Surprise! We've been running on hardware provided by BuyVM for a few months and wanted to show them a little appreciation.
Running a paste site comes with unique challenges, ones that aren't always obvious and hard to control. As such, BuyVM offered us a home where we could worry less about the hosting side of things and focus on maintaining a clean and useful service! Go check them out and show them some love!
Submitted on July 8, 2025 at 09:24 PM

greplogs.txt (Text)

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053
Jul 08 16:12:23 dom0 kernel: Linux version 6.12.25-1.qubes.fc37.x86_64 (mockbuild@f5c1036f3e904c71ab30b706d129fc9f) (gcc (GCC) 12.3.1 20230508 (Red Hat 12.3.1-1), GNU ld version 2.38-27.fc37) #1 SMP PREEMPT_DYNAMIC Mon Apr 28 03:58:25 GMT 2025
Jul 08 16:12:23 dom0 kernel: Command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: TSC doesn't count with P0 frequency!
Jul 08 16:12:23 dom0 kernel: Released 0 page(s)
Jul 08 16:12:23 dom0 kernel: BIOS-provided physical RAM map:
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000000000-0x000000000007ffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000080000-0x00000000000fffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000100000-0x0000000009afffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009b00000-0x0000000009dfffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009e00000-0x0000000009efffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009f00000-0x0000000009f3bfff] ACPI NVS
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009f3c000-0x0000000049b5ffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000049b60000-0x000000004bd5ffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd60000-0x000000004bd68fff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd69000-0x000000004bd6cfff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd6d000-0x000000004bd6efff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd6f000-0x000000004bd6ffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd70000-0x0000000057f7efff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000057f7f000-0x000000005a77efff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005a77f000-0x000000005af7efff] ACPI NVS
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005af7f000-0x000000005affefff] ACPI data
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005afff000-0x000000005affffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005b000000-0x000000005bffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005d790000-0x000000005d7effff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005d7f5000-0x000000005fffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000c0200000-0x00000000c0203fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000c0300000-0x00000000c03fffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec00000-0x00000000fec01fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec10000-0x00000000fec10fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec20000-0x00000000fec20fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fed80000-0x00000000fed81fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000100000000-0x00000001aa640fff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000001020000000-0x00000010c01fffff] reserved
Jul 08 16:12:23 dom0 kernel: NX (Execute Disable) protection: active
Jul 08 16:12:23 dom0 kernel: APIC: Static calls initialized
Jul 08 16:12:23 dom0 kernel: efi: EFI v2.9 by INSYDE Corp.
Jul 08 16:12:23 dom0 kernel: efi: ACPI=0x5affe000 ACPI 2.0=0x5affe014 TPMFinalLog=0x5af3f000 SMBIOS=0x58e77000 SMBIOS 3.0=0x58e74000 (MEMATTR=0x52c7d018 unusable) ESRT=0x5af94018 
Jul 08 16:12:23 dom0 kernel: SMBIOS 3.6.0 present.
Jul 08 16:12:23 dom0 kernel: DMI: Framework Laptop 16 (AMD Ryzen 7040 Series)/FRANMZCP07, BIOS 03.03 03/27/2024
Jul 08 16:12:23 dom0 kernel: DMI: Memory slots populated: 2/2
Jul 08 16:12:23 dom0 kernel: Hypervisor detected: Xen PV
Jul 08 16:12:23 dom0 kernel: Xen PV: Detected 8 vCPUS
Jul 08 16:12:23 dom0 kernel: tsc: Fast TSC calibration using PIT
Jul 08 16:12:23 dom0 kernel: tsc: Detected 3792.840 MHz processor
Jul 08 16:12:23 dom0 kernel: tsc: Detected 3792.862 MHz TSC
Jul 08 16:12:23 dom0 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Jul 08 16:12:23 dom0 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Jul 08 16:12:23 dom0 kernel: last_pfn = 0x1aa641 max_arch_pfn = 0x400000000
Jul 08 16:12:23 dom0 kernel: MTRR map: 3 entries (0 fixed + 3 variable; max 16), built from 8 variable MTRRs
Jul 08 16:12:23 dom0 kernel: MTRRs set to read-only
Jul 08 16:12:23 dom0 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Jul 08 16:12:23 dom0 kernel: last_pfn = 0x5b000 max_arch_pfn = 0x400000000
Jul 08 16:12:23 dom0 kernel: esrt: Reserving ESRT space from 0x000000005af94018 to 0x000000005af94050.
Jul 08 16:12:23 dom0 kernel: Secure boot disabled
Jul 08 16:12:23 dom0 kernel: RAMDISK: [mem 0x04000000-0x08336fff]
Jul 08 16:12:23 dom0 kernel: ACPI: Early table checksum verification disabled
Jul 08 16:12:23 dom0 kernel: ACPI: RSDP 0x000000005AFFE014 000024 (v02 INSYDE)
Jul 08 16:12:23 dom0 kernel: ACPI: XSDT 0x000000005AFAA228 0001A4 (v01 INSYDE EDK2     00000002      01000013)
Jul 08 16:12:23 dom0 kernel: ACPI: FACP 0x000000005AFEE000 00010C (v05 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: DSDT 0x000000005AFDE000 009ADE (v02 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: FACS 0x000000005AEB1000 000040
Jul 08 16:12:23 dom0 kernel: ACPI: UEFI 0x000000005AF67000 0001CF (v01 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF4000 008416 (v02 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF3000 00033E (v01 INSYDE EDK2     00001000 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF1000 000ABD (v02 INSYDE EDK2     00001000 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: ASF! 0x000000005AFF0000 0000A5 (v32 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: BOOT 0x000000005AFEF000 000028 (v01 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: HPET 0x000000005AFED000 000038 (v01 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: APIC 0x000000005AFEC000 000138 (v03 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: MCFG 0x000000005AFEB000 00003C (v01 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SLIC 0x000000005AFEA000 000176 (v01 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: VFCT 0x000000005AFD9000 004284 (v01 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFD8000 0000F8 (v02 INSYDE EDK2     00001000 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFD2000 00547E (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: CRAT 0x000000005AFD1000 000F10 (v01 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: CDIT 0x000000005AFD0000 000029 (v01 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCF000 000F8D (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCE000 000F41 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFFD000 0008CD (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCB000 001E78 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCA000 00077A (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC9000 000737 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC7000 0015C8 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC4000 002AAB (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFBA000 0098F6 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: FPDT 0x000000005AFB9000 000044 (v01 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: BGRT 0x000000005AFB8000 000038 (v01 INSYDE EDK2     00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: WSMT 0x000000005AFB7000 000028 (v01 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: TPM2 0x000000005AFE9000 000050 (v05 INSYDE EDK2     20505348 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB4000 002370 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: MHSP 0x000000005AFE8000 0000C8 (v04 INSYDE EDK2     20505348 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB3000 0000E5 (v02 INSYDE EDK2     00000004 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: IVRS 0x000000005AFB2000 000198 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB1000 000C44 (v01 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB0000 00074A (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAF000 000C3A (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAE000 00074A (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAD000 000C3A (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAC000 000A3A (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAB000 000057 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFA8000 001743 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCD000 000FF7 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF9E000 0098BD (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF99000 004FEB (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF98000 000D41 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF97000 000968 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF96000 00008D (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF95000 000FF5 (v02 INSYDE EDK2     00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FACP table memory at [mem 0x5afee000-0x5afee10b]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving DSDT table memory at [mem 0x5afde000-0x5afe7add]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FACS table memory at [mem 0x5aeb1000-0x5aeb103f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving UEFI table memory at [mem 0x5af67000-0x5af671ce]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff4000-0x5affc415]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff3000-0x5aff333d]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff1000-0x5aff1abc]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving ASF! table memory at [mem 0x5aff0000-0x5aff00a4]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving BOOT table memory at [mem 0x5afef000-0x5afef027]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving HPET table memory at [mem 0x5afed000-0x5afed037]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving APIC table memory at [mem 0x5afec000-0x5afec137]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving MCFG table memory at [mem 0x5afeb000-0x5afeb03b]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SLIC table memory at [mem 0x5afea000-0x5afea175]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving VFCT table memory at [mem 0x5afd9000-0x5afdd283]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afd8000-0x5afd80f7]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afd2000-0x5afd747d]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving CRAT table memory at [mem 0x5afd1000-0x5afd1f0f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving CDIT table memory at [mem 0x5afd0000-0x5afd0028]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcf000-0x5afcff8c]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afce000-0x5afcef40]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5affd000-0x5affd8cc]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcb000-0x5afcce77]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afca000-0x5afca779]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc9000-0x5afc9736]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc7000-0x5afc85c7]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc4000-0x5afc6aaa]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afba000-0x5afc38f5]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FPDT table memory at [mem 0x5afb9000-0x5afb9043]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving BGRT table memory at [mem 0x5afb8000-0x5afb8037]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving WSMT table memory at [mem 0x5afb7000-0x5afb7027]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving TPM2 table memory at [mem 0x5afe9000-0x5afe904f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb4000-0x5afb636f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving MHSP table memory at [mem 0x5afe8000-0x5afe80c7]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb3000-0x5afb30e4]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving IVRS table memory at [mem 0x5afb2000-0x5afb2197]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb1000-0x5afb1c43]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb0000-0x5afb0749]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afaf000-0x5afafc39]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afae000-0x5afae749]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afad000-0x5afadc39]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afac000-0x5afaca39]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afab000-0x5afab056]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afa8000-0x5afa9742]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcd000-0x5afcdff6]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af9e000-0x5afa78bc]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af99000-0x5af9dfea]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af98000-0x5af98d40]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af97000-0x5af97967]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af96000-0x5af9608c]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af95000-0x5af95ff4]
Jul 08 16:12:23 dom0 kernel: APIC: Switched APIC routing to: Xen PV
Jul 08 16:12:23 dom0 kernel: NUMA turned off
Jul 08 16:12:23 dom0 kernel: Faking a node at [mem 0x0000000000000000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel: NODE_DATA(0) allocated [mem 0x5777d2c0-0x577a7fff]
Jul 08 16:12:23 dom0 kernel: Zone ranges:
Jul 08 16:12:23 dom0 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Jul 08 16:12:23 dom0 kernel:   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Jul 08 16:12:23 dom0 kernel:   Normal   [mem 0x0000000100000000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel:   Device   empty
Jul 08 16:12:23 dom0 kernel: Movable zone start for each node
Jul 08 16:12:23 dom0 kernel: Early memory node ranges
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x0000000000001000-0x000000000007ffff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x0000000000100000-0x0000000009afffff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x0000000009e00000-0x0000000009efffff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x0000000009f3c000-0x0000000049b5ffff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x000000004bd60000-0x000000004bd68fff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x000000004bd6d000-0x000000004bd6efff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x000000004bd70000-0x0000000057f7efff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x000000005afff000-0x000000005affffff]
Jul 08 16:12:23 dom0 kernel:   node   0: [mem 0x0000000100000000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA: 128 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 768 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 60 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 8704 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 4 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 1 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 12416 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone Normal: 20480 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone Normal: 22975 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: p2m virtual area at (____ptrval____), size is 40000000
Jul 08 16:12:23 dom0 kernel: Remapped 697921 page(s)
Jul 08 16:12:23 dom0 kernel: Remapped 0 non-RAM page(s)
Jul 08 16:12:23 dom0 kernel: ACPI: PM-Timer IO Port: 0x408
Jul 08 16:12:23 dom0 kernel: CPU topo: CPU limit of 8 reached. Ignoring further CPUs
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: IOAPIC[0]: apic_id 33, version 33, address 0xfec00000, GSI 0-23
Jul 08 16:12:23 dom0 kernel: IOAPIC[1]: apic_id 34, version 33, address 0xfec01000, GSI 24-55
Jul 08 16:12:23 dom0 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Jul 08 16:12:23 dom0 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level)
Jul 08 16:12:23 dom0 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Jul 08 16:12:23 dom0 kernel: ACPI: HPET id: 0x10228210 base: 0xfed00000
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. logical packages:   1
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. logical dies:       1
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. dies per package:   1
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. threads per core:   1
Jul 08 16:12:23 dom0 kernel: CPU topo: Num. cores per package:     8
Jul 08 16:12:23 dom0 kernel: CPU topo: Num. threads per package:   8
Jul 08 16:12:23 dom0 kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs
Jul 08 16:12:23 dom0 kernel: CPU topo: Rejected CPUs 8
Jul 08 16:12:23 dom0 kernel: [mem 0x60000000-0xc01fffff] available for PCI devices
Jul 08 16:12:23 dom0 kernel: Booting kernel on Xen
Jul 08 16:12:23 dom0 kernel: Xen version: 4.17.5 (preserve-AD)
Jul 08 16:12:23 dom0 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Jul 08 16:12:23 dom0 kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1
Jul 08 16:12:23 dom0 kernel: percpu: Embedded 88 pages/cpu s237568 r8192 d114688 u524288
Jul 08 16:12:23 dom0 kernel: pcpu-alloc: s237568 r8192 d114688 u524288 alloc=1*2097152
Jul 08 16:12:23 dom0 kernel: pcpu-alloc: [0] 0 1 2 3 [0] 4 5 6 7 
Jul 08 16:12:23 dom0 kernel: xen: PV spinlocks enabled
Jul 08 16:12:23 dom0 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Kernel command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 kernel: fips mode: disabled
Jul 08 16:12:23 dom0 kernel: Unknown kernel command line parameters "placeholder x86_64 rhgb boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d", will be passed to user space.
Jul 08 16:12:23 dom0 kernel: random: crng init done
Jul 08 16:12:23 dom0 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Fallback order for Node 0: 0 
Jul 08 16:12:23 dom0 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 1048575
Jul 08 16:12:23 dom0 kernel: Policy zone: Normal
Jul 08 16:12:23 dom0 kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:on
Jul 08 16:12:23 dom0 kernel: mem auto-init: clearing system memory may take some time...
Jul 08 16:12:23 dom0 kernel: software IO TLB: area num 8.
Jul 08 16:12:23 dom0 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1
Jul 08 16:12:23 dom0 kernel: ftrace: allocating 59429 entries in 233 pages
Jul 08 16:12:23 dom0 kernel: ftrace: allocated 233 pages with 5 groups
Jul 08 16:12:23 dom0 kernel: Dynamic Preempt: full
Jul 08 16:12:23 dom0 kernel: rcu: Preemptible hierarchical RCU implementation.
Jul 08 16:12:23 dom0 kernel: rcu:         RCU event tracing is enabled.
Jul 08 16:12:23 dom0 kernel: rcu:         RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel:         Trampoline variant of Tasks RCU enabled.
Jul 08 16:12:23 dom0 kernel:         Rude variant of Tasks RCU enabled.
Jul 08 16:12:23 dom0 kernel:         Tracing variant of Tasks RCU enabled.
Jul 08 16:12:23 dom0 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Jul 08 16:12:23 dom0 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8
Jul 08 16:12:23 dom0 kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel: NR_IRQS: 524544, nr_irqs: 1032, preallocated irqs: 16
Jul 08 16:12:23 dom0 kernel: xen:events: Using FIFO-based ABI
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=1 -> irq=1 (gsi=1)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=2 -> irq=2 (gsi=2)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=3 -> irq=3 (gsi=3)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=4 -> irq=4 (gsi=4)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=5 -> irq=5 (gsi=5)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=6 -> irq=6 (gsi=6)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=7 -> irq=7 (gsi=7)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=8 -> irq=8 (gsi=8)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=9 -> irq=9 (gsi=9)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=10 -> irq=10 (gsi=10)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=11 -> irq=11 (gsi=11)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=12 -> irq=12 (gsi=12)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=13 -> irq=13 (gsi=13)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=14 -> irq=14 (gsi=14)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=15 -> irq=15 (gsi=15)
Jul 08 16:12:23 dom0 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
Jul 08 16:12:23 dom0 kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____)
Jul 08 16:12:23 dom0 kernel: Console: colour dummy device 80x25
Jul 08 16:12:23 dom0 kernel: printk: legacy console [tty0] enabled
Jul 08 16:12:23 dom0 kernel: printk: legacy console [hvc0] enabled
Jul 08 16:12:23 dom0 kernel: ACPI: Core revision 20240827
Jul 08 16:12:23 dom0 kernel: ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0xC3, should be 0x0C (20240827/utcksum-58)
Jul 08 16:12:23 dom0 kernel: clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Jul 08 16:12:23 dom0 kernel: Xen: using vcpuop timer interface
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 0
Jul 08 16:12:23 dom0 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6d58014d282, max_idle_ns: 881590509159 ns
Jul 08 16:12:23 dom0 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7585.72 BogoMIPS (lpj=3792862)
Jul 08 16:12:23 dom0 kernel: Last level iTLB entries: 4KB 512, 2MB 512, 4MB 256
Jul 08 16:12:23 dom0 kernel: Last level dTLB entries: 4KB 3072, 2MB 3072, 4MB 1536, 1GB 0
Jul 08 16:12:23 dom0 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Jul 08 16:12:23 dom0 kernel: Spectre V2 : Mitigation: Retpolines
Jul 08 16:12:23 dom0 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Jul 08 16:12:23 dom0 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Jul 08 16:12:23 dom0 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Jul 08 16:12:23 dom0 kernel: Speculative Store Bypass: Vulnerable
Jul 08 16:12:23 dom0 kernel: Speculative Return Stack Overflow: Mitigation: Safe RET
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[5]:  832, xstate_sizes[5]:   64
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[6]:  896, xstate_sizes[6]:  512
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024
Jul 08 16:12:23 dom0 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format.
Jul 08 16:12:23 dom0 kernel: Freeing SMP alternatives memory: 52K
Jul 08 16:12:23 dom0 kernel: pid_max: default: 32768 minimum: 301
Jul 08 16:12:23 dom0 kernel: LSM: initializing lsm=lockdown,capability,yama,ima,evm
Jul 08 16:12:23 dom0 kernel: Yama: becoming mindful.
Jul 08 16:12:23 dom0 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: cpu 0 spinlock event irq 57
Jul 08 16:12:23 dom0 kernel: VPMU disabled by hypervisor.
Jul 08 16:12:23 dom0 kernel: Performance Events: PMU not available due to virtualization, using software events only.
Jul 08 16:12:23 dom0 kernel: signal: max sigframe size: 3376
Jul 08 16:12:23 dom0 kernel: rcu: Hierarchical SRCU implementation.
