Ciao a tutti,
allora, mi è appena successo quindi posso descrivere con memoria fresca. Accendo il pc staname (a batteria), e parte F13.
Dopo un po’ visto che l’icona della batteria passa da normale a gialla, attacco il cavo di alimentazione (a pc acceso), e inizia a alimentarsi da settore.
Dopo una decina di minuti, stacco il cavo di alimentazione, senza chiudere lo sportello del monitor né fare niente di strano, e dopo 5-10 sec da quel momento inizia a spegnersi da solo.
Copio la parte di var log messages relativa a quello che mi sembra essere il momento incriminato:
Oct 22 10:13:13 vulnus init: system-setup-keyboard main process (833) killed by TERM signal
Oct 22 10:13:13 vulnus init: tty (/dev/tty2) main process (1291) killed by TERM signal
Oct 22 10:13:13 vulnus init: tty (/dev/tty3) main process (1293) killed by TERM signal
Oct 22 10:13:13 vulnus init: tty (/dev/tty4) main process (1295) killed by TERM signal
Oct 22 10:13:13 vulnus init: tty (/dev/tty5) main process (1297) killed by TERM signal
Oct 22 10:13:13 vulnus init: tty (/dev/tty6) main process (1299) killed by TERM signal
Oct 22 10:13:13 vulnus NetworkManager[1154]: <info> (eth1): device state change: 8 -> 3 (reason 38)
Oct 22 10:13:13 vulnus NetworkManager[1154]: <info> (eth1): deactivating device (reason: 38).
Oct 22 10:13:13 vulnus abrt[2386]: not dumping repeating crash in '/opt/google/chrome/chrome'
Oct 22 10:13:13 vulnus NetworkManager[1154]: <info> (eth1): canceled DHCP transaction, DHCP client pid 1874
Oct 22 10:13:13 vulnus avahi-daemon[1003]: Withdrawing address record for 192.168.1.103 on eth1.
Oct 22 10:13:13 vulnus avahi-daemon[1003]: Leaving mDNS multicast group on interface eth1.IPv4 with address 192.168.1.103.
Oct 22 10:13:13 vulnus avahi-daemon[1003]: Interface eth1.IPv4 no longer relevant for mDNS.
Oct 22 10:13:13 vulnus avahi-daemon[1003]: Got SIGTERM, quitting.
Oct 22 10:13:13 vulnus bonobo-activation-server (salvo11-2379): could not associate with desktop session: Failed to connect to socket /tmp/dbus-cVIHATP7a0: Connection refused
Oct 22 10:13:13 vulnus console-kit-daemon[1342]: WARNING: Couldn't read /proc/1648/environ: Failed to open file '/proc/1648/environ': No such file or directory
Oct 22 10:13:14 vulnus abrt[2383]: saved core dump of pid 2111 (/opt/google/chrome/chrome) to /var/spool/abrt/ccpp-1287735193-2111.new/coredump (1105920 bytes)
Oct 22 10:13:14 vulnus abrtd: Directory 'ccpp-1287735193-2111' creation detected
Oct 22 10:13:14 vulnus NetworkManager[1154]: <warn> error requesting auth for org.freedesktop.NetworkManager.network-control: (6) Remote Exception invoking org.freedesktop.PolicyKit1.Authority.CheckAuthorization() on /org/freedesktop/PolicyKit1/Authority
at name org.freedesktop.PolicyKit1: org.freedesktop.DBus.Error.NameHasNoOwner: Remote Exception invoking org.freedesktop.DBus.GetConnectionUnixUser() on / at name org.freedesktop.DBus:
org.freedesktop.DBus.Error.NameHasNoOwner: Could not get UID of name ':1.47': no such name
Oct 22 10:13:14 vulnus NetworkManager[1154]: <warn> User connections unavailable: (6) Remote Exception invoking org.freedesktop.PolicyKit1.Authority.CheckAuthorization() on /org/freedesktop/PolicyKit1/Authority
at name org.freedesktop.PolicyKit1: org.freedesktop.DBus.Error.NameHasNoOwner: Remote Exception invoking org.freedesktop.DBus.GetConnectionUnixUser() on /
at name org.freedesktop.DBus: org.freedesktop.DBus.Error.NameHasNoOwner: Could not get UID of name ':1.47': no such name
Oct 22 10:13:14 vulnus NetworkManager[1154]: <warn> error requesting auth for org.freedesktop.NetworkManager.enable-disable-network: (6) Remote Exception invoking org.freedesktop.PolicyKit1.Authority.CheckAuthorization() on /org/freedesktop/PolicyKit1/Authority
at name org.freedesktop.PolicyKit1: org.freedesktop.DBus.Error.NameHasNoOwner: Remote Exception invoking org.freedesktop.DBus.GetConnectionUnixUser() on /
at name org.freedesktop.DBus: org.freedesktop.DBus.Error.NameHasNoOwner: Could not get UID of name ':1.47': no such name
Oct 22 10:13:14 vulnus NetworkManager[1154]: <warn> error requesting auth for org.freedesktop.NetworkManager.sleep-wake: (6) Remote Exception invoking org.freedesktop.PolicyKit1.Authority.CheckAuthorization() on /org/freedesktop/PolicyKit1/Authority
at name org.freedesktop.PolicyKit1: org.freedesktop.DBus.Error.NameHasNoOwner: Remote Exception invoking org.freedesktop.DBus.GetConnectionUnixUser() on /
at name org.freedesktop.DBus: org.freedesktop.DBus.Error.NameHasNoOwner: Could not get UID of name ':1.47': no such name
