Jul 08 16:12:23 dom0 kernel: Linux version 6.12.25-1.qubes.fc37.x86_64 (mockbuild@f5c1036f3e904c71ab30b706d129fc9f) (gcc (GCC) 12.3.1 20230508 (Red Hat 12.3.1-1), GNU ld version 2.38-27.fc37) #1 SMP PREEMPT_DYNAMIC Mon Apr 28 03:58:25 GMT 2025 Jul 08 16:12:23 dom0 kernel: Command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: TSC doesn't count with P0 frequency! Jul 08 16:12:23 dom0 kernel: Released 0 page(s) Jul 08 16:12:23 dom0 kernel: BIOS-provided physical RAM map: Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000000000-0x000000000007ffff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000080000-0x00000000000fffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000100000-0x0000000009afffff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009b00000-0x0000000009dfffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009e00000-0x0000000009efffff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009f00000-0x0000000009f3bfff] ACPI NVS Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009f3c000-0x0000000049b5ffff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000049b60000-0x000000004bd5ffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd60000-0x000000004bd68fff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd69000-0x000000004bd6cfff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd6d000-0x000000004bd6efff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd6f000-0x000000004bd6ffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd70000-0x0000000057f7efff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000057f7f000-0x000000005a77efff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005a77f000-0x000000005af7efff] ACPI NVS Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005af7f000-0x000000005affefff] ACPI data Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005afff000-0x000000005affffff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005b000000-0x000000005bffffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005d790000-0x000000005d7effff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005d7f5000-0x000000005fffffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000c0200000-0x00000000c0203fff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000c0300000-0x00000000c03fffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec00000-0x00000000fec01fff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec10000-0x00000000fec10fff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec20000-0x00000000fec20fff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fed80000-0x00000000fed81fff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000100000000-0x00000001aa640fff] usable Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000001020000000-0x00000010c01fffff] reserved Jul 08 16:12:23 dom0 kernel: NX (Execute Disable) protection: active Jul 08 16:12:23 dom0 kernel: APIC: Static calls initialized Jul 08 16:12:23 dom0 kernel: efi: EFI v2.9 by INSYDE Corp. Jul 08 16:12:23 dom0 kernel: efi: ACPI=0x5affe000 ACPI 2.0=0x5affe014 TPMFinalLog=0x5af3f000 SMBIOS=0x58e77000 SMBIOS 3.0=0x58e74000 (MEMATTR=0x52c7d018 unusable) ESRT=0x5af94018 Jul 08 16:12:23 dom0 kernel: SMBIOS 3.6.0 present. Jul 08 16:12:23 dom0 kernel: DMI: Framework Laptop 16 (AMD Ryzen 7040 Series)/FRANMZCP07, BIOS 03.03 03/27/2024 Jul 08 16:12:23 dom0 kernel: DMI: Memory slots populated: 2/2 Jul 08 16:12:23 dom0 kernel: Hypervisor detected: Xen PV Jul 08 16:12:23 dom0 kernel: Xen PV: Detected 8 vCPUS Jul 08 16:12:23 dom0 kernel: tsc: Fast TSC calibration using PIT Jul 08 16:12:23 dom0 kernel: tsc: Detected 3792.840 MHz processor Jul 08 16:12:23 dom0 kernel: tsc: Detected 3792.862 MHz TSC Jul 08 16:12:23 dom0 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 08 16:12:23 dom0 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 08 16:12:23 dom0 kernel: last_pfn = 0x1aa641 max_arch_pfn = 0x400000000 Jul 08 16:12:23 dom0 kernel: MTRR map: 3 entries (0 fixed + 3 variable; max 16), built from 8 variable MTRRs Jul 08 16:12:23 dom0 kernel: MTRRs set to read-only Jul 08 16:12:23 dom0 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 08 16:12:23 dom0 kernel: last_pfn = 0x5b000 max_arch_pfn = 0x400000000 Jul 08 16:12:23 dom0 kernel: esrt: Reserving ESRT space from 0x000000005af94018 to 0x000000005af94050. Jul 08 16:12:23 dom0 kernel: Secure boot disabled Jul 08 16:12:23 dom0 kernel: RAMDISK: [mem 0x04000000-0x08336fff] Jul 08 16:12:23 dom0 kernel: ACPI: Early table checksum verification disabled Jul 08 16:12:23 dom0 kernel: ACPI: RSDP 0x000000005AFFE014 000024 (v02 INSYDE) Jul 08 16:12:23 dom0 kernel: ACPI: XSDT 0x000000005AFAA228 0001A4 (v01 INSYDE EDK2 00000002 01000013) Jul 08 16:12:23 dom0 kernel: ACPI: FACP 0x000000005AFEE000 00010C (v05 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: DSDT 0x000000005AFDE000 009ADE (v02 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: FACS 0x000000005AEB1000 000040 Jul 08 16:12:23 dom0 kernel: ACPI: UEFI 0x000000005AF67000 0001CF (v01 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF4000 008416 (v02 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF3000 00033E (v01 INSYDE EDK2 00001000 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF1000 000ABD (v02 INSYDE EDK2 00001000 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: ASF! 0x000000005AFF0000 0000A5 (v32 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: BOOT 0x000000005AFEF000 000028 (v01 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: HPET 0x000000005AFED000 000038 (v01 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: APIC 0x000000005AFEC000 000138 (v03 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: MCFG 0x000000005AFEB000 00003C (v01 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SLIC 0x000000005AFEA000 000176 (v01 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: VFCT 0x000000005AFD9000 004284 (v01 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFD8000 0000F8 (v02 INSYDE EDK2 00001000 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFD2000 00547E (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: CRAT 0x000000005AFD1000 000F10 (v01 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: CDIT 0x000000005AFD0000 000029 (v01 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCF000 000F8D (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCE000 000F41 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFFD000 0008CD (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCB000 001E78 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCA000 00077A (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC9000 000737 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC7000 0015C8 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC4000 002AAB (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFBA000 0098F6 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: FPDT 0x000000005AFB9000 000044 (v01 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: BGRT 0x000000005AFB8000 000038 (v01 INSYDE EDK2 00000002 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: WSMT 0x000000005AFB7000 000028 (v01 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: TPM2 0x000000005AFE9000 000050 (v05 INSYDE EDK2 20505348 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB4000 002370 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: MHSP 0x000000005AFE8000 0000C8 (v04 INSYDE EDK2 20505348 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB3000 0000E5 (v02 INSYDE EDK2 00000004 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: IVRS 0x000000005AFB2000 000198 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB1000 000C44 (v01 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB0000 00074A (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAF000 000C3A (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAE000 00074A (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAD000 000C3A (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAC000 000A3A (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAB000 000057 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFA8000 001743 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCD000 000FF7 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF9E000 0098BD (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF99000 004FEB (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF98000 000D41 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF97000 000968 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF96000 00008D (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF95000 000FF5 (v02 INSYDE EDK2 00000001 ACPI 00040000) Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FACP table memory at [mem 0x5afee000-0x5afee10b] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving DSDT table memory at [mem 0x5afde000-0x5afe7add] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FACS table memory at [mem 0x5aeb1000-0x5aeb103f] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving UEFI table memory at [mem 0x5af67000-0x5af671ce] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff4000-0x5affc415] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff3000-0x5aff333d] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff1000-0x5aff1abc] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving ASF! table memory at [mem 0x5aff0000-0x5aff00a4] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving BOOT table memory at [mem 0x5afef000-0x5afef027] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving HPET table memory at [mem 0x5afed000-0x5afed037] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving APIC table memory at [mem 0x5afec000-0x5afec137] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving MCFG table memory at [mem 0x5afeb000-0x5afeb03b] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SLIC table memory at [mem 0x5afea000-0x5afea175] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving VFCT table memory at [mem 0x5afd9000-0x5afdd283] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afd8000-0x5afd80f7] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afd2000-0x5afd747d] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving CRAT table memory at [mem 0x5afd1000-0x5afd1f0f] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving CDIT table memory at [mem 0x5afd0000-0x5afd0028] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcf000-0x5afcff8c] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afce000-0x5afcef40] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5affd000-0x5affd8cc] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcb000-0x5afcce77] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afca000-0x5afca779] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc9000-0x5afc9736] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc7000-0x5afc85c7] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc4000-0x5afc6aaa] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afba000-0x5afc38f5] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FPDT table memory at [mem 0x5afb9000-0x5afb9043] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving BGRT table memory at [mem 0x5afb8000-0x5afb8037] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving WSMT table memory at [mem 0x5afb7000-0x5afb7027] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving TPM2 table memory at [mem 0x5afe9000-0x5afe904f] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb4000-0x5afb636f] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving MHSP table memory at [mem 0x5afe8000-0x5afe80c7] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb3000-0x5afb30e4] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving IVRS table memory at [mem 0x5afb2000-0x5afb2197] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb1000-0x5afb1c43] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb0000-0x5afb0749] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afaf000-0x5afafc39] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afae000-0x5afae749] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afad000-0x5afadc39] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afac000-0x5afaca39] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afab000-0x5afab056] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afa8000-0x5afa9742] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcd000-0x5afcdff6] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af9e000-0x5afa78bc] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af99000-0x5af9dfea] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af98000-0x5af98d40] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af97000-0x5af97967] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af96000-0x5af9608c] Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af95000-0x5af95ff4] Jul 08 16:12:23 dom0 kernel: APIC: Switched APIC routing to: Xen PV Jul 08 16:12:23 dom0 kernel: NUMA turned off Jul 08 16:12:23 dom0 kernel: Faking a node at [mem 0x0000000000000000-0x00000001aa640fff] Jul 08 16:12:23 dom0 kernel: NODE_DATA(0) allocated [mem 0x5777d2c0-0x577a7fff] Jul 08 16:12:23 dom0 kernel: Zone ranges: Jul 08 16:12:23 dom0 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 08 16:12:23 dom0 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 08 16:12:23 dom0 kernel: Normal [mem 0x0000000100000000-0x00000001aa640fff] Jul 08 16:12:23 dom0 kernel: Device empty Jul 08 16:12:23 dom0 kernel: Movable zone start for each node Jul 08 16:12:23 dom0 kernel: Early memory node ranges Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000000001000-0x000000000007ffff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000000100000-0x0000000009afffff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000009e00000-0x0000000009efffff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000009f3c000-0x0000000049b5ffff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000004bd60000-0x000000004bd68fff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000004bd6d000-0x000000004bd6efff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000004bd70000-0x0000000057f7efff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000005afff000-0x000000005affffff] Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000100000000-0x00000001aa640fff] Jul 08 16:12:23 dom0 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000001aa640fff] Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA: 128 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 768 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 60 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 8704 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 4 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 1 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 12416 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone Normal: 20480 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: On node 0, zone Normal: 22975 pages in unavailable ranges Jul 08 16:12:23 dom0 kernel: p2m virtual area at (____ptrval____), size is 40000000 Jul 08 16:12:23 dom0 kernel: Remapped 697921 page(s) Jul 08 16:12:23 dom0 kernel: Remapped 0 non-RAM page(s) Jul 08 16:12:23 dom0 kernel: ACPI: PM-Timer IO Port: 0x408 Jul 08 16:12:23 dom0 kernel: CPU topo: CPU limit of 8 reached. Ignoring further CPUs Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jul 08 16:12:23 dom0 kernel: IOAPIC[0]: apic_id 33, version 33, address 0xfec00000, GSI 0-23 Jul 08 16:12:23 dom0 kernel: IOAPIC[1]: apic_id 34, version 33, address 0xfec01000, GSI 24-55 Jul 08 16:12:23 dom0 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 08 16:12:23 dom0 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level) Jul 08 16:12:23 dom0 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 08 16:12:23 dom0 kernel: ACPI: HPET id: 0x10228210 base: 0xfed00000 Jul 08 16:12:23 dom0 kernel: CPU topo: Max. logical packages: 1 Jul 08 16:12:23 dom0 kernel: CPU topo: Max. logical dies: 1 Jul 08 16:12:23 dom0 kernel: CPU topo: Max. dies per package: 1 Jul 08 16:12:23 dom0 kernel: CPU topo: Max. threads per core: 1 Jul 08 16:12:23 dom0 kernel: CPU topo: Num. cores per package: 8 Jul 08 16:12:23 dom0 kernel: CPU topo: Num. threads per package: 8 Jul 08 16:12:23 dom0 kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Jul 08 16:12:23 dom0 kernel: CPU topo: Rejected CPUs 8 Jul 08 16:12:23 dom0 kernel: [mem 0x60000000-0xc01fffff] available for PCI devices Jul 08 16:12:23 dom0 kernel: Booting kernel on Xen Jul 08 16:12:23 dom0 kernel: Xen version: 4.17.5 (preserve-AD) Jul 08 16:12:23 dom0 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 08 16:12:23 dom0 kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Jul 08 16:12:23 dom0 kernel: percpu: Embedded 88 pages/cpu s237568 r8192 d114688 u524288 Jul 08 16:12:23 dom0 kernel: pcpu-alloc: s237568 r8192 d114688 u524288 alloc=1*2097152 Jul 08 16:12:23 dom0 kernel: pcpu-alloc: [0] 0 1 2 3 [0] 4 5 6 7 Jul 08 16:12:23 dom0 kernel: xen: PV spinlocks enabled Jul 08 16:12:23 dom0 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 08 16:12:23 dom0 kernel: Kernel command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d Jul 08 16:12:23 dom0 kernel: fips mode: disabled Jul 08 16:12:23 dom0 kernel: Unknown kernel command line parameters "placeholder x86_64 rhgb boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d", will be passed to user space. Jul 08 16:12:23 dom0 kernel: random: crng init done Jul 08 16:12:23 dom0 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 08 16:12:23 dom0 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 08 16:12:23 dom0 kernel: Fallback order for Node 0: 0 Jul 08 16:12:23 dom0 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1048575 Jul 08 16:12:23 dom0 kernel: Policy zone: Normal Jul 08 16:12:23 dom0 kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:on Jul 08 16:12:23 dom0 kernel: mem auto-init: clearing system memory may take some time... Jul 08 16:12:23 dom0 kernel: software IO TLB: area num 8. Jul 08 16:12:23 dom0 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Jul 08 16:12:23 dom0 kernel: ftrace: allocating 59429 entries in 233 pages Jul 08 16:12:23 dom0 kernel: ftrace: allocated 233 pages with 5 groups Jul 08 16:12:23 dom0 kernel: Dynamic Preempt: full Jul 08 16:12:23 dom0 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 08 16:12:23 dom0 kernel: rcu: RCU event tracing is enabled. Jul 08 16:12:23 dom0 kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Jul 08 16:12:23 dom0 kernel: Trampoline variant of Tasks RCU enabled. Jul 08 16:12:23 dom0 kernel: Rude variant of Tasks RCU enabled. Jul 08 16:12:23 dom0 kernel: Tracing variant of Tasks RCU enabled. Jul 08 16:12:23 dom0 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 08 16:12:23 dom0 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Jul 08 16:12:23 dom0 kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jul 08 16:12:23 dom0 kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jul 08 16:12:23 dom0 kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jul 08 16:12:23 dom0 kernel: NR_IRQS: 524544, nr_irqs: 1032, preallocated irqs: 16 Jul 08 16:12:23 dom0 kernel: xen:events: Using FIFO-based ABI Jul 08 16:12:23 dom0 kernel: xen: --> pirq=1 -> irq=1 (gsi=1) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=2 -> irq=2 (gsi=2) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=3 -> irq=3 (gsi=3) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=4 -> irq=4 (gsi=4) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=5 -> irq=5 (gsi=5) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=6 -> irq=6 (gsi=6) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=7 -> irq=7 (gsi=7) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=8 -> irq=8 (gsi=8) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=9 -> irq=9 (gsi=9) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=10 -> irq=10 (gsi=10) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=11 -> irq=11 (gsi=11) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=12 -> irq=12 (gsi=12) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=13 -> irq=13 (gsi=13) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=14 -> irq=14 (gsi=14) Jul 08 16:12:23 dom0 kernel: xen: --> pirq=15 -> irq=15 (gsi=15) Jul 08 16:12:23 dom0 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jul 08 16:12:23 dom0 kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Jul 08 16:12:23 dom0 kernel: Console: colour dummy device 80x25 Jul 08 16:12:23 dom0 kernel: printk: legacy console [tty0] enabled Jul 08 16:12:23 dom0 kernel: printk: legacy console [hvc0] enabled Jul 08 16:12:23 dom0 kernel: ACPI: Core revision 20240827 Jul 08 16:12:23 dom0 kernel: ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0xC3, should be 0x0C (20240827/utcksum-58) Jul 08 16:12:23 dom0 kernel: clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 08 16:12:23 dom0 kernel: Xen: using vcpuop timer interface Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 0 Jul 08 16:12:23 dom0 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6d58014d282, max_idle_ns: 881590509159 ns Jul 08 16:12:23 dom0 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7585.72 BogoMIPS (lpj=3792862) Jul 08 16:12:23 dom0 kernel: Last level iTLB entries: 4KB 512, 2MB 512, 4MB 256 Jul 08 16:12:23 dom0 kernel: Last level dTLB entries: 4KB 3072, 2MB 3072, 4MB 1536, 1GB 0 Jul 08 16:12:23 dom0 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 08 16:12:23 dom0 kernel: Spectre V2 : Mitigation: Retpolines Jul 08 16:12:23 dom0 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 08 16:12:23 dom0 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 08 16:12:23 dom0 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 08 16:12:23 dom0 kernel: Speculative Store Bypass: Vulnerable Jul 08 16:12:23 dom0 kernel: Speculative Return Stack Overflow: Mitigation: Safe RET Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Jul 08 16:12:23 dom0 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Jul 08 16:12:23 dom0 kernel: Freeing SMP alternatives memory: 52K Jul 08 16:12:23 dom0 kernel: pid_max: default: 32768 minimum: 301 Jul 08 16:12:23 dom0 kernel: LSM: initializing lsm=lockdown,capability,yama,ima,evm Jul 08 16:12:23 dom0 kernel: Yama: becoming mindful. Jul 08 16:12:23 dom0 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 08 16:12:23 dom0 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 08 16:12:23 dom0 kernel: cpu 0 spinlock event irq 57 Jul 08 16:12:23 dom0 kernel: VPMU disabled by hypervisor. Jul 08 16:12:23 dom0 kernel: Performance Events: PMU not available due to virtualization, using software events only. Jul 08 16:12:23 dom0 kernel: signal: max sigframe size: 3376 Jul 08 16:12:23 dom0 kernel: rcu: Hierarchical SRCU implementation. Jul 08 16:12:23 dom0 kernel: rcu: Max phase no-delay instances is 400. Jul 08 16:12:23 dom0 kernel: Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level Jul 08 16:12:23 dom0 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 08 16:12:23 dom0 kernel: smp: Bringing up secondary CPUs ... Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 1 Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 2 Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 3 Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 4 Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 5 Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 6 Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 7 Jul 08 16:12:23 dom0 kernel: cpu 1 spinlock event irq 97 Jul 08 16:12:23 dom0 kernel: cpu 2 spinlock event irq 98 Jul 08 16:12:23 dom0 kernel: cpu 3 spinlock event irq 99 Jul 08 16:12:23 dom0 kernel: cpu 4 spinlock event irq 100 Jul 08 16:12:23 dom0 kernel: cpu 5 spinlock event irq 101 Jul 08 16:12:23 dom0 kernel: cpu 6 spinlock event irq 102 Jul 08 16:12:23 dom0 kernel: cpu 7 spinlock event irq 103 Jul 08 16:12:23 dom0 kernel: smp: Brought up 1 node, 8 CPUs Jul 08 16:12:23 dom0 kernel: Memory: 3897752K/4194300K available (20480K kernel code, 4361K rwdata, 10052K rodata, 5588K init, 5944K bss, 283168K reserved, 0K cma-reserved) Jul 08 16:12:23 dom0 kernel: devtmpfs: initialized Jul 08 16:12:23 dom0 kernel: x86/mm: Memory block size: 128MB Jul 08 16:12:23 dom0 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x09f00000-0x09f3bfff] (245760 bytes) Jul 08 16:12:23 dom0 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x5a77f000-0x5af7efff] (8388608 bytes) Jul 08 16:12:23 dom0 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 08 16:12:23 dom0 kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Jul 08 16:12:23 dom0 kernel: pinctrl core: initialized pinctrl subsystem Jul 08 16:12:23 dom0 kernel: PM: RTC time: 21:12:22, date: 2025-07-08 Jul 08 16:12:23 dom0 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 08 16:12:23 dom0 kernel: xen:grant_table: Grant tables using version 1 layout Jul 08 16:12:23 dom0 kernel: Grant table initialized Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 08 16:12:23 dom0 kernel: audit: initializing netlink subsys (disabled) Jul 08 16:12:23 dom0 kernel: audit: type=2000 audit(1752009143.568:1): state=initialized audit_enabled=0 res=1 Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'fair_share' Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'bang_bang' Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 08 16:12:23 dom0 kernel: Simple Boot Flag at 0x44 set to 0x1 Jul 08 16:12:23 dom0 kernel: PCI: ECAM [mem 0xe0000000-0xefffffff] (base 0xe0000000) for domain 0000 [bus 00-ff] Jul 08 16:12:23 dom0 kernel: PCI: Using configuration type 1 for base access Jul 08 16:12:23 dom0 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 08 16:12:23 dom0 kernel: cryptd: max_cpu_qlen set to 1000 Jul 08 16:12:23 dom0 kernel: raid6: skipped pq benchmark and selected avx512x4 Jul 08 16:12:23 dom0 kernel: raid6: using avx512x2 recovery algorithm Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Module Device) Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Processor Device) Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 08 16:12:23 dom0 kernel: ACPI: 32 ACPI AML tables successfully acquired and loaded Jul 08 16:12:23 dom0 kernel: xen: registering gsi 9 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: ACPI: USB4 _OSC: OS supports USB3+ DisplayPort+ PCIe+ XDomain+ Jul 08 16:12:23 dom0 kernel: ACPI: USB4 _OSC: OS controls USB3+ DisplayPort+ PCIe+ XDomain+ Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC started Jul 08 16:12:23 dom0 kernel: ACPI: EC: interrupt blocked Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: Boot DSDT EC used to handle transactions Jul 08 16:12:23 dom0 kernel: ACPI: Interpreter enabled Jul 08 16:12:23 dom0 kernel: ACPI: PM: (supports S0 S5) Jul 08 16:12:23 dom0 kernel: ACPI: Using IOAPIC for interrupt routing Jul 08 16:12:23 dom0 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 08 16:12:23 dom0 kernel: PCI: Ignoring E820 reservations for host bridge windows Jul 08 16:12:23 dom0 kernel: ACPI: Enabled 3 GPEs in block 00 to 1F Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP1.P0NV: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP6.PWSR: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP8.P0NV: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP11.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP11.SWUS.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP12.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP12.SWUS.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.VGA_.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.ACP_.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.AZAL.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.HDAU.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.XHC0.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.XHC1.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC2.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.NHI0.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC3.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.NHI1.