You are not logged in.
Hi,
Im new to BL.
After installing BL, i inserted Tenda U3 wifi adapter various Hotspots shows in wifi network box but i cant connect evenif applying passwords etc correctly.
Then i tried to install linux driver through terminal and i found this error.
rtl8192EU_linux_v4.4.1.1_18873.20160805_BTCOEX20160412-0042
install.sh: 25: cd: can't cd to 20160805-btcoex20160412_0042-1_all.deb
Authentication requested [root] for make clean:
install.sh: 38: [: unexpected operator
make: *** No rule to make target 'clean'. Stop.
Authentication requested [root] for make driver:
install.sh: 48: [: unexpected operator
make: *** No targets specified and no makefile found. Stop.
##################################################
Compile make driver error: 2
Please check error Mesg
root@Virus:/home/virus/Downloads/RTL8192EU_linux_v4.4.1.1_18873_BTCOEX20160412-0042.20160805#
I dont know what to do.
Please help
Thanks
Offline
What version of bl have you installed?
Looks like you need to install non free firmware
Offline
BL version 9.8
Kernal 4.9.0-9-amd64 (x86_64)
Offline
i installed firmware-realtek_20161130-5_all.deb
But still no success. Sorry
Offline
i installed firmware-realtek_20161130-5_all.deb
But still no success. Sorry
did you reboot and try to connect
Offline
yes i rebooted and connected. Hotspot device shows in Network manager ask for password but cant join??
I dont know what the hell is happening?? It is straight forward, No?
Offline
Maybe the password is incorrect?
Offline
No password is correct. I tried more than 100 times. And it is very simple. The same thing I tried on my Laptop. Its working.
Please help me I m stuck very badly.
Offline
No password is correct. I tried more than 100 times. And it is very simple. The same thing I tried on my Laptop. Its working.
Please help me I m stuck very badly.
100 times, wow. Ok well you need to give more info Zeno.
post the output of below command from your terminal.
systemctl status NetworkManager
and
journalctl -u NetworkManager -b
Last edited by clusterF (2020-01-17 17:10:49)
Offline
Im new to BL.
You are wellcome. new to Linux also?
After installing BL, i inserted Tenda U3 wifi adapter various Hotspots shows in wifi network box but i cant connect evenif applying passwords etc correctly.
If you could see wifi acesspoints, you already had realteks drivers loaded.
Then i tried to install linux driver through terminal and i found this error.
Where did you get that package from?
Have you enabled debian backports repo? I rekomend that. The version of firmware-realtek in backports, is from 2019.01 instead of from 2016.11
So, now is not the problem to install driver, the problem is to configure NetworkManager.
NetworkManager connections is saved in /etc/NetworkManager/system-connections/[SSID-name].nmconnection.
You can edit the file, add missing info. Then try connect with nmcli. Then you get better feedback.
Some good reading:
https://wiki.debian.org/WiFi
https://wiki.debian.org/WiFi/HowToUse
https://manpages.debian.org/testing/net … .7.en.html
Last edited by rbh (2020-01-17 18:55:30)
// Regards rbh
Offline
Output from : systemctl status NetworkManager
virus@Virus:~$ systemctl status NetworkManager
● NetworkManager.service - Network Manager
Loaded: loaded (/lib/systemd/system/NetworkManager.service; enabled; ven
Active: active (running) since Sat 2020-01-18 16:01:05 IST; 6min ago
Docs: man:NetworkManager(8)
Main PID: 378 (NetworkManager)
Tasks: 4 (limit: 4915)
CGroup: /system.slice/NetworkManager.service
├─378 /usr/sbin/NetworkManager --no-daemon
└─812 /sbin/dhclient -d -q -sf /usr/lib/NetworkManager/nm-dhcp-h
and Output from: journalctl -u NetworkManager -b
virus@Virus:~$ sudo su
[sudo] password for virus:
root@Virus:/home/virus# journalctl -u NetworkManager -b
-- Logs begin at Sat 2020-01-18 16:00:57 IST, end at Sat 2020-01-18 16:10:4
Jan 18 16:01:02 Virus systemd[1]: Starting Network Manager...
Jan 18 16:01:05 Virus NetworkManager[378]: <info> [1579343465.4748] Networ
Jan 18 16:01:05 Virus NetworkManager[378]: <info> [1579343465.4750] Read c
Jan 18 16:01:05 Virus NetworkManager[378]: <info> [1579343465.5316] manage
Jan 18 16:01:05 Virus NetworkManager[378]: <info> [1579343465.5318] monito
Jan 18 16:01:05 Virus NetworkManager[378]: <info> [1579343465.5436] dns-mg
Jan 18 16:01:05 Virus systemd[1]: Started Network Manager.
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0373] init!
