Advertisement
Guest User

Untitled

a guest
Mar 15th, 2022
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 95.58 KB | None | 0 0
  1. Mar 15 09:43:48 alarm kernel: Booting Linux on physical CPU 0x0000000000 [0x611f0221]
  2. Mar 15 09:43:48 alarm kernel: Linux version 5.17.0-rc6-asahi-next-20220301-4-asahi-ARCH (linux-asahi@archlinux) (gcc (GCC) 11.2.0, GNU ld (GNU Binutils) 2.38) #4 SMP PREEMPT Thu, 03 Mar 2022 18:08:09 +0000
  3. Mar 15 09:43:48 alarm kernel: random: fast init done
  4. Mar 15 09:43:48 alarm kernel: Machine model: Apple MacBook Air (M1, 2020)
  5. Mar 15 09:43:48 alarm kernel: efi: EFI v2.90 by Das U-Boot
  6. Mar 15 09:43:48 alarm kernel: efi: RTPROP=0x9d9f71040 MEMRESERVE=0x974530040
  7. Mar 15 09:43:48 alarm kernel: Zone ranges:
  8. Mar 15 09:43:48 alarm kernel: DMA [mem 0x0000000801cbc000-0x00000009df06ffff]
  9. Mar 15 09:43:48 alarm kernel: DMA32 empty
  10. Mar 15 09:43:48 alarm kernel: Normal empty
  11. Mar 15 09:43:48 alarm kernel: Movable zone start for each node
  12. Mar 15 09:43:48 alarm kernel: Early memory node ranges
  13. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x0000000801cbc000-0x00000008020b7fff]
  14. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x00000008020b8000-0x0000000802177fff]
  15. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x0000000802178000-0x000000080357ffff]
  16. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x0000000803580000-0x000000080359bfff]
  17. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x000000080359c000-0x00000009d9f6ffff]
  18. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x00000009d9f70000-0x00000009d9f7bfff]
  19. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x00000009d9f7c000-0x00000009defaffff]
  20. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x00000009defb0000-0x00000009defbffff]
  21. Mar 15 09:43:48 alarm kernel: node 0: [mem 0x00000009defc0000-0x00000009df06ffff]
  22. Mar 15 09:43:48 alarm kernel: Initmem setup node 0 [mem 0x0000000801cbc000-0x00000009df06ffff]
  23. Mar 15 09:43:48 alarm kernel: On node 0, zone DMA: 1839 pages in unavailable ranges
  24. Mar 15 09:43:48 alarm kernel: On node 0, zone DMA: 996 pages in unavailable ranges
  25. Mar 15 09:43:48 alarm kernel: cma: Reserved 64 MiB at 0x0000000804000000
  26. Mar 15 09:43:48 alarm kernel: percpu: Embedded 5 pages/cpu s44392 r8192 d29336 u81920
  27. Mar 15 09:43:48 alarm kernel: pcpu-alloc: s44392 r8192 d29336 u81920 alloc=5*16384
  28. Mar 15 09:43:48 alarm kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 [0] 4 [0] 5 [0] 6 [0] 7
  29. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU0
  30. Mar 15 09:43:48 alarm kernel: CPU features: detected: Address authentication (IMP DEF algorithm)
  31. Mar 15 09:43:48 alarm kernel: CPU features: detected: Virtualization Host Extensions
  32. Mar 15 09:43:48 alarm kernel: CPU features: detected: Spectre-v4
  33. Mar 15 09:43:48 alarm kernel: alternatives: patching kernel code
  34. Mar 15 09:43:48 alarm kernel: Built 1 zonelists, mobility grouping on. Total pages: 486776
  35. Mar 15 09:43:48 alarm kernel: Kernel command line: BOOT_IMAGE=/boot/vmlinuz-linux-asahi root=UUID=725346d2-f127-47bc-b464-9dd46155e8d6 rw loglevel=3 quiet
  36. Mar 15 09:43:48 alarm kernel: Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-linux-asahi", will be passed to user space.
  37. Mar 15 09:43:48 alarm kernel: Dentry cache hash table entries: 1048576 (order: 9, 8388608 bytes, linear)
  38. Mar 15 09:43:48 alarm kernel: Inode-cache hash table entries: 524288 (order: 8, 4194304 bytes, linear)
  39. Mar 15 09:43:48 alarm kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
  40. Mar 15 09:43:48 alarm kernel: Memory: 7677088K/7818960K available (11264K kernel code, 1618K rwdata, 4112K rodata, 1920K init, 635K bss, 76336K reserved, 65536K cma-reserved)
  41. Mar 15 09:43:48 alarm kernel: random: get_random_u64 called from cache_random_seq_create+0x84/0x184 with crng_init=1
  42. Mar 15 09:43:48 alarm kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1
  43. Mar 15 09:43:48 alarm kernel: Dynamic Preempt: full
  44. Mar 15 09:43:48 alarm kernel: rcu: Preemptible hierarchical RCU implementation.
  45. Mar 15 09:43:48 alarm kernel: rcu: RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=8.
  46. Mar 15 09:43:48 alarm kernel: Trampoline variant of Tasks RCU enabled.
  47. Mar 15 09:43:48 alarm kernel: Rude variant of Tasks RCU enabled.
  48. Mar 15 09:43:48 alarm kernel: Tracing variant of Tasks RCU enabled.
  49. Mar 15 09:43:48 alarm kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
  50. Mar 15 09:43:48 alarm kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8
  51. Mar 15 09:43:48 alarm kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
  52. Mar 15 09:43:48 alarm kernel: Root IRQ handler: aic_handle_irq
  53. Mar 15 09:43:48 alarm kernel: Root FIQ handler: aic_handle_fiq
  54. Mar 15 09:43:48 alarm kernel: irq_apple_aic: Using Fast IPIs
  55. Mar 15 09:43:48 alarm kernel: irq_apple_aic: Initialized with 896/1024 IRQs * 1/1 die(s), 4 FIQs, 32 vIPIs
  56. Mar 15 09:43:48 alarm kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
  57. Mar 15 09:43:48 alarm kernel: arch_timer: cp15 timer(s) running at 24.00MHz (phys).
  58. Mar 15 09:43:48 alarm kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x588fe9dc0, max_idle_ns: 440795202592 ns
  59. Mar 15 09:43:48 alarm kernel: sched_clock: 56 bits at 24MHz, resolution 41ns, wraps every 4398046511097ns
  60. Mar 15 09:43:48 alarm kernel: Console: colour dummy device 80x25
  61. Mar 15 09:43:48 alarm kernel: printk: console [tty0] enabled
  62. Mar 15 09:43:48 alarm kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 48.00 BogoMIPS (lpj=24000)
  63. Mar 15 09:43:48 alarm kernel: pid_max: default: 32768 minimum: 301
  64. Mar 15 09:43:48 alarm kernel: LSM: Security Framework initializing
  65. Mar 15 09:43:48 alarm kernel: Yama: becoming mindful.
  66. Mar 15 09:43:48 alarm kernel: Mount-cache hash table entries: 16384 (order: 3, 131072 bytes, linear)
  67. Mar 15 09:43:48 alarm kernel: Mountpoint-cache hash table entries: 16384 (order: 3, 131072 bytes, linear)
  68. Mar 15 09:43:48 alarm kernel: cblist_init_generic: Setting adjustable number of callback queues.
  69. Mar 15 09:43:48 alarm kernel: cblist_init_generic: Setting shift to 3 and lim to 1.
  70. Mar 15 09:43:48 alarm kernel: cblist_init_generic: Setting shift to 3 and lim to 1.
  71. Mar 15 09:43:48 alarm kernel: cblist_init_generic: Setting shift to 3 and lim to 1.
  72. Mar 15 09:43:48 alarm kernel: rcu: Hierarchical SRCU implementation.
  73. Mar 15 09:43:48 alarm kernel: Remapping and enabling EFI services.
  74. Mar 15 09:43:48 alarm kernel: ------------[ cut here ]------------
  75. Mar 15 09:43:48 alarm kernel: UEFI Runtime regions are not aligned to 64 KB -- buggy firmware?
  76. Mar 15 09:43:48 alarm kernel: WARNING: CPU: 0 PID: 1 at arch/arm64/kernel/efi.c:28 efi_create_mapping+0x7c/0x16c
  77. Mar 15 09:43:48 alarm kernel: Modules linked in:
  78. Mar 15 09:43:48 alarm kernel: CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.17.0-rc6-asahi-next-20220301-4-asahi-ARCH #4
  79. Mar 15 09:43:48 alarm kernel: Hardware name: Apple MacBook Air (M1, 2020) (DT)
  80. Mar 15 09:43:48 alarm kernel: pstate: 60000009 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  81. Mar 15 09:43:48 alarm kernel: pc : efi_create_mapping+0x7c/0x16c
