You are not logged in.

#1 2020-01-17 14:56:44

Zeno
Member
Registered: 2020-01-16
Posts: 27

Tenda U3 USB wireless adaptor DRIVERS installing problem

Hi,
Im new to BL.

After installing BL, i inserted Tenda U3 wifi adapter various Hotspots shows in wifi network box but i cant connect evenif applying passwords etc correctly.

Then i tried to install linux driver through terminal and i found this error.



rtl8192EU_linux_v4.4.1.1_18873.20160805_BTCOEX20160412-0042
install.sh: 25: cd: can't cd to 20160805-btcoex20160412_0042-1_all.deb
Authentication requested [root] for make clean:
install.sh: 38: [: unexpected operator
make: *** No rule to make target 'clean'.  Stop.
Authentication requested [root] for make driver:
install.sh: 48: [: unexpected operator
make: *** No targets specified and no makefile found.  Stop.
##################################################
Compile make driver error: 2
Please check error Mesg
root@Virus:/home/virus/Downloads/RTL8192EU_linux_v4.4.1.1_18873_BTCOEX20160412-0042.20160805#

I dont know what to do.

Please help
Thanks

Offline

#2 2020-01-17 15:10:01

clusterF
Member
Registered: 2019-05-07
Posts: 539

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

What version of bl have you installed?

Looks like you need to install non free firmware

https://packages.debian.org/stretch/firmware-realtek

Offline

#3 2020-01-17 15:47:35

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

BL version 9.8
Kernal 4.9.0-9-amd64 (x86_64)

Offline

#4 2020-01-17 16:03:24

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

i installed firmware-realtek_20161130-5_all.deb

But still no success. Sorry

Offline

#5 2020-01-17 16:10:04

clusterF
Member
Registered: 2019-05-07
Posts: 539

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

i installed firmware-realtek_20161130-5_all.deb

But still no success. Sorry

did you reboot and try to connect

Offline

#6 2020-01-17 16:39:19

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

yes i rebooted and connected. Hotspot device shows in Network manager ask for password but cant join??

I dont know what the hell is happening?? It is straight forward, No?

Offline

#7 2020-01-17 16:49:12

clusterF
Member
Registered: 2019-05-07
Posts: 539

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Maybe the password is incorrect?

Offline

#8 2020-01-17 17:04:17

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

No password is correct. I tried more than 100 times. And it is very simple. The same thing I tried on my Laptop. Its working.

Please help me I m stuck very badly.

Offline

#9 2020-01-17 17:08:37

clusterF
Member
Registered: 2019-05-07
Posts: 539

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

No password is correct. I tried more than 100 times. And it is very simple. The same thing I tried on my Laptop. Its working.

Please help me I m stuck very badly.

100 times, wow. Ok well you need to give more info Zeno.

post the output of below command from your terminal.

systemctl status NetworkManager 

and

journalctl -u NetworkManager -b

Last edited by clusterF (2020-01-17 17:10:49)

Offline

#10 2020-01-17 18:54:41

rbh
Member
From: Sweden/Vasterbotten/Rusfors
Registered: 2016-08-11
Posts: 761

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

Im new to BL.

You are wellcome. new to Linux also?

After installing BL, i inserted Tenda U3 wifi adapter various Hotspots shows in wifi network box but i cant connect evenif applying passwords etc correctly.

If you could see wifi acesspoints, you already had realteks drivers loaded.

Then i tried to install linux driver through terminal and i found this error.

Where did you get that package from?
Have you enabled debian backports repo? I rekomend that. The version of firmware-realtek in backports, is from 2019.01 instead of from 2016.11

So, now is not the problem to install driver, the problem is to configure NetworkManager.
NetworkManager connections is saved in /etc/NetworkManager/system-connections/[SSID-name].nmconnection.
You can edit the file, add missing info. Then try connect with nmcli. Then you get better feedback.

Some good reading:
https://wiki.debian.org/WiFi
https://wiki.debian.org/WiFi/HowToUse
https://manpages.debian.org/testing/net … .7.en.html

Last edited by rbh (2020-01-17 18:55:30)


// Regards rbh

Offline

#11 2020-01-18 10:41:44

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Output from : systemctl status NetworkManager


virus@Virus:~$ systemctl status NetworkManager
● NetworkManager.service - Network Manager
   Loaded: loaded (/lib/systemd/system/NetworkManager.service; enabled; ven
   Active: active (running) since Sat 2020-01-18 16:01:05 IST; 6min ago
     Docs: man:NetworkManager(8)
Main PID: 378 (NetworkManager)
    Tasks: 4 (limit: 4915)
   CGroup: /system.slice/NetworkManager.service
           ├─378 /usr/sbin/NetworkManager --no-daemon
           └─812 /sbin/dhclient -d -q -sf /usr/lib/NetworkManager/nm-dhcp-h


