sda1): mounted filesystem af267def-decd-40dc-a20d-9be004c06599 ro with ordered data mode. Quota mode: none.
  972. [ 5.147577] systemd[1]: Inserted module 'autofs4'
  973. [ 5.164166] systemd[1]: systemd 256.5-2ubuntu2 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT +LIBARCHIVE)
  974. [ 5.164173] systemd[1]: Detected architecture x86-64.
  975. [ 5.165845] systemd[1]: Hostname set to <ralf-P5K>.
  976. [ 5.240959] systemd[1]: bpf-restrict-fs: BPF LSM hook not enabled in the kernel, BPF LSM not supported.
  977. [ 5.337429] systemd[1]: Configuration file /run/systemd/system/netplan-ovs-cleanup.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway.
  978. [ 5.395542] systemd[1]: Queued start job for default target graphical.target.
  979. [ 5.427780] systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe.
  980. [ 5.428506] systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck.
  981. [ 5.428720] systemd[1]: Created slice user.slice - User and Session Slice.
  982. [ 5.428771] systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch.
  983. [ 5.428927] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point.
  984. [ 5.428943] systemd[1]: Expecting device dev-disk-by\x2duuid-61a29ba0\x2dbca7\x2d4622\x2d97b5\x2dc9d75f726bce.device - /dev/disk/by-uuid/61a29ba0-bca7-4622-97b5-c9d75f726bce...
  985. [ 5.428948] systemd[1]: Expecting device dev-disk-by\x2duuid-a16b7209\x2d2e63\x2d4f64\x2da438\x2de8299b9f3b5d.device - /dev/disk/by-uuid/a16b7209-2e63-4f64-a438-e8299b9f3b5d...
  986. [ 5.428952] systemd[1]: Expecting device dev-disk-by\x2duuid-ecc09b3d\x2d2916\x2d4ee6\x2da76c\x2df5d9deeca7ad.device - /dev/disk/by-uuid/ecc09b3d-2916-4ee6-a76c-f5d9deeca7ad...
  987. [ 5.428968] systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes.
  988. [ 5.428990] systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups.
  989. [ 5.428999] systemd[1]: Reached target remote-fs.target - Remote File Systems.
  990. [ 5.429007] systemd[1]: Reached target slices.target - Slice Units.
  991. [ 5.429016] systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps.
  992. [ 5.429037] systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes.
  993. [ 5.429126] systemd[1]: Listening on syslog.socket - Syslog Socket.
  994. [ 5.429630] systemd[1]: Listening on systemd-creds.socket - Credential Encryption/Decryption.
  995. [ 5.429675] systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket.
  996. [ 5.429727] systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe.
  997. [ 5.429782] systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log).
  998. [ 5.429849] systemd[1]: Listening on systemd-journald.socket - Journal Sockets.
  999. [ 5.429866] systemd[1]: systemd-pcrextend.socket - TPM PCR Measurements was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
  1000. [ 5.429876] systemd[1]: systemd-pcrlock.socket - Make TPM PCR Policy was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
  1001. [ 5.429938] systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
  1002. [ 5.429987] systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
  1003. [ 5.430824] systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System...
  1004. [ 5.431529] systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System...
  1005. [ 5.432244] systemd[1]: Mounting run-lock.mount - Legacy Locks Directory /run/lock...
  1006. [ 5.432981] systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System...
  1007. [ 5.433601] systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System...
  1008. [ 5.434854] systemd[1]: Starting systemd-journald.service - Journal Service...
  1009. [ 5.435829] systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout...
  1010. [ 5.436593] systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
  1011. [ 5.437209] systemd[1]: Starting [email protected] - Load Kernel Module configfs...
  1012. [ 5.437811] systemd[1]: Starting [email protected] - Load Kernel Module drm...
  1013. [ 5.438432] systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore...
  1014. [ 5.439083] systemd[1]: Starting [email protected] - Load Kernel Module fuse...
  1015. [ 5.439220] systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root).
  1016. [ 5.439267] systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
  1017. [ 5.440534] systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
  1018. [ 5.440547] systemd[1]: systemd-pcrmachine.service - TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
  1019. [ 5.441300] systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems...
  1020. [ 5.441342] systemd[1]: systemd-tpm2-setup-early.service - Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
  1021. [ 5.442067] systemd[1]: Starting systemd-udev-load-credentials.service - Load udev Rules from Credentials...
  1022. [ 5.442822] systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
  1023. [ 5.444767] systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System.
  1024. [ 5.445205] systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System.
  1025. [ 5.445311] systemd[1]: Mounted run-lock.mount - Legacy Locks Directory /run/lock.
  1026. [ 5.445393] systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System.
  1027. [ 5.445471] systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System.
  1028. [ 5.445704] systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
  1029. [ 5.445991] systemd[1]: [email protected]: Deactivated successfully.
  1030. [ 5.446137] systemd[1]: Finished [email protected] - Load Kernel Module configfs.
  1031. [ 5.446371] systemd[1]: [email protected]: Deactivated successfully.
  1032. [ 5.446519] systemd[1]: Finished [email protected] - Load Kernel Module drm.
  1033. [ 5.446726] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
  1034. [ 5.446865] systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore.
  1035. [ 5.447065] systemd[1]: [email protected]: Deactivated successfully.
  1036. [ 5.447198] systemd[1]: Finished [email protected] - Load Kernel Module fuse.
  1037. [ 5.448030] systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System...
  1038. [ 5.448675] systemd-journald[492]: Collecting audit messages is disabled.
  1039. [ 5.448710] systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System...
  1040. [ 5.449565] systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully...
  1041. [ 5.452262] systemd[1]: Finished systemd-udev-load-credentials.service - Load udev Rules from Credentials.
  1042. [ 5.453354] systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System.
  1043. [ 5.453479] systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System.
  1044. [ 5.453795] lp: driver loaded but no devices found
  1045. [ 5.456255] ppdev: user-space parallel port driver
  1046. [ 5.460448] EXT4-fs (sda1): re-mounted af267def-decd-40dc-a20d-9be004c06599 r/w. Quota mode: none.
  1047. [ 5.461539] systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems.
  1048. [ 5.461847] systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of an unmet condition check (ConditionNeedsUpdate=/etc).
  1049. [ 5.461881] systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
  1050. [ 5.462696] systemd[1]: Starting systemd-random-seed.service - Load/Save OS Random Seed...
  1051. [ 5.462711] systemd[1]: systemd-tpm2-setup.service - TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
  1052. [ 5.469255] systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully.
  1053. [ 5.469362] systemd[1]: systemd-sysusers.service - Create System Users was skipped because no trigger condition checks were met.
  1054. [ 5.470087] systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
  1055. [ 5.472473] systemd[1]: Finished systemd-random-seed.service - Load/Save OS Random Seed.
  1056. [ 5.477320] systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
  1057. [ 5.478169] systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
  1058. [ 5.478369] systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
  1059. [ 5.479271] systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
  1060. [ 5.479654] systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout.
  1061. [ 5.479721] systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems.
  1062. [ 5.490905] systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
  1063. [ 5.501214] systemd[1]: Started systemd-journald.service - Journal Service.
  1064. [ 5.525808] systemd-journald[492]: Received client request to flush runtime journal.
  1065. [ 5.693729] RAPL PMU: API unit is 2^-32 Joules, 1 fixed counters, 163840 ms ovfl timer
  1066. [ 5.693735] RAPL PMU: hw unit of domain package 2^-16 Joules
  1067. [ 5.695924] piix4_smbus 0000:00:14.0: SMBus Host Controller at 0xb00, revision 0
  1068. [ 5.695930] piix4_smbus 0000:00:14.0: Using register 0x02 for SMBus port selection
  1069. [ 5.697006] mc: Linux media interface: v0.10
  1070. [ 5.698015] ccp 0000:0a:00.2: ccp: unable to access the device: you might be running a broken BIOS.
  1071. [ 5.698713] i2c i2c-0: Successfully instantiated SPD at 0x52
  1072. [ 5.699299] ccp 0000:0a:00.2: tee enabled
  1073. [ 5.699340] i2c i2c-0: Successfully instantiated SPD at 0x53
  1074. [ 5.699508] ccp 0000:0a:00.2: psp enabled
  1075. [ 5.699587] piix4_smbus 0000:00:14.0: Auxiliary SMBus Host Controller at 0xb20
  1076. [ 5.719281] asus_wmi: ASUS WMI generic driver loaded
  1077. [ 5.748064] videodev: Linux video capture interface: v2.00
  1078. [ 5.768068] asus_wmi: Initialization: 0x0
  1079. [ 5.768128] asus_wmi: BIOS WMI version: 0.9
  1080. [ 5.768469] asus_wmi: SFUN value: 0x0
  1081. [ 5.768479] eeepc-wmi eeepc-wmi: Detected ASUSWMI, use DCTS
  1082. [ 5.771807] ee1004 0-0052: 512 byte EE1004-compliant SPD EEPROM, read-only
  1083. [ 5.772345] Adding 4881404k swap on /dev/sda6. Priority:-2 extents:1 across:4881404k SS
  1084. [ 5.773424] input: Eee PC WMI hotkeys as /devices/platform/eeepc-wmi/input/input6
  1085. [ 5.774231] ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only
  1086. [ 5.777563] kvm_amd: TSC scaling supported
  1087. [ 5.777566] kvm_amd: Nested Virtualization enabled
  1088. [ 5.777569] kvm_amd: Nested Paging enabled
  1089. [ 5.777571] kvm_amd: LBR virtualization supported
  1090. [ 5.777588] kvm_amd: Virtual VMLOAD VMSAVE supported
  1091. [ 5.777590] kvm_amd: Virtual GIF supported
  1092. [ 5.785746] MCE: In-kernel MCE decoding enabled.