  82. Mar 15 09:43:48 alarm kernel: lr : efi_create_mapping+0x7c/0x16c
  83. Mar 15 09:43:48 alarm kernel: sp : ffff8000093bbd40
  84. Mar 15 09:43:48 alarm kernel: x29: ffff8000093bbd40 x28: 0000000000000000 x27: 0000000000000000
  85. Mar 15 09:43:48 alarm kernel: x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
  86. Mar 15 09:43:48 alarm kernel: x23: 0000000000000000 x22: 0000000000000000 x21: ffff8000092cc000
  87. Mar 15 09:43:48 alarm kernel: x20: ffff800009270a20 x19: ffff0001731bd388 x18: 0000000000000050
  88. Mar 15 09:43:48 alarm kernel: x17: 000000002b4f8ff4 x16: 00000000333adb62 x15: fffffffffffc1488
  89. Mar 15 09:43:48 alarm kernel: x14: 000000003fcde571 x13: ffff80000914e240 x12: 00000000000000de
  90. Mar 15 09:43:48 alarm kernel: x11: 000000000000004a x10: ffff8000091fe930 x9 : ffff80000914e240
  91. Mar 15 09:43:48 alarm kernel: x8 : 00000000ffffdfff x7 : ffff8000091fe240 x6 : 00000000000006f0
  92. Mar 15 09:43:48 alarm kernel: x5 : 0000000000017ff4 x4 : 00000000ffffe04a x3 : 0000000000000000
  93. Mar 15 09:43:48 alarm kernel: x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000001de8940
  94. Mar 15 09:43:48 alarm kernel: Call trace:
  95. Mar 15 09:43:48 alarm kernel: efi_create_mapping+0x7c/0x16c
  96. Mar 15 09:43:48 alarm kernel: arm_enable_runtime_services+0x12c/0x1e0
  97. Mar 15 09:43:48 alarm kernel: do_one_initcall+0x50/0x1c0
  98. Mar 15 09:43:48 alarm kernel: kernel_init_freeable+0x118/0x28c
  99. Mar 15 09:43:48 alarm kernel: kernel_init+0x28/0x140
  100. Mar 15 09:43:48 alarm kernel: ret_from_fork+0x10/0x20
  101. Mar 15 09:43:48 alarm kernel: ---[ end trace 0000000000000000 ]---
  102. Mar 15 09:43:48 alarm kernel: smp: Bringing up secondary CPUs ...
  103. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU1
  104. Mar 15 09:43:48 alarm kernel: CPU1: Booted secondary processor 0x0000000001 [0x611f0221]
  105. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU2
  106. Mar 15 09:43:48 alarm kernel: CPU2: Booted secondary processor 0x0000000002 [0x611f0221]
  107. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU3
  108. Mar 15 09:43:48 alarm kernel: CPU3: Booted secondary processor 0x0000000003 [0x611f0221]
  109. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU4
  110. Mar 15 09:43:48 alarm kernel: CPU4: Booted secondary processor 0x0000010100 [0x611f0231]
  111. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU5
  112. Mar 15 09:43:48 alarm kernel: CPU5: Booted secondary processor 0x0000010101 [0x611f0231]
  113. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU6
  114. Mar 15 09:43:48 alarm kernel: CPU6: Booted secondary processor 0x0000010102 [0x611f0231]
  115. Mar 15 09:43:48 alarm kernel: Detected VIPT I-cache on CPU7
  116. Mar 15 09:43:48 alarm kernel: CPU7: Booted secondary processor 0x0000010103 [0x611f0231]
  117. Mar 15 09:43:48 alarm kernel: smp: Brought up 1 node, 8 CPUs
  118. Mar 15 09:43:48 alarm kernel: SMP: Total of 8 processors activated.
  119. Mar 15 09:43:48 alarm kernel: CPU features: detected: ARMv8.4 Translation Table Level
  120. Mar 15 09:43:48 alarm kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence
  121. Mar 15 09:43:48 alarm kernel: CPU features: detected: Common not Private translations
  122. Mar 15 09:43:48 alarm kernel: CPU features: detected: CRC32 instructions
  123. Mar 15 09:43:48 alarm kernel: CPU features: detected: E0PD
  124. Mar 15 09:43:48 alarm kernel: CPU features: detected: Generic authentication (IMP DEF algorithm)
  125. Mar 15 09:43:48 alarm kernel: CPU features: detected: RCpc load-acquire (LDAPR)
  126. Mar 15 09:43:48 alarm kernel: CPU features: detected: LSE atomic instructions
  127. Mar 15 09:43:48 alarm kernel: CPU features: detected: Privileged Access Never
  128. Mar 15 09:43:48 alarm kernel: CPU features: detected: RAS Extension Support
  129. Mar 15 09:43:48 alarm kernel: CPU features: detected: Speculation barrier (SB)
  130. Mar 15 09:43:48 alarm kernel: CPU features: detected: Stage-2 Force Write-Back
  131. Mar 15 09:43:48 alarm kernel: CPU features: detected: TLB range maintenance instructions
  132. Mar 15 09:43:48 alarm kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS)
  133. Mar 15 09:43:48 alarm kernel: CPU: All CPU(s) started at EL2
  134. Mar 15 09:43:48 alarm kernel: devtmpfs: initialized
  135. Mar 15 09:43:48 alarm kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
  136. Mar 15 09:43:48 alarm kernel: futex hash table entries: 2048 (order: 3, 131072 bytes, linear)
  137. Mar 15 09:43:48 alarm kernel: pinctrl core: initialized pinctrl subsystem
  138. Mar 15 09:43:48 alarm kernel: DMI not present or invalid.
  139. Mar 15 09:43:48 alarm kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
  140. Mar 15 09:43:48 alarm kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations
  141. Mar 15 09:43:48 alarm kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
  142. Mar 15 09:43:48 alarm kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
  143. Mar 15 09:43:48 alarm kernel: audit: initializing netlink subsys (disabled)
  144. Mar 15 09:43:48 alarm kernel: audit: type=2000 audit(0.012:1): state=initialized audit_enabled=0 res=1
  145. Mar 15 09:43:48 alarm kernel: thermal_sys: Registered thermal governor 'fair_share'
  146. Mar 15 09:43:48 alarm kernel: thermal_sys: Registered thermal governor 'bang_bang'
  147. Mar 15 09:43:48 alarm kernel: thermal_sys: Registered thermal governor 'step_wise'
  148. Mar 15 09:43:48 alarm kernel: thermal_sys: Registered thermal governor 'user_space'
  149. Mar 15 09:43:48 alarm kernel: thermal_sys: Registered thermal governor 'power_allocator'
  150. Mar 15 09:43:48 alarm kernel: cpuidle: using governor ladder
  151. Mar 15 09:43:48 alarm kernel: cpuidle: using governor menu
  152. Mar 15 09:43:48 alarm kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
  153. Mar 15 09:43:48 alarm kernel: ASID allocator initialised with 256 entries
  154. Mar 15 09:43:48 alarm kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
  155. Mar 15 09:43:48 alarm kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages
  156. Mar 15 09:43:48 alarm kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
  157. Mar 15 09:43:48 alarm kernel: cryptd: max_cpu_qlen set to 1000
  158. Mar 15 09:43:48 alarm kernel: iommu: Default domain type: Translated
  159. Mar 15 09:43:48 alarm kernel: iommu: DMA domain TLB invalidation policy: strict mode
  160. Mar 15 09:43:48 alarm kernel: SCSI subsystem initialized
  161. Mar 15 09:43:48 alarm kernel: usbcore: registered new interface driver usbfs
  162. Mar 15 09:43:48 alarm kernel: usbcore: registered new interface driver hub
  163. Mar 15 09:43:48 alarm kernel: usbcore: registered new device driver usb
  164. Mar 15 09:43:48 alarm kernel: pps_core: LinuxPPS API ver. 1 registered
  165. Mar 15 09:43:48 alarm kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
  166. Mar 15 09:43:48 alarm kernel: Registered efivars operations
  167. Mar 15 09:43:48 alarm kernel: Advanced Linux Sound Architecture Driver Initialized.
  168. Mar 15 09:43:48 alarm kernel: NetLabel: Initializing
  169. Mar 15 09:43:48 alarm kernel: NetLabel: domain hash size = 128
  170. Mar 15 09:43:48 alarm kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
  171. Mar 15 09:43:48 alarm kernel: NetLabel: unlabeled traffic allowed by default
  172. Mar 15 09:43:48 alarm kernel: vgaarb: loaded
  173. Mar 15 09:43:48 alarm kernel: clocksource: Switched to clocksource arch_sys_counter
  174. Mar 15 09:43:48 alarm kernel: VFS: Disk quotas dquot_6.6.0
  175. Mar 15 09:43:48 alarm kernel: VFS: Dquot-cache hash table entries: 2048 (order 0, 16384 bytes)
  176. Mar 15 09:43:48 alarm kernel: NET: Registered PF_INET protocol family
  177. Mar 15 09:43:48 alarm kernel: IP idents hash table entries: 131072 (order: 6, 1048576 bytes, linear)
  178. Mar 15 09:43:48 alarm kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 2, 65536 bytes, linear)
  179. Mar 15 09:43:48 alarm kernel: TCP established hash table entries: 65536 (order: 5, 524288 bytes, linear)
  180. Mar 15 09:43:48 alarm kernel: TCP bind hash table entries: 65536 (order: 6, 1048576 bytes, linear)
  181. Mar 15 09:43:48 alarm kernel: TCP: Hash tables configured (established 65536 bind 65536)
  182. Mar 15 09:43:48 alarm kernel: MPTCP token hash table entries: 8192 (order: 3, 196608 bytes, linear)
  183. Mar 15 09:43:48 alarm kernel: UDP hash table entries: 4096 (order: 3, 131072 bytes, linear)
  184. Mar 15 09:43:48 alarm kernel: UDP-Lite hash table entries: 4096 (order: 3, 131072 bytes, linear)
  185. Mar 15 09:43:48 alarm kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
  186. Mar 15 09:43:48 alarm kernel: RPC: Registered named UNIX socket transport module.
  187. Mar 15 09:43:48 alarm kernel: RPC: Registered udp transport module.
  188. Mar 15 09:43:48 alarm kernel: RPC: Registered tcp transport module.
  189. Mar 15 09:43:48 alarm kernel: RPC: Registered tcp NFSv4.1 backchannel transport module.
  190. Mar 15 09:43:48 alarm kernel: PCI: CLS 0 bytes, default 64
  191. Mar 15 09:43:48 alarm kernel: Trying to unpack rootfs image as initramfs...
  192. Mar 15 09:43:48 alarm kernel: kvm [1]: IPA Size Limit: 36 bits (Reduced IPA size, limited VM/VMM compatibility)
  193. Mar 15 09:43:48 alarm kernel: kvm [1]: Non-architectural vgic, tainting kernel
  194. Mar 15 09:43:48 alarm kernel: kvm [1]: GICv3: no GICV resource entry
  195. Mar 15 09:43:48 alarm kernel: kvm [1]: disabling GICv2 emulation
  196. Mar 15 09:43:48 alarm kernel: kvm [1]: GICv3 with broken locally generated SEI
  197. Mar 15 09:43:48 alarm kernel: kvm [1]: GICv3 sysreg trapping enabled ([G0G1D], reduced performance)
  198. Mar 15 09:43:48 alarm kernel: kvm [1]: GIC system register CPU interface enabled
  199. Mar 15 09:43:48 alarm kernel: kvm [1]: VHE mode initialized successfully
  200. Mar 15 09:43:48 alarm kernel: Initialise system trusted keyrings
  201. Mar 15 09:43:48 alarm kernel: workingset: timestamp_bits=46 max_order=19 bucket_order=0
  202. Mar 15 09:43:48 alarm kernel: zbud: loaded
  203. Mar 15 09:43:48 alarm kernel: NFS: Registering the id_resolver key type
  204. Mar 15 09:43:48 alarm kernel: Key type id_resolver registered
  205. Mar 15 09:43:48 alarm kernel: Key type id_legacy registered
  206. Mar 15 09:43:48 alarm kernel: nfs4filelayout_init: NFSv4 File Layout Driver Registering...
  207. Mar 15 09:43:48 alarm kernel: nfs4flexfilelayout_init: NFSv4 Flexfile Layout Driver Registering...
  208. Mar 15 09:43:48 alarm kernel: NET: Registered PF_ALG protocol family
  209. Mar 15 09:43:48 alarm kernel: xor: measuring software checksum speed
  210. Mar 15 09:43:48 alarm kernel: 8regs : 13170 MB/sec
  211. Mar 15 09:43:48 alarm kernel: 32regs : 26822 MB/sec
  212. Mar 15 09:43:48 alarm kernel: arm64_neon : 27565 MB/sec
  213. Mar 15 09:43:48 alarm kernel: xor: using function: arm64_neon (27565 MB/sec)
  214. Mar 15 09:43:48 alarm kernel: Key type asymmetric registered
  215. Mar 15 09:43:48 alarm kernel: Asymmetric key parser 'x509' registered
  216. Mar 15 09:43:48 alarm kernel: Freeing initrd memory: 7408K
  217. Mar 15 09:43:48 alarm kernel: alg: self-tests for CTR-KDF (hmac(sha256)) passed
  218. Mar 15 09:43:48 alarm kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 250)
  219. Mar 15 09:43:48 alarm kernel: io scheduler mq-deadline registered
  220. Mar 15 09:43:48 alarm kernel: io scheduler kyber registered
  221. Mar 15 09:43:48 alarm kernel: io scheduler bfq registered
  222. Mar 15 09:43:48 alarm kernel: 235200000.serial: ttySAC0 at MMIO 0x235200000 (irq = 41, base_baud = 0) is a APPLE S5L
  223. Mar 15 09:43:48 alarm kernel: 235208000.serial: ttySAC2 at MMIO 0x235208000 (irq = 42, base_baud = 0) is a APPLE S5L