and Output from: journalctl -u NetworkManager -b

virus@Virus:~$ sudo su
[sudo] password for virus:
root@Virus:/home/virus# journalctl -u NetworkManager -b
-- Logs begin at Sat 2020-01-18 16:00:57 IST, end at Sat 2020-01-18 16:10:4
Jan 18 16:01:02 Virus systemd[1]: Starting Network Manager...
Jan 18 16:01:05 Virus NetworkManager[378]: <info>  [1579343465.4748] Networ
Jan 18 16:01:05 Virus NetworkManager[378]: <info>  [1579343465.4750] Read c
Jan 18 16:01:05 Virus NetworkManager[378]: <info>  [1579343465.5316] manage
Jan 18 16:01:05 Virus NetworkManager[378]: <info>  [1579343465.5318] monito
Jan 18 16:01:05 Virus NetworkManager[378]: <info>  [1579343465.5436] dns-mg
Jan 18 16:01:05 Virus systemd[1]: Started Network Manager.
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0373] init!
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0376]       
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0376]       
Jan 18 16:01:06 Virus NetworkManager[378]: <warn>  [1579343466.0377] interf
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0378]       
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0378] manage
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0387] device
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0388] device
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0388] end _i
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0389] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0391] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0391] (23632
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.0392] (23632
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.1330] keyfil
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.1649] keyfil
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.1882] get un
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.6453] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.6453] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.6753] dhcp-i
Jan 18 16:01:06 Virus NetworkManager[378]: <info>  [1579343466.6754] manage

Thanks

Offline

#12 2020-01-18 10:43:14

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

I took and install the firmware from: https://packages.debian.org/stretch/firmware-realtek

Offline

#13 2020-01-18 12:03:06

rbh
Member
From: Sweden/Vasterbotten/Rusfors
Registered: 2016-08-11
Posts: 761

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

and Output from: journalctl -u NetworkManager -b

virus@Virus:~$ sudo su
[sudo] password for virus:
root@Virus:/home/virus# journalctl -u NetworkManager -b
-- Logs begin at Sat 2020-01-18 16:00:57 IST, end at Sat 2020-01-18 16:10:4
Jan 18 16:01:02 Virus systemd[1]: Starting Network Manager...
Jan 18 16:01:05 Virus NetworkManager[378]: <info>  [1579343465.4748] Networ

You have posted truncated logs. they gives very little information.


// Regards rbh

Offline

#14 2020-01-18 12:04:37

rbh
Member
From: Sweden/Vasterbotten/Rusfors
Registered: 2016-08-11
Posts: 761

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

I took and install the firmware from: https://packages.debian.org/stretch/firmware-realtek

I thought you did that yesterday...
The result is...?

If still problems, install from backports.


// Regards rbh

Offline

#15 2020-01-18 12:25:21

clusterF
Member
Registered: 2019-05-07
Posts: 539

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Please use code tags too.

Offline

#16 2020-01-19 09:13:51

ohnonot
...again
Registered: 2015-09-29
Posts: 5,024
Website

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

That looks messy.
Let's start really simple; please show us the output from this command:

sudo apt update

(Just making sure nothing is broken yet)

I will work on the theory that your wifi adaptor can run on stock linux drivers & firmware installable through official repositories (and not downloading files from the wild web).

Please also show us

sudo lsusb
dmesg|grep -Ei 'wlan|firmw|dhc'
sudo cat /var/log/syslog | grep -Ei 'net|wpa|dhc'

Search youtube without a brwoser: repo | thread
BL quote proposals to this thread please.
my repos / my repos

Offline

#17 2020-01-19 13:30:10

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

virus@Virus:~$ sudo lsusb

[sudo] password for virus:
Bus 001 Device 006: ID 2717:ff80 Xiaomi Inc. Mi/Redmi series (RNDIS)
Bus 001 Device 002: ID 0bda:818b Realtek Semiconductor Corp. RTL8192EU 802.11b/g/n WLAN Adapter
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 003: ID 1a2c:0c21 China Resource Semico Co., Ltd
Bus 002 Device 002: ID 1a2c:0042 China Resource Semico Co., Ltd
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub

Offline

#18 2020-01-19 13:31:02

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

virus@Virus:~$ dmesg|grep -Ei 'wlan|firmw|dhc'

dmesg: read kernel buffer failed: Operation not permitted
virus@Virus:~$

Offline

#19 2020-01-19 13:33:54

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

virus@Virus:~$ sudo cat /var/log/syslog | grep -Ei 'net|wpa|dhc'