Jul 08 16:12:23 dom0 kernel: rcu:         Max phase no-delay instances is 400.
Jul 08 16:12:23 dom0 kernel: Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level
Jul 08 16:12:23 dom0 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Jul 08 16:12:23 dom0 kernel: smp: Bringing up secondary CPUs ...
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 1
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 2
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 3
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 4
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 5
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 6
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 7
Jul 08 16:12:23 dom0 kernel: cpu 1 spinlock event irq 97
Jul 08 16:12:23 dom0 kernel: cpu 2 spinlock event irq 98
Jul 08 16:12:23 dom0 kernel: cpu 3 spinlock event irq 99
Jul 08 16:12:23 dom0 kernel: cpu 4 spinlock event irq 100
Jul 08 16:12:23 dom0 kernel: cpu 5 spinlock event irq 101
Jul 08 16:12:23 dom0 kernel: cpu 6 spinlock event irq 102
Jul 08 16:12:23 dom0 kernel: cpu 7 spinlock event irq 103
Jul 08 16:12:23 dom0 kernel: smp: Brought up 1 node, 8 CPUs
Jul 08 16:12:23 dom0 kernel: Memory: 3897752K/4194300K available (20480K kernel code, 4361K rwdata, 10052K rodata, 5588K init, 5944K bss, 283168K reserved, 0K cma-reserved)
Jul 08 16:12:23 dom0 kernel: devtmpfs: initialized
Jul 08 16:12:23 dom0 kernel: x86/mm: Memory block size: 128MB
Jul 08 16:12:23 dom0 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x09f00000-0x09f3bfff] (245760 bytes)
Jul 08 16:12:23 dom0 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x5a77f000-0x5af7efff] (8388608 bytes)
Jul 08 16:12:23 dom0 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Jul 08 16:12:23 dom0 kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear)
Jul 08 16:12:23 dom0 kernel: pinctrl core: initialized pinctrl subsystem
Jul 08 16:12:23 dom0 kernel: PM: RTC time: 21:12:22, date: 2025-07-08
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Jul 08 16:12:23 dom0 kernel: xen:grant_table: Grant tables using version 1 layout
Jul 08 16:12:23 dom0 kernel: Grant table initialized
Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations
Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Jul 08 16:12:23 dom0 kernel: audit: initializing netlink subsys (disabled)
Jul 08 16:12:23 dom0 kernel: audit: type=2000 audit(1752009143.568:1): state=initialized audit_enabled=0 res=1
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'fair_share'
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'bang_bang'
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'step_wise'
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'user_space'
Jul 08 16:12:23 dom0 kernel: Simple Boot Flag at 0x44 set to 0x1
Jul 08 16:12:23 dom0 kernel: PCI: ECAM [mem 0xe0000000-0xefffffff] (base 0xe0000000) for domain 0000 [bus 00-ff]
Jul 08 16:12:23 dom0 kernel: PCI: Using configuration type 1 for base access
Jul 08 16:12:23 dom0 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Jul 08 16:12:23 dom0 kernel: cryptd: max_cpu_qlen set to 1000
Jul 08 16:12:23 dom0 kernel: raid6: skipped pq benchmark and selected avx512x4
Jul 08 16:12:23 dom0 kernel: raid6: using avx512x2 recovery algorithm
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Module Device)
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Processor Device)
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Jul 08 16:12:23 dom0 kernel: ACPI: 32 ACPI AML tables successfully acquired and loaded
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 9 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: ACPI: USB4 _OSC: OS supports USB3+ DisplayPort+ PCIe+ XDomain+
Jul 08 16:12:23 dom0 kernel: ACPI: USB4 _OSC: OS controls USB3+ DisplayPort+ PCIe+ XDomain+
Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC started
Jul 08 16:12:23 dom0 kernel: ACPI: EC: interrupt blocked
Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: Boot DSDT EC used to handle transactions
Jul 08 16:12:23 dom0 kernel: ACPI: Interpreter enabled
Jul 08 16:12:23 dom0 kernel: ACPI: PM: (supports S0 S5)
Jul 08 16:12:23 dom0 kernel: ACPI: Using IOAPIC for interrupt routing
Jul 08 16:12:23 dom0 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Jul 08 16:12:23 dom0 kernel: PCI: Ignoring E820 reservations for host bridge windows
Jul 08 16:12:23 dom0 kernel: ACPI: Enabled 3 GPEs in block 00 to 1F
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP1.P0NV: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP6.PWSR: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP8.P0NV: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP11.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP11.SWUS.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP12.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP12.SWUS.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.VGA_.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.ACP_.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.AZAL.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.HDAU.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.XHC0.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.XHC1.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC2.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.NHI0.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC3.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.NHI1.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC4.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PRWL: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PRWB: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3]
Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER]
Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME PCIeCapability LTR DPC]
Jul 08 16:12:23 dom0 kernel: PCI host bridge to bus 0000:00
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000cffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000effff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x60000000-0x90cfffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xf0000000-0xfec00000 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfed45000-0xfed814ff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfed81900-0xfed81fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfedc0000-0xfedc0fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfedc6000-0xfedc6fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x10c0200000-0x891fffffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:00.0: [1022:14e8] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:00.2: [1022:14e9] type 00 class 0x080600 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: [1022:14ed] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2:   bridge window [mem 0x90c00000-0x90cfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: [1022:14ee] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2:   bridge window [mem 0x90b00000-0x90bfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2:   bridge window [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: [1022:14ee] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4:   bridge window [mem 0x90a00000-0x90afffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: [1022:14ef] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1:   bridge window [io  0x6000-0x9fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1:   bridge window [mem 0x78000000-0x8fffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1:   bridge window [mem 0x7800000000-0x87ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: [1022:14ef] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1:   bridge window [io  0x2000-0x5fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1:   bridge window [mem 0x60000000-0x77ffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1:   bridge window [mem 0x6800000000-0x77ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: [1022:14eb] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1:   bridge window [io  0x1000-0x1fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1:   bridge window [mem 0x90000000-0x905fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1:   bridge window [mem 0x8800000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: [1022:14eb] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2:   bridge window [mem 0x90900000-0x909fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2:   bridge window [mem 0x8810800000-0x88108fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: [1022:14eb] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3:   bridge window [mem 0x90600000-0x908fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:14.0: [1022:790b] type 00 class 0x0c0500 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:14.3: [1022:790e] type 00 class 0x060100 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.0: [1022:14f0] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.1: [1022:14f1] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.2: [1022:14f2] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.3: [1022:14f3] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.4: [1022:14f4] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.5: [1022:14f5] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.6: [1022:14f6] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.7: [1022:14f7] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:01:00.0: [15b7:5042] type 00 class 0x010802 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:01:00.0: BAR 0 [mem 0x90c00000-0x90c03fff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01]
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: [14c3:0616] type 00 class 0x028000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: BAR 0 [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: BAR 2 [mem 0x90b00000-0x90b07fff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02]
Jul 08 16:12:23 dom0 kernel: pci 0000:03:00.0: [15b7:5017] type 00 class 0x010802 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:03:00.0: BAR 0 [mem 0x90a00000-0x90a03fff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: [1002:15bf] type 00 class 0x030000 PCIe Legacy Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 0 [mem 0x8800000000-0x880fffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 2 [mem 0x90000000-0x901fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 4 [io  0x1000-0x10ff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 5 [mem 0x90500000-0x9057ffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: PME# supported from D1 D2 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: [1002:1640] type 00 class 0x040300 PCIe Legacy Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: BAR 0 [mem 0x905c8000-0x905cbfff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: PME# supported from D1 D2 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: [1022:15c7] type 00 class 0x108000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: BAR 2 [mem 0x90400000-0x904fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: BAR 5 [mem 0x905cc000-0x905cdfff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: [1022:15b9] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: BAR 0 [mem 0x90200000-0x902fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: [1022:15ba] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: BAR 0 [mem 0x90300000-0x903fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: [1022:15e2] type 00 class 0x048000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: BAR 0 [mem 0x90580000-0x905bffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: BAR 2 [mem 0x8810000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: [1022:15e3] type 00 class 0x040300 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: BAR 0 [mem 0x905c0000-0x905c7fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: [1022:14ec] type 00 class 0x130000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: PME# supported from D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: [1022:1502] type 00 class 0x118000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 0 [mem 0x90900000-0x9097ffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 1 [mem 0x909c0000-0x909c1fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 2 [mem 0x8810800000-0x881083ffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 4 [mem 0x90980000-0x909bffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.0: [1022:14ec] type 00 class 0x130000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.0: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: [1022:15c0] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: BAR 0 [mem 0x90600000-0x906fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: [1022:15c1] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: BAR 0 [mem 0x90700000-0x907fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: [1022:1668] type 00 class 0x0c0340 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: BAR 0 [mem 0x90800000-0x9087ffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: Max Payload Size set to 128 (was 256, max 256)
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: [1022:1669] type 00 class 0x0c0340 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: BAR 0 [mem 0x90880000-0x908fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: Max Payload Size set to 128 (was 256, max 256)
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4]
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 8 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 13 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKA disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKB disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKC disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKD disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKE disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKF disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKG disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKH disabled
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 7 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 10 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 6 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 50 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=50 -> irq=50 (gsi=50)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 51 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=51 -> irq=51 (gsi=51)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 52 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=52 -> irq=52 (gsi=52)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 53 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=53 -> irq=53 (gsi=53)
Jul 08 16:12:23 dom0 kernel: Low-power S0 idle used by default for system suspend
Jul 08 16:12:23 dom0 kernel: ACPI: EC: interrupt unblocked
Jul 08 16:12:23 dom0 kernel: ACPI: EC: event unblocked
Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 08 16:12:23 dom0 kernel: ACPI: EC: GPE=0xb
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: Boot DSDT EC initialization complete
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: EC: Used to handle transactions and events
Jul 08 16:12:23 dom0 kernel: xen:balloon: Initialising balloon driver
Jul 08 16:12:23 dom0 kernel: iommu: Default domain type: Translated
Jul 08 16:12:23 dom0 kernel: iommu: DMA domain TLB invalidation policy: lazy mode
Jul 08 16:12:23 dom0 kernel: SCSI subsystem initialized
Jul 08 16:12:23 dom0 kernel: libata version 3.00 loaded.
Jul 08 16:12:23 dom0 kernel: ACPI: bus type USB registered
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbfs
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver hub
Jul 08 16:12:23 dom0 kernel: usbcore: registered new device driver usb
Jul 08 16:12:23 dom0 kernel: pps_core: LinuxPPS API ver. 1 registered
Jul 08 16:12:23 dom0 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Jul 08 16:12:23 dom0 kernel: PTP clock support registered
Jul 08 16:12:23 dom0 kernel: EDAC MC: Ver: 3.0.0
Jul 08 16:12:23 dom0 kernel: efivars: Registered efivars operations
Jul 08 16:12:23 dom0 kernel: NetLabel: Initializing
Jul 08 16:12:23 dom0 kernel: NetLabel:  domain hash size = 128
Jul 08 16:12:23 dom0 kernel: NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
Jul 08 16:12:23 dom0 kernel: NetLabel:  unlabeled traffic allowed by default
Jul 08 16:12:23 dom0 kernel: mctp: management component transport protocol core
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_MCTP protocol family
Jul 08 16:12:23 dom0 kernel: PCI: Using ACPI for IRQ routing
Jul 08 16:12:23 dom0 kernel: PCI: pci_cache_line_size set to 64 bytes
Jul 08 16:12:23 dom0 kernel: resource: Expanded resource Reserved due to conflict with PCI Bus 0000:00
Jul 08 16:12:23 dom0 kernel: resource: Expanded resource Reserved due to conflict with PCI Bus 0000:00
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x09b00000-0x0bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x09f00000-0x0bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x49b60000-0x4bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x4bd69000-0x4bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x4bd6f000-0x4bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x57f7f000-0x57ffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x5b000000-0x5bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x1aa641000-0x1abffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: setting as boot VGA device
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: bridge control possible
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none
Jul 08 16:12:23 dom0 kernel: vgaarb: loaded
Jul 08 16:12:23 dom0 kernel: clocksource: Switched to clocksource tsc-early
Jul 08 16:12:23 dom0 kernel: VFS: Disk quotas dquot_6.6.0
Jul 08 16:12:23 dom0 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jul 08 16:12:23 dom0 kernel: hugetlbfs: disabling because there are no supported hugepage sizes
Jul 08 16:12:23 dom0 kernel: pnp: PnP ACPI init
Jul 08 16:12:23 dom0 kernel: system 00:00: [mem 0xfec00000-0xfec01fff] could not be reserved
Jul 08 16:12:23 dom0 kernel: system 00:00: [mem 0xfee00000-0xfee00fff] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x0400-0x04cf] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x04d0-0x04d1] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x04d6] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x0c00-0x0c01] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x0c14] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x0c50-0x0c52] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x0c6c] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x0c6f] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io  0x0cd0-0x0cdb] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:03: [mem 0x000e0000-0x000fffff] could not be reserved
Jul 08 16:12:23 dom0 kernel: system 00:03: [mem 0xfe000000-0xffffffff] could not be reserved
Jul 08 16:12:23 dom0 kernel: pnp: PnP ACPI: found 4 devices
Jul 08 16:12:23 dom0 kernel: PM-Timer failed consistency check  (0xffffff) - aborting.
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_INET protocol family
Jul 08 16:12:23 dom0 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear)
Jul 08 16:12:23 dom0 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Jul 08 16:12:23 dom0 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear)
Jul 08 16:12:23 dom0 kernel: TCP bind hash table entries: 16384 (order: 7, 524288 bytes, linear)
Jul 08 16:12:23 dom0 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Jul 08 16:12:23 dom0 kernel: MPTCP token hash table entries: 2048 (order: 3, 49152 bytes, linear)
Jul 08 16:12:23 dom0 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_XDP protocol family
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2:   bridge window [mem 0x90c00000-0x90cfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2:   bridge window [mem 0x90b00000-0x90bfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2:   bridge window [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4:   bridge window [mem 0x90a00000-0x90afffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1:   bridge window [io  0x6000-0x9fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1:   bridge window [mem 0x78000000-0x8fffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1:   bridge window [mem 0x7800000000-0x87ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1:   bridge window [io  0x2000-0x5fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1:   bridge window [mem 0x60000000-0x77ffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1:   bridge window [mem 0x6800000000-0x77ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1:   bridge window [io  0x1000-0x1fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1:   bridge window [mem 0x90000000-0x905fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1:   bridge window [mem 0x8800000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2:   bridge window [mem 0x90900000-0x909fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2:   bridge window [mem 0x8810800000-0x88108fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3:   bridge window [mem 0x90600000-0x908fffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 7 [mem 0x000c0000-0x000cffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 8 [mem 0x000d0000-0x000effff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 9 [mem 0x60000000-0x90cfffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 10 [mem 0xf0000000-0xfec00000 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 11 [mem 0xfed45000-0xfed814ff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 12 [mem 0xfed81900-0xfed81fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 13 [mem 0xfedc0000-0xfedc0fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 14 [mem 0xfedc6000-0xfedc6fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 15 [mem 0x10c0200000-0x891fffffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:01: resource 1 [mem 0x90c00000-0x90cfffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:02: resource 1 [mem 0x90b00000-0x90bfffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:02: resource 2 [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:03: resource 1 [mem 0x90a00000-0x90afffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 0 [io  0x6000-0x9fff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 1 [mem 0x78000000-0x8fffffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 2 [mem 0x7800000000-0x87ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 0 [io  0x2000-0x5fff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 1 [mem 0x60000000-0x77ffffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 2 [mem 0x6800000000-0x77ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 0 [io  0x1000-0x1fff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 1 [mem 0x90000000-0x905fffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 2 [mem 0x8800000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c3: resource 1 [mem 0x90900000-0x909fffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c3: resource 2 [mem 0x8810800000-0x88108fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c4: resource 1 [mem 0x90600000-0x908fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: D0 power state depends on 0000:c2:00.0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=40 -> irq=40 (gsi=40)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=37 -> irq=37 (gsi=37)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=38 -> irq=38 (gsi=38)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: Already setup the GSI :40
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=46 -> irq=46 (gsi=46)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 47 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=47 -> irq=47 (gsi=47)
Jul 08 16:12:23 dom0 kernel: PCI: CLS 64 bytes, default 64
Jul 08 16:12:23 dom0 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Jul 08 16:12:23 dom0 kernel: software IO TLB: mapped [mem 0x00000001a5d00000-0x00000001a9d00000] (64MB)
Jul 08 16:12:23 dom0 kernel: Trying to unpack rootfs image as initramfs...
Jul 08 16:12:23 dom0 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6d58014d282, max_idle_ns: 881590509159 ns
Jul 08 16:12:23 dom0 kernel: clocksource: Switched to clocksource tsc
Jul 08 16:12:23 dom0 kernel: Initialise system trusted keyrings
Jul 08 16:12:23 dom0 kernel: Key type blacklist registered
Jul 08 16:12:23 dom0 kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0
Jul 08 16:12:23 dom0 kernel: zbud: loaded
Jul 08 16:12:23 dom0 kernel: integrity: Platform Keyring initialized
Jul 08 16:12:23 dom0 kernel: integrity: Machine keyring initialized
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_ALG protocol family
Jul 08 16:12:23 dom0 kernel: xor: automatically using best checksumming function   avx       
Jul 08 16:12:23 dom0 kernel: Key type asymmetric registered
Jul 08 16:12:23 dom0 kernel: Asymmetric key parser 'x509' registered
Jul 08 16:12:23 dom0 kernel: Freeing initrd memory: 68828K
Jul 08 16:12:23 dom0 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 245)
Jul 08 16:12:23 dom0 kernel: io scheduler mq-deadline registered
Jul 08 16:12:23 dom0 kernel: io scheduler kyber registered
Jul 08 16:12:23 dom0 kernel: io scheduler bfq registered
Jul 08 16:12:23 dom0 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:01.2: PME: Signaling with IRQ 114
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 115
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 116
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:03.1: PME: Signaling with IRQ 117
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:04.1: PME: Signaling with IRQ 118
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.1: PME: Signaling with IRQ 119
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: Already setup the GSI :40
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.2: PME: Signaling with IRQ 120
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.3: PME: Signaling with IRQ 121
Jul 08 16:12:23 dom0 kernel: ACPI: AC: AC Adapter [ACAD] (on-line)
Jul 08 16:12:23 dom0 kernel: input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:4c/PNP0C09:00/PNP0C0D:00/input/input0
Jul 08 16:12:23 dom0 kernel: ACPI: button: Lid Switch [LID0]
Jul 08 16:12:23 dom0 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1
Jul 08 16:12:23 dom0 kernel: ACPI: button: Power Button [PWRB]
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:00: registered as thermal_zone0
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ00] (34 C)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:01: registered as thermal_zone1
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ01] (35 C)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:02: registered as thermal_zone2
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ02] (36 C)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:03: registered as thermal_zone3
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ03] (76 C)
Jul 08 16:12:23 dom0 kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled
Jul 08 16:12:23 dom0 kernel: ACPI: battery: Slot [BAT1] (battery present)
Jul 08 16:12:23 dom0 kernel: hpet_acpi_add: no address or irqs in _CRS
Jul 08 16:12:23 dom0 kernel: Non-volatile memory driver v1.3
Jul 08 16:12:23 dom0 kernel: Linux agpgart interface v0.103
Jul 08 16:12:23 dom0 kernel: ACPI: bus type drm_connector registered
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbserial_generic
Jul 08 16:12:23 dom0 kernel: usbserial: USB Serial support registered for generic
Jul 08 16:12:23 dom0 kernel: i8042: PNP: No PS/2 controller found.