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0376]
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0376]
Jan 18 16:01:06 Virus NetworkManager[378]: <warn> [1579343466.0377] interf
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0378]
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0378] manage
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0387] device
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0388] device
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0388] end _i
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0389] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0391] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0391] (23632
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.0392] (23632
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.1330] keyfil
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.1649] keyfil
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.1882] get un
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.6453] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.6453] settin
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.6753] dhcp-i
Jan 18 16:01:06 Virus NetworkManager[378]: <info> [1579343466.6754] manage
Thanks
Offline
I took and install the firmware from: https://packages.debian.org/stretch/firmware-realtek
Offline
and Output from: journalctl -u NetworkManager -b
virus@Virus:~$ sudo su
[sudo] password for virus:
root@Virus:/home/virus# journalctl -u NetworkManager -b
-- Logs begin at Sat 2020-01-18 16:00:57 IST, end at Sat 2020-01-18 16:10:4
Jan 18 16:01:02 Virus systemd[1]: Starting Network Manager...
Jan 18 16:01:05 Virus NetworkManager[378]: <info> [1579343465.4748] Networ
You have posted truncated logs. they gives very little information.
// Regards rbh
Offline
I took and install the firmware from: https://packages.debian.org/stretch/firmware-realtek
I thought you did that yesterday...
The result is...?
If still problems, install from backports.
// Regards rbh
Offline
Please use code tags too.
Offline
That looks messy.
Let's start really simple; please show us the output from this command:
sudo apt update
(Just making sure nothing is broken yet)
I will work on the theory that your wifi adaptor can run on stock linux drivers & firmware installable through official repositories (and not downloading files from the wild web).
Please also show us
sudo lsusb
dmesg|grep -Ei 'wlan|firmw|dhc'
sudo cat /var/log/syslog | grep -Ei 'net|wpa|dhc'
Please use CODE tags for code.
Search youtube without a browser: repo | thread
BL quote proposals to this thread please.
my repos / my repos
Offline
virus@Virus:~$ sudo lsusb
[sudo] password for virus:
Bus 001 Device 006: ID 2717:ff80 Xiaomi Inc. Mi/Redmi series (RNDIS)
Bus 001 Device 002: ID 0bda:818b Realtek Semiconductor Corp. RTL8192EU 802.11b/g/n WLAN Adapter
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 003: ID 1a2c:0c21 China Resource Semico Co., Ltd
Bus 002 Device 002: ID 1a2c:0042 China Resource Semico Co., Ltd
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Offline
virus@Virus:~$ dmesg|grep -Ei 'wlan|firmw|dhc'
dmesg: read kernel buffer failed: Operation not permitted
virus@Virus:~$
Offline
virus@Virus:~$ sudo cat /var/log/syslog | grep -Ei 'net|wpa|dhc'
[sudo] password for virus:
Jan 19 18:20:18 Virus NetworkManager[394]: <info> [1579438218.3618] device (wlx502b73c86f2b): set-hw-addr: set MAC address to D2:96:9E:E8:2A:5D (scanning)
Jan 19 18:20:18 Virus kernel: [ 565.283464] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:22:39 Virus NetworkManager[394]: <info> [1579438359.3379] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv6 routing and DNS
Jan 19 18:22:40 Virus ntpd[580]: bind(25) AF_INET6 2405:204:8380:84d:32b3:d28e:3fa4:1701#123 flags 0x11 failed: Cannot assign requested address
Jan 19 18:25:34 Virus NetworkManager[394]: <info> [1579438534.3555] device (wlx502b73c86f2b): set-hw-addr: set MAC address to DE:C8:BB:1D:32:D2 (scanning)
Jan 19 18:25:34 Virus kernel: [ 881.278794] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:27:06 Virus dhclient[1251]: receive_packet failed on enp0s2f1u7: Network is down
Jan 19 18:27:06 Virus NetworkManager[394]: <info> [1579438626.7661] device (enp0s2f1u7): state change: activated -> unmanaged (reason 'removed') [100 10 36]
Jan 19 18:27:06 Virus ModemManager[392]: <info> (net/enp0s2f1u7): released by modem /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7
Jan 19 18:27:06 Virus NetworkManager[394]: <info> [1579438626.8050] dhcp4 (enp0s2f1u7): canceled DHCP transaction, DHCP client pid 1251
Jan 19 18:27:06 Virus NetworkManager[394]: <info> [1579438626.8051] dhcp4 (enp0s2f1u7): state changed bound -> done
Jan 19 18:27:06 Virus NetworkManager[394]: <info> [1579438626.8133] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:27:06 Virus NetworkManager[394]: <info> [1579438626.8142] manager: NetworkManager state is now DISCONNECTED
Jan 19 18:27:06 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 19 18:27:06 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 19 18:27:06 Virus NetworkManager[394]: <info> [1579438626.9181] devices removed (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.2871] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/4)
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3364] device (usb0): interface index 4 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3663] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:27:44 Virus kernel: [ 1011.272469] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3664] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3669] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3720] device (enp0s2f1u7): link connected
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3771] keyfile: add connection in-memory (5f19ec75-2e1c-30a0-a6a0-727dfe9e6a54,"Wired connection 1")
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3869] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.3999] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4031] policy: auto-activating connection 'Wired connection 1'
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4056] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (5f19ec75-2e1c-30a0-a6a0-727dfe9e6a54)
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4072] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4082] manager: NetworkManager state is now CONNECTING