[sudo] password for virus: 
Jan 19 18:20:18 Virus NetworkManager[394]: <info>  [1579438218.3618] device (wlx502b73c86f2b): set-hw-addr: set MAC address to D2:96:9E:E8:2A:5D (scanning)
Jan 19 18:20:18 Virus kernel: [  565.283464] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:22:39 Virus NetworkManager[394]: <info>  [1579438359.3379] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv6 routing and DNS
Jan 19 18:22:40 Virus ntpd[580]: bind(25) AF_INET6 2405:204:8380:84d:32b3:d28e:3fa4:1701#123 flags 0x11 failed: Cannot assign requested address
Jan 19 18:25:34 Virus NetworkManager[394]: <info>  [1579438534.3555] device (wlx502b73c86f2b): set-hw-addr: set MAC address to DE:C8:BB:1D:32:D2 (scanning)
Jan 19 18:25:34 Virus kernel: [  881.278794] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:27:06 Virus dhclient[1251]: receive_packet failed on enp0s2f1u7: Network is down
Jan 19 18:27:06 Virus NetworkManager[394]: <info>  [1579438626.7661] device (enp0s2f1u7): state change: activated -> unmanaged (reason 'removed') [100 10 36]
Jan 19 18:27:06 Virus ModemManager[392]: <info>  (net/enp0s2f1u7): released by modem /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7
Jan 19 18:27:06 Virus NetworkManager[394]: <info>  [1579438626.8050] dhcp4 (enp0s2f1u7): canceled DHCP transaction, DHCP client pid 1251
Jan 19 18:27:06 Virus NetworkManager[394]: <info>  [1579438626.8051] dhcp4 (enp0s2f1u7): state changed bound -> done
Jan 19 18:27:06 Virus NetworkManager[394]: <info>  [1579438626.8133] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:27:06 Virus NetworkManager[394]: <info>  [1579438626.8142] manager: NetworkManager state is now DISCONNECTED
Jan 19 18:27:06 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 19 18:27:06 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 19 18:27:06 Virus NetworkManager[394]: <info>  [1579438626.9181] devices removed (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.2871] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/4)
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3364] device (usb0): interface index 4 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3663] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:27:44 Virus kernel: [ 1011.272469] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3664] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3669] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3720] device (enp0s2f1u7): link connected
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3771] keyfile: add connection in-memory (5f19ec75-2e1c-30a0-a6a0-727dfe9e6a54,"Wired connection 1")
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3869] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.3999] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4031] policy: auto-activating connection 'Wired connection 1'
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4056] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (5f19ec75-2e1c-30a0-a6a0-727dfe9e6a54)
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4072] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4082] manager: NetworkManager state is now CONNECTING
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4095] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4109] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4125] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4180] dhcp4 (enp0s2f1u7): dhclient started with pid 6088
Jan 19 18:27:44 Virus dhclient[6088]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 6
Jan 19 18:27:44 Virus dhclient[6088]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 19 18:27:44 Virus dhclient[6088]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 19 18:27:44 Virus dhclient[6088]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4838] dhcp4 (enp0s2f1u7):   address 192.168.42.63
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4839] dhcp4 (enp0s2f1u7):   plen 24 (255.255.255.0)
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4839] dhcp4 (enp0s2f1u7):   gateway 192.168.42.129
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4839] dhcp4 (enp0s2f1u7):   server identifier 192.168.42.129
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4839] dhcp4 (enp0s2f1u7):   lease time 3600
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4840] dhcp4 (enp0s2f1u7):   hostname 'Virus'
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4840] dhcp4 (enp0s2f1u7):   nameserver '192.168.42.129'
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4840] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4857] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4862] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4866] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.4867] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:27:44 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 19 18:27:44 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.5343] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.5345] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 19 18:27:44 Virus NetworkManager[394]: <info>  [1579438664.5350] device (enp0s2f1u7): Activation: successful, device activated.
Jan 19 18:27:44 Virus dhclient[6088]: bound to 192.168.42.63 -- renewal in 1648 seconds.
Jan 19 18:27:48 Virus dhclient[6088]: receive_packet failed on enp0s2f1u7: Network is down
Jan 19 18:27:48 Virus NetworkManager[394]: <info>  [1579438668.2016] device (enp0s2f1u7): state change: activated -> unmanaged (reason 'removed') [100 10 36]
Jan 19 18:27:48 Virus ModemManager[392]: <info>  (net/enp0s2f1u7): released by modem /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7
Jan 19 18:27:48 Virus NetworkManager[394]: <info>  [1579438668.2253] dhcp4 (enp0s2f1u7): canceled DHCP transaction, DHCP client pid 6088
Jan 19 18:27:48 Virus NetworkManager[394]: <info>  [1579438668.2255] dhcp4 (enp0s2f1u7): state changed bound -> done
Jan 19 18:27:48 Virus NetworkManager[394]: <info>  [1579438668.2331] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:27:48 Virus NetworkManager[394]: <info>  [1579438668.2360] manager: NetworkManager state is now DISCONNECTED
Jan 19 18:27:48 Virus NetworkManager[394]: <info>  [1579438668.3227] devices removed (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.3906] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/5)
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4262] device (usb0): interface index 5 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 19 18:28:27 Virus kernel: [ 1054.355956] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4499] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4500] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4504] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4582] device (enp0s2f1u7): link connected
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4626] keyfile: add connection in-memory (db3e93b2-e87c-3d31-bf4d-dbd64d7e1bed,"Wired connection 1")
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4699] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.4943] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5017] policy: auto-activating connection 'Wired connection 1'
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5079] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (db3e93b2-e87c-3d31-bf4d-dbd64d7e1bed)
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5096] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5113] manager: NetworkManager state is now CONNECTING
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5141] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5178] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5202] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5241] dhcp4 (enp0s2f1u7): dhclient started with pid 6243
Jan 19 18:28:27 Virus dhclient[6243]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 5
Jan 19 18:28:27 Virus dhclient[6243]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 19 18:28:27 Virus dhclient[6243]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 19 18:28:27 Virus dhclient[6243]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5763] dhcp4 (enp0s2f1u7):   address 192.168.42.63
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5763] dhcp4 (enp0s2f1u7):   plen 24 (255.255.255.0)
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5764] dhcp4 (enp0s2f1u7):   gateway 192.168.42.129
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5764] dhcp4 (enp0s2f1u7):   server identifier 192.168.42.129
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5764] dhcp4 (enp0s2f1u7):   lease time 3600
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5764] dhcp4 (enp0s2f1u7):   hostname 'Virus'
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5764] dhcp4 (enp0s2f1u7):   nameserver '192.168.42.129'
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5765] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5781] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5787] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5791] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.5792] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:28:27 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 19 18:28:27 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.6314] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.6316] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 19 18:28:27 Virus NetworkManager[394]: <info>  [1579438707.6321] device (enp0s2f1u7): Activation: successful, device activated.
Jan 19 18:28:27 Virus dhclient[6243]: bound to 192.168.42.63 -- renewal in 1356 seconds.
Jan 20 00:01:11 Virus systemd[1]: Starting Raise network interfaces...
Jan 20 00:01:11 Virus systemd[1]: Started Raise network interfaces.
Jan 20 00:01:11 Virus systemd[1]: Starting Network Manager...
Jan 20 00:01:11 Virus kernel: [    0.157424] NET: Registered protocol family 16
Jan 20 00:01:11 Virus kernel: [    0.241724] NET: Registered protocol family 2
Jan 20 00:01:11 Virus kernel: [    0.242437] NET: Registered protocol family 1
Jan 20 00:01:11 Virus kernel: [    0.880908] audit: initializing netlink subsys (disabled)
Jan 20 00:01:11 Virus kernel: [    0.905756] NET: Registered protocol family 10
Jan 20 00:01:11 Virus kernel: [    0.906045] NET: Registered protocol family 17
Jan 20 00:01:11 Virus kernel: [    4.989230] ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.4474] NetworkManager (version 1.6.2) is starting...
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.4475] Read config: /etc/NetworkManager/NetworkManager.conf
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.5099] manager[0x561a9f0c0040]: monitoring kernel firmware directory '/lib/firmware'.
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.5100] monitoring ifupdown state file '/run/network/ifstate'.
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.5276] dns-mgr[0x561a9f0b4180]: init: dns=default, rc-manager=resolvconf
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.5427] rfkill0: found WiFi radio killswitch (at /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/ieee80211/phy0/rfkill0) (driver rtl8xxxu)
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.5432] manager[0x561a9f0c0040]: WiFi hardware radio set enabled
Jan 20 00:01:13 Virus NetworkManager[375]: <info>  [1579458673.5432] manager[0x561a9f0c0040]: WWAN hardware radio set enabled
Jan 20 00:01:13 Virus systemd[1]: Started Network Manager.
Jan 20 00:01:13 Virus systemd[1]: Reached target Network.
Jan 20 00:01:13 Virus systemd[1]: Starting Network Manager Wait Online...
Jan 20 00:01:13 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:01:14 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0371] init!
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0380] management mode: unmanaged
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0391] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0391] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b): no ifupdown configuration found.
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0392] devices added (path: /sys/devices/virtual/net/lo, iface: lo)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0392] device added (path: /sys/devices/virtual/net/lo, iface: lo): no ifupdown configuration found.
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0392] end _init.
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0393] settings: loaded plugin ifupdown: (C) 2008 Canonical Ltd.  To report bugs please use the NetworkManager mailing list. (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-settings-plugin-ifupdown.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0395] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc.  To report bugs please use the NetworkManager mailing list.
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0395] (-1626454912) ... get_connections.
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0396] (-1626454912) ... get_connections (managed=false): return empty list.
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.0973] keyfile: new connection /etc/NetworkManager/system-connections/LIZA (7ccd38d8-7348-4f64-a8ab-a760fc7d3940,"LIZA")
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.2024] keyfile: new connection /etc/NetworkManager/system-connections/Virus Cell (02c56203-8fbe-4457-85b1-091090b56b15,"Virus Cell")
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.2411] get unmanaged devices count: 0
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.5448] settings: hostname: using hostnamed
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.5449] settings: hostname changed from (none) to "Virus"
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.5824] dhcp-init: Using DHCP client 'dhclient'
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.5826] manager: WiFi enabled by radio killswitch; enabled by state file
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.5828] manager: WWAN enabled by radio killswitch; enabled by state file
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.5829] manager: Networking is enabled by state file