Jul 08 16:12:23 dom0 kernel: mousedev: PS/2 mouse device common for all mice
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: RTC can wake from S4
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: registered as rtc0
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: setting system clock to 2025-07-08T21:12:23 UTC (1752009143)
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: alarms up to one month, 114 bytes nvram
Jul 08 16:12:23 dom0 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Jul 08 16:12:23 dom0 kernel: device-mapper: uevent: version 1.0.3
Jul 08 16:12:23 dom0 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@lists.linux.dev
Jul 08 16:12:23 dom0 kernel: amd_pstate: The CPPC feature is supported but currently disabled by the BIOS.
Jul 08 16:12:23 dom0 kernel: amd_pstate: failed to enable driver mode(3)
Jul 08 16:12:23 dom0 kernel: sysfb: VRAM smaller than advertised
Jul 08 16:12:23 dom0 kernel: efifb: probing for efifb
Jul 08 16:12:23 dom0 kernel: efifb: No BGRT, not showing boot graphics
Jul 08 16:12:23 dom0 kernel: efifb: framebuffer at 0x8800000000, using 16000k, total 16000k
Jul 08 16:12:23 dom0 kernel: efifb: mode is 2560x1600x32, linelength=10240, pages=1
Jul 08 16:12:23 dom0 kernel: efifb: scrolling: redraw
Jul 08 16:12:23 dom0 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Jul 08 16:12:23 dom0 kernel: fbcon: Deferring console take-over
Jul 08 16:12:23 dom0 kernel: fb0: EFI VGA frame buffer device
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 36 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=36 -> irq=36 (gsi=36)
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee: ring init command failed (0x00000005)
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee: failed to init ring buffer
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee initialization failed
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: psp initialization failed
Jul 08 16:12:23 dom0 kernel: hid: raw HID events driver (C) Jiri Kosina
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbhid
Jul 08 16:12:23 dom0 kernel: usbhid: USB HID core driver
Jul 08 16:12:23 dom0 kernel: drop_monitor: Initializing network drop monitor service
Jul 08 16:12:23 dom0 kernel: Initializing XFRM netlink socket
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_INET6 protocol family
Jul 08 16:12:23 dom0 kernel: Segment Routing with IPv6
Jul 08 16:12:23 dom0 kernel: RPL Segment Routing with IPv6
Jul 08 16:12:23 dom0 kernel: In-situ OAM (IOAM) with IPv6
Jul 08 16:12:23 dom0 kernel: mip6: Mobile IPv6
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_PACKET protocol family
Jul 08 16:12:23 dom0 kernel: IPI shorthand broadcast: enabled
Jul 08 16:12:23 dom0 kernel: AES CTR mode by8 optimization enabled
Jul 08 16:12:23 dom0 kernel: sched_clock: Marking stable (1208001675, 35867577)->(1247018130, -3148878)
Jul 08 16:12:23 dom0 kernel: registered taskstats version 1
Jul 08 16:12:23 dom0 kernel: Loading compiled-in X.509 certificates
Jul 08 16:12:23 dom0 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 79131dced0910c4fab17a743e3691ded82cfbb73'
Jul 08 16:12:23 dom0 kernel: Demotion targets for Node 0: null
Jul 08 16:12:23 dom0 kernel: page_owner is disabled
Jul 08 16:12:23 dom0 kernel: Key type .fscrypt registered
Jul 08 16:12:23 dom0 kernel: Key type fscrypt-provisioning registered
Jul 08 16:12:23 dom0 kernel: Btrfs loaded, zoned=yes, fsverity=yes
Jul 08 16:12:23 dom0 kernel: Key type big_key registered
Jul 08 16:12:23 dom0 kernel: Key type trusted registered
Jul 08 16:12:23 dom0 kernel: Key type encrypted registered
Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53'
Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4'
Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'frame.work-LaptopAMDDB: 02'
Jul 08 16:12:23 dom0 kernel: Loading compiled-in module X.509 certificates
Jul 08 16:12:23 dom0 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 79131dced0910c4fab17a743e3691ded82cfbb73'
Jul 08 16:12:23 dom0 kernel: ima: Allocated hash algorithm: sha256
Jul 08 16:12:23 dom0 kernel: ima: No architecture policies found
Jul 08 16:12:23 dom0 kernel: evm: Initialising EVM extended attributes:
Jul 08 16:12:23 dom0 kernel: evm: security.selinux
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64 (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64EXEC (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64TRANSMUTE (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64MMAP (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.apparmor
Jul 08 16:12:23 dom0 kernel: evm: security.ima
Jul 08 16:12:23 dom0 kernel: evm: security.capability
Jul 08 16:12:23 dom0 kernel: evm: HMAC attrs: 0x1
Jul 08 16:12:23 dom0 kernel: alg: No test for 842 (842-scomp)
Jul 08 16:12:23 dom0 kernel: alg: No test for 842 (842-generic)
Jul 08 16:12:23 dom0 kernel: PM:   Magic number: 1:5:247
Jul 08 16:12:23 dom0 kernel: gpio gpiochip0: hash matches
Jul 08 16:12:23 dom0 kernel: RAS: Correctable Errors collector initialized.
Jul 08 16:12:23 dom0 kernel: clk: Disabling unused clocks
Jul 08 16:12:23 dom0 kernel: PM: genpd: Disabling unused power domains
Jul 08 16:12:23 dom0 kernel: Freeing unused decrypted memory: 2028K
Jul 08 16:12:23 dom0 kernel: Freeing unused kernel image (initmem) memory: 5588K
Jul 08 16:12:23 dom0 kernel: Write protecting the kernel read-only data: 30720k
Jul 08 16:12:23 dom0 kernel: Freeing unused kernel image (rodata/data gap) memory: 188K
Jul 08 16:12:23 dom0 kernel: Run /init as init process
Jul 08 16:12:23 dom0 kernel:   with arguments:
Jul 08 16:12:23 dom0 kernel:     /init
Jul 08 16:12:23 dom0 kernel:     placeholder
Jul 08 16:12:23 dom0 kernel:     x86_64
Jul 08 16:12:23 dom0 kernel:     rhgb
Jul 08 16:12:23 dom0 kernel:   with environment:
Jul 08 16:12:23 dom0 kernel:     HOME=/
Jul 08 16:12:23 dom0 kernel:     TERM=linux
Jul 08 16:12:23 dom0 kernel:     boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Jul 08 16:12:23 dom0 systemd[1]: Detected virtualization vm-other.
Jul 08 16:12:23 dom0 systemd[1]: Detected architecture x86-64.
Jul 08 16:12:23 dom0 systemd[1]: Running in initial RAM disk.
Jul 08 16:12:23 dom0 systemd[1]: Hostname set to <dom0>.
Jul 08 16:12:23 dom0 systemd[1]: Failed to open libbpf, cgroup BPF features disabled: Operation not supported
Jul 08 16:12:23 dom0 systemd[1]: Queued start job for default target initrd.target.
Jul 08 16:12:23 dom0 systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Slice /system/systemd-cryptsetup.
Jul 08 16:12:23 dom0 systemd[1]: Reached target initrd-usr-fs.target - Initrd /usr File System.
Jul 08 16:12:23 dom0 systemd[1]: Reached target local-fs.target - Local File Systems.
Jul 08 16:12:23 dom0 systemd[1]: Reached target slices.target - Slice Units.
Jul 08 16:12:23 dom0 systemd[1]: Reached target swap.target - Swaps.
Jul 08 16:12:23 dom0 systemd[1]: Reached target timers.target - Timer Units.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log).
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald.socket - Journal Socket.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
Jul 08 16:12:23 dom0 systemd[1]: Reached target sockets.target - Socket Units.
Jul 08 16:12:23 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
Jul 08 16:12:23 dom0 systemd[1]: memstrack.service - Memstrack Anylazing Service was skipped because all trigger condition checks failed.
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-journald.service - Journal Service...
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console...
Jul 08 16:12:23 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.798:2): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: alua: device handler registered
Jul 08 16:12:23 dom0 kernel: emc: device handler registered
Jul 08 16:12:23 dom0 kernel: rdac: device handler registered
Jul 08 16:12:23 dom0 kernel: xen:xen_evtchn: Event-channel device installed
Jul 08 16:12:23 dom0 kernel: xen_pciback: backend is vpci
Jul 08 16:12:23 dom0 kernel: xen_acpi_processor: Uploading Xen processor PM info
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.810:3): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd-journald[341]: Journal started
Jul 08 16:12:23 dom0 systemd-journald[341]: Runtime Journal (/run/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 8.0M, max 77.8M, 69.8M free.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Module 'msr' is built in
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'dm_multipath'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'uinput'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_alua'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_emc'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_rdac'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_evtchn'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_gntdev'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_gntalloc'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_blkback'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_pciback'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_privcmd'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_acpi_processor'
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
Jul 08 16:12:23 dom0 systemd[1]: Started systemd-journald.service - Journal Service.
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.858:4): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.858:5): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd[1]: dracut-cmdline-ask.service - dracut ask for additional cmdline parameters was skipped because all trigger condition checks failed.
Jul 08 16:12:23 dom0 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook...
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.864:6): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.868:7): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 dracut-cmdline[360]: dracut-4.2 (R4.2) dracut-059-5.fc37
Jul 08 16:12:23 dom0 dracut-cmdline[360]: Using kernel command line parameters:    placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 kernel: pciback 0000:02:00.0: xen_pciback: seizing device
Jul 08 16:12:24 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:24 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:24 dom0 kernel: pcieport 0000:00:02.2: unlocked secondary bus reset via: __pci_reset_function_locked+0x49/0x90
Jul 08 16:12:24 dom0 dracut-cmdline[360]: Restricting USB in dom0 via usbguard.
Jul 08 16:12:24 dom0 systemd[1]: Reloading.
Jul 08 16:12:24 dom0 audit: BPF prog-id=6 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=3 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=7 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=8 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=4 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=5 op=UNLOAD
Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.203:8): prog-id=6 op=LOAD
Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.203:9): prog-id=3 op=UNLOAD
Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.204:10): prog-id=7 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=9 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=10 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=11 op=LOAD
Jul 08 16:12:24 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon...
Jul 08 16:12:24 dom0 usbguard-daemon[456]: [1752009144.238] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF!
Jul 08 16:12:24 dom0 systemd[1]: Started usbguard.service - USBGuard daemon.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd-escape[495]: Input 'luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d' is not an absolute file system path, escaping is likely not going to be reversible.
Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook...
Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit: BPF prog-id=12 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=13 op=LOAD
Jul 08 16:12:24 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
Jul 08 16:12:24 dom0 systemd-udevd[553]: Using default interface naming scheme 'v251'.
Jul 08 16:12:24 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook...
Jul 08 16:12:24 dom0 kernel: tpm tpm0: auth session is active
Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
Jul 08 16:12:24 dom0 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe.
Jul 08 16:12:24 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs...
Jul 08 16:12:24 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook...
Jul 08 16:12:24 dom0 systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen...
Jul 08 16:12:24 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Jul 08 16:12:24 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System...
Jul 08 16:12:24 dom0 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System.
Jul 08 16:12:24 dom0 systemd[1]: Received SIGRTMIN+20 from PID 670 (plymouthd).
Jul 08 16:12:24 dom0 systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:24 dom0 systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch.
Jul 08 16:12:24 dom0 systemd[1]: Reached target paths.target - Path Units.
Jul 08 16:12:24 dom0 systemd[1]: Reloading.
Jul 08 16:12:24 dom0 kernel: sp5100_tco: SP5100/SB800 TCO WatchDog Timer Driver
Jul 08 16:12:24 dom0 kernel: sp5100-tco sp5100-tco: Using 0xfeb00000 for watchdog MMIO address
Jul 08 16:12:24 dom0 kernel: sp5100-tco sp5100-tco: initialized. heartbeat=60 sec (nowayout=0)
Jul 08 16:12:24 dom0 kernel: input: PIXA3854:00 093A:0274 Mouse as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input2
Jul 08 16:12:24 dom0 kernel: input: PIXA3854:00 093A:0274 Touchpad as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input3
Jul 08 16:12:24 dom0 kernel: hid-generic 0018:093A:0274.0001: input,hidraw0: I2C HID v1.00 Mouse [PIXA3854:00 093A:0274] on i2c-PIXA3854:00
Jul 08 16:12:24 dom0 audit: BPF prog-id=14 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=6 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=15 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=16 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=7 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=8 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=17 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=18 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=12 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=13 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=19 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=9 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=20 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=21 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=10 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=11 op=UNLOAD
Jul 08 16:12:24 dom0 kernel: hid-generic 0018:32AC:001B.0002: hidraw1: I2C HID v1.00 Device [FRMW0003:00 32AC:001B] on i2c-FRMW0003:00
Jul 08 16:12:24 dom0 kernel: nvme 0000:01:00.0: platform quirk: setting simple suspend
Jul 08 16:12:25 dom0 kernel: nvme 0000:03:00.0: platform quirk: setting simple suspend
Jul 08 16:12:25 dom0 kernel: nvme nvme0: pci function 0000:01:00.0
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 28 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: ACPI: video: Video Device [VGA] (multi-head: yes  rom: no  post: no)
Jul 08 16:12:25 dom0 kernel: nvme nvme1: pci function 0000:03:00.0
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 42 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:17/LNXVIDEO:00/input/input4
Jul 08 16:12:25 dom0 kernel: xen: --> pirq=28 -> irq=28 (gsi=28)
Jul 08 16:12:25 dom0 kernel: xen: --> pirq=42 -> irq=42 (gsi=42)
Jul 08 16:12:25 dom0 kernel: hid-sensor-hub 0018:32AC:001B.0002: hidraw1: I2C HID v1.00 Device [FRMW0003:00 32AC:001B] on i2c-FRMW0003:00
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: new USB bus registered, assigned bus number 1
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: hcc params 0x0128ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: new USB bus registered, assigned bus number 2
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb1: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb1: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb1: SerialNumber: 0000:c2:00.3
Jul 08 16:12:25 dom0 kernel: hub 1-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 1-0:1.0: 5 ports detected
Jul 08 16:12:25 dom0 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb2: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb2: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb2: SerialNumber: 0000:c2:00.3
Jul 08 16:12:25 dom0 kernel: hub 2-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 2-0:1.0: 2 ports detected
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: new USB bus registered, assigned bus number 3
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: new USB bus registered, assigned bus number 4
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb3: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb3: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb3: SerialNumber: 0000:c2:00.4
Jul 08 16:12:25 dom0 kernel: hub 3-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 3-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: usb usb4: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb4: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb4: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb4: SerialNumber: 0000:c2:00.4
Jul 08 16:12:25 dom0 kernel: hub 4-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 4-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: new USB bus registered, assigned bus number 5
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: new USB bus registered, assigned bus number 6
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb5: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb5: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb5: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb5: SerialNumber: 0000:c4:00.3
Jul 08 16:12:25 dom0 kernel: hub 5-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 5-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: usb usb6: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb6: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb6: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb6: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb6: SerialNumber: 0000:c4:00.3
Jul 08 16:12:25 dom0 kernel: hub 6-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 6-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 47 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :47
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: new USB bus registered, assigned bus number 7
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: new USB bus registered, assigned bus number 8
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb7: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb7: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb7: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb7: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb7: SerialNumber: 0000:c4:00.4
Jul 08 16:12:25 dom0 kernel: hub 7-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 7-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: usb usb8: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb8: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb8: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb8: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb8: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb8: SerialNumber: 0000:c4:00.4
Jul 08 16:12:25 dom0 kernel: hub 8-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 8-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: nvme nvme0: allocated 32 MiB host memory buffer.
Jul 08 16:12:25 dom0 kernel: nvme nvme1: allocated 32 MiB host memory buffer.
Jul 08 16:12:25 dom0 kernel: nvme nvme0: 8/0/0 default/read/poll queues
Jul 08 16:12:25 dom0 kernel: input: PIXA3854:00 093A:0274 Mouse as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input5
Jul 08 16:12:25 dom0 kernel: input: PIXA3854:00 093A:0274 Touchpad as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input6
Jul 08 16:12:25 dom0 kernel: hid-multitouch 0018:093A:0274.0001: input,hidraw0: I2C HID v1.00 Mouse [PIXA3854:00 093A:0274] on i2c-PIXA3854:00
Jul 08 16:12:25 dom0 kernel: nvme nvme1: 8/0/0 default/read/poll queues
Jul 08 16:12:25 dom0 kernel:  nvme0n1: p1 p2 p3
Jul 08 16:12:25 dom0 kernel:  nvme1n1: p1 p2 p3
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:25 dom0 kernel: block device autoloading is deprecated and will be removed.
Jul 08 16:12:25 dom0 kernel: block device autoloading is deprecated and will be removed.