  1093. [ 5.786178] usb 1-1.1: Found UVC 1.00 device HD Web Camera (05a3:9331)
  1094. [ 5.832804] intel_rapl_common: Found RAPL domain package
  1095. [ 5.832808] intel_rapl_common: Found RAPL domain core
  1096. [ 5.834820] amd_atl: AMD Address Translation Library initialized
  1097. [ 5.836630] snd_hda_intel 0000:0a:00.1: Handle vga_switcheroo audio client
  1098. [ 5.843586] input: HD-Audio Generic HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:08.1/0000:0a:00.1/sound/card0/input7
  1099. [ 5.859518] snd_hda_codec_realtek hdaudioC1D0: autoconfig for ALC897: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line
  1100. [ 5.859523] snd_hda_codec_realtek hdaudioC1D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0)
  1101. [ 5.859525] snd_hda_codec_realtek hdaudioC1D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0)
  1102. [ 5.859527] snd_hda_codec_realtek hdaudioC1D0: mono: mono_out=0x0
  1103. [ 5.859529] snd_hda_codec_realtek hdaudioC1D0: dig-out=0x11/0x0
  1104. [ 5.859530] snd_hda_codec_realtek hdaudioC1D0: inputs:
  1105. [ 5.859533] snd_hda_codec_realtek hdaudioC1D0: Rear Mic=0x18
  1106. [ 5.859534] snd_hda_codec_realtek hdaudioC1D0: Front Mic=0x19
  1107. [ 5.859536] snd_hda_codec_realtek hdaudioC1D0: Line=0x1a
  1108. [ 5.880351] input: HD-Audio Generic Rear Mic as /devices/pci0000:00/0000:00:08.1/0000:0a:00.6/sound/card1/input8
  1109. [ 5.880411] input: HD-Audio Generic Front Mic as /devices/pci0000:00/0000:00:08.1/0000:0a:00.6/sound/card1/input9
  1110. [ 5.880474] input: HD-Audio Generic Line as /devices/pci0000:00/0000:00:08.1/0000:0a:00.6/sound/card1/input10
  1111. [ 5.880567] input: HD-Audio Generic Line Out as /devices/pci0000:00/0000:00:08.1/0000:0a:00.6/sound/card1/input11
  1112. [ 5.880631] input: HD-Audio Generic Front Headphone as /devices/pci0000:00/0000:00:08.1/0000:0a:00.6/sound/card1/input12
  1113. [ 5.945256] usbcore: registered new interface driver uvcvideo
  1114. [ 6.146018] usb 1-1.1: Warning! Unlikely big volume range (=3072), cval->res is probably wrong.
  1115. [ 6.146022] usb 1-1.1: [6] FU [Mic Capture Volume] ch = 1, val = -1536/1536/1
  1116. [ 6.146252] usbcore: registered new interface driver snd-usb-audio
  1117. [ 7.559555] [drm] amdgpu kernel modesetting enabled.
  1118. [ 7.563405] BTRFS: device fsid 61a29ba0-bca7-4622-97b5-c9d75f726bce devid 1 transid 451946 /dev/sda5 (8:5) scanned by mount (1194)
  1119. [ 7.566355] BTRFS info (device sda5): first mount of filesystem 61a29ba0-bca7-4622-97b5-c9d75f726bce
  1120. [ 7.566376] BTRFS info (device sda5): using crc32c (crc32c-intel) checksum algorithm
  1121. [ 7.566383] BTRFS info (device sda5): disk space caching is enabled
  1122. [ 7.566385] BTRFS warning (device sda5): space cache v1 is being deprecated and will be removed in a future release, please use -o space_cache=v2
  1123. [ 7.568121] loop0: detected capacity change from 0 to 8
  1124. [ 7.568547] loop1: detected capacity change from 0 to 346704
  1125. [ 7.569172] loop2: detected capacity change from 0 to 354656
  1126. [ 7.570667] loop3: detected capacity change from 0 to 130960
  1127. [ 7.572608] loop4: detected capacity change from 0 to 131016
  1128. [ 7.572776] amdgpu: Virtual CRAT table created for CPU
  1129. [ 7.572797] amdgpu: Topology: Add CPU node
  1130. [ 7.573015] [drm] initializing kernel modesetting (RENOIR 0x1002:0x1638 0x1043:0x8809 0xC9).
  1131. [ 7.573030] [drm] register mmio base: 0xFCD00000
  1132. [ 7.573032] [drm] register mmio size: 524288
  1133. [ 7.573954] loop5: detected capacity change from 0 to 152112
  1134. [ 7.575770] loop6: detected capacity change from 0 to 152056
  1135. [ 7.576610] [drm] add ip block number 0 <soc15_common>
  1136. [ 7.576613] [drm] add ip block number 1 <gmc_v9_0>
  1137. [ 7.576615] [drm] add ip block number 2 <vega10_ih>
  1138. [ 7.576616] [drm] add ip block number 3 <psp>
  1139. [ 7.576618] [drm] add ip block number 4 <smu>
  1140. [ 7.576620] [drm] add ip block number 5 <dm>
  1141. [ 7.576622] [drm] add ip block number 6 <gfx_v9_0>
  1142. [ 7.576623] [drm] add ip block number 7 <sdma_v4_0>
  1143. [ 7.576625] [drm] add ip block number 8 <vcn_v2_0>
  1144. [ 7.576627] [drm] add ip block number 9 <jpeg_v2_0>
  1145. [ 7.576929] loop7: detected capacity change from 0 to 135512
  1146. [ 7.578266] loop8: detected capacity change from 0 to 136248
  1147. [ 7.579908] loop9: detected capacity change from 0 to 138768
  1148. [ 7.581255] loop10: detected capacity change from 0 to 555776
  1149. [ 7.582801] [drm] BIOS signature incorrect 0 0
  1150. [ 7.582835] amdgpu 0000:0a:00.0: amdgpu: Fetched VBIOS from ROM BAR
  1151. [ 7.582840] amdgpu: ATOM BIOS: 113-CEZANNE-018
  1152. [ 7.583428] loop11: detected capacity change from 0 to 563320
  1153. [ 7.587033] loop12: detected capacity change from 0 to 716168
  1154. [ 7.588409] loop13: detected capacity change from 0 to 716176
  1155. [ 7.590085] loop14: detected capacity change from 0 to 1017816
  1156. [ 7.590570] loop15: detected capacity change from 0 to 1034424
  1157. [ 7.593567] loop16: detected capacity change from 0 to 832024
  1158. [ 7.594585] loop17: detected capacity change from 0 to 187776
  1159. [ 7.597969] loop18: detected capacity change from 0 to 433128
  1160. [ 7.599088] loop19: detected capacity change from 0 to 79328
  1161. [ 7.601201] loop20: detected capacity change from 0 to 79520
  1162. [ 7.602641] loop21: detected capacity change from 0 to 306760
  1163. [ 7.603668] loop22: detected capacity change from 0 to 306760
  1164. [ 7.623768] amdgpu 0000:0a:00.0: vgaarb: deactivate vga console
  1165. [ 7.623773] amdgpu 0000:0a:00.0: amdgpu: Trusted Memory Zone (TMZ) feature enabled
  1166. [ 7.623778] amdgpu 0000:0a:00.0: amdgpu: MODE2 reset
  1167. [ 7.623886] [drm] vm size is 262144 GB, 4 levels, block size is 9-bit, fragment size is 9-bit
  1168. [ 7.623895] amdgpu 0000:0a:00.0: amdgpu: VRAM: 512M 0x000000F400000000 - 0x000000F41FFFFFFF (512M used)
  1169. [ 7.623899] amdgpu 0000:0a:00.0: amdgpu: GART: 1024M 0x0000000000000000 - 0x000000003FFFFFFF
  1170. [ 7.623907] [drm] Detected VRAM RAM=512M, BAR=512M
  1171. [ 7.623909] [drm] RAM width 128bits DDR4
  1172. [ 7.624000] [drm] amdgpu: 512M of VRAM memory ready
  1173. [ 7.624002] [drm] amdgpu: 7635M of GTT memory ready.
  1174. [ 7.624019] [drm] GART: num cpu pages 262144, num gpu pages 262144
  1175. [ 7.624165] [drm] PCIE GART of 1024M enabled.