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6098] Loaded device plugin: NMBondDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6099] Loaded device plugin: NMBridgeDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6100] Loaded device plugin: NMEthernetDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6101] Loaded device plugin: NMInfinibandDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6101] Loaded device plugin: NMIPTunnelDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6102] Loaded device plugin: NMMacsecDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6102] Loaded device plugin: NMMacvlanDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6103] Loaded device plugin: NMTunDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6104] Loaded device plugin: NMVethDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6104] Loaded device plugin: NMVlanDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6105] Loaded device plugin: NMVxlanDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6429] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wifi.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.6850] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-bluetooth.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7148] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-team.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7175] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wwan.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7273] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-adsl.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7673] device (lo): link connected
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7704] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7821] (wlx502b73c86f2b): using nl80211 for WiFi device control
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7868] manager: (wlx502b73c86f2b): new 802.11 WiFi device (/org/freedesktop/NetworkManager/Devices/2)
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.7930] device (wlx502b73c86f2b): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:01:14 Virus kernel: [   16.202584] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:14 Virus kernel: [   16.219566] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.8897] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 6E:E0:29:C8:6D:5B (scanning)
Jan 20 00:01:14 Virus kernel: [   16.313949] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:14 Virus dbus[371]: [system] Activating via systemd: service name='fi.w1.wpa_supplicant1' unit='wpa_supplicant.service'
Jan 20 00:01:14 Virus NetworkManager[375]: <info>  [1579458674.9604] ModemManager available in the bus
Jan 20 00:01:14 Virus systemd[1]: Starting WPA supplicant...
Jan 20 00:01:15 Virus dbus[371]: [system] Successfully activated service 'fi.w1.wpa_supplicant1'
Jan 20 00:01:15 Virus systemd[1]: Started WPA supplicant.
Jan 20 00:01:15 Virus wpa_supplicant[496]: Successfully initialized wpa_supplicant
Jan 20 00:01:15 Virus NetworkManager[375]: <info>  [1579458675.3571] supplicant: wpa_supplicant running
Jan 20 00:01:15 Virus NetworkManager[375]: <info>  [1579458675.3574] device (wlx502b73c86f2b): supplicant interface state: init -> starting
Jan 20 00:01:15 Virus NetworkManager[375]: <info>  [1579458675.7213] sup-iface[0x561a9f133e70,wlx502b73c86f2b]: supports 4 scan SSIDs
Jan 20 00:01:15 Virus NetworkManager[375]: <info>  [1579458675.7242] device (wlx502b73c86f2b): supplicant interface state: starting -> ready
Jan 20 00:01:15 Virus NetworkManager[375]: <info>  [1579458675.7244] device (wlx502b73c86f2b): state change: unavailable -> disconnected (reason 'supplicant-available') [20 30 42]
Jan 20 00:01:15 Virus kernel: [   17.132281] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:16 Virus NetworkManager[375]: <info>  [1579458676.9050] device (wlx502b73c86f2b): supplicant interface state: ready -> inactive
Jan 20 00:01:16 Virus NetworkManager[375]: <info>  [1579458676.9267] manager: startup complete
Jan 20 00:01:16 Virus systemd[1]: Started Network Manager Wait Online.
Jan 20 00:01:16 Virus systemd[1]: Reached target Network is Online.
Jan 20 00:01:17 Virus systemd[530]: Listening on GnuPG network certificate management daemon.
Jan 20 00:01:26 Virus systemd[567]: Listening on GnuPG network certificate management daemon.
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.4891] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3)
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5164] device (usb0): interface index 3 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 20 00:01:34 Virus kernel: [   35.950619] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5430] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5431] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5434] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5442] device (enp0s2f1u7): link connected
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5560] keyfile: add connection in-memory (4b0eaf96-28f4-39a2-a613-39f98a9709b9,"Wired connection 1")
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5574] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5624] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5647] policy: auto-activating connection 'Wired connection 1'
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5667] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (4b0eaf96-28f4-39a2-a613-39f98a9709b9)
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5673] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5675] manager: NetworkManager state is now CONNECTING
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5680] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.5686] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.6088] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 20 00:01:34 Virus NetworkManager[375]: <info>  [1579458694.9039] dhcp4 (enp0s2f1u7): dhclient started with pid 730
Jan 20 00:01:35 Virus dhclient[730]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 5
Jan 20 00:01:35 Virus dhclient[730]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 20 00:01:35 Virus dhclient[730]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 20 00:01:35 Virus dhclient[730]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5467] dhcp4 (enp0s2f1u7):   address 192.168.42.63
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5468] dhcp4 (enp0s2f1u7):   plen 24 (255.255.255.0)
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5468] dhcp4 (enp0s2f1u7):   gateway 192.168.42.129
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5468] dhcp4 (enp0s2f1u7):   server identifier 192.168.42.129
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5469] dhcp4 (enp0s2f1u7):   lease time 3600
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5469] dhcp4 (enp0s2f1u7):   hostname 'Virus'
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5469] dhcp4 (enp0s2f1u7):   nameserver '192.168.42.129'