Jul 08 16:12:25 dom0 kernel: usb 1-2: new high-speed USB device number 2 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 3-1: new high-speed USB device number 2 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 1-2: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=34.04
Jul 08 16:12:25 dom0 kernel: usb 1-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 1-2: Product: USB2.1 Hub
Jul 08 16:12:25 dom0 kernel: usb 1-2: Manufacturer: GenesysLogic
Jul 08 16:12:25 dom0 kernel: usb 1-2: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: usb 3-1: New USB device found, idVendor=0bda, idProduct=5634, bcdDevice= 0.21
Jul 08 16:12:25 dom0 kernel: usb 3-1: New USB device strings: Mfr=3, Product=1, SerialNumber=2
Jul 08 16:12:25 dom0 kernel: usb 3-1: Product: Laptop Camera
Jul 08 16:12:25 dom0 kernel: usb 3-1: Manufacturer: Generic
Jul 08 16:12:25 dom0 kernel: usb 3-1: SerialNumber: 200901010001
Jul 08 16:12:25 dom0 kernel: usb 3-1: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: unknown error 0
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5)
Jul 08 16:12:25 dom0 kernel: usb 2-2: new SuperSpeed Plus Gen 2x1 USB device number 2 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 2-2: New USB device found, idVendor=05e3, idProduct=0625, bcdDevice=34.04
Jul 08 16:12:25 dom0 kernel: usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 2-2: Product: USB3.2 Hub
Jul 08 16:12:25 dom0 kernel: usb 2-2: Manufacturer: GenesysLogic
Jul 08 16:12:25 dom0 kernel: usb 2-2: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: usb 1-3: new high-speed USB device number 3 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 1-3: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=61.60
Jul 08 16:12:25 dom0 kernel: usb 1-3: New USB device strings: Mfr=0, Product=1, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 1-3: Product: USB2.0 Hub
Jul 08 16:12:25 dom0 kernel: usb 1-3: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: unknown error 0
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5)
Jul 08 16:12:25 dom0 kernel: usb 1-4: new high-speed USB device number 4 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 1-4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=61.60
Jul 08 16:12:25 dom0 kernel: usb 1-4: New USB device strings: Mfr=0, Product=1, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 1-4: Product: USB2.0 Hub
Jul 08 16:12:25 dom0 kernel: usb 1-4: Device is not authorized for usage
Jul 08 16:12:26 dom0 kernel: usb 1-5: new high-speed USB device number 5 using xhci_hcd
Jul 08 16:12:26 dom0 kernel: usb 1-5: New USB device found, idVendor=0e8d, idProduct=e616, bcdDevice= 1.00
Jul 08 16:12:26 dom0 kernel: usb 1-5: New USB device strings: Mfr=5, Product=6, SerialNumber=7
Jul 08 16:12:26 dom0 kernel: usb 1-5: Product: Wireless_Device
Jul 08 16:12:26 dom0 kernel: usb 1-5: Manufacturer: MediaTek Inc.
Jul 08 16:12:26 dom0 kernel: usb 1-5: SerialNumber: 000000000
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 kernel: usb 1-5: Device is not authorized for usage
Jul 08 16:12:26 dom0 kernel: hub 1-2:1.0: USB hub found
Jul 08 16:12:26 dom0 kernel: hub 1-2:1.0: 4 ports detected
Jul 08 16:12:26 dom0 kernel: usb 1-2: authorized to connect
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" target="block" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=626C6F636B20696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 kernel: hub 2-2:1.0: USB hub found
Jul 08 16:12:26 dom0 kernel: hub 2-2:1.0: 3 ports detected
Jul 08 16:12:26 dom0 kernel: usb 2-2: authorized to connect
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" target="allow" device_rule=626C6F636B20696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 kernel: hub 1-3:1.0: USB hub found
Jul 08 16:12:26 dom0 kernel: hub 1-3:1.0: 3 ports detected
Jul 08 16:12:26 dom0 kernel: md/raid1:md127: active with 2 out of 2 mirrors
Jul 08 16:12:26 dom0 kernel: md/raid1:md126: active with 2 out of 2 mirrors
Jul 08 16:12:26 dom0 kernel: md126: detected capacity change from 0 to 4188160
Jul 08 16:12:26 dom0 kernel: md127: detected capacity change from 0 to 970215424
Jul 08 16:12:26 dom0 kernel: [drm] amdgpu kernel modesetting enabled.
Jul 08 16:12:26 dom0 kernel: amdgpu: Virtual CRAT table created for CPU
Jul 08 16:12:26 dom0 kernel: amdgpu: Topology: Add CPU node
Jul 08 16:12:26 dom0 kernel: ucsi_acpi USBC000:00: unknown error 256
Jul 08 16:12:26 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5)
Jul 08 16:12:26 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:26 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:26 dom0 kernel: [drm] initializing kernel modesetting (IP DISCOVERY 0x1002:0x15BF 0xF111:0x0005 0xC2).
Jul 08 16:12:26 dom0 kernel: [drm] register mmio base: 0x90500000
Jul 08 16:12:26 dom0 kernel: [drm] register mmio size: 524288
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 0 <soc21_common>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 1 <gmc_v11_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 2 <ih_v6_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 3 <psp>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 4 <smu>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 5 <dm>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 6 <gfx_v11_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 7 <sdma_v6_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 8 <vcn_v4_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 9 <jpeg_v4_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 10 <mes_v11_0>
Jul 08 16:12:26 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Fetched VBIOS from VFCT
Jul 08 16:12:27 dom0 kernel: amdgpu: ATOM BIOS: 113-PHXGENERIC-001
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: vgaarb: deactivate vga console
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Trusted Memory Zone (TMZ) feature enabled
Jul 08 16:12:27 dom0 kernel: [drm] vm size is 262144 GB, 4 levels, block size is 9-bit, fragment size is 9-bit
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: VRAM: 2048M 0x0000008000000000 - 0x000000807FFFFFFF (2048M used)
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: GART: 512M 0x00007FFF00000000 - 0x00007FFF1FFFFFFF
Jul 08 16:12:27 dom0 kernel: [drm] Detected VRAM RAM=2048M, BAR=2048M
Jul 08 16:12:27 dom0 kernel: [drm] RAM width 128bits DDR5
Jul 08 16:12:27 dom0 kernel: usb 1-3: authorized to connect
Jul 08 16:12:27 dom0 kernel: hub 1-4:1.0: USB hub found
Jul 08 16:12:27 dom0 kernel: hub 1-4:1.0: 4 ports detected
Jul 08 16:12:27 dom0 kernel: usb 1-4: authorized to connect
Jul 08 16:12:27 dom0 kernel: [drm] amdgpu: 2048M of VRAM memory ready
Jul 08 16:12:27 dom0 kernel: [drm] amdgpu: 1947M of GTT memory ready.
Jul 08 16:12:27 dom0 kernel: [drm] GART: num cpu pages 131072, num gpu pages 131072
Jul 08 16:12:27 dom0 kernel: [drm] PCIE GART of 512M enabled (table at 0x000000807FD00000).
Jul 08 16:12:27 dom0 kernel: [drm] Loading DMUB firmware via PSP: version=0x08004E00
Jul 08 16:12:27 dom0 kernel: [drm] Found VCN firmware Version ENC: 1.23 DEC: 9 VEP: 0 Revision: 16
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: new full-speed USB device number 6 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: reserve 0x4000000 from 0x8078000000 for PSP TMR
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: New USB device found, idVendor=1050, idProduct=0404, bcdDevice= 4.37
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Product: Yubikey 4 CCID
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Manufacturer: Yubico
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: new SuperSpeed USB device number 3 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: New USB device found, idVendor=0bda, idProduct=8156, bcdDevice=31.04
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Product: USB 10/100/1G/2.5G LAN
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Manufacturer: Realtek
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: SerialNumber: 4013000001
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: new full-speed USB device number 7 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: New USB device found, idVendor=27c6, idProduct=609c, bcdDevice= 1.00
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Product: Goodix USB2.0 MISC
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Manufacturer: Goodix Technology Co., Ltd.
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: SerialNumber: UIDD9EB3F17_XXXX_MOC_B0
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: new full-speed USB device number 8 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: unable to get BOS descriptor set
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: New USB device found, idVendor=32ac, idProduct=0012, bcdDevice= 0.29
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Product: Laptop 16 Keyboard Module - ANSI
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Manufacturer: Framework
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: SerialNumber: FRAKDKEN0100000000
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: RAS: optional ras ta ucode is not available
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: RAP: optional rap ta ucode is not available
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SECUREDISPLAY: securedisplay ta ucode is not available
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SMU is initialized successfully!
Jul 08 16:12:27 dom0 kernel: [drm] Seamless boot condition check passed
Jul 08 16:12:27 dom0 kernel: [drm] Display Core v3.2.301 initialized on DCN 3.1.4
Jul 08 16:12:27 dom0 kernel: [drm] DP-HDMI FRL PCON supported
Jul 08 16:12:27 dom0 kernel: [drm] DMUB hardware initialized: version=0x08004E00
Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: Allocated 3969056 bytes on gart
Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: Total number of KFD nodes to be created: 1
Jul 08 16:12:27 dom0 kernel: amdgpu: Virtual CRAT table created for GPU
Jul 08 16:12:27 dom0 kernel: amdgpu: Topology: Add dGPU node [0x15bf:0x1002]
Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: added device 1002:15bf
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SE 1, SH per SE 2, CU per SH 6, active_cu_number 12
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring gfx_0.0.0 uses VM inv eng 0 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.0.0 uses VM inv eng 1 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.1.0 uses VM inv eng 4 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.2.0 uses VM inv eng 6 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.3.0 uses VM inv eng 7 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.0.1 uses VM inv eng 8 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.1.1 uses VM inv eng 9 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.2.1 uses VM inv eng 10 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.3.1 uses VM inv eng 11 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring sdma0 uses VM inv eng 12 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring vcn_unified_0 uses VM inv eng 0 on hub 8
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring jpeg_dec uses VM inv eng 1 on hub 8
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring mes_kiq_3.1.0 uses VM inv eng 13 on hub 0
Jul 08 16:12:27 dom0 kernel: [drm] ring gfx_32768.1.1 was added
Jul 08 16:12:27 dom0 kernel: [drm] ring compute_32768.2.2 was added
Jul 08 16:12:27 dom0 kernel: [drm] ring sdma_32768.3.3 was added
Jul 08 16:12:27 dom0 kernel: [drm] ring gfx_32768.1.1 ib test pass
Jul 08 16:12:27 dom0 kernel: [drm] ring compute_32768.2.2 ib test pass
Jul 08 16:12:27 dom0 kernel: [drm] ring sdma_32768.3.3 ib test pass
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Runtime PM not available
Jul 08 16:12:27 dom0 kernel: [drm] Initialized amdgpu 3.61.0 for 0000:c2:00.0 on minor 0
Jul 08 16:12:27 dom0 kernel: fbcon: amdgpudrmfb (fb0) is primary device
Jul 08 16:12:27 dom0 kernel: fbcon: Deferring console take-over
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: [drm] fb0: amdgpudrmfb frame buffer device
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.0/0003:32AC:0012.0003/input/input7
Jul 08 16:12:27 dom0 kernel: [drm] pre_validate_dsc:1596 MST_DSC dsc precompute is not needed
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0003: input,hidraw2: USB HID v1.11 Keyboard [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input0
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0004: hiddev96,hidraw3: USB HID v1.11 Device [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input1
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI System Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input8
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Consumer Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input9
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Wireless Radio Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input10
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Keyboard as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input11
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0005: input,hidraw4: USB HID v1.11 Keyboard [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input2
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0006: hiddev97,hidraw5: USB HID v1.11 Device [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input3
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: authorized to connect
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" target="block" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" target="block" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" target="block" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" target="block" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=626C6F636B20696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" target="allow" device_rule=626C6F636B20696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2 action=change
Jul 08 16:12:26 dom0 systemd[1]: Found device dev-disk-by\x2duuid-c4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.device - /dev/disk/by-uuid/c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2 action=change
Jul 08 16:12:26 dom0 systemd[1]: Starting systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.service - Cryptography Setup for luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d...
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3 action=change
Jul 08 16:12:26 dom0 systemd[1]: Started systemd-ask-password-plymouth.service - Forward Password Requests to Plymouth.
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4 action=change
Jul 08 16:12:27 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3 action=change
Jul 08 16:12:37 dom0 systemd-cryptsetup[851]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:39 dom0 audit[851]: DM_CTRL module=crypt op=ctr ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1
Jul 08 16:12:39 dom0 audit[851]: SYSCALL arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=58905e78e410 a3=0 items=8 ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null)
Jul 08 16:12:39 dom0 audit: CWD cwd="/"
Jul 08 16:12:39 dom0 audit: PATH item=0 name=(null) inode=1025 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=1 name=(null) inode=11462 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=2 name=(null) inode=27 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=3 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=4 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=5 name=(null) inode=11464 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=6 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=7 name=(null) inode=11465 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D6372797074736574757000617474616368006C756B732D63343135376165302D633163392D346432652D386565392D396165636332643939363664002F6465762F6469736B2F62792D757569642F63343135376165302D633163392D346432652D386565392D39
Jul 08 16:12:39 dom0 kernel: kauditd_printk_skb: 70 callbacks suppressed
Jul 08 16:12:39 dom0 kernel: audit: type=1338 audit(1752009159.125:81): module=crypt op=ctr ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1
Jul 08 16:12:39 dom0 kernel: audit: type=1300 audit(1752009159.125:81): arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=58905e78e410 a3=0 items=8 ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null)
Jul 08 16:12:39 dom0 kernel: audit: type=1307 audit(1752009159.125:81): cwd="/"
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=0 name=(null) inode=1025 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=1 name=(null) inode=11462 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=2 name=(null) inode=27 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=3 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=4 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=5 name=(null) inode=11464 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=6 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 systemd[1]: Finished systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.service - Cryptography Setup for luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:39 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:39 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Jul 08 16:12:39 dom0 systemd[1]: Reached target sysinit.target - System Initialization.
Jul 08 16:12:39 dom0 systemd[1]: Reached target basic.target - Basic System.
Jul 08 16:12:39 dom0 dracut-initqueue[1137]: Scanning devices dm-0  for LVM logical volumes qubes_dom0/root
Jul 08 16:12:39 dom0 dracut-initqueue[1137]: qubes_dom0/swap
Jul 08 16:12:39 dom0 dracut-initqueue[1158]:   WARNING: File locking is disabled.
Jul 08 16:12:39 dom0 dracut-initqueue[1137]:   qubes_dom0/root thin
Jul 08 16:12:39 dom0 dracut-initqueue[1137]:   qubes_dom0/swap linear
Jul 08 16:12:41 dom0 systemd[1]: Found device dev-mapper-qubes_dom0\x2droot.device - /dev/mapper/qubes_dom0-root.
Jul 08 16:12:41 dom0 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device.
Jul 08 16:12:41 dom0 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook.
Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems.
Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems.
Jul 08 16:12:41 dom0 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook...
Jul 08 16:12:41 dom0 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook.
Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:41 dom0 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root...
Jul 08 16:12:41 dom0 systemd-fsck[1215]: root: clean, 312337/23691264 files, 5822568/94737408 blocks
Jul 08 16:12:41 dom0 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root.
Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:41 dom0 systemd[1]: Mounting sysroot.mount - /sysroot...
Jul 08 16:12:41 dom0 kernel: EXT4-fs (dm-4): mounted filesystem 0ac75727-2814-43da-9fd8-825bf56de02d ro with ordered data mode. Quota mode: none.
Jul 08 16:12:41 dom0 systemd[1]: Mounted sysroot.mount - /sysroot.
Jul 08 16:12:41 dom0 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System.
Jul 08 16:12:41 dom0 systemd[1]: Starting initrd-parse-etc.service - Reload Configuration from the Real Root...
Jul 08 16:12:41 dom0 systemd[1]: Reloading.
Jul 08 16:12:42 dom0 audit: BPF prog-id=22 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=23 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=17 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=18 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=24 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=14 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=25 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=26 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=15 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=16 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=27 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=19 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=28 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=29 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=20 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=21 op=UNLOAD
Jul 08 16:12:42 dom0 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-parse-etc.service - Reload Configuration from the Real Root.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd-fs.target - Initrd File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd.target - Initrd Default Target.
Jul 08 16:12:42 dom0 systemd[1]: dracut-mount.service - dracut mount hook was skipped because all trigger condition checks failed.
Jul 08 16:12:42 dom0 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook...
Jul 08 16:12:42 dom0 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons...
Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target timers.target - Timer Units.
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd.target - Initrd Default Target.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target basic.target - Basic System.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-usr-fs.target - Initrd /usr File System.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target paths.target - Path Units.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-fs.target - Remote File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target slices.target - Slice Units.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target sockets.target - Socket Units.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target sysinit.target - System Initialization.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target swap.target - Swaps.
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
Jul 08 16:12:42 dom0 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: dracut-initqueue.service: Consumed 2.418s CPU time.
Jul 08 16:12:42 dom0 systemd[1]: Starting plymouth-switch-root.service - Plymouth switch root service...
Jul 08 16:12:42 dom0 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files...
Jul 08 16:12:42 dom0 systemd[1]: Stopping usbguard.service - USBGuard daemon...
Jul 08 16:12:42 dom0 systemd[1]: usbguard.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped usbguard.service - USBGuard daemon.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target local-fs.target - Local File Systems.
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd.service: Consumed 2.752s CPU time.
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket.
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket.
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook.
Jul 08 16:12:42 dom0 audit: BPF prog-id=27 op=UNLOAD
Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database...
Jul 08 16:12:42 dom0 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Finished plymouth-switch-root.service - Plymouth switch root service.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd-switch-root.target - Switch Root.
Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-switch-root.service - Switch Root...
Jul 08 16:12:42 dom0 systemd[1]: Switching root.
Jul 08 16:12:42 dom0 systemd-journald[341]: Journal stopped
Jul 08 16:12:42 dom0 systemd-journald[341]: Received SIGTERM from PID 1 (systemd).
Jul 08 16:12:42 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Jul 08 16:12:42 dom0 systemd[1]: Detected virtualization vm-other.
Jul 08 16:12:42 dom0 systemd[1]: Detected architecture x86-64.
Jul 08 16:12:42 dom0 systemd[1]: bpf-lsm: BPF LSM hook not enabled in the kernel, BPF LSM not supported
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubesd.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-qmemman.service:7: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-db-dom0.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-core.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: systemd-ask-password-plymouth.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped initrd-switch-root.service - Switch Root.
