Surprise! We've been running on hardware provided by BuyVM for a few months and wanted to show them a little appreciation.
Running a paste site comes with unique challenges, ones that aren't always obvious and hard to control. As such, BuyVM offered us a home where we could worry less about the hosting side of things and focus on maintaining a clean and useful service! Go check them out and show them some love!
Submitted on July 8, 2025 at 09:33 PM

New Paste 1 (Text)

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:03 dom0 lightdm[10600]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:03 dom0 lightdm[10600]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:11 dom0 audit[10600]: USER_AUTH pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[10600]: USER_ACCT pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1100 audit(1752009311.008:481): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.008:482): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 systemd[1]: Stopping session-c2.scope - Session c2 of User lightdm...
Jul 08 16:15:11 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session closed for user lightdm
Jul 08 16:15:11 dom0 audit[9818]: USER_END pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1106 audit(1752009311.059:483): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1104 audit(1752009311.059:484): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[9818]: CRED_DISP pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Deactivated successfully.
Jul 08 16:15:11 dom0 systemd[1]: Stopped session-c2.scope - Session c2 of User lightdm.
Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Consumed 1.791s CPU time.
Jul 08 16:15:11 dom0 systemd-logind[3298]: Removed session c2.
Jul 08 16:15:11 dom0 audit[10600]: CRED_ACQ pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[10600]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234
Jul 08 16:15:11 dom0 kernel: audit: type=1103 audit(1752009311.065:485): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1006 audit(1752009311.065:486): pid=10600 uid=0 old-auid=4294967295 auid=1001 tty=(none) old-ses=4294967295 ses=5 res=1
Jul 08 16:15:11 dom0 kernel: audit: type=1300 audit(1752009311.065:486): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:15:11 dom0 kernel: audit: type=1327 audit(1752009311.065:486): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234
Jul 08 16:15:11 dom0 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001.
Jul 08 16:15:11 dom0 systemd[1]: Starting user-runtime-dir@1001.service - User Runtime Directory /run/user/1001...
Jul 08 16:15:11 dom0 systemd-logind[3298]: New session 5 of user engineer.
Jul 08 16:15:11 dom0 systemd[1]: Finished user-runtime-dir@1001.service - User Runtime Directory /run/user/1001.
Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1130 audit(1752009311.087:487): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 systemd[1]: Starting user@1001.service - User Manager for UID 1001...
Jul 08 16:15:11 dom0 (systemd)[10663]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:11 dom0 (systemd)[10663]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:11 dom0 (systemd)[10663]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:15:11 dom0 audit[10663]: USER_ACCT pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 audit[10663]: CRED_ACQ pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:15:11 dom0 audit[10663]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=10663 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=6 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.095:488): pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:15:11 dom0 audit[10663]: USER_START pid=10663 uid=0 auid=1001 ses=6 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 (systemd)[10663]: pam_unix(systemd-user:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:15:11 dom0 systemd[10663]: Queued start job for default target default.target.
Jul 08 16:15:11 dom0 systemd[10663]: Created slice app.slice - User Application Slice.
Jul 08 16:15:11 dom0 systemd[10663]: Created slice session.slice - User Core Session Slice.
Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 systemd[10663]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
Jul 08 16:15:11 dom0 systemd[10663]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target paths.target - Paths.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target timers.target - Timers.
Jul 08 16:15:11 dom0 systemd[10663]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:15:11 dom0 audit[10600]: USER_START pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 lightdm[10600]: pam_unix(lightdm:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:15:11 dom0 audit[10600]: USER_LOGIN pid=10600 uid=0 auid=1001 ses=5 msg='op=login id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:15:11 dom0 systemd[10663]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:15:11 dom0 systemd[10663]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:15:11 dom0 systemd[10663]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:15:11 dom0 systemd[10663]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target sockets.target - Sockets.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target basic.target - Basic System.
Jul 08 16:15:11 dom0 systemd[1]: Started user@1001.service - User Manager for UID 1001.
Jul 08 16:15:11 dom0 systemd[1]: Started session-5.scope - Session 5 of User engineer.
Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:15:11 dom0 systemd[10663]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target default.target - Main User Target.
Jul 08 16:15:11 dom0 systemd[10663]: Startup finished in 638ms.