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5469] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5523] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5542] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5554] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.5568] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 20 00:01:35 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:01:35 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.7307] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.7309] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 20 00:01:35 Virus dhclient[730]: bound to 192.168.42.63 -- renewal in 1616 seconds.
Jan 20 00:01:35 Virus NetworkManager[375]: <info>  [1579458695.7509] device (enp0s2f1u7): Activation: successful, device activated.
Jan 19 18:36:38 Virus systemd[567]: Closed GnuPG network certificate management daemon.
Jan 20 00:07:55 Virus systemd[1]: Starting Raise network interfaces...
Jan 20 00:07:55 Virus systemd[1]: Started Raise network interfaces.
Jan 20 00:07:55 Virus systemd[1]: Starting Network Manager...
Jan 20 00:07:55 Virus kernel: [    0.157467] NET: Registered protocol family 16
Jan 20 00:07:55 Virus kernel: [    0.242244] NET: Registered protocol family 2
Jan 20 00:07:55 Virus kernel: [    0.242959] NET: Registered protocol family 1
Jan 20 00:07:55 Virus kernel: [    0.891271] audit: initializing netlink subsys (disabled)
Jan 20 00:07:55 Virus kernel: [    0.916315] NET: Registered protocol family 10
Jan 20 00:07:55 Virus kernel: [    0.916613] NET: Registered protocol family 17
Jan 20 00:07:55 Virus kernel: [    5.140285] ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.7300] NetworkManager (version 1.6.2) is starting...
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.7303] Read config: /etc/NetworkManager/NetworkManager.conf
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.7837] manager[0x55586306c040]: monitoring kernel firmware directory '/lib/firmware'.
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.7837] monitoring ifupdown state file '/run/network/ifstate'.
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.7880] dns-mgr[0x555863060180]: init: dns=default, rc-manager=resolvconf
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.8069] rfkill0: found WiFi radio killswitch (at /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/ieee80211/phy0/rfkill0) (driver rtl8xxxu)
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.8072] manager[0x55586306c040]: WiFi hardware radio set enabled
Jan 20 00:07:58 Virus NetworkManager[373]: <info>  [1579459078.8072] manager[0x55586306c040]: WWAN hardware radio set enabled
Jan 20 00:07:58 Virus systemd[1]: Started Network Manager.
Jan 20 00:07:58 Virus systemd[1]: Starting Network Manager Wait Online...
Jan 20 00:07:58 Virus systemd[1]: Reached target Network.
Jan 20 00:07:58 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:07:59 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1767] init!
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1775] management mode: unmanaged
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1785] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1794] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b): no ifupdown configuration found.
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1794] devices added (path: /sys/devices/virtual/net/lo, iface: lo)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1794] device added (path: /sys/devices/virtual/net/lo, iface: lo): no ifupdown configuration found.
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1795] end _init.
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1795] settings: loaded plugin ifupdown: (C) 2008 Canonical Ltd.  To report bugs please use the NetworkManager mailing list. (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-settings-plugin-ifupdown.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1796] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc.  To report bugs please use the NetworkManager mailing list.
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1796] (1661532032) ... get_connections.
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.1797] (1661532032) ... get_connections (managed=false): return empty list.
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.2255] keyfile: new connection /etc/NetworkManager/system-connections/LIZA (7ccd38d8-7348-4f64-a8ab-a760fc7d3940,"LIZA")
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.3402] keyfile: new connection /etc/NetworkManager/system-connections/Virus Cell (02c56203-8fbe-4457-85b1-091090b56b15,"Virus Cell")
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.3517] get unmanaged devices count: 0
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.6438] settings: hostname: using hostnamed
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.6440] settings: hostname changed from (none) to "Virus"
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.6812] dhcp-init: Using DHCP client 'dhclient'
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.6814] manager: WiFi enabled by radio killswitch; enabled by state file
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.6816] manager: WWAN enabled by radio killswitch; enabled by state file
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.6816] manager: Networking is enabled by state file
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7085] Loaded device plugin: NMBondDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7086] Loaded device plugin: NMBridgeDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7087] Loaded device plugin: NMEthernetDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7088] Loaded device plugin: NMInfinibandDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7088] Loaded device plugin: NMIPTunnelDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7089] Loaded device plugin: NMMacsecDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7089] Loaded device plugin: NMMacvlanDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7090] Loaded device plugin: NMTunDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7091] Loaded device plugin: NMVethDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7091] Loaded device plugin: NMVlanDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7092] Loaded device plugin: NMVxlanDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7416] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wifi.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.7966] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-bluetooth.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.8236] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-team.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.8305] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wwan.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.8409] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-adsl.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.8743] device (lo): link connected