Oct 22 10:13:14 vulnus NetworkManager[1154]: <warn> error requesting auth for org.freedesktop.NetworkManager.enable-disable-wifi: (6) Remote Exception invoking org.freedesktop.PolicyKit1.Authority.CheckAuthorization() on /org/freedesktop/PolicyKit1/Authority
at name org.freedesktop.PolicyKit1: org.freedesktop.DBus.Error.NameHasNoOwner: Remote Exception invoking org.freedesktop.DBus.GetConnectionUnixUser() on /
at name org.freedesktop.DBus: org.freedesktop.DBus.Error.NameHasNoOwner: Could not get UID of name ':1.47': no such name
Oct 22 10:13:14 vulnus NetworkManager[1154]: <warn> error requesting auth for org.freedesktop.NetworkManager.enable-disable-wwan: (6) Remote Exception invoking org.freedesktop.PolicyKit1.Authority.CheckAuthorization() on /org/freedesktop/PolicyKit1/Authority
at name org.freedesktop.PolicyKit1: org.freedesktop.DBus.Error.NameHasNoOwner: Remote Exception invoking org.freedesktop.DBus.GetConnectionUnixUser() on /
at name org.freedesktop.DBus: org.freedesktop.DBus.Error.NameHasNoOwner: Could not get UID of name ':1.47': no such name
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_prepare
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_set_power: 0
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_set_backlight: the level is 0
Oct 22 10:13:15 vulnus kernel: [drm] LVDS: set mode 1366x768 c
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_commit
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_set_power: 1
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_set_backlight: the level is 100
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_dpms: the mode is 0
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_set_power: 1
Oct 22 10:13:15 vulnus kernel: [drm] intel_lvds_set_backlight: the level is 100
Oct 22 10:13:16 vulnus kernel: [drm] intel_lvds_prepare
Oct 22 10:13:16 vulnus kernel: [drm] intel_lvds_set_power: 0
Oct 22 10:13:16 vulnus kernel: [drm] intel_lvds_set_backlight: the level is 0
Oct 22 10:13:16 vulnus kernel: [drm] LVDS: set mode 1366x768 c
Oct 22 10:13:16 vulnus kernel: [drm] intel_lvds_commit
Oct 22 10:13:16 vulnus kernel: [drm] intel_lvds_set_power: 1
Oct 22 10:13:16 vulnus kernel: [drm] intel_lvds_set_backlight: the level is 100
Oct 22 10:13:16 vulnus abrt[2493]: abrt daemon is not running. If it crashed, /proc/sys/kernel/core_pattern contains a stale value, consider resetting it to 'core'
Oct 22 10:13:21 vulnus rpc.statd[1017]: Caught signal 15, un-registering and exiting
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> caught signal 15, shutting down normally.
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth0): now unmanaged
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth0): device state change: 2 -> 1 (reason 36)
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth0): cleaning up...
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth0): taking down device.
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth1): now unmanaged
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth1): device state change: 3 -> 1 (reason 36)
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth1): cleaning up...
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> (eth1): taking down device.
Oct 22 10:13:22 vulnus NetworkManager[1154]: <info> exiting (success)
Oct 22 10:13:22 vulnus init: Disconnected from system bus
Oct 22 10:13:22 vulnus nm-dispatcher.action: Disconnected from the system bus, exiting.
Oct 22 10:13:22 vulnus console-kit-daemon[1342]: WARNING: no sender#012
Oct 22 10:13:22 vulnus rtkit-daemon[1479]: Demoting known real-time threads.
Oct 22 10:13:22 vulnus rtkit-daemon[1479]: Demoted 0 threads.
Oct 22 10:13:22 vulnus rpcbind: rpcbind terminating on signal. Restart with "rpcbind -w"
Oct 22 10:13:22 vulnus auditd[906]: The audit daemon is exiting.
Oct 22 10:13:22 vulnus kernel: type=1305 audit(1287735202.597:34): audit_pid=0 old=906 auid=4294967295 ses=4294967295 res=1
Oct 22 10:13:23 vulnus cpuspeed: Disabling ondemand cpu frequency scaling governor
Oct 22 10:14:08 vulnus kernel: imklog 4.4.2, log source = /proc/kmsg started.
Oct 22 10:14:08 vulnus rsyslogd: [origin software="rsyslogd" swVersion="4.4.2" x-pid="917" x-info="http://www.rsyslog.com"] (re)start
Oct 22 10:14:08 vulnus kernel: Initializing cgroup subsys cpuset
Oct 22 10:14:08 vulnus kernel: Initializing cgroup subsys cpu
Oct 22 10:14:08 vulnus kernel: Linux version 2.6.33.8-149.fc13.i686 ([email protected]) (gcc version 4.4.4 20100630 (Red Hat 4.4.4-10) (GCC) ) #1 SMP Tue Aug 17 22:45:56 UTC 2010
S.