  224. Mar 15 09:43:48 alarm kernel: [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0
  225. Mar 15 09:43:48 alarm kernel: cacheinfo: Unable to detect cache hierarchy for CPU 0
  226. Mar 15 09:43:48 alarm kernel: mousedev: PS/2 mouse device common for all mice
  227. Mar 15 09:43:48 alarm kernel: device-mapper: uevent: version 1.0.3
  228. Mar 15 09:43:48 alarm kernel: device-mapper: ioctl: 4.46.0-ioctl (2022-02-22) initialised: dm-devel@redhat.com
  229. Mar 15 09:43:48 alarm kernel: ledtrig-cpu: registered to indicate activity on CPUs
  230. Mar 15 09:43:48 alarm kernel: efifb: probing for efifb
  231. Mar 15 09:43:48 alarm kernel: efifb: framebuffer at 0x9e2120000, using 16000k, total 16000k
  232. Mar 15 09:43:48 alarm kernel: efifb: mode is 2560x1600x32, linelength=10240, pages=1
  233. Mar 15 09:43:48 alarm kernel: efifb: scrolling: redraw
  234. Mar 15 09:43:48 alarm kernel: efifb: Truecolor: size=2:10:10:10, shift=30:20:10:0
  235. Mar 15 09:43:48 alarm kernel: Console: switching to colour frame buffer device 160x50
  236. Mar 15 09:43:48 alarm kernel: fb0: EFI VGA frame buffer device
  237. Mar 15 09:43:48 alarm kernel: hid: raw HID events driver (C) Jiri Kosina
  238. Mar 15 09:43:48 alarm kernel: usbcore: registered new interface driver usbhid
  239. Mar 15 09:43:48 alarm kernel: usbhid: USB HID core driver
  240. Mar 15 09:43:48 alarm kernel: Initializing XFRM netlink socket
  241. Mar 15 09:43:48 alarm kernel: NET: Registered PF_INET6 protocol family
  242. Mar 15 09:43:48 alarm kernel: Segment Routing with IPv6
  243. Mar 15 09:43:48 alarm kernel: In-situ OAM (IOAM) with IPv6
  244. Mar 15 09:43:48 alarm kernel: mip6: Mobile IPv6
  245. Mar 15 09:43:48 alarm kernel: NET: Registered PF_PACKET protocol family
  246. Mar 15 09:43:48 alarm kernel: Key type dns_resolver registered
  247. Mar 15 09:43:48 alarm kernel: registered taskstats version 1
  248. Mar 15 09:43:48 alarm kernel: Loading compiled-in X.509 certificates
  249. Mar 15 09:43:48 alarm kernel: zswap: loaded using pool lzo/zbud
  250. Mar 15 09:43:48 alarm kernel: Key type ._fscrypt registered
  251. Mar 15 09:43:48 alarm kernel: Key type .fscrypt registered
  252. Mar 15 09:43:48 alarm kernel: Key type fscrypt-provisioning registered
  253. Mar 15 09:43:48 alarm kernel: Key type encrypted registered
  254. Mar 15 09:43:48 alarm kernel: ALSA device list:
  255. Mar 15 09:43:48 alarm kernel: No soundcards found.
  256. Mar 15 09:43:48 alarm kernel: Freeing unused kernel memory: 1920K
  257. Mar 15 09:43:48 alarm kernel: Checked W+X mappings: passed, no W+X pages found
  258. Mar 15 09:43:48 alarm kernel: Run /init as init process
  259. Mar 15 09:43:48 alarm kernel: with arguments:
  260. Mar 15 09:43:48 alarm kernel: /init
  261. Mar 15 09:43:48 alarm kernel: with environment:
  262. Mar 15 09:43:48 alarm kernel: HOME=/
  263. Mar 15 09:43:48 alarm kernel: TERM=linux
  264. Mar 15 09:43:48 alarm kernel: BOOT_IMAGE=/boot/vmlinuz-linux-asahi
  265. Mar 15 09:43:48 alarm kernel: apple-dart 382f00000.iommu: DART [pagesize 4000, bypass support: 1, bypass forced: 0] initialized
  266. Mar 15 09:43:48 alarm kernel: apple-dart 382f80000.iommu: DART [pagesize 4000, bypass support: 1, bypass forced: 0] initialized
  267. Mar 15 09:43:48 alarm kernel: apple-dart 502f00000.iommu: DART [pagesize 4000, bypass support: 1, bypass forced: 0] initialized
  268. Mar 15 09:43:48 alarm kernel: apple-dart 502f80000.iommu: DART [pagesize 4000, bypass support: 1, bypass forced: 0] initialized
  269. Mar 15 09:43:48 alarm kernel: apple-dart 681008000.dart: DART [pagesize 4000, bypass support: 0, bypass forced: 0] initialized
  270. Mar 15 09:43:48 alarm kernel: apple-dart 235004000.iommu: DART [pagesize 4000, bypass support: 1, bypass forced: 0] initialized
  271. Mar 15 09:43:48 alarm kernel: apple-gpio-pinctrl 23c100000.pinctrl: No cache defaults, reading back from HW
  272. Mar 15 09:43:48 alarm kernel: apple-gpio-pinctrl 23d1f0000.pinctrl: No cache defaults, reading back from HW
  273. Mar 15 09:43:48 alarm kernel: apple-gpio-pinctrl 23e820000.pinctrl: No cache defaults, reading back from HW
  274. Mar 15 09:43:48 alarm kernel: macsmc-rtkit 23e400000.smc: RTKit: Initializing (protocol version 12)
  275. Mar 15 09:43:48 alarm kernel: apple-gpio-pinctrl 24a820000.pinctrl: No cache defaults, reading back from HW
  276. Mar 15 09:43:48 alarm kernel: macsmc-rtkit 23e400000.smc: Initialized (1378 keys #KEY (0x234b4559)..zETM (0x7a45544d))
  277. Mar 15 09:43:48 alarm kernel: nvme-apple 27bcc0000.nvme: RTKit: Initializing (protocol version 12)
  278. Mar 15 09:43:48 alarm kernel: nvme-apple 27bcc0000.nvme: RTKit: syslog message: cmd.c:6025: boot mode normal
  279. Mar 15 09:43:48 alarm kernel: nvme-apple 27bcc0000.nvme: RTKit: syslog message: nvme_admin_ans2.c:2880: Invalid namespace 0
  280. Mar 15 09:43:48 alarm kernel: nvme nvme0: Identify NS List failed (status=0xb)
  281. Mar 15 09:43:48 alarm kernel: nvme-apple 27bcc0000.nvme: RTKit: syslog message: nvme_admin_ans2.c:2880: Invalid namespace 0
  282. Mar 15 09:43:48 alarm kernel: nvme0n1: p1 p2 p3 p4 p5 p6
  283. Mar 15 09:43:48 alarm kernel: spi-hid-apple-of spi0.0: spihid_apple_of_probe:74
  284. Mar 15 09:43:48 alarm kernel: OF: Bad cell count for /soc/spmi@23d0d9300/pmu@f
  285. Mar 15 09:43:48 alarm kernel: OF: Bad cell count for /soc/spmi@23d0d9300/pmu@f
  286. Mar 15 09:43:48 alarm kernel: OF: Bad cell count for /soc/spmi@23d0d9300/pmu@f
  287. Mar 15 09:43:48 alarm kernel: OF: Bad cell count for /soc/spmi@23d0d9300/pmu@f
  288. Mar 15 09:43:48 alarm kernel: OF: Bad cell count for /soc/spmi@23d0d9300/pmu@f
  289. Mar 15 09:43:48 alarm kernel: OF: Bad cell count for /soc/spmi@23d0d9300/pmu@f
  290. Mar 15 09:43:48 alarm kernel: macsmc-rtc macsmc-rtc: registered as rtc0
  291. Mar 15 09:43:48 alarm kernel: macsmc-rtc macsmc-rtc: setting system clock to 2022-03-15T08:43:37 UTC (1647333817)
  292. Mar 15 09:43:48 alarm kernel: dwc3 382280000.usb: Adding to iommu group 0
  293. Mar 15 09:43:48 alarm kernel: spi-hid-apple-of spi0.0: limiting the number of devices to mngt, kbd and mouse
  294. Mar 15 09:43:48 alarm kernel: dwc3 502280000.usb: Adding to iommu group 1
  295. Mar 15 09:43:48 alarm kernel: input: Apple Internal Keyboard / Trackpad Keyboard as /devices/platform/soc/23510c000.spi/spi_master/spi0/spi0.0/001C:05AC:0281.0001/input/input0
  296. Mar 15 09:43:48 alarm kernel: hid-generic 001C:05AC:0281.0001: input,hidraw0: SPI HID v9.35 Keyboard [Apple Internal Keyboard / Trackpad] on spi0.0 (1)
  297. Mar 15 09:43:48 alarm kernel: input: Apple Internal Keyboard / Trackpad Mouse as /devices/platform/soc/23510c000.spi/spi_master/spi0/spi0.0/001C:05AC:0281.0002/input/input2
  298. Mar 15 09:43:48 alarm kernel: hid-generic 001C:05AC:0281.0002: input,hidraw1: SPI HID v9.35 Mouse [Apple Internal Keyboard / Trackpad] on spi0.0 (2)
  299. Mar 15 09:43:48 alarm kernel: input: Apple Internal Keyboard / Trackpad as /devices/platform/soc/23510c000.spi/spi_master/spi0/spi0.0/001C:05AC:0281.0001/input/input5
  300. Mar 15 09:43:48 alarm kernel: apple 001C:05AC:0281.0001: input,hidraw0: SPI HID v9.35 Keyboard [Apple Internal Keyboard / Trackpad] on spi0.0 (1)
  301. Mar 15 09:43:48 alarm kernel: input: Apple Internal Keyboard / Trackpad as /devices/platform/soc/23510c000.spi/spi_master/spi0/spi0.0/001C:05AC:0281.0002/input/input6
  302. Mar 15 09:43:48 alarm kernel: magicmouse 001C:05AC:0281.0002: input,hidraw1: SPI HID v9.35 Mouse [Apple Internal Keyboard / Trackpad] on spi0.0 (2)
  303. Mar 15 09:43:48 alarm kernel: EXT4-fs (nvme0n1p5): mounted filesystem with ordered data mode. Quota mode: none.
  304. Mar 15 09:43:48 alarm systemd[1]: systemd 250.3-4-arch running in system mode (+PAM +AUDIT -SELINUX -APPARMOR -IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified)
  305. Mar 15 09:43:48 alarm systemd[1]: Detected architecture arm64.
  306. Mar 15 09:43:48 alarm systemd[1]: Detected first boot.
  307. Mar 15 09:43:48 alarm systemd[1]: Hostname set to <alarm>.
  308. Mar 15 09:43:48 alarm kernel: random: systemd: uninitialized urandom read (16 bytes read)
  309. Mar 15 09:43:48 alarm systemd[1]: Initializing machine ID from random generator.
  310. Mar 15 09:43:48 alarm systemd[1]: Populated /etc with preset unit settings.
  311. Mar 15 09:43:48 alarm systemd[1]: Condition check resulted in System Slice being skipped.
  312. Mar 15 09:43:48 alarm systemd[1]: Condition check resulted in Root Slice being skipped.
  313. Mar 15 09:43:48 alarm systemd[1]: Queued start job for default target Graphical Interface.
  314. Mar 15 09:43:48 alarm kernel: random: systemd: uninitialized urandom read (16 bytes read)
  315. Mar 15 09:43:48 alarm systemd[1]: Created slice Slice /system/getty.
  316. Mar 15 09:43:48 alarm kernel: random: systemd: uninitialized urandom read (16 bytes read)
  317. Mar 15 09:43:48 alarm systemd[1]: Created slice Slice /system/modprobe.
  318. Mar 15 09:43:48 alarm systemd[1]: Created slice Slice /system/systemd-growfs.
  319. Mar 15 09:43:48 alarm systemd[1]: Created slice User and Session Slice.
  320. Mar 15 09:43:48 alarm systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
  321. Mar 15 09:43:48 alarm systemd[1]: Started Forward Password Requests to Wall Directory Watch.
  322. Mar 15 09:43:48 alarm systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point.
  323. Mar 15 09:43:48 alarm systemd[1]: Reached target Local Encrypted Volumes.
  324. Mar 15 09:43:48 alarm systemd[1]: Reached target Local Integrity Protected Volumes.
  325. Mar 15 09:43:48 alarm systemd[1]: Reached target Path Units.
  326. Mar 15 09:43:48 alarm systemd[1]: Reached target Remote Encrypted Volumes.
  327. Mar 15 09:43:48 alarm systemd[1]: Reached target Remote File Systems.
  328. Mar 15 09:43:48 alarm systemd[1]: Reached target Slice Units.
  329. Mar 15 09:43:48 alarm systemd[1]: Reached target Swaps.
  330. Mar 15 09:43:48 alarm systemd[1]: Reached target Local Verity Protected Volumes.
  331. Mar 15 09:43:48 alarm systemd[1]: Listening on Device-mapper event daemon FIFOs.
  332. Mar 15 09:43:48 alarm systemd[1]: Listening on Process Core Dump Socket.
  333. Mar 15 09:43:48 alarm systemd[1]: Listening on Journal Audit Socket.
  334. Mar 15 09:43:48 alarm systemd[1]: Listening on Journal Socket (/dev/log).
  335. Mar 15 09:43:48 alarm systemd[1]: Listening on Journal Socket.
  336. Mar 15 09:43:48 alarm systemd[1]: Listening on Network Service Netlink Socket.
  337. Mar 15 09:43:48 alarm systemd[1]: Listening on udev Control Socket.
  338. Mar 15 09:43:48 alarm systemd[1]: Listening on udev Kernel Socket.
  339. Mar 15 09:43:48 alarm systemd[1]: Listening on User Database Manager Socket.
  340. Mar 15 09:43:48 alarm systemd[1]: Mounting Huge Pages File System...
  341. Mar 15 09:43:48 alarm systemd[1]: Mounting POSIX Message Queue File System...
  342. Mar 15 09:43:48 alarm systemd[1]: Mounting Kernel Debug File System...
  343. Mar 15 09:43:48 alarm systemd[1]: Kernel Trace File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/tracing).
  344. Mar 15 09:43:48 alarm systemd[1]: Mounting Temporary Directory /tmp...
  345. Mar 15 09:43:48 alarm systemd[1]: Starting Create List of Static Device Nodes...
  346. Mar 15 09:43:48 alarm systemd[1]: Starting Load Kernel Module configfs...
  347. Mar 15 09:43:48 alarm systemd[1]: Starting Load Kernel Module drm...
  348. Mar 15 09:43:48 alarm systemd[1]: Starting Load Kernel Module fuse...
  349. Mar 15 09:43:48 alarm systemd[1]: File System Check on Root Device was skipped because of a failed condition check (ConditionPathIsReadWrite=!/).