Jul 08 16:12:42 dom0 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-getty.slice - Slice /system/getty.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-qubes\x2dvm.slice - Slice /system/qubes-vm.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck.
Jul 08 16:12:42 dom0 systemd[1]: Created slice user.slice - User and Session Slice.
Jul 08 16:12:42 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:42 dom0 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point.
Jul 08 16:12:42 dom0 systemd[1]: Reached target blockdev@dev-mapper-luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.target - Block Device Preparation for /dev/mapper/luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-switch-root.target - Switch Root.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System.
Jul 08 16:12:42 dom0 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Reached target slices.target - Slice Units.
Jul 08 16:12:42 dom0 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket.
Jul 08 16:12:42 dom0 systemd[1]: Activating swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap...
Jul 08 16:12:42 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:42 dom0 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System...
Jul 08 16:12:42 dom0 systemd[1]: Mounting proc-xen.mount - Mount /proc/xen files...
Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System...
Jul 08 16:12:42 dom0 kernel: Adding 10485756k swap on /dev/mapper/qubes_dom0-swap.  Priority:-2 extents:1 across:10485756k SS
Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System...
Jul 08 16:12:42 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
Jul 08 16:12:42 dom0 systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:42 dom0 systemd[1]: plymouth-switch-root.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped plymouth-switch-root.service - Plymouth switch root service.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-journald.service - Journal Service.
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-journald.service - Journal Service...
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line...
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems...
Jul 08 16:12:42 dom0 kernel: loop: module loaded
Jul 08 16:12:42 dom0 kernel: fuse: init (API version 7.41)
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
Jul 08 16:12:42 dom0 systemd[1]: Activated swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap.
Jul 08 16:12:42 dom0 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System.
Jul 08 16:12:42 dom0 systemd[1]: Mounted proc-xen.mount - Mount /proc/xen files.
Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System.
Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System.
Jul 08 16:12:42 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd-journald[1311]: Journal started
Jul 08 16:12:42 dom0 systemd-journald[1311]: Runtime Journal (/run/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 8.0M, max 77.8M, 69.8M free.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:42 dom0 audit: BPF prog-id=30 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=30 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=31 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=31 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=32 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=32 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=33 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=33 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=34 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=34 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=35 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=36 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=35 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=36 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=37 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=37 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=38 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=38 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=39 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=39 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=40 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=40 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=41 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=42 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=42 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=43 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=41 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=43 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=44 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=24 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=45 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=46 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=25 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=26 op=UNLOAD
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit: BPF prog-id=44 op=UNLOAD
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit: BPF prog-id=47 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=48 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=49 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=45 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=46 op=UNLOAD
Jul 08 16:12:42 dom0 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 res=1
Jul 08 16:12:42 dom0 systemd[1]: Started systemd-journald.service - Journal Service.
Jul 08 16:12:42 dom0 audit[1311]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd68f54d40 a2=4000 a3=7ffd68f54dcc items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" key=(null)
Jul 08 16:12:42 dom0 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Queued start job for default target graphical.target.
Jul 08 16:12:42 dom0 systemd[1]: systemd-journald.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd-modules-load[1312]: Module 'msr' is built in
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line.
Jul 08 16:12:42 dom0 systemd[1]: Reached target network-pre.target - Preparation for Network.
Jul 08 16:12:42 dom0 systemd[1]: Reached target swap.target - Swaps.
Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System...
Jul 08 16:12:42 dom0 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp...
Jul 08 16:12:42 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System.
Jul 08 16:12:42 dom0 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp.
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 kernel: EXT4-fs (dm-4): re-mounted 0ac75727-2814-43da-9fd8-825bf56de02d r/w. Quota mode: none.
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:42 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage...
Jul 08 16:12:42 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed...
Jul 08 16:12:42 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd-journald[1311]: Time spent on flushing to /var/log/journal/0c67c932d86e4cf398b860f50e4aef19 is 143.026ms for 1716 entries.
Jul 08 16:12:42 dom0 systemd-journald[1311]: System Journal (/var/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 610.6M, max 4.0G, 3.4G free.
Jul 08 16:12:42 dom0 systemd-journald[1311]: Received client request to flush runtime journal.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit: BPF prog-id=50 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=51 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=22 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=23 op=UNLOAD
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed.
Jul 08 16:12:42 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
Jul 08 16:12:42 dom0 systemd-udevd[1324]: Using default interface naming scheme 'v251'.
Jul 08 16:12:42 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs...
Jul 08 16:12:42 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs.
Jul 08 16:12:42 dom0 systemd[1]: Condition check resulted in dev-hvc0.device - /dev/hvc0 being skipped.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage.
Jul 08 16:12:42 dom0 kernel: amd-tee driver: tee not present
Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: SMBus Host Controller at 0xb00, revision 0
Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: Using register 0x02 for SMBus port selection
Jul 08 16:12:43 dom0 kernel: i2c i2c-20: Successfully instantiated SPD at 0x50
Jul 08 16:12:43 dom0 kernel: i2c i2c-20: Successfully instantiated SPD at 0x51
Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: Auxiliary SMBus Host Controller at 0xb20
Jul 08 16:12:43 dom0 kernel: i2c i2c-22: Successfully instantiated SPD at 0x50
Jul 08 16:12:43 dom0 kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database
Jul 08 16:12:43 dom0 kernel: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Jul 08 16:12:43 dom0 kernel: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600'
Jul 08 16:12:43 dom0 kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
Jul 08 16:12:43 dom0 kernel: cfg80211: failed to load regulatory.db
Jul 08 16:12:43 dom0 kernel: i2c i2c-22: Successfully instantiated SPD at 0x51
Jul 08 16:12:43 dom0 systemd[1]: Created slice system-systemd\x2dbacklight.slice - Slice /system/systemd-backlight.
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-backlight@backlight:amdgpu_bl0.service - Load/Save Screen Backlight Brightness of backlight:amdgpu_bl0...
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-backlight@backlight:amdgpu_bl0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-backlight@backlight:amdgpu_bl0.service - Load/Save Screen Backlight Brightness of backlight:amdgpu_bl0.
Jul 08 16:12:43 dom0 systemd[1]: Reached target smartcard.target - Smart Card.
Jul 08 16:12:43 dom0 kernel: ACPI: bus type thunderbolt registered
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:43 dom0 kernel: xen: --> pirq=44 -> irq=44 (gsi=44)
Jul 08 16:12:43 dom0 kernel: amd-pmf AMDI0102:00: Failed to open TEE context
Jul 08 16:12:43 dom0 kernel: amd-pmf AMDI0102:00: registered PMF device successfully
Jul 08 16:12:43 dom0 systemd[1]: Started dm-event.service - Device-mapper event daemon.
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dm-event comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 dmeventd[2209]: dmeventd ready for processing.
Jul 08 16:12:43 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:43 dom0 lvm[1305]:   5 logical volume(s) in volume group "qubes_dom0" monitored
Jul 08 16:12:43 dom0 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input12
Jul 08 16:12:43 dom0 systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling.
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems.
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:43 dom0 kernel: xen: --> pirq=45 -> irq=45 (gsi=45)
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d.service - File System Check on /dev/disk/by-uuid/498e4b33-4544-4195-b627-cd3391190a2d...
Jul 08 16:12:43 dom0 systemd-fsck[2492]: boot: clean, 44/131072 files, 87247/523520 blocks
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d.service - File System Check on /dev/disk/by-uuid/498e4b33-4544-4195-b627-cd3391190a2d.
Jul 08 16:12:43 dom0 systemd[1]: Mounting boot.mount - /boot...
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 39 triggering 0 polarity 1
Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-1A18\x2dD569.device - WD_BLACK SN770M 500GB EFI being skipped.
Jul 08 16:12:43 dom0 kernel: EXT4-fs (md126): mounted filesystem 498e4b33-4544-4195-b627-cd3391190a2d r/w with ordered data mode. Quota mode: none.
Jul 08 16:12:43 dom0 kernel: xen: --> pirq=39 -> irq=39 (gsi=39)
Jul 08 16:12:43 dom0 kernel: snd_hda_intel 0000:c2:00.1: Handle vga_switcheroo audio client
Jul 08 16:12:43 dom0 systemd[1]: Mounted boot.mount - /boot.
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 36 triggering 0 polarity 1
Jul 08 16:12:43 dom0 kernel: Already setup the GSI :36
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569.service - File System Check on /dev/disk/by-uuid/1A18-D569...
Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-1836\x2dE84A.device - WD_BLACK SN770 500GB EFI being skipped.
Jul 08 16:12:43 dom0 kernel: snd_hda_intel 0000:c2:00.1: bound 0000:c2:00.0 (ops amdgpu_dm_audio_component_bind_ops [amdgpu])
Jul 08 16:12:43 dom0 kernel: amd_atl: AMD Address Translation Library initialized
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A.service - File System Check on /dev/disk/by-uuid/1836-E84A...
Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input13
Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input14
Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input15
Jul 08 16:12:43 dom0 systemd-fsck[2694]: fsck.fat 4.2 (2021-01-31)
Jul 08 16:12:43 dom0 systemd-fsck[2694]: /dev/nvme0n1p1: 13 files, 14899/261628 clusters
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569.service - File System Check on /dev/disk/by-uuid/1A18-D569.
Jul 08 16:12:43 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: autoconfig for ALC295: line_outs=2 (0x17/0x14/0x0/0x0/0x0) type:speaker
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0:    speaker_outs=0 (0x0/0x0/0x0/0x0/0x0)
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0:    hp_outs=0 (0x0/0x0/0x0/0x0/0x0)
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0:    mono: mono_out=0x0
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0:    inputs:
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0:      Mic=0x12
Jul 08 16:12:44 dom0 kernel: cros_ec_lpcs cros_ec_lpcs.0: loaded with quirks 00000001
Jul 08 16:12:44 dom0 kernel: xen: registering gsi 39 triggering 0 polarity 1
Jul 08 16:12:44 dom0 kernel: Already setup the GSI :39
Jul 08 16:12:44 dom0 kernel: cros_ec_lpcs cros_ec_lpcs.0: Chrome EC device registered
Jul 08 16:12:44 dom0 kernel: spd5118 20-0050: DDR5 temperature sensor: vendor 0x06:0x32 revision 1.6
Jul 08 16:12:44 dom0 kernel: spd5118 20-0051: DDR5 temperature sensor: vendor 0x06:0x32 revision 1.6
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: No USB PD charging ports found
Jul 08 16:12:44 dom0 kernel: cros-charge-control cros-charge-control.4.auto: Framework charge control detected, preventing load
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: Unexpected number of charge port count
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: Failing probe (err:0xffffffb9)
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: probe with driver cros-usbpd-charger failed with error -71
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=52 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=53 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=54 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=28 op=UNLOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=29 op=UNLOAD
Jul 08 16:12:43 dom0 audit[3133]: SYSTEM_BOOT pid=3133 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=55 op=LOAD
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" target="block" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" target="allow" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" target="block" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" target="block" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" target="block" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" target="allow" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" target="block" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=56 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=57 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=58 op=LOAD
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=59 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=60 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=61 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=62 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=63 op=LOAD
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=mdmonitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=upower comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=iio-sensor-proxy comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:44 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=udisks2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:44 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A.service - File System Check on /dev/disk/by-uuid/1836-E84A.
Jul 08 16:12:44 dom0 systemd-fsck[2713]: fsck.fat 4.2 (2021-01-31)
Jul 08 16:12:44 dom0 systemd-fsck[2713]: /dev/nvme1n1p1: 1 files, 1/261628 clusters
Jul 08 16:12:43 dom0 alsactl[3258]: alsactl 1.2.9 daemon started
Jul 08 16:12:43 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dkeyboard.slice - Slice /system/qubes-input-sender-keyboard.
Jul 08 16:12:43 dom0 xenstored[3342]: Checking store ...
Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:43 dom0 xenstored[3342]: Checking store complete.
Jul 08 16:12:43 dom0 systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch.
Jul 08 16:12:44 dom0 lvm[2832]:   pvscan[2832] PV /dev/mapper/luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d online, VG qubes_dom0 is complete.
Jul 08 16:12:44 dom0 lvm[2832]:   pvscan[2832] VG qubes_dom0 run autoactivation.
Jul 08 16:12:43 dom0 polkitd[3327]: Started polkitd version 121
Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:43 dom0 polkitd[3327]: Loading rules from directory /etc/polkit-1/rules.d
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:43 dom0 polkitd[3327]: Loading rules from directory /usr/share/polkit-1/rules.d
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:43 dom0 polkitd[3327]: Finished loading, compiling and executing 9 rules
Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 polkitd[3327]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:44 dom0 usbguard-daemon[3143]: [1752009163.750] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF!
Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: Looking up NSS user entry for 'geoclue'...
Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: NSS returned no entry for 'geoclue'
Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: Invalid user-name in /etc/dbus-1/system.d/net.hadess.SensorProxy.conf +14: user="geoclue"
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-block-253:0.device - /dev/block/253:0 being skipped.
Jul 08 16:12:43 dom0 systemd[1]: Created slice system-lvm2\x2dpvscan.slice - Slice /system/lvm2-pvscan.
Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:43 dom0 systemd[1]: Starting lvm2-pvscan@253:0.service - LVM event activation on device 253:0...
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:44 dom0 qubes-input-sender[3274]: Device /dev/input/event5 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:44 dom0 qubes-input-sender[3278]: Device /dev/input/event6 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:44 dom0 qubes-input-sender[3280]: Device /dev/input/event7 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:44 dom0 qubes-input-sender[3286]: Device /dev/input/event8 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:44 dom0 qubes-input-sender[3288]: Device /dev/input/event9 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:43 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
Jul 08 16:12:44 dom0 launch-xenstore[3311]: Starting /usr/sbin/xenstored...
Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:44 dom0 xen-init-dom0[3356]: Done setting up Dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:43 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: Mounting boot-efi.mount - /boot/efi...
Jul 08 16:12:43 dom0 systemd[1]: Mounting boot-efi2.mount - /boot/efi2...
Jul 08 16:12:43 dom0 systemd[1]: Mounted boot-efi.mount - /boot/efi.
Jul 08 16:12:43 dom0 systemd[1]: Mounted boot-efi2.mount - /boot/efi2.
Jul 08 16:12:43 dom0 systemd[1]: Reached target local-fs.target - Local File Systems.
Jul 08 16:12:43 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data...
Jul 08 16:12:43 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul 08 16:12:43 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id).
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
Jul 08 16:12:43 dom0 systemd[1]: Received SIGRTMIN+20 from PID 670 (plymouthd).
Jul 08 16:12:43 dom0 systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data.
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Jul 08 16:12:43 dom0 systemd[1]: systemd-journal-catalog-update.service - Rebuild Journal Catalog was skipped because of a failed condition check (ConditionNeedsUpdate=/var).
Jul 08 16:12:43 dom0 systemd[1]: systemd-update-done.service - Update is Completed was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP...
Jul 08 16:12:43 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon...
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP.
Jul 08 16:12:43 dom0 systemd[1]: Started usbguard.service - USBGuard daemon.
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch.
Jul 08 16:12:43 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Jul 08 16:12:43 dom0 systemd[1]: Reached target paths.target - Path Units.
Jul 08 16:12:43 dom0 systemd[1]: Reached target sysinit.target - System Initialization.
Jul 08 16:12:43 dom0 systemd[1]: Started fstrim.timer - Discard unused blocks once a week.
Jul 08 16:12:43 dom0 systemd[1]: Started logrotate.timer - Daily rotation of log files.
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories.
Jul 08 16:12:43 dom0 systemd[1]: Reached target timers.target - Timer Units.
Jul 08 16:12:43 dom0 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd.socket - Libvirt local socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd-admin.socket - Libvirt admin socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd-ro.socket - Libvirt local read-only socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on virtlockd.socket - Virtual machine lock manager socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on virtlogd.socket - Virtual machine log manager socket.
Jul 08 16:12:43 dom0 systemd[1]: Reached target sockets.target - Socket Units.
Jul 08 16:12:43 dom0 systemd[1]: Starting dbus-broker.service - D-Bus System Message Bus...
Jul 08 16:12:43 dom0 systemd[1]: rpmdb-migrate.service - RPM database migration to /usr was skipped because of a failed condition check (ConditionPathExists=/var/lib/rpm/.migratedb).
Jul 08 16:12:43 dom0 systemd[1]: rpmdb-rebuild.service - RPM database rebuild was skipped because of a failed condition check (ConditionPathExists=/usr/lib/sysimage/rpm/.rebuilddb).
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-userdbd.service - User Database Manager...
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-userdbd.service - User Database Manager.
Jul 08 16:12:43 dom0 systemd[1]: Started dbus-broker.service - D-Bus System Message Bus.
Jul 08 16:12:43 dom0 systemd[1]: Reached target basic.target - Basic System.
Jul 08 16:12:43 dom0 systemd[1]: alsa-restore.service - Save/Restore Sound Card State was skipped because of a failed condition check (ConditionPathExists=!/etc/alsa/state-daemon.conf).
Jul 08 16:12:43 dom0 systemd[1]: Started alsa-state.service - Manage Sound Card State (restore and store).
Jul 08 16:12:43 dom0 systemd[1]: Reached target sound.target - Sound Card.
Jul 08 16:12:43 dom0 dbus-broker-launch[3185]: Ready
Jul 08 16:12:43 dom0 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown...
Jul 08 16:12:43 dom0 systemd[1]: Starting iio-sensor-proxy.service - IIO Sensor Proxy service...
Jul 08 16:12:43 dom0 systemd[1]: Starting mdmonitor.service - Software RAID monitoring and management...
Jul 08 16:12:43 dom0 systemd[1]: Starting qubes-db-dom0.service - Qubes DB agent...
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event5.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event6.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event7.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event8.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event9.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Starting qubes-qmemman.service - Qubes memory management daemon...
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-logind.service - User Login Management...
Jul 08 16:12:43 dom0 systemd[1]: Starting udisks2.service - Disk Manager...
Jul 08 16:12:43 dom0 systemd[1]: Starting upower.service - Daemon for power management...
Jul 08 16:12:43 dom0 systemd[1]: Starting xenstored.service - The Xen xenstore...
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-db-dom0.service - Qubes DB agent.
Jul 08 16:12:43 dom0 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown.
Jul 08 16:12:43 dom0 systemd[1]: Started mdmonitor.service - Software RAID monitoring and management.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event5.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event6.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event7.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event8.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event9.service: Deactivated successfully.
Jul 08 16:12:43 dom0 udisksd[3300]: udisks daemon version 2.9.4 starting
Jul 08 16:12:43 dom0 systemd[1]: Starting polkit.service - Authorization Manager...
Jul 08 16:12:43 dom0 systemd-logind[3298]: New seat seat0.
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm...
Jul 08 16:12:43 dom0 systemd[1]: Started xenstored.service - The Xen xenstore.
Jul 08 16:12:43 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm.
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event0 (Lid Switch)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event1 (Power Button)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event5 (Framework Laptop 16 Keyboard Module - ANSI)
Jul 08 16:12:43 dom0 systemd[1]: Starting xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub)...
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event9 (Framework Laptop 16 Keyboard Module - ANSI Keyboard)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event6 (Framework Laptop 16 Keyboard Module - ANSI System Control)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event7 (Framework Laptop 16 Keyboard Module - ANSI Consumer Control)
Jul 08 16:12:43 dom0 systemd[1]: Starting xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor...
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-logind.service - User Login Management.
Jul 08 16:12:43 dom0 systemd[1]: Starting libvirtd.service - Virtualization daemon...
Jul 08 16:12:43 dom0 systemd[1]: Started xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor.
Jul 08 16:12:43 dom0 systemd[1]: Finished xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub).
Jul 08 16:12:43 dom0 systemd-logind[3298]: Failed to probe partition scheme of "/dev/block/9:126": Input/output error
Jul 08 16:12:43 dom0 systemd[1]: Started libvirtd.service - Virtualization daemon.
Jul 08 16:12:43 dom0 systemd[1]: Started upower.service - Daemon for power management.
Jul 08 16:12:43 dom0 systemd[1]: Started polkit.service - Authorization Manager.
Jul 08 16:12:43 dom0 systemd[1]: Started iio-sensor-proxy.service - IIO Sensor Proxy service.
Jul 08 16:12:44 dom0 systemd[1]: Started udisks2.service - Disk Manager.
Jul 08 16:12:44 dom0 udisksd[3300]: Acquired the name org.freedesktop.UDisks2 on the system message bus
Jul 08 16:12:44 dom0 systemd[1]: Started qubes-qmemman.service - Qubes memory management daemon.
Jul 08 16:12:46 dom0 lvm[2832]:   258 logical volume(s) in volume group "qubes_dom0" now active
Jul 08 16:12:46 dom0 systemd[1]: Finished lvm2-pvscan@253:0.service - LVM event activation on device 253:0.
Jul 08 16:12:46 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:46 dom0 kernel: kauditd_printk_skb: 223 callbacks suppressed
Jul 08 16:12:46 dom0 kernel: audit: type=1130 audit(1752009166.978:301): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:46 dom0 systemd[1]: Starting qubesd.service - Qubes OS daemon...
Jul 08 16:12:47 dom0 systemd[1]: Started qubesd.service - Qubes OS daemon.
Jul 08 16:12:47 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 kernel: audit: type=1130 audit(1752009167.879:302): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 systemd[1]: Starting qubes-core.service - Qubes Dom0 startup setup...
Jul 08 16:12:47 dom0 systemd[1]: Started qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon.
Jul 08 16:12:47 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 kernel: audit: type=1130 audit(1752009167.892:303): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 startup-misc.sh[4358]: libxl: error: libxl_sched.c:232:sched_credit_domain_set: Getting domain sched credit: Invalid argument
Jul 08 16:12:47 dom0 startup-misc.sh[4358]: libxl_domain_sched_params_set failed.
Jul 08 16:12:47 dom0 qrexec-policy-daemon[4334]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated
Jul 08 16:12:48 dom0 systemd[1]: Finished qubes-core.service - Qubes Dom0 startup setup.
Jul 08 16:12:48 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1130 audit(1752009168.139:304): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 systemd[1]: Started qubes-meminfo-writer-dom0.service - Qubes memory information reporter.
Jul 08 16:12:48 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1130 audit(1752009168.149:305): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-chocolatey.service - Start Qubes VM sys-firewall-chocolatey...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-full-internet.service - Start Qubes VM sys-firewall-full-internet...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-localnet.service - Start Qubes VM sys-firewall-localnet...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-gui.service - Start Qubes VM sys-gui...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-net.service - Start Qubes VM sys-net...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-usb.service - Start Qubes VM sys-usb...
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Starting sys-firewall-full-internet
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-localnet: Starting sys-firewall-localnet
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-net: Starting sys-net
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Starting sys-firewall-chocolatey
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-usb: Starting sys-usb
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: remove, state 1
Jul 08 16:12:48 dom0 kernel: usb usb2: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: usb 2-2: USB disconnect, device number 2
Jul 08 16:12:48 dom0 kernel: usb 2-2.2: USB disconnect, device number 3
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.386:306): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.387:307): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: USB bus 2 deregistered
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.402:308): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: remove, state 1
Jul 08 16:12:48 dom0 kernel: usb usb1: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: usb 1-2: USB disconnect, device number 2
Jul 08 16:12:48 dom0 kernel: usb 1-2.3: USB disconnect, device number 6
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.402:309): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.403:310): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: usb 1-3: USB disconnect, device number 3
Jul 08 16:12:48 dom0 kernel: usb 1-4: USB disconnect, device number 4
Jul 08 16:12:48 dom0 kernel: usb 1-4.1: USB disconnect, device number 7
Jul 08 16:12:48 dom0 kernel: usb 1-4.3: USB disconnect, device number 8
Jul 08 16:12:48 dom0 kernel: usb 1-5: USB disconnect, device number 5
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: USB bus 1 deregistered
Jul 08 16:12:48 dom0 kernel: pciback 0000:c2:00.3: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: remove, state 4
Jul 08 16:12:48 dom0 kernel: usb usb4: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: USB bus 4 deregistered
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: remove, state 1
Jul 08 16:12:48 dom0 kernel: usb usb3: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: usb 3-1: USB disconnect, device number 2
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: USB bus 3 deregistered
Jul 08 16:12:48 dom0 kernel: pciback 0000:c2:00.4: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 systemd[1]: Stopped target smartcard.target - Smart Card.
Jul 08 16:12:48 dom0 kernel: pciback 0000:c4:00.5: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:48 dom0 kernel: pciback 0000:c4:00.6: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall: Starting sys-firewall
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-gui: Starting sys-gui
Jul 08 16:12:49 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 kernel: loop0: detected capacity change from 0 to 1399816
Jul 08 16:12:49 dom0 kernel: loop1: detected capacity change from 0 to 1399816
Jul 08 16:12:49 dom0 kernel: pciback 0000:02:00.0: xen_pciback: vpci: assign to virtual slot 0
Jul 08 16:12:49 dom0 kernel: pciback 0000:02:00.0: registering for 2
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Setting Qubes DB info for the VM
Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Starting Qubes DB
Jul 08 16:12:51 dom0 audit[6413]: CRED_ACQ pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 runuser[6413]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:51 dom0 audit[6413]: USER_START pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 runuser[6413]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:51 dom0 audit[6413]: USER_END pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 audit[6413]: CRED_DISP pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Activating the sys-net VM
Jul 08 16:12:51 dom0 audit[6423]: CRED_ACQ pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 runuser[6423]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:51 dom0 audit[6423]: USER_START pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 kernel: loop2: detected capacity change from 0 to 1399816
Jul 08 16:12:52 dom0 kernel: loop3: detected capacity change from 0 to 1399816
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: xen_pciback: vpci: assign to virtual slot 0
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: registering for 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: xen_pciback: vpci: assign to virtual slot 0 func 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: registering for 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: xen_pciback: vpci: assign to virtual slot 1
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: registering for 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: xen_pciback: vpci: assign to virtual slot 1 func 6
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: registering for 4
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Setting Qubes DB info for the VM
Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Starting Qubes DB
Jul 08 16:12:54 dom0 audit[6838]: CRED_ACQ pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: kauditd_printk_skb: 15 callbacks suppressed
Jul 08 16:12:54 dom0 kernel: audit: type=1103 audit(1752009174.067:326): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 runuser[6838]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:54 dom0 audit[6838]: USER_START pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1105 audit(1752009174.069:327): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 runuser[6838]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:54 dom0 audit[6838]: USER_END pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 audit[6838]: CRED_DISP pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1106 audit(1752009174.074:328): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1104 audit(1752009174.074:329): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Activating the sys-usb VM
Jul 08 16:12:54 dom0 audit[6848]: CRED_ACQ pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1103 audit(1752009174.083:330): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 runuser[6848]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:54 dom0 kernel: audit: type=1105 audit(1752009174.084:331): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 audit[6848]: USER_START pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:54 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:54 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:54 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:55 dom0 kernel: loop4: detected capacity change from 0 to 1399816
Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Setting Qubes DB info for the VM
Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Starting Qubes DB
Jul 08 16:12:55 dom0 audit[7169]: CRED_ACQ pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1103 audit(1752009175.677:332): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 runuser[7169]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:55 dom0 audit[7169]: USER_START pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1105 audit(1752009175.679:333): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 runuser[7169]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:55 dom0 audit[7169]: USER_END pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 audit[7169]: CRED_DISP pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1106 audit(1752009175.684:334): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1104 audit(1752009175.684:335): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Activating the sys-gui VM
Jul 08 16:12:55 dom0 audit[7185]: CRED_ACQ pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 runuser[7185]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:55 dom0 audit[7185]: USER_START pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 audit[6423]: USER_END pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 audit[6423]: CRED_DISP pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 runuser[6423]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:56 dom0 systemd[1]: Finished qubes-vm@sys-net.service - Start Qubes VM sys-net.
Jul 08 16:12:56 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:57 dom0 kernel: loop5: detected capacity change from 0 to 1399816
Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Setting Qubes DB info for the VM
Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Starting Qubes DB
Jul 08 16:12:57 dom0 audit[7555]: CRED_ACQ pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 runuser[7555]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:57 dom0 audit[7555]: USER_START pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 runuser[7555]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:57 dom0 audit[7555]: USER_END pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 audit[7555]: CRED_DISP pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Activating the sys-firewall-full-internet VM
Jul 08 16:12:57 dom0 audit[7580]: CRED_ACQ pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 runuser[7580]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:57 dom0 audit[7580]: USER_START pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:57 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:58 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:58 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:59 dom0 runuser[7185]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:59 dom0 kernel: kauditd_printk_skb: 11 callbacks suppressed
Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.293:347): pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.293:348): pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7185]: USER_END pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7185]: CRED_DISP pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: loop6: detected capacity change from 0 to 1399816
Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Setting Qubes DB info for the VM
Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Starting Qubes DB
Jul 08 16:12:59 dom0 audit[7923]: CRED_ACQ pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1103 audit(1752009179.461:349): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[7923]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:59 dom0 kernel: audit: type=1105 audit(1752009179.462:350): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7923]: USER_START pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[7923]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:59 dom0 audit[7923]: USER_END pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7923]: CRED_DISP pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.469:351): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.469:352): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[6848]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:59 dom0 audit[6848]: USER_END pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[6848]: CRED_DISP pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.484:353): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.484:354): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Activating the sys-firewall-chocolatey VM
Jul 08 16:12:59 dom0 audit[7956]: CRED_ACQ pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1103 audit(1752009179.580:355): pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[7956]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:59 dom0 audit[7956]: USER_START pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1105 audit(1752009179.581:356): pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Finished qubes-vm@sys-gui.service - Start Qubes VM sys-gui.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-gui comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Finished qubes-vm@sys-usb.service - Start Qubes VM sys-usb.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions...
Jul 08 16:12:59 dom0 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Started crond.service - Command Scheduler.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Starting lightdm.service - Light Display Manager...
Jul 08 16:12:59 dom0 systemd[1]: Starting plymouth-quit-wait.service - Hold until boot process finishes up...
Jul 08 16:12:59 dom0 crond[7962]: (CRON) STARTUP (1.6.1)
Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (Syslog will be used instead of sendmail.)
Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 23% if used.)
Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (running with inotify support)
Jul 08 16:12:59 dom0 systemd[1]: Received SIGRTMIN+21 from PID 670 (plymouthd).
Jul 08 16:12:59 dom0 systemd[1]: Started lightdm.service - Light Display Manager.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups.
Jul 08 16:12:59 dom0 audit: BPF prog-id=64 op=LOAD
Jul 08 16:12:59 dom0 systemd[1]: Starting accounts-daemon.service - Accounts Service...
Jul 08 16:12:59 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:59 dom0 accounts-daemon[7976]: started daemon version 22.39.0
Jul 08 16:12:59 dom0 systemd[1]: Started accounts-daemon.service - Accounts Service.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:59 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:59 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:00 dom0 systemd[1]: Received SIGRTMIN+21 from PID 670 (plymouthd).
Jul 08 16:13:00 dom0 systemd[1]: Finished plymouth-quit-wait.service - Hold until boot process finishes up.
Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 systemd[1]: Started serial-getty@hvc0.service - Serial Getty on hvc0.
Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 systemd[1]: Reached target getty.target - Login Prompts.
Jul 08 16:13:00 dom0 audit[8295]: CRED_ACQ pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:00 dom0 lightdm[8295]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:00 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992.
Jul 08 16:13:00 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:13:00 dom0 systemd-logind[3298]: New session c1 of user lightdm.
Jul 08 16:13:00 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992...
Jul 08 16:13:00 dom0 (systemd)[8300]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:00 dom0 (systemd)[8300]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:00 dom0 dbus-broker-launch[3185]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found.
Jul 08 16:13:00 dom0 (systemd)[8300]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:13:00 dom0 audit[8300]: USER_ACCT pid=8300 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 audit[8300]: CRED_ACQ pid=8300 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:13:00 dom0 audit[8300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=8300 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:13:00 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:13:00 dom0 (systemd)[8300]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:00 dom0 audit[8300]: USER_START pid=8300 uid=0 auid=992 ses=1 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:01 dom0 systemd[8300]: Queued start job for default target default.target.
Jul 08 16:13:01 dom0 systemd[8300]: Created slice app.slice - User Application Slice.
Jul 08 16:13:01 dom0 systemd[8300]: Created slice session.slice - User Core Session Slice.
Jul 08 16:13:01 dom0 systemd[8300]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system).
Jul 08 16:13:01 dom0 systemd[8300]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target paths.target - Paths.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target timers.target - Timers.
Jul 08 16:13:01 dom0 systemd[8300]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:13:01 dom0 systemd[8300]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:01 dom0 systemd[8300]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:01 dom0 systemd[8300]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:01 dom0 systemd[8300]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:13:01 dom0 systemd[8300]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target sockets.target - Sockets.
Jul 08 16:13:01 dom0 systemd[8300]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target basic.target - Basic System.
Jul 08 16:13:01 dom0 systemd[1]: Started user@992.service - User Manager for UID 992.
Jul 08 16:13:01 dom0 systemd[1]: Started session-c1.scope - Session c1 of User lightdm.
Jul 08 16:13:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 systemd[8300]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:01 dom0 systemd[8300]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:01 dom0 systemd[8300]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target default.target - Main User Target.
Jul 08 16:13:01 dom0 systemd[8300]: Startup finished in 846ms.
Jul 08 16:13:01 dom0 audit[8295]: USER_START pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:01 dom0 systemd[8300]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:01 dom0 systemd[1]: Starting rtkit-daemon.service - RealtimeKit Scheduling Policy Service...
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully called chroot.
Jul 08 16:13:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=rtkit-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 systemd[1]: Started rtkit-daemon.service - RealtimeKit Scheduling Policy Service.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully dropped privileges.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully limited resources.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Canary thread running.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Running.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Watchdog thread running.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8317 of process 8317 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8326 of process 8317 (/usr/bin/wireplumber) owned by '992' RT at priority 20.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8318 of process 8318 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8331 of process 8318 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8316 of process 8316 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8328 of process 8316 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:01 dom0 wireplumber[8317]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:13:01 dom0 wireplumber[8317]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:13:01 dom0 wireplumber[8317]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:13:01 dom0 wireplumber[8317]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:13:01 dom0 runuser[7580]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:01 dom0 audit[7580]: USER_END pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 audit[7580]: CRED_DISP pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=8319 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:01 dom0 systemd[8300]: Starting at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Successfully activated service 'org.a11y.Bus'
Jul 08 16:13:01 dom0 systemd[8300]: Started at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:01 dom0 at-spi-bus-launcher[8350]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
Jul 08 16:13:01 dom0 at-spi-bus-launcher[8350]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
Jul 08 16:13:01 dom0 dbus-broker-launch[8350]: Ready
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=8319 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:01 dom0 systemd[8300]: Starting gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Successfully activated service 'org.gtk.vfs.Daemon'
Jul 08 16:13:01 dom0 systemd[8300]: Started gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:01 dom0 kernel: loop7: detected capacity change from 0 to 1399816
Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Setting Qubes DB info for the VM
Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Starting Qubes DB
Jul 08 16:13:02 dom0 audit[8377]: CRED_ACQ pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 audit[8377]: USER_START pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 runuser[8377]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:02 dom0 runuser[8377]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:02 dom0 audit[8377]: USER_END pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 audit[8377]: CRED_DISP pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 systemd[8300]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:13:02 dom0 lightdm[8424]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:02 dom0 lightdm[8424]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:02 dom0 systemd[8300]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:02 dom0 at-spi2-registryd[8425]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:13:02 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Activating the sys-firewall-localnet VM
Jul 08 16:13:02 dom0 audit[8468]: CRED_ACQ pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 runuser[8468]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:02 dom0 audit[8468]: USER_START pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:02 dom0 systemd[1]: Finished qubes-vm@sys-firewall-full-internet.service - Start Qubes VM sys-firewall-full-internet.
Jul 08 16:13:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-full-internet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 audit: BPF prog-id=65 op=LOAD
Jul 08 16:13:02 dom0 audit: BPF prog-id=66 op=LOAD
Jul 08 16:13:02 dom0 audit: BPF prog-id=67 op=LOAD
Jul 08 16:13:02 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:02 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:13:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:02 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI as /devices/virtual/input/input16
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:03 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Keyboard as /devices/virtual/input/input17
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event5 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI)
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI System Control as /devices/virtual/input/input19
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Consumer Control as /devices/virtual/input/input18
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Wireless Radio Control as /devices/virtual/input/input20
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event7 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI System Control)
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event8 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI Consumer Control)
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event6 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI Keyboard)
Jul 08 16:13:03 dom0 runuser[7956]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:03 dom0 audit[7956]: USER_END pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:03 dom0 audit[7956]: CRED_DISP pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:04 dom0 kernel: loop8: detected capacity change from 0 to 1399816
Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Setting Qubes DB info for the VM
Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Starting Qubes DB
Jul 08 16:13:04 dom0 audit[8919]: CRED_ACQ pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 runuser[8919]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:04 dom0 audit[8919]: USER_START pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 runuser[8919]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:04 dom0 audit[8919]: USER_END pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 audit[8919]: CRED_DISP pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Activating the sys-firewall VM
Jul 08 16:13:04 dom0 systemd[1]: Finished qubes-vm@sys-firewall-chocolatey.service - Start Qubes VM sys-firewall-chocolatey.
Jul 08 16:13:04 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-chocolatey comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 audit[8947]: CRED_ACQ pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 runuser[8947]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:04 dom0 audit[8947]: USER_START pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 runuser[8468]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:05 dom0 audit[8468]: USER_END pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 audit[8468]: CRED_DISP pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 kernel: kauditd_printk_skb: 42 callbacks suppressed
Jul 08 16:13:05 dom0 kernel: audit: type=1106 audit(1752009185.703:397): pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 kernel: audit: type=1104 audit(1752009185.703:398): pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 systemd[1]: Finished qubes-vm@sys-firewall-localnet.service - Start Qubes VM sys-firewall-localnet.
Jul 08 16:13:05 dom0 kernel: audit: type=1130 audit(1752009185.748:399): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-localnet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-localnet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:06 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-gui -> @default: allowed to dom0
Jul 08 16:13:07 dom0 runuser[8947]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:07 dom0 audit[8947]: USER_END pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 audit[8947]: CRED_DISP pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1106 audit(1752009187.516:400): pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1104 audit(1752009187.516:401): pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: Finished qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall.
Jul 08 16:13:07 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: Reached target multi-user.target - Multi-User System.
Jul 08 16:13:07 dom0 systemd[1]: Reached target graphical.target - Graphical Interface.
Jul 08 16:13:07 dom0 kernel: audit: type=1130 audit(1752009187.557:402): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP...
Jul 08 16:13:07 dom0 audit[8990]: SYSTEM_RUNLEVEL pid=8990 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1129 audit(1752009187.582:403): pid=8990 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Jul 08 16:13:07 dom0 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP.
Jul 08 16:13:07 dom0 systemd[1]: Startup finished in 9.652s (firmware) + 6.773s (loader) + 1.337s (kernel) + 18.647s (initrd) + 25.292s (userspace) = 1min 1.703s.
Jul 08 16:13:07 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1130 audit(1752009187.585:404): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1131 audit(1752009187.585:405): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 audit[8424]: USER_AUTH pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 audit[8424]: USER_ACCT pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1100 audit(1752009195.607:406): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1101 audit(1752009195.607:407): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 systemd[1]: Stopping session-c1.scope - Session c1 of User lightdm...
Jul 08 16:13:15 dom0 lightdm[8295]: pam_unix(lightdm-greeter:session): session closed for user lightdm
Jul 08 16:13:15 dom0 audit[8295]: USER_END pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 audit[8295]: CRED_DISP pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1106 audit(1752009195.669:408): pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1104 audit(1752009195.669:409): pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 systemd[1]: session-c1.scope: Deactivated successfully.
Jul 08 16:13:15 dom0 systemd[1]: Stopped session-c1.scope - Session c1 of User lightdm.
Jul 08 16:13:15 dom0 systemd-logind[3298]: Removed session c1.
Jul 08 16:13:15 dom0 audit[8424]: CRED_ACQ pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 audit[8424]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe2e54c580 a2=4 a3=7ffe2e54c294 items=0 ppid=7963 pid=8424 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:13:15 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
Jul 08 16:13:15 dom0 kernel: audit: type=1103 audit(1752009195.674:410): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1006 audit(1752009195.674:411): pid=8424 uid=0 old-auid=4294967295 auid=1000 tty=(none) old-ses=4294967295 ses=2 res=1
Jul 08 16:13:15 dom0 kernel: audit: type=1300 audit(1752009195.674:411): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe2e54c580 a2=4 a3=7ffe2e54c294 items=0 ppid=7963 pid=8424 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:13:15 dom0 kernel: audit: type=1327 audit(1752009195.674:411): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
Jul 08 16:13:15 dom0 systemd[1]: Created slice user-1000.slice - User Slice of UID 1000.
Jul 08 16:13:15 dom0 systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000...
Jul 08 16:13:15 dom0 systemd-logind[3298]: New session 2 of user admin.
Jul 08 16:13:15 dom0 systemd[1]: Finished user-runtime-dir@1000.service - User Runtime Directory /run/user/1000.
Jul 08 16:13:15 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1130 audit(1752009195.695:412): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 systemd[1]: Starting user@1000.service - User Manager for UID 1000...
Jul 08 16:13:15 dom0 (systemd)[8996]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:15 dom0 (systemd)[8996]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:15 dom0 (systemd)[8996]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:13:15 dom0 audit[8996]: USER_ACCT pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 audit[8996]: CRED_ACQ pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:13:15 dom0 audit[8996]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=8996 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:13:15 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:13:15 dom0 kernel: audit: type=1101 audit(1752009195.703:413): pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 (systemd)[8996]: pam_unix(systemd-user:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:15 dom0 audit[8996]: USER_START pid=8996 uid=0 auid=1000 ses=3 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Queued start job for default target default.target.
Jul 08 16:13:16 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Created slice app.slice - User Application Slice.
Jul 08 16:13:16 dom0 lightdm[8424]: pam_unix(lightdm:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:16 dom0 systemd[8996]: Created slice session.slice - User Core Session Slice.
Jul 08 16:13:16 dom0 audit[8424]: USER_START pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
Jul 08 16:13:16 dom0 systemd[8996]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:16 dom0 audit[8424]: USER_LOGIN pid=8424 uid=0 auid=1000 ses=2 msg='op=login id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Reached target paths.target - Paths.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target timers.target - Timers.
Jul 08 16:13:16 dom0 systemd[8996]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:13:16 dom0 systemd[8996]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:16 dom0 systemd[8996]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:16 dom0 systemd[8996]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:16 dom0 systemd[8996]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:13:16 dom0 systemd[8996]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:16 dom0 systemd[8996]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target sockets.target - Sockets.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target basic.target - Basic System.
Jul 08 16:13:16 dom0 systemd[1]: Started user@1000.service - User Manager for UID 1000.
Jul 08 16:13:16 dom0 systemd[1]: Started session-2.scope - Session 2 of User admin.
Jul 08 16:13:16 dom0 systemd[8996]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:16 dom0 systemd[8996]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:16 dom0 systemd[8996]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target default.target - Main User Target.
Jul 08 16:13:16 dom0 systemd[8996]: Startup finished in 655ms.
Jul 08 16:13:16 dom0 systemd[8996]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9004 of process 9004 (/usr/bin/pipewire) owned by '1000' high priority at nice level -11.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9005 of process 9005 (/usr/bin/wireplumber) owned by '1000' high priority at nice level -11.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9017 of process 9005 (/usr/bin/wireplumber) owned by '1000' RT at priority 20.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9022 of process 9004 (/usr/bin/pipewire) owned by '1000' RT at priority 20.
Jul 08 16:13:16 dom0 wireplumber[9005]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9006 of process 9006 (/usr/bin/pipewire) owned by '1000' high priority at nice level -11.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9025 of process 9006 (/usr/bin/pipewire) owned by '1000' RT at priority 20.
Jul 08 16:13:16 dom0 wireplumber[9005]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:13:16 dom0 wireplumber[9005]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:13:16 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.9' (uid=1000 pid=9007 comm="xfce4-session")
Jul 08 16:13:16 dom0 systemd[8996]: Starting at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.a11y.Bus'
Jul 08 16:13:16 dom0 systemd[8996]: Started at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:16 dom0 at-spi-bus-launcher[9074]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
Jul 08 16:13:16 dom0 at-spi-bus-launcher[9074]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
Jul 08 16:13:16 dom0 dbus-broker-launch[9074]: Ready
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating service name='org.xfce.Xfconf' requested by ':1.12' (uid=1000 pid=9007 comm="xfce4-session")
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.xfce.Xfconf'
Jul 08 16:13:16 dom0 systemd[8996]: Created slice app-dbus\x2d:1.11\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.11-org.a11y.atspi.Registry.
Jul 08 16:13:16 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:16 dom0 at-spi2-registryd[9084]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.15' (uid=1000 pid=9092 comm="xfwm4 --display :0.0 --sm-client-id 2f1b1da50-4881")
Jul 08 16:13:16 dom0 systemd[8996]: Starting gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.gtk.vfs.Daemon'
Jul 08 16:13:16 dom0 systemd[8996]: Started gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:16 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-localnet -> @default: allowed to dom0
Jul 08 16:13:18 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:13:18 dom0 pkexec[9253]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:18 dom0 pkexec[9253]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:18 dom0 pkexec[9253]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:18 dom0 audit[9253]: USER_START pid=9253 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 pkexec[9253]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 0]
Jul 08 16:13:18 dom0 pkexec[9306]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:18 dom0 pkexec[9306]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:18 dom0 pkexec[9306]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:18 dom0 audit[9306]: USER_START pid=9306 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 pkexec[9306]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 0]
Jul 08 16:13:18 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall -> @default: allowed to dom0
Jul 08 16:13:18 dom0 systemd[8996]: Created slice app-qubes\x2dwidget.slice - Slice /app/qubes-widget.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-updates.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-clipboard.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-disk-space.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-domains.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-devices.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Starting qubes-app-menu.service - Qubes Application Menu...
Jul 08 16:13:18 dom0 polkitd[3327]: Registered Authentication Agent for unix-session:2 (system bus name :1.77 [/usr/libexec/xfce-polkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8)
Jul 08 16:13:18 dom0 sudo[9444]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:18 dom0 sudo[9444]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:18 dom0 audit[9444]: USER_ACCT pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 audit[9444]: USER_CMD pid=9444 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D7461626C6574406576656E74342E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:18 dom0 sudo[9444]:    admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-tablet@event4.service
Jul 08 16:13:18 dom0 audit[9444]: CRED_REFR pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 sudo[9444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:18 dom0 audit[9444]: USER_START pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dtablet.slice - Slice /system/qubes-input-sender-tablet.
Jul 08 16:13:18 dom0 sudo[9444]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:18 dom0 audit[9444]: USER_END pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 audit[9444]: CRED_DISP pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-tablet@event4.service - Qubes input proxy sender (tablet/touchscreen).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-tablet@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9446]: Device /dev/input/event4 is already in dom0
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-tablet@event4.service: Deactivated successfully.
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-tablet@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:19 dom0 sudo[9459]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:19 dom0 audit[9459]: USER_ACCT pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]:    admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-mouse@event3.service
Jul 08 16:13:19 dom0 audit[9459]: USER_CMD pid=9459 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6D6F757365406576656E74332E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9459]: CRED_REFR pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9459]: USER_START pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:19 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dmouse.slice - Slice /system/qubes-input-sender-mouse.
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-mouse@event3.service - Qubes input proxy sender (mouse).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9471]: Device /dev/input/event3 is already in dom0
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-mouse@event3.service: Deactivated successfully.
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9459]: USER_END pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:19 dom0 audit[9459]: CRED_DISP pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[8996]: Started qubes-app-menu.service - Qubes Application Menu.
Jul 08 16:13:19 dom0 sudo[9481]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:19 dom0 sudo[9481]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:19 dom0 audit[9481]: USER_ACCT pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9481]: USER_CMD pid=9481 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74322E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9481]:    admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event2.service
Jul 08 16:13:19 dom0 audit[9481]: CRED_REFR pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9481]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:19 dom0 audit[9481]: USER_START pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-keyboard@event2.service - Qubes input proxy sender (keyboard).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9486]: Device /dev/input/event2 is already in dom0
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-keyboard@event2.service: Deactivated successfully.
Jul 08 16:13:19 dom0 sudo[9481]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:19 dom0 audit[9481]: USER_END pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9481]: CRED_DISP pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9503]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:19 dom0 sudo[9503]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:19 dom0 audit[9503]: USER_ACCT pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9503]:    admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event1.service
Jul 08 16:13:19 dom0 audit[9503]: USER_CMD pid=9503 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74312E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9503]: CRED_REFR pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9503]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:19 dom0 audit[9503]: USER_START pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-keyboard@event1.service - Qubes input proxy sender (keyboard).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9505]: Device /dev/input/event1 is already in dom0
Jul 08 16:13:19 dom0 sudo[9503]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:19 dom0 audit[9503]: USER_END pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9503]: CRED_DISP pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-keyboard@event1.service: Deactivated successfully.
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:20 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-chocolatey -> @default: allowed to dom0
Jul 08 16:13:20 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-full-internet -> @default: allowed to dom0
Jul 08 16:13:21 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:13:25 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992...
Jul 08 16:13:25 dom0 systemd[8300]: Activating special unit exit.target...
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target default.target - Main User Target.
Jul 08 16:13:25 dom0 dbus-broker[8351]: Dispatched 22 messages @ 6(±8)μs / message.
Jul 08 16:13:25 dom0 systemd[8300]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping dbus-daemon.service - D-Bus User Message Bus...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping pipewire-pulse.service - PipeWire PulseAudio...
Jul 08 16:13:25 dom0 systemd[8300]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:25 dom0 systemd[8300]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:13:25 dom0 systemd[8300]: Stopping wireplumber.service - Multimedia Service Session Manager...
Jul 08 16:13:25 dom0 wireplumber[8317]: stopped by signal: Terminated
Jul 08 16:13:25 dom0 wireplumber[8317]: disconnected from pipewire
Jul 08 16:13:25 dom0 systemd[8300]: Stopped wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:25 dom0 systemd[8300]: Stopping pipewire.service - PipeWire Multimedia Service...
Jul 08 16:13:25 dom0 systemd[8300]: Stopped pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:25 dom0 systemd[8300]: Removed slice session.slice - User Core Session Slice.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target basic.target - Basic System.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target paths.target - Paths.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target sockets.target - Sockets.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target timers.target - Timers.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:25 dom0 systemd[8300]: Closed dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:25 dom0 systemd[8300]: Closed pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:25 dom0 systemd[8300]: Closed pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:25 dom0 systemd[8300]: Closed ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:25 dom0 systemd[8300]: Removed slice app.slice - User Application Slice.
Jul 08 16:13:25 dom0 systemd[8300]: Reached target shutdown.target - Shutdown.
Jul 08 16:13:25 dom0 systemd[8300]: Finished systemd-exit.service - Exit the Session.
Jul 08 16:13:25 dom0 systemd[8300]: Reached target exit.target - Exit the Session.
Jul 08 16:13:25 dom0 systemd[1]: user@992.service: Deactivated successfully.
Jul 08 16:13:25 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992.
Jul 08 16:13:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 systemd[1]: user@992.service: Consumed 1.021s CPU time.
Jul 08 16:13:25 dom0 kernel: kauditd_printk_skb: 42 callbacks suppressed
Jul 08 16:13:25 dom0 kernel: audit: type=1131 audit(1752009205.921:454): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:13:25 dom0 systemd[1]: run-user-992.mount: Deactivated successfully.
Jul 08 16:13:25 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully.
Jul 08 16:13:25 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:13:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 kernel: audit: type=1131 audit(1752009205.943:455): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992.
Jul 08 16:13:25 dom0 systemd[1]: user-992.slice: Consumed 1.978s CPU time.
Jul 08 16:13:29 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-usb -> @default: allowed to dom0
Jul 08 16:13:31 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:13:32 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:13:34 dom0 pkexec[9753]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:34 dom0 pkexec[9753]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:34 dom0 pkexec[9753]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:34 dom0 audit[9753]: USER_START pid=9753 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1105 audit(1752009214.175:456): pid=9753 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 pkexec[9753]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 1]
Jul 08 16:13:34 dom0 audit[8424]: USER_LOGOUT pid=8424 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1113 audit(1752009214.184:457): pid=8424 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:13:34 dom0 lightdm[8424]: pam_unix(lightdm:session): session closed for user admin
Jul 08 16:13:34 dom0 audit[8424]: USER_END pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 audit[8424]: CRED_DISP pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1106 audit(1752009214.186:458): pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1104 audit(1752009214.186:459): pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 at-spi2-registryd[9084]: X connection to :0 broken (explicit kill or server shutdown).
Jul 08 16:13:34 dom0 systemd-logind[3298]: Session 2 logged out. Waiting for processes to exit.
Jul 08 16:13:34 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@0.service: Main process exited, code=exited, status=1/FAILURE
Jul 08 16:13:34 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@0.service: Failed with result 'exit-code'.
Jul 08 16:13:34 dom0 audit[9407]: ANOM_ABEND auid=1000 uid=1000 gid=1000 ses=2 pid=9407 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1
Jul 08 16:13:34 dom0 kernel: traps: xss-lock[9407] trap int3 ip:759b37451e71 sp:7fffcadeb470 error:0 in libglib-2.0.so.0.7400.7[5ee71,759b37411000+93000]
Jul 08 16:13:34 dom0 kernel: audit: type=1701 audit(1752009214.191:460): auid=1000 uid=1000 gid=1000 ses=2 pid=9407 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1
Jul 08 16:13:34 dom0 systemd[1]: Created slice system-systemd\x2dcoredump.slice - Slice /system/systemd-coredump.
Jul 08 16:13:34 dom0 audit: BPF prog-id=68 op=LOAD
Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.214:461): prog-id=68 op=LOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=69 op=LOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=70 op=LOAD
Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.215:462): prog-id=69 op=LOAD
Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.215:463): prog-id=70 op=LOAD
Jul 08 16:13:34 dom0 polkitd[3327]: Unregistered Authentication Agent for unix-session:2 (system bus name :1.77, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) (disconnected from bus)
Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Main process exited, code=exited, status=1/FAILURE
Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Failed with result 'exit-code'.
Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Consumed 1.544s CPU time.
Jul 08 16:13:34 dom0 systemd[1]: Started systemd-coredump@0-9764-0.service - Process Core Dump (PID 9764/UID 0).