  1176. [ 7.624167] [drm] PTB located at 0x000000F41FC00000
  1177. [ 7.624761] [drm] Loading DMUB firmware via PSP: version=0x0101002B
  1178. [ 7.625368] [drm] Found VCN firmware Version ENC: 1.21 DEC: 7 VEP: 0 Revision: 3
  1179. [ 8.351931] amdgpu 0000:0a:00.0: amdgpu: reserve 0x400000 from 0xf41f800000 for PSP TMR
  1180. [ 8.354811] EXT4-fs (sda7): mounted filesystem a16b7209-2e63-4f64-a438-e8299b9f3b5d r/w with ordered data mode. Quota mode: none.
  1181. [ 8.408795] audit: type=1400 audit(1727790272.345:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ch-checkns" pid=1309 comm="apparmor_parser"
  1182. [ 8.409200] audit: type=1400 audit(1727790272.345:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="1password" pid=1298 comm="apparmor_parser"
  1183. [ 8.409204] audit: type=1400 audit(1727790272.345:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="cam" pid=1308 comm="apparmor_parser"
  1184. [ 8.409207] audit: type=1400 audit(1727790272.345:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="buildah" pid=1306 comm="apparmor_parser"
  1185. [ 8.409209] audit: type=1400 audit(1727790272.345:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="busybox" pid=1307 comm="apparmor_parser"
  1186. [ 8.409211] audit: type=1400 audit(1727790272.345:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name=4D6F6E676F444220436F6D70617373 pid=1301 comm="apparmor_parser"
  1187. [ 8.409213] audit: type=1400 audit(1727790272.345:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="brave" pid=1305 comm="apparmor_parser"
  1188. [ 8.409215] audit: type=1400 audit(1727790272.345:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="Discord" pid=1300 comm="apparmor_parser"
  1189. [ 8.409216] audit: type=1400 audit(1727790272.345:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="balena-etcher" pid=1304 comm="apparmor_parser"
  1190. [ 8.409219] audit: type=1400 audit(1727790272.345:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="QtWebEngineProcess" pid=1302 comm="apparmor_parser"
  1191. [ 8.443336] amdgpu 0000:0a:00.0: amdgpu: RAS: optional ras ta ucode is not available
  1192. [ 8.454645] amdgpu 0000:0a:00.0: amdgpu: RAP: optional rap ta ucode is not available
  1193. [ 8.454649] amdgpu 0000:0a:00.0: amdgpu: SECUREDISPLAY: securedisplay ta ucode is not available
  1194. [ 8.455432] amdgpu 0000:0a:00.0: amdgpu: SMU is initialized successfully!
  1195. [ 8.456534] [drm] Display Core v3.2.291 initialized on DCN 2.1
  1196. [ 8.456537] [drm] DP-HDMI FRL PCON supported
  1197. [ 8.457091] [drm] DMUB hardware initialized: version=0x0101002B
  1198. [ 8.485415] snd_hda_intel 0000:0a:00.1: bound 0000:0a:00.0 (ops amdgpu_dm_audio_component_bind_ops [amdgpu])
  1199. [ 8.516364] [drm] kiq ring mec 2 pipe 1 q 0
  1200. [ 8.520423] kfd kfd: amdgpu: Allocated 3969056 bytes on gart
  1201. [ 8.520448] kfd kfd: amdgpu: Total number of KFD nodes to be created: 1
  1202. [ 8.520592] amdgpu: Virtual CRAT table created for GPU
  1203. [ 8.520730] amdgpu: Topology: Add dGPU node [0x1638:0x1002]
  1204. [ 8.520735] kfd kfd: amdgpu: added device 1002:1638
  1205. [ 8.520749] amdgpu 0000:0a:00.0: amdgpu: SE 1, SH per SE 1, CU per SH 8, active_cu_number 7
  1206. [ 8.520755] amdgpu 0000:0a:00.0: amdgpu: ring gfx uses VM inv eng 0 on hub 0
  1207. [ 8.520758] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.0.0 uses VM inv eng 1 on hub 0
  1208. [ 8.520761] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.1.0 uses VM inv eng 4 on hub 0
  1209. [ 8.520763] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.2.0 uses VM inv eng 5 on hub 0
  1210. [ 8.520765] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.3.0 uses VM inv eng 6 on hub 0
  1211. [ 8.520768] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.0.1 uses VM inv eng 7 on hub 0
  1212. [ 8.520770] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.1.1 uses VM inv eng 8 on hub 0
  1213. [ 8.520772] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.2.1 uses VM inv eng 9 on hub 0
  1214. [ 8.520774] amdgpu 0000:0a:00.0: amdgpu: ring comp_1.3.1 uses VM inv eng 10 on hub 0
  1215. [ 8.520776] amdgpu 0000:0a:00.0: amdgpu: ring kiq_0.2.1.0 uses VM inv eng 11 on hub 0
  1216. [ 8.520778] amdgpu 0000:0a:00.0: amdgpu: ring sdma0 uses VM inv eng 0 on hub 8
  1217. [ 8.520781] amdgpu 0000:0a:00.0: amdgpu: ring vcn_dec uses VM inv eng 1 on hub 8
  1218. [ 8.520783] amdgpu 0000:0a:00.0: amdgpu: ring vcn_enc0 uses VM inv eng 4 on hub 8
  1219. [ 8.520785] amdgpu 0000:0a:00.0: amdgpu: ring vcn_enc1 uses VM inv eng 5 on hub 8
  1220. [ 8.520787] amdgpu 0000:0a:00.0: amdgpu: ring jpeg_dec uses VM inv eng 6 on hub 8
  1221. [ 8.525828] amdgpu 0000:0a:00.0: amdgpu: Runtime PM not available
  1222. [ 8.526416] [drm] Initialized amdgpu 3.58.0 for 0000:0a:00.0 on minor 1
  1223. [ 8.534309] fbcon: amdgpudrmfb (fb0) is primary device
  1224. [ 8.534314] fbcon: Deferring console take-over
  1225. [ 8.534319] amdgpu 0000:0a:00.0: [drm] fb0: amdgpudrmfb frame buffer device
  1226. [ 8.566789] [drm] DSC precompute is not needed.
  1227. [ 8.819366] NET: Registered PF_QIPCRTR protocol family
  1228. [ 8.820411] loop23: detected capacity change from 0 to 8
  1229. [ 9.377250] Generic FE-GE Realtek PHY r8169-0-900:00: attached PHY driver (mii_bus:phy_addr=r8169-0-900:00, irq=MAC)
  1230. [ 9.541669] r8169 0000:09:00.0 enp9s0: Link is Down
  1231. [ 12.077314] r8169 0000:09:00.0 enp9s0: Link is Up - 1Gbps/Full - flow control rx/tx
  1232. [ 12.282133] vboxdrv: loading out-of-tree module taints kernel.
  1233. [ 12.282138] vboxdrv: module verification failed: signature and/or required key missing - tainting kernel
  1234. [ 12.291252] vboxdrv: Found 12 processor cores/threads
  1235. [ 12.307409] vboxdrv: TSC mode is Invariant, tentative frequency 3892680038 Hz
  1236. [ 12.307413] vboxdrv: Successfully loaded version 7.0.20_Ubuntu r163906 (interface 0x00330004)
  1237. [ 12.314540] VBoxNetFlt: Successfully started.
  1238. [ 12.320174] VBoxNetAdp: Successfully started.