  350. Mar 15 09:43:48 alarm systemd[1]: Starting Load Kernel Modules...
  351. Mar 15 09:43:48 alarm systemd[1]: Starting Generate network units from Kernel command line...
  352. Mar 15 09:43:48 alarm systemd[1]: Starting Remount Root and Kernel File Systems...
  353. Mar 15 09:43:48 alarm systemd[1]: Repartition Root Disk was skipped because all trigger condition checks failed.
  354. Mar 15 09:43:48 alarm systemd[1]: Starting Coldplug udev Block Devices...
  355. Mar 15 09:43:48 alarm kernel: fuse: init (API version 7.36)
  356. Mar 15 09:43:48 alarm systemd[1]: Mounted Huge Pages File System.
  357. Mar 15 09:43:48 alarm systemd[1]: Mounted POSIX Message Queue File System.
  358. Mar 15 09:43:48 alarm systemd[1]: Mounted Kernel Debug File System.
  359. Mar 15 09:43:48 alarm systemd[1]: Mounted Temporary Directory /tmp.
  360. Mar 15 09:43:48 alarm systemd[1]: Finished Create List of Static Device Nodes.
  361. Mar 15 09:43:48 alarm systemd[1]: modprobe@configfs.service: Deactivated successfully.
  362. Mar 15 09:43:48 alarm systemd[1]: Finished Load Kernel Module configfs.
  363. Mar 15 09:43:48 alarm systemd[1]: modprobe@drm.service: Deactivated successfully.
  364. Mar 15 09:43:48 alarm systemd[1]: Finished Load Kernel Module drm.
  365. Mar 15 09:43:48 alarm systemd[1]: modprobe@fuse.service: Deactivated successfully.
  366. Mar 15 09:43:48 alarm systemd[1]: Finished Load Kernel Module fuse.
  367. Mar 15 09:43:48 alarm systemd[1]: Finished Generate network units from Kernel command line.
  368. Mar 15 09:43:48 alarm systemd[1]: Reached target Preparation for Network.
  369. Mar 15 09:43:48 alarm systemd[1]: Mounting FUSE Control File System...
  370. Mar 15 09:43:48 alarm systemd[1]: Mounting Kernel Configuration File System...
  371. Mar 15 09:43:48 alarm systemd[1]: Finished Load Kernel Modules.
  372. Mar 15 09:43:48 alarm systemd[1]: Mounted FUSE Control File System.
  373. Mar 15 09:43:48 alarm kernel: EXT4-fs (nvme0n1p5): re-mounted. Quota mode: none.
  374. Mar 15 09:43:48 alarm systemd[1]: Starting Apply Kernel Variables...
  375. Mar 15 09:43:48 alarm systemd[1]: Finished Remount Root and Kernel File Systems.
  376. Mar 15 09:43:48 alarm systemd[1]: Mounted Kernel Configuration File System.
  377. Mar 15 09:43:48 alarm systemd[1]: Starting First Boot Wizard...
  378. Mar 15 09:43:48 alarm systemd[1]: Starting Grow File System on /...
  379. Mar 15 09:43:48 alarm systemd[1]: Rebuild Hardware Database was skipped because all trigger condition checks failed.
  380. Mar 15 09:43:48 alarm systemd[1]: Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
  381. Mar 15 09:43:48 alarm systemd[1]: Starting Load/Save Random Seed...
  382. Mar 15 09:43:48 alarm systemd[1]: Finished Coldplug udev Block Devices.
  383. Mar 15 09:43:48 alarm systemd[1]: Finished Apply Kernel Variables.
  384. Mar 15 09:43:48 alarm kernel: EXT4-fs (nvme0n1p5): resizing filesystem from 340736 to 1220864 blocks
  385. Mar 15 09:43:48 alarm kernel: EXT4-fs (nvme0n1p5): resized filesystem to 1220864
  386. Mar 15 09:43:48 alarm systemd[1]: Finished Grow File System on /.
  387. Mar 15 09:43:48 alarm kernel: nvme-apple 27bcc0000.nvme: RTKit: syslog message: blog.c:105: New BlogBuf low 28
  388. Mar 15 09:43:48 alarm kernel: random: crng init done
  389. Mar 15 09:43:48 alarm kernel: random: 7 urandom warning(s) missed due to ratelimiting
  390. Mar 15 09:43:48 alarm systemd[1]: Finished Load/Save Random Seed.
  391. Mar 15 09:43:48 alarm systemd[1]: Finished First Boot Wizard.
  392. Mar 15 09:43:48 alarm systemd[1]: Starting Create System Users...
  393. Mar 15 09:43:48 alarm systemd[1]: Finished Create System Users.
  394. Mar 15 09:43:48 alarm systemd[1]: Starting Create Static Device Nodes in /dev...
  395. Mar 15 09:43:48 alarm systemd[1]: Starting User Database Manager...
  396. Mar 15 09:43:48 alarm systemd[1]: Started User Database Manager.
  397. Mar 15 09:43:48 alarm systemd[1]: Finished Create Static Device Nodes in /dev.
  398. Mar 15 09:43:48 alarm systemd[1]: Reached target Preparation for Local File Systems.
  399. Mar 15 09:43:48 alarm systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of a failed condition check (ConditionPathExists=/var/lib/machines.raw).
  400. Mar 15 09:43:48 alarm systemd[1]: Reached target Containers.
  401. Mar 15 09:43:48 alarm systemd[1]: Entropy Daemon based on the HAVEGE algorithm was skipped because of a failed condition check (ConditionKernelVersion=<5.6).
  402. Mar 15 09:43:48 alarm systemd[1]: Starting Journal Service...
  403. Mar 15 09:43:48 alarm systemd[1]: Starting Rule-based Manager for Device Events and Files...
  404. Mar 15 09:43:48 alarm systemd[1]: Started Rule-based Manager for Device Events and Files.
  405. Mar 15 09:43:48 alarm kernel: audit: type=1130 audit(1647333828.210:2): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  406. Mar 15 09:43:48 alarm kernel: audit: type=1334 audit(1647333828.210:3): prog-id=12 op=LOAD
  407. Mar 15 09:43:48 alarm systemd[1]: Starting Network Configuration...
  408. Mar 15 09:43:48 alarm systemd-journald[324]: Journal started
  409. Mar 15 09:43:48 alarm systemd-journald[324]: Runtime Journal (/run/log/journal/55c99861a6924eb899fd81e3129fbb5b) is 8.0M, max 378.5M, 370.5M free.
  410. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  411. Mar 15 09:43:48 alarm audit: BPF prog-id=12 op=LOAD
  412. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  413. Mar 15 09:43:37 alarm systemd-modules-load[302]: Failed to find module 'pkcs8_key_parser'
  414. Mar 15 09:43:37 alarm systemd-random-seed[313]: Kernel entropy pool is not initialized yet, waiting until it is.
  415. Mar 15 09:43:48 alarm systemd[1]: Started Journal Service.
  416. Mar 15 09:43:48 alarm kernel: audit: type=1130 audit(1647333828.213:4): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  417. Mar 15 09:43:37 alarm systemd-growfs[312]: Successfully resized "/" to 4.6G bytes.
  418. Mar 15 09:43:48 alarm systemd[1]: Starting Flush Journal to Persistent Storage...
  419. Mar 15 09:43:48 alarm systemd-journald[324]: Time spent on flushing to /var/log/journal/55c99861a6924eb899fd81e3129fbb5b is 4.137ms for 418 entries.
  420. Mar 15 09:43:48 alarm systemd-journald[324]: System Journal (/var/log/journal/55c99861a6924eb899fd81e3129fbb5b) is 8.0M, max 466.4M, 458.4M free.
  421. Mar 15 09:43:48 alarm systemd-journald[324]: Received client request to flush runtime journal.
  422. Mar 15 09:43:48 alarm systemd[1]: Finished Flush Journal to Persistent Storage.
  423. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  424. Mar 15 09:43:48 alarm kernel: audit: type=1130 audit(1647333828.223:5): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  425. Mar 15 09:43:48 alarm systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch.
  426. Mar 15 09:43:48 alarm kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database
  427. Mar 15 09:43:48 alarm kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
  428. Mar 15 09:43:48 alarm kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
  429. Mar 15 09:43:48 alarm kernel: cfg80211: failed to load regulatory.db
  430. Mar 15 09:43:48 alarm systemd-networkd[329]: lo: Link UP
  431. Mar 15 09:43:48 alarm systemd-networkd[329]: lo: Gained carrier
  432. Mar 15 09:43:48 alarm systemd-networkd[329]: Enumeration completed
  433. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  434. Mar 15 09:43:48 alarm systemd[1]: Started Network Configuration.
  435. Mar 15 09:43:48 alarm kernel: audit: type=1130 audit(1647333828.259:6): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  436. Mar 15 09:43:48 alarm systemd[1]: Found device APPLE SSD AP0256Q EFI_-_ASAHI.
  437. Mar 15 09:43:48 alarm systemd[1]: Mounting /boot/efi...
  438. Mar 15 09:43:48 alarm systemd[1]: Mounted /boot/efi.
  439. Mar 15 09:43:48 alarm systemd[1]: Reached target Local File Systems.
  440. Mar 15 09:43:48 alarm systemd[1]: Starting Rebuild Dynamic Linker Cache...
  441. Mar 15 09:43:48 alarm systemd[1]: Set Up Additional Binary Formats was skipped because all trigger condition checks failed.
  442. Mar 15 09:43:48 alarm systemd[1]: Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
  443. Mar 15 09:43:48 alarm systemd[1]: Starting Automatic Boot Loader Update...
  444. Mar 15 09:43:48 alarm systemd[1]: Starting Create Volatile Files and Directories...
  445. Mar 15 09:43:48 alarm systemd[1]: Starting Update vendor firmware...
  446. Mar 15 09:43:48 alarm update-vendor-firmware[348]: Extracting updated vendor firmware...
  447. Mar 15 09:43:48 alarm systemd[1]: Finished Automatic Boot Loader Update.
  448. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  449. Mar 15 09:43:48 alarm kernel: audit: type=1130 audit(1647333828.318:7): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  450. Mar 15 09:43:48 alarm update-vendor-firmware[348]: Done
  451. Mar 15 09:43:48 alarm systemd[1]: Finished Update vendor firmware.
  452. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=update-vendor-firmware comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  453. Mar 15 09:43:48 alarm kernel: audit: type=1130 audit(1647333828.323:8): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=update-vendor-firmware comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  454. Mar 15 09:43:48 alarm systemd[1]: Starting Coldplug All udev Devices...
  455. Mar 15 09:43:48 alarm systemd[1]: Finished Create Volatile Files and Directories.
  456. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  457. Mar 15 09:43:48 alarm kernel: audit: type=1130 audit(1647333828.331:9): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  458. Mar 15 09:43:48 alarm systemd[1]: Starting Rebuild Journal Catalog...
  459. Mar 15 09:43:48 alarm audit: BPF prog-id=13 op=LOAD
  460. Mar 15 09:43:48 alarm systemd[1]: Starting Network Name Resolution...
  461. Mar 15 09:43:48 alarm kernel: audit: type=1334 audit(1647333828.332:10): prog-id=13 op=LOAD
  462. Mar 15 09:43:48 alarm audit: BPF prog-id=14 op=LOAD
  463. Mar 15 09:43:48 alarm systemd[1]: Starting Network Time Synchronization...
  464. Mar 15 09:43:48 alarm systemd[1]: Starting Record System Boot/Shutdown in UTMP...
  465. Mar 15 09:43:48 alarm kernel: audit: type=1334 audit(1647333828.333:11): prog-id=14 op=LOAD
  466. Mar 15 09:43:48 alarm audit[358]: SYSTEM_BOOT pid=358 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
  467. Mar 15 09:43:48 alarm systemd[1]: Finished Rebuild Journal Catalog.
  468. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  469. Mar 15 09:43:48 alarm systemd[1]: Finished Record System Boot/Shutdown in UTMP.
  470. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  471. Mar 15 09:43:48 alarm systemd[1]: Started Network Time Synchronization.
  472. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  473. Mar 15 09:43:48 alarm systemd[1]: Reached target System Time Set.