Jul 08 16:13:34 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1130 audit(1752009214.224:464): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 systemd-coredump[9769]: Process 9407 (xss-lock) of user 1000 dumped core.
Jul 08 16:13:34 dom0 systemd[1]: systemd-coredump@0-9764-0.service: Deactivated successfully.
Jul 08 16:13:34 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 audit: BPF prog-id=70 op=UNLOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=69 op=UNLOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=68 op=UNLOAD
Jul 08 16:13:34 dom0 widget-wrapper[9767]: xhost:  unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9768]: xhost:  unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9765]: xhost:  unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9770]: xhost:  unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9766]: xhost:  unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9427]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9415]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9417]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9420]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9393]: exiting with 0
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Scheduled restart job, restart counter is at 1.
Jul 08 16:13:35 dom0 systemd[8996]: Stopped qubes-app-menu.service - Qubes Application Menu.
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Consumed 1.544s CPU time.
Jul 08 16:13:35 dom0 systemd[8996]: Starting qubes-app-menu.service - Qubes Application Menu...
Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified
Jul 08 16:13:35 dom0 audit[9818]: CRED_ACQ pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:35 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified
Jul 08 16:13:35 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992.
Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Main process exited, code=exited, status=6/NOTCONFIGURED
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Failed with result 'exit-code'.
Jul 08 16:13:35 dom0 systemd[8996]: Failed to start qubes-app-menu.service - Qubes Application Menu.
Jul 08 16:13:35 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:13:35 dom0 systemd-logind[3298]: New session c2 of user lightdm.
Jul 08 16:13:35 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:13:35 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:35 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992...
Jul 08 16:13:35 dom0 (systemd)[9822]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:35 dom0 (systemd)[9822]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:35 dom0 (systemd)[9822]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:13:35 dom0 audit[9822]: USER_ACCT pid=9822 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:35 dom0 audit[9822]: CRED_ACQ pid=9822 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:13:35 dom0 audit[9822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=9822 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:13:35 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:13:35 dom0 (systemd)[9822]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:35 dom0 audit[9822]: USER_START pid=9822 uid=0 auid=992 ses=4 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:36 dom0 systemd[9822]: Queued start job for default target default.target.
Jul 08 16:13:36 dom0 systemd[9822]: Created slice app.slice - User Application Slice.
Jul 08 16:13:36 dom0 systemd[9822]: Created slice session.slice - User Core Session Slice.
Jul 08 16:13:36 dom0 systemd[9822]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system).
Jul 08 16:13:36 dom0 systemd[9822]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target paths.target - Paths.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target timers.target - Timers.
Jul 08 16:13:36 dom0 systemd[9822]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:13:36 dom0 systemd[9822]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:36 dom0 systemd[9822]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:36 dom0 systemd[9822]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:36 dom0 systemd[9822]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:13:36 dom0 systemd[9822]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:36 dom0 systemd[9822]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target sockets.target - Sockets.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target basic.target - Basic System.
Jul 08 16:13:36 dom0 systemd[1]: Started user@992.service - User Manager for UID 992.
Jul 08 16:13:36 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:36 dom0 systemd[1]: Started session-c2.scope - Session c2 of User lightdm.
Jul 08 16:13:36 dom0 systemd[9822]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:36 dom0 systemd[9822]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:36 dom0 audit[9818]: USER_START pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:36 dom0 systemd[9822]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target default.target - Main User Target.
Jul 08 16:13:36 dom0 systemd[9822]: Startup finished in 644ms.
Jul 08 16:13:36 dom0 systemd[9822]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9839 of process 9839 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9838 of process 9838 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9847 of process 9839 (/usr/bin/wireplumber) owned by '992' RT at priority 20.
Jul 08 16:13:36 dom0 wireplumber[9839]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9849 of process 9838 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9840 of process 9840 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9850 of process 9840 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:36 dom0 wireplumber[9839]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:13:36 dom0 wireplumber[9839]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=9841 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:36 dom0 systemd[9822]: Starting at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Successfully activated service 'org.a11y.Bus'
Jul 08 16:13:36 dom0 systemd[9822]: Started at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:36 dom0 at-spi-bus-launcher[9862]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
Jul 08 16:13:36 dom0 at-spi-bus-launcher[9862]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
Jul 08 16:13:36 dom0 dbus-broker-launch[9862]: Ready
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=9841 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:36 dom0 systemd[9822]: Starting gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Successfully activated service 'org.gtk.vfs.Daemon'
Jul 08 16:13:36 dom0 systemd[9822]: Started gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:36 dom0 systemd[9822]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:13:36 dom0 lightdm[9892]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:36 dom0 lightdm[9892]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:36 dom0 systemd[9822]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:36 dom0 wireplumber[9839]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:13:36 dom0 at-spi2-registryd[9893]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:13:59 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:13:59 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:59 dom0 kernel: kauditd_printk_skb: 14 callbacks suppressed
Jul 08 16:13:59 dom0 kernel: audit: type=1131 audit(1752009239.458:477): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:59 dom0 audit: BPF prog-id=67 op=UNLOAD
Jul 08 16:13:59 dom0 audit: BPF prog-id=66 op=UNLOAD
Jul 08 16:13:59 dom0 audit: BPF prog-id=65 op=UNLOAD
Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:478): prog-id=67 op=UNLOAD
Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:479): prog-id=66 op=UNLOAD
Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:480): prog-id=65 op=UNLOAD
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:03 dom0 lightdm[10600]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:03 dom0 lightdm[10600]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:11 dom0 audit[10600]: USER_AUTH pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[10600]: USER_ACCT pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1100 audit(1752009311.008:481): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.008:482): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 systemd[1]: Stopping session-c2.scope - Session c2 of User lightdm...
Jul 08 16:15:11 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session closed for user lightdm
Jul 08 16:15:11 dom0 audit[9818]: USER_END pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1106 audit(1752009311.059:483): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1104 audit(1752009311.059:484): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[9818]: CRED_DISP pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Deactivated successfully.
Jul 08 16:15:11 dom0 systemd[1]: Stopped session-c2.scope - Session c2 of User lightdm.
Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Consumed 1.791s CPU time.
Jul 08 16:15:11 dom0 systemd-logind[3298]: Removed session c2.
Jul 08 16:15:11 dom0 audit[10600]: CRED_ACQ pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[10600]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234
Jul 08 16:15:11 dom0 kernel: audit: type=1103 audit(1752009311.065:485): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1006 audit(1752009311.065:486): pid=10600 uid=0 old-auid=4294967295 auid=1001 tty=(none) old-ses=4294967295 ses=5 res=1
Jul 08 16:15:11 dom0 kernel: audit: type=1300 audit(1752009311.065:486): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:15:11 dom0 kernel: audit: type=1327 audit(1752009311.065:486): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234
Jul 08 16:15:11 dom0 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001.
Jul 08 16:15:11 dom0 systemd[1]: Starting user-runtime-dir@1001.service - User Runtime Directory /run/user/1001...
Jul 08 16:15:11 dom0 systemd-logind[3298]: New session 5 of user engineer.
Jul 08 16:15:11 dom0 systemd[1]: Finished user-runtime-dir@1001.service - User Runtime Directory /run/user/1001.
Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1130 audit(1752009311.087:487): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 systemd[1]: Starting user@1001.service - User Manager for UID 1001...
Jul 08 16:15:11 dom0 (systemd)[10663]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:11 dom0 (systemd)[10663]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:11 dom0 (systemd)[10663]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:15:11 dom0 audit[10663]: USER_ACCT pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 audit[10663]: CRED_ACQ pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:15:11 dom0 audit[10663]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=10663 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=6 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.095:488): pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:15:11 dom0 audit[10663]: USER_START pid=10663 uid=0 auid=1001 ses=6 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 (systemd)[10663]: pam_unix(systemd-user:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:15:11 dom0 systemd[10663]: Queued start job for default target default.target.
Jul 08 16:15:11 dom0 systemd[10663]: Created slice app.slice - User Application Slice.
Jul 08 16:15:11 dom0 systemd[10663]: Created slice session.slice - User Core Session Slice.
Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 systemd[10663]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
Jul 08 16:15:11 dom0 systemd[10663]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target paths.target - Paths.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target timers.target - Timers.
Jul 08 16:15:11 dom0 systemd[10663]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:15:11 dom0 audit[10600]: USER_START pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 lightdm[10600]: pam_unix(lightdm:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:15:11 dom0 audit[10600]: USER_LOGIN pid=10600 uid=0 auid=1001 ses=5 msg='op=login id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:15:11 dom0 systemd[10663]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:15:11 dom0 systemd[10663]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:15:11 dom0 systemd[10663]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:15:11 dom0 systemd[10663]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target sockets.target - Sockets.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target basic.target - Basic System.
Jul 08 16:15:11 dom0 systemd[1]: Started user@1001.service - User Manager for UID 1001.
Jul 08 16:15:11 dom0 systemd[1]: Started session-5.scope - Session 5 of User engineer.
Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:15:11 dom0 systemd[10663]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target default.target - Main User Target.
Jul 08 16:15:11 dom0 systemd[10663]: Startup finished in 638ms.
Jul 08 16:15:11 dom0 systemd[10663]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10676 of process 10676 (/usr/bin/wireplumber) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10677 of process 10677 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10693 of process 10676 (/usr/bin/wireplumber) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10696 of process 10677 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 wireplumber[10676]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10675 of process 10675 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10695 of process 10675 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 wireplumber[10676]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:15:11 dom0 wireplumber[10676]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:15:11 dom0 audit: BPF prog-id=71 op=LOAD
Jul 08 16:15:11 dom0 audit: BPF prog-id=72 op=LOAD
Jul 08 16:15:11 dom0 audit: BPF prog-id=73 op=LOAD
Jul 08 16:15:11 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:15:12 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:15:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 wireplumber[10676]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:15:12 dom0 sudo[10743]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:12 dom0 sudo[10743]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:12 dom0 audit[10743]: USER_ACCT pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 audit[10743]: USER_CMD pid=10743 uid=1001 auid=1001 ses=5 msg='cwd="/home/engineer" cmd=67726570205E7379732D6775693A202F6574632F71756265732D7379732D6775692D757365722D70617373776F726473 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: engineer : PWD=/home/engineer ; USER=root ; COMMAND=/usr/bin/grep ^sys-gui: /etc/qubes-sys-gui-user-passwords
Jul 08 16:15:12 dom0 audit[10743]: CRED_REFR pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1001)
Jul 08 16:15:12 dom0 audit[10743]: USER_START pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session closed for user root
Jul 08 16:15:12 dom0 audit[10743]: USER_END pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 audit[10743]: CRED_DISP pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qubesd[4330]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated
Jul 08 16:15:15 dom0 qubesd[4330]: ignoring /etc/qubes-rpc/policy/include (not a file)
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+updateable: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 xenstored[3342]: write rate limit: domain 5 is affected
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Index+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992...
Jul 08 16:15:21 dom0 systemd[9822]: Activating special unit exit.target...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target default.target - Main User Target.
Jul 08 16:15:21 dom0 dbus-broker[9863]: Dispatched 22 messages @ 6(±7)μs / message.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service...
Jul 08 16:15:21 dom0 gvfsd[9865]: A connection to the bus can't be made
Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-daemon.service - D-Bus User Message Bus...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire-pulse.service - PipeWire PulseAudio...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping wireplumber.service - Multimedia Service Session Manager...
Jul 08 16:15:21 dom0 wireplumber[9839]: stopped by signal: Terminated
Jul 08 16:15:21 dom0 wireplumber[9839]: disconnected from pipewire
Jul 08 16:15:21 dom0 systemd[9822]: Stopped wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire.service - PipeWire Multimedia Service...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire.service - PipeWire Multimedia Service.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice session.slice - User Core Session Slice.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target basic.target - Basic System.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target paths.target - Paths.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target sockets.target - Sockets.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target timers.target - Timers.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:15:21 dom0 systemd[9822]: Closed dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:15:21 dom0 systemd[9822]: Closed ssh-agent.socket - OpenSSH key agent.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app.slice - User Application Slice.
Jul 08 16:15:21 dom0 systemd[9822]: Reached target shutdown.target - Shutdown.
Jul 08 16:15:21 dom0 systemd[9822]: Finished systemd-exit.service - Exit the Session.
Jul 08 16:15:21 dom0 systemd[9822]: Reached target exit.target - Exit the Session.
Jul 08 16:15:21 dom0 systemd[1]: user@992.service: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992.
Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 kernel: kauditd_printk_skb: 18 callbacks suppressed
Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.174:505): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:15:21 dom0 systemd[1]: run-user-992.mount: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.197:506): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992.
Jul 08 16:15:21 dom0 systemd[1]: user-992.slice: Consumed 2.751s CPU time.
Jul 08 16:15:21 dom0 systemd[8996]: Starting grub-boot-success.service - Mark boot as successful...
Jul 08 16:15:21 dom0 systemd[8996]: Finished grub-boot-success.service - Mark boot as successful.
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                  ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:            ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:   File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]:     sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-net: allowed to sys-net
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-usb: allowed to sys-usb
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.Stats+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@1.service.
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified
Jul 08 16:15:26 dom0 at-spi2-registr[11516]: Could not open X display
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified
Jul 08 16:15:26 dom0 at-spi2-registr[11516]: AT-SPI: Cannot open default display
Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Main process exited, code=exited, status=1/FAILURE
Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Failed with result 'exit-code'.
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to sys-gui
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-initial-page: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-sort-running: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:15:42 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:15:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:42 dom0 kernel: audit: type=1131 audit(1752009342.054:507): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:42 dom0 audit: BPF prog-id=73 op=UNLOAD
Jul 08 16:15:42 dom0 audit: BPF prog-id=72 op=UNLOAD
Jul 08 16:15:42 dom0 audit: BPF prog-id=71 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:508): prog-id=73 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:509): prog-id=72 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:510): prog-id=71 op=UNLOAD
Jul 08 16:16:01 dom0 systemd[1]: Started getty@tty2.service - Getty on tty2.
Jul 08 16:16:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:01 dom0 kernel: audit: type=1130 audit(1752009361.784:511): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:01 dom0 kernel: fbcon: Taking over console
Jul 08 16:16:01 dom0 kernel: Console: switching to colour frame buffer device 320x100
Jul 08 16:16:04 dom0 login[12106]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:16:04 dom0 login[12106]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:16:10 dom0 audit[12106]: USER_AUTH pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: USER_ACCT pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1100 audit(1752009370.783:512): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1101 audit(1752009370.783:513): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: CRED_ACQ pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=3 a1=7ffeca7d8540 a2=4 a3=7ffeca7d8254 items=0 ppid=1 pid=12106 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty2 ses=7 comm="login" exe="/usr/bin/login" key=(null)
Jul 08 16:16:10 dom0 audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 08 16:16:10 dom0 kernel: audit: type=1103 audit(1752009370.784:514): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1006 audit(1752009370.784:515): pid=12106 uid=0 old-auid=4294967295 auid=1000 tty=tty2 old-ses=4294967295 ses=7 res=1
Jul 08 16:16:10 dom0 kernel: audit: type=1300 audit(1752009370.784:515): arch=c000003e syscall=1 success=yes exit=4 a0=3 a1=7ffeca7d8540 a2=4 a3=7ffeca7d8254 items=0 ppid=1 pid=12106 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty2 ses=7 comm="login" exe="/usr/bin/login" key=(null)
Jul 08 16:16:10 dom0 kernel: audit: type=1327 audit(1752009370.784:515): proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 08 16:16:10 dom0 systemd-logind[3298]: New session 7 of user admin.
Jul 08 16:16:10 dom0 systemd[1]: Started session-7.scope - Session 7 of User admin.
Jul 08 16:16:10 dom0 login[12106]: pam_unix(login:session): session opened for user admin(uid=1000) by LOGIN(uid=0)
Jul 08 16:16:10 dom0 audit[12106]: USER_START pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: CRED_REFR pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: USER_LOGIN pid=12106 uid=0 auid=1000 ses=7 msg='op=login id=1000 exe="/usr/bin/login" hostname=dom0 addr=? terminal=tty2 res=success'
Jul 08 16:16:10 dom0 login[12106]: LOGIN ON tty2 BY admin
Jul 08 16:16:10 dom0 kernel: audit: type=1105 audit(1752009370.816:516): pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1110 audit(1752009370.816:517): pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1112 audit(1752009370.816:518): pid=12106 uid=0 auid=1000 ses=7 msg='op=login id=1000 exe="/usr/bin/login" hostname=dom0 addr=? terminal=tty2 res=success'
Jul 08 16:16:10 dom0 audit: BPF prog-id=74 op=LOAD
Jul 08 16:16:10 dom0 audit: BPF prog-id=75 op=LOAD
Jul 08 16:16:10 dom0 audit: BPF prog-id=76 op=LOAD
Jul 08 16:16:10 dom0 kernel: audit: type=1334 audit(1752009370.834:519): prog-id=74 op=LOAD
Jul 08 16:16:10 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:16:10 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:16:10 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:11 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:16:40 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:16:40 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:40 dom0 kernel: kauditd_printk_skb: 3 callbacks suppressed
Jul 08 16:16:40 dom0 kernel: audit: type=1131 audit(1752009400.914:523): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:40 dom0 audit: BPF prog-id=76 op=UNLOAD
Jul 08 16:16:40 dom0 audit: BPF prog-id=75 op=UNLOAD
Jul 08 16:16:40 dom0 audit: BPF prog-id=74 op=UNLOAD
Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:524): prog-id=76 op=UNLOAD
Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:525): prog-id=75 op=UNLOAD
Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:526): prog-id=74 op=UNLOAD
Jul 08 16:17:09 dom0 sudo[13216]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:17:09 dom0 sudo[13216]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:17:09 dom0 audit[13216]: USER_ACCT pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 kernel: audit: type=1101 audit(1752009429.445:527): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 kernel: audit: type=1123 audit(1752009429.445:528): pid=13216 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:17:09 dom0 kernel: audit: type=1110 audit(1752009429.446:529): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 audit[13216]: USER_CMD pid=13216 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:17:09 dom0 audit[13216]: CRED_REFR pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 sudo[13216]:    admin : TTY=tty2 ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/journalctl --since=today
Jul 08 16:17:09 dom0 kernel: audit: type=1105 audit(1752009429.448:530): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 audit[13216]: USER_START pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 sudo[13216]: pam_unix(sudo:session): session opened for user root(uid=0) by admin(uid=1000)