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.8771] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.8974] (wlx502b73c86f2b): using nl80211 for WiFi device control
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.9017] manager: (wlx502b73c86f2b): new 802.11 WiFi device (/org/freedesktop/NetworkManager/Devices/2)
Jan 20 00:07:59 Virus NetworkManager[373]: <info>  [1579459079.9078] device (wlx502b73c86f2b): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:07:59 Virus kernel: [   16.326858] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:07:59 Virus kernel: [   16.343765] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:08:00 Virus NetworkManager[373]: <info>  [1579459080.0311] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 86:3F:04:99:ED:A8 (scanning)
Jan 20 00:08:00 Virus kernel: [   16.466130] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:08:00 Virus dbus[356]: [system] Activating via systemd: service name='fi.w1.wpa_supplicant1' unit='wpa_supplicant.service'
Jan 20 00:08:00 Virus systemd[1]: Starting WPA supplicant...
Jan 20 00:08:00 Virus NetworkManager[373]: <info>  [1579459080.1052] ModemManager available in the bus
Jan 20 00:08:00 Virus dbus[356]: [system] Successfully activated service 'fi.w1.wpa_supplicant1'
Jan 20 00:08:00 Virus systemd[1]: Started WPA supplicant.
Jan 20 00:08:00 Virus wpa_supplicant[510]: Successfully initialized wpa_supplicant
Jan 20 00:08:00 Virus NetworkManager[373]: <info>  [1579459080.5163] supplicant: wpa_supplicant running
Jan 20 00:08:00 Virus NetworkManager[373]: <info>  [1579459080.5166] device (wlx502b73c86f2b): supplicant interface state: init -> starting
Jan 20 00:08:00 Virus NetworkManager[373]: <info>  [1579459080.8437] sup-iface[0x5558630dfe70,wlx502b73c86f2b]: supports 4 scan SSIDs
Jan 20 00:08:00 Virus NetworkManager[373]: <info>  [1579459080.8466] device (wlx502b73c86f2b): supplicant interface state: starting -> ready
Jan 20 00:08:00 Virus NetworkManager[373]: <info>  [1579459080.8469] device (wlx502b73c86f2b): state change: unavailable -> disconnected (reason 'supplicant-available') [20 30 42]
Jan 20 00:08:00 Virus kernel: [   17.265326] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:08:02 Virus NetworkManager[373]: <info>  [1579459082.0250] device (wlx502b73c86f2b): supplicant interface state: ready -> inactive
Jan 20 00:08:02 Virus NetworkManager[373]: <info>  [1579459082.0499] manager: startup complete
Jan 20 00:08:02 Virus systemd[1]: Started Network Manager Wait Online.
Jan 20 00:08:02 Virus systemd[1]: Reached target Network is Online.
Jan 20 00:08:02 Virus systemd[543]: Listening on GnuPG network certificate management daemon.
Jan 20 00:08:27 Virus systemd[581]: Listening on GnuPG network certificate management daemon.
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.3981] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3)
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4354] device (usb0): interface index 3 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4552] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4553] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4557] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:11:00 Virus kernel: [  196.873603] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4566] device (enp0s2f1u7): link connected
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4648] keyfile: add connection in-memory (359a29cb-b63b-35e7-96bd-1b282b365ef8,"Wired connection 1")
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4664] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4704] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4807] policy: auto-activating connection 'Wired connection 1'
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4846] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (359a29cb-b63b-35e7-96bd-1b282b365ef8)
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4867] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4875] manager: NetworkManager state is now CONNECTING
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4947] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.4994] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.5256] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.6157] dhcp4 (enp0s2f1u7): dhclient started with pid 1213
Jan 20 00:11:00 Virus dhclient[1213]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 8
Jan 20 00:11:00 Virus dhclient[1213]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 20 00:11:00 Virus dhclient[1213]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 20 00:11:00 Virus dhclient[1213]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7797] dhcp4 (enp0s2f1u7):   address 192.168.42.63
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7798] dhcp4 (enp0s2f1u7):   plen 24 (255.255.255.0)
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7798] dhcp4 (enp0s2f1u7):   gateway 192.168.42.129
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7798] dhcp4 (enp0s2f1u7):   server identifier 192.168.42.129
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7798] dhcp4 (enp0s2f1u7):   lease time 3600
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7799] dhcp4 (enp0s2f1u7):   hostname 'Virus'
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7799] dhcp4 (enp0s2f1u7):   nameserver '192.168.42.129'
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7799] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7818] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7825] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7850] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.7852] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 20 00:11:00 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.8305] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.8308] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 20 00:11:00 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:11:00 Virus NetworkManager[373]: <info>  [1579459260.8513] device (enp0s2f1u7): Activation: successful, device activated.
Jan 20 00:11:00 Virus dhclient[1213]: bound to 192.168.42.63 -- renewal in 1383 seconds.
Jan 19 18:43:44 Virus NetworkManager[373]: <info>  [1579439624.3965] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 06:F0:20:8E:64:59 (scanning)
Jan 19 18:43:44 Virus kernel: [  360.271963] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:49:00 Virus NetworkManager[373]: <info>  [1579439940.4286] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 6E:75:FF:52:32:FA (scanning)
Jan 19 18:49:00 Virus kernel: [  676.308556] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:54:16 Virus NetworkManager[373]: <info>  [1579440256.3890] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 1E:EB:8E:24:4E:DD (scanning)
Jan 19 18:54:16 Virus kernel: [  992.266711] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:59:32 Virus NetworkManager[373]: <info>  [1579440572.4002] device (wlx502b73c86f2b): set-hw-addr: set MAC address to AE:43:D7:16:0E:45 (scanning)
Jan 19 18:59:32 Virus kernel: [ 1308.279992] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
virus@Virus:~$

Last edited by damo (2020-01-19 15:10:50)

Offline

#20 2020-01-19 13:35:46

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

virus@Virus:~$ systemctl status NetworkManager

● NetworkManager.service - Network Manager
   Loaded: loaded (/lib/systemd/system/NetworkManager.service; enabled; ven
   Active: active (running) since Mon 2020-01-20 00:07:58 IST; 5h 2min left
     Docs: man:NetworkManager(8)
Main PID: 373 (NetworkManager)
    Tasks: 4 (limit: 4915)
   CGroup: /system.slice/NetworkManager.service
           ├─ 373 /usr/sbin/NetworkManager --no-daemon
           └─1213 /sbin/dhclient -d -q -sf /usr/lib/NetworkManager/nm-dhcp-
lines 1-9/9 (END)

Offline

#21 2020-01-19 13:37:29

Zeno
Member
Registered: 2020-01-16
Posts: 27

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

virus@Virus:~$ journalctl -u NetworkManager -b

Hint: You are currently not seeing messages from other users and the system.
      Users in the 'systemd-journal' group can see all messages. Pass -q to
      turn off this notice.
No journal files were opened due to insufficient permissions.
virus@Virus:~$

Offline

#22 2020-01-19 15:12:51

damo
....moderator....
Registered: 2015-08-20
Posts: 6,407

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

@Zeno  You are being asked again to use [ code ] tags when posting terminal output. I have edited your long post above to demonstrate the difference it makes.


Be Excellent to Each Other...
The Bunsenlabs Lithium Desktop » Here
FORUM RULES and posting guidelines «» Help page for forum post formatting
Artwork on DeviantArt  «» BunsenLabs on DeviantArt

Offline

#23 2020-01-19 15:15:00

damo
....moderator....
Registered: 2015-08-20
Posts: 6,407

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

virus@Virus:~$ journalctl -u NetworkManager -b

Hint: You are currently not seeing messages from other users and the system.
      Users in the 'systemd-journal' group can see all messages. Pass -q to
      turn off this notice.
No journal files were opened due to insufficient permissions.
virus@Virus:~$

You need to use 'sudo' to see the full output.


Be Excellent to Each Other...
The Bunsenlabs Lithium Desktop » Here
FORUM RULES and posting guidelines «» Help page for forum post formatting
Artwork on DeviantArt  «» BunsenLabs on DeviantArt

Offline

#24 2020-01-19 17:30:30

rbh
Member
From: Sweden/Vasterbotten/Rusfors
Registered: 2016-08-11
Posts: 761

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

virus@Virus:~$ dmesg|grep -Ei 'wlan|firmw|dhc'

dmesg: read kernel buffer failed: Operation not permitted
virus@Virus:~$

Yes. You ned to be root top run dmesg, or preeced command with "sudo".


// Regards rbh

Offline

#25 2020-01-19 19:10:31

rbh
Member
From: Sweden/Vasterbotten/Rusfors
Registered: 2016-08-11
Posts: 761

Re: Tenda U3 USB wireless adaptor DRIVERS installing problem

Zeno wrote:

virus@Virus:~$ systemctl status NetworkManager

Probably you will get some more info if you issue the command with root rights.


// Regards rbh

Offline

Board footer

Powered by FluxBB