  474. Mar 15 09:43:48 alarm systemd-resolved[356]: Positive Trust Anchors:
  475. Mar 15 09:43:48 alarm systemd-resolved[356]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
  476. Mar 15 09:43:48 alarm systemd-resolved[356]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
  477. Mar 15 09:43:48 alarm systemd[1]: Finished Rebuild Dynamic Linker Cache.
  478. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  479. Mar 15 09:43:48 alarm systemd[1]: Starting Update is Completed...
  480. Mar 15 09:43:48 alarm systemd[1]: Finished Update is Completed.
  481. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  482. Mar 15 09:43:48 alarm systemd-resolved[356]: Using system hostname 'alarm'.
  483. Mar 15 09:43:48 alarm systemd[1]: Started Network Name Resolution.
  484. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  485. Mar 15 09:43:48 alarm systemd[1]: Reached target Network.
  486. Mar 15 09:43:48 alarm systemd[1]: Reached target Host and Network Name Lookups.
  487. Mar 15 09:43:48 alarm systemd[1]: Finished Coldplug All udev Devices.
  488. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  489. Mar 15 09:43:48 alarm systemd[1]: Reached target System Initialization.
  490. Mar 15 09:43:48 alarm systemd[1]: Started Daily verification of password and group files.
  491. Mar 15 09:43:48 alarm systemd[1]: Started Daily Cleanup of Temporary Directories.
  492. Mar 15 09:43:48 alarm systemd[1]: Reached target Timer Units.
  493. Mar 15 09:43:48 alarm systemd[1]: Listening on D-Bus System Message Bus Socket.
  494. Mar 15 09:43:48 alarm systemd[1]: Reached target Socket Units.
  495. Mar 15 09:43:48 alarm systemd[1]: Reached target Basic System.
  496. Mar 15 09:43:48 alarm systemd[1]: Starting D-Bus System Message Bus...
  497. Mar 15 09:43:48 alarm systemd[1]: Starting Sets up system on first boot...
  498. Mar 15 09:43:48 alarm audit: BPF prog-id=15 op=LOAD
  499. Mar 15 09:43:48 alarm audit: BPF prog-id=16 op=LOAD
  500. Mar 15 09:43:48 alarm audit: BPF prog-id=17 op=LOAD
  501. Mar 15 09:43:48 alarm systemd[1]: Starting User Login Management...
  502. Mar 15 09:43:48 alarm dbus-daemon[386]: dbus[386]: Unknown group "netdev" in message bus configuration file
  503. Mar 15 09:43:48 alarm first-boot[387]: Randomizing root filesystem UUID...
  504. Mar 15 09:43:48 alarm dbus-daemon[386]: dbus[386]: Unknown group "netdev" in message bus configuration file
  505. Mar 15 09:43:48 alarm first-boot[391]: tune2fs 1.46.5 (30-Dec-2021)
  506. Mar 15 09:43:48 alarm systemd[1]: Started D-Bus System Message Bus.
  507. Mar 15 09:43:48 alarm first-boot[387]: Root filesystem: UUID=fc9bf1ef-b95f-46ce-92ac-c4807f91788d
  508. Mar 15 09:43:48 alarm first-boot[387]: Randomizing EFI system partition UUID...
  509. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  510. Mar 15 09:43:48 alarm first-boot[398]: 4+0 records in
  511. Mar 15 09:43:48 alarm first-boot[398]: 4+0 records out
  512. Mar 15 09:43:48 alarm audit: BPF prog-id=18 op=LOAD
  513. Mar 15 09:43:48 alarm first-boot[398]: 4 bytes copied, 3.0791e-05 s, 130 kB/s
  514. Mar 15 09:43:48 alarm first-boot[399]: 4+0 records in
  515. Mar 15 09:43:48 alarm first-boot[399]: 4+0 records out
  516. Mar 15 09:43:48 alarm first-boot[399]: 4 bytes copied, 1.675e-05 s, 239 kB/s
  517. Mar 15 09:43:48 alarm systemd[1]: Starting Home Area Manager...
  518. Mar 15 09:43:48 alarm first-boot[387]: EFI partition: UUID=C342-F717
  519. Mar 15 09:43:48 alarm first-boot[387]: Regenerating /etc/fstab...
  520. Mar 15 09:43:48 alarm first-boot[404]: UUID=fc9bf1ef-b95f-46ce-92ac-c4807f91788d / ext4 rw,relatime,x-systemd.growfs 0 1
  521. Mar 15 09:43:48 alarm first-boot[404]: UUID=C342-F717 /boot/efi vfat rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro 0 2
  522. Mar 15 09:43:48 alarm systemd-logind[389]: New seat seat0.
  523. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: No cache used with register defaults set!
  524. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: supply VA not found, using dummy regulator
  525. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: supply VP not found, using dummy regulator
  526. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: supply VCP not found, using dummy regulator
  527. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: supply VD_FILT not found, using dummy regulator
  528. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: supply VL not found, using dummy regulator
  529. Mar 15 09:43:48 alarm systemd-homed[402]: Watching /home.
  530. Mar 15 09:43:48 alarm systemd[1]: Started Home Area Manager.
  531. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-homed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  532. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-homed-activate comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  533. Mar 15 09:43:48 alarm systemd[1]: Finished Home Area Activation.
  534. Mar 15 09:43:48 alarm systemd[1]: Starting Permit User Sessions...
  535. Mar 15 09:43:48 alarm systemd[1]: Finished Permit User Sessions.
  536. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  537. Mar 15 09:43:48 alarm systemd[1]: Started Getty on tty1.
  538. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  539. Mar 15 09:43:48 alarm systemd[1]: Reached target Login Prompts.
  540. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: CS42L42 Device ID (42A83). Expected 42A42
  541. Mar 15 09:43:48 alarm systemd-logind[389]: Watching system buttons on /dev/input/event0 (Apple Internal Keyboard / Trackpad)
  542. Mar 15 09:43:48 alarm systemd[1]: Started User Login Management.
  543. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  544. Mar 15 09:43:48 alarm kernel: cs42l42 2-0048: Cirrus Logic CS42L42, Revision: B0
  545. Mar 15 09:43:48 alarm kernel: macsmc-gpio macsmc-gpio: First GPIO key: gP01 (0x67503031)
  546. Mar 15 09:43:48 alarm kernel: simple-framebuffer 9e2120000.framebuffer: [drm] could not acquire memory region [mem 0x9e2120000-0x9e30bffff flags 0x200]
  547. Mar 15 09:43:48 alarm kernel: [drm] Initialized simpledrm 1.0.0 20200625 for 9e2120000.framebuffer on minor 1
  548. Mar 15 09:43:48 alarm kernel: checking generic (9e2120000 fa0000) vs hw (0 0)
  549. Mar 15 09:43:48 alarm kernel: simple-framebuffer 9e2120000.framebuffer: [drm] fb1: simpledrmdrmfb frame buffer device
  550. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
  551. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1
  552. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.0.auto: hcc params 0x0238ffcd hci version 0x110 quirks 0x0000000000010010
  553. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.0.auto: irq 81, io mem 0x382280000
  554. Mar 15 09:43:48 alarm kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.17
  555. Mar 15 09:43:48 alarm kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  556. Mar 15 09:43:48 alarm kernel: usb usb1: Product: xHCI Host Controller
  557. Mar 15 09:43:48 alarm kernel: usb usb1: Manufacturer: Linux 5.17.0-rc6-asahi-next-20220301-4-asahi-ARCH xhci-hcd
  558. Mar 15 09:43:48 alarm kernel: usb usb1: SerialNumber: xhci-hcd.0.auto
  559. Mar 15 09:43:48 alarm kernel: hub 1-0:1.0: USB hub found
  560. Mar 15 09:43:48 alarm kernel: hub 1-0:1.0: 1 port detected
  561. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
  562. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2
  563. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.0.auto: Host supports USB 3.1 Enhanced SuperSpeed
  564. Mar 15 09:43:48 alarm kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
  565. Mar 15 09:43:48 alarm kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.17
  566. Mar 15 09:43:48 alarm kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  567. Mar 15 09:43:48 alarm kernel: usb usb2: Product: xHCI Host Controller
  568. Mar 15 09:43:48 alarm kernel: usb usb2: Manufacturer: Linux 5.17.0-rc6-asahi-next-20220301-4-asahi-ARCH xhci-hcd
  569. Mar 15 09:43:48 alarm kernel: usb usb2: SerialNumber: xhci-hcd.0.auto
  570. Mar 15 09:43:48 alarm kernel: hub 2-0:1.0: USB hub found
  571. Mar 15 09:43:48 alarm kernel: hub 2-0:1.0: 1 port detected
  572. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
  573. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 3
  574. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.1.auto: hcc params 0x0238ffcd hci version 0x110 quirks 0x0000000000010010
  575. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.1.auto: irq 83, io mem 0x502280000
  576. Mar 15 09:43:48 alarm kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.17
  577. Mar 15 09:43:48 alarm kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  578. Mar 15 09:43:48 alarm kernel: usb usb3: Product: xHCI Host Controller
  579. Mar 15 09:43:48 alarm kernel: usb usb3: Manufacturer: Linux 5.17.0-rc6-asahi-next-20220301-4-asahi-ARCH xhci-hcd
  580. Mar 15 09:43:48 alarm kernel: usb usb3: SerialNumber: xhci-hcd.1.auto
  581. Mar 15 09:43:48 alarm kernel: hub 3-0:1.0: USB hub found
  582. Mar 15 09:43:48 alarm kernel: hub 3-0:1.0: 1 port detected
  583. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
  584. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 4
  585. Mar 15 09:43:48 alarm kernel: xhci-hcd xhci-hcd.1.auto: Host supports USB 3.1 Enhanced SuperSpeed
  586. Mar 15 09:43:48 alarm kernel: usb usb4: We don't know the algorithms for LPM for this host, disabling LPM.
  587. Mar 15 09:43:48 alarm kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.17
  588. Mar 15 09:43:48 alarm kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  589. Mar 15 09:43:48 alarm kernel: usb usb4: Product: xHCI Host Controller