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC4.PWRS: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PRWL: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PRWB: New power resource Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number Jul 08 16:12:23 dom0 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME PCIeCapability LTR DPC] Jul 08 16:12:23 dom0 kernel: PCI host bridge to bus 0000:00 Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000cffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000effff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x60000000-0x90cfffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xf0000000-0xfec00000 window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfed45000-0xfed814ff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfed81900-0xfed81fff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfedc0000-0xfedc0fff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfedc6000-0xfedc6fff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x10c0200000-0x891fffffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:00.0: [1022:14e8] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:00.2: [1022:14e9] type 00 class 0x080600 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: [1022:14ed] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01] Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: bridge window [mem 0x90c00000-0x90cfffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: [1022:14ee] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x90b00000-0x90bfffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x8810900000-0x88109fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: [1022:14ee] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: bridge window [mem 0x90a00000-0x90afffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: [1022:14ef] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [io 0x6000-0x9fff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x78000000-0x8fffffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x7800000000-0x87ffffffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: [1022:14ef] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [io 0x2000-0x5fff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x60000000-0x77ffffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x6800000000-0x77ffffffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: [1022:14eb] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [io 0x1000-0x1fff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x90000000-0x905fffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x8800000000-0x88107fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: [1022:14eb] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x90900000-0x909fffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x8810800000-0x88108fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: [1022:14eb] type 01 class 0x060400 PCIe Root Port Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: bridge window [mem 0x90600000-0x908fffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:14.0: [1022:790b] type 00 class 0x0c0500 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:14.3: [1022:790e] type 00 class 0x060100 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.0: [1022:14f0] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.1: [1022:14f1] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.2: [1022:14f2] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.3: [1022:14f3] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.4: [1022:14f4] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.5: [1022:14f5] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.6: [1022:14f6] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.7: [1022:14f7] type 00 class 0x060000 conventional PCI endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:01:00.0: [15b7:5042] type 00 class 0x010802 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:01:00.0: BAR 0 [mem 0x90c00000-0x90c03fff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01] Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: [14c3:0616] type 00 class 0x028000 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: BAR 0 [mem 0x8810900000-0x88109fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: BAR 2 [mem 0x90b00000-0x90b07fff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02] Jul 08 16:12:23 dom0 kernel: pci 0000:03:00.0: [15b7:5017] type 00 class 0x010802 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:03:00.0: BAR 0 [mem 0x90a00000-0x90a03fff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: [1002:15bf] type 00 class 0x030000 PCIe Legacy Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 0 [mem 0x8800000000-0x880fffffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 2 [mem 0x90000000-0x901fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 4 [io 0x1000-0x10ff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 5 [mem 0x90500000-0x9057ffff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: PME# supported from D1 D2 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: [1002:1640] type 00 class 0x040300 PCIe Legacy Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: BAR 0 [mem 0x905c8000-0x905cbfff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: PME# supported from D1 D2 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: [1022:15c7] type 00 class 0x108000 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: BAR 2 [mem 0x90400000-0x904fffff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: BAR 5 [mem 0x905cc000-0x905cdfff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: [1022:15b9] type 00 class 0x0c0330 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: BAR 0 [mem 0x90200000-0x902fffff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: [1022:15ba] type 00 class 0x0c0330 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: BAR 0 [mem 0x90300000-0x903fffff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: [1022:15e2] type 00 class 0x048000 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: BAR 0 [mem 0x90580000-0x905bffff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: BAR 2 [mem 0x8810000000-0x88107fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: [1022:15e3] type 00 class 0x040300 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: BAR 0 [mem 0x905c0000-0x905c7fff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2] Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: [1022:14ec] type 00 class 0x130000 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: PME# supported from D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: [1022:1502] type 00 class 0x118000 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 0 [mem 0x90900000-0x9097ffff] Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 1 [mem 0x909c0000-0x909c1fff] Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 2 [mem 0x8810800000-0x881083ffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 4 [mem 0x90980000-0x909bffff] Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3] Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.0: [1022:14ec] type 00 class 0x130000 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.0: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: [1022:15c0] type 00 class 0x0c0330 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: BAR 0 [mem 0x90600000-0x906fffff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: [1022:15c1] type 00 class 0x0c0330 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: BAR 0 [mem 0x90700000-0x907fffff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: [1022:1668] type 00 class 0x0c0340 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: BAR 0 [mem 0x90800000-0x9087ffff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: Max Payload Size set to 128 (was 256, max 256) Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: [1022:1669] type 00 class 0x0c0340 PCIe Endpoint Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: BAR 0 [mem 0x90880000-0x908fffff 64bit] Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: Max Payload Size set to 128 (was 256, max 256) Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: enabling Extended Tags Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: PME# supported from D0 D3hot D3cold Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4] Jul 08 16:12:23 dom0 kernel: xen: registering gsi 8 triggering 1 polarity 0 Jul 08 16:12:23 dom0 kernel: xen: registering gsi 13 triggering 1 polarity 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKA disabled Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKB disabled Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKC disabled Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKD disabled Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKE disabled Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKF disabled Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKG disabled Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKH disabled Jul 08 16:12:23 dom0 kernel: xen: registering gsi 7 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: registering gsi 10 triggering 1 polarity 0 Jul 08 16:12:23 dom0 kernel: xen: registering gsi 6 triggering 1 polarity 0 Jul 08 16:12:23 dom0 kernel: xen: registering gsi 50 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=50 -> irq=50 (gsi=50) Jul 08 16:12:23 dom0 kernel: xen: registering gsi 51 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=51 -> irq=51 (gsi=51) Jul 08 16:12:23 dom0 kernel: xen: registering gsi 52 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=52 -> irq=52 (gsi=52) Jul 08 16:12:23 dom0 kernel: xen: registering gsi 53 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=53 -> irq=53 (gsi=53) Jul 08 16:12:23 dom0 kernel: Low-power S0 idle used by default for system suspend Jul 08 16:12:23 dom0 kernel: ACPI: EC: interrupt unblocked Jul 08 16:12:23 dom0 kernel: ACPI: EC: event unblocked Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 Jul 08 16:12:23 dom0 kernel: ACPI: EC: GPE=0xb Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: Boot DSDT EC initialization complete Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: EC: Used to handle transactions and events Jul 08 16:12:23 dom0 kernel: xen:balloon: Initialising balloon driver Jul 08 16:12:23 dom0 kernel: iommu: Default domain type: Translated Jul 08 16:12:23 dom0 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 08 16:12:23 dom0 kernel: SCSI subsystem initialized Jul 08 16:12:23 dom0 kernel: libata version 3.00 loaded. Jul 08 16:12:23 dom0 kernel: ACPI: bus type USB registered Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbfs Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver hub Jul 08 16:12:23 dom0 kernel: usbcore: registered new device driver usb Jul 08 16:12:23 dom0 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 08 16:12:23 dom0 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 08 16:12:23 dom0 kernel: PTP clock support registered Jul 08 16:12:23 dom0 kernel: EDAC MC: Ver: 3.0.0 Jul 08 16:12:23 dom0 kernel: efivars: Registered efivars operations Jul 08 16:12:23 dom0 kernel: NetLabel: Initializing Jul 08 16:12:23 dom0 kernel: NetLabel: domain hash size = 128 Jul 08 16:12:23 dom0 kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Jul 08 16:12:23 dom0 kernel: NetLabel: unlabeled traffic allowed by default Jul 08 16:12:23 dom0 kernel: mctp: management component transport protocol core Jul 08 16:12:23 dom0 kernel: NET: Registered PF_MCTP protocol family Jul 08 16:12:23 dom0 kernel: PCI: Using ACPI for IRQ routing Jul 08 16:12:23 dom0 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 08 16:12:23 dom0 kernel: resource: Expanded resource Reserved due to conflict with PCI Bus 0000:00 Jul 08 16:12:23 dom0 kernel: resource: Expanded resource Reserved due to conflict with PCI Bus 0000:00 Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x09b00000-0x0bffffff] Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x09f00000-0x0bffffff] Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x49b60000-0x4bffffff] Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x4bd69000-0x4bffffff] Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x4bd6f000-0x4bffffff] Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x57f7f000-0x57ffffff] Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x5b000000-0x5bffffff] Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x1aa641000-0x1abffffff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: setting as boot VGA device Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: bridge control possible Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none Jul 08 16:12:23 dom0 kernel: vgaarb: loaded Jul 08 16:12:23 dom0 kernel: clocksource: Switched to clocksource tsc-early Jul 08 16:12:23 dom0 kernel: VFS: Disk quotas dquot_6.6.0 Jul 08 16:12:23 dom0 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 08 16:12:23 dom0 kernel: hugetlbfs: disabling because there are no supported hugepage sizes Jul 08 16:12:23 dom0 kernel: pnp: PnP ACPI init Jul 08 16:12:23 dom0 kernel: system 00:00: [mem 0xfec00000-0xfec01fff] could not be reserved Jul 08 16:12:23 dom0 kernel: system 00:00: [mem 0xfee00000-0xfee00fff] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0400-0x04cf] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x04d0-0x04d1] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x04d6] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c00-0x0c01] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c14] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c50-0x0c52] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c6c] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c6f] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0cd0-0x0cdb] has been reserved Jul 08 16:12:23 dom0 kernel: system 00:03: [mem 0x000e0000-0x000fffff] could not be reserved Jul 08 16:12:23 dom0 kernel: system 00:03: [mem 0xfe000000-0xffffffff] could not be reserved Jul 08 16:12:23 dom0 kernel: pnp: PnP ACPI: found 4 devices Jul 08 16:12:23 dom0 kernel: PM-Timer failed consistency check (0xffffff) - aborting. Jul 08 16:12:23 dom0 kernel: NET: Registered PF_INET protocol family Jul 08 16:12:23 dom0 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 08 16:12:23 dom0 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 08 16:12:23 dom0 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 08 16:12:23 dom0 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 08 16:12:23 dom0 kernel: TCP bind hash table entries: 16384 (order: 7, 524288 bytes, linear) Jul 08 16:12:23 dom0 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 08 16:12:23 dom0 kernel: MPTCP token hash table entries: 2048 (order: 3, 49152 bytes, linear) Jul 08 16:12:23 dom0 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 08 16:12:23 dom0 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 08 16:12:23 dom0 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 08 16:12:23 dom0 kernel: NET: Registered PF_XDP protocol family Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01] Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: bridge window [mem 0x90c00000-0x90cfffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x90b00000-0x90bfffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x8810900000-0x88109fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03] Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: bridge window [mem 0x90a00000-0x90afffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [io 0x6000-0x9fff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x78000000-0x8fffffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x7800000000-0x87ffffffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [io 0x2000-0x5fff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x60000000-0x77ffffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x6800000000-0x77ffffffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [io 0x1000-0x1fff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x90000000-0x905fffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x8800000000-0x88107fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x90900000-0x909fffff] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x8810800000-0x88108fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4] Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: bridge window [mem 0x90600000-0x908fffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 7 [mem 0x000c0000-0x000cffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 8 [mem 0x000d0000-0x000effff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 9 [mem 0x60000000-0x90cfffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 10 [mem 0xf0000000-0xfec00000 window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 11 [mem 0xfed45000-0xfed814ff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 12 [mem 0xfed81900-0xfed81fff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 13 [mem 0xfedc0000-0xfedc0fff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 14 [mem 0xfedc6000-0xfedc6fff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 15 [mem 0x10c0200000-0x891fffffff window] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:01: resource 1 [mem 0x90c00000-0x90cfffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:02: resource 1 [mem 0x90b00000-0x90bfffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:02: resource 2 [mem 0x8810900000-0x88109fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:03: resource 1 [mem 0x90a00000-0x90afffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 0 [io 0x6000-0x9fff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 1 [mem 0x78000000-0x8fffffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 2 [mem 0x7800000000-0x87ffffffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 0 [io 0x2000-0x5fff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 1 [mem 0x60000000-0x77ffffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 2 [mem 0x6800000000-0x77ffffffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 0 [io 0x1000-0x1fff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 1 [mem 0x90000000-0x905fffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 2 [mem 0x8800000000-0x88107fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c3: resource 1 [mem 0x90900000-0x909fffff] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c3: resource 2 [mem 0x8810800000-0x88108fffff 64bit pref] Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c4: resource 1 [mem 0x90600000-0x908fffff] Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: D0 power state depends on 0000:c2:00.0 Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=40 -> irq=40 (gsi=40) Jul 08 16:12:23 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=37 -> irq=37 (gsi=37) Jul 08 16:12:23 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=38 -> irq=38 (gsi=38) Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: Already setup the GSI :40 Jul 08 16:12:23 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=46 -> irq=46 (gsi=46) Jul 08 16:12:23 dom0 kernel: xen: registering gsi 47 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=47 -> irq=47 (gsi=47) Jul 08 16:12:23 dom0 kernel: PCI: CLS 64 bytes, default 64 Jul 08 16:12:23 dom0 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 08 16:12:23 dom0 kernel: software IO TLB: mapped [mem 0x00000001a5d00000-0x00000001a9d00000] (64MB) Jul 08 16:12:23 dom0 kernel: Trying to unpack rootfs image as initramfs... Jul 08 16:12:23 dom0 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6d58014d282, max_idle_ns: 881590509159 ns Jul 08 16:12:23 dom0 kernel: clocksource: Switched to clocksource tsc Jul 08 16:12:23 dom0 kernel: Initialise system trusted keyrings Jul 08 16:12:23 dom0 kernel: Key type blacklist registered Jul 08 16:12:23 dom0 kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0 Jul 08 16:12:23 dom0 kernel: zbud: loaded Jul 08 16:12:23 dom0 kernel: integrity: Platform Keyring initialized Jul 08 16:12:23 dom0 kernel: integrity: Machine keyring initialized Jul 08 16:12:23 dom0 kernel: NET: Registered PF_ALG protocol family Jul 08 16:12:23 dom0 kernel: xor: automatically using best checksumming function avx Jul 08 16:12:23 dom0 kernel: Key type asymmetric registered Jul 08 16:12:23 dom0 kernel: Asymmetric key parser 'x509' registered Jul 08 16:12:23 dom0 kernel: Freeing initrd memory: 68828K Jul 08 16:12:23 dom0 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 245) Jul 08 16:12:23 dom0 kernel: io scheduler mq-deadline registered Jul 08 16:12:23 dom0 kernel: io scheduler kyber registered Jul 08 16:12:23 dom0 kernel: io scheduler bfq registered Jul 08 16:12:23 dom0 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:01.2: PME: Signaling with IRQ 114 Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 115 Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 116 Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:03.1: PME: Signaling with IRQ 117 Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:04.1: PME: Signaling with IRQ 118 Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.1: PME: Signaling with IRQ 119 Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: Already setup the GSI :40 Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.2: PME: Signaling with IRQ 120 Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.3: PME: Signaling with IRQ 121 Jul 08 16:12:23 dom0 kernel: ACPI: AC: AC Adapter [ACAD] (on-line) Jul 08 16:12:23 dom0 kernel: input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:4c/PNP0C09:00/PNP0C0D:00/input/input0 Jul 08 16:12:23 dom0 kernel: ACPI: button: Lid Switch [LID0] Jul 08 16:12:23 dom0 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Jul 08 16:12:23 dom0 kernel: ACPI: button: Power Button [PWRB] Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points! Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ00] (34 C) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points! Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:01: registered as thermal_zone1 Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ01] (35 C) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points! Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:02: registered as thermal_zone2 Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ02] (36 C) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000) Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points! Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:03: registered as thermal_zone3 Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ03] (76 C) Jul 08 16:12:23 dom0 kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Jul 08 16:12:23 dom0 kernel: ACPI: battery: Slot [BAT1] (battery present) Jul 08 16:12:23 dom0 kernel: hpet_acpi_add: no address or irqs in _CRS Jul 08 16:12:23 dom0 kernel: Non-volatile memory driver v1.3 Jul 08 16:12:23 dom0 kernel: Linux agpgart interface v0.103 Jul 08 16:12:23 dom0 kernel: ACPI: bus type drm_connector registered Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbserial_generic Jul 08 16:12:23 dom0 kernel: usbserial: USB Serial support registered for generic Jul 08 16:12:23 dom0 kernel: i8042: PNP: No PS/2 controller found. Jul 08 16:12:23 dom0 kernel: mousedev: PS/2 mouse device common for all mice Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: RTC can wake from S4 Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: registered as rtc0 Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: setting system clock to 2025-07-08T21:12:23 UTC (1752009143) Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: alarms up to one month, 114 bytes nvram Jul 08 16:12:23 dom0 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 08 16:12:23 dom0 kernel: device-mapper: uevent: version 1.0.3 Jul 08 16:12:23 dom0 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@lists.linux.dev Jul 08 16:12:23 dom0 kernel: amd_pstate: The CPPC feature is supported but currently disabled by the BIOS. Jul 08 16:12:23 dom0 kernel: amd_pstate: failed to enable driver mode(3) Jul 08 16:12:23 dom0 kernel: sysfb: VRAM smaller than advertised Jul 08 16:12:23 dom0 kernel: efifb: probing for efifb Jul 08 16:12:23 dom0 kernel: efifb: No BGRT, not showing boot graphics Jul 08 16:12:23 dom0 kernel: efifb: framebuffer at 0x8800000000, using 16000k, total 16000k Jul 08 16:12:23 dom0 kernel: efifb: mode is 2560x1600x32, linelength=10240, pages=1 Jul 08 16:12:23 dom0 kernel: efifb: scrolling: redraw Jul 08 16:12:23 dom0 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 08 16:12:23 dom0 kernel: fbcon: Deferring console take-over Jul 08 16:12:23 dom0 kernel: fb0: EFI VGA frame buffer device Jul 08 16:12:23 dom0 kernel: xen: registering gsi 36 triggering 0 polarity 1 Jul 08 16:12:23 dom0 kernel: xen: --> pirq=36 -> irq=36 (gsi=36) Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee: ring init command failed (0x00000005) Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee: failed to init ring buffer Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee initialization failed Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: psp initialization failed Jul 08 16:12:23 dom0 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbhid Jul 08 16:12:23 dom0 kernel: usbhid: USB HID core driver Jul 08 16:12:23 dom0 kernel: drop_monitor: Initializing network drop monitor service Jul 08 16:12:23 dom0 kernel: Initializing XFRM netlink socket Jul 08 16:12:23 dom0 kernel: NET: Registered PF_INET6 protocol family Jul 08 16:12:23 dom0 kernel: Segment Routing with IPv6 Jul 08 16:12:23 dom0 kernel: RPL Segment Routing with IPv6 Jul 08 16:12:23 dom0 kernel: In-situ OAM (IOAM) with IPv6 Jul 08 16:12:23 dom0 kernel: mip6: Mobile IPv6 Jul 08 16:12:23 dom0 kernel: NET: Registered PF_PACKET protocol family Jul 08 16:12:23 dom0 kernel: IPI shorthand broadcast: enabled Jul 08 16:12:23 dom0 kernel: AES CTR mode by8 optimization enabled Jul 08 16:12:23 dom0 kernel: sched_clock: Marking stable (1208001675, 35867577)->(1247018130, -3148878) Jul 08 16:12:23 dom0 kernel: registered taskstats version 1 Jul 08 16:12:23 dom0 kernel: Loading compiled-in X.509 certificates Jul 08 16:12:23 dom0 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 79131dced0910c4fab17a743e3691ded82cfbb73' Jul 08 16:12:23 dom0 kernel: Demotion targets for Node 0: null Jul 08 16:12:23 dom0 kernel: page_owner is disabled Jul 08 16:12:23 dom0 kernel: Key type .fscrypt registered Jul 08 16:12:23 dom0 kernel: Key type fscrypt-provisioning registered Jul 08 16:12:23 dom0 kernel: Btrfs loaded, zoned=yes, fsverity=yes Jul 08 16:12:23 dom0 kernel: Key type big_key registered Jul 08 16:12:23 dom0 kernel: Key type trusted registered Jul 08 16:12:23 dom0 kernel: Key type encrypted registered Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'frame.work-LaptopAMDDB: 02' Jul 08 16:12:23 dom0 kernel: Loading compiled-in module X.509 certificates Jul 08 16:12:23 dom0 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 79131dced0910c4fab17a743e3691ded82cfbb73' Jul 08 16:12:23 dom0 kernel: ima: Allocated hash algorithm: sha256 Jul 08 16:12:23 dom0 kernel: ima: No architecture policies found Jul 08 16:12:23 dom0 kernel: evm: Initialising EVM extended attributes: Jul 08 16:12:23 dom0 kernel: evm: security.selinux Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64 (disabled) Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64EXEC (disabled) Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64TRANSMUTE (disabled) Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64MMAP (disabled) Jul 08 16:12:23 dom0 kernel: evm: security.apparmor Jul 08 16:12:23 dom0 kernel: evm: security.ima Jul 08 16:12:23 dom0 kernel: evm: security.capability Jul 08 16:12:23 dom0 kernel: evm: HMAC attrs: 0x1 Jul 08 16:12:23 dom0 kernel: alg: No test for 842 (842-scomp) Jul 08 16:12:23 dom0 kernel: alg: No test for 842 (842-generic) Jul 08 16:12:23 dom0 kernel: PM: Magic number: 1:5:247 Jul 08 16:12:23 dom0 kernel: gpio gpiochip0: hash matches Jul 08 16:12:23 dom0 kernel: RAS: Correctable Errors collector initialized. Jul 08 16:12:23 dom0 kernel: clk: Disabling unused clocks Jul 08 16:12:23 dom0 kernel: PM: genpd: Disabling unused power domains Jul 08 16:12:23 dom0 kernel: Freeing unused decrypted memory: 2028K Jul 08 16:12:23 dom0 kernel: Freeing unused kernel image (initmem) memory: 5588K Jul 08 16:12:23 dom0 kernel: Write protecting the kernel read-only data: 30720k Jul 08 16:12:23 dom0 kernel: Freeing unused kernel image (rodata/data gap) memory: 188K Jul 08 16:12:23 dom0 kernel: Run /init as init process Jul 08 16:12:23 dom0 kernel: with arguments: Jul 08 16:12:23 dom0 kernel: /init Jul 08 16:12:23 dom0 kernel: placeholder Jul 08 16:12:23 dom0 kernel: x86_64 Jul 08 16:12:23 dom0 kernel: rhgb Jul 08 16:12:23 dom0 kernel: with environment: Jul 08 16:12:23 dom0 kernel: HOME=/ Jul 08 16:12:23 dom0 kernel: TERM=linux Jul 08 16:12:23 dom0 kernel: boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d Jul 08 16:12:23 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 08 16:12:23 dom0 systemd[1]: Detected virtualization vm-other. Jul 08 16:12:23 dom0 systemd[1]: Detected architecture x86-64. Jul 08 16:12:23 dom0 systemd[1]: Running in initial RAM disk. Jul 08 16:12:23 dom0 systemd[1]: Hostname set to . Jul 08 16:12:23 dom0 systemd[1]: Failed to open libbpf, cgroup BPF features disabled: Operation not supported Jul 08 16:12:23 dom0 systemd[1]: Queued start job for default target initrd.target. Jul 08 16:12:23 dom0 systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Slice /system/systemd-cryptsetup. Jul 08 16:12:23 dom0 systemd[1]: Reached target initrd-usr-fs.target - Initrd /usr File System. Jul 08 16:12:23 dom0 systemd[1]: Reached target local-fs.target - Local File Systems. Jul 08 16:12:23 dom0 systemd[1]: Reached target slices.target - Slice Units. Jul 08 16:12:23 dom0 systemd[1]: Reached target swap.target - Swaps. Jul 08 16:12:23 dom0 systemd[1]: Reached target timers.target - Timer Units. Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jul 08 16:12:23 dom0 systemd[1]: Reached target sockets.target - Socket Units. Jul 08 16:12:23 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jul 08 16:12:23 dom0 systemd[1]: memstrack.service - Memstrack Anylazing Service was skipped because all trigger condition checks failed. Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-journald.service - Journal Service... Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console... Jul 08 16:12:23 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.798:2): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 kernel: alua: device handler registered Jul 08 16:12:23 dom0 kernel: emc: device handler registered Jul 08 16:12:23 dom0 kernel: rdac: device handler registered Jul 08 16:12:23 dom0 kernel: xen:xen_evtchn: Event-channel device installed Jul 08 16:12:23 dom0 kernel: xen_pciback: backend is vpci Jul 08 16:12:23 dom0 kernel: xen_acpi_processor: Uploading Xen processor PM info Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.810:3): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 systemd-journald[341]: Journal started Jul 08 16:12:23 dom0 systemd-journald[341]: Runtime Journal (/run/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 8.0M, max 77.8M, 69.8M free. Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Module 'msr' is built in Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'dm_multipath' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'uinput' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_alua' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_emc' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_rdac' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_evtchn' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_gntdev' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_gntalloc' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_blkback' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_pciback' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_privcmd' Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_acpi_processor' Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jul 08 16:12:23 dom0 systemd[1]: Started systemd-journald.service - Journal Service. Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.858:4): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console. Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.858:5): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 systemd[1]: dracut-cmdline-ask.service - dracut ask for additional cmdline parameters was skipped because all trigger condition checks failed. Jul 08 16:12:23 dom0 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.864:6): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.868:7): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:23 dom0 dracut-cmdline[360]: dracut-4.2 (R4.2) dracut-059-5.fc37 Jul 08 16:12:23 dom0 dracut-cmdline[360]: Using kernel command line parameters: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d Jul 08 16:12:23 dom0 kernel: pciback 0000:02:00.0: xen_pciback: seizing device Jul 08 16:12:24 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:24 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:24 dom0 kernel: pcieport 0000:00:02.2: unlocked secondary bus reset via: __pci_reset_function_locked+0x49/0x90 Jul 08 16:12:24 dom0 dracut-cmdline[360]: Restricting USB in dom0 via usbguard. Jul 08 16:12:24 dom0 systemd[1]: Reloading. Jul 08 16:12:24 dom0 audit: BPF prog-id=6 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=3 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=7 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=8 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=4 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=5 op=UNLOAD Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.203:8): prog-id=6 op=LOAD Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.203:9): prog-id=3 op=UNLOAD Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.204:10): prog-id=7 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=9 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=10 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=11 op=LOAD Jul 08 16:12:24 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon... Jul 08 16:12:24 dom0 usbguard-daemon[456]: [1752009144.238] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF! Jul 08 16:12:24 dom0 systemd[1]: Started usbguard.service - USBGuard daemon. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 systemd-escape[495]: Input 'luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d' is not an absolute file system path, escaping is likely not going to be reversible. Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit: BPF prog-id=12 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=13 op=LOAD Jul 08 16:12:24 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jul 08 16:12:24 dom0 systemd-udevd[553]: Using default interface naming scheme 'v251'. Jul 08 16:12:24 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Jul 08 16:12:24 dom0 kernel: tpm tpm0: auth session is active Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jul 08 16:12:24 dom0 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Jul 08 16:12:24 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jul 08 16:12:24 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Jul 08 16:12:24 dom0 systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Jul 08 16:12:24 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 08 16:12:24 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Jul 08 16:12:24 dom0 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Jul 08 16:12:24 dom0 systemd[1]: Received SIGRTMIN+20 from PID 670 (plymouthd). Jul 08 16:12:24 dom0 systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Jul 08 16:12:24 dom0 systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Jul 08 16:12:24 dom0 systemd[1]: Reached target paths.target - Path Units. Jul 08 16:12:24 dom0 systemd[1]: Reloading. Jul 08 16:12:24 dom0 kernel: sp5100_tco: SP5100/SB800 TCO WatchDog Timer Driver Jul 08 16:12:24 dom0 kernel: sp5100-tco sp5100-tco: Using 0xfeb00000 for watchdog MMIO address Jul 08 16:12:24 dom0 kernel: sp5100-tco sp5100-tco: initialized. heartbeat=60 sec (nowayout=0) Jul 08 16:12:24 dom0 kernel: input: PIXA3854:00 093A:0274 Mouse as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input2 Jul 08 16:12:24 dom0 kernel: input: PIXA3854:00 093A:0274 Touchpad as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input3 Jul 08 16:12:24 dom0 kernel: hid-generic 0018:093A:0274.0001: input,hidraw0: I2C HID v1.00 Mouse [PIXA3854:00 093A:0274] on i2c-PIXA3854:00 Jul 08 16:12:24 dom0 audit: BPF prog-id=14 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=6 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=15 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=16 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=7 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=8 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=17 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=18 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=12 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=13 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=19 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=9 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=20 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=21 op=LOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=10 op=UNLOAD Jul 08 16:12:24 dom0 audit: BPF prog-id=11 op=UNLOAD Jul 08 16:12:24 dom0 kernel: hid-generic 0018:32AC:001B.0002: hidraw1: I2C HID v1.00 Device [FRMW0003:00 32AC:001B] on i2c-FRMW0003:00 Jul 08 16:12:24 dom0 kernel: nvme 0000:01:00.0: platform quirk: setting simple suspend Jul 08 16:12:25 dom0 kernel: nvme 0000:03:00.0: platform quirk: setting simple suspend Jul 08 16:12:25 dom0 kernel: nvme nvme0: pci function 0000:01:00.0 Jul 08 16:12:25 dom0 kernel: xen: registering gsi 28 triggering 0 polarity 1 Jul 08 16:12:25 dom0 kernel: ACPI: video: Video Device [VGA] (multi-head: yes rom: no post: no) Jul 08 16:12:25 dom0 kernel: nvme nvme1: pci function 0000:03:00.0 Jul 08 16:12:25 dom0 kernel: xen: registering gsi 42 triggering 0 polarity 1 Jul 08 16:12:25 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:25 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:17/LNXVIDEO:00/input/input4 Jul 08 16:12:25 dom0 kernel: xen: --> pirq=28 -> irq=28 (gsi=28) Jul 08 16:12:25 dom0 kernel: xen: --> pirq=42 -> irq=42 (gsi=42) Jul 08 16:12:25 dom0 kernel: hid-sensor-hub 0018:32AC:001B.0002: hidraw1: I2C HID v1.00 Device [FRMW0003:00 32AC:001B] on i2c-FRMW0003:00 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: new USB bus registered, assigned bus number 1 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: hcc params 0x0128ffc5 hci version 0x120 quirks 0x0000000200000010 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: new USB bus registered, assigned bus number 2 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: Host supports USB 3.1 Enhanced SuperSpeed Jul 08 16:12:25 dom0 kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb1: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb1: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb1: SerialNumber: 0000:c2:00.3 Jul 08 16:12:25 dom0 kernel: hub 1-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 1-0:1.0: 5 ports detected Jul 08 16:12:25 dom0 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Jul 08 16:12:25 dom0 kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb2: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb2: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb2: SerialNumber: 0000:c2:00.3 Jul 08 16:12:25 dom0 kernel: hub 2-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 2-0:1.0: 2 ports detected Jul 08 16:12:25 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:25 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: new USB bus registered, assigned bus number 3 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: new USB bus registered, assigned bus number 4 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: Host supports USB 3.1 Enhanced SuperSpeed Jul 08 16:12:25 dom0 kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb3: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb3: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb3: SerialNumber: 0000:c2:00.4 Jul 08 16:12:25 dom0 kernel: hub 3-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 3-0:1.0: 1 port detected Jul 08 16:12:25 dom0 kernel: usb usb4: We don't know the algorithms for LPM for this host, disabling LPM. Jul 08 16:12:25 dom0 kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb4: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb4: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb4: SerialNumber: 0000:c2:00.4 Jul 08 16:12:25 dom0 kernel: hub 4-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 4-0:1.0: 1 port detected Jul 08 16:12:25 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:25 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: new USB bus registered, assigned bus number 5 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: new USB bus registered, assigned bus number 6 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: Host supports USB 3.1 Enhanced SuperSpeed Jul 08 16:12:25 dom0 kernel: usb usb5: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb5: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb5: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb5: SerialNumber: 0000:c4:00.3 Jul 08 16:12:25 dom0 kernel: hub 5-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 5-0:1.0: 1 port detected Jul 08 16:12:25 dom0 kernel: usb usb6: We don't know the algorithms for LPM for this host, disabling LPM. Jul 08 16:12:25 dom0 kernel: usb usb6: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb6: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb6: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb6: SerialNumber: 0000:c4:00.3 Jul 08 16:12:25 dom0 kernel: hub 6-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 6-0:1.0: 1 port detected Jul 08 16:12:25 dom0 kernel: xen: registering gsi 47 triggering 0 polarity 1 Jul 08 16:12:25 dom0 kernel: Already setup the GSI :47 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: new USB bus registered, assigned bus number 7 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: new USB bus registered, assigned bus number 8 Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: Host supports USB 3.1 Enhanced SuperSpeed Jul 08 16:12:25 dom0 kernel: usb usb7: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb7: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb7: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb7: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb7: SerialNumber: 0000:c4:00.4 Jul 08 16:12:25 dom0 kernel: hub 7-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 7-0:1.0: 1 port detected Jul 08 16:12:25 dom0 kernel: usb usb8: We don't know the algorithms for LPM for this host, disabling LPM. Jul 08 16:12:25 dom0 kernel: usb usb8: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12 Jul 08 16:12:25 dom0 kernel: usb usb8: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jul 08 16:12:25 dom0 kernel: usb usb8: Product: xHCI Host Controller Jul 08 16:12:25 dom0 kernel: usb usb8: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd Jul 08 16:12:25 dom0 kernel: usb usb8: SerialNumber: 0000:c4:00.4 Jul 08 16:12:25 dom0 kernel: hub 8-0:1.0: USB hub found Jul 08 16:12:25 dom0 kernel: hub 8-0:1.0: 1 port detected Jul 08 16:12:25 dom0 kernel: nvme nvme0: allocated 32 MiB host memory buffer. Jul 08 16:12:25 dom0 kernel: nvme nvme1: allocated 32 MiB host memory buffer. Jul 08 16:12:25 dom0 kernel: nvme nvme0: 8/0/0 default/read/poll queues Jul 08 16:12:25 dom0 kernel: input: PIXA3854:00 093A:0274 Mouse as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input5 Jul 08 16:12:25 dom0 kernel: input: PIXA3854:00 093A:0274 Touchpad as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input6 Jul 08 16:12:25 dom0 kernel: hid-multitouch 0018:093A:0274.0001: input,hidraw0: I2C HID v1.00 Mouse [PIXA3854:00 093A:0274] on i2c-PIXA3854:00 Jul 08 16:12:25 dom0 kernel: nvme nvme1: 8/0/0 default/read/poll queues Jul 08 16:12:25 dom0 kernel: nvme0n1: p1 p2 p3 Jul 08 16:12:25 dom0 kernel: nvme1n1: p1 p2 p3 Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:25 dom0 kernel: block device autoloading is deprecated and will be removed. Jul 08 16:12:25 dom0 kernel: block device autoloading is deprecated and will be removed. Jul 08 16:12:25 dom0 kernel: usb 1-2: new high-speed USB device number 2 using xhci_hcd Jul 08 16:12:25 dom0 kernel: usb 3-1: new high-speed USB device number 2 using xhci_hcd Jul 08 16:12:25 dom0 kernel: usb 1-2: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=34.04 Jul 08 16:12:25 dom0 kernel: usb 1-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Jul 08 16:12:25 dom0 kernel: usb 1-2: Product: USB2.1 Hub Jul 08 16:12:25 dom0 kernel: usb 1-2: Manufacturer: GenesysLogic Jul 08 16:12:25 dom0 kernel: usb 1-2: Device is not authorized for usage Jul 08 16:12:25 dom0 kernel: usb 3-1: New USB device found, idVendor=0bda, idProduct=5634, bcdDevice= 0.21 Jul 08 16:12:25 dom0 kernel: usb 3-1: New USB device strings: Mfr=3, Product=1, SerialNumber=2 Jul 08 16:12:25 dom0 kernel: usb 3-1: Product: Laptop Camera Jul 08 16:12:25 dom0 kernel: usb 3-1: Manufacturer: Generic Jul 08 16:12:25 dom0 kernel: usb 3-1: SerialNumber: 200901010001 Jul 08 16:12:25 dom0 kernel: usb 3-1: Device is not authorized for usage Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: unknown error 0 Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5) Jul 08 16:12:25 dom0 kernel: usb 2-2: new SuperSpeed Plus Gen 2x1 USB device number 2 using xhci_hcd Jul 08 16:12:25 dom0 kernel: usb 2-2: New USB device found, idVendor=05e3, idProduct=0625, bcdDevice=34.04 Jul 08 16:12:25 dom0 kernel: usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Jul 08 16:12:25 dom0 kernel: usb 2-2: Product: USB3.2 Hub Jul 08 16:12:25 dom0 kernel: usb 2-2: Manufacturer: GenesysLogic Jul 08 16:12:25 dom0 kernel: usb 2-2: Device is not authorized for usage Jul 08 16:12:25 dom0 kernel: usb 1-3: new high-speed USB device number 3 using xhci_hcd Jul 08 16:12:25 dom0 kernel: usb 1-3: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=61.60 Jul 08 16:12:25 dom0 kernel: usb 1-3: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Jul 08 16:12:25 dom0 kernel: usb 1-3: Product: USB2.0 Hub Jul 08 16:12:25 dom0 kernel: usb 1-3: Device is not authorized for usage Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: unknown error 0 Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5) Jul 08 16:12:25 dom0 kernel: usb 1-4: new high-speed USB device number 4 using xhci_hcd Jul 08 16:12:25 dom0 kernel: usb 1-4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=61.60 Jul 08 16:12:25 dom0 kernel: usb 1-4: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Jul 08 16:12:25 dom0 kernel: usb 1-4: Product: USB2.0 Hub Jul 08 16:12:25 dom0 kernel: usb 1-4: Device is not authorized for usage Jul 08 16:12:26 dom0 kernel: usb 1-5: new high-speed USB device number 5 using xhci_hcd Jul 08 16:12:26 dom0 kernel: usb 1-5: New USB device found, idVendor=0e8d, idProduct=e616, bcdDevice= 1.00 Jul 08 16:12:26 dom0 kernel: usb 1-5: New USB device strings: Mfr=5, Product=6, SerialNumber=7 Jul 08 16:12:26 dom0 kernel: usb 1-5: Product: Wireless_Device Jul 08 16:12:26 dom0 kernel: usb 1-5: Manufacturer: MediaTek Inc. Jul 08 16:12:26 dom0 kernel: usb 1-5: SerialNumber: 000000000 Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 kernel: usb 1-5: Device is not authorized for usage Jul 08 16:12:26 dom0 kernel: hub 1-2:1.0: USB hub found Jul 08 16:12:26 dom0 kernel: hub 1-2:1.0: 4 ports detected Jul 08 16:12:26 dom0 kernel: usb 1-2: authorized to connect Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" target="block" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=626C6F636B20696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 kernel: hub 2-2:1.0: USB hub found Jul 08 16:12:26 dom0 kernel: hub 2-2:1.0: 3 ports detected Jul 08 16:12:26 dom0 kernel: usb 2-2: authorized to connect Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" target="allow" device_rule=626C6F636B20696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 kernel: hub 1-3:1.0: USB hub found Jul 08 16:12:26 dom0 kernel: hub 1-3:1.0: 3 ports detected Jul 08 16:12:26 dom0 kernel: md/raid1:md127: active with 2 out of 2 mirrors Jul 08 16:12:26 dom0 kernel: md/raid1:md126: active with 2 out of 2 mirrors Jul 08 16:12:26 dom0 kernel: md126: detected capacity change from 0 to 4188160 Jul 08 16:12:26 dom0 kernel: md127: detected capacity change from 0 to 970215424 Jul 08 16:12:26 dom0 kernel: [drm] amdgpu kernel modesetting enabled. Jul 08 16:12:26 dom0 kernel: amdgpu: Virtual CRAT table created for CPU Jul 08 16:12:26 dom0 kernel: amdgpu: Topology: Add CPU node Jul 08 16:12:26 dom0 kernel: ucsi_acpi USBC000:00: unknown error 256 Jul 08 16:12:26 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5) Jul 08 16:12:26 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:26 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:26 dom0 kernel: [drm] initializing kernel modesetting (IP DISCOVERY 0x1002:0x15BF 0xF111:0x0005 0xC2). Jul 08 16:12:26 dom0 kernel: [drm] register mmio base: 0x90500000 Jul 08 16:12:26 dom0 kernel: [drm] register mmio size: 524288 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 0 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 1 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 2 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 3 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 4 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 5 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 6 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 7 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 8 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 9 Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 10 Jul 08 16:12:26 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Fetched VBIOS from VFCT Jul 08 16:12:27 dom0 kernel: amdgpu: ATOM BIOS: 113-PHXGENERIC-001 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: vgaarb: deactivate vga console Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Trusted Memory Zone (TMZ) feature enabled Jul 08 16:12:27 dom0 kernel: [drm] vm size is 262144 GB, 4 levels, block size is 9-bit, fragment size is 9-bit Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: VRAM: 2048M 0x0000008000000000 - 0x000000807FFFFFFF (2048M used) Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: GART: 512M 0x00007FFF00000000 - 0x00007FFF1FFFFFFF Jul 08 16:12:27 dom0 kernel: [drm] Detected VRAM RAM=2048M, BAR=2048M Jul 08 16:12:27 dom0 kernel: [drm] RAM width 128bits DDR5 Jul 08 16:12:27 dom0 kernel: usb 1-3: authorized to connect Jul 08 16:12:27 dom0 kernel: hub 1-4:1.0: USB hub found Jul 08 16:12:27 dom0 kernel: hub 1-4:1.0: 4 ports detected Jul 08 16:12:27 dom0 kernel: usb 1-4: authorized to connect Jul 08 16:12:27 dom0 kernel: [drm] amdgpu: 2048M of VRAM memory ready Jul 08 16:12:27 dom0 kernel: [drm] amdgpu: 1947M of GTT memory ready. Jul 08 16:12:27 dom0 kernel: [drm] GART: num cpu pages 131072, num gpu pages 131072 Jul 08 16:12:27 dom0 kernel: [drm] PCIE GART of 512M enabled (table at 0x000000807FD00000). Jul 08 16:12:27 dom0 kernel: [drm] Loading DMUB firmware via PSP: version=0x08004E00 Jul 08 16:12:27 dom0 kernel: [drm] Found VCN firmware Version ENC: 1.23 DEC: 9 VEP: 0 Revision: 16 Jul 08 16:12:27 dom0 kernel: usb 1-2.3: new full-speed USB device number 6 using xhci_hcd Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: reserve 0x4000000 from 0x8078000000 for PSP TMR Jul 08 16:12:27 dom0 kernel: usb 1-2.3: New USB device found, idVendor=1050, idProduct=0404, bcdDevice= 4.37 Jul 08 16:12:27 dom0 kernel: usb 1-2.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Product: Yubikey 4 CCID Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Manufacturer: Yubico Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Device is not authorized for usage Jul 08 16:12:27 dom0 kernel: usb 2-2.2: new SuperSpeed USB device number 3 using xhci_hcd Jul 08 16:12:27 dom0 kernel: usb 2-2.2: New USB device found, idVendor=0bda, idProduct=8156, bcdDevice=31.04 Jul 08 16:12:27 dom0 kernel: usb 2-2.2: New USB device strings: Mfr=1, Product=2, SerialNumber=6 Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Product: USB 10/100/1G/2.5G LAN Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Manufacturer: Realtek Jul 08 16:12:27 dom0 kernel: usb 2-2.2: SerialNumber: 4013000001 Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Device is not authorized for usage Jul 08 16:12:27 dom0 kernel: usb 1-4.1: new full-speed USB device number 7 using xhci_hcd Jul 08 16:12:27 dom0 kernel: usb 1-4.1: New USB device found, idVendor=27c6, idProduct=609c, bcdDevice= 1.00 Jul 08 16:12:27 dom0 kernel: usb 1-4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Product: Goodix USB2.0 MISC Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Manufacturer: Goodix Technology Co., Ltd. Jul 08 16:12:27 dom0 kernel: usb 1-4.1: SerialNumber: UIDD9EB3F17_XXXX_MOC_B0 Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Device is not authorized for usage Jul 08 16:12:27 dom0 kernel: usb 1-4.3: new full-speed USB device number 8 using xhci_hcd Jul 08 16:12:27 dom0 kernel: usb 1-4.3: unable to get BOS descriptor set Jul 08 16:12:27 dom0 kernel: usb 1-4.3: New USB device found, idVendor=32ac, idProduct=0012, bcdDevice= 0.29 Jul 08 16:12:27 dom0 kernel: usb 1-4.3: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Product: Laptop 16 Keyboard Module - ANSI Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Manufacturer: Framework Jul 08 16:12:27 dom0 kernel: usb 1-4.3: SerialNumber: FRAKDKEN0100000000 Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Device is not authorized for usage Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: RAS: optional ras ta ucode is not available Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: RAP: optional rap ta ucode is not available Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SECUREDISPLAY: securedisplay ta ucode is not available Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SMU is initialized successfully! Jul 08 16:12:27 dom0 kernel: [drm] Seamless boot condition check passed Jul 08 16:12:27 dom0 kernel: [drm] Display Core v3.2.301 initialized on DCN 3.1.4 Jul 08 16:12:27 dom0 kernel: [drm] DP-HDMI FRL PCON supported Jul 08 16:12:27 dom0 kernel: [drm] DMUB hardware initialized: version=0x08004E00 Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: Allocated 3969056 bytes on gart Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: Total number of KFD nodes to be created: 1 Jul 08 16:12:27 dom0 kernel: amdgpu: Virtual CRAT table created for GPU Jul 08 16:12:27 dom0 kernel: amdgpu: Topology: Add dGPU node [0x15bf:0x1002] Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: added device 1002:15bf Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SE 1, SH per SE 2, CU per SH 6, active_cu_number 12 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring gfx_0.0.0 uses VM inv eng 0 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.0.0 uses VM inv eng 1 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.1.0 uses VM inv eng 4 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.2.0 uses VM inv eng 6 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.3.0 uses VM inv eng 7 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.0.1 uses VM inv eng 8 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.1.1 uses VM inv eng 9 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.2.1 uses VM inv eng 10 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.3.1 uses VM inv eng 11 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring sdma0 uses VM inv eng 12 on hub 0 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring vcn_unified_0 uses VM inv eng 0 on hub 8 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring jpeg_dec uses VM inv eng 1 on hub 8 Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring mes_kiq_3.1.0 uses VM inv eng 13 on hub 0 Jul 08 16:12:27 dom0 kernel: [drm] ring gfx_32768.1.1 was added Jul 08 16:12:27 dom0 kernel: [drm] ring compute_32768.2.2 was added Jul 08 16:12:27 dom0 kernel: [drm] ring sdma_32768.3.3 was added Jul 08 16:12:27 dom0 kernel: [drm] ring gfx_32768.1.1 ib test pass Jul 08 16:12:27 dom0 kernel: [drm] ring compute_32768.2.2 ib test pass Jul 08 16:12:27 dom0 kernel: [drm] ring sdma_32768.3.3 ib test pass Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Runtime PM not available Jul 08 16:12:27 dom0 kernel: [drm] Initialized amdgpu 3.61.0 for 0000:c2:00.0 on minor 0 Jul 08 16:12:27 dom0 kernel: fbcon: amdgpudrmfb (fb0) is primary device Jul 08 16:12:27 dom0 kernel: fbcon: Deferring console take-over Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: [drm] fb0: amdgpudrmfb frame buffer device Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.0/0003:32AC:0012.0003/input/input7 Jul 08 16:12:27 dom0 kernel: [drm] pre_validate_dsc:1596 MST_DSC dsc precompute is not needed Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0003: input,hidraw2: USB HID v1.11 Keyboard [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input0 Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0004: hiddev96,hidraw3: USB HID v1.11 Device [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input1 Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI System Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input8 Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Consumer Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input9 Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Wireless Radio Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input10 Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Keyboard as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input11 Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0005: input,hidraw4: USB HID v1.11 Keyboard [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input2 Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0006: hiddev97,hidraw5: USB HID v1.11 Device [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input3 Jul 08 16:12:27 dom0 kernel: usb 1-4.3: authorized to connect Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" target="block" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" target="block" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" target="block" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" target="block" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=626C6F636B20696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" target="allow" device_rule=626C6F636B20696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2 action=change Jul 08 16:12:26 dom0 systemd[1]: Found device dev-disk-by\x2duuid-c4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.device - /dev/disk/by-uuid/c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d. Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2 action=change Jul 08 16:12:26 dom0 systemd[1]: Starting systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.service - Cryptography Setup for luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d... Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3 action=change Jul 08 16:12:26 dom0 systemd[1]: Started systemd-ask-password-plymouth.service - Forward Password Requests to Plymouth. Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4 action=change Jul 08 16:12:27 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3 action=change Jul 08 16:12:37 dom0 systemd-cryptsetup[851]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d. Jul 08 16:12:39 dom0 audit[851]: DM_CTRL module=crypt op=ctr ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1 Jul 08 16:12:39 dom0 audit[851]: SYSCALL arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=58905e78e410 a3=0 items=8 ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null) Jul 08 16:12:39 dom0 audit: CWD cwd="/" Jul 08 16:12:39 dom0 audit: PATH item=0 name=(null) inode=1025 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PATH item=1 name=(null) inode=11462 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PATH item=2 name=(null) inode=27 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PATH item=3 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PATH item=4 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PATH item=5 name=(null) inode=11464 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PATH item=6 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PATH item=7 name=(null) inode=11465 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D6372797074736574757000617474616368006C756B732D63343135376165302D633163392D346432652D386565392D396165636332643939363664002F6465762F6469736B2F62792D757569642F63343135376165302D633163392D346432652D386565392D39 Jul 08 16:12:39 dom0 kernel: kauditd_printk_skb: 70 callbacks suppressed Jul 08 16:12:39 dom0 kernel: audit: type=1338 audit(1752009159.125:81): module=crypt op=ctr ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1 Jul 08 16:12:39 dom0 kernel: audit: type=1300 audit(1752009159.125:81): arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=58905e78e410 a3=0 items=8 ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null) Jul 08 16:12:39 dom0 kernel: audit: type=1307 audit(1752009159.125:81): cwd="/" Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=0 name=(null) inode=1025 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=1 name=(null) inode=11462 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=2 name=(null) inode=27 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=3 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=4 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=5 name=(null) inode=11464 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=6 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 08 16:12:39 dom0 systemd[1]: Finished systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.service - Cryptography Setup for luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d. Jul 08 16:12:39 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:39 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jul 08 16:12:39 dom0 systemd[1]: Reached target sysinit.target - System Initialization. Jul 08 16:12:39 dom0 systemd[1]: Reached target basic.target - Basic System. Jul 08 16:12:39 dom0 dracut-initqueue[1137]: Scanning devices dm-0 for LVM logical volumes qubes_dom0/root Jul 08 16:12:39 dom0 dracut-initqueue[1137]: qubes_dom0/swap Jul 08 16:12:39 dom0 dracut-initqueue[1158]: WARNING: File locking is disabled. Jul 08 16:12:39 dom0 dracut-initqueue[1137]: qubes_dom0/root thin Jul 08 16:12:39 dom0 dracut-initqueue[1137]: qubes_dom0/swap linear Jul 08 16:12:41 dom0 systemd[1]: Found device dev-mapper-qubes_dom0\x2droot.device - /dev/mapper/qubes_dom0-root. Jul 08 16:12:41 dom0 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Jul 08 16:12:41 dom0 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jul 08 16:12:41 dom0 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Jul 08 16:12:41 dom0 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:41 dom0 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root... Jul 08 16:12:41 dom0 systemd-fsck[1215]: root: clean, 312337/23691264 files, 5822568/94737408 blocks Jul 08 16:12:41 dom0 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root. Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:41 dom0 systemd[1]: Mounting sysroot.mount - /sysroot... Jul 08 16:12:41 dom0 kernel: EXT4-fs (dm-4): mounted filesystem 0ac75727-2814-43da-9fd8-825bf56de02d ro with ordered data mode. Quota mode: none. Jul 08 16:12:41 dom0 systemd[1]: Mounted sysroot.mount - /sysroot. Jul 08 16:12:41 dom0 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Jul 08 16:12:41 dom0 systemd[1]: Starting initrd-parse-etc.service - Reload Configuration from the Real Root... Jul 08 16:12:41 dom0 systemd[1]: Reloading. Jul 08 16:12:42 dom0 audit: BPF prog-id=22 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=23 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=17 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=18 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=24 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=14 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=25 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=26 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=15 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=16 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=27 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=19 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=28 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=29 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=20 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=21 op=UNLOAD Jul 08 16:12:42 dom0 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-parse-etc.service - Reload Configuration from the Real Root. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd.target - Initrd Default Target. Jul 08 16:12:42 dom0 systemd[1]: dracut-mount.service - dracut mount hook was skipped because all trigger condition checks failed. Jul 08 16:12:42 dom0 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Jul 08 16:12:42 dom0 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Jul 08 16:12:42 dom0 systemd[1]: Stopped target timers.target - Timer Units. Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd.target - Initrd Default Target. Jul 08 16:12:42 dom0 systemd[1]: Stopped target basic.target - Basic System. Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-usr-fs.target - Initrd /usr File System. Jul 08 16:12:42 dom0 systemd[1]: Stopped target paths.target - Path Units. Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Jul 08 16:12:42 dom0 systemd[1]: Stopped target slices.target - Slice Units. Jul 08 16:12:42 dom0 systemd[1]: Stopped target sockets.target - Socket Units. Jul 08 16:12:42 dom0 systemd[1]: Stopped target sysinit.target - System Initialization. Jul 08 16:12:42 dom0 systemd[1]: Stopped target swap.target - Swaps. Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Jul 08 16:12:42 dom0 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: dracut-initqueue.service: Consumed 2.418s CPU time. Jul 08 16:12:42 dom0 systemd[1]: Starting plymouth-switch-root.service - Plymouth switch root service... Jul 08 16:12:42 dom0 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Jul 08 16:12:42 dom0 systemd[1]: Stopping usbguard.service - USBGuard daemon... Jul 08 16:12:42 dom0 systemd[1]: usbguard.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped usbguard.service - USBGuard daemon. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jul 08 16:12:42 dom0 systemd[1]: Stopped target local-fs.target - Local File Systems. Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd.service: Consumed 2.752s CPU time. Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Jul 08 16:12:42 dom0 audit: BPF prog-id=27 op=UNLOAD Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Jul 08 16:12:42 dom0 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Finished plymouth-switch-root.service - Plymouth switch root service. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-switch-root.service - Switch Root... Jul 08 16:12:42 dom0 systemd[1]: Switching root. Jul 08 16:12:42 dom0 systemd-journald[341]: Journal stopped Jul 08 16:12:42 dom0 systemd-journald[341]: Received SIGTERM from PID 1 (systemd). Jul 08 16:12:42 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 08 16:12:42 dom0 systemd[1]: Detected virtualization vm-other. Jul 08 16:12:42 dom0 systemd[1]: Detected architecture x86-64. Jul 08 16:12:42 dom0 systemd[1]: bpf-lsm: BPF LSM hook not enabled in the kernel, BPF LSM not supported Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubesd.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-qmemman.service:7: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-db-dom0.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-core.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Jul 08 16:12:42 dom0 systemd[1]: systemd-ask-password-plymouth.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Jul 08 16:12:42 dom0 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 08 16:12:42 dom0 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Jul 08 16:12:42 dom0 systemd[1]: Created slice system-qubes\x2dvm.slice - Slice /system/qubes-vm. Jul 08 16:12:42 dom0 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Jul 08 16:12:42 dom0 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Jul 08 16:12:42 dom0 systemd[1]: Created slice user.slice - User and Session Slice. Jul 08 16:12:42 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Jul 08 16:12:42 dom0 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Jul 08 16:12:42 dom0 systemd[1]: Reached target blockdev@dev-mapper-luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.target - Block Device Preparation for /dev/mapper/luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d. Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Jul 08 16:12:42 dom0 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Jul 08 16:12:42 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jul 08 16:12:42 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jul 08 16:12:42 dom0 systemd[1]: Reached target slices.target - Slice Units. Jul 08 16:12:42 dom0 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Jul 08 16:12:42 dom0 systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Jul 08 16:12:42 dom0 systemd[1]: Activating swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap... Jul 08 16:12:42 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Jul 08 16:12:42 dom0 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Jul 08 16:12:42 dom0 systemd[1]: Mounting proc-xen.mount - Mount /proc/xen files... Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Jul 08 16:12:42 dom0 kernel: Adding 10485756k swap on /dev/mapper/qubes_dom0-swap. Priority:-2 extents:1 across:10485756k SS Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Jul 08 16:12:42 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jul 08 16:12:42 dom0 systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 08 16:12:42 dom0 systemd[1]: plymouth-switch-root.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Stopped plymouth-switch-root.service - Plymouth switch root service. Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-journald.service - Journal Service. Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-journald.service - Journal Service... Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Jul 08 16:12:42 dom0 kernel: loop: module loaded Jul 08 16:12:42 dom0 kernel: fuse: init (API version 7.41) Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jul 08 16:12:42 dom0 systemd[1]: Activated swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap. Jul 08 16:12:42 dom0 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Jul 08 16:12:42 dom0 systemd[1]: Mounted proc-xen.mount - Mount /proc/xen files. Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Jul 08 16:12:42 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jul 08 16:12:42 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jul 08 16:12:42 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 08 16:12:42 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jul 08 16:12:42 dom0 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Jul 08 16:12:42 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd-journald[1311]: Journal started Jul 08 16:12:42 dom0 systemd-journald[1311]: Runtime Journal (/run/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 8.0M, max 77.8M, 69.8M free. Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 08 16:12:42 dom0 audit: BPF prog-id=30 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=30 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=31 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=31 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=32 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=32 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=33 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=33 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=34 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=34 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=35 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=36 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=35 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=36 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=37 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=37 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=38 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=38 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=39 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=39 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=40 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=40 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=41 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=42 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=42 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=43 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=41 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=43 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=44 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=24 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=45 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=46 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=25 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=26 op=UNLOAD Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit: BPF prog-id=44 op=UNLOAD Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit: BPF prog-id=47 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=48 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=49 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=45 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=46 op=UNLOAD Jul 08 16:12:42 dom0 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 res=1 Jul 08 16:12:42 dom0 systemd[1]: Started systemd-journald.service - Journal Service. Jul 08 16:12:42 dom0 audit[1311]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd68f54d40 a2=4000 a3=7ffd68f54dcc items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" key=(null) Jul 08 16:12:42 dom0 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Queued start job for default target graphical.target. Jul 08 16:12:42 dom0 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd-modules-load[1312]: Module 'msr' is built in Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Jul 08 16:12:42 dom0 systemd[1]: Reached target network-pre.target - Preparation for Network. Jul 08 16:12:42 dom0 systemd[1]: Reached target swap.target - Swaps. Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Jul 08 16:12:42 dom0 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Jul 08 16:12:42 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed. Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Jul 08 16:12:42 dom0 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 kernel: EXT4-fs (dm-4): re-mounted 0ac75727-2814-43da-9fd8-825bf56de02d r/w. Quota mode: none. Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:42 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Jul 08 16:12:42 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Jul 08 16:12:42 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd-journald[1311]: Time spent on flushing to /var/log/journal/0c67c932d86e4cf398b860f50e4aef19 is 143.026ms for 1716 entries. Jul 08 16:12:42 dom0 systemd-journald[1311]: System Journal (/var/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 610.6M, max 4.0G, 3.4G free. Jul 08 16:12:42 dom0 systemd-journald[1311]: Received client request to flush runtime journal. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit: BPF prog-id=50 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=51 op=LOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=22 op=UNLOAD Jul 08 16:12:42 dom0 audit: BPF prog-id=23 op=UNLOAD Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Jul 08 16:12:42 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jul 08 16:12:42 dom0 systemd-udevd[1324]: Using default interface naming scheme 'v251'. Jul 08 16:12:42 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jul 08 16:12:42 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jul 08 16:12:42 dom0 systemd[1]: Condition check resulted in dev-hvc0.device - /dev/hvc0 being skipped. Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Jul 08 16:12:42 dom0 kernel: amd-tee driver: tee not present Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: SMBus Host Controller at 0xb00, revision 0 Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: Using register 0x02 for SMBus port selection Jul 08 16:12:43 dom0 kernel: i2c i2c-20: Successfully instantiated SPD at 0x50 Jul 08 16:12:43 dom0 kernel: i2c i2c-20: Successfully instantiated SPD at 0x51 Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: Auxiliary SMBus Host Controller at 0xb20 Jul 08 16:12:43 dom0 kernel: i2c i2c-22: Successfully instantiated SPD at 0x50 Jul 08 16:12:43 dom0 kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Jul 08 16:12:43 dom0 kernel: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Jul 08 16:12:43 dom0 kernel: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' Jul 08 16:12:43 dom0 kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 Jul 08 16:12:43 dom0 kernel: cfg80211: failed to load regulatory.db Jul 08 16:12:43 dom0 kernel: i2c i2c-22: Successfully instantiated SPD at 0x51 Jul 08 16:12:43 dom0 systemd[1]: Created slice system-systemd\x2dbacklight.slice - Slice /system/systemd-backlight. Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-backlight@backlight:amdgpu_bl0.service - Load/Save Screen Backlight Brightness of backlight:amdgpu_bl0... Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-backlight@backlight:amdgpu_bl0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-backlight@backlight:amdgpu_bl0.service - Load/Save Screen Backlight Brightness of backlight:amdgpu_bl0. Jul 08 16:12:43 dom0 systemd[1]: Reached target smartcard.target - Smart Card. Jul 08 16:12:43 dom0 kernel: ACPI: bus type thunderbolt registered Jul 08 16:12:43 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:43 dom0 kernel: xen: --> pirq=44 -> irq=44 (gsi=44) Jul 08 16:12:43 dom0 kernel: amd-pmf AMDI0102:00: Failed to open TEE context Jul 08 16:12:43 dom0 kernel: amd-pmf AMDI0102:00: registered PMF device successfully Jul 08 16:12:43 dom0 systemd[1]: Started dm-event.service - Device-mapper event daemon. Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dm-event comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 dmeventd[2209]: dmeventd ready for processing. Jul 08 16:12:43 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:43 dom0 lvm[1305]: 5 logical volume(s) in volume group "qubes_dom0" monitored Jul 08 16:12:43 dom0 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input12 Jul 08 16:12:43 dom0 systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jul 08 16:12:43 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:43 dom0 kernel: xen: --> pirq=45 -> irq=45 (gsi=45) Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d.service - File System Check on /dev/disk/by-uuid/498e4b33-4544-4195-b627-cd3391190a2d... Jul 08 16:12:43 dom0 systemd-fsck[2492]: boot: clean, 44/131072 files, 87247/523520 blocks Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d.service - File System Check on /dev/disk/by-uuid/498e4b33-4544-4195-b627-cd3391190a2d. Jul 08 16:12:43 dom0 systemd[1]: Mounting boot.mount - /boot... Jul 08 16:12:43 dom0 kernel: xen: registering gsi 39 triggering 0 polarity 1 Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-1A18\x2dD569.device - WD_BLACK SN770M 500GB EFI being skipped. Jul 08 16:12:43 dom0 kernel: EXT4-fs (md126): mounted filesystem 498e4b33-4544-4195-b627-cd3391190a2d r/w with ordered data mode. Quota mode: none. Jul 08 16:12:43 dom0 kernel: xen: --> pirq=39 -> irq=39 (gsi=39) Jul 08 16:12:43 dom0 kernel: snd_hda_intel 0000:c2:00.1: Handle vga_switcheroo audio client Jul 08 16:12:43 dom0 systemd[1]: Mounted boot.mount - /boot. Jul 08 16:12:43 dom0 kernel: xen: registering gsi 36 triggering 0 polarity 1 Jul 08 16:12:43 dom0 kernel: Already setup the GSI :36 Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569.service - File System Check on /dev/disk/by-uuid/1A18-D569... Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-1836\x2dE84A.device - WD_BLACK SN770 500GB EFI being skipped. Jul 08 16:12:43 dom0 kernel: snd_hda_intel 0000:c2:00.1: bound 0000:c2:00.0 (ops amdgpu_dm_audio_component_bind_ops [amdgpu]) Jul 08 16:12:43 dom0 kernel: amd_atl: AMD Address Translation Library initialized Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A.service - File System Check on /dev/disk/by-uuid/1836-E84A... Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input13 Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input14 Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input15 Jul 08 16:12:43 dom0 systemd-fsck[2694]: fsck.fat 4.2 (2021-01-31) Jul 08 16:12:43 dom0 systemd-fsck[2694]: /dev/nvme0n1p1: 13 files, 14899/261628 clusters Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569.service - File System Check on /dev/disk/by-uuid/1A18-D569. Jul 08 16:12:43 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: autoconfig for ALC295: line_outs=2 (0x17/0x14/0x0/0x0/0x0) type:speaker Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: hp_outs=0 (0x0/0x0/0x0/0x0/0x0) Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: mono: mono_out=0x0 Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: inputs: Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: Mic=0x12 Jul 08 16:12:44 dom0 kernel: cros_ec_lpcs cros_ec_lpcs.0: loaded with quirks 00000001 Jul 08 16:12:44 dom0 kernel: xen: registering gsi 39 triggering 0 polarity 1 Jul 08 16:12:44 dom0 kernel: Already setup the GSI :39 Jul 08 16:12:44 dom0 kernel: cros_ec_lpcs cros_ec_lpcs.0: Chrome EC device registered Jul 08 16:12:44 dom0 kernel: spd5118 20-0050: DDR5 temperature sensor: vendor 0x06:0x32 revision 1.6 Jul 08 16:12:44 dom0 kernel: spd5118 20-0051: DDR5 temperature sensor: vendor 0x06:0x32 revision 1.6 Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: No USB PD charging ports found Jul 08 16:12:44 dom0 kernel: cros-charge-control cros-charge-control.4.auto: Framework charge control detected, preventing load Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: Unexpected number of charge port count Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: Failing probe (err:0xffffffb9) Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: probe with driver cros-usbpd-charger failed with error -71 Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit: BPF prog-id=52 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=53 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=54 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=28 op=UNLOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=29 op=UNLOAD Jul 08 16:12:43 dom0 audit[3133]: SYSTEM_BOOT pid=3133 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit: BPF prog-id=55 op=LOAD Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" target="block" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" target="allow" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" target="block" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" target="block" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" target="block" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" target="allow" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" target="block" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit: BPF prog-id=56 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=57 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=58 op=LOAD Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit: BPF prog-id=59 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=60 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=61 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=62 op=LOAD Jul 08 16:12:43 dom0 audit: BPF prog-id=63 op=LOAD Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=mdmonitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=upower comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=iio-sensor-proxy comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:44 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=udisks2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:44 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A.service - File System Check on /dev/disk/by-uuid/1836-E84A. Jul 08 16:12:44 dom0 systemd-fsck[2713]: fsck.fat 4.2 (2021-01-31) Jul 08 16:12:44 dom0 systemd-fsck[2713]: /dev/nvme1n1p1: 1 files, 1/261628 clusters Jul 08 16:12:43 dom0 alsactl[3258]: alsactl 1.2.9 daemon started Jul 08 16:12:43 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dkeyboard.slice - Slice /system/qubes-input-sender-keyboard. Jul 08 16:12:43 dom0 xenstored[3342]: Checking store ... Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Jul 08 16:12:43 dom0 xenstored[3342]: Checking store complete. Jul 08 16:12:43 dom0 systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Jul 08 16:12:44 dom0 lvm[2832]: pvscan[2832] PV /dev/mapper/luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d online, VG qubes_dom0 is complete. Jul 08 16:12:44 dom0 lvm[2832]: pvscan[2832] VG qubes_dom0 run autoactivation. Jul 08 16:12:43 dom0 polkitd[3327]: Started polkitd version 121 Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Jul 08 16:12:43 dom0 polkitd[3327]: Loading rules from directory /etc/polkit-1/rules.d Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 08 16:12:43 dom0 polkitd[3327]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 08 16:12:43 dom0 polkitd[3327]: Finished loading, compiling and executing 9 rules Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:43 dom0 polkitd[3327]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 08 16:12:44 dom0 usbguard-daemon[3143]: [1752009163.750] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF! Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: Looking up NSS user entry for 'geoclue'... Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: NSS returned no entry for 'geoclue' Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: Invalid user-name in /etc/dbus-1/system.d/net.hadess.SensorProxy.conf +14: user="geoclue" Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-block-253:0.device - /dev/block/253:0 being skipped. Jul 08 16:12:43 dom0 systemd[1]: Created slice system-lvm2\x2dpvscan.slice - Slice /system/lvm2-pvscan. Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Jul 08 16:12:43 dom0 systemd[1]: Starting lvm2-pvscan@253:0.service - LVM event activation on device 253:0... Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 08 16:12:44 dom0 qubes-input-sender[3274]: Device /dev/input/event5 is already in dom0 Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 08 16:12:44 dom0 qubes-input-sender[3278]: Device /dev/input/event6 is already in dom0 Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:44 dom0 qubes-input-sender[3280]: Device /dev/input/event7 is already in dom0 Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:44 dom0 qubes-input-sender[3286]: Device /dev/input/event8 is already in dom0 Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:44 dom0 qubes-input-sender[3288]: Device /dev/input/event9 is already in dom0 Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 08 16:12:43 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed. Jul 08 16:12:44 dom0 launch-xenstore[3311]: Starting /usr/sbin/xenstored... Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 08 16:12:44 dom0 xen-init-dom0[3356]: Done setting up Dom0 Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 08 16:12:43 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed. Jul 08 16:12:43 dom0 systemd[1]: Mounting boot-efi.mount - /boot/efi... Jul 08 16:12:43 dom0 systemd[1]: Mounting boot-efi2.mount - /boot/efi2... Jul 08 16:12:43 dom0 systemd[1]: Mounted boot-efi.mount - /boot/efi. Jul 08 16:12:43 dom0 systemd[1]: Mounted boot-efi2.mount - /boot/efi2. Jul 08 16:12:43 dom0 systemd[1]: Reached target local-fs.target - Local File Systems. Jul 08 16:12:43 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed. Jul 08 16:12:43 dom0 systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Jul 08 16:12:43 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed. Jul 08 16:12:43 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 08 16:12:43 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id). Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jul 08 16:12:43 dom0 systemd[1]: Received SIGRTMIN+20 from PID 670 (plymouthd). Jul 08 16:12:43 dom0 systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jul 08 16:12:43 dom0 systemd[1]: systemd-journal-catalog-update.service - Rebuild Journal Catalog was skipped because of a failed condition check (ConditionNeedsUpdate=/var). Jul 08 16:12:43 dom0 systemd[1]: systemd-update-done.service - Update is Completed was skipped because all trigger condition checks failed. Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Jul 08 16:12:43 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon... Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Jul 08 16:12:43 dom0 systemd[1]: Started usbguard.service - USBGuard daemon. Jul 08 16:12:43 dom0 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Jul 08 16:12:43 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jul 08 16:12:43 dom0 systemd[1]: Reached target paths.target - Path Units. Jul 08 16:12:43 dom0 systemd[1]: Reached target sysinit.target - System Initialization. Jul 08 16:12:43 dom0 systemd[1]: Started fstrim.timer - Discard unused blocks once a week. Jul 08 16:12:43 dom0 systemd[1]: Started logrotate.timer - Daily rotation of log files. Jul 08 16:12:43 dom0 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Jul 08 16:12:43 dom0 systemd[1]: Reached target timers.target - Timer Units. Jul 08 16:12:43 dom0 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd.socket - Libvirt local socket. Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd-admin.socket - Libvirt admin socket. Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd-ro.socket - Libvirt local read-only socket. Jul 08 16:12:43 dom0 systemd[1]: Listening on virtlockd.socket - Virtual machine lock manager socket. Jul 08 16:12:43 dom0 systemd[1]: Listening on virtlogd.socket - Virtual machine log manager socket. Jul 08 16:12:43 dom0 systemd[1]: Reached target sockets.target - Socket Units. Jul 08 16:12:43 dom0 systemd[1]: Starting dbus-broker.service - D-Bus System Message Bus... Jul 08 16:12:43 dom0 systemd[1]: rpmdb-migrate.service - RPM database migration to /usr was skipped because of a failed condition check (ConditionPathExists=/var/lib/rpm/.migratedb). Jul 08 16:12:43 dom0 systemd[1]: rpmdb-rebuild.service - RPM database rebuild was skipped because of a failed condition check (ConditionPathExists=/usr/lib/sysimage/rpm/.rebuilddb). Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Jul 08 16:12:43 dom0 systemd[1]: Started systemd-userdbd.service - User Database Manager. Jul 08 16:12:43 dom0 systemd[1]: Started dbus-broker.service - D-Bus System Message Bus. Jul 08 16:12:43 dom0 systemd[1]: Reached target basic.target - Basic System. Jul 08 16:12:43 dom0 systemd[1]: alsa-restore.service - Save/Restore Sound Card State was skipped because of a failed condition check (ConditionPathExists=!/etc/alsa/state-daemon.conf). Jul 08 16:12:43 dom0 systemd[1]: Started alsa-state.service - Manage Sound Card State (restore and store). Jul 08 16:12:43 dom0 systemd[1]: Reached target sound.target - Sound Card. Jul 08 16:12:43 dom0 dbus-broker-launch[3185]: Ready Jul 08 16:12:43 dom0 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown... Jul 08 16:12:43 dom0 systemd[1]: Starting iio-sensor-proxy.service - IIO Sensor Proxy service... Jul 08 16:12:43 dom0 systemd[1]: Starting mdmonitor.service - Software RAID monitoring and management... Jul 08 16:12:43 dom0 systemd[1]: Starting qubes-db-dom0.service - Qubes DB agent... Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event5.service - Qubes input proxy sender (keyboard). Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event6.service - Qubes input proxy sender (keyboard). Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event7.service - Qubes input proxy sender (keyboard). Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event8.service - Qubes input proxy sender (keyboard). Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event9.service - Qubes input proxy sender (keyboard). Jul 08 16:12:43 dom0 systemd[1]: Starting qubes-qmemman.service - Qubes memory management daemon... Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-logind.service - User Login Management... Jul 08 16:12:43 dom0 systemd[1]: Starting udisks2.service - Disk Manager... Jul 08 16:12:43 dom0 systemd[1]: Starting upower.service - Daemon for power management... Jul 08 16:12:43 dom0 systemd[1]: Starting xenstored.service - The Xen xenstore... Jul 08 16:12:43 dom0 systemd[1]: Started qubes-db-dom0.service - Qubes DB agent. Jul 08 16:12:43 dom0 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown. Jul 08 16:12:43 dom0 systemd[1]: Started mdmonitor.service - Software RAID monitoring and management. Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event5.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event6.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event7.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event8.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event9.service: Deactivated successfully. Jul 08 16:12:43 dom0 udisksd[3300]: udisks daemon version 2.9.4 starting Jul 08 16:12:43 dom0 systemd[1]: Starting polkit.service - Authorization Manager... Jul 08 16:12:43 dom0 systemd-logind[3298]: New seat seat0. Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jul 08 16:12:43 dom0 systemd[1]: Started xenstored.service - The Xen xenstore. Jul 08 16:12:43 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event0 (Lid Switch) Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event1 (Power Button) Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event5 (Framework Laptop 16 Keyboard Module - ANSI) Jul 08 16:12:43 dom0 systemd[1]: Starting xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub)... Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event9 (Framework Laptop 16 Keyboard Module - ANSI Keyboard) Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event6 (Framework Laptop 16 Keyboard Module - ANSI System Control) Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event7 (Framework Laptop 16 Keyboard Module - ANSI Consumer Control) Jul 08 16:12:43 dom0 systemd[1]: Starting xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor... Jul 08 16:12:43 dom0 systemd[1]: Started systemd-logind.service - User Login Management. Jul 08 16:12:43 dom0 systemd[1]: Starting libvirtd.service - Virtualization daemon... Jul 08 16:12:43 dom0 systemd[1]: Started xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor. Jul 08 16:12:43 dom0 systemd[1]: Finished xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub). Jul 08 16:12:43 dom0 systemd-logind[3298]: Failed to probe partition scheme of "/dev/block/9:126": Input/output error Jul 08 16:12:43 dom0 systemd[1]: Started libvirtd.service - Virtualization daemon. Jul 08 16:12:43 dom0 systemd[1]: Started upower.service - Daemon for power management. Jul 08 16:12:43 dom0 systemd[1]: Started polkit.service - Authorization Manager. Jul 08 16:12:43 dom0 systemd[1]: Started iio-sensor-proxy.service - IIO Sensor Proxy service. Jul 08 16:12:44 dom0 systemd[1]: Started udisks2.service - Disk Manager. Jul 08 16:12:44 dom0 udisksd[3300]: Acquired the name org.freedesktop.UDisks2 on the system message bus Jul 08 16:12:44 dom0 systemd[1]: Started qubes-qmemman.service - Qubes memory management daemon. Jul 08 16:12:46 dom0 lvm[2832]: 258 logical volume(s) in volume group "qubes_dom0" now active Jul 08 16:12:46 dom0 systemd[1]: Finished lvm2-pvscan@253:0.service - LVM event activation on device 253:0. Jul 08 16:12:46 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:46 dom0 kernel: kauditd_printk_skb: 223 callbacks suppressed Jul 08 16:12:46 dom0 kernel: audit: type=1130 audit(1752009166.978:301): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:46 dom0 systemd[1]: Starting qubesd.service - Qubes OS daemon... Jul 08 16:12:47 dom0 systemd[1]: Started qubesd.service - Qubes OS daemon. Jul 08 16:12:47 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:47 dom0 kernel: audit: type=1130 audit(1752009167.879:302): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:47 dom0 systemd[1]: Starting qubes-core.service - Qubes Dom0 startup setup... Jul 08 16:12:47 dom0 systemd[1]: Started qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon. Jul 08 16:12:47 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:47 dom0 kernel: audit: type=1130 audit(1752009167.892:303): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:47 dom0 startup-misc.sh[4358]: libxl: error: libxl_sched.c:232:sched_credit_domain_set: Getting domain sched credit: Invalid argument Jul 08 16:12:47 dom0 startup-misc.sh[4358]: libxl_domain_sched_params_set failed. Jul 08 16:12:47 dom0 qrexec-policy-daemon[4334]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated Jul 08 16:12:48 dom0 systemd[1]: Finished qubes-core.service - Qubes Dom0 startup setup. Jul 08 16:12:48 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 kernel: audit: type=1130 audit(1752009168.139:304): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 systemd[1]: Started qubes-meminfo-writer-dom0.service - Qubes memory information reporter. Jul 08 16:12:48 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 kernel: audit: type=1130 audit(1752009168.149:305): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-chocolatey.service - Start Qubes VM sys-firewall-chocolatey... Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-full-internet.service - Start Qubes VM sys-firewall-full-internet... Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-localnet.service - Start Qubes VM sys-firewall-localnet... Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall... Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-gui.service - Start Qubes VM sys-gui... Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-net.service - Start Qubes VM sys-net... Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-usb.service - Start Qubes VM sys-usb... Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Starting sys-firewall-full-internet Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-localnet: Starting sys-firewall-localnet Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-net: Starting sys-net Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Starting sys-firewall-chocolatey Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-usb: Starting sys-usb Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: remove, state 1 Jul 08 16:12:48 dom0 kernel: usb usb2: USB disconnect, device number 1 Jul 08 16:12:48 dom0 kernel: usb 2-2: USB disconnect, device number 2 Jul 08 16:12:48 dom0 kernel: usb 2-2.2: USB disconnect, device number 3 Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.386:306): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.387:307): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: USB bus 2 deregistered Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.402:308): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: remove, state 1 Jul 08 16:12:48 dom0 kernel: usb usb1: USB disconnect, device number 1 Jul 08 16:12:48 dom0 kernel: usb 1-2: USB disconnect, device number 2 Jul 08 16:12:48 dom0 kernel: usb 1-2.3: USB disconnect, device number 6 Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.402:309): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.403:310): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 kernel: usb 1-3: USB disconnect, device number 3 Jul 08 16:12:48 dom0 kernel: usb 1-4: USB disconnect, device number 4 Jul 08 16:12:48 dom0 kernel: usb 1-4.1: USB disconnect, device number 7 Jul 08 16:12:48 dom0 kernel: usb 1-4.3: USB disconnect, device number 8 Jul 08 16:12:48 dom0 kernel: usb 1-5: USB disconnect, device number 5 Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: USB bus 1 deregistered Jul 08 16:12:48 dom0 kernel: pciback 0000:c2:00.3: xen_pciback: seizing device Jul 08 16:12:48 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:48 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: remove, state 4 Jul 08 16:12:48 dom0 kernel: usb usb4: USB disconnect, device number 1 Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: USB bus 4 deregistered Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: remove, state 1 Jul 08 16:12:48 dom0 kernel: usb usb3: USB disconnect, device number 1 Jul 08 16:12:48 dom0 kernel: usb 3-1: USB disconnect, device number 2 Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: USB bus 3 deregistered Jul 08 16:12:48 dom0 kernel: pciback 0000:c2:00.4: xen_pciback: seizing device Jul 08 16:12:48 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:48 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Jul 08 16:12:48 dom0 systemd[1]: Stopped target smartcard.target - Smart Card. Jul 08 16:12:48 dom0 kernel: pciback 0000:c4:00.5: xen_pciback: seizing device Jul 08 16:12:48 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:48 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:48 dom0 kernel: pciback 0000:c4:00.6: xen_pciback: seizing device Jul 08 16:12:48 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:48 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall: Starting sys-firewall Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-gui: Starting sys-gui Jul 08 16:12:49 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:49 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:49 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:49 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:49 dom0 kernel: loop0: detected capacity change from 0 to 1399816 Jul 08 16:12:49 dom0 kernel: loop1: detected capacity change from 0 to 1399816 Jul 08 16:12:49 dom0 kernel: pciback 0000:02:00.0: xen_pciback: vpci: assign to virtual slot 0 Jul 08 16:12:49 dom0 kernel: pciback 0000:02:00.0: registering for 2 Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1 Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46 Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Setting Qubes DB info for the VM Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Starting Qubes DB Jul 08 16:12:51 dom0 audit[6413]: CRED_ACQ pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:51 dom0 runuser[6413]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:51 dom0 audit[6413]: USER_START pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:51 dom0 runuser[6413]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:51 dom0 audit[6413]: USER_END pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:51 dom0 audit[6413]: CRED_DISP pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Activating the sys-net VM Jul 08 16:12:51 dom0 audit[6423]: CRED_ACQ pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:51 dom0 runuser[6423]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:51 dom0 audit[6423]: USER_START pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:51 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:51 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:51 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:51 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:51 dom0 kernel: loop2: detected capacity change from 0 to 1399816 Jul 08 16:12:52 dom0 kernel: loop3: detected capacity change from 0 to 1399816 Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: xen_pciback: vpci: assign to virtual slot 0 Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: registering for 4 Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: xen_pciback: vpci: assign to virtual slot 0 func 4 Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: registering for 4 Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: xen_pciback: vpci: assign to virtual slot 1 Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: registering for 4 Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: xen_pciback: vpci: assign to virtual slot 1 func 6 Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: registering for 4 Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37 Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device: Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38 Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device: Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44 Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device: Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1 Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45 Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device: Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Setting Qubes DB info for the VM Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Starting Qubes DB Jul 08 16:12:54 dom0 audit[6838]: CRED_ACQ pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 kernel: kauditd_printk_skb: 15 callbacks suppressed Jul 08 16:12:54 dom0 kernel: audit: type=1103 audit(1752009174.067:326): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 runuser[6838]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:54 dom0 audit[6838]: USER_START pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 kernel: audit: type=1105 audit(1752009174.069:327): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 runuser[6838]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:54 dom0 audit[6838]: USER_END pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 audit[6838]: CRED_DISP pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 kernel: audit: type=1106 audit(1752009174.074:328): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 kernel: audit: type=1104 audit(1752009174.074:329): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Activating the sys-usb VM Jul 08 16:12:54 dom0 audit[6848]: CRED_ACQ pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 kernel: audit: type=1103 audit(1752009174.083:330): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 runuser[6848]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:54 dom0 kernel: audit: type=1105 audit(1752009174.084:331): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 audit[6848]: USER_START pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:54 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:54 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:54 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:54 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:55 dom0 kernel: loop4: detected capacity change from 0 to 1399816 Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Setting Qubes DB info for the VM Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Starting Qubes DB Jul 08 16:12:55 dom0 audit[7169]: CRED_ACQ pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 kernel: audit: type=1103 audit(1752009175.677:332): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 runuser[7169]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:55 dom0 audit[7169]: USER_START pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 kernel: audit: type=1105 audit(1752009175.679:333): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 runuser[7169]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:55 dom0 audit[7169]: USER_END pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 audit[7169]: CRED_DISP pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 kernel: audit: type=1106 audit(1752009175.684:334): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 kernel: audit: type=1104 audit(1752009175.684:335): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Activating the sys-gui VM Jul 08 16:12:55 dom0 audit[7185]: CRED_ACQ pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:55 dom0 runuser[7185]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:55 dom0 audit[7185]: USER_START pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:56 dom0 audit[6423]: USER_END pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:56 dom0 audit[6423]: CRED_DISP pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:56 dom0 runuser[6423]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:56 dom0 systemd[1]: Finished qubes-vm@sys-net.service - Start Qubes VM sys-net. Jul 08 16:12:56 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:56 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:56 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:56 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:56 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:57 dom0 kernel: loop5: detected capacity change from 0 to 1399816 Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Setting Qubes DB info for the VM Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Starting Qubes DB Jul 08 16:12:57 dom0 audit[7555]: CRED_ACQ pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:57 dom0 runuser[7555]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:57 dom0 audit[7555]: USER_START pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:57 dom0 runuser[7555]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:57 dom0 audit[7555]: USER_END pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:57 dom0 audit[7555]: CRED_DISP pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Activating the sys-firewall-full-internet VM Jul 08 16:12:57 dom0 audit[7580]: CRED_ACQ pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:57 dom0 runuser[7580]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:57 dom0 audit[7580]: USER_START pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:57 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:57 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:58 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:58 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:12:59 dom0 runuser[7185]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:59 dom0 kernel: kauditd_printk_skb: 11 callbacks suppressed Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.293:347): pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.293:348): pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 audit[7185]: USER_END pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 audit[7185]: CRED_DISP pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: loop6: detected capacity change from 0 to 1399816 Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Setting Qubes DB info for the VM Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Starting Qubes DB Jul 08 16:12:59 dom0 audit[7923]: CRED_ACQ pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1103 audit(1752009179.461:349): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 runuser[7923]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:59 dom0 kernel: audit: type=1105 audit(1752009179.462:350): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 audit[7923]: USER_START pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 runuser[7923]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:59 dom0 audit[7923]: USER_END pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 audit[7923]: CRED_DISP pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.469:351): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.469:352): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 runuser[6848]: pam_unix(runuser:session): session closed for user admin Jul 08 16:12:59 dom0 audit[6848]: USER_END pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 audit[6848]: CRED_DISP pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.484:353): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.484:354): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Activating the sys-firewall-chocolatey VM Jul 08 16:12:59 dom0 audit[7956]: CRED_ACQ pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1103 audit(1752009179.580:355): pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 runuser[7956]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:12:59 dom0 audit[7956]: USER_START pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 kernel: audit: type=1105 audit(1752009179.581:356): pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 systemd[1]: Finished qubes-vm@sys-gui.service - Start Qubes VM sys-gui. Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-gui comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 systemd[1]: Finished qubes-vm@sys-usb.service - Start Qubes VM sys-usb. Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Jul 08 16:12:59 dom0 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 systemd[1]: Started crond.service - Command Scheduler. Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 systemd[1]: Starting lightdm.service - Light Display Manager... Jul 08 16:12:59 dom0 systemd[1]: Starting plymouth-quit-wait.service - Hold until boot process finishes up... Jul 08 16:12:59 dom0 crond[7962]: (CRON) STARTUP (1.6.1) Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (Syslog will be used instead of sendmail.) Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 23% if used.) Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (running with inotify support) Jul 08 16:12:59 dom0 systemd[1]: Received SIGRTMIN+21 from PID 670 (plymouthd). Jul 08 16:12:59 dom0 systemd[1]: Started lightdm.service - Light Display Manager. Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Jul 08 16:12:59 dom0 audit: BPF prog-id=64 op=LOAD Jul 08 16:12:59 dom0 systemd[1]: Starting accounts-daemon.service - Accounts Service... Jul 08 16:12:59 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:59 dom0 accounts-daemon[7976]: started daemon version 22.39.0 Jul 08 16:12:59 dom0 systemd[1]: Started accounts-daemon.service - Accounts Service. Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:12:59 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:59 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:12:59 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:13:00 dom0 systemd[1]: Received SIGRTMIN+21 from PID 670 (plymouthd). Jul 08 16:13:00 dom0 systemd[1]: Finished plymouth-quit-wait.service - Hold until boot process finishes up. Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:00 dom0 systemd[1]: Started serial-getty@hvc0.service - Serial Getty on hvc0. Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:00 dom0 systemd[1]: Reached target getty.target - Login Prompts. Jul 08 16:13:00 dom0 audit[8295]: CRED_ACQ pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:00 dom0 lightdm[8295]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0) Jul 08 16:13:00 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992. Jul 08 16:13:00 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992... Jul 08 16:13:00 dom0 systemd-logind[3298]: New session c1 of user lightdm. Jul 08 16:13:00 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992. Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:00 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992... Jul 08 16:13:00 dom0 (systemd)[8300]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:00 dom0 (systemd)[8300]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:00 dom0 dbus-broker-launch[3185]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found. Jul 08 16:13:00 dom0 (systemd)[8300]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Jul 08 16:13:00 dom0 audit[8300]: USER_ACCT pid=8300 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:00 dom0 audit[8300]: CRED_ACQ pid=8300 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 08 16:13:00 dom0 audit[8300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=8300 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Jul 08 16:13:00 dom0 audit: PROCTITLE proctitle="(systemd)" Jul 08 16:13:00 dom0 (systemd)[8300]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0) Jul 08 16:13:00 dom0 audit[8300]: USER_START pid=8300 uid=0 auid=992 ses=1 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:01 dom0 systemd[8300]: Queued start job for default target default.target. Jul 08 16:13:01 dom0 systemd[8300]: Created slice app.slice - User Application Slice. Jul 08 16:13:01 dom0 systemd[8300]: Created slice session.slice - User Core Session Slice. Jul 08 16:13:01 dom0 systemd[8300]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system). Jul 08 16:13:01 dom0 systemd[8300]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:13:01 dom0 systemd[8300]: Reached target paths.target - Paths. Jul 08 16:13:01 dom0 systemd[8300]: Reached target timers.target - Timers. Jul 08 16:13:01 dom0 systemd[8300]: Starting dbus.socket - D-Bus User Message Bus Socket... Jul 08 16:13:01 dom0 systemd[8300]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:13:01 dom0 systemd[8300]: Listening on pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:13:01 dom0 systemd[8300]: Listening on ssh-agent.socket - OpenSSH key agent. Jul 08 16:13:01 dom0 systemd[8300]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Jul 08 16:13:01 dom0 systemd[8300]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:13:01 dom0 systemd[8300]: Reached target sockets.target - Sockets. Jul 08 16:13:01 dom0 systemd[8300]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:13:01 dom0 systemd[8300]: Reached target basic.target - Basic System. Jul 08 16:13:01 dom0 systemd[1]: Started user@992.service - User Manager for UID 992. Jul 08 16:13:01 dom0 systemd[1]: Started session-c1.scope - Session c1 of User lightdm. Jul 08 16:13:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:01 dom0 systemd[8300]: Started pipewire.service - PipeWire Multimedia Service. Jul 08 16:13:01 dom0 systemd[8300]: Started wireplumber.service - Multimedia Service Session Manager. Jul 08 16:13:01 dom0 systemd[8300]: Started pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:13:01 dom0 systemd[8300]: Reached target default.target - Main User Target. Jul 08 16:13:01 dom0 systemd[8300]: Startup finished in 846ms. Jul 08 16:13:01 dom0 audit[8295]: USER_START pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:01 dom0 systemd[8300]: Started dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:13:01 dom0 systemd[1]: Starting rtkit-daemon.service - RealtimeKit Scheduling Policy Service... Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully called chroot. Jul 08 16:13:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=rtkit-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:01 dom0 systemd[1]: Started rtkit-daemon.service - RealtimeKit Scheduling Policy Service. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully dropped privileges. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully limited resources. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Canary thread running. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Running. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Watchdog thread running. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8317 of process 8317 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8326 of process 8317 (/usr/bin/wireplumber) owned by '992' RT at priority 20. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8318 of process 8318 (/usr/bin/pipewire) owned by '992' high priority at nice level -11. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8331 of process 8318 (/usr/bin/pipewire) owned by '992' RT at priority 20. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8316 of process 8316 (/usr/bin/pipewire) owned by '992' high priority at nice level -11. Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8328 of process 8316 (/usr/bin/pipewire) owned by '992' RT at priority 20. Jul 08 16:13:01 dom0 wireplumber[8317]: Failed to set scheduler settings: Operation not permitted Jul 08 16:13:01 dom0 wireplumber[8317]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Jul 08 16:13:01 dom0 wireplumber[8317]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Jul 08 16:13:01 dom0 wireplumber[8317]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:13:01 dom0 runuser[7580]: pam_unix(runuser:session): session closed for user admin Jul 08 16:13:01 dom0 audit[7580]: USER_END pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:01 dom0 audit[7580]: CRED_DISP pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=8319 comm="/usr/sbin/lightdm-gtk-greeter") Jul 08 16:13:01 dom0 systemd[8300]: Starting at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Successfully activated service 'org.a11y.Bus' Jul 08 16:13:01 dom0 systemd[8300]: Started at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:13:01 dom0 at-spi-bus-launcher[8350]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored Jul 08 16:13:01 dom0 at-spi-bus-launcher[8350]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored Jul 08 16:13:01 dom0 dbus-broker-launch[8350]: Ready Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=8319 comm="/usr/sbin/lightdm-gtk-greeter") Jul 08 16:13:01 dom0 systemd[8300]: Starting gvfs-daemon.service - Virtual filesystem service... Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Successfully activated service 'org.gtk.vfs.Daemon' Jul 08 16:13:01 dom0 systemd[8300]: Started gvfs-daemon.service - Virtual filesystem service. Jul 08 16:13:01 dom0 kernel: loop7: detected capacity change from 0 to 1399816 Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Setting Qubes DB info for the VM Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Starting Qubes DB Jul 08 16:13:02 dom0 audit[8377]: CRED_ACQ pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 audit[8377]: USER_START pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 runuser[8377]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:13:02 dom0 runuser[8377]: pam_unix(runuser:session): session closed for user admin Jul 08 16:13:02 dom0 audit[8377]: USER_END pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 audit[8377]: CRED_DISP pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 systemd[8300]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry. Jul 08 16:13:02 dom0 lightdm[8424]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:02 dom0 lightdm[8424]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:02 dom0 systemd[8300]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service. Jul 08 16:13:02 dom0 at-spi2-registryd[8425]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Jul 08 16:13:02 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:13:02 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Activating the sys-firewall-localnet VM Jul 08 16:13:02 dom0 audit[8468]: CRED_ACQ pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 runuser[8468]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:13:02 dom0 audit[8468]: USER_START pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Jul 08 16:13:02 dom0 systemd[1]: Finished qubes-vm@sys-firewall-full-internet.service - Start Qubes VM sys-firewall-full-internet. Jul 08 16:13:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-full-internet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 audit: BPF prog-id=65 op=LOAD Jul 08 16:13:02 dom0 audit: BPF prog-id=66 op=LOAD Jul 08 16:13:02 dom0 audit: BPF prog-id=67 op=LOAD Jul 08 16:13:02 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Jul 08 16:13:02 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:13:02 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service. Jul 08 16:13:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:02 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Jul 08 16:13:02 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI as /devices/virtual/input/input16 Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Jul 08 16:13:03 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Keyboard as /devices/virtual/input/input17 Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event5 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI) Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI System Control as /devices/virtual/input/input19 Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Consumer Control as /devices/virtual/input/input18 Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Wireless Radio Control as /devices/virtual/input/input20 Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event7 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI System Control) Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event8 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI Consumer Control) Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event6 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI Keyboard) Jul 08 16:13:03 dom0 runuser[7956]: pam_unix(runuser:session): session closed for user admin Jul 08 16:13:03 dom0 audit[7956]: USER_END pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:03 dom0 audit[7956]: CRED_DISP pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:04 dom0 kernel: loop8: detected capacity change from 0 to 1399816 Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Setting Qubes DB info for the VM Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Starting Qubes DB Jul 08 16:13:04 dom0 audit[8919]: CRED_ACQ pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:04 dom0 runuser[8919]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:13:04 dom0 audit[8919]: USER_START pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:04 dom0 runuser[8919]: pam_unix(runuser:session): session closed for user admin Jul 08 16:13:04 dom0 audit[8919]: USER_END pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:04 dom0 audit[8919]: CRED_DISP pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Activating the sys-firewall VM Jul 08 16:13:04 dom0 systemd[1]: Finished qubes-vm@sys-firewall-chocolatey.service - Start Qubes VM sys-firewall-chocolatey. Jul 08 16:13:04 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-chocolatey comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:04 dom0 audit[8947]: CRED_ACQ pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:04 dom0 runuser[8947]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:13:04 dom0 audit[8947]: USER_START pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:13:05 dom0 runuser[8468]: pam_unix(runuser:session): session closed for user admin Jul 08 16:13:05 dom0 audit[8468]: USER_END pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:05 dom0 audit[8468]: CRED_DISP pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:05 dom0 kernel: kauditd_printk_skb: 42 callbacks suppressed Jul 08 16:13:05 dom0 kernel: audit: type=1106 audit(1752009185.703:397): pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:05 dom0 kernel: audit: type=1104 audit(1752009185.703:398): pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:05 dom0 systemd[1]: Finished qubes-vm@sys-firewall-localnet.service - Start Qubes VM sys-firewall-localnet. Jul 08 16:13:05 dom0 kernel: audit: type=1130 audit(1752009185.748:399): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-localnet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:05 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-localnet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:06 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-gui -> @default: allowed to dom0 Jul 08 16:13:07 dom0 runuser[8947]: pam_unix(runuser:session): session closed for user admin Jul 08 16:13:07 dom0 audit[8947]: USER_END pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 audit[8947]: CRED_DISP pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 kernel: audit: type=1106 audit(1752009187.516:400): pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 kernel: audit: type=1104 audit(1752009187.516:401): pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 systemd[1]: Finished qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall. Jul 08 16:13:07 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 systemd[1]: Reached target multi-user.target - Multi-User System. Jul 08 16:13:07 dom0 systemd[1]: Reached target graphical.target - Graphical Interface. Jul 08 16:13:07 dom0 kernel: audit: type=1130 audit(1752009187.557:402): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP... Jul 08 16:13:07 dom0 audit[8990]: SYSTEM_RUNLEVEL pid=8990 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 kernel: audit: type=1129 audit(1752009187.582:403): pid=8990 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 08 16:13:07 dom0 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP. Jul 08 16:13:07 dom0 systemd[1]: Startup finished in 9.652s (firmware) + 6.773s (loader) + 1.337s (kernel) + 18.647s (initrd) + 25.292s (userspace) = 1min 1.703s. Jul 08 16:13:07 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 kernel: audit: type=1130 audit(1752009187.585:404): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:07 dom0 kernel: audit: type=1131 audit(1752009187.585:405): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:15 dom0 audit[8424]: USER_AUTH pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 audit[8424]: USER_ACCT pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 kernel: audit: type=1100 audit(1752009195.607:406): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 kernel: audit: type=1101 audit(1752009195.607:407): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 systemd[1]: Stopping session-c1.scope - Session c1 of User lightdm... Jul 08 16:13:15 dom0 lightdm[8295]: pam_unix(lightdm-greeter:session): session closed for user lightdm Jul 08 16:13:15 dom0 audit[8295]: USER_END pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 audit[8295]: CRED_DISP pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 kernel: audit: type=1106 audit(1752009195.669:408): pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 kernel: audit: type=1104 audit(1752009195.669:409): pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 systemd[1]: session-c1.scope: Deactivated successfully. Jul 08 16:13:15 dom0 systemd[1]: Stopped session-c1.scope - Session c1 of User lightdm. Jul 08 16:13:15 dom0 systemd-logind[3298]: Removed session c1. Jul 08 16:13:15 dom0 audit[8424]: CRED_ACQ pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 audit[8424]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe2e54c580 a2=4 a3=7ffe2e54c294 items=0 ppid=7963 pid=8424 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:13:15 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230 Jul 08 16:13:15 dom0 kernel: audit: type=1103 audit(1752009195.674:410): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:15 dom0 kernel: audit: type=1006 audit(1752009195.674:411): pid=8424 uid=0 old-auid=4294967295 auid=1000 tty=(none) old-ses=4294967295 ses=2 res=1 Jul 08 16:13:15 dom0 kernel: audit: type=1300 audit(1752009195.674:411): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe2e54c580 a2=4 a3=7ffe2e54c294 items=0 ppid=7963 pid=8424 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:13:15 dom0 kernel: audit: type=1327 audit(1752009195.674:411): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230 Jul 08 16:13:15 dom0 systemd[1]: Created slice user-1000.slice - User Slice of UID 1000. Jul 08 16:13:15 dom0 systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000... Jul 08 16:13:15 dom0 systemd-logind[3298]: New session 2 of user admin. Jul 08 16:13:15 dom0 systemd[1]: Finished user-runtime-dir@1000.service - User Runtime Directory /run/user/1000. Jul 08 16:13:15 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:15 dom0 kernel: audit: type=1130 audit(1752009195.695:412): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:15 dom0 systemd[1]: Starting user@1000.service - User Manager for UID 1000... Jul 08 16:13:15 dom0 (systemd)[8996]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:15 dom0 (systemd)[8996]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:15 dom0 (systemd)[8996]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Jul 08 16:13:15 dom0 audit[8996]: USER_ACCT pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:15 dom0 audit[8996]: CRED_ACQ pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 08 16:13:15 dom0 audit[8996]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=8996 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Jul 08 16:13:15 dom0 audit: PROCTITLE proctitle="(systemd)" Jul 08 16:13:15 dom0 kernel: audit: type=1101 audit(1752009195.703:413): pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:15 dom0 (systemd)[8996]: pam_unix(systemd-user:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:13:15 dom0 audit[8996]: USER_START pid=8996 uid=0 auid=1000 ses=3 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:16 dom0 systemd[8996]: Queued start job for default target default.target. Jul 08 16:13:16 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:16 dom0 systemd[8996]: Created slice app.slice - User Application Slice. Jul 08 16:13:16 dom0 lightdm[8424]: pam_unix(lightdm:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:13:16 dom0 systemd[8996]: Created slice session.slice - User Core Session Slice. Jul 08 16:13:16 dom0 audit[8424]: USER_START pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:16 dom0 systemd[8996]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Jul 08 16:13:16 dom0 systemd[8996]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:13:16 dom0 audit[8424]: USER_LOGIN pid=8424 uid=0 auid=1000 ses=2 msg='op=login id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:13:16 dom0 systemd[8996]: Reached target paths.target - Paths. Jul 08 16:13:16 dom0 systemd[8996]: Reached target timers.target - Timers. Jul 08 16:13:16 dom0 systemd[8996]: Starting dbus.socket - D-Bus User Message Bus Socket... Jul 08 16:13:16 dom0 systemd[8996]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:13:16 dom0 systemd[8996]: Listening on pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:13:16 dom0 systemd[8996]: Listening on ssh-agent.socket - OpenSSH key agent. Jul 08 16:13:16 dom0 systemd[8996]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Jul 08 16:13:16 dom0 systemd[8996]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:13:16 dom0 systemd[8996]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:13:16 dom0 systemd[8996]: Reached target sockets.target - Sockets. Jul 08 16:13:16 dom0 systemd[8996]: Reached target basic.target - Basic System. Jul 08 16:13:16 dom0 systemd[1]: Started user@1000.service - User Manager for UID 1000. Jul 08 16:13:16 dom0 systemd[1]: Started session-2.scope - Session 2 of User admin. Jul 08 16:13:16 dom0 systemd[8996]: Started pipewire.service - PipeWire Multimedia Service. Jul 08 16:13:16 dom0 systemd[8996]: Started wireplumber.service - Multimedia Service Session Manager. Jul 08 16:13:16 dom0 systemd[8996]: Started pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:13:16 dom0 systemd[8996]: Reached target default.target - Main User Target. Jul 08 16:13:16 dom0 systemd[8996]: Startup finished in 655ms. Jul 08 16:13:16 dom0 systemd[8996]: Started dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9004 of process 9004 (/usr/bin/pipewire) owned by '1000' high priority at nice level -11. Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9005 of process 9005 (/usr/bin/wireplumber) owned by '1000' high priority at nice level -11. Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9017 of process 9005 (/usr/bin/wireplumber) owned by '1000' RT at priority 20. Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9022 of process 9004 (/usr/bin/pipewire) owned by '1000' RT at priority 20. Jul 08 16:13:16 dom0 wireplumber[9005]: Failed to set scheduler settings: Operation not permitted Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9006 of process 9006 (/usr/bin/pipewire) owned by '1000' high priority at nice level -11. Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9025 of process 9006 (/usr/bin/pipewire) owned by '1000' RT at priority 20. Jul 08 16:13:16 dom0 wireplumber[9005]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Jul 08 16:13:16 dom0 wireplumber[9005]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Jul 08 16:13:16 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.9' (uid=1000 pid=9007 comm="xfce4-session") Jul 08 16:13:16 dom0 systemd[8996]: Starting at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.a11y.Bus' Jul 08 16:13:16 dom0 systemd[8996]: Started at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:13:16 dom0 at-spi-bus-launcher[9074]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored Jul 08 16:13:16 dom0 at-spi-bus-launcher[9074]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored Jul 08 16:13:16 dom0 dbus-broker-launch[9074]: Ready Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating service name='org.xfce.Xfconf' requested by ':1.12' (uid=1000 pid=9007 comm="xfce4-session") Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.xfce.Xfconf' Jul 08 16:13:16 dom0 systemd[8996]: Created slice app-dbus\x2d:1.11\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.11-org.a11y.atspi.Registry. Jul 08 16:13:16 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@0.service. Jul 08 16:13:16 dom0 at-spi2-registryd[9084]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.15' (uid=1000 pid=9092 comm="xfwm4 --display :0.0 --sm-client-id 2f1b1da50-4881") Jul 08 16:13:16 dom0 systemd[8996]: Starting gvfs-daemon.service - Virtual filesystem service... Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.gtk.vfs.Daemon' Jul 08 16:13:16 dom0 systemd[8996]: Started gvfs-daemon.service - Virtual filesystem service. Jul 08 16:13:16 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-localnet -> @default: allowed to dom0 Jul 08 16:13:18 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Jul 08 16:13:18 dom0 pkexec[9253]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:18 dom0 pkexec[9253]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:18 dom0 pkexec[9253]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000) Jul 08 16:13:18 dom0 audit[9253]: USER_START pid=9253 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success' Jul 08 16:13:18 dom0 pkexec[9253]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 0] Jul 08 16:13:18 dom0 pkexec[9306]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:18 dom0 pkexec[9306]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:18 dom0 pkexec[9306]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000) Jul 08 16:13:18 dom0 audit[9306]: USER_START pid=9306 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success' Jul 08 16:13:18 dom0 pkexec[9306]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 0] Jul 08 16:13:18 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall -> @default: allowed to dom0 Jul 08 16:13:18 dom0 systemd[8996]: Created slice app-qubes\x2dwidget.slice - Slice /app/qubes-widget. Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-updates.service - Qubes Widget service. Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-clipboard.service - Qubes Widget service. Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-disk-space.service - Qubes Widget service. Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-domains.service - Qubes Widget service. Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-devices.service - Qubes Widget service. Jul 08 16:13:18 dom0 systemd[8996]: Starting qubes-app-menu.service - Qubes Application Menu... Jul 08 16:13:18 dom0 polkitd[3327]: Registered Authentication Agent for unix-session:2 (system bus name :1.77 [/usr/libexec/xfce-polkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) Jul 08 16:13:18 dom0 sudo[9444]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:18 dom0 sudo[9444]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:18 dom0 audit[9444]: USER_ACCT pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:18 dom0 audit[9444]: USER_CMD pid=9444 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D7461626C6574406576656E74342E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Jul 08 16:13:18 dom0 sudo[9444]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-tablet@event4.service Jul 08 16:13:18 dom0 audit[9444]: CRED_REFR pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:18 dom0 sudo[9444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Jul 08 16:13:18 dom0 audit[9444]: USER_START pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:18 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dtablet.slice - Slice /system/qubes-input-sender-tablet. Jul 08 16:13:18 dom0 sudo[9444]: pam_unix(sudo:session): session closed for user root Jul 08 16:13:18 dom0 audit[9444]: USER_END pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:18 dom0 audit[9444]: CRED_DISP pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-tablet@event4.service - Qubes input proxy sender (tablet/touchscreen). Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-tablet@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 qubes-input-sender[9446]: Device /dev/input/event4 is already in dom0 Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-tablet@event4.service: Deactivated successfully. Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-tablet@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9459]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:19 dom0 sudo[9459]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:19 dom0 audit[9459]: USER_ACCT pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9459]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-mouse@event3.service Jul 08 16:13:19 dom0 audit[9459]: USER_CMD pid=9459 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6D6F757365406576656E74332E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Jul 08 16:13:19 dom0 audit[9459]: CRED_REFR pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 audit[9459]: USER_START pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9459]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Jul 08 16:13:19 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dmouse.slice - Slice /system/qubes-input-sender-mouse. Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-mouse@event3.service - Qubes input proxy sender (mouse). Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 qubes-input-sender[9471]: Device /dev/input/event3 is already in dom0 Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-mouse@event3.service: Deactivated successfully. Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 audit[9459]: USER_END pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9459]: pam_unix(sudo:session): session closed for user root Jul 08 16:13:19 dom0 audit[9459]: CRED_DISP pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 systemd[8996]: Started qubes-app-menu.service - Qubes Application Menu. Jul 08 16:13:19 dom0 sudo[9481]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:19 dom0 sudo[9481]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:19 dom0 audit[9481]: USER_ACCT pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 audit[9481]: USER_CMD pid=9481 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74322E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9481]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event2.service Jul 08 16:13:19 dom0 audit[9481]: CRED_REFR pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9481]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Jul 08 16:13:19 dom0 audit[9481]: USER_START pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-keyboard@event2.service - Qubes input proxy sender (keyboard). Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 qubes-input-sender[9486]: Device /dev/input/event2 is already in dom0 Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-keyboard@event2.service: Deactivated successfully. Jul 08 16:13:19 dom0 sudo[9481]: pam_unix(sudo:session): session closed for user root Jul 08 16:13:19 dom0 audit[9481]: USER_END pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 audit[9481]: CRED_DISP pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9503]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:19 dom0 sudo[9503]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:19 dom0 audit[9503]: USER_ACCT pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9503]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event1.service Jul 08 16:13:19 dom0 audit[9503]: USER_CMD pid=9503 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74312E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Jul 08 16:13:19 dom0 audit[9503]: CRED_REFR pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 sudo[9503]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Jul 08 16:13:19 dom0 audit[9503]: USER_START pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-keyboard@event1.service - Qubes input proxy sender (keyboard). Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 qubes-input-sender[9505]: Device /dev/input/event1 is already in dom0 Jul 08 16:13:19 dom0 sudo[9503]: pam_unix(sudo:session): session closed for user root Jul 08 16:13:19 dom0 audit[9503]: USER_END pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 audit[9503]: CRED_DISP pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-keyboard@event1.service: Deactivated successfully. Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:20 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-chocolatey -> @default: allowed to dom0 Jul 08 16:13:20 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-full-internet -> @default: allowed to dom0 Jul 08 16:13:21 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0 Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0 Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0 Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0 Jul 08 16:13:25 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992... Jul 08 16:13:25 dom0 systemd[8300]: Activating special unit exit.target... Jul 08 16:13:25 dom0 systemd[8300]: Stopped target default.target - Main User Target. Jul 08 16:13:25 dom0 dbus-broker[8351]: Dispatched 22 messages @ 6(±8)μs / message. Jul 08 16:13:25 dom0 systemd[8300]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:13:25 dom0 systemd[8300]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service... Jul 08 16:13:25 dom0 systemd[8300]: Stopping dbus-daemon.service - D-Bus User Message Bus... Jul 08 16:13:25 dom0 systemd[8300]: Stopping gvfs-daemon.service - Virtual filesystem service... Jul 08 16:13:25 dom0 systemd[8300]: Stopping pipewire-pulse.service - PipeWire PulseAudio... Jul 08 16:13:25 dom0 systemd[8300]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service. Jul 08 16:13:25 dom0 systemd[8300]: Stopped gvfs-daemon.service - Virtual filesystem service. Jul 08 16:13:25 dom0 systemd[8300]: Stopped dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:13:25 dom0 systemd[8300]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:13:25 dom0 systemd[8300]: Stopped pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:13:25 dom0 systemd[8300]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry. Jul 08 16:13:25 dom0 systemd[8300]: Stopping wireplumber.service - Multimedia Service Session Manager... Jul 08 16:13:25 dom0 wireplumber[8317]: stopped by signal: Terminated Jul 08 16:13:25 dom0 wireplumber[8317]: disconnected from pipewire Jul 08 16:13:25 dom0 systemd[8300]: Stopped wireplumber.service - Multimedia Service Session Manager. Jul 08 16:13:25 dom0 systemd[8300]: Stopping pipewire.service - PipeWire Multimedia Service... Jul 08 16:13:25 dom0 systemd[8300]: Stopped pipewire.service - PipeWire Multimedia Service. Jul 08 16:13:25 dom0 systemd[8300]: Removed slice session.slice - User Core Session Slice. Jul 08 16:13:25 dom0 systemd[8300]: Stopped target basic.target - Basic System. Jul 08 16:13:25 dom0 systemd[8300]: Stopped target paths.target - Paths. Jul 08 16:13:25 dom0 systemd[8300]: Stopped target sockets.target - Sockets. Jul 08 16:13:25 dom0 systemd[8300]: Stopped target timers.target - Timers. Jul 08 16:13:25 dom0 systemd[8300]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:13:25 dom0 systemd[8300]: Closed dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:13:25 dom0 systemd[8300]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:13:25 dom0 systemd[8300]: Closed pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:13:25 dom0 systemd[8300]: Closed ssh-agent.socket - OpenSSH key agent. Jul 08 16:13:25 dom0 systemd[8300]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:13:25 dom0 systemd[8300]: Removed slice app.slice - User Application Slice. Jul 08 16:13:25 dom0 systemd[8300]: Reached target shutdown.target - Shutdown. Jul 08 16:13:25 dom0 systemd[8300]: Finished systemd-exit.service - Exit the Session. Jul 08 16:13:25 dom0 systemd[8300]: Reached target exit.target - Exit the Session. Jul 08 16:13:25 dom0 systemd[1]: user@992.service: Deactivated successfully. Jul 08 16:13:25 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992. Jul 08 16:13:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:25 dom0 systemd[1]: user@992.service: Consumed 1.021s CPU time. Jul 08 16:13:25 dom0 kernel: kauditd_printk_skb: 42 callbacks suppressed Jul 08 16:13:25 dom0 kernel: audit: type=1131 audit(1752009205.921:454): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:25 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992... Jul 08 16:13:25 dom0 systemd[1]: run-user-992.mount: Deactivated successfully. Jul 08 16:13:25 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully. Jul 08 16:13:25 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992. Jul 08 16:13:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:25 dom0 kernel: audit: type=1131 audit(1752009205.943:455): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:25 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992. Jul 08 16:13:25 dom0 systemd[1]: user-992.slice: Consumed 1.978s CPU time. Jul 08 16:13:29 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-usb -> @default: allowed to dom0 Jul 08 16:13:31 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Jul 08 16:13:32 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Jul 08 16:13:34 dom0 pkexec[9753]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:34 dom0 pkexec[9753]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:34 dom0 pkexec[9753]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000) Jul 08 16:13:34 dom0 audit[9753]: USER_START pid=9753 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success' Jul 08 16:13:34 dom0 kernel: audit: type=1105 audit(1752009214.175:456): pid=9753 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success' Jul 08 16:13:34 dom0 pkexec[9753]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 1] Jul 08 16:13:34 dom0 audit[8424]: USER_LOGOUT pid=8424 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:13:34 dom0 kernel: audit: type=1113 audit(1752009214.184:457): pid=8424 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:13:34 dom0 lightdm[8424]: pam_unix(lightdm:session): session closed for user admin Jul 08 16:13:34 dom0 audit[8424]: USER_END pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:34 dom0 audit[8424]: CRED_DISP pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:34 dom0 kernel: audit: type=1106 audit(1752009214.186:458): pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:34 dom0 kernel: audit: type=1104 audit(1752009214.186:459): pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:34 dom0 at-spi2-registryd[9084]: X connection to :0 broken (explicit kill or server shutdown). Jul 08 16:13:34 dom0 systemd-logind[3298]: Session 2 logged out. Waiting for processes to exit. Jul 08 16:13:34 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@0.service: Main process exited, code=exited, status=1/FAILURE Jul 08 16:13:34 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@0.service: Failed with result 'exit-code'. Jul 08 16:13:34 dom0 audit[9407]: ANOM_ABEND auid=1000 uid=1000 gid=1000 ses=2 pid=9407 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1 Jul 08 16:13:34 dom0 kernel: traps: xss-lock[9407] trap int3 ip:759b37451e71 sp:7fffcadeb470 error:0 in libglib-2.0.so.0.7400.7[5ee71,759b37411000+93000] Jul 08 16:13:34 dom0 kernel: audit: type=1701 audit(1752009214.191:460): auid=1000 uid=1000 gid=1000 ses=2 pid=9407 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1 Jul 08 16:13:34 dom0 systemd[1]: Created slice system-systemd\x2dcoredump.slice - Slice /system/systemd-coredump. Jul 08 16:13:34 dom0 audit: BPF prog-id=68 op=LOAD Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.214:461): prog-id=68 op=LOAD Jul 08 16:13:34 dom0 audit: BPF prog-id=69 op=LOAD Jul 08 16:13:34 dom0 audit: BPF prog-id=70 op=LOAD Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.215:462): prog-id=69 op=LOAD Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.215:463): prog-id=70 op=LOAD Jul 08 16:13:34 dom0 polkitd[3327]: Unregistered Authentication Agent for unix-session:2 (system bus name :1.77, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) (disconnected from bus) Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Main process exited, code=exited, status=1/FAILURE Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Failed with result 'exit-code'. Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Consumed 1.544s CPU time. Jul 08 16:13:34 dom0 systemd[1]: Started systemd-coredump@0-9764-0.service - Process Core Dump (PID 9764/UID 0). Jul 08 16:13:34 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:34 dom0 kernel: audit: type=1130 audit(1752009214.224:464): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0 Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0 Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0 Jul 08 16:13:34 dom0 systemd-coredump[9769]: Process 9407 (xss-lock) of user 1000 dumped core. Jul 08 16:13:34 dom0 systemd[1]: systemd-coredump@0-9764-0.service: Deactivated successfully. Jul 08 16:13:34 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0 Jul 08 16:13:34 dom0 audit: BPF prog-id=70 op=UNLOAD Jul 08 16:13:34 dom0 audit: BPF prog-id=69 op=UNLOAD Jul 08 16:13:34 dom0 audit: BPF prog-id=68 op=UNLOAD Jul 08 16:13:34 dom0 widget-wrapper[9767]: xhost: unable to open display ":0" Jul 08 16:13:34 dom0 widget-wrapper[9768]: xhost: unable to open display ":0" Jul 08 16:13:34 dom0 widget-wrapper[9765]: xhost: unable to open display ":0" Jul 08 16:13:34 dom0 widget-wrapper[9770]: xhost: unable to open display ":0" Jul 08 16:13:34 dom0 widget-wrapper[9766]: xhost: unable to open display ":0" Jul 08 16:13:34 dom0 widget-wrapper[9427]: exiting with 0 Jul 08 16:13:34 dom0 widget-wrapper[9415]: exiting with 0 Jul 08 16:13:34 dom0 widget-wrapper[9417]: exiting with 0 Jul 08 16:13:34 dom0 widget-wrapper[9420]: exiting with 0 Jul 08 16:13:34 dom0 widget-wrapper[9393]: exiting with 0 Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Scheduled restart job, restart counter is at 1. Jul 08 16:13:35 dom0 systemd[8996]: Stopped qubes-app-menu.service - Qubes Application Menu. Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Consumed 1.544s CPU time. Jul 08 16:13:35 dom0 systemd[8996]: Starting qubes-app-menu.service - Qubes Application Menu... Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified Jul 08 16:13:35 dom0 audit[9818]: CRED_ACQ pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:35 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0) Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified Jul 08 16:13:35 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992. Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Main process exited, code=exited, status=6/NOTCONFIGURED Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Failed with result 'exit-code'. Jul 08 16:13:35 dom0 systemd[8996]: Failed to start qubes-app-menu.service - Qubes Application Menu. Jul 08 16:13:35 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992... Jul 08 16:13:35 dom0 systemd-logind[3298]: New session c2 of user lightdm. Jul 08 16:13:35 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992. Jul 08 16:13:35 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:35 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992... Jul 08 16:13:35 dom0 (systemd)[9822]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:35 dom0 (systemd)[9822]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:35 dom0 (systemd)[9822]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Jul 08 16:13:35 dom0 audit[9822]: USER_ACCT pid=9822 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:35 dom0 audit[9822]: CRED_ACQ pid=9822 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 08 16:13:35 dom0 audit[9822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=9822 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Jul 08 16:13:35 dom0 audit: PROCTITLE proctitle="(systemd)" Jul 08 16:13:35 dom0 (systemd)[9822]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0) Jul 08 16:13:35 dom0 audit[9822]: USER_START pid=9822 uid=0 auid=992 ses=4 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:13:36 dom0 systemd[9822]: Queued start job for default target default.target. Jul 08 16:13:36 dom0 systemd[9822]: Created slice app.slice - User Application Slice. Jul 08 16:13:36 dom0 systemd[9822]: Created slice session.slice - User Core Session Slice. Jul 08 16:13:36 dom0 systemd[9822]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system). Jul 08 16:13:36 dom0 systemd[9822]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:13:36 dom0 systemd[9822]: Reached target paths.target - Paths. Jul 08 16:13:36 dom0 systemd[9822]: Reached target timers.target - Timers. Jul 08 16:13:36 dom0 systemd[9822]: Starting dbus.socket - D-Bus User Message Bus Socket... Jul 08 16:13:36 dom0 systemd[9822]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:13:36 dom0 systemd[9822]: Listening on pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:13:36 dom0 systemd[9822]: Listening on ssh-agent.socket - OpenSSH key agent. Jul 08 16:13:36 dom0 systemd[9822]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Jul 08 16:13:36 dom0 systemd[9822]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:13:36 dom0 systemd[9822]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:13:36 dom0 systemd[9822]: Reached target sockets.target - Sockets. Jul 08 16:13:36 dom0 systemd[9822]: Reached target basic.target - Basic System. Jul 08 16:13:36 dom0 systemd[1]: Started user@992.service - User Manager for UID 992. Jul 08 16:13:36 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:36 dom0 systemd[1]: Started session-c2.scope - Session c2 of User lightdm. Jul 08 16:13:36 dom0 systemd[9822]: Started pipewire.service - PipeWire Multimedia Service. Jul 08 16:13:36 dom0 systemd[9822]: Started wireplumber.service - Multimedia Service Session Manager. Jul 08 16:13:36 dom0 audit[9818]: USER_START pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:13:36 dom0 systemd[9822]: Started pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:13:36 dom0 systemd[9822]: Reached target default.target - Main User Target. Jul 08 16:13:36 dom0 systemd[9822]: Startup finished in 644ms. Jul 08 16:13:36 dom0 systemd[9822]: Started dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9839 of process 9839 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11. Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9838 of process 9838 (/usr/bin/pipewire) owned by '992' high priority at nice level -11. Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9847 of process 9839 (/usr/bin/wireplumber) owned by '992' RT at priority 20. Jul 08 16:13:36 dom0 wireplumber[9839]: Failed to set scheduler settings: Operation not permitted Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9849 of process 9838 (/usr/bin/pipewire) owned by '992' RT at priority 20. Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9840 of process 9840 (/usr/bin/pipewire) owned by '992' high priority at nice level -11. Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9850 of process 9840 (/usr/bin/pipewire) owned by '992' RT at priority 20. Jul 08 16:13:36 dom0 wireplumber[9839]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Jul 08 16:13:36 dom0 wireplumber[9839]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=9841 comm="/usr/sbin/lightdm-gtk-greeter") Jul 08 16:13:36 dom0 systemd[9822]: Starting at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Successfully activated service 'org.a11y.Bus' Jul 08 16:13:36 dom0 systemd[9822]: Started at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:13:36 dom0 at-spi-bus-launcher[9862]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored Jul 08 16:13:36 dom0 at-spi-bus-launcher[9862]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored Jul 08 16:13:36 dom0 dbus-broker-launch[9862]: Ready Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=9841 comm="/usr/sbin/lightdm-gtk-greeter") Jul 08 16:13:36 dom0 systemd[9822]: Starting gvfs-daemon.service - Virtual filesystem service... Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Successfully activated service 'org.gtk.vfs.Daemon' Jul 08 16:13:36 dom0 systemd[9822]: Started gvfs-daemon.service - Virtual filesystem service. Jul 08 16:13:36 dom0 systemd[9822]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry. Jul 08 16:13:36 dom0 lightdm[9892]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:13:36 dom0 lightdm[9892]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:13:36 dom0 systemd[9822]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service. Jul 08 16:13:36 dom0 wireplumber[9839]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:13:36 dom0 at-spi2-registryd[9893]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Jul 08 16:13:59 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 08 16:13:59 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:59 dom0 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 08 16:13:59 dom0 kernel: audit: type=1131 audit(1752009239.458:477): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:13:59 dom0 audit: BPF prog-id=67 op=UNLOAD Jul 08 16:13:59 dom0 audit: BPF prog-id=66 op=UNLOAD Jul 08 16:13:59 dom0 audit: BPF prog-id=65 op=UNLOAD Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:478): prog-id=67 op=UNLOAD Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:479): prog-id=66 op=UNLOAD Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:480): prog-id=65 op=UNLOAD Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown) Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown) Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown) Jul 08 16:15:03 dom0 lightdm[10600]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:15:03 dom0 lightdm[10600]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:15:11 dom0 audit[10600]: USER_AUTH pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 audit[10600]: USER_ACCT pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1100 audit(1752009311.008:481): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.008:482): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 systemd[1]: Stopping session-c2.scope - Session c2 of User lightdm... Jul 08 16:15:11 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session closed for user lightdm Jul 08 16:15:11 dom0 audit[9818]: USER_END pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1106 audit(1752009311.059:483): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1104 audit(1752009311.059:484): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 audit[9818]: CRED_DISP pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Deactivated successfully. Jul 08 16:15:11 dom0 systemd[1]: Stopped session-c2.scope - Session c2 of User lightdm. Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Consumed 1.791s CPU time. Jul 08 16:15:11 dom0 systemd-logind[3298]: Removed session c2. Jul 08 16:15:11 dom0 audit[10600]: CRED_ACQ pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 audit[10600]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234 Jul 08 16:15:11 dom0 kernel: audit: type=1103 audit(1752009311.065:485): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1006 audit(1752009311.065:486): pid=10600 uid=0 old-auid=4294967295 auid=1001 tty=(none) old-ses=4294967295 ses=5 res=1 Jul 08 16:15:11 dom0 kernel: audit: type=1300 audit(1752009311.065:486): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:15:11 dom0 kernel: audit: type=1327 audit(1752009311.065:486): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234 Jul 08 16:15:11 dom0 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001. Jul 08 16:15:11 dom0 systemd[1]: Starting user-runtime-dir@1001.service - User Runtime Directory /run/user/1001... Jul 08 16:15:11 dom0 systemd-logind[3298]: New session 5 of user engineer. Jul 08 16:15:11 dom0 systemd[1]: Finished user-runtime-dir@1001.service - User Runtime Directory /run/user/1001. Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1130 audit(1752009311.087:487): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 systemd[1]: Starting user@1001.service - User Manager for UID 1001... Jul 08 16:15:11 dom0 (systemd)[10663]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:15:11 dom0 (systemd)[10663]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:15:11 dom0 (systemd)[10663]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Jul 08 16:15:11 dom0 audit[10663]: USER_ACCT pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 audit[10663]: CRED_ACQ pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 08 16:15:11 dom0 audit[10663]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=10663 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=6 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.095:488): pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle="(systemd)" Jul 08 16:15:11 dom0 audit[10663]: USER_START pid=10663 uid=0 auid=1001 ses=6 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 (systemd)[10663]: pam_unix(systemd-user:session): session opened for user engineer(uid=1001) by (uid=0) Jul 08 16:15:11 dom0 systemd[10663]: Queued start job for default target default.target. Jul 08 16:15:11 dom0 systemd[10663]: Created slice app.slice - User Application Slice. Jul 08 16:15:11 dom0 systemd[10663]: Created slice session.slice - User Core Session Slice. Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 systemd[10663]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Jul 08 16:15:11 dom0 systemd[10663]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:15:11 dom0 systemd[10663]: Reached target paths.target - Paths. Jul 08 16:15:11 dom0 systemd[10663]: Reached target timers.target - Timers. Jul 08 16:15:11 dom0 systemd[10663]: Starting dbus.socket - D-Bus User Message Bus Socket... Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:15:11 dom0 audit[10600]: USER_START pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 lightdm[10600]: pam_unix(lightdm:session): session opened for user engineer(uid=1001) by (uid=0) Jul 08 16:15:11 dom0 audit[10600]: USER_LOGIN pid=10600 uid=0 auid=1001 ses=5 msg='op=login id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:15:11 dom0 systemd[10663]: Listening on ssh-agent.socket - OpenSSH key agent. Jul 08 16:15:11 dom0 systemd[10663]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Jul 08 16:15:11 dom0 systemd[10663]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:15:11 dom0 systemd[10663]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:15:11 dom0 systemd[10663]: Reached target sockets.target - Sockets. Jul 08 16:15:11 dom0 systemd[10663]: Reached target basic.target - Basic System. Jul 08 16:15:11 dom0 systemd[1]: Started user@1001.service - User Manager for UID 1001. Jul 08 16:15:11 dom0 systemd[1]: Started session-5.scope - Session 5 of User engineer. Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire.service - PipeWire Multimedia Service. Jul 08 16:15:11 dom0 systemd[10663]: Started wireplumber.service - Multimedia Service Session Manager. Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:15:11 dom0 systemd[10663]: Reached target default.target - Main User Target. Jul 08 16:15:11 dom0 systemd[10663]: Startup finished in 638ms. Jul 08 16:15:11 dom0 systemd[10663]: Started dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10676 of process 10676 (/usr/bin/wireplumber) owned by '1001' high priority at nice level -11. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10677 of process 10677 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10693 of process 10676 (/usr/bin/wireplumber) owned by '1001' RT at priority 20. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10696 of process 10677 (/usr/bin/pipewire) owned by '1001' RT at priority 20. Jul 08 16:15:11 dom0 wireplumber[10676]: Failed to set scheduler settings: Operation not permitted Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10675 of process 10675 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10695 of process 10675 (/usr/bin/pipewire) owned by '1001' RT at priority 20. Jul 08 16:15:11 dom0 wireplumber[10676]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Jul 08 16:15:11 dom0 wireplumber[10676]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Jul 08 16:15:11 dom0 audit: BPF prog-id=71 op=LOAD Jul 08 16:15:11 dom0 audit: BPF prog-id=72 op=LOAD Jul 08 16:15:11 dom0 audit: BPF prog-id=73 op=LOAD Jul 08 16:15:11 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Jul 08 16:15:12 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service. Jul 08 16:15:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 wireplumber[10676]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:15:12 dom0 sudo[10743]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:15:12 dom0 sudo[10743]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:15:12 dom0 audit[10743]: USER_ACCT pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 audit[10743]: USER_CMD pid=10743 uid=1001 auid=1001 ses=5 msg='cwd="/home/engineer" cmd=67726570205E7379732D6775693A202F6574632F71756265732D7379732D6775692D757365722D70617373776F726473 exe="/usr/bin/sudo" terminal=? res=success' Jul 08 16:15:12 dom0 sudo[10743]: engineer : PWD=/home/engineer ; USER=root ; COMMAND=/usr/bin/grep ^sys-gui: /etc/qubes-sys-gui-user-passwords Jul 08 16:15:12 dom0 audit[10743]: CRED_REFR pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1001) Jul 08 16:15:12 dom0 audit[10743]: USER_START pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session closed for user root Jul 08 16:15:12 dom0 audit[10743]: USER_END pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 audit[10743]: CRED_DISP pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qubesd[4330]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated Jul 08 16:15:15 dom0 qubesd[4330]: ignoring /etc/qubes-rpc/policy/include (not a file) Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+updateable: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 xenstored[3342]: write rate limit: domain 5 is affected Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Index+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992... Jul 08 16:15:21 dom0 systemd[9822]: Activating special unit exit.target... Jul 08 16:15:21 dom0 systemd[9822]: Stopped target default.target - Main User Target. Jul 08 16:15:21 dom0 dbus-broker[9863]: Dispatched 22 messages @ 6(±7)μs / message. Jul 08 16:15:21 dom0 systemd[9822]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service... Jul 08 16:15:21 dom0 gvfsd[9865]: A connection to the bus can't be made Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-daemon.service - D-Bus User Message Bus... Jul 08 16:15:21 dom0 systemd[9822]: Stopping gvfs-daemon.service - Virtual filesystem service... Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire-pulse.service - PipeWire PulseAudio... Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:15:21 dom0 systemd[9822]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:15:21 dom0 systemd[9822]: Stopped gvfs-daemon.service - Virtual filesystem service. Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service. Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry. Jul 08 16:15:21 dom0 systemd[9822]: Stopping wireplumber.service - Multimedia Service Session Manager... Jul 08 16:15:21 dom0 wireplumber[9839]: stopped by signal: Terminated Jul 08 16:15:21 dom0 wireplumber[9839]: disconnected from pipewire Jul 08 16:15:21 dom0 systemd[9822]: Stopped wireplumber.service - Multimedia Service Session Manager. Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire.service - PipeWire Multimedia Service... Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire.service - PipeWire Multimedia Service. Jul 08 16:15:21 dom0 systemd[9822]: Removed slice session.slice - User Core Session Slice. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target basic.target - Basic System. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target paths.target - Paths. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target sockets.target - Sockets. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target timers.target - Timers. Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:15:21 dom0 systemd[9822]: Closed dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:15:21 dom0 systemd[9822]: Closed ssh-agent.socket - OpenSSH key agent. Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app.slice - User Application Slice. Jul 08 16:15:21 dom0 systemd[9822]: Reached target shutdown.target - Shutdown. Jul 08 16:15:21 dom0 systemd[9822]: Finished systemd-exit.service - Exit the Session. Jul 08 16:15:21 dom0 systemd[9822]: Reached target exit.target - Exit the Session. Jul 08 16:15:21 dom0 systemd[1]: user@992.service: Deactivated successfully. Jul 08 16:15:21 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992. Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.174:505): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992... Jul 08 16:15:21 dom0 systemd[1]: run-user-992.mount: Deactivated successfully. Jul 08 16:15:21 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully. Jul 08 16:15:21 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992. Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.197:506): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992. Jul 08 16:15:21 dom0 systemd[1]: user-992.slice: Consumed 2.751s CPU time. Jul 08 16:15:21 dom0 systemd[8996]: Starting grub-boot-success.service - Mark boot as successful... Jul 08 16:15:21 dom0 systemd[8996]: Finished grub-boot-success.service - Mark boot as successful. Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-net: allowed to sys-net Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-usb: allowed to sys-usb Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.Stats+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@1.service. Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified Jul 08 16:15:26 dom0 at-spi2-registr[11516]: Could not open X display Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified Jul 08 16:15:26 dom0 at-spi2-registr[11516]: AT-SPI: Cannot open default display Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Main process exited, code=exited, status=1/FAILURE Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Failed with result 'exit-code'. Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to sys-gui Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-initial-page: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-sort-running: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0 Jul 08 16:15:42 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 08 16:15:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:42 dom0 kernel: audit: type=1131 audit(1752009342.054:507): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:42 dom0 audit: BPF prog-id=73 op=UNLOAD Jul 08 16:15:42 dom0 audit: BPF prog-id=72 op=UNLOAD Jul 08 16:15:42 dom0 audit: BPF prog-id=71 op=UNLOAD Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:508): prog-id=73 op=UNLOAD Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:509): prog-id=72 op=UNLOAD Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:510): prog-id=71 op=UNLOAD Jul 08 16:16:01 dom0 systemd[1]: Started getty@tty2.service - Getty on tty2. Jul 08 16:16:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:16:01 dom0 kernel: audit: type=1130 audit(1752009361.784:511): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:16:01 dom0 kernel: fbcon: Taking over console Jul 08 16:16:01 dom0 kernel: Console: switching to colour frame buffer device 320x100 Jul 08 16:16:04 dom0 login[12106]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:16:04 dom0 login[12106]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:16:10 dom0 audit[12106]: USER_AUTH pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 audit[12106]: USER_ACCT pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 kernel: audit: type=1100 audit(1752009370.783:512): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 kernel: audit: type=1101 audit(1752009370.783:513): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 audit[12106]: CRED_ACQ pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 audit[12106]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=3 a1=7ffeca7d8540 a2=4 a3=7ffeca7d8254 items=0 ppid=1 pid=12106 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty2 ses=7 comm="login" exe="/usr/bin/login" key=(null) Jul 08 16:16:10 dom0 audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D Jul 08 16:16:10 dom0 kernel: audit: type=1103 audit(1752009370.784:514): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 kernel: audit: type=1006 audit(1752009370.784:515): pid=12106 uid=0 old-auid=4294967295 auid=1000 tty=tty2 old-ses=4294967295 ses=7 res=1 Jul 08 16:16:10 dom0 kernel: audit: type=1300 audit(1752009370.784:515): arch=c000003e syscall=1 success=yes exit=4 a0=3 a1=7ffeca7d8540 a2=4 a3=7ffeca7d8254 items=0 ppid=1 pid=12106 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty2 ses=7 comm="login" exe="/usr/bin/login" key=(null) Jul 08 16:16:10 dom0 kernel: audit: type=1327 audit(1752009370.784:515): proctitle=2F62696E2F6C6F67696E002D70002D2D Jul 08 16:16:10 dom0 systemd-logind[3298]: New session 7 of user admin. Jul 08 16:16:10 dom0 systemd[1]: Started session-7.scope - Session 7 of User admin. Jul 08 16:16:10 dom0 login[12106]: pam_unix(login:session): session opened for user admin(uid=1000) by LOGIN(uid=0) Jul 08 16:16:10 dom0 audit[12106]: USER_START pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 audit[12106]: CRED_REFR pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 audit[12106]: USER_LOGIN pid=12106 uid=0 auid=1000 ses=7 msg='op=login id=1000 exe="/usr/bin/login" hostname=dom0 addr=? terminal=tty2 res=success' Jul 08 16:16:10 dom0 login[12106]: LOGIN ON tty2 BY admin Jul 08 16:16:10 dom0 kernel: audit: type=1105 audit(1752009370.816:516): pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 kernel: audit: type=1110 audit(1752009370.816:517): pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:16:10 dom0 kernel: audit: type=1112 audit(1752009370.816:518): pid=12106 uid=0 auid=1000 ses=7 msg='op=login id=1000 exe="/usr/bin/login" hostname=dom0 addr=? terminal=tty2 res=success' Jul 08 16:16:10 dom0 audit: BPF prog-id=74 op=LOAD Jul 08 16:16:10 dom0 audit: BPF prog-id=75 op=LOAD Jul 08 16:16:10 dom0 audit: BPF prog-id=76 op=LOAD Jul 08 16:16:10 dom0 kernel: audit: type=1334 audit(1752009370.834:519): prog-id=74 op=LOAD Jul 08 16:16:10 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Jul 08 16:16:10 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service. Jul 08 16:16:10 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:16:11 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:16:40 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 08 16:16:40 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:16:40 dom0 kernel: kauditd_printk_skb: 3 callbacks suppressed Jul 08 16:16:40 dom0 kernel: audit: type=1131 audit(1752009400.914:523): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:16:40 dom0 audit: BPF prog-id=76 op=UNLOAD Jul 08 16:16:40 dom0 audit: BPF prog-id=75 op=UNLOAD Jul 08 16:16:40 dom0 audit: BPF prog-id=74 op=UNLOAD Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:524): prog-id=76 op=UNLOAD Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:525): prog-id=75 op=UNLOAD Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:526): prog-id=74 op=UNLOAD Jul 08 16:17:09 dom0 sudo[13216]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:17:09 dom0 sudo[13216]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:17:09 dom0 audit[13216]: USER_ACCT pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:09 dom0 kernel: audit: type=1101 audit(1752009429.445:527): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:09 dom0 kernel: audit: type=1123 audit(1752009429.445:528): pid=13216 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success' Jul 08 16:17:09 dom0 kernel: audit: type=1110 audit(1752009429.446:529): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:09 dom0 audit[13216]: USER_CMD pid=13216 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success' Jul 08 16:17:09 dom0 audit[13216]: CRED_REFR pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:09 dom0 sudo[13216]: admin : TTY=tty2 ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/journalctl --since=today Jul 08 16:17:09 dom0 kernel: audit: type=1105 audit(1752009429.448:530): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:09 dom0 audit[13216]: USER_START pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:09 dom0 sudo[13216]: pam_unix(sudo:session): session opened for user root(uid=0) by admin(uid=1000) Jul 08 16:17:10 dom0 sudo[13216]: pam_unix(sudo:session): session closed for user root Jul 08 16:17:10 dom0 audit[13216]: USER_END pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:10 dom0 audit[13216]: CRED_DISP pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:10 dom0 kernel: audit: type=1106 audit(1752009430.091:531): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:10 dom0 kernel: audit: type=1104 audit(1752009430.091:532): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:17:33 dom0 systemd[10663]: Starting grub-boot-success.service - Mark boot as successful... Jul 08 16:17:33 dom0 systemd[10663]: Finished grub-boot-success.service - Mark boot as successful. Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0 Jul 08 16:17:34 dom0 xenstored[3342]: write rate limit: not in force recently Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0 Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0 Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0 Jul 08 16:17:42 dom0 sudo[13865]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:17:42 dom0 sudo[13865]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:17:42 dom0 audit[13865]: USER_ACCT pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1101 audit(1752009462.088:533): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1123 audit(1752009462.088:534): pid=13865 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=71766D2D73687574646F776E202D2D666F726365207379732D677569 exe="/usr/bin/sudo" terminal=tty2 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1110 audit(1752009462.089:535): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 audit[13865]: USER_CMD pid=13865 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=71766D2D73687574646F776E202D2D666F726365207379732D677569 exe="/usr/bin/sudo" terminal=tty2 res=success' Jul 08 16:17:42 dom0 audit[13865]: CRED_REFR pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 sudo[13865]: admin : TTY=tty2 ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/qvm-shutdown --force sys-gui Jul 08 16:17:42 dom0 sudo[13865]: pam_unix(sudo:session): session opened for user root(uid=0) by admin(uid=1000) Jul 08 16:17:42 dom0 audit[13865]: USER_START pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1105 audit(1752009462.091:536): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:42 dom0 audit[13865]: USER_END pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 sudo[13865]: pam_unix(sudo:session): session closed for user root Jul 08 16:17:42 dom0 audit[13865]: CRED_DISP pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1106 audit(1752009462.366:537): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1104 audit(1752009462.366:538): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:17:42 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:17:42 dom0 audit[10600]: USER_LOGOUT pid=10600 uid=0 auid=1001 ses=5 msg='op=logout id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1113 audit(1752009462.388:539): pid=10600 uid=0 auid=1001 ses=5 msg='op=logout id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:17:42 dom0 lightdm[10600]: pam_unix(lightdm:session): session closed for user engineer Jul 08 16:17:42 dom0 kernel: audit: type=1106 audit(1752009462.389:540): pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1104 audit(1752009462.390:541): pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:17:42 dom0 audit[10600]: USER_END pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:17:42 dom0 audit[10600]: CRED_DISP pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:17:42 dom0 systemd-logind[3298]: Session 5 logged out. Waiting for processes to exit. Jul 08 16:17:42 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to sys-gui Jul 08 16:17:42 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui Jul 08 16:17:42 dom0 audit[13907]: CRED_ACQ pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:17:42 dom0 kernel: audit: type=1103 audit(1752009462.908:542): pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:17:42 dom0 lightdm[13907]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0) Jul 08 16:17:42 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992. Jul 08 16:17:42 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992... Jul 08 16:17:42 dom0 systemd-logind[3298]: New session c3 of user lightdm. Jul 08 16:17:42 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992. Jul 08 16:17:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:17:42 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992... Jul 08 16:17:42 dom0 (systemd)[13911]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:17:42 dom0 (systemd)[13911]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:17:42 dom0 (systemd)[13911]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Jul 08 16:17:42 dom0 audit[13911]: USER_ACCT pid=13911 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:17:42 dom0 audit[13911]: CRED_ACQ pid=13911 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 08 16:17:42 dom0 audit[13911]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=13911 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Jul 08 16:17:42 dom0 audit: PROCTITLE proctitle="(systemd)" Jul 08 16:17:42 dom0 (systemd)[13911]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0) Jul 08 16:17:42 dom0 audit[13911]: USER_START pid=13911 uid=0 auid=992 ses=8 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:17:43 dom0 systemd[13911]: Queued start job for default target default.target. Jul 08 16:17:43 dom0 systemd[13911]: Created slice app.slice - User Application Slice. Jul 08 16:17:43 dom0 systemd[13911]: Created slice session.slice - User Core Session Slice. Jul 08 16:17:43 dom0 systemd[13911]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system). Jul 08 16:17:43 dom0 systemd[13911]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:17:43 dom0 systemd[13911]: Reached target paths.target - Paths. Jul 08 16:17:43 dom0 systemd[13911]: Reached target timers.target - Timers. Jul 08 16:17:43 dom0 systemd[13911]: Starting dbus.socket - D-Bus User Message Bus Socket... Jul 08 16:17:43 dom0 systemd[13911]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:17:43 dom0 systemd[13911]: Listening on pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:17:43 dom0 systemd[13911]: Listening on ssh-agent.socket - OpenSSH key agent. Jul 08 16:17:43 dom0 systemd[13911]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Jul 08 16:17:43 dom0 systemd[13911]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:17:43 dom0 systemd[13911]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:17:43 dom0 systemd[13911]: Reached target sockets.target - Sockets. Jul 08 16:17:43 dom0 systemd[13911]: Reached target basic.target - Basic System. Jul 08 16:17:43 dom0 systemd[1]: Started user@992.service - User Manager for UID 992. Jul 08 16:17:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:17:43 dom0 systemd[1]: Started session-c3.scope - Session c3 of User lightdm. Jul 08 16:17:43 dom0 systemd[13911]: Started pipewire.service - PipeWire Multimedia Service. Jul 08 16:17:43 dom0 systemd[13911]: Started wireplumber.service - Multimedia Service Session Manager. Jul 08 16:17:43 dom0 audit[13907]: USER_START pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:17:43 dom0 systemd[13911]: Started pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:17:43 dom0 systemd[13911]: Reached target default.target - Main User Target. Jul 08 16:17:43 dom0 systemd[13911]: Startup finished in 645ms. Jul 08 16:17:43 dom0 systemd[13911]: Started dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13936 of process 13936 (/usr/bin/pipewire) owned by '992' high priority at nice level -11. Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13933 of process 13933 (/usr/bin/pipewire) owned by '992' high priority at nice level -11. Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13934 of process 13934 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11. Jul 08 16:17:43 dom0 wireplumber[13934]: Failed to set scheduler settings: Operation not permitted Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13942 of process 13934 (/usr/bin/wireplumber) owned by '992' RT at priority 20. Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13944 of process 13933 (/usr/bin/pipewire) owned by '992' RT at priority 20. Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13945 of process 13936 (/usr/bin/pipewire) owned by '992' RT at priority 20. Jul 08 16:17:43 dom0 wireplumber[13934]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Jul 08 16:17:43 dom0 wireplumber[13934]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=13935 comm="/usr/sbin/lightdm-gtk-greeter") Jul 08 16:17:43 dom0 systemd[13911]: Starting at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Successfully activated service 'org.a11y.Bus' Jul 08 16:17:43 dom0 systemd[13911]: Started at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:17:43 dom0 at-spi-bus-launcher[13967]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored Jul 08 16:17:43 dom0 at-spi-bus-launcher[13967]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored Jul 08 16:17:43 dom0 dbus-broker-launch[13967]: Ready Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=13935 comm="/usr/sbin/lightdm-gtk-greeter") Jul 08 16:17:43 dom0 systemd[13911]: Starting gvfs-daemon.service - Virtual filesystem service... Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Successfully activated service 'org.gtk.vfs.Daemon' Jul 08 16:17:43 dom0 systemd[13911]: Started gvfs-daemon.service - Virtual filesystem service. Jul 08 16:17:43 dom0 wireplumber[13934]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:17:43 dom0 systemd[13911]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry. Jul 08 16:17:43 dom0 lightdm[13997]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:17:43 dom0 lightdm[13997]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:17:43 dom0 systemd[13911]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service. Jul 08 16:17:43 dom0 at-spi2-registryd[13998]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception. Jul 08 16:17:45 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:46 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:46 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:46 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:47 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui Jul 08 16:17:47 dom0 qubesd[4330]: vm.sys-gui: Starting sys-gui Jul 08 16:17:47 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:47 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:48 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:48 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool. Jul 08 16:17:49 dom0 kernel: loop4: detected capacity change from 0 to 1399816 Jul 08 16:17:49 dom0 qubesd[4330]: vm.sys-gui: Setting Qubes DB info for the VM Jul 08 16:17:49 dom0 qubesd[4330]: vm.sys-gui: Starting Qubes DB Jul 08 16:17:49 dom0 audit[14940]: CRED_ACQ pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 kernel: kauditd_printk_skb: 9 callbacks suppressed Jul 08 16:17:49 dom0 kernel: audit: type=1103 audit(1752009469.160:550): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 runuser[14940]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:17:49 dom0 audit[14940]: USER_START pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 kernel: audit: type=1105 audit(1752009469.162:551): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 runuser[14940]: pam_unix(runuser:session): session closed for user admin Jul 08 16:17:49 dom0 audit[14940]: USER_END pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 audit[14940]: CRED_DISP pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 kernel: audit: type=1106 audit(1752009469.167:552): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 kernel: audit: type=1104 audit(1752009469.167:553): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 qubesd[4330]: vm.sys-gui: Activating the sys-gui VM Jul 08 16:17:49 dom0 audit[14959]: CRED_ACQ pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 kernel: audit: type=1103 audit(1752009469.176:554): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 runuser[14959]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0) Jul 08 16:17:49 dom0 kernel: audit: type=1105 audit(1752009469.177:555): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 audit[14959]: USER_START pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Jul 08 16:17:52 dom0 systemd[1]: session-5.scope: Deactivated successfully. Jul 08 16:17:52 dom0 systemd-logind[3298]: Removed session 5. Jul 08 16:17:52 dom0 runuser[14959]: pam_unix(runuser:session): session closed for user admin Jul 08 16:17:52 dom0 audit[14959]: USER_END pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:52 dom0 kernel: audit: type=1106 audit(1752009472.449:556): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:52 dom0 kernel: audit: type=1104 audit(1752009472.449:557): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:52 dom0 audit[14959]: CRED_DISP pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Jul 08 16:17:59 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-gui -> @default: allowed to dom0 Jul 08 16:17:59 dom0 audit: BPF prog-id=77 op=LOAD Jul 08 16:17:59 dom0 kernel: audit: type=1334 audit(1752009479.878:558): prog-id=77 op=LOAD Jul 08 16:17:59 dom0 kernel: audit: type=1334 audit(1752009479.878:559): prog-id=78 op=LOAD Jul 08 16:17:59 dom0 kernel: audit: type=1334 audit(1752009479.878:560): prog-id=79 op=LOAD Jul 08 16:17:59 dom0 audit: BPF prog-id=78 op=LOAD Jul 08 16:17:59 dom0 audit: BPF prog-id=79 op=LOAD Jul 08 16:17:59 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Jul 08 16:17:59 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service. Jul 08 16:17:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:17:59 dom0 kernel: audit: type=1130 audit(1752009479.931:561): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:02 dom0 systemd[1]: Stopping user@1001.service - User Manager for UID 1001... Jul 08 16:18:02 dom0 systemd[10663]: Activating special unit exit.target... Jul 08 16:18:02 dom0 systemd[10663]: Stopped target default.target - Main User Target. Jul 08 16:18:02 dom0 systemd[10663]: Stopping dbus-daemon.service - D-Bus User Message Bus... Jul 08 16:18:02 dom0 systemd[10663]: Stopping pipewire-pulse.service - PipeWire PulseAudio... Jul 08 16:18:02 dom0 systemd[10663]: Stopped dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:18:02 dom0 systemd[10663]: Stopped pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:18:02 dom0 systemd[10663]: Stopping wireplumber.service - Multimedia Service Session Manager... Jul 08 16:18:02 dom0 wireplumber[10676]: stopped by signal: Terminated Jul 08 16:18:02 dom0 wireplumber[10676]: disconnected from pipewire Jul 08 16:18:02 dom0 systemd[10663]: Stopped wireplumber.service - Multimedia Service Session Manager. Jul 08 16:18:02 dom0 systemd[10663]: Stopping pipewire.service - PipeWire Multimedia Service... Jul 08 16:18:02 dom0 systemd[10663]: Stopped pipewire.service - PipeWire Multimedia Service. Jul 08 16:18:02 dom0 systemd[10663]: Removed slice session.slice - User Core Session Slice. Jul 08 16:18:02 dom0 systemd[10663]: Stopped target basic.target - Basic System. Jul 08 16:18:02 dom0 systemd[10663]: Stopped target paths.target - Paths. Jul 08 16:18:02 dom0 systemd[10663]: Stopped target sockets.target - Sockets. Jul 08 16:18:02 dom0 systemd[10663]: Stopped target timers.target - Timers. Jul 08 16:18:02 dom0 systemd[10663]: Stopped grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Jul 08 16:18:02 dom0 systemd[10663]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:18:02 dom0 systemd[10663]: Closed dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:18:02 dom0 systemd[10663]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:18:02 dom0 systemd[10663]: Closed pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:18:02 dom0 systemd[10663]: Closed ssh-agent.socket - OpenSSH key agent. Jul 08 16:18:02 dom0 systemd[10663]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:18:02 dom0 systemd[10663]: Removed slice app.slice - User Application Slice. Jul 08 16:18:02 dom0 systemd[10663]: Reached target shutdown.target - Shutdown. Jul 08 16:18:02 dom0 systemd[10663]: Finished systemd-exit.service - Exit the Session. Jul 08 16:18:02 dom0 systemd[10663]: Reached target exit.target - Exit the Session. Jul 08 16:18:02 dom0 systemd[1]: user@1001.service: Deactivated successfully. Jul 08 16:18:02 dom0 systemd[1]: Stopped user@1001.service - User Manager for UID 1001. Jul 08 16:18:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:02 dom0 systemd[1]: user@1001.service: Consumed 1.017s CPU time. Jul 08 16:18:02 dom0 kernel: audit: type=1131 audit(1752009482.167:562): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:02 dom0 systemd[1]: Stopping user-runtime-dir@1001.service - User Runtime Directory /run/user/1001... Jul 08 16:18:02 dom0 systemd[1]: run-user-1001.mount: Deactivated successfully. Jul 08 16:18:02 dom0 systemd[1]: user-runtime-dir@1001.service: Deactivated successfully. Jul 08 16:18:02 dom0 systemd[1]: Stopped user-runtime-dir@1001.service - User Runtime Directory /run/user/1001. Jul 08 16:18:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:02 dom0 systemd[1]: Removed slice user-1001.slice - User Slice of UID 1001. Jul 08 16:18:02 dom0 systemd[1]: user-1001.slice: Consumed 1.606s CPU time. Jul 08 16:18:02 dom0 kernel: audit: type=1131 audit(1752009482.184:563): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:02 dom0 lightdm[13997]: pam_unix(lightdm:auth): authentication failure; logname= uid=0 euid=0 tty=:0 ruser= rhost= user=engineer Jul 08 16:18:02 dom0 audit[13997]: USER_AUTH pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=? acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=failed' Jul 08 16:18:02 dom0 kernel: audit: type=1100 audit(1752009482.397:564): pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=? acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=failed' Jul 08 16:18:04 dom0 audit[13997]: USER_LOGIN pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=login acct="engineer" exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=failed' Jul 08 16:18:04 dom0 kernel: audit: type=1112 audit(1752009484.827:565): pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=login acct="engineer" exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=failed' Jul 08 16:18:04 dom0 lightdm[15385]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:18:04 dom0 lightdm[15385]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:18:13 dom0 audit[15385]: USER_AUTH pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 audit[15385]: USER_ACCT pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 kernel: audit: type=1100 audit(1752009493.180:566): pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 kernel: audit: type=1101 audit(1752009493.180:567): pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 systemd[1]: Stopping session-c3.scope - Session c3 of User lightdm... Jul 08 16:18:13 dom0 lightdm[13907]: pam_unix(lightdm-greeter:session): session closed for user lightdm Jul 08 16:18:13 dom0 audit[13907]: USER_END pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 audit[13907]: CRED_DISP pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 kernel: audit: type=1106 audit(1752009493.228:568): pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 kernel: audit: type=1104 audit(1752009493.228:569): pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 systemd[1]: session-c3.scope: Deactivated successfully. Jul 08 16:18:13 dom0 systemd[1]: Stopped session-c3.scope - Session c3 of User lightdm. Jul 08 16:18:13 dom0 systemd[1]: session-c3.scope: Consumed 1.383s CPU time. Jul 08 16:18:13 dom0 systemd-logind[3298]: Removed session c3. Jul 08 16:18:13 dom0 audit[15385]: CRED_ACQ pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 audit[15385]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe694016a0 a2=4 a3=7ffe694013b4 items=0 ppid=7963 pid=15385 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:18:13 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230 Jul 08 16:18:13 dom0 kernel: audit: type=1103 audit(1752009493.233:570): pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 kernel: audit: type=1006 audit(1752009493.233:571): pid=15385 uid=0 old-auid=4294967295 auid=1001 tty=(none) old-ses=4294967295 ses=9 res=1 Jul 08 16:18:13 dom0 kernel: audit: type=1300 audit(1752009493.233:571): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe694016a0 a2=4 a3=7ffe694013b4 items=0 ppid=7963 pid=15385 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:18:13 dom0 kernel: audit: type=1327 audit(1752009493.233:571): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230 Jul 08 16:18:13 dom0 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001. Jul 08 16:18:13 dom0 systemd[1]: Starting user-runtime-dir@1001.service - User Runtime Directory /run/user/1001... Jul 08 16:18:13 dom0 systemd-logind[3298]: New session 9 of user engineer. Jul 08 16:18:13 dom0 systemd[1]: Finished user-runtime-dir@1001.service - User Runtime Directory /run/user/1001. Jul 08 16:18:13 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:13 dom0 kernel: audit: type=1130 audit(1752009493.255:572): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:13 dom0 systemd[1]: Starting user@1001.service - User Manager for UID 1001... Jul 08 16:18:13 dom0 (systemd)[15585]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:18:13 dom0 (systemd)[15585]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:18:13 dom0 (systemd)[15585]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Jul 08 16:18:13 dom0 audit[15585]: USER_ACCT pid=15585 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:13 dom0 audit[15585]: CRED_ACQ pid=15585 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 08 16:18:13 dom0 audit[15585]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=15585 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Jul 08 16:18:13 dom0 kernel: audit: type=1101 audit(1752009493.262:573): pid=15585 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:13 dom0 audit: PROCTITLE proctitle="(systemd)" Jul 08 16:18:13 dom0 (systemd)[15585]: pam_unix(systemd-user:session): session opened for user engineer(uid=1001) by (uid=0) Jul 08 16:18:13 dom0 audit[15585]: USER_START pid=15585 uid=0 auid=1001 ses=10 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:13 dom0 systemd[15585]: Queued start job for default target default.target. Jul 08 16:18:13 dom0 systemd[15585]: Created slice app.slice - User Application Slice. Jul 08 16:18:13 dom0 systemd[15585]: Created slice session.slice - User Core Session Slice. Jul 08 16:18:13 dom0 systemd[15585]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Jul 08 16:18:13 dom0 systemd[15585]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:18:13 dom0 systemd[15585]: Reached target paths.target - Paths. Jul 08 16:18:13 dom0 systemd[15585]: Reached target timers.target - Timers. Jul 08 16:18:13 dom0 systemd[15585]: Starting dbus.socket - D-Bus User Message Bus Socket... Jul 08 16:18:13 dom0 systemd[15585]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:18:13 dom0 systemd[15585]: Listening on pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:18:13 dom0 systemd[15585]: Listening on ssh-agent.socket - OpenSSH key agent. Jul 08 16:18:13 dom0 systemd[15585]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Jul 08 16:18:13 dom0 systemd[15585]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:18:13 dom0 systemd[15585]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:18:13 dom0 systemd[15585]: Reached target sockets.target - Sockets. Jul 08 16:18:13 dom0 systemd[15585]: Reached target basic.target - Basic System. Jul 08 16:18:13 dom0 systemd[1]: Started user@1001.service - User Manager for UID 1001. Jul 08 16:18:13 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:13 dom0 systemd[1]: Started session-9.scope - Session 9 of User engineer. Jul 08 16:18:13 dom0 systemd[15585]: Started pipewire.service - PipeWire Multimedia Service. Jul 08 16:18:13 dom0 lightdm[15385]: pam_unix(lightdm:session): session opened for user engineer(uid=1001) by (uid=0) Jul 08 16:18:13 dom0 systemd[15585]: Started wireplumber.service - Multimedia Service Session Manager. Jul 08 16:18:13 dom0 audit[15385]: USER_START pid=15385 uid=0 auid=1001 ses=9 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:18:13 dom0 systemd[15585]: Started pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:18:13 dom0 systemd[15585]: Reached target default.target - Main User Target. Jul 08 16:18:13 dom0 systemd[15585]: Startup finished in 715ms. Jul 08 16:18:13 dom0 audit[15385]: USER_LOGIN pid=15385 uid=0 auid=1001 ses=9 msg='op=login id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:18:13 dom0 systemd[15585]: Started dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15617 of process 15617 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11. Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15637 of process 15617 (/usr/bin/pipewire) owned by '1001' RT at priority 20. Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15618 of process 15618 (/usr/bin/wireplumber) owned by '1001' high priority at nice level -11. Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15619 of process 15619 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11. Jul 08 16:18:14 dom0 wireplumber[15618]: Failed to set scheduler settings: Operation not permitted Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15635 of process 15618 (/usr/bin/wireplumber) owned by '1001' RT at priority 20. Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15638 of process 15619 (/usr/bin/pipewire) owned by '1001' RT at priority 20. Jul 08 16:18:14 dom0 wireplumber[15618]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Jul 08 16:18:14 dom0 wireplumber[15618]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Jul 08 16:18:14 dom0 sudo[15685]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:18:14 dom0 sudo[15685]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:18:14 dom0 audit[15685]: USER_ACCT pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:18:14 dom0 audit[15685]: USER_CMD pid=15685 uid=1001 auid=1001 ses=9 msg='cwd="/home/engineer" cmd=67726570205E7379732D6775693A202F6574632F71756265732D7379732D6775692D757365722D70617373776F726473 exe="/usr/bin/sudo" terminal=? res=success' Jul 08 16:18:14 dom0 sudo[15685]: engineer : PWD=/home/engineer ; USER=root ; COMMAND=/usr/bin/grep ^sys-gui: /etc/qubes-sys-gui-user-passwords Jul 08 16:18:14 dom0 audit[15685]: CRED_REFR pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:18:14 dom0 sudo[15685]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1001) Jul 08 16:18:14 dom0 audit[15685]: USER_START pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:18:14 dom0 sudo[15685]: pam_unix(sudo:session): session closed for user root Jul 08 16:18:14 dom0 audit[15685]: USER_END pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:18:14 dom0 audit[15685]: CRED_DISP pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:18:14 dom0 wireplumber[15618]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:18:17 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui Jul 08 16:18:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+updateable: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:19 dom0 xenstored[3342]: write rate limit: domain 10 is affected Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Index+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:23 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992... Jul 08 16:18:23 dom0 systemd[13911]: Activating special unit exit.target... Jul 08 16:18:23 dom0 systemd[13911]: Stopped target default.target - Main User Target. Jul 08 16:18:23 dom0 dbus-broker[13968]: Dispatched 22 messages @ 6(±7)μs / message. Jul 08 16:18:23 dom0 systemd[13911]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:18:23 dom0 systemd[13911]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service... Jul 08 16:18:23 dom0 gvfsd[13970]: A connection to the bus can't be made Jul 08 16:18:23 dom0 systemd[13911]: Stopping dbus-daemon.service - D-Bus User Message Bus... Jul 08 16:18:23 dom0 systemd[13911]: Stopping gvfs-daemon.service - Virtual filesystem service... Jul 08 16:18:23 dom0 systemd[13911]: Stopping pipewire-pulse.service - PipeWire PulseAudio... Jul 08 16:18:23 dom0 systemd[13911]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service. Jul 08 16:18:23 dom0 systemd[13911]: Stopped gvfs-daemon.service - Virtual filesystem service. Jul 08 16:18:23 dom0 systemd[13911]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:18:23 dom0 systemd[13911]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry. Jul 08 16:18:23 dom0 systemd[13911]: Stopped pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:18:23 dom0 systemd[13911]: Stopping wireplumber.service - Multimedia Service Session Manager... Jul 08 16:18:23 dom0 wireplumber[13934]: stopped by signal: Terminated Jul 08 16:18:23 dom0 wireplumber[13934]: disconnected from pipewire Jul 08 16:18:23 dom0 systemd[13911]: Stopped dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:23 dom0 systemd[13911]: Stopped wireplumber.service - Multimedia Service Session Manager. Jul 08 16:18:23 dom0 systemd[13911]: Stopping pipewire.service - PipeWire Multimedia Service... Jul 08 16:18:23 dom0 systemd[13911]: Stopped pipewire.service - PipeWire Multimedia Service. Jul 08 16:18:23 dom0 systemd[13911]: Removed slice session.slice - User Core Session Slice. Jul 08 16:18:23 dom0 systemd[13911]: Stopped target basic.target - Basic System. Jul 08 16:18:23 dom0 systemd[13911]: Stopped target paths.target - Paths. Jul 08 16:18:23 dom0 systemd[13911]: Stopped target sockets.target - Sockets. Jul 08 16:18:23 dom0 systemd[13911]: Stopped target timers.target - Timers. Jul 08 16:18:23 dom0 systemd[13911]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:18:23 dom0 systemd[13911]: Closed dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:18:23 dom0 systemd[13911]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:18:23 dom0 systemd[13911]: Closed pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:18:23 dom0 systemd[13911]: Closed ssh-agent.socket - OpenSSH key agent. Jul 08 16:18:23 dom0 systemd[13911]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:18:23 dom0 systemd[13911]: Removed slice app.slice - User Application Slice. Jul 08 16:18:23 dom0 systemd[13911]: Reached target shutdown.target - Shutdown. Jul 08 16:18:23 dom0 systemd[13911]: Finished systemd-exit.service - Exit the Session. Jul 08 16:18:23 dom0 systemd[13911]: Reached target exit.target - Exit the Session. Jul 08 16:18:23 dom0 systemd[1]: user@992.service: Deactivated successfully. Jul 08 16:18:23 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992. Jul 08 16:18:23 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:23 dom0 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 08 16:18:23 dom0 kernel: audit: type=1131 audit(1752009503.428:586): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:23 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992... Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 systemd[1]: run-user-992.mount: Deactivated successfully. Jul 08 16:18:23 dom0 systemd[8996]: Created slice background.slice - User Background Tasks Slice. Jul 08 16:18:23 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully. Jul 08 16:18:23 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992. Jul 08 16:18:23 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:23 dom0 kernel: audit: type=1131 audit(1752009503.446:587): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:23 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992. Jul 08 16:18:23 dom0 systemd[1]: user-992.slice: Consumed 2.374s CPU time. Jul 08 16:18:23 dom0 systemd[8996]: Starting systemd-tmpfiles-clean.service - Cleanup of User's Temporary Files and Directories... Jul 08 16:18:23 dom0 systemd[8996]: Finished systemd-tmpfiles-clean.service - Cleanup of User's Temporary Files and Directories. Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-net: allowed to sys-net Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-usb: allowed to sys-usb Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.Stats+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-initial-page: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-sort-running: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:18:44 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 08 16:18:44 dom0 kernel: audit: type=1131 audit(1752009524.226:588): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:44 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:18:44 dom0 audit: BPF prog-id=79 op=UNLOAD Jul 08 16:18:44 dom0 audit: BPF prog-id=78 op=UNLOAD Jul 08 16:18:44 dom0 audit: BPF prog-id=77 op=UNLOAD Jul 08 16:18:44 dom0 kernel: audit: type=1334 audit(1752009524.260:589): prog-id=79 op=UNLOAD Jul 08 16:18:44 dom0 kernel: audit: type=1334 audit(1752009524.260:590): prog-id=78 op=UNLOAD Jul 08 16:18:44 dom0 kernel: audit: type=1334 audit(1752009524.260:591): prog-id=77 op=UNLOAD Jul 08 16:19:04 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:19:21 dom0 sudo[18033]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:19:21 dom0 sudo[18033]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:19:21 dom0 audit[18033]: USER_ACCT pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:19:21 dom0 audit[18033]: USER_CMD pid=18033 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success' Jul 08 16:19:21 dom0 sudo[18033]: admin : TTY=tty2 ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/journalctl --since=today Jul 08 16:19:21 dom0 audit[18033]: CRED_REFR pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:19:21 dom0 kernel: audit: type=1101 audit(1752009561.861:592): pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:19:21 dom0 kernel: audit: type=1123 audit(1752009561.861:593): pid=18033 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success' Jul 08 16:19:21 dom0 kernel: audit: type=1110 audit(1752009561.861:594): pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:19:21 dom0 sudo[18033]: pam_unix(sudo:session): session opened for user root(uid=0) by admin(uid=1000) Jul 08 16:19:21 dom0 kernel: audit: type=1105 audit(1752009561.863:595): pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success' Jul 08 16:19:21 dom0 audit[18033]: USER_START pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'