  1239. [ 18.708887] kauditd_printk_skb: 1202 callbacks suppressed
  1240. [ 18.708892] audit: type=1400 audit(1727790282.645:1213): apparmor="ALLOWED" operation="file_lock" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.db" pid=1902 comm="Xorg" requested_mask="wk" denied_mask="wk" fsuid=0 ouid=0
  1241. [ 18.708897] audit: type=1400 audit(1727790282.645:1214): apparmor="ALLOWED" operation="file_lock" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.idx" pid=1902 comm="Xorg" requested_mask="wk" denied_mask="wk" fsuid=0 ouid=0
  1242. [ 18.708900] audit: type=1400 audit(1727790282.645:1215): apparmor="ALLOWED" operation="file_perm" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.db" pid=1902 comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
  1243. [ 18.708902] audit: type=1400 audit(1727790282.645:1216): apparmor="ALLOWED" operation="file_perm" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.idx" pid=1902 comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
  1244. [ 18.708921] audit: type=1400 audit(1727790282.645:1217): apparmor="ALLOWED" operation="file_perm" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.idx" pid=1902 comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
  1245. [ 18.708924] audit: type=1400 audit(1727790282.645:1218): apparmor="ALLOWED" operation="file_perm" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.idx" pid=1902 comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
  1246. [ 18.708932] audit: type=1400 audit(1727790282.645:1219): apparmor="ALLOWED" operation="file_perm" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.idx" pid=1902 comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
  1247. [ 18.708934] audit: type=1400 audit(1727790282.645:1220): apparmor="ALLOWED" operation="file_perm" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.db" pid=1902 comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
  1248. [ 18.708954] audit: type=1400 audit(1727790282.645:1221): apparmor="ALLOWED" operation="file_perm" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.idx" pid=1902 comm="Xorg" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
  1249. [ 18.708960] audit: type=1400 audit(1727790282.645:1222): apparmor="ALLOWED" operation="file_lock" class="file" profile="Xorg" name="/root/.cache/mesa_shader_cache_db/part0/mesa_cache.idx" pid=1902 comm="Xorg" requested_mask="k" denied_mask="k" fsuid=0 ouid=0
  1250. [ 29.858430] kauditd_printk_skb: 23 callbacks suppressed
  1251. [ 29.858434] audit: type=1400 audit(1727790293.795:1246): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3719 comm="snap-confine" capability=12 capname="net_admin"
  1252. [ 29.858445] audit: type=1400 audit(1727790293.795:1247): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=3719 comm="snap-confine" capability=38 capname="perfmon"
  1253. [ 30.086037] audit: type=1400 audit(1727790294.022:1248): apparmor="DENIED" operation="open" class="file" profile="snap-update-ns.firefox" name="/usr/local/share/" pid=3735 comm="5" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
  1254. [ 30.140573] audit: type=1400 audit(1727790294.077:1249): apparmor="DENIED" operation="open" class="file" profile="snap-update-ns.firefox" name="/proc/3747/maps" pid=3747 comm="5" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1255. [ 31.614309] audit: type=1107 audit(1727790295.551:1250): pid=1508 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/timedate1" interface="org.freedesktop.DBus.Properties" member="GetAll" mask="send" name=":1.15" pid=3719 label="snap.firefox.firefox" peer_pid=1764 peer_label="unconfined"
  1256. exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
  1257. [ 69.510918] systemd-journald[492]: Time jumped backwards, rotating.
  1258. [ 115.254069] audit: type=1400 audit(1727790378.335:1251): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1259. [ 115.254090] audit: type=1400 audit(1727790378.335:1252): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1260. [ 115.254100] audit: type=1400 audit(1727790378.335:1253): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1261. [ 115.292033] audit: type=1400 audit(1727790378.373:1254): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1262. [ 115.292054] audit: type=1400 audit(1727790378.373:1255): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1263. [ 115.292061] audit: type=1400 audit(1727790378.373:1256): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1264. [ 115.292128] audit: type=1400 audit(1727790378.373:1257): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1265. [ 115.292143] audit: type=1400 audit(1727790378.373:1258): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1266. [ 115.292146] audit: type=1400 audit(1727790378.373:1259): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1267. [ 115.303379] audit: type=1400 audit(1727790378.384:1260): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kcminputrc" pid=5224 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1268. [ 309.633244] kauditd_printk_skb: 775 callbacks suppressed
  1269. [ 309.633248] audit: type=1107 audit(1727790572.715:2036): pid=1508 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_method_call" bus="system" path="/org/freedesktop/timedate1" interface="org.freedesktop.DBus.Properties" member="GetAll" mask="send" name=":1.121" pid=3719 label="snap.firefox.firefox" peer_pid=5855 peer_label="unconfined"
  1270. exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
  1271. [ 344.643267] audit: type=1400 audit(1727790607.724:2037): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1272. [ 344.643287] audit: type=1400 audit(1727790607.724:2038): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1273. [ 344.643296] audit: type=1400 audit(1727790607.724:2039): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1274. [ 344.670915] audit: type=1400 audit(1727790607.752:2040): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1275. [ 344.670929] audit: type=1400 audit(1727790607.752:2041): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1276. [ 344.670937] audit: type=1400 audit(1727790607.752:2042): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1277. [ 344.670985] audit: type=1400 audit(1727790607.752:2043): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1278. [ 344.670995] audit: type=1400 audit(1727790607.752:2044): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1279. [ 344.670998] audit: type=1400 audit(1727790607.752:2045): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1280. [ 344.680819] audit: type=1400 audit(1727790607.762:2046): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kcminputrc" pid=6228 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1281. [ 363.354503] kauditd_printk_skb: 775 callbacks suppressed
  1282. [ 363.354507] audit: type=1400 audit(1727790626.436:2822): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1283. [ 363.354522] audit: type=1400 audit(1727790626.436:2823): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1284. [ 363.354532] audit: type=1400 audit(1727790626.436:2824): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1285. [ 363.382081] audit: type=1400 audit(1727790626.464:2825): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1286. [ 363.382088] audit: type=1400 audit(1727790626.464:2826): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1287. [ 363.382090] audit: type=1400 audit(1727790626.464:2827): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1288. [ 363.382148] audit: type=1400 audit(1727790626.464:2828): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1289. [ 363.382152] audit: type=1400 audit(1727790626.464:2829): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1290. [ 363.382155] audit: type=1400 audit(1727790626.464:2830): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1291. [ 363.392237] audit: type=1400 audit(1727790626.474:2831): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kcminputrc" pid=6392 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1292. [ 490.600223] kauditd_printk_skb: 775 callbacks suppressed
  1293. [ 490.600227] audit: type=1400 audit(1727790753.681:3607): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1294. [ 490.600243] audit: type=1400 audit(1727790753.681:3608): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1295. [ 490.600251] audit: type=1400 audit(1727790753.681:3609): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1296. [ 490.628405] audit: type=1400 audit(1727790753.709:3610): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1297. [ 490.628417] audit: type=1400 audit(1727790753.709:3611): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1298. [ 490.628421] audit: type=1400 audit(1727790753.709:3612): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1299. [ 490.628469] audit: type=1400 audit(1727790753.709:3613): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1300. [ 490.628479] audit: type=1400 audit(1727790753.709:3614): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1301. [ 490.628482] audit: type=1400 audit(1727790753.709:3615): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1302. [ 490.638728] audit: type=1400 audit(1727790753.720:3616): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kcminputrc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1303. [ 691.354674] kauditd_printk_skb: 775 callbacks suppressed
  1304. [ 691.354678] audit: type=1400 audit(1727790954.436:4392): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7550 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1305. [ 691.354682] audit: type=1400 audit(1727790954.436:4393): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7550 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1306. [ 691.354685] audit: type=1400 audit(1727790954.436:4394): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7550 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1307. [ 691.354727] audit: type=1400 audit(1727790954.436:4395): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7550 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1308. [ 691.354732] audit: type=1400 audit(1727790954.436:4396): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7550 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1309. [ 691.354735] audit: type=1400 audit(1727790954.436:4397): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7550 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1310. [ 691.354737] audit: type=1400 audit(1727790954.436:4398): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7550 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1311. [ 706.163610] audit: type=1400 audit(1727790969.245:4399): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7623 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1312. [ 706.163617] audit: type=1400 audit(1727790969.245:4400): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7623 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1313. [ 706.163620] audit: type=1400 audit(1727790969.245:4401): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7623 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1314. [ 706.163652] audit: type=1400 audit(1727790969.245:4402): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7623 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1315. [ 706.163655] audit: type=1400 audit(1727790969.245:4403): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7623 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1316. [ 706.163660] audit: type=1400 audit(1727790969.245:4404): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7623 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1317. [ 706.163663] audit: type=1400 audit(1727790969.245:4405): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7623 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1318. [ 714.634004] audit: type=1400 audit(1727790977.716:4406): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7647 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1319. [ 714.634011] audit: type=1400 audit(1727790977.716:4407): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7647 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1320. [ 714.634014] audit: type=1400 audit(1727790977.716:4408): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7647 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1321. [ 714.634039] audit: type=1400 audit(1727790977.716:4409): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7647 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1322. [ 714.634042] audit: type=1400 audit(1727790977.716:4410): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7647 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1323. [ 714.634050] audit: type=1400 audit(1727790977.716:4411): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7647 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1324. [ 714.634053] audit: type=1400 audit(1727790977.716:4412): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7647 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1325. [ 720.822687] audit: type=1400 audit(1727790983.905:4413): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7698 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1326. [ 720.822694] audit: type=1400 audit(1727790983.905:4414): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7698 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1327. [ 720.822697] audit: type=1400 audit(1727790983.905:4415): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7698 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1328. [ 720.822741] audit: type=1400 audit(1727790983.905:4416): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7698 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1329. [ 720.822746] audit: type=1400 audit(1727790983.905:4417): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7698 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1330. [ 720.822748] audit: type=1400 audit(1727790983.905:4418): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7698 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1331. [ 720.822751] audit: type=1400 audit(1727790983.905:4419): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7698 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1332. [ 746.979556] audit: type=1400 audit(1727791010.062:4420): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7854 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1333. [ 746.979562] audit: type=1400 audit(1727791010.062:4421): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7854 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1334. [ 746.979564] audit: type=1400 audit(1727791010.062:4422): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7854 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1335. [ 746.979596] audit: type=1400 audit(1727791010.062:4423): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7854 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1336. [ 746.979598] audit: type=1400 audit(1727791010.062:4424): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7854 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1337. [ 746.979605] audit: type=1400 audit(1727791010.062:4425): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7854 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1338. [ 746.979607] audit: type=1400 audit(1727791010.062:4426): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7854 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1339. [ 752.072119] audit: type=1400 audit(1727791015.154:4427): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7888 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1340. [ 752.072130] audit: type=1400 audit(1727791015.154:4428): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7888 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1341. [ 752.072133] audit: type=1400 audit(1727791015.154:4429): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7888 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1342. [ 752.072164] audit: type=1400 audit(1727791015.155:4430): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7888 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1343. [ 752.072167] audit: type=1400 audit(1727791015.155:4431): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7888 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1344. [ 752.072174] audit: type=1400 audit(1727791015.155:4432): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7888 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1345. [ 752.072177] audit: type=1400 audit(1727791015.155:4433): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7888 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1346. [ 755.982789] audit: type=1400 audit(1727791019.065:4434): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7925 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1347. [ 755.982795] audit: type=1400 audit(1727791019.065:4435): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7925 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1348. [ 755.982803] audit: type=1400 audit(1727791019.065:4436): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7925 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1349. [ 760.513482] kauditd_printk_skb: 4 callbacks suppressed
  1350. [ 760.513486] audit: type=1400 audit(1727791023.596:4441): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7958 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1351. [ 760.513491] audit: type=1400 audit(1727791023.596:4442): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7958 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1352. [ 760.513493] audit: type=1400 audit(1727791023.596:4443): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7958 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1353. [ 760.513520] audit: type=1400 audit(1727791023.596:4444): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7958 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1354. [ 760.513523] audit: type=1400 audit(1727791023.596:4445): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7958 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1355. [ 760.513530] audit: type=1400 audit(1727791023.596:4446): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7958 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1356. [ 760.513532] audit: type=1400 audit(1727791023.596:4447): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7958 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1357. [ 769.713658] audit: type=1400 audit(1727791032.796:4448): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7993 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1358. [ 769.713664] audit: type=1400 audit(1727791032.796:4449): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7993 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1359. [ 769.713667] audit: type=1400 audit(1727791032.796:4450): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7993 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1360. [ 769.713700] audit: type=1400 audit(1727791032.796:4451): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7993 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1361. [ 769.713702] audit: type=1400 audit(1727791032.796:4452): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7993 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1362. [ 769.713710] audit: type=1400 audit(1727791032.796:4453): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7993 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1363. [ 769.713712] audit: type=1400 audit(1727791032.796:4454): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=7993 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1364. [ 787.955466] audit: type=1400 audit(1727791051.038:4455): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8049 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1365. [ 787.955472] audit: type=1400 audit(1727791051.038:4456): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8049 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1366. [ 787.955475] audit: type=1400 audit(1727791051.038:4457): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8049 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1367. [ 787.955507] audit: type=1400 audit(1727791051.038:4458): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8049 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1368. [ 787.955510] audit: type=1400 audit(1727791051.038:4459): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8049 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1369. [ 787.955517] audit: type=1400 audit(1727791051.038:4460): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8049 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1370. [ 787.955520] audit: type=1400 audit(1727791051.038:4461): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8049 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1371. [ 803.856002] audit: type=1400 audit(1727791066.939:4462): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8117 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1372. [ 803.856008] audit: type=1400 audit(1727791066.939:4463): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8117 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1373. [ 803.856011] audit: type=1400 audit(1727791066.939:4464): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8117 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1374. [ 803.856041] audit: type=1400 audit(1727791066.939:4465): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8117 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1375. [ 803.856044] audit: type=1400 audit(1727791066.939:4466): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8117 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1376. [ 803.856049] audit: type=1400 audit(1727791066.939:4467): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8117 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1377. [ 803.856052] audit: type=1400 audit(1727791066.939:4468): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8117 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1378. [ 819.444867] audit: type=1400 audit(1727791082.528:4469): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8214 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1379. [ 819.444873] audit: type=1400 audit(1727791082.528:4470): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8214 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1380. [ 819.444876] audit: type=1400 audit(1727791082.528:4471): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8214 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1381. [ 819.444901] audit: type=1400 audit(1727791082.528:4472): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8214 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1382. [ 819.444904] audit: type=1400 audit(1727791082.528:4473): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8214 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1383. [ 819.444911] audit: type=1400 audit(1727791082.528:4474): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8214 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1384. [ 819.444914] audit: type=1400 audit(1727791082.528:4475): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8214 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1385. [ 835.697081] audit: type=1400 audit(1727791098.780:4476): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8309 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1386. [ 835.697088] audit: type=1400 audit(1727791098.780:4477): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8309 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1387. [ 835.697091] audit: type=1400 audit(1727791098.780:4478): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8309 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1388. [ 835.697119] audit: type=1400 audit(1727791098.780:4479): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8309 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1389. [ 835.697121] audit: type=1400 audit(1727791098.780:4480): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8309 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1390. [ 835.697127] audit: type=1400 audit(1727791098.780:4481): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8309 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1391. [ 835.697129] audit: type=1400 audit(1727791098.780:4482): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8309 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1392. [ 1199.282821] audit: type=1400 audit(1727791462.367:4483): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8783 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1393. [ 1199.282827] audit: type=1400 audit(1727791462.367:4484): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8783 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1394. [ 1199.282830] audit: type=1400 audit(1727791462.367:4485): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8783 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1395. [ 1199.282862] audit: type=1400 audit(1727791462.367:4486): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8783 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1396. [ 1199.282865] audit: type=1400 audit(1727791462.367:4487): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8783 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1397. [ 1199.282871] audit: type=1400 audit(1727791462.367:4488): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8783 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1398. [ 1199.282874] audit: type=1400 audit(1727791462.367:4489): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8783 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1399. [ 1222.490602] audit: type=1400 audit(1727791485.575:4490): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8830 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1400. [ 1222.490608] audit: type=1400 audit(1727791485.575:4491): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8830 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1401. [ 1222.490611] audit: type=1400 audit(1727791485.575:4492): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8830 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1402. [ 1222.490638] audit: type=1400 audit(1727791485.575:4493): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8830 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1403. [ 1222.490641] audit: type=1400 audit(1727791485.575:4494): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8830 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1404. [ 1222.490643] audit: type=1400 audit(1727791485.575:4495): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8830 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1405. [ 1222.490646] audit: type=1400 audit(1727791485.575:4496): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=8830 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1406. [ 1891.588391] clocksource: timekeeping watchdog on CPU2: Marking clocksource 'tsc' as unstable because the skew is too large:
  1407. [ 1891.588413] clocksource: 'hpet' wd_nsec: 503012393 wd_now: 4e68e897 wd_last: 4dfb02e9 mask: ffffffff
  1408. [ 1891.588418] clocksource: 'tsc' cs_nsec: 504161088 cs_now: 6c0fe9c7bd0 cs_last: 6c089a27e7c mask: ffffffffffffffff
  1409. [ 1891.588422] clocksource: Clocksource 'tsc' skewed 1148695 ns (1 ms) over watchdog 'hpet' interval of 503012393 ns (503 ms)
  1410. [ 1891.588427] clocksource: 'tsc' is current clocksource.
  1411. [ 1891.588433] tsc: Marking TSC unstable due to clocksource watchdog
  1412. [ 1891.588450] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'.
  1413. [ 1891.588452] sched_clock: Marking unstable (1891591238463, -2786684)<-(1891753185559, -164735553)
  1414. [ 1891.588637] clocksource: Checking clocksource tsc synchronization from CPU 9 to CPUs 0,2,5-6,8,11.