  590. Mar 15 09:43:48 alarm kernel: usb usb4: Manufacturer: Linux 5.17.0-rc6-asahi-next-20220301-4-asahi-ARCH xhci-hcd
  591. Mar 15 09:43:48 alarm kernel: usb usb4: SerialNumber: xhci-hcd.1.auto
  592. Mar 15 09:43:48 alarm kernel: hub 4-0:1.0: USB hub found
  593. Mar 15 09:43:48 alarm kernel: hub 4-0:1.0: 1 port detected
  594. Mar 15 09:43:48 alarm kernel: pcie-apple 690000000.pcie: host bridge /soc/pcie@690000000 ranges:
  595. Mar 15 09:43:48 alarm kernel: pcie-apple 690000000.pcie: MEM 0x06a0000000..0x06bfffffff -> 0x06a0000000
  596. Mar 15 09:43:48 alarm kernel: pcie-apple 690000000.pcie: MEM 0x06c0000000..0x06ffffffff -> 0x00c0000000
  597. Mar 15 09:43:48 alarm systemd[1]: Created slice Slice /system/systemd-backlight.
  598. Mar 15 09:43:48 alarm systemd[1]: Starting Load/Save Screen Backlight Brightness of backlight:gpio-bl...
  599. Mar 15 09:43:48 alarm systemd[1]: Finished Load/Save Screen Backlight Brightness of backlight:gpio-bl.
  600. Mar 15 09:43:48 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-backlight@backlight:gpio-bl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  601. Mar 15 09:43:48 alarm kernel: macsmc-reboot macsmc-reboot: Handling reboot and poweroff requests via SMC
  602. Mar 15 09:43:48 alarm kernel: pcie-apple 690000000.pcie: /soc/pcie@690000000/pci@0,0 link didn't come up
  603. Mar 15 09:43:48 alarm kernel: pcie-apple 690000000.pcie: ECAM at [mem 0x690000000-0x690ffffff] for [bus 00-03]
  604. Mar 15 09:43:48 alarm kernel: pcie-apple 690000000.pcie: PCI host bridge to bus 0000:00
  605. Mar 15 09:43:48 alarm kernel: pci_bus 0000:00: root bus resource [bus 00-03]
  606. Mar 15 09:43:48 alarm kernel: pci_bus 0000:00: root bus resource [mem 0x6a0000000-0x6bfffffff pref]
  607. Mar 15 09:43:48 alarm kernel: pci_bus 0000:00: root bus resource [mem 0x6c0000000-0x6ffffffff] (bus address [0xc0000000-0xffffffff])
  608. Mar 15 09:43:48 alarm kernel: pci 0000:00:00.0: [106b:100c] type 01 class 0x060400
  609. Mar 15 09:43:48 alarm kernel: pci 0000:00:00.0: PME# supported from D0 D3hot D3cold
  610. Mar 15 09:43:48 alarm kernel: pci 0000:00:00.0: bridge configuration invalid ([bus 00-00]), reconfiguring
  611. Mar 15 09:43:48 alarm kernel: pci_bus 0000:01: busn_res: [bus 01-03] end is updated to 01
  612. Mar 15 09:43:48 alarm kernel: pci 0000:00:00.0: PCI bridge to [bus 01]
  613. Mar 15 09:43:48 alarm kernel: OF: /soc/pcie@690000000: no iommu-map translation for id 0x0 on (null)
  614. Mar 15 09:43:48 alarm kernel: pcieport 0000:00:00.0: PME: Signaling with IRQ 103
  615. Mar 15 09:43:48 alarm kernel: pcieport 0000:00:00.0: AER: enabled with IRQ 103
  616. Mar 15 09:43:49 alarm first-boot[406]: UUID: fc9bf1ef-b95f-46ce-92ac-c4807f91788d
  617. Mar 15 09:43:49 alarm first-boot[406]: Partition: hd0,gpt5
  618. Mar 15 09:43:49 alarm first-boot[406]: Generating GRUB image...
  619. Mar 15 09:43:53 alarm first-boot[1635]: Generating grub configuration file ...
  620. Mar 15 09:43:55 alarm login[420]: pam_systemd_home(login:auth): Not a user managed by systemd-homed: No home for user alarm known
  621. Mar 15 09:43:55 alarm audit[420]: USER_AUTH pid=420 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  622. Mar 15 09:43:55 alarm audit[420]: USER_ACCT pid=420 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  623. Mar 15 09:43:55 alarm audit[420]: CRED_ACQ pid=420 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  624. Mar 15 09:43:55 alarm audit[420]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=4 a0=5 a1=ffffda856350 a2=4 a3=ffff374a4c60 items=0 ppid=1 pid=420 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty1 ses=1 comm="login" exe="/usr/bin/login" key=(null)
  625. Mar 15 09:43:55 alarm kernel: kauditd_printk_skb: 19 callbacks suppressed
  626. Mar 15 09:43:55 alarm kernel: audit: type=1100 audit(1647333835.858:31): pid=420 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  627. Mar 15 09:43:55 alarm kernel: audit: type=1101 audit(1647333835.858:32): pid=420 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  628. Mar 15 09:43:55 alarm kernel: audit: type=1103 audit(1647333835.858:33): pid=420 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  629. Mar 15 09:43:55 alarm kernel: audit: type=1006 audit(1647333835.858:34): pid=420 uid=0 old-auid=4294967295 auid=1000 tty=tty1 old-ses=4294967295 ses=1 res=1
  630. Mar 15 09:43:55 alarm kernel: audit: type=1300 audit(1647333835.858:34): arch=c00000b7 syscall=64 success=yes exit=4 a0=5 a1=ffffda856350 a2=4 a3=ffff374a4c60 items=0 ppid=1 pid=420 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty1 ses=1 comm="login" exe="/usr/bin/login" key=(null)
  631. Mar 15 09:43:55 alarm kernel: audit: type=1327 audit(1647333835.858:34): proctitle=2F62696E2F6C6F67696E002D70002D2D
  632. Mar 15 09:43:55 alarm audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D
  633. Mar 15 09:43:55 alarm login[420]: pam_unix(login:session): session opened for user alarm(uid=1000) by LOGIN(uid=0)
  634. Mar 15 09:43:55 alarm systemd[1]: Created slice User Slice of UID 1000.
  635. Mar 15 09:43:55 alarm systemd[1]: Starting User Runtime Directory /run/user/1000...
  636. Mar 15 09:43:55 alarm systemd-logind[389]: New session 1 of user alarm.
  637. Mar 15 09:43:55 alarm systemd[1]: Finished User Runtime Directory /run/user/1000.
  638. Mar 15 09:43:55 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  639. Mar 15 09:43:55 alarm kernel: audit: type=1130 audit(1647333835.867:35): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  640. Mar 15 09:43:55 alarm systemd[1]: Starting User Manager for UID 1000...
  641. Mar 15 09:43:55 alarm systemd[2282]: pam_systemd_home(systemd-user:account): Not a user managed by systemd-homed: No home for user alarm known
  642. Mar 15 09:43:55 alarm audit[2282]: USER_ACCT pid=2282 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="alarm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  643. Mar 15 09:43:55 alarm audit[2282]: CRED_ACQ pid=2282 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="alarm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  644. Mar 15 09:43:55 alarm audit[2282]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=4 a0=9 a1=fffff750b5d0 a2=4 a3=fffecf1292a0 items=0 ppid=1 pid=2282 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
  645. Mar 15 09:43:55 alarm audit: PROCTITLE proctitle="(systemd)"
  646. Mar 15 09:43:55 alarm systemd[2282]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8002 service=[systemd-user] terminal=[] user=[alarm] ruser=[<unknown>] rhost=[<unknown>]
  647. Mar 15 09:43:55 alarm systemd[2282]: pam_unix(systemd-user:session): session opened for user alarm(uid=1000) by (uid=0)
  648. Mar 15 09:43:55 alarm systemd[2282]: pam_env(systemd-user:session): deprecated reading of user environment enabled
  649. Mar 15 09:43:55 alarm audit[2282]: USER_START pid=2282 uid=0 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_loginuid,pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="alarm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  650. Mar 15 09:43:55 alarm kernel: audit: type=1101 audit(1647333835.870:36): pid=2282 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="alarm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  651. Mar 15 09:43:55 alarm kernel: audit: type=1103 audit(1647333835.870:37): pid=2282 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="alarm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  652. Mar 15 09:43:55 alarm kernel: audit: type=1006 audit(1647333835.870:38): pid=2282 uid=0 old-auid=4294967295 auid=1000 tty=(none) old-ses=4294967295 ses=2 res=1
  653. Mar 15 09:43:55 alarm audit: BPF prog-id=19 op=LOAD
  654. Mar 15 09:43:55 alarm audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=8 a0=5 a1=fffff902ef40 a2=78 a3=ffff415583c0 items=0 ppid=1 pid=2282 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm="systemd" exe="/usr/lib/systemd/systemd" key=(null)
  655. Mar 15 09:43:55 alarm audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
  656. Mar 15 09:43:55 alarm audit: BPF prog-id=0 op=UNLOAD
  657. Mar 15 09:43:55 alarm systemd[2282]: Queued start job for default target Main User Target.
  658. Mar 15 09:43:55 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  659. Mar 15 09:43:55 alarm audit[420]: USER_START pid=420 uid=0 auid=1000 ses=1 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  660. Mar 15 09:43:55 alarm audit[420]: CRED_REFR pid=420 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  661. Mar 15 09:43:55 alarm login[420]: pam_env(login:session): deprecated reading of user environment enabled
  662. Mar 15 09:43:55 alarm systemd[2282]: Created slice User Application Slice.
  663. Mar 15 09:43:55 alarm login[420]: LOGIN ON tty1 BY alarm
  664. Mar 15 09:43:55 alarm systemd[2282]: Reached target Paths.
  665. Mar 15 09:43:55 alarm systemd[2282]: Reached target Timers.
  666. Mar 15 09:43:55 alarm systemd[2282]: Starting D-Bus User Message Bus Socket...
  667. Mar 15 09:43:55 alarm systemd[2282]: Listening on GnuPG network certificate management daemon.
  668. Mar 15 09:43:55 alarm systemd[2282]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers).
  669. Mar 15 09:43:55 alarm systemd[2282]: Listening on GnuPG cryptographic agent and passphrase cache (restricted).
  670. Mar 15 09:43:55 alarm systemd[2282]: Listening on GnuPG cryptographic agent (ssh-agent emulation).
  671. Mar 15 09:43:55 alarm systemd[2282]: Listening on GnuPG cryptographic agent and passphrase cache.
  672. Mar 15 09:43:55 alarm systemd[2282]: Listening on p11-kit server.
  673. Mar 15 09:43:55 alarm systemd[2282]: Listening on D-Bus User Message Bus Socket.
  674. Mar 15 09:43:55 alarm systemd[2282]: Reached target Sockets.
  675. Mar 15 09:43:55 alarm systemd[2282]: Reached target Basic System.
  676. Mar 15 09:43:55 alarm systemd[2282]: Reached target Main User Target.
  677. Mar 15 09:43:55 alarm systemd[2282]: Startup finished in 31ms.
  678. Mar 15 09:43:55 alarm systemd[1]: Started User Manager for UID 1000.
  679. Mar 15 09:43:55 alarm systemd[1]: Started Session 1 of User alarm.
  680. Mar 15 09:43:59 alarm first-boot[2964]: Found linux image: /boot/vmlinuz-linux-asahi
  681. Mar 15 09:43:59 alarm first-boot[2964]: Found initrd image: /boot/initramfs-linux-asahi.img
  682. Mar 15 09:44:04 alarm first-boot[2964]: Found fallback initrd image(s) in /boot: initramfs-linux-asahi-fallback.img
  683. Mar 15 09:44:04 alarm first-boot[4540]: Warning: os-prober will not be executed to detect other bootable partitions.
  684. Mar 15 09:44:04 alarm first-boot[4540]: Systems on them will not be added to the GRUB boot configuration.
  685. Mar 15 09:44:04 alarm first-boot[4540]: Check GRUB_DISABLE_OS_PROBER documentation entry.
  686. Mar 15 09:44:04 alarm first-boot[4550]: done
  687. Mar 15 09:44:04 alarm first-boot[387]: Initializing Pacman keyring...
  688. Mar 15 09:44:04 alarm first-boot[4555]: gpg: /etc/pacman.d/gnupg/trustdb.gpg: trustdb created
  689. Mar 15 09:44:04 alarm first-boot[4555]: gpg: no ultimately trusted keys found
  690. Mar 15 09:44:04 alarm first-boot[4574]: gpg: starting migration from earlier GnuPG versions
  691. Mar 15 09:44:04 alarm first-boot[4574]: gpg: porting secret keys from '/etc/pacman.d/gnupg/secring.gpg' to gpg-agent
  692. Mar 15 09:44:04 alarm first-boot[4574]: gpg: migration succeeded
  693. Mar 15 09:44:04 alarm first-boot[4551]: ==> Generating pacman master key. This may take some time.
  694. Mar 15 09:44:04 alarm first-boot[4581]: gpg: Generating pacman keyring master key...
  695. Mar 15 09:44:06 alarm first-boot[4581]: gpg: key 9DDE507AD4A6EB12 marked as ultimately trusted
  696. Mar 15 09:44:06 alarm first-boot[4581]: gpg: directory '/etc/pacman.d/gnupg/openpgp-revocs.d' created
  697. Mar 15 09:44:06 alarm first-boot[4581]: gpg: revocation certificate stored as '/etc/pacman.d/gnupg/openpgp-revocs.d/427288A0DA77800B4E0809CD9DDE507AD4A6EB12.rev'
  698. Mar 15 09:44:06 alarm first-boot[4581]: gpg: Done
  699. Mar 15 09:44:06 alarm first-boot[4551]: ==> Updating trust database...
  700. Mar 15 09:44:06 alarm first-boot[4584]: gpg: marginals needed: 3 completes needed: 1 trust model: pgp
  701. Mar 15 09:44:06 alarm first-boot[4584]: gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
  702. Mar 15 09:44:06 alarm first-boot[4585]: ==> Appending keys from archlinuxarm.gpg...
  703. Mar 15 09:44:06 alarm first-boot[4585]: ==> Appending keys from asahilinux.gpg...
  704. Mar 15 09:44:06 alarm first-boot[4585]: ==> Locally signing trusted keys in keyring...
  705. Mar 15 09:44:06 alarm first-boot[4585]: -> Locally signed 4 keys.
  706. Mar 15 09:44:06 alarm first-boot[4585]: ==> Importing owner trust values...
  707. Mar 15 09:44:06 alarm first-boot[4636]: gpg: setting ownertrust to 4
  708. Mar 15 09:44:06 alarm first-boot[4636]: gpg: inserting ownertrust of 4
  709. Mar 15 09:44:06 alarm first-boot[4636]: gpg: setting ownertrust to 4
  710. Mar 15 09:44:06 alarm first-boot[4637]: gpg: setting ownertrust to 4
  711. Mar 15 09:44:06 alarm first-boot[4585]: ==> Updating trust database...
  712. Mar 15 09:44:06 alarm first-boot[4639]: gpg: marginals needed: 3 completes needed: 1 trust model: pgp
  713. Mar 15 09:44:06 alarm first-boot[4639]: gpg: depth: 0 valid: 1 signed: 4 trust: 0-, 0q, 0n, 0m, 0f, 1u
  714. Mar 15 09:44:06 alarm first-boot[4639]: gpg: depth: 1 valid: 4 signed: 1 trust: 0-, 0q, 0n, 4m, 0f, 0u
  715. Mar 15 09:44:06 alarm first-boot[4639]: gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u
  716. Mar 15 09:44:06 alarm first-boot[4639]: gpg: next trustdb check due at 2026-04-06
  717. Mar 15 09:44:06 alarm systemd[1]: Finished Sets up system on first boot.
  718. Mar 15 09:44:06 alarm kernel: kauditd_printk_skb: 10 callbacks suppressed
  719. Mar 15 09:44:06 alarm kernel: audit: type=1130 audit(1647333846.799:45): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=first-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  720. Mar 15 09:44:06 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=first-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  721. Mar 15 09:44:06 alarm systemd[1]: Reached target First Boot Complete.