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4095] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4109] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4125] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4180] dhcp4 (enp0s2f1u7): dhclient started with pid 6088
Jan 19 18:27:44 Virus dhclient[6088]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 6
Jan 19 18:27:44 Virus dhclient[6088]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 19 18:27:44 Virus dhclient[6088]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 19 18:27:44 Virus dhclient[6088]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4838] dhcp4 (enp0s2f1u7): address 192.168.42.63
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4839] dhcp4 (enp0s2f1u7): plen 24 (255.255.255.0)
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4839] dhcp4 (enp0s2f1u7): gateway 192.168.42.129
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4839] dhcp4 (enp0s2f1u7): server identifier 192.168.42.129
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4839] dhcp4 (enp0s2f1u7): lease time 3600
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4840] dhcp4 (enp0s2f1u7): hostname 'Virus'
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4840] dhcp4 (enp0s2f1u7): nameserver '192.168.42.129'
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4840] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4857] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4862] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4866] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.4867] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:27:44 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 19 18:27:44 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.5343] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.5345] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 19 18:27:44 Virus NetworkManager[394]: <info> [1579438664.5350] device (enp0s2f1u7): Activation: successful, device activated.
Jan 19 18:27:44 Virus dhclient[6088]: bound to 192.168.42.63 -- renewal in 1648 seconds.
Jan 19 18:27:48 Virus dhclient[6088]: receive_packet failed on enp0s2f1u7: Network is down
Jan 19 18:27:48 Virus NetworkManager[394]: <info> [1579438668.2016] device (enp0s2f1u7): state change: activated -> unmanaged (reason 'removed') [100 10 36]
Jan 19 18:27:48 Virus ModemManager[392]: <info> (net/enp0s2f1u7): released by modem /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7
Jan 19 18:27:48 Virus NetworkManager[394]: <info> [1579438668.2253] dhcp4 (enp0s2f1u7): canceled DHCP transaction, DHCP client pid 6088
Jan 19 18:27:48 Virus NetworkManager[394]: <info> [1579438668.2255] dhcp4 (enp0s2f1u7): state changed bound -> done
Jan 19 18:27:48 Virus NetworkManager[394]: <info> [1579438668.2331] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:27:48 Virus NetworkManager[394]: <info> [1579438668.2360] manager: NetworkManager state is now DISCONNECTED
Jan 19 18:27:48 Virus NetworkManager[394]: <info> [1579438668.3227] devices removed (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.3906] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/5)
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4262] device (usb0): interface index 5 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 19 18:28:27 Virus kernel: [ 1054.355956] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4499] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4500] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4504] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4582] device (enp0s2f1u7): link connected
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4626] keyfile: add connection in-memory (db3e93b2-e87c-3d31-bf4d-dbd64d7e1bed,"Wired connection 1")
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4699] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.4943] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5017] policy: auto-activating connection 'Wired connection 1'
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5079] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (db3e93b2-e87c-3d31-bf4d-dbd64d7e1bed)
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5096] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5113] manager: NetworkManager state is now CONNECTING
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5141] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5178] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5202] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5241] dhcp4 (enp0s2f1u7): dhclient started with pid 6243
Jan 19 18:28:27 Virus dhclient[6243]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 5
Jan 19 18:28:27 Virus dhclient[6243]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 19 18:28:27 Virus dhclient[6243]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 19 18:28:27 Virus dhclient[6243]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5763] dhcp4 (enp0s2f1u7): address 192.168.42.63
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5763] dhcp4 (enp0s2f1u7): plen 24 (255.255.255.0)
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5764] dhcp4 (enp0s2f1u7): gateway 192.168.42.129
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5764] dhcp4 (enp0s2f1u7): server identifier 192.168.42.129
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5764] dhcp4 (enp0s2f1u7): lease time 3600
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5764] dhcp4 (enp0s2f1u7): hostname 'Virus'
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5764] dhcp4 (enp0s2f1u7): nameserver '192.168.42.129'
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5765] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5781] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5787] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5791] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.5792] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 19 18:28:27 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 19 18:28:27 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.6314] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.6316] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 19 18:28:27 Virus NetworkManager[394]: <info> [1579438707.6321] device (enp0s2f1u7): Activation: successful, device activated.
Jan 19 18:28:27 Virus dhclient[6243]: bound to 192.168.42.63 -- renewal in 1356 seconds.
Jan 20 00:01:11 Virus systemd[1]: Starting Raise network interfaces...
Jan 20 00:01:11 Virus systemd[1]: Started Raise network interfaces.
Jan 20 00:01:11 Virus systemd[1]: Starting Network Manager...
Jan 20 00:01:11 Virus kernel: [ 0.157424] NET: Registered protocol family 16
Jan 20 00:01:11 Virus kernel: [ 0.241724] NET: Registered protocol family 2
Jan 20 00:01:11 Virus kernel: [ 0.242437] NET: Registered protocol family 1
Jan 20 00:01:11 Virus kernel: [ 0.880908] audit: initializing netlink subsys (disabled)
Jan 20 00:01:11 Virus kernel: [ 0.905756] NET: Registered protocol family 10
Jan 20 00:01:11 Virus kernel: [ 0.906045] NET: Registered protocol family 17
Jan 20 00:01:11 Virus kernel: [ 4.989230] ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.4474] NetworkManager (version 1.6.2) is starting...
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.4475] Read config: /etc/NetworkManager/NetworkManager.conf
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.5099] manager[0x561a9f0c0040]: monitoring kernel firmware directory '/lib/firmware'.
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.5100] monitoring ifupdown state file '/run/network/ifstate'.
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.5276] dns-mgr[0x561a9f0b4180]: init: dns=default, rc-manager=resolvconf
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.5427] rfkill0: found WiFi radio killswitch (at /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/ieee80211/phy0/rfkill0) (driver rtl8xxxu)
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.5432] manager[0x561a9f0c0040]: WiFi hardware radio set enabled
Jan 20 00:01:13 Virus NetworkManager[375]: <info> [1579458673.5432] manager[0x561a9f0c0040]: WWAN hardware radio set enabled
Jan 20 00:01:13 Virus systemd[1]: Started Network Manager.
Jan 20 00:01:13 Virus systemd[1]: Reached target Network.
Jan 20 00:01:13 Virus systemd[1]: Starting Network Manager Wait Online...
Jan 20 00:01:13 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:01:14 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0371] init!
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0380] management mode: unmanaged
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0391] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0391] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b): no ifupdown configuration found.
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0392] devices added (path: /sys/devices/virtual/net/lo, iface: lo)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0392] device added (path: /sys/devices/virtual/net/lo, iface: lo): no ifupdown configuration found.
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0392] end _init.
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0393] settings: loaded plugin ifupdown: (C) 2008 Canonical Ltd. To report bugs please use the NetworkManager mailing list. (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-settings-plugin-ifupdown.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0395] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc. To report bugs please use the NetworkManager mailing list.
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0395] (-1626454912) ... get_connections.
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0396] (-1626454912) ... get_connections (managed=false): return empty list.
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.0973] keyfile: new connection /etc/NetworkManager/system-connections/LIZA (7ccd38d8-7348-4f64-a8ab-a760fc7d3940,"LIZA")
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.2024] keyfile: new connection /etc/NetworkManager/system-connections/Virus Cell (02c56203-8fbe-4457-85b1-091090b56b15,"Virus Cell")
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.2411] get unmanaged devices count: 0
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.5448] settings: hostname: using hostnamed
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.5449] settings: hostname changed from (none) to "Virus"
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.5824] dhcp-init: Using DHCP client 'dhclient'
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.5826] manager: WiFi enabled by radio killswitch; enabled by state file
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.5828] manager: WWAN enabled by radio killswitch; enabled by state file
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.5829] manager: Networking is enabled by state file
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6098] Loaded device plugin: NMBondDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6099] Loaded device plugin: NMBridgeDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6100] Loaded device plugin: NMEthernetDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6101] Loaded device plugin: NMInfinibandDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6101] Loaded device plugin: NMIPTunnelDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6102] Loaded device plugin: NMMacsecDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6102] Loaded device plugin: NMMacvlanDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6103] Loaded device plugin: NMTunDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6104] Loaded device plugin: NMVethDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6104] Loaded device plugin: NMVlanDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6105] Loaded device plugin: NMVxlanDeviceFactory (internal)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6429] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wifi.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.6850] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-bluetooth.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7148] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-team.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7175] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wwan.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7273] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-adsl.so)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7673] device (lo): link connected
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7704] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7821] (wlx502b73c86f2b): using nl80211 for WiFi device control
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7868] manager: (wlx502b73c86f2b): new 802.11 WiFi device (/org/freedesktop/NetworkManager/Devices/2)
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.7930] device (wlx502b73c86f2b): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:01:14 Virus kernel: [ 16.202584] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:14 Virus kernel: [ 16.219566] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.8897] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 6E:E0:29:C8:6D:5B (scanning)
Jan 20 00:01:14 Virus kernel: [ 16.313949] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:14 Virus dbus[371]: [system] Activating via systemd: service name='fi.w1.wpa_supplicant1' unit='wpa_supplicant.service'
Jan 20 00:01:14 Virus NetworkManager[375]: <info> [1579458674.9604] ModemManager available in the bus
Jan 20 00:01:14 Virus systemd[1]: Starting WPA supplicant...
Jan 20 00:01:15 Virus dbus[371]: [system] Successfully activated service 'fi.w1.wpa_supplicant1'
Jan 20 00:01:15 Virus systemd[1]: Started WPA supplicant.
Jan 20 00:01:15 Virus wpa_supplicant[496]: Successfully initialized wpa_supplicant
Jan 20 00:01:15 Virus NetworkManager[375]: <info> [1579458675.3571] supplicant: wpa_supplicant running
Jan 20 00:01:15 Virus NetworkManager[375]: <info> [1579458675.3574] device (wlx502b73c86f2b): supplicant interface state: init -> starting
Jan 20 00:01:15 Virus NetworkManager[375]: <info> [1579458675.7213] sup-iface[0x561a9f133e70,wlx502b73c86f2b]: supports 4 scan SSIDs
Jan 20 00:01:15 Virus NetworkManager[375]: <info> [1579458675.7242] device (wlx502b73c86f2b): supplicant interface state: starting -> ready
Jan 20 00:01:15 Virus NetworkManager[375]: <info> [1579458675.7244] device (wlx502b73c86f2b): state change: unavailable -> disconnected (reason 'supplicant-available') [20 30 42]
Jan 20 00:01:15 Virus kernel: [ 17.132281] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:01:16 Virus NetworkManager[375]: <info> [1579458676.9050] device (wlx502b73c86f2b): supplicant interface state: ready -> inactive
Jan 20 00:01:16 Virus NetworkManager[375]: <info> [1579458676.9267] manager: startup complete
Jan 20 00:01:16 Virus systemd[1]: Started Network Manager Wait Online.
Jan 20 00:01:16 Virus systemd[1]: Reached target Network is Online.
Jan 20 00:01:17 Virus systemd[530]: Listening on GnuPG network certificate management daemon.
Jan 20 00:01:26 Virus systemd[567]: Listening on GnuPG network certificate management daemon.
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.4891] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3)
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5164] device (usb0): interface index 3 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 20 00:01:34 Virus kernel: [ 35.950619] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5430] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5431] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5434] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5442] device (enp0s2f1u7): link connected
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5560] keyfile: add connection in-memory (4b0eaf96-28f4-39a2-a613-39f98a9709b9,"Wired connection 1")
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5574] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5624] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5647] policy: auto-activating connection 'Wired connection 1'
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5667] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (4b0eaf96-28f4-39a2-a613-39f98a9709b9)
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5673] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5675] manager: NetworkManager state is now CONNECTING
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5680] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.5686] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.6088] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 20 00:01:34 Virus NetworkManager[375]: <info> [1579458694.9039] dhcp4 (enp0s2f1u7): dhclient started with pid 730
Jan 20 00:01:35 Virus dhclient[730]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 5
Jan 20 00:01:35 Virus dhclient[730]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 20 00:01:35 Virus dhclient[730]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 20 00:01:35 Virus dhclient[730]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5467] dhcp4 (enp0s2f1u7): address 192.168.42.63
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5468] dhcp4 (enp0s2f1u7): plen 24 (255.255.255.0)
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5468] dhcp4 (enp0s2f1u7): gateway 192.168.42.129
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5468] dhcp4 (enp0s2f1u7): server identifier 192.168.42.129
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5469] dhcp4 (enp0s2f1u7): lease time 3600
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5469] dhcp4 (enp0s2f1u7): hostname 'Virus'
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5469] dhcp4 (enp0s2f1u7): nameserver '192.168.42.129'
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5469] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5523] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5542] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5554] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.5568] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 20 00:01:35 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:01:35 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.7307] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.7309] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 20 00:01:35 Virus dhclient[730]: bound to 192.168.42.63 -- renewal in 1616 seconds.
Jan 20 00:01:35 Virus NetworkManager[375]: <info> [1579458695.7509] device (enp0s2f1u7): Activation: successful, device activated.
Jan 19 18:36:38 Virus systemd[567]: Closed GnuPG network certificate management daemon.
Jan 20 00:07:55 Virus systemd[1]: Starting Raise network interfaces...
Jan 20 00:07:55 Virus systemd[1]: Started Raise network interfaces.
Jan 20 00:07:55 Virus systemd[1]: Starting Network Manager...
Jan 20 00:07:55 Virus kernel: [ 0.157467] NET: Registered protocol family 16
Jan 20 00:07:55 Virus kernel: [ 0.242244] NET: Registered protocol family 2
Jan 20 00:07:55 Virus kernel: [ 0.242959] NET: Registered protocol family 1
Jan 20 00:07:55 Virus kernel: [ 0.891271] audit: initializing netlink subsys (disabled)
Jan 20 00:07:55 Virus kernel: [ 0.916315] NET: Registered protocol family 10
Jan 20 00:07:55 Virus kernel: [ 0.916613] NET: Registered protocol family 17
Jan 20 00:07:55 Virus kernel: [ 5.140285] ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.7300] NetworkManager (version 1.6.2) is starting...
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.7303] Read config: /etc/NetworkManager/NetworkManager.conf
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.7837] manager[0x55586306c040]: monitoring kernel firmware directory '/lib/firmware'.
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.7837] monitoring ifupdown state file '/run/network/ifstate'.
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.7880] dns-mgr[0x555863060180]: init: dns=default, rc-manager=resolvconf
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.8069] rfkill0: found WiFi radio killswitch (at /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/ieee80211/phy0/rfkill0) (driver rtl8xxxu)
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.8072] manager[0x55586306c040]: WiFi hardware radio set enabled
Jan 20 00:07:58 Virus NetworkManager[373]: <info> [1579459078.8072] manager[0x55586306c040]: WWAN hardware radio set enabled
Jan 20 00:07:58 Virus systemd[1]: Started Network Manager.
Jan 20 00:07:58 Virus systemd[1]: Starting Network Manager Wait Online...
Jan 20 00:07:58 Virus systemd[1]: Reached target Network.
Jan 20 00:07:58 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:07:59 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1767] init!
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1775] management mode: unmanaged
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1785] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1794] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-3/1-3:1.0/net/wlx502b73c86f2b, iface: wlx502b73c86f2b): no ifupdown configuration found.
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1794] devices added (path: /sys/devices/virtual/net/lo, iface: lo)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1794] device added (path: /sys/devices/virtual/net/lo, iface: lo): no ifupdown configuration found.
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1795] end _init.
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1795] settings: loaded plugin ifupdown: (C) 2008 Canonical Ltd. To report bugs please use the NetworkManager mailing list. (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-settings-plugin-ifupdown.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1796] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc. To report bugs please use the NetworkManager mailing list.
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1796] (1661532032) ... get_connections.
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.1797] (1661532032) ... get_connections (managed=false): return empty list.
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.2255] keyfile: new connection /etc/NetworkManager/system-connections/LIZA (7ccd38d8-7348-4f64-a8ab-a760fc7d3940,"LIZA")
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.3402] keyfile: new connection /etc/NetworkManager/system-connections/Virus Cell (02c56203-8fbe-4457-85b1-091090b56b15,"Virus Cell")
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.3517] get unmanaged devices count: 0
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.6438] settings: hostname: using hostnamed
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.6440] settings: hostname changed from (none) to "Virus"
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.6812] dhcp-init: Using DHCP client 'dhclient'
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.6814] manager: WiFi enabled by radio killswitch; enabled by state file
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.6816] manager: WWAN enabled by radio killswitch; enabled by state file
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.6816] manager: Networking is enabled by state file
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7085] Loaded device plugin: NMBondDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7086] Loaded device plugin: NMBridgeDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7087] Loaded device plugin: NMEthernetDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7088] Loaded device plugin: NMInfinibandDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7088] Loaded device plugin: NMIPTunnelDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7089] Loaded device plugin: NMMacsecDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7089] Loaded device plugin: NMMacvlanDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7090] Loaded device plugin: NMTunDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7091] Loaded device plugin: NMVethDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7091] Loaded device plugin: NMVlanDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7092] Loaded device plugin: NMVxlanDeviceFactory (internal)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7416] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wifi.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.7966] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-bluetooth.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.8236] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-team.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.8305] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wwan.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.8409] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-adsl.so)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.8743] device (lo): link connected
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.8771] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.8974] (wlx502b73c86f2b): using nl80211 for WiFi device control
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.9017] manager: (wlx502b73c86f2b): new 802.11 WiFi device (/org/freedesktop/NetworkManager/Devices/2)
Jan 20 00:07:59 Virus NetworkManager[373]: <info> [1579459079.9078] device (wlx502b73c86f2b): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:07:59 Virus kernel: [ 16.326858] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:07:59 Virus kernel: [ 16.343765] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:08:00 Virus NetworkManager[373]: <info> [1579459080.0311] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 86:3F:04:99:ED:A8 (scanning)
Jan 20 00:08:00 Virus kernel: [ 16.466130] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:08:00 Virus dbus[356]: [system] Activating via systemd: service name='fi.w1.wpa_supplicant1' unit='wpa_supplicant.service'
Jan 20 00:08:00 Virus systemd[1]: Starting WPA supplicant...