  1415. [ 1891.588691] clocksource: Switched to clocksource hpet
  1416. [ 2053.790000] audit: type=1400 audit(1727792316.877:4497): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=9625 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1417. [ 2053.790006] audit: type=1400 audit(1727792316.877:4498): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=9625 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1418. [ 2053.790009] audit: type=1400 audit(1727792316.877:4499): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=9625 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1419. [ 2053.790041] audit: type=1400 audit(1727792316.877:4500): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=9625 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1420. [ 2053.790043] audit: type=1400 audit(1727792316.877:4501): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=9625 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1421. [ 2053.790046] audit: type=1400 audit(1727792316.877:4502): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=9625 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1422. [ 2053.790048] audit: type=1400 audit(1727792316.877:4503): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=9625 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1423. [ 2528.122857] audit: type=1400 audit(1727792791.209:4504): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1424. [ 2528.122865] audit: type=1400 audit(1727792791.209:4505): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1425. [ 2528.122868] audit: type=1400 audit(1727792791.209:4506): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1426. [ 2528.132139] audit: type=1400 audit(1727792791.218:4507): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1427. [ 2528.132145] audit: type=1400 audit(1727792791.218:4508): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1428. [ 2528.132148] audit: type=1400 audit(1727792791.218:4509): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1429. [ 2528.220837] audit: type=1400 audit(1727792791.307:4510): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/7150/mountinfo" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1430. [ 2528.220843] audit: type=1400 audit(1727792791.307:4511): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/7150/mountinfo" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1431. [ 2528.220907] audit: type=1400 audit(1727792791.307:4512): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/7150/mountinfo" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1432. [ 2528.220930] audit: type=1400 audit(1727792791.307:4513): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/7150/mountinfo" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1433. [ 2533.374948] kauditd_printk_skb: 8970 callbacks suppressed
  1434. [ 2533.374952] audit: type=1400 audit(1727792796.461:13484): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1435. [ 2533.374957] audit: type=1400 audit(1727792796.461:13485): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1436. [ 2533.374983] audit: type=1400 audit(1727792796.461:13486): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1437. [ 2533.374986] audit: type=1400 audit(1727792796.461:13487): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1438. [ 2533.375071] audit: type=1400 audit(1727792796.461:13488): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1439. [ 2533.375074] audit: type=1400 audit(1727792796.461:13489): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1440. [ 2533.375124] audit: type=1400 audit(1727792796.461:13490): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1441. [ 2533.375126] audit: type=1400 audit(1727792796.461:13491): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1442. [ 2533.375535] audit: type=1400 audit(1727792796.462:13492): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1443. [ 2533.375541] audit: type=1400 audit(1727792796.462:13493): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1444. [ 2538.775244] kauditd_printk_skb: 2026 callbacks suppressed
  1445. [ 2538.775249] audit: type=1400 audit(1727792801.861:15520): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1446. [ 2538.775257] audit: type=1400 audit(1727792801.862:15521): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1447. [ 2538.775279] audit: type=1400 audit(1727792801.862:15522): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1448. [ 2538.775284] audit: type=1400 audit(1727792801.862:15523): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1449. [ 2538.775372] audit: type=1400 audit(1727792801.862:15524): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1450. [ 2538.775377] audit: type=1400 audit(1727792801.862:15525): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1451. [ 2538.775425] audit: type=1400 audit(1727792801.862:15526): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1452. [ 2538.775428] audit: type=1400 audit(1727792801.862:15527): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1453. [ 2538.775651] audit: type=1400 audit(1727792801.862:15528): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1454. [ 2538.775657] audit: type=1400 audit(1727792801.862:15529): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1455. [ 2798.080898] kauditd_printk_skb: 260 callbacks suppressed
  1456. [ 2798.080902] audit: type=1400 audit(1727793061.167:15790): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1457. [ 2798.080907] audit: type=1400 audit(1727793061.167:15791): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binfZpPec.4.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1458. [ 2798.080918] audit: type=1400 audit(1727793061.167:15792): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binaAEUbz.3.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1459. [ 2798.080929] audit: type=1400 audit(1727793061.167:15793): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binaAEUbz.3.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1460. [ 2798.080953] audit: type=1400 audit(1727793061.167:15794): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bingHFnUY.2.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1461. [ 2798.080957] audit: type=1400 audit(1727793061.167:15795): apparmor="ALLOWED" operation="signal" class="signal" profile="libreoffice-soffice" pid=7150 comm="soffice.bin" requested_mask="send" denied_mask="send" signal=term peer="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker"
  1462. [ 2798.080959] audit: type=1400 audit(1727793061.167:15796): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bingHFnUY.2.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1463. [ 2798.081027] audit: type=1400 audit(1727793061.167:15797): apparmor="ALLOWED" operation="signal" class="signal" profile="libreoffice-soffice" pid=7150 comm="soffice.bin" requested_mask="send" denied_mask="send" signal=term peer="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker"
  1464. [ 2798.081315] audit: type=1400 audit(1727793061.168:15798): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=9967 comm="kioworker" requested_mask="wk" denied_mask="wk" fsuid=1000 ouid=1000
  1465. [ 2798.081322] audit: type=1400 audit(1727793061.168:15799): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=9967 comm="kioworker" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000
  1466. [ 2980.160052] kauditd_printk_skb: 1523 callbacks suppressed
  1467. [ 2980.160056] audit: type=1400 audit(1727793243.246:17323): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1468. [ 2980.160061] audit: type=1400 audit(1727793243.246:17324): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1469. [ 2980.160064] audit: type=1400 audit(1727793243.246:17325): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1470. [ 2980.162999] audit: type=1400 audit(1727793243.249:17326): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1471. [ 2980.163005] audit: type=1400 audit(1727793243.249:17327): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1472. [ 2980.163008] audit: type=1400 audit(1727793243.249:17328): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1473. [ 2980.165607] audit: type=1400 audit(1727793243.252:17329): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1474. [ 2980.165612] audit: type=1400 audit(1727793243.252:17330): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1475. [ 2980.165616] audit: type=1400 audit(1727793243.252:17331): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1476. [ 2980.176496] audit: type=1400 audit(1727793243.263:17332): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/7150/mountinfo" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1477. [ 3168.174133] kauditd_printk_skb: 3803 callbacks suppressed
  1478. [ 3168.174137] audit: type=1400 audit(1727793431.261:21136): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11046 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1479. [ 3168.174141] audit: type=1400 audit(1727793431.261:21137): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11046 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1480. [ 3168.174143] audit: type=1400 audit(1727793431.261:21138): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11046 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1481. [ 3168.174176] audit: type=1400 audit(1727793431.261:21139): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11046 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1482. [ 3168.174178] audit: type=1400 audit(1727793431.261:21140): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11046 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1483. [ 3168.174180] audit: type=1400 audit(1727793431.261:21141): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11046 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1484. [ 3168.174183] audit: type=1400 audit(1727793431.261:21142): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11046 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1485. [ 3177.020575] audit: type=1400 audit(1727793440.107:21143): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11085 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1486. [ 3177.020582] audit: type=1400 audit(1727793440.107:21144): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11085 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1487. [ 3177.020585] audit: type=1400 audit(1727793440.107:21145): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11085 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1488. [ 3177.020622] audit: type=1400 audit(1727793440.107:21146): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11085 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1489. [ 3177.020625] audit: type=1400 audit(1727793440.107:21147): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11085 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1490. [ 3177.020627] audit: type=1400 audit(1727793440.107:21148): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11085 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1491. [ 3177.020629] audit: type=1400 audit(1727793440.107:21149): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11085 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1492. [ 3183.933927] audit: type=1400 audit(1727793447.020:21150): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11156 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1493. [ 3183.933934] audit: type=1400 audit(1727793447.020:21151): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11156 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1494. [ 3183.933937] audit: type=1400 audit(1727793447.020:21152): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11156 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1495. [ 3183.933971] audit: type=1400 audit(1727793447.020:21153): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11156 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1496. [ 3183.933974] audit: type=1400 audit(1727793447.020:21154): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11156 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1497. [ 3183.933976] audit: type=1400 audit(1727793447.020:21155): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11156 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1498. [ 3183.933978] audit: type=1400 audit(1727793447.020:21156): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11156 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1499. [ 3189.151610] audit: type=1400 audit(1727793452.238:21157): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11191 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1500. [ 3189.151616] audit: type=1400 audit(1727793452.238:21158): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11191 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1501. [ 3189.151619] audit: type=1400 audit(1727793452.238:21159): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11191 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1502. [ 3189.151667] audit: type=1400 audit(1727793452.238:21160): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11191 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1503. [ 3189.151669] audit: type=1400 audit(1727793452.238:21161): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11191 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1504. [ 3189.151677] audit: type=1400 audit(1727793452.238:21162): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11191 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1505. [ 3189.151680] audit: type=1400 audit(1727793452.238:21163): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11191 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1506. [ 3210.119689] audit: type=1400 audit(1727793473.207:21164): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11254 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1507. [ 3210.119696] audit: type=1400 audit(1727793473.207:21165): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11254 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1508. [ 3210.119698] audit: type=1400 audit(1727793473.207:21166): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11254 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1509. [ 3210.119730] audit: type=1400 audit(1727793473.207:21167): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11254 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1510. [ 3210.119732] audit: type=1400 audit(1727793473.207:21168): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11254 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1511. [ 3210.119741] audit: type=1400 audit(1727793473.207:21169): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11254 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1512. [ 3210.119744] audit: type=1400 audit(1727793473.207:21170): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=11254 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1513. [ 3250.082160] audit: type=1400 audit(1727793513.169:21171): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bingSomgS.9.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1514. [ 3250.082168] audit: type=1400 audit(1727793513.169:21172): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bingSomgS.9.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1515. [ 3250.082172] audit: type=1400 audit(1727793513.169:21173): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binNWSFqY.8.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1516. [ 3250.082175] audit: type=1400 audit(1727793513.169:21174): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binNWSFqY.8.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1517. [ 3250.082205] audit: type=1400 audit(1727793513.169:21175): apparmor="ALLOWED" operation="signal" class="signal" profile="libreoffice-soffice" pid=7150 comm="soffice.bin" requested_mask="send" denied_mask="send" signal=term peer="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker"
  1518. [ 3250.082235] audit: type=1400 audit(1727793513.169:21176): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binrJStNt.7.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1519. [ 3250.082238] audit: type=1400 audit(1727793513.170:21177): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binrJStNt.7.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1520. [ 3250.082626] audit: type=1400 audit(1727793513.170:21178): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=10639 comm="kioworker" requested_mask="wk" denied_mask="wk" fsuid=1000 ouid=1000
  1521. [ 3250.082632] audit: type=1400 audit(1727793513.170:21179): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=10639 comm="kioworker" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000
  1522. [ 3758.330231] audit: type=1400 audit(1727794021.417:21180): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1523. [ 3758.330239] audit: type=1400 audit(1727794021.418:21181): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1524. [ 3758.330247] audit: type=1400 audit(1727794021.418:21182): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1525. [ 3758.333029] audit: type=1400 audit(1727794021.420:21183): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1526. [ 3758.333035] audit: type=1400 audit(1727794021.420:21184): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1527. [ 3758.333038] audit: type=1400 audit(1727794021.420:21185): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1528. [ 3758.335546] audit: type=1400 audit(1727794021.423:21186): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1529. [ 3758.335551] audit: type=1400 audit(1727794021.423:21187): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1530. [ 3758.335568] audit: type=1400 audit(1727794021.423:21188): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1531. [ 3758.347950] audit: type=1400 audit(1727794021.435:21189): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/7150/mountinfo" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1532. [ 3777.547310] kauditd_printk_skb: 3665 callbacks suppressed
  1533. [ 3777.547316] audit: type=1400 audit(1727794040.634:24855): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1534. [ 3777.547322] audit: type=1400 audit(1727794040.634:24856): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1535. [ 3777.547356] audit: type=1400 audit(1727794040.634:24857): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1536. [ 3777.547359] audit: type=1400 audit(1727794040.634:24858): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1537. [ 3777.547449] audit: type=1400 audit(1727794040.634:24859): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1538. [ 3777.547453] audit: type=1400 audit(1727794040.634:24860): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1539. [ 3777.547509] audit: type=1400 audit(1727794040.634:24861): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1540. [ 3777.547513] audit: type=1400 audit(1727794040.634:24862): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1541. [ 3777.555686] audit: type=1400 audit(1727794040.642:24863): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1542. [ 3777.555690] audit: type=1400 audit(1727794040.642:24864): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1543. [ 4028.083839] kauditd_printk_skb: 162 callbacks suppressed
  1544. [ 4028.083844] audit: type=1400 audit(1727794291.171:25027): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1545. [ 4028.083850] audit: type=1400 audit(1727794291.171:25028): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binxPXgJU.13.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1546. [ 4028.083853] audit: type=1400 audit(1727794291.171:25029): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binBkQrHB.12.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1547. [ 4028.083857] audit: type=1400 audit(1727794291.171:25030): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binBkQrHB.12.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1548. [ 4028.083869] audit: type=1400 audit(1727794291.171:25031): apparmor="ALLOWED" operation="signal" class="signal" profile="libreoffice-soffice" pid=7150 comm="soffice.bin" requested_mask="send" denied_mask="send" signal=term peer="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker"
  1549. [ 4028.083890] audit: type=1400 audit(1727794291.171:25032): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binbfmCsQ.11.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1550. [ 4028.083895] audit: type=1400 audit(1727794291.171:25033): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binbfmCsQ.11.kioworker.socket" pid=7150 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1551. [ 4028.084209] audit: type=1400 audit(1727794291.171:25034): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=11736 comm="kioworker" requested_mask="wk" denied_mask="wk" fsuid=1000 ouid=1000
  1552. [ 4028.084235] audit: type=1400 audit(1727794291.171:25035): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=11736 comm="kioworker" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000
  1553. [ 5162.051920] soffice.bin[7150]: segfault at 5acf58e72d0b ip 00007ccd529a2210 sp 00007fffb4a89e90 error 4 in libswlo.so[9a2210,7ccd52358000+d9b000] likely on CPU 6 (core 0, socket 0)
  1554. [ 5162.051937] Code: 8d 05 34 43 ad 00 4c 8b 28 4d 85 ed 74 59 4d 8b 7d 00 4d 8b 75 08 4d 39 f7 74 44 4c 89 fb 66 66 2e 0f 1f 84 00 00 00 00 00 90 <4c> 8b 63 08 4d 85 e4 74 15 4c 89 e7 e8 1f 39 9d ff be a8 00 00 00
  1555. [ 5193.441409] audit: type=1400 audit(1727795456.529:25036): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1556. [ 5193.441417] audit: type=1400 audit(1727795456.529:25037): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1557. [ 5193.441420] audit: type=1400 audit(1727795456.529:25038): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/sys/kernel/core_pattern" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1558. [ 5193.468893] audit: type=1400 audit(1727795456.556:25039): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1559. [ 5193.468900] audit: type=1400 audit(1727795456.556:25040): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1560. [ 5193.468903] audit: type=1400 audit(1727795456.556:25041): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/kdeglobals" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1561. [ 5193.468962] audit: type=1400 audit(1727795456.556:25042): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1562. [ 5193.468968] audit: type=1400 audit(1727795456.556:25043): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1563. [ 5193.468970] audit: type=1400 audit(1727795456.556:25044): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kdeglobals" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1564. [ 5193.481290] audit: type=1400 audit(1727795456.569:25045): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kdedefaults/kcminputrc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1565. [ 5213.359686] kauditd_printk_skb: 775 callbacks suppressed
  1566. [ 5213.359689] audit: type=1400 audit(1727795476.446:25821): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=13242 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1567. [ 5213.359694] audit: type=1400 audit(1727795476.446:25822): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=13242 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1568. [ 5213.359697] audit: type=1400 audit(1727795476.446:25823): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=13242 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1569. [ 5213.359736] audit: type=1400 audit(1727795476.446:25824): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=13242 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1570. [ 5213.359739] audit: type=1400 audit(1727795476.446:25825): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=13242 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1571. [ 5213.359741] audit: type=1400 audit(1727795476.446:25826): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=13242 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1572. [ 5213.359743] audit: type=1400 audit(1727795476.446:25827): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=13242 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1573. [ 5225.253597] audit: type=1400 audit(1727795488.340:25828): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1574. [ 5225.253604] audit: type=1400 audit(1727795488.340:25829): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1575. [ 5225.253607] audit: type=1400 audit(1727795488.340:25830): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1576. [ 5225.262374] audit: type=1400 audit(1727795488.349:25831): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1577. [ 5225.262381] audit: type=1400 audit(1727795488.349:25832): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1578. [ 5225.262384] audit: type=1400 audit(1727795488.349:25833): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1579. [ 5225.265169] audit: type=1400 audit(1727795488.351:25834): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1580. [ 5225.265175] audit: type=1400 audit(1727795488.351:25835): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1581. [ 5225.265180] audit: type=1400 audit(1727795488.351:25836): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1582. [ 5225.350914] audit: type=1400 audit(1727795488.437:25837): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1583. [ 5230.276210] kauditd_printk_skb: 9493 callbacks suppressed
  1584. [ 5230.276240] audit: type=1400 audit(1727795493.362:35331): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1585. [ 5230.276245] audit: type=1400 audit(1727795493.362:35332): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1586. [ 5230.276322] audit: type=1400 audit(1727795493.363:35333): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1587. [ 5230.276374] audit: type=1400 audit(1727795493.363:35334): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1588. [ 5230.276396] audit: type=1400 audit(1727795493.363:35335): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1589. [ 5230.276443] audit: type=1400 audit(1727795493.363:35336): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1590. [ 5230.276471] audit: type=1400 audit(1727795493.363:35337): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1591. [ 5230.276547] audit: type=1400 audit(1727795493.363:35338): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1592. [ 5230.276565] audit: type=1400 audit(1727795493.363:35339): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1593. [ 5230.276793] audit: type=1400 audit(1727795493.363:35340): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1594. [ 5247.817973] kauditd_printk_skb: 682 callbacks suppressed