  722. Mar 15 09:44:06 alarm systemd[1]: Reached target Multi-User System.
  723. Mar 15 09:44:06 alarm systemd[1]: Reached target Graphical Interface.
  724. Mar 15 09:44:06 alarm systemd[1]: Starting Commit a transient machine-id on disk...
  725. Mar 15 09:44:06 alarm systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
  726. Mar 15 09:44:06 alarm systemd[1]: Finished Commit a transient machine-id on disk.
  727. Mar 15 09:44:06 alarm systemd[1]: Startup finished in 790ms (kernel) + 29.178s (userspace) = 29.969s.
  728. Mar 15 09:44:06 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  729. Mar 15 09:44:06 alarm kernel: audit: type=1130 audit(1647333846.817:46): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  730. Mar 15 09:47:01 alarm systemd-resolved[356]: Switching to fallback DNS server 9.9.9.10#dns.quad9.net.
  731. Mar 15 09:47:08 alarm audit[4661]: USER_AUTH pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:authentication grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  732. Mar 15 09:47:08 alarm audit[4661]: USER_ACCT pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:accounting grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  733. Mar 15 09:47:08 alarm su[4661]: (to root) alarm on tty1
  734. Mar 15 09:47:08 alarm audit[4661]: CRED_ACQ pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  735. Mar 15 09:47:08 alarm audit[4661]: USER_START pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:session_open grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  736. Mar 15 09:47:08 alarm su[4661]: pam_unix(su:session): session opened for user root(uid=0) by alarm(uid=1000)
  737. Mar 15 09:47:08 alarm kernel: audit: type=1100 audit(1647334028.323:47): pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:authentication grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  738. Mar 15 09:47:08 alarm kernel: audit: type=1101 audit(1647334028.324:48): pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:accounting grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  739. Mar 15 09:47:08 alarm kernel: audit: type=1103 audit(1647334028.324:49): pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  740. Mar 15 09:47:08 alarm kernel: audit: type=1105 audit(1647334028.324:50): pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:session_open grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  741. Mar 15 09:47:32 alarm su[4661]: pam_unix(su:session): session closed for user root
  742. Mar 15 09:47:32 alarm audit[420]: CRED_DISP pid=420 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  743. Mar 15 09:47:32 alarm audit[4661]: USER_END pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:session_close grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  744. Mar 15 09:47:32 alarm audit[4661]: CRED_DISP pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  745. Mar 15 09:47:32 alarm systemd[1]: Stopping Session 1 of User alarm...
  746. Mar 15 09:47:32 alarm kernel: audit: type=1104 audit(1647334052.630:51): pid=420 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  747. Mar 15 09:47:32 alarm kernel: audit: type=1106 audit(1647334052.630:52): pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:session_close grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  748. Mar 15 09:47:32 alarm kernel: audit: type=1104 audit(1647334052.630:53): pid=4661 uid=1000 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  749. Mar 15 09:47:32 alarm login[420]: pam_unix(login:session): session closed for user alarm
  750. Mar 15 09:47:32 alarm audit[420]: USER_END pid=420 uid=0 auid=1000 ses=1 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  751. Mar 15 09:47:32 alarm systemd[1]: Removed slice Slice /system/modprobe.
  752. Mar 15 09:47:32 alarm systemd[1]: Stopped target Graphical Interface.
  753. Mar 15 09:47:32 alarm systemd[1]: Stopped target Multi-User System.
  754. Mar 15 09:47:32 alarm kernel: audit: type=1106 audit(1647334052.631:54): pid=420 uid=0 auid=1000 ses=1 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="alarm" exe="/usr/bin/login" hostname=alarm addr=? terminal=/dev/tty1 res=success'
  755. Mar 15 09:47:32 alarm systemd[1]: Stopped target Login Prompts.
  756. Mar 15 09:47:32 alarm systemd[1]: Stopped target Containers.
  757. Mar 15 09:47:32 alarm systemd[1]: Stopped target Host and Network Name Lookups.
  758. Mar 15 09:47:32 alarm systemd[1]: Stopped target Remote Encrypted Volumes.
  759. Mar 15 09:47:32 alarm systemd[1]: Stopped target Timer Units.
  760. Mar 15 09:47:32 alarm systemd[1]: shadow.timer: Deactivated successfully.
  761. Mar 15 09:47:32 alarm systemd[1]: Stopped Daily verification of password and group files.
  762. Mar 15 09:47:32 alarm systemd[1]: systemd-tmpfiles-clean.timer: Deactivated successfully.
  763. Mar 15 09:47:32 alarm systemd[1]: Stopped Daily Cleanup of Temporary Directories.
  764. Mar 15 09:47:32 alarm systemd[1]: Stopped target System Time Set.
  765. Mar 15 09:47:32 alarm systemd[1]: systemd-coredump.socket: Deactivated successfully.
  766. Mar 15 09:47:32 alarm systemd[1]: Closed Process Core Dump Socket.
  767. Mar 15 09:47:32 alarm systemd[1]: systemd-rfkill.socket: Deactivated successfully.
  768. Mar 15 09:47:32 alarm systemd[1]: Closed Load/Save RF Kill Switch Status /dev/rfkill Watch.
  769. Mar 15 09:47:32 alarm systemd[1]: Stopping Getty on tty1...
  770. Mar 15 09:47:32 alarm systemd[1]: Starting Generate shutdown-ramfs...
  771. Mar 15 09:47:32 alarm systemd[1]: systemd-machine-id-commit.service: Deactivated successfully.
  772. Mar 15 09:47:32 alarm systemd[1]: Stopped Commit a transient machine-id on disk.
  773. Mar 15 09:47:32 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  774. Mar 15 09:47:32 alarm systemd[1]: Stopped target First Boot Complete.
  775. Mar 15 09:47:32 alarm systemd[1]: Stopping Sets up system on first boot...
  776. Mar 15 09:47:32 alarm kernel: audit: type=1131 audit(1647334052.638:55): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  777. Mar 15 09:47:32 alarm systemd[1]: Stopping Load/Save Random Seed...
  778. Mar 15 09:47:32 alarm systemd[1]: getty@tty1.service: Deactivated successfully.
  779. Mar 15 09:47:32 alarm systemd[1]: Stopped Getty on tty1.
  780. Mar 15 09:47:32 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  781. Mar 15 09:47:32 alarm kernel: audit: type=1131 audit(1647334052.643:56): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  782. Mar 15 09:47:32 alarm mkinitcpio[4690]: ==> Starting build: none
  783. Mar 15 09:47:32 alarm mkinitcpio[4690]: -> Running build hook: [sd-shutdown]
  784. Mar 15 09:47:32 alarm systemd[1]: systemd-random-seed.service: Deactivated successfully.
  785. Mar 15 09:47:32 alarm systemd[1]: Stopped Load/Save Random Seed.
  786. Mar 15 09:47:32 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  787. Mar 15 09:47:32 alarm kernel: audit: type=1131 audit(1647334052.656:57): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  788. Mar 15 09:47:32 alarm systemd[1]: first-boot.service: Deactivated successfully.
  789. Mar 15 09:47:32 alarm systemd[1]: Stopped Sets up system on first boot.
  790. Mar 15 09:47:32 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=first-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  791. Mar 15 09:47:32 alarm systemd[1]: first-boot.service: Consumed 18.278s CPU time.
  792. Mar 15 09:47:32 alarm kernel: audit: type=1131 audit(1647334052.657:58): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=first-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  793. Mar 15 09:47:32 alarm systemd-logind[389]: Session 1 logged out. Waiting for processes to exit.
  794. Mar 15 09:47:32 alarm systemd[1]: Removed slice Slice /system/getty.
  795. Mar 15 09:47:32 alarm mkinitcpio[4690]: ==> Build complete.
  796. Mar 15 09:47:32 alarm systemd[1]: mkinitcpio-generate-shutdown-ramfs.service: Deactivated successfully.
  797. Mar 15 09:47:32 alarm systemd[1]: Finished Generate shutdown-ramfs.
  798. Mar 15 09:47:32 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=mkinitcpio-generate-shutdown-ramfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  799. Mar 15 09:47:32 alarm kernel: audit: type=1130 audit(1647334052.691:59): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=mkinitcpio-generate-shutdown-ramfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  800. Mar 15 09:47:32 alarm kernel: audit: type=1131 audit(1647334052.691:60): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=mkinitcpio-generate-shutdown-ramfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  801. Mar 15 09:47:32 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=mkinitcpio-generate-shutdown-ramfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  802. Mar 15 09:47:34 alarm systemd[1]: session-1.scope: Deactivated successfully.
  803. Mar 15 09:47:34 alarm systemd[1]: Stopped Session 1 of User alarm.
  804. Mar 15 09:47:34 alarm systemd[1]: session-1.scope: Consumed 6.469s CPU time.
  805. Mar 15 09:47:34 alarm systemd[1]: Stopping User Login Management...
  806. Mar 15 09:47:34 alarm systemd[1]: Stopping User Manager for UID 1000...
  807. Mar 15 09:47:34 alarm systemd-logind[389]: Removed session 1.
  808. Mar 15 09:47:34 alarm systemd[2282]: Activating special unit Exit the Session...
  809. Mar 15 09:47:34 alarm systemd[2282]: Stopped target Main User Target.
  810. Mar 15 09:47:34 alarm systemd[2282]: Stopped target Basic System.
  811. Mar 15 09:47:34 alarm systemd[2282]: Stopped target Paths.
  812. Mar 15 09:47:34 alarm systemd[2282]: Stopped target Sockets.
  813. Mar 15 09:47:34 alarm systemd[2282]: Stopped target Timers.
  814. Mar 15 09:47:34 alarm systemd[2282]: Closed D-Bus User Message Bus Socket.
  815. Mar 15 09:47:34 alarm systemd[2282]: Closed GnuPG network certificate management daemon.
  816. Mar 15 09:47:34 alarm systemd[2282]: Closed GnuPG cryptographic agent and passphrase cache (access for web browsers).
  817. Mar 15 09:47:34 alarm systemd[2282]: Closed GnuPG cryptographic agent and passphrase cache (restricted).
  818. Mar 15 09:47:34 alarm systemd[2282]: Closed GnuPG cryptographic agent (ssh-agent emulation).
  819. Mar 15 09:47:34 alarm systemd[2282]: Closed GnuPG cryptographic agent and passphrase cache.
  820. Mar 15 09:47:34 alarm systemd[2282]: Closed p11-kit server.
  821. Mar 15 09:47:34 alarm systemd[2282]: Removed slice User Application Slice.
  822. Mar 15 09:47:34 alarm systemd[2282]: Reached target Shutdown.
  823. Mar 15 09:47:34 alarm systemd[2282]: Finished Exit the Session.
  824. Mar 15 09:47:34 alarm systemd[2282]: Reached target Exit the Session.
  825. Mar 15 09:47:34 alarm systemd[2284]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8004 service=[systemd-user] terminal=[] user=[alarm] ruser=[<unknown>] rhost=[<unknown>]
  826. Mar 15 09:47:34 alarm systemd[1]: user@1000.service: Deactivated successfully.
  827. Mar 15 09:47:34 alarm systemd[1]: Stopped User Manager for UID 1000.
  828. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  829. Mar 15 09:47:34 alarm systemd[1]: Stopping User Runtime Directory /run/user/1000...