Jan 20 00:08:00 Virus NetworkManager[373]: <info> [1579459080.1052] ModemManager available in the bus
Jan 20 00:08:00 Virus dbus[356]: [system] Successfully activated service 'fi.w1.wpa_supplicant1'
Jan 20 00:08:00 Virus systemd[1]: Started WPA supplicant.
Jan 20 00:08:00 Virus wpa_supplicant[510]: Successfully initialized wpa_supplicant
Jan 20 00:08:00 Virus NetworkManager[373]: <info> [1579459080.5163] supplicant: wpa_supplicant running
Jan 20 00:08:00 Virus NetworkManager[373]: <info> [1579459080.5166] device (wlx502b73c86f2b): supplicant interface state: init -> starting
Jan 20 00:08:00 Virus NetworkManager[373]: <info> [1579459080.8437] sup-iface[0x5558630dfe70,wlx502b73c86f2b]: supports 4 scan SSIDs
Jan 20 00:08:00 Virus NetworkManager[373]: <info> [1579459080.8466] device (wlx502b73c86f2b): supplicant interface state: starting -> ready
Jan 20 00:08:00 Virus NetworkManager[373]: <info> [1579459080.8469] device (wlx502b73c86f2b): state change: unavailable -> disconnected (reason 'supplicant-available') [20 30 42]
Jan 20 00:08:00 Virus kernel: [ 17.265326] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 20 00:08:02 Virus NetworkManager[373]: <info> [1579459082.0250] device (wlx502b73c86f2b): supplicant interface state: ready -> inactive
Jan 20 00:08:02 Virus NetworkManager[373]: <info> [1579459082.0499] manager: startup complete
Jan 20 00:08:02 Virus systemd[1]: Started Network Manager Wait Online.
Jan 20 00:08:02 Virus systemd[1]: Reached target Network is Online.
Jan 20 00:08:02 Virus systemd[543]: Listening on GnuPG network certificate management daemon.
Jan 20 00:08:27 Virus systemd[581]: Listening on GnuPG network certificate management daemon.
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.3981] manager: (usb0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3)
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4354] device (usb0): interface index 3 renamed iface from 'usb0' to 'enp0s2f1u7'
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4552] devices added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7)
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4553] device added (path: /sys/devices/pci0000:00/0000:00:02.1/usb1/1-7/1-7:1.0/net/enp0s2f1u7, iface: enp0s2f1u7): no ifupdown configuration found.
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4557] device (enp0s2f1u7): state change: unmanaged -> unavailable (reason 'managed') [10 20 2]
Jan 20 00:11:00 Virus kernel: [ 196.873603] IPv6: ADDRCONF(NETDEV_UP): enp0s2f1u7: link is not ready
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4566] device (enp0s2f1u7): link connected
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4648] keyfile: add connection in-memory (359a29cb-b63b-35e7-96bd-1b282b365ef8,"Wired connection 1")
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4664] settings: (enp0s2f1u7): created default wired connection 'Wired connection 1'
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4704] device (enp0s2f1u7): state change: unavailable -> disconnected (reason 'none') [20 30 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4807] policy: auto-activating connection 'Wired connection 1'
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4846] device (enp0s2f1u7): Activation: starting connection 'Wired connection 1' (359a29cb-b63b-35e7-96bd-1b282b365ef8)
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4867] device (enp0s2f1u7): state change: disconnected -> prepare (reason 'none') [30 40 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4875] manager: NetworkManager state is now CONNECTING
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4947] device (enp0s2f1u7): state change: prepare -> config (reason 'none') [40 50 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.4994] device (enp0s2f1u7): state change: config -> ip-config (reason 'none') [50 70 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.5256] dhcp4 (enp0s2f1u7): activation: beginning transaction (timeout in 45 seconds)
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.6157] dhcp4 (enp0s2f1u7): dhclient started with pid 1213
Jan 20 00:11:00 Virus dhclient[1213]: DHCPDISCOVER on enp0s2f1u7 to 255.255.255.255 port 67 interval 8
Jan 20 00:11:00 Virus dhclient[1213]: DHCPREQUEST of 192.168.42.63 on enp0s2f1u7 to 255.255.255.255 port 67
Jan 20 00:11:00 Virus dhclient[1213]: DHCPOFFER of 192.168.42.63 from 192.168.42.129
Jan 20 00:11:00 Virus dhclient[1213]: DHCPACK of 192.168.42.63 from 192.168.42.129
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7797] dhcp4 (enp0s2f1u7): address 192.168.42.63
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7798] dhcp4 (enp0s2f1u7): plen 24 (255.255.255.0)
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7798] dhcp4 (enp0s2f1u7): gateway 192.168.42.129
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7798] dhcp4 (enp0s2f1u7): server identifier 192.168.42.129
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7798] dhcp4 (enp0s2f1u7): lease time 3600
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7799] dhcp4 (enp0s2f1u7): hostname 'Virus'
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7799] dhcp4 (enp0s2f1u7): nameserver '192.168.42.129'
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7799] dhcp4 (enp0s2f1u7): state changed unknown -> bound
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7818] device (enp0s2f1u7): state change: ip-config -> ip-check (reason 'none') [70 80 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7825] device (enp0s2f1u7): state change: ip-check -> secondaries (reason 'none') [80 90 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7850] device (enp0s2f1u7): state change: secondaries -> activated (reason 'none') [90 100 0]
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.7852] manager: NetworkManager state is now CONNECTED_LOCAL
Jan 20 00:11:00 Virus systemd[1]: Starting Network Manager Script Dispatcher Service...