  1595. [ 5247.817981] audit: type=1400 audit(1727795510.905:36023): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1596. [ 5247.817990] audit: type=1400 audit(1727795510.905:36024): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1597. [ 5247.818097] audit: type=1400 audit(1727795510.905:36025): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1598. [ 5247.818201] audit: type=1400 audit(1727795510.905:36026): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1599. [ 5247.818252] audit: type=1400 audit(1727795510.906:36027): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1600. [ 5247.818300] audit: type=1400 audit(1727795510.906:36028): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1601. [ 5247.818429] audit: type=1400 audit(1727795510.906:36029): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1602. [ 5247.818482] audit: type=1400 audit(1727795510.906:36030): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1603. [ 5247.818518] audit: type=1400 audit(1727795510.906:36031): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1604. [ 5247.821411] audit: type=1400 audit(1727795510.909:36032): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1605. [ 5265.189121] kauditd_printk_skb: 8 callbacks suppressed
  1606. [ 5265.189125] audit: type=1400 audit(1727795528.276:36041): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1607. [ 5265.189130] audit: type=1400 audit(1727795528.276:36042): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1608. [ 5265.189243] audit: type=1400 audit(1727795528.277:36043): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1609. [ 5265.189293] audit: type=1400 audit(1727795528.277:36044): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1610. [ 5265.189322] audit: type=1400 audit(1727795528.277:36045): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1611. [ 5265.189353] audit: type=1400 audit(1727795528.277:36046): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1612. [ 5265.189386] audit: type=1400 audit(1727795528.277:36047): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1613. [ 5265.189449] audit: type=1400 audit(1727795528.277:36048): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1614. [ 5265.189480] audit: type=1400 audit(1727795528.277:36049): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1615. [ 5265.191647] audit: type=1400 audit(1727795528.279:36050): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1616. [ 5281.444447] kauditd_printk_skb: 8 callbacks suppressed
  1617. [ 5281.444451] audit: type=1400 audit(1727795544.532:36059): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1618. [ 5281.444457] audit: type=1400 audit(1727795544.532:36060): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1619. [ 5281.444461] audit: type=1400 audit(1727795544.532:36061): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1620. [ 5281.444473] audit: type=1400 audit(1727795544.532:36062): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1621. [ 5281.444572] audit: type=1400 audit(1727795544.532:36063): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1622. [ 5281.444578] audit: type=1400 audit(1727795544.532:36064): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1623. [ 5281.444634] audit: type=1400 audit(1727795544.532:36065): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1624. [ 5281.444639] audit: type=1400 audit(1727795544.532:36066): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1625. [ 5281.444781] audit: type=1400 audit(1727795544.532:36067): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1626. [ 5281.444787] audit: type=1400 audit(1727795544.532:36068): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1627. [ 5495.087631] kauditd_printk_skb: 52 callbacks suppressed
  1628. [ 5495.087635] audit: type=1400 audit(1727795758.175:36121): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1629. [ 5495.087640] audit: type=1400 audit(1727795758.175:36122): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binykjgEi.4.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1630. [ 5495.087654] audit: type=1400 audit(1727795758.175:36123): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binNXnlGt.3.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1631. [ 5495.087657] audit: type=1400 audit(1727795758.175:36124): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binNXnlGt.3.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1632. [ 5495.087683] audit: type=1400 audit(1727795758.175:36125): apparmor="ALLOWED" operation="signal" class="signal" profile="libreoffice-soffice" pid=13157 comm="soffice.bin" requested_mask="send" denied_mask="send" signal=term peer="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker"
  1633. [ 5495.087701] audit: type=1400 audit(1727795758.175:36126): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binZQgqst.2.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1634. [ 5495.087704] audit: type=1400 audit(1727795758.175:36127): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.binZQgqst.2.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1635. [ 5495.088027] audit: type=1400 audit(1727795758.175:36128): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=13323 comm="kioworker" requested_mask="wk" denied_mask="wk" fsuid=1000 ouid=1000
  1636. [ 5495.088033] audit: type=1400 audit(1727795758.175:36129): apparmor="ALLOWED" operation="file_lock" class="file" profile="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker" name="/home/ralf/.local/share/baloo/index-lock" pid=13323 comm="kioworker" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000
  1637. [ 5499.087315] audit: type=1400 audit(1727795762.175:36130): apparmor="ALLOWED" operation="signal" class="signal" profile="libreoffice-soffice" pid=13157 comm="soffice.bin" requested_mask="send" denied_mask="send" signal=term peer="libreoffice-soffice//null-/usr/lib/x86_64-linux-gnu/libexec/kf6/kioworker"
  1638. [ 6110.204788] kauditd_printk_skb: 1523 callbacks suppressed
  1639. [ 6110.204791] audit: type=1400 audit(1727796373.292:37654): apparmor="ALLOWED" operation="connect" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=14031 comm="oosplash" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000
  1640. [ 6110.204797] audit: type=1400 audit(1727796373.292:37655): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=14031 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1641. [ 6110.204799] audit: type=1400 audit(1727796373.292:37656): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=14031 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1642. [ 6110.204844] audit: type=1400 audit(1727796373.292:37657): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=14031 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1643. [ 6110.204847] audit: type=1400 audit(1727796373.292:37658): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=14031 comm="oosplash" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1644. [ 6110.204849] audit: type=1400 audit(1727796373.292:37659): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=14031 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1645. [ 6110.204851] audit: type=1400 audit(1727796373.292:37660): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-oosplash" name="/tmp/OSL_PIPE_1000_SingleOfficeIPC_d27cef7fd363e602bafd2b3a2b23b" pid=14031 comm="oosplash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1646. [ 6210.047559] audit: type=1400 audit(1727796473.135:37661): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1647. [ 6210.047567] audit: type=1400 audit(1727796473.135:37662): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1648. [ 6210.047570] audit: type=1400 audit(1727796473.135:37663): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/usr/share/kubuntu-default-settings/kf5-settings/baloofilerc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
  1649. [ 6210.050311] audit: type=1400 audit(1727796473.138:37664): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1650. [ 6210.050316] audit: type=1400 audit(1727796473.138:37665): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1651. [ 6210.050319] audit: type=1400 audit(1727796473.138:37666): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.config/kservicemenurc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1652. [ 6210.052512] audit: type=1400 audit(1727796473.140:37667): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1653. [ 6210.052517] audit: type=1400 audit(1727796473.140:37668): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1654. [ 6210.052526] audit: type=1400 audit(1727796473.140:37669): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/home/ralf/.local/state/soffice.binstaterc" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1655. [ 6210.061657] audit: type=1400 audit(1727796473.149:37670): apparmor="ALLOWED" operation="open" class="file" profile="libreoffice-soffice" name="/proc/13157/mountinfo" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1656. [ 6215.720353] kauditd_printk_skb: 3699 callbacks suppressed
  1657. [ 6215.720357] audit: type=1400 audit(1727796478.808:41370): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1658. [ 6215.720362] audit: type=1400 audit(1727796478.808:41371): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1659. [ 6215.720407] audit: type=1400 audit(1727796478.808:41372): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1660. [ 6215.720412] audit: type=1400 audit(1727796478.808:41373): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1661. [ 6215.720483] audit: type=1400 audit(1727796478.808:41374): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1662. [ 6215.720487] audit: type=1400 audit(1727796478.808:41375): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="KIO::WorkerThre" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1663. [ 6215.720547] audit: type=1400 audit(1727796478.808:41376): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1664. [ 6215.720552] audit: type=1400 audit(1727796478.808:41377): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
  1665. [ 6215.721757] audit: type=1400 audit(1727796478.809:41378): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1666. [ 6215.721762] audit: type=1400 audit(1727796478.809:41379): apparmor="ALLOWED" operation="file_perm" class="file" profile="libreoffice-soffice" name="/run/user/1000/soffice.bindmEDZH.9.kioworker.socket" pid=13157 comm="soffice.bin" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
  1667. [ 6393.475036] kauditd_printk_skb: 59 callbacks suppressed
  1668. [ 6393.475040] audit: type=1400 audit(1727796656.562:41439): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14557 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1669. [ 6393.485991] audit: type=1400 audit(1727796656.573:41440): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14558 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1670. [ 6393.495670] traps: plasmashell[2525] trap int3 ip:780d4cf7cb41 sp:7ffc1c391500 error:0 in libQt6WebEngineCore.so.6.6.2[3b7cb41,780d49f51000+8cd1000]
  1671. [ 6404.026157] ibus-ui-gtk3[2965]: segfault at 0 ip 0000000000000000 sp 00007ffc50f19468 error 14 likely on CPU 2 (core 2, socket 0)
  1672. [ 6404.026167] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
  1673. [ 6404.050535] fbcon: Taking over console
  1674. [ 6404.224780] Console: switching to colour frame buffer device 210x65
  1675. [ 6406.713515] audit: type=1400 audit(1727796669.801:41441): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14822 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1676. [ 6406.717757] audit: type=1400 audit(1727796669.805:41442): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14823 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1677. [ 6406.721376] traps: plasmashell[14763] trap int3 ip:76eb74f7cb41 sp:7ffeb9ca5370 error:0 in libQt6WebEngineCore.so.6.6.2[3b7cb41,76eb71f51000+8cd1000]
  1678. [ 6408.674411] audit: type=1400 audit(1727796671.762:41443): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14892 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1679. [ 6408.678980] audit: type=1400 audit(1727796671.766:41444): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14893 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1680. [ 6408.682935] traps: plasmashell[14834] trap int3 ip:747358f7cb41 sp:7ffe7e8b8210 error:0 in libQt6WebEngineCore.so.6.6.2[3b7cb41,747355f51000+8cd1000]
  1681. [ 6410.411720] audit: type=1400 audit(1727796673.499:41445): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14961 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1682. [ 6410.415979] audit: type=1400 audit(1727796673.503:41446): apparmor="DENIED" operation="exec" class="file" info="no new privs" error=-1 profile="plasmashell" name="/usr/lib/qt6/libexec/QtWebEngineProcess" pid=14962 comm="plasmashell" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="unconfined"
  1683. [ 6410.419445] traps: plasmashell[14903] trap int3 ip:7fd7d8f7cb41 sp:7fff50c60ec0 error:0 in libQt6WebEngineCore.so.6.6.2[3b7cb41,7fd7d5f51000+8cd1000]
  1684.  
Add Comment
Please, Sign In to add comment