  830. Mar 15 09:47:34 alarm systemd[1]: run-user-1000.mount: Deactivated successfully.
  831. Mar 15 09:47:34 alarm systemd[1]: Unmounted /run/user/1000.
  832. Mar 15 09:47:34 alarm systemd[1]: user-runtime-dir@1000.service: Deactivated successfully.
  833. Mar 15 09:47:34 alarm systemd[1]: Stopped User Runtime Directory /run/user/1000.
  834. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  835. Mar 15 09:47:34 alarm systemd[1]: Removed slice User Slice of UID 1000.
  836. Mar 15 09:47:34 alarm systemd[1]: user-1000.slice: Consumed 6.511s CPU time.
  837. Mar 15 09:47:34 alarm systemd[1]: Stopping Permit User Sessions...
  838. Mar 15 09:47:34 alarm systemd[1]: systemd-user-sessions.service: Deactivated successfully.
  839. Mar 15 09:47:34 alarm systemd[1]: Stopped Permit User Sessions.
  840. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  841. Mar 15 09:47:34 alarm systemd[1]: Stopped target Network.
  842. Mar 15 09:47:34 alarm systemd[1]: Stopped target Remote File Systems.
  843. Mar 15 09:47:34 alarm systemd[1]: Stopping Home Area Activation...
  844. Mar 15 09:47:34 alarm systemd[1]: Stopping Network Name Resolution...
  845. Mar 15 09:47:34 alarm systemd[1]: systemd-homed-activate.service: Deactivated successfully.
  846. Mar 15 09:47:34 alarm systemd[1]: Stopped Home Area Activation.
  847. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-homed-activate comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  848. Mar 15 09:47:34 alarm systemd[1]: Stopping Home Area Manager...
  849. Mar 15 09:47:34 alarm systemd[1]: systemd-homed.service: Deactivated successfully.
  850. Mar 15 09:47:34 alarm systemd[1]: Stopped Home Area Manager.
  851. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-homed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  852. Mar 15 09:47:34 alarm systemd[1]: Stopping D-Bus System Message Bus...
  853. Mar 15 09:47:34 alarm systemd[1]: dbus.service: Deactivated successfully.
  854. Mar 15 09:47:34 alarm systemd[1]: Stopped D-Bus System Message Bus.
  855. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  856. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  857. Mar 15 09:47:34 alarm systemd[1]: systemd-logind.service: Deactivated successfully.
  858. Mar 15 09:47:34 alarm systemd[1]: Stopped User Login Management.
  859. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  860. Mar 15 09:47:34 alarm systemd[1]: Stopped target Basic System.
  861. Mar 15 09:47:34 alarm systemd[1]: Stopped target Path Units.
  862. Mar 15 09:47:34 alarm systemd[1]: Stopped target Slice Units.
  863. Mar 15 09:47:34 alarm systemd[1]: Removed slice User and Session Slice.
  864. Mar 15 09:47:34 alarm systemd[1]: user.slice: Consumed 6.511s CPU time.
  865. Mar 15 09:47:34 alarm systemd[1]: Stopped target Socket Units.
  866. Mar 15 09:47:34 alarm systemd[1]: dbus.socket: Deactivated successfully.
  867. Mar 15 09:47:34 alarm systemd[1]: Closed D-Bus System Message Bus Socket.
  868. Mar 15 09:47:34 alarm systemd[1]: Stopped target System Initialization.
  869. Mar 15 09:47:34 alarm systemd[1]: proc-sys-fs-binfmt_misc.automount: Deactivated successfully.
  870. Mar 15 09:47:34 alarm systemd[1]: Unset automount Arbitrary Executable File Formats File System Automount Point.
  871. Mar 15 09:47:34 alarm systemd[1]: Stopped target Local Encrypted Volumes.
  872. Mar 15 09:47:34 alarm systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
  873. Mar 15 09:47:34 alarm systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch.
  874. Mar 15 09:47:34 alarm systemd[1]: systemd-ask-password-wall.path: Deactivated successfully.
  875. Mar 15 09:47:34 alarm systemd[1]: Stopped Forward Password Requests to Wall Directory Watch.
  876. Mar 15 09:47:34 alarm systemd[1]: Stopped target Local Integrity Protected Volumes.
  877. Mar 15 09:47:34 alarm systemd[1]: Stopped target Local Verity Protected Volumes.
  878. Mar 15 09:47:34 alarm systemd[1]: Stopping Load/Save Screen Backlight Brightness of backlight:gpio-bl...
  879. Mar 15 09:47:34 alarm systemd[1]: Stopping Network Time Synchronization...
  880. Mar 15 09:47:34 alarm systemd[1]: systemd-update-done.service: Deactivated successfully.
  881. Mar 15 09:47:34 alarm systemd[1]: Stopped Update is Completed.
  882. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  883. Mar 15 09:47:34 alarm systemd[1]: ldconfig.service: Deactivated successfully.
  884. Mar 15 09:47:34 alarm systemd[1]: Stopped Rebuild Dynamic Linker Cache.
  885. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  886. Mar 15 09:47:34 alarm systemd[1]: systemd-boot-update.service: Deactivated successfully.
  887. Mar 15 09:47:34 alarm systemd[1]: Stopped Automatic Boot Loader Update.
  888. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  889. Mar 15 09:47:34 alarm systemd[1]: systemd-journal-catalog-update.service: Deactivated successfully.
  890. Mar 15 09:47:34 alarm systemd[1]: Stopped Rebuild Journal Catalog.
  891. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  892. Mar 15 09:47:34 alarm systemd[1]: Stopping Record System Boot/Shutdown in UTMP...
  893. Mar 15 09:47:34 alarm systemd[1]: update-vendor-firmware.service: Deactivated successfully.
  894. Mar 15 09:47:34 alarm systemd[1]: Stopped Update vendor firmware.
  895. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=update-vendor-firmware comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  896. Mar 15 09:47:34 alarm systemd[1]: systemd-backlight@backlight:gpio-bl.service: Deactivated successfully.
  897. Mar 15 09:47:34 alarm systemd[1]: Stopped Load/Save Screen Backlight Brightness of backlight:gpio-bl.
  898. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-backlight@backlight:gpio-bl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  899. Mar 15 09:47:34 alarm systemd[1]: Removed slice Slice /system/systemd-backlight.
  900. Mar 15 09:47:34 alarm audit[4780]: SYSTEM_SHUTDOWN pid=4780 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
  901. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  902. Mar 15 09:47:34 alarm systemd[1]: systemd-resolved.service: Deactivated successfully.
  903. Mar 15 09:47:34 alarm systemd[1]: Stopped Network Name Resolution.
  904. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  905. Mar 15 09:47:34 alarm systemd[1]: systemd-update-utmp.service: Deactivated successfully.
  906. Mar 15 09:47:34 alarm systemd[1]: Stopped Record System Boot/Shutdown in UTMP.
  907. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  908. Mar 15 09:47:34 alarm systemd[1]: Stopping Network Configuration...
  909. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  910. Mar 15 09:47:34 alarm systemd[1]: systemd-networkd.service: Deactivated successfully.
  911. Mar 15 09:47:34 alarm systemd[1]: Stopped Network Configuration.
  912. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  913. Mar 15 09:47:34 alarm systemd[1]: Stopped target Preparation for Network.
  914. Mar 15 09:47:34 alarm systemd[1]: systemd-networkd.socket: Deactivated successfully.
  915. Mar 15 09:47:34 alarm systemd[1]: Closed Network Service Netlink Socket.
  916. Mar 15 09:47:34 alarm systemd[1]: systemd-sysctl.service: Deactivated successfully.
  917. Mar 15 09:47:34 alarm systemd[1]: Stopped Apply Kernel Variables.
  918. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  919. Mar 15 09:47:34 alarm systemd[1]: systemd-modules-load.service: Deactivated successfully.
  920. Mar 15 09:47:34 alarm systemd[1]: Stopped Load Kernel Modules.
  921. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  922. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  923. Mar 15 09:47:34 alarm systemd[1]: systemd-timesyncd.service: Deactivated successfully.
  924. Mar 15 09:47:34 alarm systemd[1]: Stopped Network Time Synchronization.
  925. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  926. Mar 15 09:47:34 alarm systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully.
  927. Mar 15 09:47:34 alarm systemd[1]: Stopped Create Volatile Files and Directories.
  928. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  929. Mar 15 09:47:34 alarm systemd[1]: Stopped target Local File Systems.
  930. Mar 15 09:47:34 alarm systemd[1]: Unmounting /boot/efi...
  931. Mar 15 09:47:34 alarm systemd[1]: Unmounting /run/credentials/systemd-firstboot.service...
  932. Mar 15 09:47:34 alarm systemd[1]: Unmounting /run/credentials/systemd-sysusers.service...
  933. Mar 15 09:47:34 alarm systemd[1]: Unmounting Temporary Directory /tmp...
  934. Mar 15 09:47:34 alarm systemd[1]: systemd-growfs@-.service: Deactivated successfully.
  935. Mar 15 09:47:34 alarm systemd[1]: Stopped Grow File System on /.
  936. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-growfs@- comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  937. Mar 15 09:47:34 alarm systemd[1]: Removed slice Slice /system/systemd-growfs.
  938. Mar 15 09:47:34 alarm systemd[1]: boot-efi.mount: Deactivated successfully.
  939. Mar 15 09:47:34 alarm systemd[1]: Unmounted /boot/efi.
  940. Mar 15 09:47:34 alarm systemd[1]: run-credentials-systemd\x2dfirstboot.service.mount: Deactivated successfully.
  941. Mar 15 09:47:34 alarm systemd[1]: Unmounted /run/credentials/systemd-firstboot.service.
  942. Mar 15 09:47:34 alarm systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully.
  943. Mar 15 09:47:34 alarm systemd[1]: Unmounted /run/credentials/systemd-sysusers.service.
  944. Mar 15 09:47:34 alarm systemd[1]: tmp.mount: Deactivated successfully.
  945. Mar 15 09:47:34 alarm systemd[1]: Unmounted Temporary Directory /tmp.
  946. Mar 15 09:47:34 alarm systemd[1]: Stopped target Preparation for Local File Systems.
  947. Mar 15 09:47:34 alarm systemd[1]: Stopped target Swaps.
  948. Mar 15 09:47:34 alarm systemd[1]: Reached target Unmount All Filesystems.
  949. Mar 15 09:47:34 alarm systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
  950. Mar 15 09:47:34 alarm systemd[1]: Stopped Create Static Device Nodes in /dev.
  951. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  952. Mar 15 09:47:34 alarm systemd[1]: systemd-sysusers.service: Deactivated successfully.
  953. Mar 15 09:47:34 alarm systemd[1]: Stopped Create System Users.
  954. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  955. Mar 15 09:47:34 alarm systemd[1]: systemd-firstboot.service: Deactivated successfully.
  956. Mar 15 09:47:34 alarm systemd[1]: Stopped First Boot Wizard.
  957. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-firstboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  958. Mar 15 09:47:34 alarm systemd[1]: systemd-remount-fs.service: Deactivated successfully.
  959. Mar 15 09:47:34 alarm systemd[1]: Stopped Remount Root and Kernel File Systems.
  960. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  961. Mar 15 09:47:34 alarm systemd[1]: Reached target System Shutdown.
  962. Mar 15 09:47:34 alarm systemd[1]: Reached target Late Shutdown Services.
  963. Mar 15 09:47:34 alarm systemd[1]: systemd-poweroff.service: Deactivated successfully.
  964. Mar 15 09:47:34 alarm systemd[1]: Finished System Power Off.
  965. Mar 15 09:47:34 alarm audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-poweroff comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  966. Mar 15 09:47:34 alarm audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-poweroff comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  967. Mar 15 09:47:34 alarm systemd[1]: Reached target System Power Off.
  968. Mar 15 09:47:34 alarm systemd[1]: Shutting down.
  969. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  970. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  971. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  972. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  973. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  974. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  975. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  976. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  977. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  978. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  979. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  980. Mar 15 09:47:34 alarm audit: BPF prog-id=0 op=UNLOAD
  981. Mar 15 09:47:34 alarm systemd-shutdown[1]: Syncing filesystems and block devices.
  982. Mar 15 09:47:34 alarm systemd-shutdown[1]: Sending SIGTERM to remaining processes...
  983. Mar 15 09:47:34 alarm systemd-journald[324]: Journal stopped
  984.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement