nevermind recompiling the the individual module github driver seemed to work, not going to try the rtw89 github driver until i need do so(eg. when the next kernel releases).. On Mon, Oct 17, 2022 at 6:22 PM bommy985 <turkenlurken@xxxxxxxxx> wrote: > > especially interested in these errors, as even if i force version > magic to be excluded, it gives the error at the bottom, this is doing > sudo rmmod, as making and making install claims to be a success > i did not see any compiler errors in the compiler process, although > some warnings claiming that "x is always gonna be true" and whatnot > > [ 44.250693] audit: type=1101 audit(1665975479.413:87): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.251413] audit: type=1110 audit(1665975479.413:88): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.251506] audit: type=1105 audit(1665975479.413:89): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.306013] 8852be: version magic '6.0.1-arch2-1 SMP preempt > mod_unload ' should be '6.0.2-arch1-1 SMP preempt mod_unload ' > [ 44.307769] audit: type=1106 audit(1665975479.469:90): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.307820] audit: type=1104 audit(1665975479.469:91): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.155859] audit: type=1101 audit(1665975483.319:92): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.156372] audit: type=1110 audit(1665975483.319:93): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.156463] audit: type=1105 audit(1665975483.319:94): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.157747] audit: type=1106 audit(1665975483.319:95): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.195548] kauditd_printk_skb: 1 callbacks suppressed > [ 58.195551] audit: type=1101 audit(1665975493.356:97): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.196046] audit: type=1110 audit(1665975493.359:98): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.196131] audit: type=1105 audit(1665975493.359:99): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.197260] audit: type=1106 audit(1665975493.359:100): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.197283] audit: type=1104 audit(1665975493.359:101): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.051388] audit: type=1101 audit(1665975500.212:102): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.051835] audit: type=1110 audit(1665975500.212:103): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.051925] audit: type=1105 audit(1665975500.212:104): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.072451] audit: type=1106 audit(1665975500.232:105): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.072526] audit: type=1104 audit(1665975500.236:106): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.710765] audit: type=1101 audit(1665975508.872:107): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.711208] audit: type=1110 audit(1665975508.872:108): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.711298] audit: type=1105 audit(1665975508.872:109): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.712339] audit: type=1106 audit(1665975508.872:110): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.712372] audit: type=1104 audit(1665975508.872:111): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.139144] audit: type=1101 audit(1665975527.302:112): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.139503] audit: type=1110 audit(1665975527.302:113): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.139577] audit: type=1105 audit(1665975527.302:114): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.140550] audit: type=1106 audit(1665975527.302:115): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.140576] audit: type=1104 audit(1665975527.302:116): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.921630] audit: type=1101 audit(1665975530.082:117): pid=2716 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.921995] audit: type=1110 audit(1665975530.082:118): pid=2716 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.922051] audit: type=1105 audit(1665975530.082:119): pid=2716 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.984078] 8852be: bad vermagic: kernel tainted. > [ 94.984083] Disabling lock debugging due to kernel taint > [ 95.159114] BPF: type_id=1765 bits_offset=128 > [ 95.159116] BPF: > [ 95.159117] BPF: Invalid name > [ 95.159117] BPF: > [ 95.159120] failed to validate module [8852be] BTF: -22