Jul 08 16:15:11 dom0 systemd[10663]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10676 of process 10676 (/usr/bin/wireplumber) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10677 of process 10677 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10693 of process 10676 (/usr/bin/wireplumber) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10696 of process 10677 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 wireplumber[10676]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10675 of process 10675 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10695 of process 10675 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 wireplumber[10676]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:15:11 dom0 wireplumber[10676]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:15:11 dom0 audit: BPF prog-id=71 op=LOAD
Jul 08 16:15:11 dom0 audit: BPF prog-id=72 op=LOAD
Jul 08 16:15:11 dom0 audit: BPF prog-id=73 op=LOAD
Jul 08 16:15:11 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:15:12 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:15:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 wireplumber[10676]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:15:12 dom0 sudo[10743]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:12 dom0 sudo[10743]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:12 dom0 audit[10743]: USER_ACCT pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 audit[10743]: USER_CMD pid=10743 uid=1001 auid=1001 ses=5 msg='cwd="/home/engineer" cmd=67726570205E7379732D6775693A202F6574632F71756265732D7379732D6775692D757365722D70617373776F726473 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: engineer : PWD=/home/engineer ; USER=root ; COMMAND=/usr/bin/grep ^sys-gui: /etc/qubes-sys-gui-user-passwords
Jul 08 16:15:12 dom0 audit[10743]: CRED_REFR pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1001)
Jul 08 16:15:12 dom0 audit[10743]: USER_START pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session closed for user root
Jul 08 16:15:12 dom0 audit[10743]: USER_END pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 audit[10743]: CRED_DISP pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qubesd[4330]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated
Jul 08 16:15:15 dom0 qubesd[4330]: ignoring /etc/qubes-rpc/policy/include (not a file)
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+updateable: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 xenstored[3342]: write rate limit: domain 5 is affected
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Index+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992...
Jul 08 16:15:21 dom0 systemd[9822]: Activating special unit exit.target...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target default.target - Main User Target.
Jul 08 16:15:21 dom0 dbus-broker[9863]: Dispatched 22 messages @ 6(±7)μs / message.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service...
Jul 08 16:15:21 dom0 gvfsd[9865]: A connection to the bus can't be made
Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-daemon.service - D-Bus User Message Bus...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire-pulse.service - PipeWire PulseAudio...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping wireplumber.service - Multimedia Service Session Manager...
Jul 08 16:15:21 dom0 wireplumber[9839]: stopped by signal: Terminated
Jul 08 16:15:21 dom0 wireplumber[9839]: disconnected from pipewire
Jul 08 16:15:21 dom0 systemd[9822]: Stopped wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire.service - PipeWire Multimedia Service...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire.service - PipeWire Multimedia Service.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice session.slice - User Core Session Slice.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target basic.target - Basic System.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target paths.target - Paths.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target sockets.target - Sockets.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target timers.target - Timers.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:15:21 dom0 systemd[9822]: Closed dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:15:21 dom0 systemd[9822]: Closed ssh-agent.socket - OpenSSH key agent.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app.slice - User Application Slice.
Jul 08 16:15:21 dom0 systemd[9822]: Reached target shutdown.target - Shutdown.
Jul 08 16:15:21 dom0 systemd[9822]: Finished systemd-exit.service - Exit the Session.
Jul 08 16:15:21 dom0 systemd[9822]: Reached target exit.target - Exit the Session.
Jul 08 16:15:21 dom0 systemd[1]: user@992.service: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992.
Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 kernel: kauditd_printk_skb: 18 callbacks suppressed
Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.174:505): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:15:21 dom0 systemd[1]: run-user-992.mount: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.197:506): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992.
Jul 08 16:15:21 dom0 systemd[1]: user-992.slice: Consumed 2.751s CPU time.
Jul 08 16:15:21 dom0 systemd[8996]: Starting grub-boot-success.service - Mark boot as successful...
Jul 08 16:15:21 dom0 systemd[8996]: Finished grub-boot-success.service - Mark boot as successful.
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-net: allowed to sys-net
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-usb: allowed to sys-usb
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.Stats+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@1.service.
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified
Jul 08 16:15:26 dom0 at-spi2-registr[11516]: Could not open X display
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified
Jul 08 16:15:26 dom0 at-spi2-registr[11516]: AT-SPI: Cannot open default display
Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Main process exited, code=exited, status=1/FAILURE
Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Failed with result 'exit-code'.
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to sys-gui
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-initial-page: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-sort-running: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:15:42 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:15:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:42 dom0 kernel: audit: type=1131 audit(1752009342.054:507): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:42 dom0 audit: BPF prog-id=73 op=UNLOAD
Jul 08 16:15:42 dom0 audit: BPF prog-id=72 op=UNLOAD
Jul 08 16:15:42 dom0 audit: BPF prog-id=71 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:508): prog-id=73 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:509): prog-id=72 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:510): prog-id=71 op=UNLOAD