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.8305] manager: NetworkManager state is now CONNECTED_GLOBAL
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.8308] policy: set 'Wired connection 1' (enp0s2f1u7) as default for IPv4 routing and DNS
Jan 20 00:11:00 Virus systemd[1]: Started Network Manager Script Dispatcher Service.
Jan 20 00:11:00 Virus NetworkManager[373]: <info> [1579459260.8513] device (enp0s2f1u7): Activation: successful, device activated.
Jan 20 00:11:00 Virus dhclient[1213]: bound to 192.168.42.63 -- renewal in 1383 seconds.
Jan 19 18:43:44 Virus NetworkManager[373]: <info> [1579439624.3965] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 06:F0:20:8E:64:59 (scanning)
Jan 19 18:43:44 Virus kernel: [ 360.271963] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:49:00 Virus NetworkManager[373]: <info> [1579439940.4286] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 6E:75:FF:52:32:FA (scanning)
Jan 19 18:49:00 Virus kernel: [ 676.308556] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:54:16 Virus NetworkManager[373]: <info> [1579440256.3890] device (wlx502b73c86f2b): set-hw-addr: set MAC address to 1E:EB:8E:24:4E:DD (scanning)
Jan 19 18:54:16 Virus kernel: [ 992.266711] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
Jan 19 18:59:32 Virus NetworkManager[373]: <info> [1579440572.4002] device (wlx502b73c86f2b): set-hw-addr: set MAC address to AE:43:D7:16:0E:45 (scanning)
Jan 19 18:59:32 Virus kernel: [ 1308.279992] IPv6: ADDRCONF(NETDEV_UP): wlx502b73c86f2b: link is not ready
virus@Virus:~$
Last edited by damo (2020-01-19 15:10:50)
Offline
virus@Virus:~$ systemctl status NetworkManager
● NetworkManager.service - Network Manager
Loaded: loaded (/lib/systemd/system/NetworkManager.service; enabled; ven
Active: active (running) since Mon 2020-01-20 00:07:58 IST; 5h 2min left
Docs: man:NetworkManager(8)
Main PID: 373 (NetworkManager)
Tasks: 4 (limit: 4915)
CGroup: /system.slice/NetworkManager.service
├─ 373 /usr/sbin/NetworkManager --no-daemon
└─1213 /sbin/dhclient -d -q -sf /usr/lib/NetworkManager/nm-dhcp-
lines 1-9/9 (END)
Offline
virus@Virus:~$ journalctl -u NetworkManager -b
Hint: You are currently not seeing messages from other users and the system.
Users in the 'systemd-journal' group can see all messages. Pass -q to
turn off this notice.
No journal files were opened due to insufficient permissions.
virus@Virus:~$
Offline
@Zeno You are being asked again to use [ code ] tags when posting terminal output. I have edited your long post above to demonstrate the difference it makes.
Be Excellent to Each Other...
The Bunsenlabs Lithium Desktop » Here
FORUM RULES and posting guidelines «» Help page for forum post formatting
Artwork on DeviantArt «» BunsenLabs on DeviantArt
Online
virus@Virus:~$ journalctl -u NetworkManager -b
Hint: You are currently not seeing messages from other users and the system.
Users in the 'systemd-journal' group can see all messages. Pass -q to
turn off this notice.
No journal files were opened due to insufficient permissions.
virus@Virus:~$
You need to use 'sudo' to see the full output.
Be Excellent to Each Other...
The Bunsenlabs Lithium Desktop » Here
FORUM RULES and posting guidelines «» Help page for forum post formatting
Artwork on DeviantArt «» BunsenLabs on DeviantArt
Online
virus@Virus:~$ dmesg|grep -Ei 'wlan|firmw|dhc'
dmesg: read kernel buffer failed: Operation not permitted
virus@Virus:~$
Yes. You ned to be root top run dmesg, or preeced command with "sudo".
// Regards rbh
Offline
virus@Virus:~$ systemctl status NetworkManager
Probably you will get some more info if you issue the command with root rights.
// Regards rbh
Offline